RLBA-2022:7404
tzdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
rocky-linux-9-x86-64-appstream-rpms
tzdata-java-2022f-1.el8.noarch.rpm
0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984
tzdata-java-2022f-1.el9_0.noarch.rpm
70571d1a7150ad2243e4fde1a8cde3212f8639b272e663d385883efcc15d8fdb
RLBA-2022:8785
tzdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
rocky-linux-9-x86-64-appstream-rpms
tzdata-java-2022g-1.el8.noarch.rpm
d5799859d5ae6af11f34b5c55e385e2f26daa17a9b635a9a9446f134e31d707d
tzdata-java-2022g-1.el9_1.noarch.rpm
ff69047c3082c3e0a940ee04ef561126d256c588b86fc17cca3a5da1f7b8851a
RLBA-2022:2682
new packages: protobuf-c
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for protobuf-c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
protobuf-c-1.3.3-12.el9.i686.rpm
dfb9eb68cb6b22eda56763f7856d2b74b93ee03ce762c9ec020f7ed82688c49c
protobuf-c-1.3.3-12.el9.x86_64.rpm
f82bae4489cf7e438599ceb47eb215634feb0d276b244f2001d8cea4ca692a8c
RLBA-2022:3894
new packages: glib-networking
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glib-networking.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glib-networking-2.68.3-3.el9.i686.rpm
2a7824f80e9ef343a8467dab9edd5624a6f1adaeed8dc64b05de686e987dade0
RLBA-2022:3908
new packages: python-pip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pip-21.2.3-6.el9.noarch.rpm
3e404af67d56c37dcb4e519a6e5e8c7c08a5234d5a184503690f3f021f7f05b9
RLBA-2022:3916
new packages: fonts-rpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fonts-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fonts-srpm-macros-2.0.5-7.el9.1.noarch.rpm
01b6088fbed339508161744f5d79e64c2fcf49e1ce119964e684f7d95806c3ac
RLBA-2022:3921
new packages: libsemanage
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libsemanage-3.3-2.el9.x86_64.rpm
82135ac117d5d550e8474a6b83da64f8b2d6ab6bccfceb992c93d316b8dfcb15
RLBA-2022:3928
new packages: libssh
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libssh-devel-0.9.6-3.el9.i686.rpm
1d795800662081cceade0a562111d27ef5ef4348e159b424ee76a23686150ab2
libssh-devel-0.9.6-3.el9.x86_64.rpm
70d5b1c223ec3b36545177bfaf43922ca75013cefefc07e8e3130ec62a8e6a8f
RLBA-2022:3931
new packages: glib2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glib2-devel-2.68.4-5.el9.i686.rpm
63928a4f52f3b6ea0df47b1f026cf43cdcaf8167e41e2034adb9bad1b7c85413
glib2-devel-2.68.4-5.el9.x86_64.rpm
c6cbd7a6cff049d075f0212b821db23b2094b5cbc796d74ac7fb9613e0e66b9c
glib2-doc-2.68.4-5.el9.noarch.rpm
b37e357f080d497842142df3397395a863828be611181985cb3c20011e59359d
glib2-tests-2.68.4-5.el9.x86_64.rpm
84fc4ebde3e071c9b762faa1f6ace122578ba8f74a967dfa301f885da3a50cac
RLBA-2022:3946
new packages: groff
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for groff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
groff-1.22.4-10.el9.x86_64.rpm
a8a502bc353debca7041c3cebd95398e13ea114caeb7e27d6cd6efcda45ddf9e
RLEA-2022:3950
new packages: RDMA stack
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
eth-tools-basic-11.1.0.1-5.el9.x86_64.rpm
b3947161a1d1162c3f27bffbeb9472ec2abc8c386c997872f37323a6531cfa1b
eth-tools-fastfabric-11.1.0.1-5.el9.x86_64.rpm
7872f68e71a82b74f5603c0e9f0a63868832ec53eeb60cb41a9b2d9807b71268
fabtests-1.14.0-1.el9.x86_64.rpm
e36d032b782179581f433cff38d232daf452a337798af29fcf6b3e936b91589a
ibacm-37.2-1.el9.i686.rpm
6a69b04b9c7a3c94399e55ad97b39d0e20a69ac00f17dd1d9dd4b2f2db18d713
infiniband-diags-37.2-1.el9.i686.rpm
89f1741f43d8c376ce0e353852f18acf2b30ea2b9c016bceeb7a87ea987713a9
infiniband-diags-37.2-1.el9.x86_64.rpm
e387e0def15ac5f0cbbf74c7a9f3a25d32eafad9dfef3ea72b7398f74542545c
libfabric-1.14.0-1.el9.i686.rpm
c777ff4b8bcc42ae00182e6af9ecab707a1001373ed3811ee633d47fe1f4e1ee
libfabric-1.14.0-1.el9.x86_64.rpm
9473b58a3d979c7141e046aa7cbca4598b973da241ca99d796be6d43251112ff
libpsm2-11.2.206-1.el9.x86_64.rpm
e65a451d7a78719b25ad9c730afa210cfc44956ac8d2d97feb6c40a79fb018e1
libvma-9.4.0-1.el9.x86_64.rpm
b7e04dc525fd75a6ec736c1c4853ec4fd6f1e29769257fa296d88f0917337c4a
libvma-utils-9.4.0-1.el9.x86_64.rpm
cc4748b09d50fbc4ebcc5099c10993fdce11be40a78b14994329a2c1c1508381
mpich-3.4.2-1.el9.x86_64.rpm
b60d94fd74a6bfe91e1a3a74170774e25945ebdf6ea828cc05117222047245a4
mpich-autoload-3.4.2-1.el9.x86_64.rpm
51d692478cc61a31eba09cb88730260fb6ba81a1ea721aad1ae57cc870873025
mpich-devel-3.4.2-1.el9.i686.rpm
fd870cbc4bc676b47a37e9893db9d4579b0f321c8baa83f994fa0471df204404
mpich-devel-3.4.2-1.el9.x86_64.rpm
d023ba5cb9206c515345e5595a0373befad066e56b068ffd2864ac0fb8b122ab
mpich-doc-3.4.2-1.el9.noarch.rpm
b025053e55946fdf789176649ee4f331793a620c640fbda8cff4a54fe76548ec
mpitests-mpich-5.8-1.el9.x86_64.rpm
4f31eb15208ffcccb18e1bfb312bf0f6b40285c39ed349eb16220ed8b9e3d4b9
mpitests-mvapich2-5.8-1.el9.x86_64.rpm
0b7f8502ce42b151752d23622306ed591c20b7982cf783fb341c9c62e0313fc0
mpitests-mvapich2-psm2-5.8-1.el9.x86_64.rpm
c1907a192e9447972df78a7c356dc4c28ceb7890bcd7cd1fa7c5b3e3a58100be
mpitests-openmpi-5.8-1.el9.x86_64.rpm
c6847c7723b2dea3f956be8723efb77538c3189122b57b1130ffbfb35c1fda43
mstflint-4.18.0-1.el9.x86_64.rpm
669111c557f49a8208c19962e8523613986545c2dcb0f81a78562e9b72422729
openmpi-4.1.1-5.el9.i686.rpm
180d5296f48865d9f1f85c10bdf1acd0c4976ec4888b0a6a42133309c5f4b8d9
openmpi-4.1.1-5.el9.x86_64.rpm
6d98dfc5deb5cdee88d704a6ba526b854fbb08c8253b117891590046d19286dd
openmpi-devel-4.1.1-5.el9.i686.rpm
79905bf68d0439027ee7f581be90e82acb356671d3bb67af53c0cba2c73d82a3
openmpi-devel-4.1.1-5.el9.x86_64.rpm
9ca324456cdae9bd9fa14940ff9c90fd240bb689fea648a543090b1244ce6603
openmpi-java-4.1.1-5.el9.x86_64.rpm
df37f53ba819a9037b8dbf5b8658df1be40086b2a8b5dcf25d1f908dda26a4d4
python3-pyverbs-37.2-1.el9.x86_64.rpm
cb4e9ef1cd360eafbce1631b1efe76473884fd1181277322dcc564645d2f0c2b
rdma-core-devel-37.2-1.el9.i686.rpm
9e1fa6d5eb9191f1a7999b850675cd9da5cada37b545883fdc54986bfac7056e
rdma-core-devel-37.2-1.el9.x86_64.rpm
96b0911acb5814f53af4e3195d4ecc485fc835a5d3003d03bf6d8246f0a42db1
ucx-1.11.2-2.el9.x86_64.rpm
be20b63e48fe26f31e24c4132db903257cc7ee9d1e44a31d2f38784c6e0f4a7e
ucx-cma-1.11.2-2.el9.x86_64.rpm
d41a61b2e51c14840b6ebc8eaf3479270d90dec0755efc5dab0afbebc0938a2c
ucx-devel-1.11.2-2.el9.x86_64.rpm
aca32173ee7235095a7eb0c5d39d719360d5ffb035d6550e6dee694161ef36ed
ucx-ib-1.11.2-2.el9.x86_64.rpm
2f9b7c87dcc52886e20eb586ca358c02ca451b7d7ff911db16c2d1fecb56647c
ucx-rdmacm-1.11.2-2.el9.x86_64.rpm
88afcca9cf164c115de4ba7d7eee2e72723f006f521ec2589e71eb9e222f6a7f
RLBA-2022:3956
new packages: iscsi-initiator-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-iscsi-initiator-utils-6.2.1.4-2.git2a8f9d8.el9.x86_64.rpm
32755b2602b0989fa38de34d87060e35ad9a90f583623ecdb72ac6a0300600fd
RLBA-2022:3968
new packages: efi-rpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for efi-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
efi-srpm-macros-6-2.el9_0.noarch.rpm
11dbca455e5a30f6f278303c890fecc67b372e5a084336024bddf44345512d43
RLEA-2022:3969
new packages: libseccomp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libseccomp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libseccomp-devel-2.5.2-2.el9.i686.rpm
226f07334575c8af3cf492b0ddbab94747059fb4a8d50e16fc3a01325365f42c
libseccomp-devel-2.5.2-2.el9.x86_64.rpm
923325d8fa25deaac76a43b50294dbe8c9868dbde73f7006a00eb338062ac552
RLBA-2022:3982
new packages: setools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setools-4.4.0-4.el9.x86_64.rpm
e5a7bc31764c0261350955c6010dd995c2267ee8eab3cc92777f3d6a667d16e2
setools-console-analyses-4.4.0-4.el9.x86_64.rpm
7a8298a24ce341ddfd009ccdcf47c276e14e87c2b7babb617faa35df6965c708
setools-gui-4.4.0-4.el9.x86_64.rpm
f8f880d18af0d93914037bb9aa5106b65fca75b3d66d78420f739fee59a11cdb
RLEA-2022:3986
new packages: ipset
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipset-service-7.11-6.el9.noarch.rpm
57b994484586d4f7196380cb86cb83a15f562fc48b4bef594fd32f153c0a15e8
RLBA-2022:3987
new packages: libdb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdb-devel-5.3.28-53.el9.i686.rpm
5f1be48c4284e2191519e592eede060a44f4b1b141dc687ffd09cfb8770bd648
libdb-devel-5.3.28-53.el9.x86_64.rpm
db690e17ebc3759381360d8e8c1c9939f09e57c48de61e50d8fa401720c4fe11
libdb-utils-5.3.28-53.el9.x86_64.rpm
9f3362e0ba9fe4940301e3950c8228305b25def103d583002921190c3a341d34
RLBA-2022:3992
new packages: c-ares
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for c-ares.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
c-ares-devel-1.17.1-5.el9.i686.rpm
c1204b9ec075bef1acaaef12df761bc9cb64ff7293f92adfbb54ab9b05a67759
c-ares-devel-1.17.1-5.el9.x86_64.rpm
707bd78d129e9754ece7b04e353c7b37bb0428686fec8b745783f9dd203e146f
RLBA-2022:4009
new packages: libgpg-error
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgpg-error.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgpg-error-devel-1.42-5.el9.i686.rpm
7f098351b4ab1c42fcc07bb704b2de85f646f94e6f655310a899d504c4ffe92d
libgpg-error-devel-1.42-5.el9.x86_64.rpm
622691193f93c323eee79bfdb9e7a82dbee9d46f82ad32f93a5899489210c557
RLBA-2022:4020
new packages: numactl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for numactl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
numactl-devel-2.0.14-8.el9.i686.rpm
82b2294bfa9c891e341eafcc64028e6bb22ae315041d816293aa93b0f190709b
numactl-devel-2.0.14-8.el9.x86_64.rpm
f955c12565a56bdf727c801c92351732c53860f92dbdad7dc04b629881e874b0
RLBA-2022:4022
new packages: xfsprogs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xfsprogs-devel-5.14.2-1.el9.i686.rpm
64c38dbb4e436a4a68322cadb9d49a8e8bffd7f79b6c09a6cdf3d29cd900501c
xfsprogs-devel-5.14.2-1.el9.x86_64.rpm
e1a92c9d69daaf2e8de548f72856b1da6e3e54e932d57cd3121fba43361c0ddb
xfsprogs-xfs_scrub-5.14.2-1.el9.x86_64.rpm
9a47df0519b1965a11a5b787de963332bb478f126370d928a3116c00e03ce22f
RLBA-2022:4032
new packages: p11-kit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for p11-kit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
p11-kit-devel-0.24.1-2.el9.i686.rpm
062f26d1babfa7d408d710a82b4881e0961dc1d7d12e441b7f65b83a1ba10909
p11-kit-devel-0.24.1-2.el9.x86_64.rpm
30ca13a104f0a8b67dee566d82ec08ae344bcabb87d9354a9ec144ed01badd5c
p11-kit-server-0.24.1-2.el9.x86_64.rpm
a39969b4096f36e87f25280b985eb7c8d6819a20a3cac497dea6aca0ce1c8162
p11-kit-trust-0.24.1-2.el9.i686.rpm
2b80808eee9b0299c721b172e4a91a7852969da69e9269eaf1e2292a1acc691c
p11-kit-trust-0.24.1-2.el9.x86_64.rpm
f3323fd8f94b5590ce6b8a191db48315eee46e1f4c5b1902b1c0b14982dc4b34
RLBA-2022:4033
new packages: kbd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
kbd-legacy-2.4.0-8.el9.noarch.rpm
2bc13a805f8c4145d6693e0481a7313e1ae346ecb627e09e72430bc6021222c2
RLBA-2022:4035
new packages: lshw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lshw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lshw-gui-B.02.19.2-7.el9.x86_64.rpm
62fb52db5c4c7271d53fde49007b28d1eec8f43aa45dd06ba6eca081b273976f
RLBA-2022:4038
new packages: sysfsutil
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sysfsutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sysfsutils-2.1.1-10.el9.x86_64.rpm
9cd1061690ea2e3a9de39b71a0eded891d0e507078ec4b6cde768315f94d997b
RLBA-2022:4039
new packages: polkit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for polkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
polkit-devel-0.117-10.el9_0.i686.rpm
383b75374020d5c8bf6f080911a5faa2532dfa9bb6c81d633947ae1a8e566f14
polkit-devel-0.117-10.el9_0.x86_64.rpm
d3dc2e8d81b8586d2d4b68ca95d73ed3fad8c01239572f8d121eca84f4a7f5d8
polkit-docs-0.117-10.el9_0.noarch.rpm
3a5c83e3d08befb5d41a078ee28c777881f4067f6e85264a307e1c4b44e21aee
RLBA-2022:4040
new packages: libcap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcap-devel-2.48-8.el9.i686.rpm
0a075cc82b171e68fe5d5b1584f63c57ba7e3dca91e7e31ee0c93e3b51ca0ef7
libcap-devel-2.48-8.el9.x86_64.rpm
5d066c25c05f9075e7c763954866165e46f0a239cc0f1016a083b407ef28ee68
RLBA-2022:4049
new packages: cyrus-sasl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-sasl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cyrus-sasl-2.1.27-20.el9.i686.rpm
eedec6699b4a87940eb27e13cf5bca837b15e073b0788829a856a2331e678a0c
cyrus-sasl-devel-2.1.27-20.el9.i686.rpm
10c3248b56b1ac3d38db1e3bd17cd9a2d16aeae2a8e82588261d47b84fb185a8
cyrus-sasl-devel-2.1.27-20.el9.x86_64.rpm
5a8440c999fb6e405a29785458fa646f1902d2a8545c8d61bb9b14370f9f2a2b
cyrus-sasl-gs2-2.1.27-20.el9.i686.rpm
49dea261834af58a68b3e82430eb93190d7826b03eae92ecb24a8957adde0ae7
cyrus-sasl-gs2-2.1.27-20.el9.x86_64.rpm
5f238d01f48a594277543e887f9c1c301730bbe880e8c6fccf8819ab2111313b
cyrus-sasl-ldap-2.1.27-20.el9.i686.rpm
b746d31320349dcd467205e1fa2e98ddf62d3235200593c017d9bf3c15ffdf3f
cyrus-sasl-ldap-2.1.27-20.el9.x86_64.rpm
06a011c6de8eb68bd9ce70060ebf6c8b388b79502f37ff2e9696b7d24e32ed81
cyrus-sasl-ntlm-2.1.27-20.el9.x86_64.rpm
dd155c50d07d3819f4f061efd58857df832baf536278bcb5d737f96e86b8213d
cyrus-sasl-md5-2.1.27-20.el9.i686.rpm
25e561bc616df3ffe123b17f76c5973a66a284eab37eeb9ba471b29345bdc9eb
cyrus-sasl-md5-2.1.27-20.el9.x86_64.rpm
42bd81a06a4719ab244d9950cfc767fcd94e9470fa69db24eb682d2426b671eb
cyrus-sasl-ntlm-2.1.27-20.el9.i686.rpm
cdc34e8611c29037c1fb7a9262a7474dadada8a483155d2a1617b16f45e02b8f
cyrus-sasl-sql-2.1.27-20.el9.i686.rpm
aa6268bb36578bfe503bb4a3c1a99afbfef50df55800ddb8c9c869f8e82cdc8c
cyrus-sasl-sql-2.1.27-20.el9.x86_64.rpm
37c941278aa99eaeb440d6d331c1b0c2168487c7a8bc440c61ea31948324480e
RLBA-2022:4050
new packages: efivar
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for efivar.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
efivar-38-2.el9.x86_64.rpm
2e839c03faaca01ee8835b836fce605fbae26898df180335e1b4a4a841182676
RLBA-2022:4052
new packages: zstd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zstd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libzstd-devel-1.5.1-2.el9.i686.rpm
b33c2948b4410afbce53f17cd91e31e6c19b02aa55e56d18e7aa1cca152c0c68
libzstd-devel-1.5.1-2.el9.x86_64.rpm
34e5189a8b7d9dee4bf217254d8f76e0ace425f917779a1e976440f58269ddef
RLBA-2022:4058
new packages: python-requests
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests+security-2.25.1-6.el9.noarch.rpm
d172bfe1816a15e4e766bc21e11422dea8fc1cd29810cb61b69697aec377d4cd
python3-requests+socks-2.25.1-6.el9.noarch.rpm
d505149056986611de68458a3b88b7261e75366ce76f6d88333eb1e884ba205c
RLBA-2022:4061
new packages: cifs-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cifs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pam_cifscreds-6.14-1.el9.x86_64.rpm
210199b9ba33f606b7b83f22408c9813e883d2662aee9026eb4bb767fad82eea
RLBA-2022:4065
new packages: gawk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gawk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gawk-all-langpacks-5.1.0-6.el9.x86_64.rpm
6c30bc197b6bd129d814a55a107fd783377f056deab292bb3563865834513533
RLBA-2022:4068
new packages: gpgme
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gpgme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gpgmepp-1.15.1-6.el9.i686.rpm
3dbeb35df73334d7d05402aa1bce9473583ddb9c6a78641990d8138241f3eed1
gpgmepp-1.15.1-6.el9.x86_64.rpm
16fd1dca041d4c7ee76e06a3f2dc1dfcf7d6762a7ecd22d5187f1f7c78c81e46
RLBA-2022:4069
new packages: publicsuffix-list
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for publicsuffix-list.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
publicsuffix-list-20210518-3.el9.noarch.rpm
4c0910feefb71ccd2a292fc92e49a0f77e9e22e0cde2ef4d8c74a664c75c0f93
RLBA-2022:4076
new packages: usermode
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usermode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
usermode-gtk-1.114-4.el9.x86_64.rpm
65a1b5743d0412834136835eb400eebcc8db9b380a657cc9fdabb9740928777e
RLBA-2022:4077
new packages: lz4
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lz4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lz4-devel-1.9.3-5.el9.i686.rpm
e76780f346fa6d3ac47e81220c19f0e93fd3d3344549f5fbc345be1b3c0a1f79
lz4-devel-1.9.3-5.el9.x86_64.rpm
f5c1d382ad8c2f35bd0b6a973c6d6ba5b3381c0bb2ac9f60c2f1f917a692e3d5
RLBA-2022:4079
new packages: libcap-ng
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcap-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcap-ng-devel-0.8.2-7.el9.i686.rpm
3f58f98f95c7a355210ca73135689561db1c0a2caf008c97ed5f2d31d4e25679
libcap-ng-devel-0.8.2-7.el9.x86_64.rpm
f92105c304b9fd5c6eb23b7925e4fcc9fa3e7259e2f75c0684a2cf150c5e1312
libcap-ng-python3-0.8.2-7.el9.x86_64.rpm
a922e5f570adf9aa5ba03c4599df0993faaf1780150534f5224f770aaad7f1e6
RLBA-2022:4084
new packages: acl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for acl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libacl-devel-2.3.1-3.el9.i686.rpm
853fed957a66ff600ceda2e04d9e2e5bcc539b3189846f11eb468e732658bca0
libacl-devel-2.3.1-3.el9.x86_64.rpm
c946708c4375c1971de4b99a21a768b528af9abd7ee3e808dd2911299f1baf49
RLBA-2022:4088
new packages: atlas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for atlas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
atlas-devel-3.10.3-17.el9.i686.rpm
0f180b123aea7334f1f67d35f0569ee3493271c5f509b623b5f27f45b603bc6b
atlas-devel-3.10.3-17.el9.x86_64.rpm
bb7e1ffa9fd5df75804b55fe8ccb0e57a56d0f9420bfec5b2f312e1a99cc514d
RLBA-2022:4089
new packages: attr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for attr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libattr-devel-2.5.1-3.el9.i686.rpm
5e2a332c0dca69df37b66a181fe72336d929965acb419e0eaaa7ef46cfd58d99
libattr-devel-2.5.1-3.el9.x86_64.rpm
8f7feec7090619a6b265ea4d0b7c3c94912e96438f53fa97c6a55dc913d0b3c1
RLBA-2022:4091
new packages: avahi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
avahi-glib-0.8-12.el9.i686.rpm
0e7084f12873a09279f6e8978c0e69e8a9583eb3d628a89aa420ef6b6772c207
avahi-glib-0.8-12.el9.x86_64.rpm
05a41794edc799618f3be6cfc4892fa4e49a011dfce6840a36a87509456dc1fa
RLBA-2022:4097
new packages: brotli
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for brotli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
brotli-1.0.9-6.el9.i686.rpm
6e07d1422b30b1bf21d45b46c7fdb313bdf5088e4e11193c80f372f371eebec4
brotli-1.0.9-6.el9.x86_64.rpm
d147c8d7be3e36ccb810e32fc65829b174fca7ed258352ab4136b2118d383e54
brotli-devel-1.0.9-6.el9.i686.rpm
45f31796c96e13733d804d74770ffce33bbd94389a6389657f941494520c330d
brotli-devel-1.0.9-6.el9.x86_64.rpm
f1aa9ca48d6d54da1c06dbceec119e7a13a990b50da380d78f3ecc3136b323f8
python3-brotli-1.0.9-6.el9.x86_64.rpm
5ee5dcf967aed040f2c5236b51f6b6e745e1e8a3feeeb8436ffd312196d092cb
RLBA-2022:4099
new packages: bzip2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bzip2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bzip2-devel-1.0.8-8.el9.i686.rpm
48702379ff945dab1188b0d3571018925bc89c78ff5598b543f110f2f755a33c
bzip2-devel-1.0.8-8.el9.x86_64.rpm
3986a67c447cae27f863c6982fdb511ad003975e958cd56b6606edb3608e3210
RLBA-2022:4101
new packages: chkconfig
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chkconfig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ntsysv-1.20-2.el9.x86_64.rpm
a074b13ec70d70e0afb4bb5f82ce010dd957ed3348c7110442f2b072a027b868
RLBA-2022:4110
new packages: dejavu-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dejavu-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dejavu-lgc-sans-fonts-2.37-18.el9.noarch.rpm
53d2eb9de0c77556dccb6e43d06d6cffaf9b5187d82695742df5659a0665d9eb
dejavu-lgc-sans-mono-fonts-2.37-18.el9.noarch.rpm
f9f9314e994257d630ff5bde9b574cde7e7579579a77b16fb072b02a7835bc2a
dejavu-lgc-serif-fonts-2.37-18.el9.noarch.rpm
35ee3a398ca3fa855a4725a63228c006a10117b5d7b90c9b16b8a196880a0fd2
RLBA-2022:4122
new packages: freetype
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freetype.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freetype-devel-2.10.4-6.el9.i686.rpm
34442079078f80e704b80004f1ad0d0dc1e77220146f1fbf685feba6df6770ab
freetype-devel-2.10.4-6.el9.x86_64.rpm
a70bac8ad9c4dc1253b79ecfe21c96d8a48e643fb1f5ce9d138c84b433e20ab2
RLBA-2022:4123
new packages: fwupd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fwupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fwupd-plugin-flashrom-1.7.4-2.el9_0.x86_64.rpm
418edc05b4e9986cdf9f90e01c31241232c14af10bf00f1c0125b62d4ba1720a
RLBA-2022:4126
new packages: gettext
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gettext.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gettext-common-devel-0.21-7.el9.noarch.rpm
c0f131aa3b848f5b6997b52659f94c124cfc1971d94b12d287e4b316b619ef06
gettext-devel-0.21-7.el9.i686.rpm
f9508b155bfd75c0ed9e9d409daae562261f4309940ddaae3f1aad93f1f4c430
gettext-devel-0.21-7.el9.x86_64.rpm
5505ea0617e9abcad1f8ffb4c00ea3098fcec16315715de8584d77a5431f4966
RLBA-2022:4127
new packages: gmp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gmp-c++-6.2.0-10.el9.i686.rpm
e1c5e6c893e286d3b9cc7ebfc18169bd9e74e5a8f46c7cde5416eddac5bf0cee
gmp-c++-6.2.0-10.el9.x86_64.rpm
9b8a1315442ba1b544bc2a522d43fd44771a4471956f3520c3be6ba3467cf6aa
gmp-devel-6.2.0-10.el9.i686.rpm
307e7e607e4cb0fe422f6dc740ad2c4d583e3cd9efac121613e4f879e92ce7d6
gmp-devel-6.2.0-10.el9.x86_64.rpm
088450bd84c84d133c5439b35f9d4df30a0971b620d958e34d930a46b86d3d3d
RLBA-2022:4128
new packages: graphite2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for graphite2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
graphite2-devel-1.3.14-9.el9.i686.rpm
72655d066b0c05de8eb60a82e71187195c109a67d9b64f3a15d88694f1518ca4
graphite2-devel-1.3.14-9.el9.x86_64.rpm
17ea3e3cc3b81fedd2e1762eb75286de5530618b42145eac3a421232873fc409
RLBA-2022:4130
new packages: gsettings-desktop-schemas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gsettings-desktop-schemas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gsettings-desktop-schemas-40.0-4.el9.i686.rpm
0adb071be44cbc290e730c64f75067b46a09d9b6aeb4c9bd6665ac64cde75d7d
gsettings-desktop-schemas-devel-40.0-4.el9.i686.rpm
d38e472b89c1deefa03c4cad33329d179e7d406994409b21bf173c680ca13d44
gsettings-desktop-schemas-devel-40.0-4.el9.x86_64.rpm
1e80da98893bba3557998dba42a1334536cbd97751d4ac14eb07b4519a7cb508
RLBA-2022:4133
new packages: harfbuzz
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for harfbuzz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
harfbuzz-devel-2.7.4-5.el9.i686.rpm
b590bd5d776972d96c80c73149138f3c1361553a929a4c2405e75b495517724f
harfbuzz-devel-2.7.4-5.el9.x86_64.rpm
6b35ce049e2c6858ca7371bb9e6a3cc7e97b9de7f753245a289f5753827aa37b
harfbuzz-icu-2.7.4-5.el9.i686.rpm
af9cab3e056e7073a495e0c43377808cc0940a2ff3092d3ae2adf1182cab5adc
harfbuzz-icu-2.7.4-5.el9.x86_64.rpm
98b9f7a9e2a286610d5a46dc61d50b4bb8ad61768028e064c9a69433df62032b
RLBA-2022:4136
new packages: hwloc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hwloc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hwloc-devel-2.4.1-5.el9.i686.rpm
081ece85635adf581a939519a90965374ef34cef3820e927fc7855c9b5b6e43e
hwloc-devel-2.4.1-5.el9.x86_64.rpm
2c767fa817d3bb821398592db94281adcec166aa9bcf29a193a464b224850564
hwloc-gui-2.4.1-5.el9.x86_64.rpm
ae7cb9a25c86f9d0171fa690d6726f7c59dac1772a4b402302316cd6452be6c1
RLBA-2022:4137
new packages: icu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for icu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
icu-67.1-9.el9.x86_64.rpm
e3caf7726874774401126f4828b39f73d8067a9dcaa2d1568df08189604ab644
libicu-devel-67.1-9.el9.i686.rpm
85e83293a0ef9f62cd394da45435cdd52f21e87b219c38c0852ca36023710b3f
libicu-devel-67.1-9.el9.x86_64.rpm
6e84a1b2aeb8f20a1af1433f6e64a34b5df281fc068486c90a6739aaa0dad413
RLBA-2022:4146
new packages: json-glib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for json-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
json-glib-devel-1.6.6-1.el9.i686.rpm
dd8a5d4238643c675fae02941f3da0e67386b37a954d88171216d446fac806a4
json-glib-devel-1.6.6-1.el9.x86_64.rpm
0cf8e07500254e88f602677a89117d1d1151ecc221fc74823ce8884ac8dc613e
RLBA-2022:4147
new packages: keyutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keyutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
keyutils-libs-devel-1.6.1-4.el9.i686.rpm
723f7cb475df87a9cfe09348ea1961fe1c90b3889f41e50aff94eed25610e5ee
keyutils-libs-devel-1.6.1-4.el9.x86_64.rpm
c2a9a022d38a29484dadbc6411c41804b3be6e66e32f8edb6be96b96d2d50269
RLBA-2022:4150
new packages: libaio
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libaio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libaio-devel-0.3.111-13.el9.i686.rpm
41c3de05f219a97077582b20f7c74cdbd5021e59b34d0074f81c159a0e012091
libaio-devel-0.3.111-13.el9.x86_64.rpm
de69c506b7bd9db88fd96d2776ce396c8926d1489b44148dbfba92d5fc1d73ca
RLBA-2022:4156
new packages: libedit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libedit-devel-3.1-37.20210216cvs.el9.i686.rpm
257c4f1afd26c21969543104abf45593a58242d5d1cde3a2dfeefc9c962692bf
libedit-devel-3.1-37.20210216cvs.el9.x86_64.rpm
969c06e17148cffc6b4602a8ce31d44b48b2dc9f6c495453e47e607f15b4e944
RLBA-2022:4158
new packages: libevent
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libevent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libevent-devel-2.1.12-6.el9.i686.rpm
529e60f7c26e4470b471750b8dd92368e10112701bc66c48d02dec0665d4a31d
libevent-devel-2.1.12-6.el9.x86_64.rpm
29d0135870149906f72062952fb84ab97423c7eaa1c3ef7aeaa4d3599d790086
libevent-doc-2.1.12-6.el9.noarch.rpm
b5e85ca5c20132b4aa8e354a6ae80f154b66e468a4617de0872d398a557320bc
RLBA-2022:4159
new packages: libffi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libffi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libffi-devel-3.4.2-7.el9.i686.rpm
408bc68d34b8006ef407f80afd76c082700b7d720172ca3de9d6eb13e69c5300
libffi-devel-3.4.2-7.el9.x86_64.rpm
34334e854639f104a07a7a46dc93ce0a5bf69fafa3e329f3899f0c75350f1733
RLBA-2022:4162
new packages: libidn2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libidn2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idn2-2.3.0-7.el9.x86_64.rpm
040ff4b3435d8c4d22081ac68e063cfc136ddfa9bc600f3d5e2f8a9bd71d6202
libidn2-devel-2.3.0-7.el9.i686.rpm
245985daac087a8cc5066f636b4f461551193594ef8b69f726896e7d1729014d
libidn2-devel-2.3.0-7.el9.x86_64.rpm
69b96e13160cc133c146ec603aa5ba2ed520eb102f46f9ed4f7807bc6f877189
RLBA-2022:4167
new packages: libmodulemd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libmodulemd-2.13.0-2.el9.x86_64.rpm
ac936afebfeb0d4b88bd80facc137185431903962b63f500cf995a8cec785c61
RLBA-2022:4174
new packages: libpciaccess
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpciaccess.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpciaccess-devel-0.16-6.el9.i686.rpm
aa1f440707f64a57e452df3f8a6dcaf8c4dbb139bb18352d1e842a4c273cb82a
libpciaccess-devel-0.16-6.el9.x86_64.rpm
94bdaccdafebf95c387ff75fc945a0cb88594a0de94670ed56287b8e6f0d43c6
RLBA-2022:4175
new packages: libpeas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpeas-gtk-1.30.0-4.el9.i686.rpm
489d7bfc7164e5658658db3876e4e4670b1485d43fc4832c459363d7b5b8ed70
libpeas-gtk-1.30.0-4.el9.x86_64.rpm
f2acb41b3edf0c015894a7edc15a4c8dca4f5376e44f969bc4a14059613205e5
libpeas-loader-python3-1.30.0-4.el9.x86_64.rpm
0fac490793e9e48716d6f78885267ff75b058df06e8ddd71e0dfd614fa2ebadb
RLBA-2022:4177
new packages: libpng
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpng-devel-1.6.37-12.el9.i686.rpm
163dfef49c3bbbe0346750954b63200450c11e32cac0d8bfffa42eaab7b17f83
libpng-devel-1.6.37-12.el9.x86_64.rpm
e37d649f37c0add6bbda9abe9d1a85ef833d0ebf695425698d611b99e787b81c
RLBA-2022:4178
new packages: libproxy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libproxy-bin-0.4.15-35.el9.x86_64.rpm
f65d66ed9bead0368c237c8f13e67fdf42a84330b8ff043ba15a6a00a2ce81f5
libproxy-gnome-0.4.15-35.el9.x86_64.rpm
ec762072cfb2689fd427f1758bf3e26cc0615fb8ffb4b69ec7a266a9b944f98d
libproxy-webkitgtk4-0.4.15-35.el9.x86_64.rpm
755dfff3ff2a66f42ef357387dc38428d222c7170f20e446dc8cdfd461441ac9
python3-libproxy-0.4.15-35.el9.noarch.rpm
68597798a5b04c44887ba9a0687c79b9d19012c9ded9b4ee3a7c52196cbecffe
RLBA-2022:4179
new packages: libpsl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpsl-devel-0.21.1-5.el9.i686.rpm
7df7c8c0ffcdbf2d9295e65180f1e85d4bc081a96572d1223c962965756d3a3a
libpsl-devel-0.21.1-5.el9.x86_64.rpm
576fee409bb894368b3ddeb462d0d8180dbe52804f9f29df280d020800dacdf6
RLBA-2022:4180
new packages: libpwquality
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpwquality.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pwquality-1.4.4-8.el9.x86_64.rpm
deb49c4f6065e4e766f7d16d9cb364891e5c383482dbacaf7038d4857468f67f
RLBA-2022:4190
new packages: libverto
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libverto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libverto-devel-0.3.2-3.el9.i686.rpm
9ac866008f26426c6037813ccf31b0a5b6ccec1a2b1772d1af0ed92dc242adef
libverto-devel-0.3.2-3.el9.x86_64.rpm
32695a7dfc51f733feaa2c605e7685354994de1ec422efb5a19211699ee4df26
RLBA-2022:4192
new packages: libxcrypt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxcrypt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxcrypt-compat-4.4.18-3.el9.i686.rpm
4802eca3fa9e428aaaeaa58b6ea6b9c13a06e1911ddbb4c3b95c8e72b7829953
libxcrypt-compat-4.4.18-3.el9.x86_64.rpm
b4c7367dfae8a3d43b33c8bc098d77931e15df21c4cde0f3727c4e5478c37829
libxcrypt-devel-4.4.18-3.el9.i686.rpm
d4b6720500ea645cbb8a5037c665a7ad1ba259fdbe0b5b87a89bf60077e4f3d8
libxcrypt-devel-4.4.18-3.el9.x86_64.rpm
f98951be16cb84133ac14201348a202c9884f8958f908b6040fb5db12e4dba81
RLBA-2022:4204
new packages: lzo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lzo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lzo-devel-2.10-7.el9.i686.rpm
9f02f1371fba386918c3543801d7eb158a59625f83827afdcd956dc7a49d0cf6
lzo-devel-2.10-7.el9.x86_64.rpm
ff14dedc918fc41bf757ab7e55ea75bc9738ef5a47db8f13ddee0ed2acf5cbad
lzo-minilzo-2.10-7.el9.i686.rpm
6218200a2edd49f6f89d479f8357638afd536a5861772bcfa6161e6aec6571a8
lzo-minilzo-2.10-7.el9.x86_64.rpm
0ad9a41d1dbe8c3a4bc58d698cf6e4d386bc7b716b5e5fed5d5320e41d672f2a
RLBA-2022:4215
new packages: mpfr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mpfr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mpfr-devel-4.1.0-7.el9.i686.rpm
f851d487e751a4a03462b0db6f4630755c9c4b3975a2c97710022d3ff7a7212a
mpfr-devel-4.1.0-7.el9.x86_64.rpm
eea43e9b44351c15baff56704d53ebb3a198470d044996ea889309a366f058dd
RLBA-2022:4217
new packages: mtr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mtr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mtr-gtk-0.94-4.el9.x86_64.rpm
439085e0873cdba8da6b235e194bf2dd689d45ca3f4bf11038bae6654afb4435
RLBA-2022:4219
new packages: ncurses
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ncurses.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ncurses-c++-libs-6.2-8.20210508.el9.i686.rpm
0365dc00649bb26a79b07e87798ab4a1abcc03e2bccdda968fe72636cd98063a
ncurses-c++-libs-6.2-8.20210508.el9.x86_64.rpm
8112f05b88f021cd8f3dfe78cfebcf186afc31189630cbb40d695e8d4562d863
ncurses-devel-6.2-8.20210508.el9.i686.rpm
bdc0e90483a60d93dd057c675825e7059d1450255f085429a9cbf570550a9d95
ncurses-devel-6.2-8.20210508.el9.x86_64.rpm
63e3cd6be1a424be25b5e871404d52c7d605cfea919336661bb77fc6f32ba8e0
ncurses-term-6.2-8.20210508.el9.noarch.rpm
217c19dc88977c1f773fee0eaff42a6c2052770b2136f2490f3415e670a400af
RLBA-2022:4223
new packages: newt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for newt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
newt-devel-0.52.21-11.el9.i686.rpm
aea727d28dd07c381c74cfd5947ac57f903b6c13b6b33a12a35141269a6bb376
newt-devel-0.52.21-11.el9.x86_64.rpm
7fcc61f797422d886c77f45db47bbb3249ab29ea4d318e515497816aa64b6f1c
python3-newt-0.52.21-11.el9.x86_64.rpm
862b9e810decea876a98c1ed3179455d57853442d100708ef8de1343afc661f5
RLBA-2022:4234
new packages: pciutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pciutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pciutils-3.7.0-5.el9.i686.rpm
8b5c556ea438ff458082e94a36087fd5c232df06e7a20e01aaed4bcb6c03b6b3
pciutils-devel-3.7.0-5.el9.i686.rpm
624fe3d13ff71f01e6ad67c3e6efa32a83f94080ed0915eda1d7ec85e14d0561
pciutils-devel-3.7.0-5.el9.x86_64.rpm
8f8189aa3dbbf3b7586dfe1ff3202cbbeb8c20cea379107f273148c4a792385e
RLBA-2022:4235
new packages: pcre
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcre.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcre-cpp-8.44-3.el9.3.i686.rpm
f70d9908607890bc0f12af3adba36d84b65acde59f50f9b548c78b13715f5084
pcre-cpp-8.44-3.el9.3.x86_64.rpm
c12408f0e43550f4e640ece977e1b763dcfbf7c90448ab916f4ea5b7e3540544
pcre-devel-8.44-3.el9.3.i686.rpm
070b5b27f5cd306f98e99ce0b25c57f36ed85588b1cbb1d4c8bd3627802ccb62
pcre-devel-8.44-3.el9.3.x86_64.rpm
011952dc9f39d8731f4ca1fcaa804b61f1c4616dc0fcd36c9fbc713974c224d5
pcre-utf16-8.44-3.el9.3.i686.rpm
5e11193a141f4b8c3989f0cc10ae2ced4c718785d71039211f268cb5ffcff9f7
pcre-utf16-8.44-3.el9.3.x86_64.rpm
fe2e4389e7a6080148b183b067df833a44a134f942c8e4dc16d2220da7a0d636
pcre-utf32-8.44-3.el9.3.i686.rpm
9c1760f39ed6c5914e02fca8a27d4597c3add8bc2285d78aac8f4804fc3f8d2f
pcre-utf32-8.44-3.el9.3.x86_64.rpm
1c711ec504e06c279911e0afa4893a904e77876ec7dff6bbfa40afed6045b6b4
RLBA-2022:4237
new packages: pkgconf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pkgconf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pkgconf-1.7.3-9.el9.i686.rpm
5671e332e50ec388f06236f69271439d116f6966660a78139c45ef2f36900ac1
RLBA-2022:4239
new packages: popt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for popt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
popt-devel-1.18-8.el9.i686.rpm
4b33b035aaae97485448ce63d94e0029fddbf6898212f9cd00e46b3f7f933a51
popt-devel-1.18-8.el9.x86_64.rpm
b4de7de69bea4232ab94124eac2a284137f4028eba51e91bf00a6ded180d0caf
RLBA-2022:4258
new packages: quota
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for quota.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
quota-doc-4.06-6.el9.noarch.rpm
de1ef75b66431c1e60095a048f68565d0fe05cf7fc669793e624a1fd82760688
quota-nld-4.06-6.el9.x86_64.rpm
06edf0df42f576f1b6c85b70cbed0fcf4d2eafa3654b7b8adbc0707bd2d91321
quota-rpc-4.06-6.el9.x86_64.rpm
7ea1d96674070491506802db9cec44ca05b96ebc77ee7bf69ebb58ec4d06f769
quota-warnquota-4.06-6.el9.x86_64.rpm
6d1c1a505c3b6f34978d0f863ea8f2e5745baca1b0c041fd5c4f4261a3b1179e
RLBA-2022:4259
new packages: readline
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for readline.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
readline-devel-8.1-4.el9.i686.rpm
0cb3978d70bd6dd5cab5793b25c16d2035057fb6b83dada9a7ba97f0769b6f61
readline-devel-8.1-4.el9.x86_64.rpm
3257da5d4eb475604960d2367170f9f84919ca861d8f063ca8becd64ed23b896
RLBA-2022:4268
new packages: slang
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
slang-devel-2.3.2-11.el9.i686.rpm
b465a78378e3b8ce1dab6602cc86cb6f7363431e205f0d39c36394139bcb62bf
slang-devel-2.3.2-11.el9.x86_64.rpm
8fbf158144d530cf1cd09210f0f6e9d49b0de86b159409c365f3673976eb152c
RLBA-2022:4286
new packages: x3270
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for x3270.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
x3270-x11-4.0ga14-2.el9.x86_64.rpm
b5b2c551a78e1c98af011025d71b844346c6efdd4b82cf239d07dc560a6092b1
RLEA-2022:4570
new packages: libreoffice:flatpak
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, libreoffice, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
autocorr-af-7.1.8.1-6.el9.noarch.rpm
ce6c8cfe56c662ff871191c0c476b4dfa6823ca3ac58bc3b904d977c30543316
autocorr-bg-7.1.8.1-6.el9.noarch.rpm
28fab974520eacf9d0130af30335078520fb51616cf313904eaca6e1211ff23b
autocorr-ca-7.1.8.1-6.el9.noarch.rpm
b889e9e02d5853027bd61b3f7e295bedc630368a331d0d55c061aedeae14488e
autocorr-cs-7.1.8.1-6.el9.noarch.rpm
1b725a63b3f5fa4260a951bd63e01c85e38075697b522e4a1563f5a6a8525358
autocorr-da-7.1.8.1-6.el9.noarch.rpm
aeaa8ce31a842666d12eda8a63f645d600e8652ca21f187c55ece831911d73e9
autocorr-de-7.1.8.1-6.el9.noarch.rpm
1ac5c3b48f94c8b97de1177a068586d0dab742786557b05aa790999be7a1708c
autocorr-dsb-7.1.8.1-6.el9.noarch.rpm
43b54401851942f774d923d607ee6b92ce40e00bdc1051998686d8f352682f57
autocorr-el-7.1.8.1-6.el9.noarch.rpm
900d00fded7e50386e958bb396b4be2e7c29ce78b383a4939718bbd80d9e9f62
autocorr-en-7.1.8.1-6.el9.noarch.rpm
b3c03d814f6e3edf030d439a1cd3980c7e53566b43a90c2df7256cfaf91c2611
autocorr-es-7.1.8.1-6.el9.noarch.rpm
f1b3fd91f1064175699d7e398ae4f21c172ac45515b443903bec44249f29fbfa
autocorr-fa-7.1.8.1-6.el9.noarch.rpm
0eb87f687c4e0585f2d482acbd714a487056db80ac59fa38311e8712ed012a11
autocorr-fi-7.1.8.1-6.el9.noarch.rpm
4504fc8d0eec2047273b5ebf412d560de62f969aab5c67121ad4dad14057e5ac
autocorr-fr-7.1.8.1-6.el9.noarch.rpm
7aab41753920e827cc4832f78cd7905f32b6a9cfe81c8fa89c4277d44e1a7f58
autocorr-ga-7.1.8.1-6.el9.noarch.rpm
b5077af0f4d902fdbd6a6008cc2eeaf5592692c7175cb6c9227fd128fca4925e
autocorr-hr-7.1.8.1-6.el9.noarch.rpm
52c8d2ad1cc9842297e1a93acb9b1066dd0402f1d099ea530af4b07e01971020
autocorr-hsb-7.1.8.1-6.el9.noarch.rpm
c07c724703f2cd035bf9a1b839fbcd0fec273b4f21b347b4e878abe1e1d706af
autocorr-hu-7.1.8.1-6.el9.noarch.rpm
d40741030523e38dff12d89a10fdc64a5132dbe0e1683047406bfa2e4bbd9b55
autocorr-is-7.1.8.1-6.el9.noarch.rpm
1ee2f74d722a494cad6d435aade3825268f70ee256d035cab287102e75b9ac5c
autocorr-it-7.1.8.1-6.el9.noarch.rpm
a15599e5f11db53fbc6ace60202b298c03ef6424363d7baa5681f6b047b9bc4a
autocorr-ja-7.1.8.1-6.el9.noarch.rpm
29547f61deff86c925ad72f843b67ca6d1eb040de9f73f3a210facb5c96f3e95
autocorr-ko-7.1.8.1-6.el9.noarch.rpm
e159b5ec70c8118e87045dda6645a5897dcd5735149d4d291b612cf3fafbd0d5
autocorr-lb-7.1.8.1-6.el9.noarch.rpm
524ce66158c00417e70ba19446da5cfa6d7e1892f29d80ac47da207e44a7c87c
autocorr-lt-7.1.8.1-6.el9.noarch.rpm
87bfe485c58614f76bcb8a20f7d286cf0afae4cc29827489ecde479f190a3d4d
autocorr-mn-7.1.8.1-6.el9.noarch.rpm
db036528d533236eb2aa3950411aa3131a9ca25bf5fa84a978a835789c44629f
autocorr-nl-7.1.8.1-6.el9.noarch.rpm
daca88d9841c620164f31c68fcd3ebe4c37687bb623b25ab8e6841140e43f87a
autocorr-pl-7.1.8.1-6.el9.noarch.rpm
1bfb188c4a25ff488cb548972a8e0053688172317bba5095865edfef3cab33e4
autocorr-pt-7.1.8.1-6.el9.noarch.rpm
bb1115db8698f28f6d38193b72577db144bf297f2da6175dfeb12f92c4034eb6
autocorr-ro-7.1.8.1-6.el9.noarch.rpm
7b50841787247cc293b4f00308e946484d9e59ad71a2fd27693c818c7b3c9a82
autocorr-ru-7.1.8.1-6.el9.noarch.rpm
9af6af92a8f32328d8447fe48de4e4d13bb303fa41b232f4caa3906b8d5128bd
autocorr-sk-7.1.8.1-6.el9.noarch.rpm
3f99a962dc8bc96871740e05d381d3d3dba1e20d3327a312f123627dd74f3b63
autocorr-sl-7.1.8.1-6.el9.noarch.rpm
c542950738c2c8daa577d76c6221f59ff0832afadd3144d4665721262d7e108a
autocorr-sr-7.1.8.1-6.el9.noarch.rpm
0e259d47e12c980e44e37c6650568dc6075fa542dbbe3f001373b7ba6ba66770
autocorr-sv-7.1.8.1-6.el9.noarch.rpm
d45ba6db0215cce8f1014c64d6beda6284a34c9bd23ebf5f9e90357afb8a8b75
autocorr-tr-7.1.8.1-6.el9.noarch.rpm
16bbdc62d5e1377c4572d6bb113223cad4300bda44c0e9abbb9b9a44d81437fb
autocorr-vi-7.1.8.1-6.el9.noarch.rpm
c4e88e37bbb1c11ad934ab4b0ab3173225f7ae74ca7cbbc9e985bc0b8af419d4
autocorr-vro-7.1.8.1-6.el9.noarch.rpm
5355d79794575a6d1b616f1281bb3586ab47a9299e54e26c16b950029f136fb6
autocorr-zh-7.1.8.1-6.el9.noarch.rpm
3ddf6101b213b342dadf290dda051310f37698a9519f6090043c0c796ecda969
bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm
4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad
boost-1.75.0-6.el9.x86_64.rpm
c980fd99d6755fa033e45454fbe8111b00ac00fdc437eb4e071aa92a43fa3098
boost-atomic-1.75.0-6.el9.x86_64.rpm
4372ac3d5a355c212358b9345d90ddaad6896bac8cdb9234e934247031f740c4
boost-chrono-1.75.0-6.el9.x86_64.rpm
2c26ea8079bda4a745cbad97ee87b2882a03297d0b01266fc06494c3a4876a8a
boost-container-1.75.0-6.el9.x86_64.rpm
bb7d7f527256fe4c8d93ae80d47d7a793309177e2eb3e52741e299c802bcef72
boost-context-1.75.0-6.el9.x86_64.rpm
e0bcc5077175e2d7077c20866e9c8b065c08d1f55788c4c32de21a5e3262b6f5
boost-contract-1.75.0-6.el9.x86_64.rpm
21b24563f15737dbb5497ca5e572de9c51483c90ae11963a5cd4b8ea0af68587
boost-coroutine-1.75.0-6.el9.x86_64.rpm
12012fe3b323dab4f683f503e08fca1193bee9cf5ad6fcc9924d5d028c6dae6d
boost-date-time-1.75.0-6.el9.x86_64.rpm
18ddbc20be8652d959ce5d1f06d0c645b75c34c09bb8aba7a9b6bb32c2fd1bc1
boost-devel-1.75.0-6.el9.x86_64.rpm
b14adc76c98872dedcd96cfccad972a6fe5a9c5db334ee9267e2090063251715
boost-fiber-1.75.0-6.el9.x86_64.rpm
b0878675b810a788a1c34c07d49c8bbe49b7c0d1d02f5288643d7c4305f3c491
boost-filesystem-1.75.0-6.el9.x86_64.rpm
4fe4177f0f3f2bd3bf50c3161056823f57788ac9186ba50099df8019f9ebdf3a
boost-graph-1.75.0-6.el9.x86_64.rpm
7f28d3b2cc3f7c66e3a37111324bfb877ce42fcdd08ae0e87b0ef3c33d75496b
boost-iostreams-1.75.0-6.el9.x86_64.rpm
8e9d08ce0594d78c8e6eefc6b6de258250273b5dcede7e199b8a9c7ac3fe0fb0
boost-json-1.75.0-6.el9.x86_64.rpm
d67e8476feef99fa5ee178784ed8418f411836f4ed9e8badbf3390a8f9ecaa79
boost-locale-1.75.0-6.el9.x86_64.rpm
8f1f9467ddc9f49321e645acd6c31b4eb930bead9bd78420afa7352c61b90b8a
boost-log-1.75.0-6.el9.x86_64.rpm
1212dd390ddaf727e2faeb3b145ab59db1ee57832310665b578daf42434784f7
boost-math-1.75.0-6.el9.x86_64.rpm
d336f6077834cade56425cc9f04909d8d82bcd0d77d74f47b38301fa121000e7
boost-nowide-1.75.0-6.el9.x86_64.rpm
312db07b99e0ad39438e54e111005c478abdedb21ed564d1cc206164c43b27f1
boost-numpy3-1.75.0-6.el9.x86_64.rpm
a832772d13a38a30ea84b1d7cfb57dc5ec33fb0dc6edcdca6c26a22c81fe0c75
boost-program-options-1.75.0-6.el9.x86_64.rpm
df80db04ccfd08c74981997300540572feb9d79f0affa0b69db4f6a632c56c80
boost-python3-1.75.0-6.el9.x86_64.rpm
dbe9985e8e7433d20e7e57fc1a77d0c17501a98b7ee1c0e76a0667a89c42b7ee
boost-random-1.75.0-6.el9.x86_64.rpm
99aad0758f7f84eb8e009eba615ad162d5e7e7af1095fedeebb81cb5ebea117c
boost-regex-1.75.0-6.el9.x86_64.rpm
f58b5ae42ff2300ee3679819d77d65cacf838a25661e37e9768e769e7188ac18
boost-serialization-1.75.0-6.el9.x86_64.rpm
5adea712f121e760b4ec9e2ef335083adb2ef9d12331dc0b6a2283986d0fb903
boost-stacktrace-1.75.0-6.el9.x86_64.rpm
5ae12107e09f9633df90a93a993365ba0c34203f1d859e1b1445063584e5198a
boost-system-1.75.0-6.el9.x86_64.rpm
032af5ac0b10bd82ac1333fa9f3d22757d8bb3979526e65c82049a084eddce66
boost-test-1.75.0-6.el9.x86_64.rpm
b0934c46c347f905ef9d26cd00febc3b91b1e2b680915d06fe144ccc1d8b494f
boost-thread-1.75.0-6.el9.x86_64.rpm
89a7082a9cff82d5c258e52f50147b3a4b420e4309973f64c7d8a3b776ae0ddf
boost-timer-1.75.0-6.el9.x86_64.rpm
4950d0ac1601c6b6734048c892c66771bfb841b5cfe6beb9809d9f44858367e2
boost-type_erasure-1.75.0-6.el9.x86_64.rpm
0d0a34110e0f172c1d127c23daa2f90520f092437d98f1a7e7dc7d5cb5112d2e
boost-wave-1.75.0-6.el9.x86_64.rpm
f4b0508f404566a66345dd49ea2cec48221aa23cf2b75e5ea55b502fb6c9701f
Box2D-2.4.1-7.el9.x86_64.rpm
20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567
clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm
37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836
clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm
cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c
dconf-0.40.0-6.el9.x86_64.rpm
094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f
flute-1.3.0-27.OOo31.el9.noarch.rpm
59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308
google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm
e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4
google-noto-fonts-common-20201206-3.el9.noarch.rpm
a8bfb90be7ea0f2612987cba93ff5852aad702a58294bfc625a1ef60504c64c8
google-noto-sans-armenian-fonts-20201206-3.el9.noarch.rpm
a1e9e24034a98e9389e29d2591e69543b47a52e44de70ce611112e9969a2c313
google-noto-sans-avestan-fonts-20201206-3.el9.noarch.rpm
e4be3b09dccada97318a64eb389f012000bd34b709e3bb411987f6ccf9d6809d
google-noto-sans-bengali-fonts-20201206-3.el9.noarch.rpm
0e953e28bb61285dbd891243d5f980a041f5f71aa1e46a18cf4531d4b4f702b3
google-noto-sans-bengali-ui-fonts-20201206-3.el9.noarch.rpm
5e743aae45dd1c43f41c1b43a8c37ddd12c02e41a53131b5f5821acc95d659d8
google-noto-sans-brahmi-fonts-20201206-3.el9.noarch.rpm
1bbca7fdac53c6b5dd939861b45acc50f7b8f6fb34f43dc4311dec232e422098
google-noto-sans-carian-fonts-20201206-3.el9.noarch.rpm
ae0817cd06e41eb6b182ba6f333e219318072cea66c5cecb9239c78837dedbc7
google-noto-sans-cherokee-fonts-20201206-3.el9.noarch.rpm
ce89d4d0e275de48af732082a3cb86c2c31d4a25f337b74310ba6d06c2965275
google-noto-sans-coptic-fonts-20201206-3.el9.noarch.rpm
915df0c4645a4a867a0d257ff79f3ecacd396465cfd1ef7854819ef79b28c5de
google-noto-sans-deseret-fonts-20201206-3.el9.noarch.rpm
0e0108d974f556c848033c27eec5c49cb426c4dc3e310642030fb26139c41466
google-noto-sans-devanagari-fonts-20201206-3.el9.noarch.rpm
7305c8e243de0bf2eb56b3a1385efb8464cc691dca0b21833841f614a00d5d38
google-noto-sans-devanagari-ui-fonts-20201206-3.el9.noarch.rpm
ec83d97316b4d9817a248a1219e172f3c9faf389e8f0e8eaaf8123dfa3e29660
google-noto-sans-egyptian-hieroglyphs-fonts-20201206-3.el9.noarch.rpm
c3e2763c9c403b0e79746efc4dc33ea57c27b1dec4acf0a7e6403a2cbe7b40fe
google-noto-sans-ethiopic-fonts-20201206-3.el9.noarch.rpm
546d7fe7463d0648d93468508ff21ccf24b7ae84345801a76f7d4fcfe744be07
google-noto-sans-fonts-20201206-3.el9.noarch.rpm
ae9f99e70fc15fb601ab08fff4297c8cd6455fa7645702115122a63289ded908
google-noto-sans-georgian-fonts-20201206-3.el9.noarch.rpm
a5a354ac019d2fdfee9d937fd68858f13bc4d6e69336942a7e5e0aab2c74db44
google-noto-sans-glagolitic-fonts-20201206-3.el9.noarch.rpm
df4914f52bdbf8728408894af9e17354ad342441f422b2f5c80f7349d9e1f88e
google-noto-sans-gujarati-fonts-20201206-3.el9.noarch.rpm
2fdcfebbd955cf0bfa65253ac364471e75f61276d384906247460df6d8eed1c0
google-noto-sans-gujarati-ui-fonts-20201206-3.el9.noarch.rpm
0e6b4e2eb28ac886eaf311fca7886115ad6c97e4810360664c8a5cc237d7d839
google-noto-sans-gurmukhi-fonts-20201206-3.el9.noarch.rpm
6ff96e2a6ba9c64b5784cf3cb973aba36f686551a46e7cc87ffb055475cd7bd0
google-noto-sans-hebrew-fonts-20201206-3.el9.noarch.rpm
48f2448c34b9b89ca6aebec68de557dcb0d8a66ecc26315a48549a8ac3d4234e
google-noto-sans-imperial-aramaic-fonts-20201206-3.el9.noarch.rpm
cb129b006c95141da79db043dbe8a94d9adb5370e50c6dd81657fe092011184f
google-noto-sans-kaithi-fonts-20201206-3.el9.noarch.rpm
1a49de7f49b147618e999c002c4ddb90de7c1a2d04f863b152736764876e6865
google-noto-sans-kannada-fonts-20201206-3.el9.noarch.rpm
d09f2cca441def1c7191f72f09641b11549dadc9b91790c38a27730ebaeb9a5c
google-noto-sans-kannada-ui-fonts-20201206-3.el9.noarch.rpm
9cb1090e24906794744b8fbd61085cbb15f4bad5402d107edfb66a7ee14c6e81
google-noto-sans-kayah-li-fonts-20201206-3.el9.noarch.rpm
d15e6ddb5dddfca706282a102d6a2c6f783845498c228074b79f6d48607a44cf
google-noto-sans-kharoshthi-fonts-20201206-3.el9.noarch.rpm
e6eec1c838bec1a16c8741c94561fac58196c1f5b8855bf6c822bb8cfb543743
google-noto-sans-khmer-fonts-20201206-3.el9.noarch.rpm
4e376d907081e1492838ecbd77dc7db6fc93fbfbeefb61be3426578c8d247680
google-noto-sans-khmer-ui-fonts-20201206-3.el9.noarch.rpm
39693e6301bbcb50bdf0205f3f012448c1108abca4621629865b58e55ee10278
google-noto-sans-lao-fonts-20201206-3.el9.noarch.rpm
6811b3f83f25db4b8b3b8b016b81e859baa03a21af9d87a6713a769b33f522d8
google-noto-sans-lao-ui-fonts-20201206-3.el9.noarch.rpm
d838265869cf8c907b1eaff6f0c84911220259b01e0f5801dafcfe5deddd68c4
google-noto-sans-lycian-fonts-20201206-3.el9.noarch.rpm
76f326ffea0bb5ca8789d08f9b4b47c70c5d627b18864fe6124a87a1b1fbc0c0
google-noto-sans-lydian-fonts-20201206-3.el9.noarch.rpm
db3d946ebb39d58c56642d7dd95431109e805adbb653edc8d648ffe309ece517
google-noto-sans-malayalam-fonts-20201206-3.el9.noarch.rpm
5ca53d6023225c51964a9ffdd91e82f1368b6e483a0a1e95dc7040bb5c707254
google-noto-sans-malayalam-ui-fonts-20201206-3.el9.noarch.rpm
5a7e8ca26caa958ff76b5e2c45b1aee17e14a227f99c111510dd3fdd2b40761a
google-noto-sans-mono-fonts-20201206-3.el9.noarch.rpm
59620b099a0c697039e30d078109305bfd693471f98f1277acda6e6bb3fa43d1
google-noto-sans-nko-fonts-20201206-3.el9.noarch.rpm
ea4de34806aaa6e42ae581ca812d69cb00b9f66eadd1debbc4ea824683ee2f2f
google-noto-sans-old-south-arabian-fonts-20201206-3.el9.noarch.rpm
54c9834c3ff8ab8ac7d6815f65786da0df1cf6e87a1fbcfef8c016a9f8fce7ca
google-noto-sans-old-turkic-fonts-20201206-3.el9.noarch.rpm
c1655e72c7bd03c7d5217c527c485cc3854a596df83f3859e08e0a1786b891a3
google-noto-sans-osmanya-fonts-20201206-3.el9.noarch.rpm
64de7cf019a1a3847c0d9b6c3e3405216848875e07c936efaa5a026c7556132e
google-noto-sans-phoenician-fonts-20201206-3.el9.noarch.rpm
1cc279f4df79d26b8bca443bfab6278cdf8c7e48f47232cb9d93650508742e59
google-noto-sans-shavian-fonts-20201206-3.el9.noarch.rpm
158a4b65483866ab052b0e9b2e0ec395f5f2f57d6e9d82513b511426392fba1b
google-noto-sans-sinhala-fonts-20201206-3.el9.noarch.rpm
dcf0b96e190fedb11c7562ad122e270ec5e20f549cb1f046477022db037eb172
google-noto-sans-sinhala-vf-fonts-20201206-3.el9.noarch.rpm
d16d66225be0e0d43bace67f09a282d9abe7ee73bbb4c7d645029ead12d15779
google-noto-sans-symbols-fonts-20201206-3.el9.noarch.rpm
3b41a01546208a27d619fa2d6d111e0c696f39a1af9ebffa1aee849b3a8b12d8
google-noto-sans-tamil-fonts-20201206-3.el9.noarch.rpm
00c802ecc667f1d3cff4c72fdd33fee15b4c730830eba3f6697046ef3e78b843
google-noto-sans-tamil-ui-fonts-20201206-3.el9.noarch.rpm
f03a2b22d6a059ad493706a65d198ccd68aaa6c8b4013236e526087cc2a21ef3
google-noto-sans-telugu-fonts-20201206-3.el9.noarch.rpm
4e04909028d4254b90effa51545bbd001e43a0246b0dbf0ec73eb194a96d7306
google-noto-sans-telugu-ui-fonts-20201206-3.el9.noarch.rpm
3f7fc630fdd79d6710d462307cb89e77ba4a6afde81eaa6499395d4f270c0e24
google-noto-sans-thaana-fonts-20201206-3.el9.noarch.rpm
70b6dbf450d75ac6b505b1b651c0ec77fd284a15f8038fbdae0c42b3ccd99848
google-noto-sans-thai-fonts-20201206-3.el9.noarch.rpm
0c42d390c523272b0794ff561db4b6502a10fa279827ffd1912118410f4ad3a1
google-noto-sans-thai-ui-fonts-20201206-3.el9.noarch.rpm
6ae75a4ffd514b0aa88e2c950644372e92b5ab042aa8979395d63427521f841c
google-noto-sans-ugaritic-fonts-20201206-3.el9.noarch.rpm
c77d845a91bba11e1c04a46064efb4cc3673564c39c8dd00c13131298f981246
google-noto-sans-vai-fonts-20201206-3.el9.noarch.rpm
c32d420f22fa1b0eaac7e1ec38d19db34591e91cb259f70a2aca8f1f2a193e4f
google-noto-serif-armenian-fonts-20201206-3.el9.noarch.rpm
455d5825330efcdde8a3ad3450b746b92bfab9b237747dc8fffb662ab7af906b
google-noto-serif-fonts-20201206-3.el9.noarch.rpm
8f79012f90202c5120c1a180a0ef598ed1a184ca56b60491f39b5ed93a606fd2
google-noto-serif-georgian-fonts-20201206-3.el9.noarch.rpm
20f968c426daa7ccf39b76482a79644e0941130d1d965b5f3c9563bdcce2efa7
google-noto-serif-gurmukhi-vf-fonts-20201206-3.el9.noarch.rpm
58c87658ae6c10c1c3db79715bebf6a2b813cb8ee7d3c2cb50cfd3f0454758c2
google-noto-serif-khmer-fonts-20201206-3.el9.noarch.rpm
ee107e896b0741e3b661e8d7ad192cb9f0340eee6e780d0472de66b2799e7d6a
google-noto-serif-lao-fonts-20201206-3.el9.noarch.rpm
24505c5f02d48d18f13933899386b9abbbcb4bb51a6024ad8509ee2705da1eff
google-noto-serif-sinhala-vf-fonts-20201206-3.el9.noarch.rpm
2889d33838eff3bffd3b586b4bafa72828aa8c94782d1f72b0b2168d1cdea59e
google-noto-serif-thai-fonts-20201206-3.el9.noarch.rpm
ada2ee6b36ce8e76f50eec3e3d655ddd0396b8ee77b7d8a65b3fcdd7a0463b12
gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm
0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4
gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm
d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457
gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm
ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1
gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm
1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13
hunspell-af-0.20080825-24.el9.noarch.rpm
af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c
hunspell-ar-3.5-15.el9.noarch.rpm
c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0
hunspell-as-1.0.3-25.el9.noarch.rpm
72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48
hunspell-bg-4.3-22.el9.noarch.rpm
3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793
hunspell-bn-1.0.0-17.el9.noarch.rpm
7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e
hunspell-br-0.15-9.el9.noarch.rpm
ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3
hunspell-ca-2.3-19.el9.noarch.rpm
98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d
hunspell-cs-20080822-16.el9.noarch.rpm
d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784
hunspell-cy-0.20040425-26.el9.noarch.rpm
6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469
hunspell-da-1.7.42-17.el9.noarch.rpm
396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d
hunspell-de-0.20161207-9.el9.noarch.rpm
3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495
hunspell-el-0.9-9.el9.noarch.rpm
3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395
hunspell-es-2.3-10.el9.noarch.rpm
0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713
hunspell-es-AR-2.3-10.el9.noarch.rpm
257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2
hunspell-es-BO-2.3-10.el9.noarch.rpm
ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de
hunspell-es-CL-2.3-10.el9.noarch.rpm
715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb
hunspell-es-CO-2.3-10.el9.noarch.rpm
1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446
hunspell-es-CR-2.3-10.el9.noarch.rpm
1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4
hunspell-es-CU-2.3-10.el9.noarch.rpm
3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5
hunspell-es-DO-2.3-10.el9.noarch.rpm
8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310
hunspell-es-EC-2.3-10.el9.noarch.rpm
0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5
hunspell-es-ES-2.3-10.el9.noarch.rpm
0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4
hunspell-es-GT-2.3-10.el9.noarch.rpm
5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d
hunspell-es-HN-2.3-10.el9.noarch.rpm
c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81
hunspell-es-MX-2.3-10.el9.noarch.rpm
6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0
hunspell-es-NI-2.3-10.el9.noarch.rpm
76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6
hunspell-es-PA-2.3-10.el9.noarch.rpm
64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68
hunspell-es-PE-2.3-10.el9.noarch.rpm
1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c
hunspell-es-PR-2.3-10.el9.noarch.rpm
ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d
hunspell-es-PY-2.3-10.el9.noarch.rpm
b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0
hunspell-es-SV-2.3-10.el9.noarch.rpm
6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd
hunspell-es-US-2.3-10.el9.noarch.rpm
128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550
hunspell-es-UY-2.3-10.el9.noarch.rpm
a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73
hunspell-es-VE-2.3-10.el9.noarch.rpm
d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8
hunspell-et-0.20030606-27.el9.noarch.rpm
801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90
hunspell-eu-5.1-4.el9.noarch.rpm
537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38
hunspell-fa-0.20070116-26.el9.noarch.rpm
4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c
hunspell-fr-6.2-9.el9.noarch.rpm
c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496
hunspell-ga-5.0-10.el9.noarch.rpm
5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73
hunspell-gl-0.20080515-24.el9.noarch.rpm
21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28
hunspell-gu-1.0.0-17.el9.noarch.rpm
66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154
hunspell-he-1.4-15.el9.x86_64.rpm
8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45
hunspell-hi-1.0.0-17.el9.noarch.rpm
bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507
hunspell-hr-0.20040608-25.el9.noarch.rpm
63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275
hunspell-hu-1.6.1-21.el9.noarch.rpm
ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca
hunspell-id-0.20040812-24.el9.noarch.rpm
436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7
hunspell-it-2.4-0.25.20070901.el9.noarch.rpm
c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f
hunspell-kk-1.1-22.el9.noarch.rpm
c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417
hunspell-kn-1.0.3-24.el9.noarch.rpm
57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab
hunspell-ko-0.7.0-12.el9.noarch.rpm
70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412
hunspell-lt-1.2.1-26.el9.noarch.rpm
1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5
hunspell-lv-1.0.0-15.el9.noarch.rpm
f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f
hunspell-ml-0.1-26.el9.noarch.rpm
775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff
hunspell-mr-1.0.0-17.el9.noarch.rpm
91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650
hunspell-nb-2.0.10-15.el9.noarch.rpm
2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae
hunspell-nl-2.20.19-5.el9.noarch.rpm
e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7
hunspell-nn-2.0.10-15.el9.noarch.rpm
b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30
hunspell-nr-0.20091030-22.el9.noarch.rpm
1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16
hunspell-nso-0.20091201-22.el9.noarch.rpm
bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005
hunspell-or-1.0.0-17.el9.noarch.rpm
a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f
hunspell-pa-1.0.0-17.el9.noarch.rpm
a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b
hunspell-pl-0.20180707-9.el9.noarch.rpm
bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3
hunspell-pt-0.20130125-18.el9.noarch.rpm
80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b
hunspell-ro-3.3.7-20.el9.noarch.rpm
cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f
hunspell-ru-0.99g5-21.el9.noarch.rpm
8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4
hunspell-si-0.2.1-24.el9.noarch.rpm
1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783
hunspell-sk-0.20110228-20.el9.noarch.rpm
0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71
hunspell-sl-0.20070127-26.el9.noarch.rpm
29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd
hunspell-sr-0.20130330-18.el9.noarch.rpm
1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e
hunspell-ss-0.20091030-22.el9.noarch.rpm
f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06
hunspell-st-0.20091030-22.el9.noarch.rpm
19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858
hunspell-sv-2.28-16.el9.noarch.rpm
e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe
hunspell-ta-1.0.0-17.el9.noarch.rpm
328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764
hunspell-te-1.0.0-17.el9.noarch.rpm
f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69
hunspell-th-0.20061212-25.el9.noarch.rpm
400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38
hunspell-tn-0.20150904-9.el9.noarch.rpm
34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8
hunspell-ts-0.20110323.1-9.el9.noarch.rpm
d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3
hunspell-uk-1.8.0-9.el9.noarch.rpm
48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f
hunspell-ve-0.20091030-22.el9.noarch.rpm
98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852
hunspell-xh-0.20091030-22.el9.noarch.rpm
f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf
hunspell-zu-0.20100126-24.el9.noarch.rpm
c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc
hyphen-2.8.8-17.el9.x86_64.rpm
6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994
hyphen-af-0-0.25.20080714svn.el9.noarch.rpm
6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c
hyphen-as-0.7.0-19.el9.noarch.rpm
62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7
hyphen-bg-4.3-21.el9.noarch.rpm
d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67
hyphen-bn-0.7.0-19.el9.noarch.rpm
ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed
hyphen-ca-0.9.3-22.el9.noarch.rpm
6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b
hyphen-cs-20080822-16.el9.noarch.rpm
18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a
hyphen-cy-0.20110620-20.el9.noarch.rpm
21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0
hyphen-da-0.20070903-25.el9.noarch.rpm
3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6
hyphen-de-0.20060120-27.el9.noarch.rpm
215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66
hyphen-devel-2.8.8-17.el9.x86_64.rpm
c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d
hyphen-el-0.20051018-25.el9.noarch.rpm
ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5
hyphen-en-2.8.8-17.el9.noarch.rpm
17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49
hyphen-es-2.3-11.el9.noarch.rpm
1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218
hyphen-et-0.20030606-27.el9.noarch.rpm
4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab
hyphen-eu-0.20190406-2.el9.noarch.rpm
cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2
hyphen-fa-0.20130404-17.el9.noarch.rpm
974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24
hyphen-fr-3.0-10.el9.noarch.rpm
ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28
hyphen-ga-0.20040220-24.el9.noarch.rpm
e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc
hyphen-gl-0.99-23.el9.noarch.rpm
7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1
hyphen-gu-0.7.0-19.el9.noarch.rpm
1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6
hyphen-hi-0.7.0-19.el9.noarch.rpm
531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5
hyphen-hr-0.20040608-25.el9.noarch.rpm
c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f
hyphen-hu-0.20090612-27.el9.noarch.rpm
4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b
hyphen-id-0.20040812-24.el9.noarch.rpm
a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6
hyphen-it-0.20071127-26.el9.noarch.rpm
201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9
hyphen-kn-0.7.0-19.el9.noarch.rpm
084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41
hyphen-lt-0.20100531-21.el9.noarch.rpm
2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3
hyphen-lv-1.0.0-15.el9.noarch.rpm
3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa
hyphen-ml-0.7.0-19.el9.noarch.rpm
963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038
hyphen-mr-0.7.0-19.el9.noarch.rpm
99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0
hyphen-nb-2.0.10-15.el9.noarch.rpm
fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5
hyphen-nl-0.20050617-26.el9.noarch.rpm
4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f
hyphen-nn-2.0.10-15.el9.noarch.rpm
1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55
hyphen-or-0.7.0-20.el9.noarch.rpm
8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d
hyphen-pa-0.7.0-19.el9.noarch.rpm
15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91
hyphen-pl-0.20060726-25.el9.noarch.rpm
d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef
hyphen-pt-0.20021021-25.el9.noarch.rpm
0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a
hyphen-ro-3.3.6-21.el9.noarch.rpm
d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e
hyphen-ru-0.20200325-4.el9.noarch.rpm
ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6
hyphen-sk-0.20031227-26.el9.noarch.rpm
7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34
hyphen-sl-0.20070127-24.el9.noarch.rpm
9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a
hyphen-sr-0.20130330-18.el9.noarch.rpm
441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43
hyphen-sv-1.00.1-26.el9.noarch.rpm
ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94
hyphen-ta-0.7.0-19.el9.noarch.rpm
2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66
hyphen-te-0.7.0-19.el9.noarch.rpm
78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df
hyphen-uk-0.20030903-24.el9.noarch.rpm
c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7
hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm
04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603
javapackages-filesystem-6.0.0-3.el9.noarch.rpm
b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3
javapackages-tools-6.0.0-3.el9.noarch.rpm
bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181
libabw-0.1.3-7.el9.x86_64.rpm
57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09
libbase-1.1.3-31.el9.noarch.rpm
0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738
libcdr-0.1.7-3.el9.x86_64.rpm
416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22
libcmis-0.5.2-12.el9.x86_64.rpm
a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76
libepubgen-0.1.1-9.el9.x86_64.rpm
cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398
libetonyek-0.1.10-2.el9.x86_64.rpm
a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806
libexttextcat-3.4.5-11.el9.x86_64.rpm
693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245
libfontenc-1.1.3-17.el9.x86_64.rpm
867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23
libfonts-1.1.3-35.el9.noarch.rpm
6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081
libformula-1.1.3-32.el9.noarch.rpm
bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b
libfreehand-0.1.2-11.el9.x86_64.rpm
443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d
liblayout-0.2.10-25.el9.noarch.rpm
15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291
libloader-1.1.3-32.el9.noarch.rpm
76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1
libmspub-0.1.4-17.el9.x86_64.rpm
134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e
libmwaw-0.3.21-1.el9.x86_64.rpm
5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927
libnumbertext-1.0.6-4.el9.x86_64.rpm
ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab
libodfgen-0.1.8-4.el9.x86_64.rpm
0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2
liborcus-0.16.1-8.el9.x86_64.rpm
8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec
libpagemaker-0.0.4-13.el9.x86_64.rpm
aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542
libqxp-0.0.2-11.el9.x86_64.rpm
68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71
libreoffice-base-7.1.8.1-6.el9.x86_64.rpm
0da41c1a40eb779f018b7403eba3ccb954207c8e4d93a4f9d4adb8dd3a3de5d6
libreoffice-calc-7.1.8.1-6.el9.x86_64.rpm
fba4229246b92703fa1d631ef453ad0d7debb6c93f46d35da440f06a0d5cf9b6
libreoffice-core-7.1.8.1-6.el9.x86_64.rpm
af7f7b067da3f4ccbb6244499d5b36c51bbca26e6983d65e9622d71a29b031d6
libreoffice-data-7.1.8.1-6.el9.noarch.rpm
1a1f79694f0f1a859a0c6a929c9bd8240a056304e55a2c6f4b7956f35e64092d
libreoffice-draw-7.1.8.1-6.el9.x86_64.rpm
b23061bb5995566e1eab89bd7bbc767944dfa363044c60a82acaeebeacbbe553
libreoffice-emailmerge-7.1.8.1-6.el9.x86_64.rpm
f5ef47f2a1c663dce8723feffa472854a2cb11132878e361ba71ad46e45cccec
libreoffice-filters-7.1.8.1-6.el9.x86_64.rpm
8f656b754daaf2d662ef611e8d8e3a5daac2297acaf7648d5fe70c1604cca9bb
libreoffice-gdb-debug-support-7.1.8.1-6.el9.x86_64.rpm
f84ce6f2818b4f8f74968aa2ce389ebb23f0e5fbab0c9454cfff6fd3c6057817
libreoffice-graphicfilter-7.1.8.1-6.el9.x86_64.rpm
63f1876528987a5b4fe3f0a4dacc679140a69e61f25d784af7e1bdaf810b65c5
libreoffice-gtk3-7.1.8.1-6.el9.x86_64.rpm
4c70ce747569e59c7796e8fed939433a22c72ea32ab386f99876a2fa59dfa71c
libreoffice-help-ar-7.1.8.1-6.el9.x86_64.rpm
1028a0ec1cb1f605bbff2a2ec9e85f8290c7a3189aa0f781bbb3c7bd2417ec2a
libreoffice-help-bg-7.1.8.1-6.el9.x86_64.rpm
b67177e0dd1b70b6556b61316bcae21fa271f8150983c305fbc8d16d49dc1f57
libreoffice-help-bn-7.1.8.1-6.el9.x86_64.rpm
efebb408a500f8f50302495e0803c49af6d1a131eb243ef1c56b30d0803972fd
libreoffice-help-ca-7.1.8.1-6.el9.x86_64.rpm
9df6fc7153eac07f85ee3aaee3a7b1505dc71fd881cd18ce2f23db6005217b10
libreoffice-help-cs-7.1.8.1-6.el9.x86_64.rpm
0fadcaa47b12fbf47523a8452fc68f715901515ac5f53a396419f0c9bf62cf7a
libreoffice-help-da-7.1.8.1-6.el9.x86_64.rpm
c91aa7e29f35f529feeeba57485c5bc4f6553505af42fa12fba1e8d296d6d989
libreoffice-help-de-7.1.8.1-6.el9.x86_64.rpm
d8ae64b86ed54f3c7bc2d1d29d3fc0dd16a775102b5797f66f4ba82db1555673
libreoffice-help-dz-7.1.8.1-6.el9.x86_64.rpm
f7f80b3ff6733a2bf9567c478eee7a99f4f699c78ee7e8a481f0447f064aaac8
libreoffice-help-el-7.1.8.1-6.el9.x86_64.rpm
766109b9f2842782fa63f77615235838ea7ced0c2e33ba9e6ae15bbd85aacd93
libreoffice-help-en-7.1.8.1-6.el9.x86_64.rpm
937547cd820f927251f854da2c05f8ee0e19ceafe8d3e4bdcae43a59e39451b2
libreoffice-help-eo-7.1.8.1-6.el9.x86_64.rpm
acfbccf72a2989e68095b91b13b313301246ffb6298cd50946af7f71ab48a9f6
libreoffice-help-es-7.1.8.1-6.el9.x86_64.rpm
3635ae61677ef853dfd2693899750bdddcef7674ffab37f7b8e8f93215fff11b
libreoffice-help-et-7.1.8.1-6.el9.x86_64.rpm
b6990dc560c0130a60fff495633118a97737d42388b177afcb2d30dbc78df940
libreoffice-help-eu-7.1.8.1-6.el9.x86_64.rpm
aeccbdf6fa75a9655304e895c6f9e2d6f3e3d98fb33af66515ba2c437fc4fbf3
libreoffice-help-fi-7.1.8.1-6.el9.x86_64.rpm
2c2851be7af1643c64b1bd6ce279e184af481d39c2d01b62df1d445aec60d4b5
libreoffice-help-fr-7.1.8.1-6.el9.x86_64.rpm
3d6939e9f991c1f2543c3373924bc5eb7463943e343f1695302518a1e4ed2618
libreoffice-help-gl-7.1.8.1-6.el9.x86_64.rpm
de77dff5bf97cf345a9a119b08d6cd98c291a8b30d324ed61b48c5dbb67e3e7b
libreoffice-help-gu-7.1.8.1-6.el9.x86_64.rpm
ec75792443e9823eda8c70068d0cdc47de23d340fa2894a967025a5ec9813e3f
libreoffice-help-he-7.1.8.1-6.el9.x86_64.rpm
6f337aeedafa57e236d3f75874fc01e43edf9aad20e8a531ce234f08c0da9538
libreoffice-help-hi-7.1.8.1-6.el9.x86_64.rpm
f5cc29aa6978c90517e1d6547c10ec644706409fb379dffb6a9a389497b2cb7f
libreoffice-help-hr-7.1.8.1-6.el9.x86_64.rpm
9c4f0c7fc43ae24c17460d51d9cb172e9f72188ef816ea1ca2b488f98cb364ff
libreoffice-help-hu-7.1.8.1-6.el9.x86_64.rpm
ddb359b2abaa08de94b4f0cd713f59c23416ae6fccf4c303183a9386dabf9dd7
libreoffice-help-id-7.1.8.1-6.el9.x86_64.rpm
b4dad685e2a70c5f11afb4d030cc18477ceed175ee332287750f7009331ac113
libreoffice-help-it-7.1.8.1-6.el9.x86_64.rpm
f4ea97101b45ec9739dcf46851ae45c8ea2d4539ba054bb94ab274c45a406f4e
libreoffice-help-ja-7.1.8.1-6.el9.x86_64.rpm
ddfca2cbe2d1535bd1398e7d1687a3f1f6c45920bb5dc7fdab21ca4d099e51ee
libreoffice-help-ko-7.1.8.1-6.el9.x86_64.rpm
eb08f4bb6a7d5e3a1dfeba47094afa7c993627fe76afa40d1f160eb24fb2446e
libreoffice-help-lt-7.1.8.1-6.el9.x86_64.rpm
e728dd68f22179fea0447fe383187851776aac62bf2c6a5f216f3ba7c33c2f19
libreoffice-help-lv-7.1.8.1-6.el9.x86_64.rpm
19912fe2ebd55c517ff4c825265593a33d5c0b032a408e1288ce0c5c1a60d2ca
libreoffice-help-nb-7.1.8.1-6.el9.x86_64.rpm
a7e491ae91343b31722938a7ffdd4053ce64a55df6ccf173a21863602fa0ccec
libreoffice-help-nl-7.1.8.1-6.el9.x86_64.rpm
96bbf0878dc0de73405f94528ea21a92a3d935f99553e0b9c1b8dc9edb359431
libreoffice-help-nn-7.1.8.1-6.el9.x86_64.rpm
6c9dcb8f415242013ba997306c5a702138095471bcf24294963956d04aaff671
libreoffice-help-pl-7.1.8.1-6.el9.x86_64.rpm
fe41abb248ba9c13cd6e223b9927566782d7492067fb58a65d9659bd3a931a71
libreoffice-help-pt-BR-7.1.8.1-6.el9.x86_64.rpm
190a04c015940d4b733ffdc6be381a854684c219ddd71d35dd5b34adfe46c500
libreoffice-help-pt-PT-7.1.8.1-6.el9.x86_64.rpm
4ec4cd694ebe836d8aba4f1a6b8a07ea7756f44b57a9a2bc32bc41de5920935c
libreoffice-help-ro-7.1.8.1-6.el9.x86_64.rpm
b0174d88eb87a58117e1543a2b9dbd7213d41c046d95fead5a8172c1cfd8406c
libreoffice-help-ru-7.1.8.1-6.el9.x86_64.rpm
f74e5ad0fcea1727d39c55bf902710c726ff268e90c8f712698d748d6bd90184
libreoffice-help-si-7.1.8.1-6.el9.x86_64.rpm
0ed3caeb7e2576ba0a46ee66f1d71a8b42cd2d24bdf4241c70b35f4636b41e9f
libreoffice-help-sk-7.1.8.1-6.el9.x86_64.rpm
b1103e02f23f845a2e57808b998e6c729bea2a0d5f8aaef02ef82d0a9b78d21b
libreoffice-help-sl-7.1.8.1-6.el9.x86_64.rpm
63befeaaba51dea23b9ca071caa37518c1b6ec0c7c0a4f09f3b28d3be9072cbc
libreoffice-help-sv-7.1.8.1-6.el9.x86_64.rpm
f31b9892e469990521795d144631c4d14a3d0a7a406a74ed7ef614b8427a2a15
libreoffice-help-ta-7.1.8.1-6.el9.x86_64.rpm
a1c1474c9c14493341704b507fed27364c56d50384ab849aac6f785fbd3b87b0
libreoffice-help-tr-7.1.8.1-6.el9.x86_64.rpm
230937ddaa0df35f777ed7b896a5e3db4f574c624b6b44dff7d2d8f8a050640f
libreoffice-help-uk-7.1.8.1-6.el9.x86_64.rpm
3253d9dc5993f28fc858a1666592ba2c588897699994796529fb15f97fc9e8d9
libreoffice-help-zh-Hans-7.1.8.1-6.el9.x86_64.rpm
6d23c670a74f03e9be56730f5045d7512364e0343322e8efe8f9cb2dd9e058a4
libreoffice-help-zh-Hant-7.1.8.1-6.el9.x86_64.rpm
2659f235e2e9a3e8b089627bbb02537d3122541e7803f3adaeac16c5d3fff641
libreoffice-impress-7.1.8.1-6.el9.x86_64.rpm
c112dcafd162e091b010df1fbd15f888f6c9eebb6458fed6cf26d74beb29ed66
libreofficekit-7.1.8.1-6.el9.x86_64.rpm
8774216ce8c3889496abada6708c411a2ec085563b8a49ce43e5cacef160838c
libreoffice-langpack-af-7.1.8.1-6.el9.x86_64.rpm
ebc1fbe0d26c9e6da4c7a70d2a5a57f275f3906abb0069af9aaf7d073679bb42
libreoffice-langpack-ar-7.1.8.1-6.el9.x86_64.rpm
b019e3835d1cfe05c324d5b96f8756756f9a9dbf87e05c72c1a78efb3076fe92
libreoffice-langpack-as-7.1.8.1-6.el9.x86_64.rpm
202375433b8e8f1a96748b2a16fb1c8139f025335ebc53202d844c35442d7cbe
libreoffice-langpack-bg-7.1.8.1-6.el9.x86_64.rpm
3e2898e0eee12437a5e39b74c63b4ae8ca9ed59bbb7987d5255d26da77b34e9f
libreoffice-langpack-bn-7.1.8.1-6.el9.x86_64.rpm
32385d92a1031f3767c07f901dd58f1df9f08512bb393648fc26de70e51d7626
libreoffice-langpack-br-7.1.8.1-6.el9.x86_64.rpm
95b4463a3c9aa4cbb7fe3100ae40ca6591a747d1dd11f94e455bdd3702fa2470
libreoffice-langpack-ca-7.1.8.1-6.el9.x86_64.rpm
f14114bacf794906f18be92ba7ae11b20d912da48b095ba56ea3b201c93fd919
libreoffice-langpack-cs-7.1.8.1-6.el9.x86_64.rpm
729418f64c3b3b39d40d50005998190b1631906cc633d7cff76d55b7560379c3
libreoffice-langpack-cy-7.1.8.1-6.el9.x86_64.rpm
9fdce2d9fb120f776627efdab552a5a43df377d9a75f6e78497c5f9811d5b4d6
libreoffice-langpack-da-7.1.8.1-6.el9.x86_64.rpm
1c54131cbb366eb12d32d5a4ca5ce4e3277539a3fa5b1936f861e82495ee667f
libreoffice-langpack-de-7.1.8.1-6.el9.x86_64.rpm
cee5f0855524fbf3d14a901ed95fef1dba61c2210b0301df0e2ff73e605e10da
libreoffice-langpack-dz-7.1.8.1-6.el9.x86_64.rpm
61df884923c78ddd55897800ec68841f4084f8b9f3ead0da82080f307add7867
libreoffice-langpack-el-7.1.8.1-6.el9.x86_64.rpm
defd44492179a0202b3d70a1d7f4a1d9bf1c369c97d0804efa260d499242d310
libreoffice-langpack-en-7.1.8.1-6.el9.x86_64.rpm
03a26283ed0a29793400d0f35cca7bd5aa8f04ebcee9237603264e91cd5a2e75
libreoffice-langpack-eo-7.1.8.1-6.el9.x86_64.rpm
8beeddd7718e362d6fec1b5a7cfaf13410efb8f7cd72468561bfab1c545690cb
libreoffice-langpack-es-7.1.8.1-6.el9.x86_64.rpm
9d4158249f4c1ecee33f3dc600aa92a5e39f86cc545730f5098cccb8129fe8c9
libreoffice-langpack-et-7.1.8.1-6.el9.x86_64.rpm
f7b8ab2054828835ea512e4d743a959ef2d3577259ebeedd0c505ae6d14051b4
libreoffice-langpack-eu-7.1.8.1-6.el9.x86_64.rpm
d7b92edb57d2bcc95cc33744004a8685dc81d0cfe3469f8cac1171413fd04f20
libreoffice-langpack-fa-7.1.8.1-6.el9.x86_64.rpm
bf7b98c45412206b2d16c2904d5e70c8b1948268613f4d5c5392145ca05a8de3
libreoffice-langpack-fi-7.1.8.1-6.el9.x86_64.rpm
7be022ba59d51cdfade93c023b061ae71478c2e725d1b0dd447fb98bcf3f0fbf
libreoffice-langpack-fr-7.1.8.1-6.el9.x86_64.rpm
a8166e32142c46b2873d3a7cec930d29946d75a5812556712b91a28b13404a49
libreoffice-langpack-fy-7.1.8.1-6.el9.x86_64.rpm
3016e83886cb427a6bf3b0247e8b5e3a3c3071ac68b0768763627e264f4ac26d
libreoffice-langpack-ga-7.1.8.1-6.el9.x86_64.rpm
9dd1385b8242e4aa76fcd1b48e33179287c4e4a65c1b0ed0d740732b40209257
libreoffice-langpack-gl-7.1.8.1-6.el9.x86_64.rpm
621ff9639298753c73ba998930272f29f56a98dd609c19f707eba47717e16c86
libreoffice-langpack-gu-7.1.8.1-6.el9.x86_64.rpm
d0f588cb933f9141816eff7415851382bb9a342fe85e2ce44361d8e780161bb1
libreoffice-langpack-he-7.1.8.1-6.el9.x86_64.rpm
2ddfe27dfa4b33712c59f696fd049506ede667ebb8609c629b55b79394e4587b
libreoffice-langpack-hi-7.1.8.1-6.el9.x86_64.rpm
fd87bb4ed66dfa4dc357ed4f9047dcd815d45ab0fdd261e4247b0e5fffaae6fd
libreoffice-langpack-hr-7.1.8.1-6.el9.x86_64.rpm
728bebe6072146bca66a0b5baa55c6c57820d49a6bad1e0799f9d6a193d91008
libreoffice-langpack-hu-7.1.8.1-6.el9.x86_64.rpm
e0aa64ab9e3159852635499d90f6867b31a682987d230e3b682ae0eab073f2be
libreoffice-langpack-id-7.1.8.1-6.el9.x86_64.rpm
69ceb0792a5fde73c20e49ed94f820995c8a0c500edf3c4c406a03307f7f2ca9
libreoffice-langpack-it-7.1.8.1-6.el9.x86_64.rpm
4d3bc174cebba382c67f028aa4e0413a30c111fe8f8dc7945bf7299456d393c2
libreoffice-langpack-ja-7.1.8.1-6.el9.x86_64.rpm
517a1f048e527a08fdc368826b87e742b69bd005621d46a4095a621627378425
libreoffice-langpack-kk-7.1.8.1-6.el9.x86_64.rpm
658ce5d0e584ec5aed9d30001bfd069cbd27dfc479afe17562753758e228dd6b
libreoffice-langpack-kn-7.1.8.1-6.el9.x86_64.rpm
60823c4a18d1d1d69258f7e272fd5ac1174cad14f055f82a2c159f79e2c01134
libreoffice-langpack-ko-7.1.8.1-6.el9.x86_64.rpm
5e7bde530f962ac16a3fad48e6d15b256ff02b8ab588b2cb84721977a4550b64
libreoffice-langpack-lt-7.1.8.1-6.el9.x86_64.rpm
54603f632a1353b02ae1789754791ebdbd5c09a864c35f21a917d4e4012bc6ba
libreoffice-langpack-lv-7.1.8.1-6.el9.x86_64.rpm
b2b2911611642c6188d46efa6f0bec339f971dfaae56c2ea93af01ae91037a14
libreoffice-langpack-mai-7.1.8.1-6.el9.x86_64.rpm
831f0aa8bfb7ddf17baa957dde7d59450f640fe72963f7c5ceee4017dba991f1
libreoffice-langpack-ml-7.1.8.1-6.el9.x86_64.rpm
9e354639d38be0a3186712c233d3bcfcc85d75c995287d153a9da3c1f20f55e3
libreoffice-langpack-mr-7.1.8.1-6.el9.x86_64.rpm
f5694a5da01b8e95b2ea5aba1948a576eac12d1979530bb359a1ba2dd29c1e47
libreoffice-langpack-nb-7.1.8.1-6.el9.x86_64.rpm
6bbe09596667bac286a29bf0f0e9bf2ea25d47a9599d427109bb2460dd1bd1ad
libreoffice-langpack-nl-7.1.8.1-6.el9.x86_64.rpm
f87135d91e9dd53a735f363a3ec0dfb652549a5668cda3a2fc5c5c8f57cd9e40
libreoffice-langpack-nn-7.1.8.1-6.el9.x86_64.rpm
7d3f3fc637273aaabd8199154c0f712384e32795869da6c2eb2ca2ca6c966a90
libreoffice-langpack-nr-7.1.8.1-6.el9.x86_64.rpm
910b44b0bd09f7bbb440cae89d9f6c6f13d124f74c834471cf6e736b0cdef0d6
libreoffice-langpack-nso-7.1.8.1-6.el9.x86_64.rpm
7fa50fa5e1dc803d7b0c3c76c479ab35cd2c58d309362435c6e8af9d6575daee
libreoffice-langpack-or-7.1.8.1-6.el9.x86_64.rpm
5f681411e2ced355ee339b30954729110f969b0c2ec90112ed32e2de9e824532
libreoffice-langpack-pa-7.1.8.1-6.el9.x86_64.rpm
33ae432e3be89e6e5ce7385620f022250aa8af178b9e756cbcb0abdc471337ae
libreoffice-langpack-pl-7.1.8.1-6.el9.x86_64.rpm
8717940c047560765ba7f7009c496681a5419b406e97b959146340a35241b2d0
libreoffice-langpack-pt-BR-7.1.8.1-6.el9.x86_64.rpm
b31c178eadc65f19d5ebd069db5d0839032f1c8ee28dba6ed9f243f59ab25c25
libreoffice-langpack-pt-PT-7.1.8.1-6.el9.x86_64.rpm
e5d36e19bfd75b9de8b3593a49888bca054cfd68beeab1f86537778281299bc8
libreoffice-langpack-ro-7.1.8.1-6.el9.x86_64.rpm
ef22427ad3d6bb4e0af7ebb30655e9da297fa4bc77077bd35101f8a2b6376e9f
libreoffice-langpack-ru-7.1.8.1-6.el9.x86_64.rpm
418835ff9387af5016fa1f3bf13fd2df3d910ebd1f7345232c9d4f1398556189
libreoffice-langpack-si-7.1.8.1-6.el9.x86_64.rpm
f568aaa270d63e11061b25773fbebd324fcb8fd541a1f375a8236e6d3896518b
libreoffice-langpack-sk-7.1.8.1-6.el9.x86_64.rpm
f12b3f395047f192ad772f0232eeb6d00ddbef50b9b3dca50c2aecefba81a1ad
libreoffice-langpack-sl-7.1.8.1-6.el9.x86_64.rpm
2025309f1cdfad8a18abc2cac28f8635e22657212f192de7f2d0db59c949bbdd
libreoffice-langpack-sr-7.1.8.1-6.el9.x86_64.rpm
9c1ac6c116f82c285ec6bae5829a464bef25fed108314712652858ddfad10e54
libreoffice-langpack-ss-7.1.8.1-6.el9.x86_64.rpm
46bae487acc7fa4d053a55c22ecf81e15e0412322bb2c1eceb702edd750f20c5
libreoffice-langpack-st-7.1.8.1-6.el9.x86_64.rpm
b5d5f1570b2ee8694a7da71bc0fd878705b6e16ebd187985ef50a9c08f3596b6
libreoffice-langpack-sv-7.1.8.1-6.el9.x86_64.rpm
c64ad5867474b05781ccfa239cb156fc15934f191604af7b8a099f9f3a914b3f
libreoffice-langpack-ta-7.1.8.1-6.el9.x86_64.rpm
6d59fbf9a549c40c5edbcb0f4472116ce46c9132f399fada0491043d9bfd119b
libreoffice-langpack-te-7.1.8.1-6.el9.x86_64.rpm
f796c6ef41a8197e2a6d9792cc49ad8e34b5764611610e673489d777ba57a901
libreoffice-langpack-th-7.1.8.1-6.el9.x86_64.rpm
1a80fb4ca85c0eed58376c1e7c820c3b05495e21d8a8d2d0c38a7fa19138ec9f
libreoffice-langpack-tn-7.1.8.1-6.el9.x86_64.rpm
aad4a031191ae5ebb907dbeb573376665d0e95dcac335da556e3f04e16e86d69
libreoffice-langpack-tr-7.1.8.1-6.el9.x86_64.rpm
a0c2bfed690bd0b99feb0cb7c527b263ce6dbfed58716e9de7f0e41fdcc213cb
libreoffice-langpack-ts-7.1.8.1-6.el9.x86_64.rpm
ec3c29d113a01ad9e64d28537f21804491b510e457ae4257d7368e8c41c96cfb
libreoffice-langpack-uk-7.1.8.1-6.el9.x86_64.rpm
74d78a3b51319ee61deb0277d35890c00246718336dd979a799f4ec401983c2b
libreoffice-langpack-ve-7.1.8.1-6.el9.x86_64.rpm
4029b8a1468f4c61d69b44a0581a418ca0aa0b6d11c07307e8e32f771f49ff9a
libreoffice-langpack-xh-7.1.8.1-6.el9.x86_64.rpm
cf31bd887082862b5b48bab07638ed3b2c14c68f2659d3583d325d5f785c9c92
libreoffice-langpack-zh-Hans-7.1.8.1-6.el9.x86_64.rpm
095c5693b5464726cc0165badf93e9d8ac5bfe8825f395a9c9c3dd743d26277b
libreoffice-langpack-zh-Hant-7.1.8.1-6.el9.x86_64.rpm
3df50dc76fb1e789456c80b9011a3c848fa1d4edf2de08e6f7b9d1856641a8c9
libreoffice-langpack-zu-7.1.8.1-6.el9.x86_64.rpm
986c1eeeb3a90a5c07841f8649ac9406fa1635a79cd7953b257e120c7fb8c3d0
libreoffice-math-7.1.8.1-6.el9.x86_64.rpm
ac357ba2009c63555fe3d82caad710d7f71e8269a9857f308160bc1491fd3b22
libreoffice-ogltrans-7.1.8.1-6.el9.x86_64.rpm
67f008f13f35ae372f776e90c201dad4a0cdede159e0dcf5abcbac0d8aec88df
libreoffice-opensymbol-fonts-7.1.8.1-6.el9.noarch.rpm
4621baa5df251ff762cff293ccd830490e41d5c7c42b8863503582c2758ec4c6
libreoffice-pdfimport-7.1.8.1-6.el9.x86_64.rpm
226ce4b0a80c3adb29a2eb68c36f5178e7e81703dc615bbea950e4b1918c3e7e
libreoffice-pyuno-7.1.8.1-6.el9.x86_64.rpm
efa105ea3b7b4e4570adfb4af7f78715ba63aa6d932a0a32246af4567ccd6e38
libreoffice-ure-7.1.8.1-6.el9.x86_64.rpm
cf9edd9a291f75913182093f7cc1cdeaae60bfc0c971310e0f9d4f2ae2eaf48d
libreoffice-ure-common-7.1.8.1-6.el9.noarch.rpm
934a491fcbca660493e4accf8c6701d9a4b196eb87b101525018caa5ff072403
libreoffice-voikko-5.0-10.el9.x86_64.rpm
d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0
libreoffice-wiki-publisher-7.1.8.1-6.el9.x86_64.rpm
0f3becdef37d9ea817e274b8e0415c78ee63a7a752d70fafe55d0a7a393f72e8
libreoffice-writer-7.1.8.1-6.el9.x86_64.rpm
ecb1bb1fa9db8017b93066d65f72954e34a405fae867547a0d2b78bb3991b8cd
libreoffice-x11-7.1.8.1-6.el9.x86_64.rpm
5d462af72341b4b1943cf4d858fa50b3b2b87016f7f1ca9fd784e1a1ad422f84
libreoffice-xsltfilter-7.1.8.1-6.el9.x86_64.rpm
c7ed3a9d064e2b1e3b2e706b692d929ee0ddfaa7a89bc79335cdf02385179361
librepository-1.1.3-31.el9.noarch.rpm
7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378
librevenge-0.0.4-22.el9.x86_64.rpm
08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007
libserializer-1.1.2-30.el9.noarch.rpm
d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68
libshout-2.4.3-7.el9.x86_64.rpm
4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435
libstaroffice-0.0.7-5.el9.x86_64.rpm
bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783
libv4l-1.20.0-5.el9.x86_64.rpm
959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3
libvisio-0.1.7-9.el9.x86_64.rpm
ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324
libvoikko-4.3-7.el9.x86_64.rpm
700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a
libwpd-0.10.3-10.el9.x86_64.rpm
4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215
libwpg-0.3.3-8.el9.x86_64.rpm
e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562
libwps-0.4.12-4.el9.x86_64.rpm
62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0
libzmf-0.0.2-18.el9.x86_64.rpm
fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b
lksctp-tools-devel-1.0.19-1.el9.x86_64.rpm
bc7349d2cc90e0d56629d3a37583b7417df5b36244d241fbec309c973eb2b1ae
lksctp-tools-doc-1.0.19-1.el9.x86_64.rpm
9bc4f3a52fab5c8d8237034191960ff645f08d1b07422f67a6ea63ffea36666c
lpsolve-5.5.2.0-28.el9.x86_64.rpm
8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b
mythes-bg-4.3-21.el9.noarch.rpm
1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb
mythes-ca-1.5.0-24.el9.noarch.rpm
ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b
mythes-cs-0.20070926-27.el9.noarch.rpm
c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e
mythes-da-0.20100629.15.16-22.el9.noarch.rpm
2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233
mythes-de-0.20210302-3.el9.noarch.rpm
56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298
mythes-el-0.20070412-27.el9.noarch.rpm
a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393
mythes-en-3.0-33.el9.noarch.rpm
cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83
mythes-es-2.3-10.el9.noarch.rpm
5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2
mythes-fr-2.3-19.el9.noarch.rpm
c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb
mythes-ga-0.20071001-27.el9.noarch.rpm
ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3
mythes-hu-0.20101019-23.el9.noarch.rpm
95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967
mythes-it-2.0.9l-26.el9.noarch.rpm
c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6
mythes-lv-1.0.0-15.el9.noarch.rpm
38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264
mythes-nb-2.0.10-15.el9.noarch.rpm
e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a
mythes-nl-0.20130131-17.el9.noarch.rpm
1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121
mythes-nn-2.0.10-15.el9.noarch.rpm
17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523
mythes-pl-1.5-28.el9.noarch.rpm
ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2
mythes-pt-0.20060817-27.el9.noarch.rpm
1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36
mythes-ro-3.3-22.el9.noarch.rpm
b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7
mythes-ru-0.20070613-25.el9.noarch.rpm
9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3
mythes-sk-0.20130130-19.el9.noarch.rpm
03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed
mythes-sl-0.20130130-19.el9.noarch.rpm
620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d
mythes-sv-1.3-21.el9.noarch.rpm
9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3
mythes-uk-1.6.5-22.el9.noarch.rpm
bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d
neon-0.31.2-11.el9.x86_64.rpm
30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed
ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm
67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580
ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm
ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9
openjpeg2-2.4.0-6.el9.x86_64.rpm
a1ff83896899d34681e729b1cfee5f8d9c7f769f802f5b54bb9781f819957bb0
pentaho-libxml-1.1.3-30.el9.noarch.rpm
d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4
pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm
561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776
poppler-21.01.0-12.el9.x86_64.rpm
18fd7f5209755b145d523d305f900ca11a393c35b711da5902fc85db39bdfe5a
poppler-cpp-21.01.0-12.el9.x86_64.rpm
52c26fb209ef63a62e8399641fce4f8f87f4662d1290a173120417c1f191726d
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
poppler-glib-21.01.0-12.el9.x86_64.rpm
06cf367d138624fc9f15d7803f9cda28e823aa7575f56971f01dc4b9b5677c39
poppler-utils-21.01.0-12.el9.x86_64.rpm
2be4571777d7925f19631c21d087639486260267a0d7bcaa500d49a44a5579ea
postgresql-jdbc-42.2.18-5.el9.noarch.rpm
e59b40159b9c5a040052f1cdccfc3abbc4491622c7fd656e0e5edf9d66ca8ae0
python3-libvoikko-4.3-7.el9.noarch.rpm
73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f
raptor2-2.0.15-30.el9.x86_64.rpm
e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e
rasqal-0.9.33-18.el9.x86_64.rpm
da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f
redland-1.0.17-29.el9.x86_64.rpm
487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d
sac-1.3-37.el9.noarch.rpm
4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e
taglib-1.12-6.el9.x86_64.rpm
cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10
ttmkfdir-3.0.9-65.el9.x86_64.rpm
6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6
twolame-0.3.13-19.el9.x86_64.rpm
cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f
voikko-fi-2.4-5.el9.noarch.rpm
e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36
twolame-libs-0.3.13-19.el9.x86_64.rpm
d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0
xmlsec1-1.2.29-9.el9.x86_64.rpm
ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a
xmlsec1-nss-1.2.29-9.el9.x86_64.rpm
04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2
xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm
435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679
xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm
99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd
xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm
8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f
xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm
3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2
xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm
6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001
xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm
09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90
xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm
d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445
xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm
431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6
xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm
e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d
xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm
6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b
xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm
6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039
xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm
f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c
xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm
0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434
xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm
51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4
xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm
982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669
xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm
f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d
xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm
a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec
RLSA-2022:4940
Important: xz security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for xz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xz-devel-5.2.5-8.el9_0.i686.rpm
ef799ef9ecc144b00e504724125ea6febc2d34243613a9faf0b17042e733fccd
xz-devel-5.2.5-8.el9_0.x86_64.rpm
36ef93c4def7a3e894cfadd92c5eeb61fb8709d55df51b21b9c1ab50ef2cda70
xz-lzma-compat-5.2.5-8.el9_0.x86_64.rpm
f9daeaf6d287c9a8f5f1274454dc2f0fb2c6831b680812a69e719e02d8ff0cd2
RLSA-2022:5942
Moderate: vim security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
vim-common-8.2.2637-16.el9_0.3.x86_64.rpm
7d4461f0835fddfd186a1dc3af5aaf720131b7bc26a8a6395ec5bb3148a505ef
vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm
1665fda895581e95e7e6e359620ce6628755b6395b6ce2f3bf33950d7392a47b
vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm
01d684593325fb01a5fdb634b9a22e17b91f20b56a62d1e12c7f407a2f6d97bb
RLSA-2022:6602
Moderate: gnupg2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnupg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
Security Fix(es):
* gpg: Signature spoofing via status line injection (CVE-2022-34903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm
6c2ad44232aff2fd30ac354ee071d5b4f6a0c2b1c307d6f7531d5cf60b59488d
RLSA-2022:6854
Moderate: gnutls and nettle security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nettle, gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.7.6), nettle (3.8).
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [IBM 9.1] [P10] POWER10 performance enhancements for cryptography: nettle - incremental work (BZ#2102589)
* Allow enabling KTLS in Rocky Linux 9.1 (BZ#2108532)
* DES-CBC bag is decryptable under FIPS (BZ#2115314)
* allow signature verification using RSA keys <2k in FIPS mode (BZ#2119770)
rocky-linux-9-x86-64-appstream-rpms
gnutls-c++-3.7.6-12.el9_0.i686.rpm
be2526de8a8d4dd9ef21fe9a0f597381ec69cbb4bdcd917557438d9ae247ddcb
gnutls-c++-3.7.6-12.el9_0.x86_64.rpm
20febbb38ae61d697aea273ac9baa8261b6eb46864b4b53fb4aee219a5ffba02
gnutls-dane-3.7.6-12.el9_0.i686.rpm
7e9d81eb16299cd33aa1b9de62daad01bc082a340ebfda1e918bf5b132e0e698
gnutls-dane-3.7.6-12.el9_0.x86_64.rpm
e4c0731b14a134974401231f4cd3fab1e00c24f12d2f064a6628516251d6e4c3
gnutls-devel-3.7.6-12.el9_0.i686.rpm
487808612cad7e1e8b1b6eb266ecd51b420ca68bb4767696a56288ac0914b4ff
gnutls-devel-3.7.6-12.el9_0.x86_64.rpm
daac6aeb6128870c69a74de09b7a0f23dbd02407ea7d65325c6db71e166081da
gnutls-utils-3.7.6-12.el9_0.x86_64.rpm
c7de211ad2bec144ed339b83adcd348605e1033b29a5e9319358ee1bfc8206f8
nettle-devel-3.8-3.el9_0.i686.rpm
eee07fdf3036775d9f707a2b06b78086ae7b1ca88e0ce236f3ef4ad09753f9bc
nettle-devel-3.8-3.el9_0.x86_64.rpm
34fa515f4fa8325e6facd6cfd0c3bd96fcfc3445c7e50b6011548360a902d52f
RLSA-2022:7288
Important: openssl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library.
Security Fix(es):
* OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)
* OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openssl-devel-3.0.1-43.el9_0.i686.rpm
f2a45c3be46c5ac7666a6004342896721819b8f20d3239802077cb5cf70fb7ae
openssl-devel-3.0.1-43.el9_0.x86_64.rpm
6ff4696b84a705c8c76c8c93d868e6180698f2172e122f8858643eb9bdfcdf05
openssl-perl-3.0.1-43.el9_0.x86_64.rpm
fb2e1e3a0b4d9a8ccbfb0adb016373ba874a0095a58f2a887f0fd5ad1dceecaf
RLBA-2022:7324
libgcrypt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgcrypt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Bug Fix(es) and Enhancement(s):
* FIPS: getrandom & non-deterministic RSA keygen & missing lengths check for KDF, HMAC & change RSA encryption/decryption to explicit FIPS indicators. (BZ#2131208)
* fips: libgcrypt SHA-3 miscomputes digests on buffers >= 4 GiB (BZ#2131209)
* FIPS RSA pairwise consistency test fails for gcry_pk_genkey() with RSA if (test-parms(e ...)(p ...)(q ...)) are specified (BZ#2131210)
rocky-linux-9-x86-64-appstream-rpms
libgcrypt-devel-1.10.0-8.el9_0.i686.rpm
ecc286cd10d6ff315cb6ca7301b3f62c9ca24018f2dc9cae1868db3c65a24be6
libgcrypt-devel-1.10.0-8.el9_0.x86_64.rpm
9c83b3811d0a7ef15ca3f62714ae2790991f2b32d2c31e4f849c464ed854238e
RLSA-2022:7329
Moderate: lua security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling (CVE-2022-33099)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
lua-5.4.2-4.el9_0.3.x86_64.rpm
9b9247dd77c68e135da37e03d53c011f8d879f369a45bb7cbd275a51c6f97824
RLBA-2022:8265
NetworkManager bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.40.0-1.el9.x86_64.rpm
ff3907b501d448e73fbe819b4071ebe0d43b8feda0136e740142b7b9f5b475cb
NetworkManager-config-connectivity-redhat-1.40.0-1.el9.noarch.rpm
c07e7ff6e4063f8e3cc92f257ba9e9408b8d3b7f38e956a8c51767bde737c914
NetworkManager-dispatcher-routing-rules-1.40.0-1.el9.noarch.rpm
238a8dd3a90ef20179ce71ec7a079e27e4f8e12af91e9a036cde1afed4901264
NetworkManager-ovs-1.40.0-1.el9.x86_64.rpm
53e2032c81ad6b29223716edb24af69edfe08459ca8c1470c92b5bc2a26e4c8d
NetworkManager-ppp-1.40.0-1.el9.x86_64.rpm
60bf2b15ecf0f4fa3aeece1197aee58fe036a865b8f21c435bb3c7010a3f21e1
RLBA-2022:8268
audit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for audit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
audit-libs-devel-3.0.7-103.el9.i686.rpm
3d5d176759d2e720c5e85418d3d728d5ccf9248d39d1aa11d47015990b1fb6e3
audit-libs-devel-3.0.7-103.el9.x86_64.rpm
e4d53cd4a6e3d2e0e6b6e6afea6e22df620553ab584610282f8631cfd2191e94
python3-audit-3.0.7-103.el9.x86_64.rpm
45107b96863c18ad3aa4f949850e861080d5047e135ea9b8e707d52f70da3ad0
RLBA-2022:8269
openldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openldap-devel-2.6.2-3.el9.i686.rpm
de2ed63c0b23f0bc42686991006ec4680ed52c8da60c97b93dc6c61522bebe44
openldap-devel-2.6.2-3.el9.x86_64.rpm
a2e8275b9fb7a58330ccef915bc16dcde33df32274ef73d4fa6255aee0c4907c
RLBA-2022:8274
elfutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
elfutils-debuginfod-0.187-5.el9.x86_64.rpm
74d191c310368c6fe50302fe0bfcaac1c21172dab8c979cf352596d517717473
elfutils-debuginfod-client-devel-0.187-5.el9.i686.rpm
b6926325d67c577f837fe8dd4a1ce70337cf11b13e5044db87bcd1cb7943ae85
elfutils-debuginfod-client-devel-0.187-5.el9.x86_64.rpm
5e0d12356ad7ff76d32724b2a7f79147c8bd6254f3c79fc728a395d997466077
elfutils-devel-0.187-5.el9.i686.rpm
5ef294d3eaafe0ce99c9ca294e087774fbb283c91912c8a81337873d315cd1c9
elfutils-devel-0.187-5.el9.x86_64.rpm
239d1c34e57a44c3572a686bbad7d6924de96fed3f401cf911f14e1ddf0a9436
elfutils-libelf-devel-0.187-5.el9.i686.rpm
ea9732151e5ff5319dcb7edd7f49d39aab079cb16acb2cc2979c0ef996a1ea76
elfutils-libelf-devel-0.187-5.el9.x86_64.rpm
a4241c148695dd1b6b037c2ce2f52c42c56b0f8f7f8ad938033e4b8f21b5e535
RLBA-2022:8277
gcc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cpp-11.3.1-2.1.el9.x86_64.rpm
d148f36c0ec62cac2eadd8e7c7e9eb3f3b4e18bac06331813636ec7a23e63485
gcc-11.3.1-2.1.el9.x86_64.rpm
cc2aee1abcbfdb6a07d5f8be22d51ac72737f2d34978e16bdef678556ef8591f
gcc-c++-11.3.1-2.1.el9.x86_64.rpm
e0c4545be404df2911ab67d53f9f416872939b18087f57900f7d3b08867ba741
gcc-gfortran-11.3.1-2.1.el9.x86_64.rpm
8616099b3e02f6f9a25251fc0a906925b9b53303234d3f9086f88d9103fac6b6
gcc-offload-nvptx-11.3.1-2.1.el9.x86_64.rpm
c93805d13a0253b86e949d96cbe7053fea172c2f5a5ce84a32b5970229eab8b6
gcc-plugin-annobin-11.3.1-2.1.el9.x86_64.rpm
bc733c636dfe9ea76d77f3c68a4825d4027a7a55f7c832131b040052de48c40b
libasan-11.3.1-2.1.el9.i686.rpm
67aaf6255c372bd93f1f869cdf2dffb5b980a65bcef1ef41f7221a6ee4ad3de5
libasan-11.3.1-2.1.el9.x86_64.rpm
10d133bc154cff2b7660bca951a2623a34a8a4d788bf9f9c99804a42b1d50f17
libgccjit-11.3.1-2.1.el9.i686.rpm
7e0b6b973c102d471ed69483ba8a93a8072c32a00041b3aee3209e20ce0acc4d
libgccjit-11.3.1-2.1.el9.x86_64.rpm
033a09ed2536a1f76e4b299ed58cae088bdd43b35b444396e91c3e14cde44e1c
libgccjit-devel-11.3.1-2.1.el9.i686.rpm
dc4d240174b37f79d385d43a61b695d74ab3857043daf8daef74dd4c58f69f8c
libgccjit-devel-11.3.1-2.1.el9.x86_64.rpm
8c4a2badd481a9b5a3d2af3e43ab112a0c540f70afa8632f10f0a54dd4b2b08b
libgomp-offload-nvptx-11.3.1-2.1.el9.x86_64.rpm
8896733a6612ac5f6dd22ad4a8b2d4037e914cab47c46be84a162ff7be9c8826
libitm-11.3.1-2.1.el9.i686.rpm
4117cac369a1b8a06e231989716d7a2e6ac445be8e6f0d08191ceb15d78e9280
libitm-11.3.1-2.1.el9.x86_64.rpm
4c65e4d646a9ff46734a48e8ca53e819d203980c06463fc284ebfd9c7babe412
libitm-devel-11.3.1-2.1.el9.i686.rpm
1e3e83ecfc6d83ad90a70ed455b35a7aa5240e358dcbf56ef799d1b4e9e22f8d
libitm-devel-11.3.1-2.1.el9.x86_64.rpm
b21c1d29b74273714f20b8f7a8276dfad00ecc5a327cf8bcbaf4c23e4b8f9d38
liblsan-11.3.1-2.1.el9.x86_64.rpm
8b483d41a8e9b9f162047324757196bd2097a5b0a60a8061939be79275b64745
libquadmath-devel-11.3.1-2.1.el9.i686.rpm
327b22ee75d68a24d2959afd4d00c9259c8ad357e42ad96057d669748e17630e
libquadmath-devel-11.3.1-2.1.el9.x86_64.rpm
a228c4afd6d39e97f06ff210cb6af62d535938a50438091cd341d1575866b48e
libstdc++-devel-11.3.1-2.1.el9.i686.rpm
35c72f980003d33655e58ee46b73df5bfb0f3c96a0cbd44c298890f9dd0f0d9b
libstdc++-devel-11.3.1-2.1.el9.x86_64.rpm
d373150cea8b186773b5fb9bc4b2dff50540886e738b41de6c94421b605e097f
libstdc++-docs-11.3.1-2.1.el9.x86_64.rpm
51a1504c746bcd4ecc7cc787473b10fb7cfb1e6415e4434b832d4043f9fd6ec9
libtsan-11.3.1-2.1.el9.x86_64.rpm
42f96813abb08d24ac8d9cd03fe5b07c10dbc5b4bf3892f670ce40d3ed2ece79
libubsan-11.3.1-2.1.el9.i686.rpm
0e6b04176d5d67d1c5b035b0edcb4db155bff95ff5f87acc24a4e666703451ea
libubsan-11.3.1-2.1.el9.x86_64.rpm
3e4d5935c3488090ef608ae9e708fbb01511ba574818cf2bb52b50ad950e1927
RLBA-2022:8281
binutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
binutils-devel-2.35.2-24.el9.i686.rpm
a7387a1c59877888e2e1b0de2902c9757311abe7afbf4a9f60c26ab2cc262312
binutils-devel-2.35.2-24.el9.x86_64.rpm
d90efc204c44d0af31838476d2c102a2fc85922d9219340d20ab8be1ee186b00
RLBA-2022:8283
selinux-policy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-34.1.43-1.el9.noarch.rpm
d6f125a446987ccf60dc6740d1d056d7517718e5aa12f56d801d53fa03b09055
RLBA-2022:8286
libnl3 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnl3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnl3-devel-3.7.0-1.el9.i686.rpm
da13f6502183d5d1cca4b9dbb497258cfb7d968522fc741af9c7159e233bd85c
libnl3-devel-3.7.0-1.el9.x86_64.rpm
756dabb06311d203841c444259ef05eff3c638dc2a80d76f47b4c3eb53065046
RLSA-2022:8291
Moderate: rsync security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rsync-daemon-3.2.3-18.el9.noarch.rpm
824879326e73ed8ae1ad7a69ccc236b5ff5456be5c333b86768178d347855027
RLBA-2022:8292
libusbx bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libusbx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libusbx-devel-1.0.26-1.el9.i686.rpm
250741dd8126dfdb6fb4c8f5e7a8c58ae5f28b47b2712537e0e6993a51188152
libusbx-devel-1.0.26-1.el9.x86_64.rpm
4ef3423682b46834a85c9f9d45337d5a44ca682e76e143061a620cb20a007eca
RLBA-2022:8293
libsemanage bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libsemanage-3.4-2.el9.x86_64.rpm
29463431665c6085ccf87b129aa5a0b4d03bd60fe8f77747348b16e10bc4ba80
RLBA-2022:8296
dnf-plugins-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dnf-plugin-modulesync-4.1.0-3.el9.noarch.rpm
047c5006fa0ade759287c62d632b72fb5cd8e92bbb1ed85c9f011e675e07ced6
RLBA-2022:8298
libsolv bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsolv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-solv-0.7.22-1.el9.x86_64.rpm
29f8d1886f7925eb85c57d0ffb17d279f8cd5795e1ed8abe5a8b9cc839b88e87
RLBA-2022:8314
cockpit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-packagekit-276.1-1.el9.noarch.rpm
c79af451aee2593e9d528c03a05126e7e23a49e9888e592ffb5732925c65c577
cockpit-pcp-276.1-1.el9.x86_64.rpm
d22671f5f54ebe215955076e0b7d3fb6a45e5c0a41ba6453aabb628e8019f856
cockpit-storaged-276.1-1.el9.noarch.rpm
213901645908a54a412c8a3c2f0d2c94ce1ff131761743a1e171af6aa915fdb8
RLBA-2022:8315
pam bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pam-devel-1.5.1-12.el9.i686.rpm
50dc7625f534c417f37880424958ab807afa732c723e58ed6f2ae45613644226
pam-devel-1.5.1-12.el9.x86_64.rpm
0083d0fbab70a97ab13129d62e368cb55a7e7e4aee30e1818ecb6c97138adaa0
pam-docs-1.5.1-12.el9.x86_64.rpm
a4896059cb33cf4b864677a2fb9fda08f68c400be5e826ddfa0a93879697f4a0
RLBA-2022:8316
pcre2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcre2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcre2-devel-10.40-2.el9.i686.rpm
e58fba84050103a18b9e672529133e4b787d69ea4b51a093c81455ecdd069a1e
pcre2-devel-10.40-2.el9.x86_64.rpm
f9e112427b5b0d9798c920f5d4f6270656ba090477add6342b2e0e7b81be04c8
pcre2-utf16-10.40-2.el9.i686.rpm
c1099697afc6439124ac7367f526467d1816580175278833363fa4b5a1810111
pcre2-utf16-10.40-2.el9.x86_64.rpm
4bcb1905ee28cf81c9c273435de89ca0bc61d673513602545a388728527011c2
pcre2-utf32-10.40-2.el9.i686.rpm
2820beee5519fcad7a391e7de154a1b0632f926d08744b4b363d9d057295fcd2
pcre2-utf32-10.40-2.el9.x86_64.rpm
908174188fe078b154cd985f63e6abcd7627335c596cefbe967231b48323b929
RLSA-2022:8317
Moderate: samba security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
The following packages have been upgraded to a later upstream version: samba (4.16.4). (BZ#2077487)
Security Fix(es):
* samba: server memory information leak via SMB1 (CVE-2022-32742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
samba-client-4.16.4-101.el9.x86_64.rpm
269b2f991012b5fb98d7ec6790bfdd6333c7752da28de7c2c74ecbc31f55cc71
samba-krb5-printing-4.16.4-101.el9.x86_64.rpm
1b213b164924644c330236ea917bc1a38e454ff27736f19e8117a256f92b33a6
samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm
16e17079edb7614b36eeaf3dc7a97cdb2927b416c8530e085c6105806668da6f
samba-winbind-clients-4.16.4-101.el9.x86_64.rpm
89f7f7078de542c68c4f8e59fb8419a4ecb9f7f25b3aedb2989a45d8152853e5
samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpm
89cb41e28112f137bd722450c38d6444fe6d3067fa86dd08af5e97f8eaf51969
samba-winexe-4.16.4-101.el9.x86_64.rpm
ae286f5a98c6c83d849d64287501c959f03ef5f0bca494caca68efc380b554ad
RLBA-2022:8321
tuned bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tuned-gtk-2.19.0-1.el9.noarch.rpm
1c9ddb0f97692ca12aaaab8774e9a3bd2f9c2ece51a83e6af3877d7f40e6b420
tuned-profiles-atomic-2.19.0-1.el9.noarch.rpm
45f3a2076de14cde1076d567ea4c742bcdf4940c55b8aa94c3d00da687a9e541
tuned-profiles-mssql-2.19.0-1.el9.noarch.rpm
ef81a0b00fce912b74d0acd6f89c62a2c8fb9a97d0a4e9cd6ebc1bc9547dfbee
tuned-profiles-oracle-2.19.0-1.el9.noarch.rpm
1f2860569d3e452cae234fdd9daa3599c569eb80720d81ac205b2ccbd88f7bb7
tuned-profiles-postgresql-2.19.0-1.el9.noarch.rpm
5e72b3d9f2f34210e8b7daf0fbfc56e296db5b5bf8c2c9f73d3e14bb2838f192
tuned-profiles-spectrumscale-2.19.0-1.el9.noarch.rpm
f43fa461844b121b04d606501c6fdad5ed4879298a246e840c7f129b97fa2d95
tuned-utils-2.19.0-1.el9.noarch.rpm
5e797cef9186c9d8cf23e4939d0c121155ee39573d91221ec4112be783e2dd99
RLBA-2022:8324
lksctp-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lksctp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lksctp-tools-devel-1.0.19-2.el9.i686.rpm
1adaf0305856a05ba35c417687800b82104dbd135aee0e4907e71ddc528c98d8
lksctp-tools-devel-1.0.19-2.el9.x86_64.rpm
bf2e756643f8a88569b72930c7a44ef9b1bd76826798d43bd77c11b772f2a6b7
lksctp-tools-doc-1.0.19-2.el9.x86_64.rpm
b668730b3ef6fc60ff22801aa6e25e9e2c7813e3ad51109bfd987dd136cb2747
RLBA-2022:8335
policycoreutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
policycoreutils-dbus-3.4-4.el9.noarch.rpm
6c622e89c42463a5f91ea15d64e6ea77da6f0ff1a652ab81c0d2653a00f9be33
policycoreutils-devel-3.4-4.el9.i686.rpm
a0203511190d9d5b61d16272056f6dfbd679fcaf7ab45f2d26f2552ff7f58b48
policycoreutils-devel-3.4-4.el9.x86_64.rpm
dabec59ce4c4279412b09f5d1b3ee6504c4fe5384e911b30e4f199b4c345fe85
policycoreutils-gui-3.4-4.el9.noarch.rpm
62180abb4a616c3372be379dbfa9872062d6dcc5a45123f7d0f564d7854b3d8e
policycoreutils-python-utils-3.4-4.el9.noarch.rpm
49fe78cc3fc417c1858ffc7a368ca19a422f6188bc56c54b09ee5831a35a8bd4
policycoreutils-sandbox-3.4-4.el9.x86_64.rpm
b7e170aea02be2850de6f0c709a3b174b289c6e8b827e84de8ac4cac13e944e4
python3-policycoreutils-3.4-4.el9.noarch.rpm
430e5acf1f2dcecf99a19b766468aa113735ed360afa705f2d67538012f1256d
RLBA-2022:8336
libselinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libselinux-devel-3.4-3.el9.i686.rpm
fd8175819491a9c460dbddfebfe1cf09d86c9a840e0d9a0c82dd9cd5a91e9a00
libselinux-devel-3.4-3.el9.x86_64.rpm
5bf91e732d37861a8069181e07e2c9c406f1a7d9c9f94f2817438ae5640bebd3
libselinux-ruby-3.4-3.el9.x86_64.rpm
90423ca8fdb79b4269929514febcbeb6ab67173754808603b15294a8bb74095e
python3-libselinux-3.4-3.el9.x86_64.rpm
82504a744c65bb0497e22a97b5c5f82f61d6bfefcdd4e6d9e97810316a2357fc
RLBA-2022:8337
libsepol bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsepol-devel-3.4-1.1.el9.i686.rpm
5f70ccee6c6ef01c4d30520cf151e2a140965e8eba80b8fe54e6769aafd238e2
libsepol-devel-3.4-1.1.el9.x86_64.rpm
310ec23e55c83373715a04f6d0d2772584ddda1328efd84f3c57941c37aae053
libsepol-utils-3.4-1.1.el9.x86_64.rpm
3d14da387d8ac4f4cc31cd21f3f78ede3b40835f58575ce4aa6635694951ecb6
RLSA-2022:8340
Moderate: freetype security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for freetype.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404)
* FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405)
* Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freetype-devel-2.10.4-9.el9.i686.rpm
b3234e2b8c4a10a81a68fd3dda3c03c8c2088b92467a34ff55a65532e94667d6
freetype-devel-2.10.4-9.el9.x86_64.rpm
7318ee2e07a945a3604463edcdeb61175819b00326d008084c8fd2ab04ef92ba
RLEA-2022:8344
libnvme bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnvme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnvme-1.0-5.el9.x86_64.rpm
d4cf64c80090cff21b408d28066ef47251b765f0cb7fee14ce7d7d0540cc442a
RLBA-2022:8348
setools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setools-4.4.0-5.el9.x86_64.rpm
213804d0de4b30e55c0df9709a8b453271b0a9c3a8490c89743ea5a51534a214
setools-console-analyses-4.4.0-5.el9.x86_64.rpm
318f503c1d342a9d36ae213bbd1b313098c362de31df0ce5f59ca178b07dfd28
setools-gui-4.4.0-5.el9.x86_64.rpm
ef8bee7b3a66ed8ec446519c04714f2731c9301bc1f239b430d3907edb4df0d2
RLBA-2022:8349
iptables bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iptables-devel-1.8.8-4.el9.i686.rpm
9c67a1c58563c3f2bbc918c03d709800efc48de8714061ce10c842072e50323a
iptables-devel-1.8.8-4.el9.x86_64.rpm
788a79d8144d5225e8d4e22d512563b1381096bf3f0f8bc0ac43585f6b923684
iptables-nft-services-1.8.8-4.el9.noarch.rpm
740e2ff608d71b50f74a875dcd843bb1391b325e5a344d3a8115d9bff50cb33e
RLBA-2022:8352
pygobject3 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pygobject3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-gobject-3.40.1-6.el9.x86_64.rpm
76f8dee16b2c0ce33de8108db7be9041668ed88c8d8af8d5b7f3f824d2b6708e
RLBA-2022:8357
ndctl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ndctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
daxctl-71.1-7.el9.x86_64.rpm
39586bf871b5140109b1b60372858c558219240326a90a0014a40608e7487b96
daxctl-devel-71.1-7.el9.i686.rpm
64270d6abdcd45e6f8ab690bfc974267429440fc247b01d19b06b48566ff8721
daxctl-devel-71.1-7.el9.x86_64.rpm
2146c616a30188ebffa7592aef6e850adb0fa3ec061e46e71d137c60c75d01d7
ndctl-devel-71.1-7.el9.i686.rpm
06f743d9ffde417ae32134382c94c498f10aaaa285e4b1125115463529b196a5
ndctl-devel-71.1-7.el9.x86_64.rpm
32e49ebc9a46c37cf793e8067bc133205c1cc82909b213b89e325834adb08e05
RLBA-2022:8358
lvm2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lvm2-dbusd-2.03.16-3.el9.noarch.rpm
3e98db639ebc15c012fbed761a3b270a3d3a4fb47fc8d9e4e15a45dff9db27aa
lvm2-lockd-2.03.16-3.el9.x86_64.rpm
23b3dbe8343622f5ed9a9ee9526293de542e763f7a70261039c89b1a717635d3
RLSA-2022:8361
Moderate: e2fsprogs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for e2fsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
e2fsprogs-devel-1.46.5-3.el9.i686.rpm
07388b83d035f28482d7cefa81db9f31802277232ee69d1cc0b4df46fc7b37f1
e2fsprogs-devel-1.46.5-3.el9.x86_64.rpm
3aa34006224cc6715de275def35c6029b5c9a6ffc1f60bb4ef509edc73842be8
libcom_err-devel-1.46.5-3.el9.i686.rpm
fe2f160e6762d3c7bf8049d188bf2f3b6870f34a9824351ff04f325601da993c
libcom_err-devel-1.46.5-3.el9.x86_64.rpm
51a17ac00ef7784ab84df2d685ea05ebb759697ee231ceddecd3f77cc1258056
RLBA-2022:8367
iscsi-initiator-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-iscsi-initiator-utils-6.2.1.4-3.git2a8f9d8.el9.x86_64.rpm
b83bdee93bb55251aae331c4de72992904343d8a7b09bf1a82f5101ef4fb3c7e
RLBA-2022:8375
openssh bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openssh-askpass-8.7p1-24.el9_1.x86_64.rpm
c9ee7509274f9bf535ba0d0d31a437976e974e41f1c88d70c4cbecd79d4ff44f
pam_ssh_agent_auth-0.10.4-5.24.el9_1.x86_64.rpm
a99122dc4f324bc279cfc5b8e463a89a4ab7f46346fbed6401faf1e73de3a03f
RLBA-2022:8376
nfs-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nfs-utils-coreos-2.5.4-15.el9.x86_64.rpm
f936cd0c52c81f3d06cb803767c1619745c775feee6cd95bac46d2f948814350
nfsv4-client-utils-2.5.4-15.el9.x86_64.rpm
3055d3fabad65a7c4e3d48692a0b93169110b66772c46e052c5177e31de03548
RLBA-2022:8377
libarchive bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libarchive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bsdtar-3.5.3-3.el9.x86_64.rpm
4ded2e97cd2c07212049de76e085f931f103f82a8abefe3e7daf7f74e9557ec7
RLBA-2022:8378
tcl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tcl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tcl-devel-8.6.10-7.el9.x86_64.rpm
373bd599728b78898e1eae2ba5947c51c973abc7cbf71078d885886df4ca587f
tcl-doc-8.6.10-7.el9.noarch.rpm
6b616d9c88ea5f442cee9b48f9c7c745b9eefe4a3c9bb7cf2934f71923ca3926
RLBA-2022:8379
dracut bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dracut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dracut-caps-057-13.git20220816.el9.x86_64.rpm
d896ca63bb9c171ee48d99bd2829d043df4f474c41201f3060b434b9347ef739
dracut-live-057-13.git20220816.el9.x86_64.rpm
ca6c6d538de824614165db28e1b9c34368079dcb77b536b94f305d01b30a6126
RLBA-2022:8382
lshw bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lshw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lshw-gui-B.02.19.2-9.el9.x86_64.rpm
438d5338c05ab109a7280ae817e5e586c74e8ccd178b24052031e52c3e13d9b2
RLBA-2022:8383
cups bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-2.3.3op2-16.el9.x86_64.rpm
dba44af2e13b0ec0a5bd68a9eed4a6bcbefce317fe13d7864917d8bc91977276
cups-client-2.3.3op2-16.el9.x86_64.rpm
5ccd0545ab3ea672bcb2f408d396edfc062d7dd8e6974b0900e0299affa243d0
cups-devel-2.3.3op2-16.el9.i686.rpm
f690fe106819a8f0c8cc1f3c5f8abfc534994a636249ce673fa56a47a6307b3f
cups-devel-2.3.3op2-16.el9.x86_64.rpm
19cddbe902b265394e1b5dbfddd2dbfaf24e482f482918789ab370eb355d0b1b
cups-filesystem-2.3.3op2-16.el9.noarch.rpm
d7c395d05098b6949e66ca22cc1ba8e4799f3ca2b56a9c35e0853ff94b4c0064
cups-ipptool-2.3.3op2-16.el9.x86_64.rpm
6353be85cb23f0ac73e50f00c7aafb2dafac5e396ac560dbb24ad19d04fa4014
cups-lpd-2.3.3op2-16.el9.x86_64.rpm
6f942d8b03112fd536bc834c3c73bc284771d7043b31aa15de19bc3779d514b4
cups-printerapp-2.3.3op2-16.el9.x86_64.rpm
520f2d1cc64591bd57273ed9cdbf7d32c5f8b53c566ab59653854d65d7ddc2aa
RLSA-2022:8384
Moderate: harfbuzz security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for harfbuzz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HarfBuzz is an implementation of the OpenType Layout engine.
Security Fix(es):
* harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc (CVE-2022-33068)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
harfbuzz-devel-2.7.4-8.el9.i686.rpm
c5f1ec66bd9b88f450e60402ab5e0f69b7b5b5ea3656caf2c104f59ec1b49a66
harfbuzz-devel-2.7.4-8.el9.x86_64.rpm
10d199f02e1d51b7b9cd73b54101f5481a245703fabaae9a8b3b2c255477983c
harfbuzz-icu-2.7.4-8.el9.i686.rpm
10aef92b251b1257110d8f5f2d394c61b1a6b7b8bc31feb543c6526e18c9f41a
harfbuzz-icu-2.7.4-8.el9.x86_64.rpm
e169468fddfbeae31d8bec6b50514a13b3cac0b98185f006a385e5fa501a4ba1
RLBA-2022:8388
bluez bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bluez.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bluez-cups-5.64-2.el9.x86_64.rpm
8a8e71c10ae2f0c541e9ee8a52ea0f1143c1dd6211594aa7019bf412cabfcb73
bluez-obexd-5.64-2.el9.x86_64.rpm
e18742504f5ce0356eddd3261328686ae389c9d2be991ee60f0b740fc14362fd
RLBA-2022:8389
firewalld bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firewalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
firewall-applet-1.1.1-3.el9.noarch.rpm
132cfd331c126e6c7f57780ddf807fbce3818c83aa80400a7b7a68ccc3ced384
firewall-config-1.1.1-3.el9.noarch.rpm
513101f93d671366a0bf846ec3dd60e79c01443b9e0dbd2d064294f7b58b4e37
RLEA-2022:8391
RDMA stack bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, opa-fm, opa-ff, eth-tools, libfabric.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
eth-tools-basic-11.3.0.0-1.el9.x86_64.rpm
e8fca5f6410b3cc8baed2f67126cb46c3f87f92e075fb8aa92d4d1a98b2b964b
eth-tools-fastfabric-11.3.0.0-1.el9.x86_64.rpm
15a4716dfe7ebb61e8092c1cb92806bd3979d9477c308575804fffef38cfefee
fabtests-1.15.1-1.el9.x86_64.rpm
1ce75ca3934c9eabaf501f1463f6eb500ab196152cf93d9cc26e90c3eaed3994
ibacm-41.0-3.el9.i686.rpm
90aac98e505537b1987a974afacb3f46678850293ddce51c091c32b5b2a758df
infiniband-diags-41.0-3.el9.i686.rpm
d0d4cd2b10e1e7f557861d9a123543a9656a8bf3b619ee388b76328a05f9e9c1
infiniband-diags-41.0-3.el9.x86_64.rpm
b62e80e9e0e1e7718fdadcffaca96a26e752235a9a205e91aa14eaae9c608c96
libfabric-1.15.1-1.el9.i686.rpm
e682db4fd862722330a4c9648d677d0a52998a5779bb9fdd92f35ca0ae5128e7
libfabric-1.15.1-1.el9.x86_64.rpm
95bcb9bdec56e40eab42bb41dcd7208a6f67def03f76d4475abb55293fdd5e87
libpsm2-11.2.229-2.el9.x86_64.rpm
d7ba242dc79688fd5a9e02dfdea06c572d443fc5cb01b47e25bb0a02fdc94d4b
libvma-9.6.4-1.el9.x86_64.rpm
2cbfed023436d40c56456d5874bbfc98019d5bd8acaa9a63521b501d9946bead
libvma-utils-9.6.4-1.el9.x86_64.rpm
13e5b68493f9016c100305958bc1dddb204e7dd855d029705f5ce2a89696be1b
mstflint-4.21.0-1.el9.x86_64.rpm
eb584401fae30c96206656897be0123f26f98302c4fdc95cf71f6107873f5740
opa-address-resolution-10.11.1.3.1-1.el9.x86_64.rpm
dd375db5b04de49b93593331e777fd594604130d1462e80f4b682e2d1821e107
opa-basic-tools-10.11.1.3.1-1.el9.x86_64.rpm
5904ecbe2bdf0783bda5193dfdda0e916f90b5e7244933fd72b4ffa05b02f2d4
opa-fastfabric-10.11.1.3.1-1.el9.x86_64.rpm
5e4f2ce19be5e6a8b6623c730abb332f8209bb3074e6610242c7ea8c663910e4
opa-fm-10.11.1.3.1-1.el9.x86_64.rpm
ded9de152502d7ea969ed3a15f0919dc8c5a9c44c80f22041cbbbf2278a25a62
opa-libopamgt-10.11.1.3.1-1.el9.x86_64.rpm
345f3052cf46e449e31309e7180ce19ff55dd06e13315239971375876145de11
python3-pyverbs-41.0-3.el9.x86_64.rpm
f07cecfa45bef993bae2d065bc79ed2d7bb8d015cdc3d497dad081806dff80ee
rdma-core-devel-41.0-3.el9.i686.rpm
9059e3159391e594ceaad159dd3643e71309863a86d097b3889c32333292d93d
rdma-core-devel-41.0-3.el9.x86_64.rpm
3cd681cdc42164f5672e330f421d38ba49dd5e8ca4bd28290e579e7d4201a3da
ucx-1.13.0-1.el9.x86_64.rpm
68047a26615ebfe4776385591b1452f8dc9a3bb2ec5f3bc0d397bfc5d190cab7
ucx-cma-1.13.0-1.el9.x86_64.rpm
7d8aada8d71e77c77222ac71824c4681af905e00f4a2702e0155a696dcdbab4b
ucx-devel-1.13.0-1.el9.x86_64.rpm
8520df00d8d8544565c82273ce686406a48185d9645614864fce13afdeb487ec
ucx-ib-1.13.0-1.el9.x86_64.rpm
597c4f9d048c113de5202dd2b6503d2e0b3a7fa3c9661a63127b4b56be040fea
ucx-rdmacm-1.13.0-1.el9.x86_64.rpm
a3aadb00dc8dbc7504178005e9f3c1912637c02f87d1f732a771a7d86cb297d4
RLBA-2022:8395
fwupd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fwupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fwupd-plugin-flashrom-1.7.9-1.el9.x86_64.rpm
e6ed42e7c4f6f4a7689346ad5973c64ac82b538c8177ec166c785ea5d2750b38
RLBA-2022:8397
syslinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for syslinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
syslinux-tftpboot-6.04-0.20.el9.noarch.rpm
994537980594190c9502c844b578e6ceeb2581449cf0ddda5ae55a250d7866ae
RLBA-2022:8404
util-linux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblkid-devel-2.37.4-9.el9.i686.rpm
316bf890297cbf97bb697eb2da35a687807ed48b277e7139f58597efc6102967
libblkid-devel-2.37.4-9.el9.x86_64.rpm
35441be62b604902e2b7318c28dc44d74695d9d3d710518e61fb2384c84ba4fe
libmount-devel-2.37.4-9.el9.i686.rpm
efc3eb9367ca28d9f11e0c5acb33b4862352bfdbf4de591e8cd1c2d3440b5ba8
libmount-devel-2.37.4-9.el9.x86_64.rpm
04f56834c1cbae3d13a9ac7bc9ff54d256ba1d782d98a58e32420f39e2007034
libuuid-devel-2.37.4-9.el9.i686.rpm
bf1123b3cbbb9aa9d1df986f82e0580e6ff671cf9b08b4e01310b73e515b35f9
libuuid-devel-2.37.4-9.el9.x86_64.rpm
62d22b5a35d072dcfa99537d82490467a99acd3407edba9ae026c89726ad9da2
python3-libmount-2.37.4-9.el9.x86_64.rpm
1452fb7e7b70309dab9807d7fdbf2b27a332f1b52b91717515ebd6f615a1aaac
uuidd-2.37.4-9.el9.x86_64.rpm
5817fbcd78f0bbe3f77009c6242381ab055d3db925e088bda90e630c2c361c44
RLBA-2022:8406
file bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-file-magic-5.39-10.el9.noarch.rpm
eafbe173068a90394c9fe7b2d3b21b6a156c9ac4d11de3b49cd289a579b14a24
RLBA-2022:8424
libreoffice:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, mariadb-connector-c, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, yajl, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm
4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad
boost-1.75.0-8.el9.x86_64.rpm
2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f
boost-atomic-1.75.0-8.el9.x86_64.rpm
52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409
boost-chrono-1.75.0-8.el9.x86_64.rpm
784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f
boost-container-1.75.0-8.el9.x86_64.rpm
f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b
boost-context-1.75.0-8.el9.x86_64.rpm
5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a
boost-contract-1.75.0-8.el9.x86_64.rpm
7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434
boost-coroutine-1.75.0-8.el9.x86_64.rpm
1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75
boost-date-time-1.75.0-8.el9.x86_64.rpm
d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98
boost-devel-1.75.0-8.el9.x86_64.rpm
445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd
boost-fiber-1.75.0-8.el9.x86_64.rpm
c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369
boost-filesystem-1.75.0-8.el9.x86_64.rpm
9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d
boost-graph-1.75.0-8.el9.x86_64.rpm
0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5
boost-iostreams-1.75.0-8.el9.x86_64.rpm
fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585
boost-json-1.75.0-8.el9.x86_64.rpm
4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f
boost-locale-1.75.0-8.el9.x86_64.rpm
675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3
boost-log-1.75.0-8.el9.x86_64.rpm
1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720
boost-math-1.75.0-8.el9.x86_64.rpm
a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161
boost-nowide-1.75.0-8.el9.x86_64.rpm
85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1
boost-numpy3-1.75.0-8.el9.x86_64.rpm
00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b
boost-program-options-1.75.0-8.el9.x86_64.rpm
a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e
boost-python3-1.75.0-8.el9.x86_64.rpm
872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731
boost-random-1.75.0-8.el9.x86_64.rpm
b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098
boost-regex-1.75.0-8.el9.x86_64.rpm
7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c
boost-serialization-1.75.0-8.el9.x86_64.rpm
73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f
boost-stacktrace-1.75.0-8.el9.x86_64.rpm
884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a
boost-system-1.75.0-8.el9.x86_64.rpm
b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f
boost-test-1.75.0-8.el9.x86_64.rpm
1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487
boost-thread-1.75.0-8.el9.x86_64.rpm
55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989
boost-timer-1.75.0-8.el9.x86_64.rpm
fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162
boost-type_erasure-1.75.0-8.el9.x86_64.rpm
736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383
boost-wave-1.75.0-8.el9.x86_64.rpm
555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba
Box2D-2.4.1-7.el9.x86_64.rpm
20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567
clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm
37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836
clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm
cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c
dconf-0.40.0-6.el9.x86_64.rpm
094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f
flute-1.3.0-27.OOo31.el9.noarch.rpm
59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308
google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm
e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4
google-noto-fonts-common-20201206-4.el9.noarch.rpm
31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd
google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm
bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7
google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm
beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb
google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm
8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f
google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm
c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313
google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm
1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9
google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm
113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0
google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm
a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d
google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm
f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3
google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm
9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579
google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm
574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802
google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm
b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba
google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm
d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8
google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm
bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17
google-noto-sans-fonts-20201206-4.el9.noarch.rpm
28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a
google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm
b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a
google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm
66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48
google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm
5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce
google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm
870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6
google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm
bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953
google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm
a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e
google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm
91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91
google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm
46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f
google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm
1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb
google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm
019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3
google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm
d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c
google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm
ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761
google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm
6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899
google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm
a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b
google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm
d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f
google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm
bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902
google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm
f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba
google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm
bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3
google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm
2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e
google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm
e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420
google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm
ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d
google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm
6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f
google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm
de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e
google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm
df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d
google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm
34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c
google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm
e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137
google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm
387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3
google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm
f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b
google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f
google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm
c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd
google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm
5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35
google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm
46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730
google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm
99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b
google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm
9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7
google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm
525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da
google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm
b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51
google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm
866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334
google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm
0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c
google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm
ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd
google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm
ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911
google-noto-serif-fonts-20201206-4.el9.noarch.rpm
310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7
google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm
254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f
google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm
c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2
google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm
c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d
google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm
fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183
google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e
google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm
98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b
gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm
0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4
gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm
d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457
gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm
ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1
gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm
1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13
hunspell-af-0.20080825-24.el9.noarch.rpm
af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c
hunspell-ar-3.5-15.el9.noarch.rpm
c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0
hunspell-as-1.0.3-25.el9.noarch.rpm
72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48
hunspell-bg-4.3-22.el9.noarch.rpm
3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793
hunspell-bn-1.0.0-17.el9.noarch.rpm
7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e
hunspell-br-0.15-9.el9.noarch.rpm
ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3
hunspell-ca-2.3-19.el9.noarch.rpm
98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d
hunspell-cs-20080822-16.el9.noarch.rpm
d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784
hunspell-cy-0.20040425-26.el9.noarch.rpm
6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469
hunspell-da-1.7.42-17.el9.noarch.rpm
396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d
hunspell-de-0.20161207-9.el9.noarch.rpm
3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495
hunspell-el-0.9-9.el9.noarch.rpm
3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395
hunspell-es-2.3-10.el9.noarch.rpm
0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713
hunspell-es-AR-2.3-10.el9.noarch.rpm
257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2
hunspell-es-BO-2.3-10.el9.noarch.rpm
ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de
hunspell-es-CL-2.3-10.el9.noarch.rpm
715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb
hunspell-es-CO-2.3-10.el9.noarch.rpm
1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446
hunspell-es-CR-2.3-10.el9.noarch.rpm
1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4
hunspell-es-CU-2.3-10.el9.noarch.rpm
3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5
hunspell-es-DO-2.3-10.el9.noarch.rpm
8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310
hunspell-es-EC-2.3-10.el9.noarch.rpm
0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5
hunspell-es-ES-2.3-10.el9.noarch.rpm
0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4
hunspell-es-GT-2.3-10.el9.noarch.rpm
5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d
hunspell-es-HN-2.3-10.el9.noarch.rpm
c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81
hunspell-es-MX-2.3-10.el9.noarch.rpm
6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0
hunspell-es-NI-2.3-10.el9.noarch.rpm
76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6
hunspell-es-PA-2.3-10.el9.noarch.rpm
64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68
hunspell-es-PE-2.3-10.el9.noarch.rpm
1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c
hunspell-es-PR-2.3-10.el9.noarch.rpm
ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d
hunspell-es-PY-2.3-10.el9.noarch.rpm
b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0
hunspell-es-SV-2.3-10.el9.noarch.rpm
6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd
hunspell-es-US-2.3-10.el9.noarch.rpm
128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550
hunspell-es-UY-2.3-10.el9.noarch.rpm
a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73
hunspell-es-VE-2.3-10.el9.noarch.rpm
d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8
hunspell-et-0.20030606-27.el9.noarch.rpm
801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90
hunspell-eu-5.1-4.el9.noarch.rpm
537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38
hunspell-fa-0.20070116-26.el9.noarch.rpm
4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c
hunspell-fr-6.2-9.el9.noarch.rpm
c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496
hunspell-ga-5.0-10.el9.noarch.rpm
5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73
hunspell-gl-0.20080515-24.el9.noarch.rpm
21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28
hunspell-gu-1.0.0-17.el9.noarch.rpm
66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154
hunspell-he-1.4-15.el9.x86_64.rpm
8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45
hunspell-hi-1.0.0-17.el9.noarch.rpm
bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507
hunspell-hr-0.20040608-25.el9.noarch.rpm
63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275
hunspell-hu-1.6.1-21.el9.noarch.rpm
ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca
hunspell-id-0.20040812-24.el9.noarch.rpm
436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7
hunspell-it-2.4-0.25.20070901.el9.noarch.rpm
c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f
hunspell-kk-1.1-22.el9.noarch.rpm
c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417
hunspell-kn-1.0.3-24.el9.noarch.rpm
57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab
hunspell-lv-1.0.0-15.el9.noarch.rpm
f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f
hunspell-ko-0.7.0-12.el9.noarch.rpm
70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412
hunspell-lt-1.2.1-26.el9.noarch.rpm
1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5
hunspell-ml-0.1-26.el9.noarch.rpm
775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff
hunspell-mr-1.0.0-17.el9.noarch.rpm
91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650
hunspell-nb-2.0.10-15.el9.noarch.rpm
2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae
hunspell-nl-2.20.19-5.el9.noarch.rpm
e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7
hunspell-nn-2.0.10-15.el9.noarch.rpm
b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30
hunspell-nr-0.20091030-22.el9.noarch.rpm
1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16
hunspell-nso-0.20091201-22.el9.noarch.rpm
bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005
hunspell-or-1.0.0-17.el9.noarch.rpm
a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f
hunspell-pa-1.0.0-17.el9.noarch.rpm
a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b
hunspell-pl-0.20180707-9.el9.noarch.rpm
bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3
hunspell-pt-0.20130125-18.el9.noarch.rpm
80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b
hunspell-ro-3.3.7-20.el9.noarch.rpm
cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f
hunspell-ru-0.99g5-21.el9.noarch.rpm
8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4
hunspell-si-0.2.1-24.el9.noarch.rpm
1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783
hunspell-sk-0.20110228-20.el9.noarch.rpm
0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71
hunspell-sl-0.20070127-26.el9.noarch.rpm
29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd
hunspell-sr-0.20130330-18.el9.noarch.rpm
1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e
hunspell-ss-0.20091030-22.el9.noarch.rpm
f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06
hunspell-st-0.20091030-22.el9.noarch.rpm
19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858
hunspell-sv-2.28-16.el9.noarch.rpm
e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe
hunspell-ta-1.0.0-17.el9.noarch.rpm
328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764
hunspell-te-1.0.0-17.el9.noarch.rpm
f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69
hunspell-th-0.20061212-25.el9.noarch.rpm
400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38
hunspell-tn-0.20150904-9.el9.noarch.rpm
34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8
hunspell-ts-0.20110323.1-9.el9.noarch.rpm
d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3
hunspell-uk-1.8.0-9.el9.noarch.rpm
48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f
hunspell-ve-0.20091030-22.el9.noarch.rpm
98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852
hunspell-xh-0.20091030-22.el9.noarch.rpm
f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf
hunspell-zu-0.20100126-24.el9.noarch.rpm
c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc
hyphen-2.8.8-17.el9.x86_64.rpm
6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994
hyphen-af-0-0.25.20080714svn.el9.noarch.rpm
6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c
hyphen-as-0.7.0-19.el9.noarch.rpm
62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7
hyphen-bg-4.3-21.el9.noarch.rpm
d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67
hyphen-bn-0.7.0-19.el9.noarch.rpm
ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed
hyphen-ca-0.9.3-22.el9.noarch.rpm
6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b
hyphen-cs-20080822-16.el9.noarch.rpm
18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a
hyphen-cy-0.20110620-20.el9.noarch.rpm
21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0
hyphen-da-0.20070903-25.el9.noarch.rpm
3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6
hyphen-de-0.20060120-27.el9.noarch.rpm
215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66
hyphen-devel-2.8.8-17.el9.x86_64.rpm
c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d
hyphen-el-0.20051018-25.el9.noarch.rpm
ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5
hyphen-en-2.8.8-17.el9.noarch.rpm
17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49
hyphen-es-2.3-11.el9.noarch.rpm
1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218
hyphen-et-0.20030606-27.el9.noarch.rpm
4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab
hyphen-eu-0.20190406-2.el9.noarch.rpm
cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2
hyphen-fa-0.20130404-17.el9.noarch.rpm
974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24
hyphen-fr-3.0-10.el9.noarch.rpm
ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28
hyphen-ga-0.20040220-24.el9.noarch.rpm
e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc
hyphen-gl-0.99-23.el9.noarch.rpm
7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1
hyphen-gu-0.7.0-19.el9.noarch.rpm
1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6
hyphen-hi-0.7.0-19.el9.noarch.rpm
531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5
hyphen-hr-0.20040608-25.el9.noarch.rpm
c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f
hyphen-hu-0.20090612-27.el9.noarch.rpm
4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b
hyphen-id-0.20040812-24.el9.noarch.rpm
a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6
hyphen-it-0.20071127-26.el9.noarch.rpm
201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9
hyphen-kn-0.7.0-19.el9.noarch.rpm
084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41
hyphen-lt-0.20100531-21.el9.noarch.rpm
2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3
hyphen-lv-1.0.0-15.el9.noarch.rpm
3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa
hyphen-ml-0.7.0-19.el9.noarch.rpm
963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038
hyphen-mr-0.7.0-19.el9.noarch.rpm
99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0
hyphen-nb-2.0.10-15.el9.noarch.rpm
fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5
hyphen-nl-0.20050617-26.el9.noarch.rpm
4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f
hyphen-nn-2.0.10-15.el9.noarch.rpm
1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55
hyphen-or-0.7.0-20.el9.noarch.rpm
8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d
hyphen-pa-0.7.0-19.el9.noarch.rpm
15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91
hyphen-pl-0.20060726-25.el9.noarch.rpm
d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef
hyphen-pt-0.20021021-25.el9.noarch.rpm
0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a
hyphen-ro-3.3.6-21.el9.noarch.rpm
d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e
hyphen-ru-0.20200325-4.el9.noarch.rpm
ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6
hyphen-sk-0.20031227-26.el9.noarch.rpm
7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34
hyphen-sl-0.20070127-24.el9.noarch.rpm
9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a
hyphen-sr-0.20130330-18.el9.noarch.rpm
441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43
hyphen-sv-1.00.1-26.el9.noarch.rpm
ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94
hyphen-ta-0.7.0-19.el9.noarch.rpm
2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66
hyphen-te-0.7.0-19.el9.noarch.rpm
78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df
hyphen-uk-0.20030903-24.el9.noarch.rpm
c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7
hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm
04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603
javapackages-filesystem-6.0.0-3.el9.noarch.rpm
b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3
javapackages-tools-6.0.0-3.el9.noarch.rpm
bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181
libabw-0.1.3-7.el9.x86_64.rpm
57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09
libbase-1.1.3-31.el9.noarch.rpm
0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738
libcdr-0.1.7-3.el9.x86_64.rpm
416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22
libcmis-0.5.2-12.el9.x86_64.rpm
a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76
libepubgen-0.1.1-9.el9.x86_64.rpm
cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398
libetonyek-0.1.10-2.el9.x86_64.rpm
a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806
libexttextcat-3.4.5-11.el9.x86_64.rpm
693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245
libfontenc-1.1.3-17.el9.x86_64.rpm
867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23
libfonts-1.1.3-35.el9.noarch.rpm
6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081
libformula-1.1.3-32.el9.noarch.rpm
bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b
libfreehand-0.1.2-11.el9.x86_64.rpm
443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d
liblayout-0.2.10-25.el9.noarch.rpm
15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291
libloader-1.1.3-32.el9.noarch.rpm
76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1
libmspub-0.1.4-17.el9.x86_64.rpm
134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e
libmwaw-0.3.21-1.el9.x86_64.rpm
5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927
libnumbertext-1.0.6-4.el9.x86_64.rpm
ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab
libodfgen-0.1.8-4.el9.x86_64.rpm
0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2
liborcus-0.16.1-8.el9.x86_64.rpm
8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec
libpagemaker-0.0.4-13.el9.x86_64.rpm
aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542
libqxp-0.0.2-11.el9.x86_64.rpm
68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71
libreoffice-voikko-5.0-10.el9.x86_64.rpm
d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0
librepository-1.1.3-31.el9.noarch.rpm
7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378
librevenge-0.0.4-22.el9.x86_64.rpm
08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007
libserializer-1.1.2-30.el9.noarch.rpm
d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68
libshout-2.4.3-7.el9.x86_64.rpm
4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435
libstaroffice-0.0.7-5.el9.x86_64.rpm
bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783
libv4l-1.20.0-5.el9.x86_64.rpm
959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3
libvisio-0.1.7-9.el9.x86_64.rpm
ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324
libvoikko-4.3-7.el9.x86_64.rpm
700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a
libwpd-0.10.3-10.el9.x86_64.rpm
4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215
libwpg-0.3.3-8.el9.x86_64.rpm
e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562
libwps-0.4.12-4.el9.x86_64.rpm
62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0
libzmf-0.0.2-18.el9.x86_64.rpm
fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b
lksctp-tools-devel-1.0.19-2.el9.x86_64.rpm
bf2e756643f8a88569b72930c7a44ef9b1bd76826798d43bd77c11b772f2a6b7
lksctp-tools-doc-1.0.19-2.el9.x86_64.rpm
b668730b3ef6fc60ff22801aa6e25e9e2c7813e3ad51109bfd987dd136cb2747
lpsolve-5.5.2.0-28.el9.x86_64.rpm
8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b
mariadb-connector-c-3.2.6-1.el9_0.x86_64.rpm
007d48646e32a1747734871f4169495fd04ae62b670a9a5ebcca9997329f6a8c
mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm
35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f
mariadb-connector-c-devel-3.2.6-1.el9_0.x86_64.rpm
2562fbfe459c902520b792ca0827024402b856c0eab28da8df59e2bcda2bbb31
mythes-bg-4.3-21.el9.noarch.rpm
1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb
mythes-ca-1.5.0-24.el9.noarch.rpm
ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b
mythes-cs-0.20070926-27.el9.noarch.rpm
c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e
mythes-da-0.20100629.15.16-22.el9.noarch.rpm
2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233
mythes-de-0.20210302-3.el9.noarch.rpm
56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298
mythes-el-0.20070412-27.el9.noarch.rpm
a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393
mythes-en-3.0-33.el9.noarch.rpm
cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83
mythes-es-2.3-10.el9.noarch.rpm
5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2
mythes-fr-2.3-19.el9.noarch.rpm
c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb
mythes-ga-0.20071001-27.el9.noarch.rpm
ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3
mythes-hu-0.20101019-23.el9.noarch.rpm
95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967
mythes-it-2.0.9l-26.el9.noarch.rpm
c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6
mythes-lv-1.0.0-15.el9.noarch.rpm
38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264
mythes-nb-2.0.10-15.el9.noarch.rpm
e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a
mythes-nl-0.20130131-17.el9.noarch.rpm
1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121
mythes-nn-2.0.10-15.el9.noarch.rpm
17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523
mythes-pl-1.5-28.el9.noarch.rpm
ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2
mythes-pt-0.20060817-27.el9.noarch.rpm
1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36
mythes-ro-3.3-22.el9.noarch.rpm
b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7
mythes-ru-0.20070613-25.el9.noarch.rpm
9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3
mythes-sk-0.20130130-19.el9.noarch.rpm
03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed
mythes-sl-0.20130130-19.el9.noarch.rpm
620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d
mythes-sv-1.3-21.el9.noarch.rpm
9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3
mythes-uk-1.6.5-22.el9.noarch.rpm
bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d
neon-0.31.2-11.el9.x86_64.rpm
30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed
ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm
67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580
ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm
ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9
openjpeg2-2.4.0-7.el9.x86_64.rpm
380ef2db96766ecee5e15cce67f91b5d73c721672930add64bd35de5da12c6a7
pentaho-libxml-1.1.3-30.el9.noarch.rpm
d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4
pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm
561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776
poppler-21.01.0-13.el9.x86_64.rpm
15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc
poppler-cpp-21.01.0-13.el9.x86_64.rpm
054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
poppler-glib-21.01.0-13.el9.x86_64.rpm
b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40
poppler-qt5-21.01.0-13.el9.x86_64.rpm
ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163
poppler-utils-21.01.0-13.el9.x86_64.rpm
40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f
postgresql-jdbc-42.2.18-5.el9.noarch.rpm
e59b40159b9c5a040052f1cdccfc3abbc4491622c7fd656e0e5edf9d66ca8ae0
python3-libvoikko-4.3-7.el9.noarch.rpm
73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f
raptor2-2.0.15-30.el9.x86_64.rpm
e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e
rasqal-0.9.33-18.el9.x86_64.rpm
da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f
redland-1.0.17-29.el9.x86_64.rpm
487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d
sac-1.3-37.el9.noarch.rpm
4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e
taglib-1.12-6.el9.x86_64.rpm
cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10
ttmkfdir-3.0.9-65.el9.x86_64.rpm
6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6
twolame-0.3.13-19.el9.x86_64.rpm
cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f
twolame-libs-0.3.13-19.el9.x86_64.rpm
d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0
voikko-fi-2.4-5.el9.noarch.rpm
e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36
xmlsec1-1.2.29-9.el9.x86_64.rpm
ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a
xmlsec1-nss-1.2.29-9.el9.x86_64.rpm
04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2
xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm
435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679
xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm
99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd
xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm
8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f
xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm
3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2
xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm
6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001
xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm
09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90
xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm
d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445
xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm
431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6
xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm
6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b
xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm
6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039
xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm
f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c
xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm
e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d
xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm
0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434
xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm
51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4
xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm
982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669
xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm
f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d
xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm
a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec
yajl-2.1.0-21.el9.x86_64.rpm
98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de
yajl-2.1.0-21.el9_0.x86_64.rpm
0a66ac8a71ba35e7087fdea5f7fcab8fefbe6d5b4e0a3e3442d37c0066f5cadc
RLBA-2022:8449
rpm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2136770)
rocky-linux-9-x86-64-appstream-rpms
rpm-apidocs-4.16.1.3-19.el9_1.noarch.rpm
f84de4b4316328f580034a4c2cf49a45e547bb106dd37248ffa57a50d9adbffd
rpm-build-4.16.1.3-19.el9_1.x86_64.rpm
b2cb65dcf5676b8367432c49088762a3f35a67ebdcf5b50829f8c49b529934c3
rpm-cron-4.16.1.3-19.el9_1.noarch.rpm
4c3cf15444097a08bfd5fe216283672af6024b6f756b1307ee3ba86cf2dd7fe7
rpm-devel-4.16.1.3-19.el9_1.i686.rpm
37d8f29633a662fbe8d6ba5b4126b6e8ab7eb48d5403300bd6677ab3729e24f1
rpm-devel-4.16.1.3-19.el9_1.x86_64.rpm
0159f41701a0966d15a08a218c5fadbc147f9a5178ba78e290b009a973dec9c2
rpm-plugin-fapolicyd-4.16.1.3-19.el9_1.x86_64.rpm
4598210a33576198b8bbadb493836434b5f84969f087cb1ae38d4a0d507b3338
rpm-plugin-ima-4.16.1.3-19.el9_1.x86_64.rpm
65cd73befb77706ba853afee4a338aed5cfda86e66046df728a110e960cdf813
rpm-plugin-syslog-4.16.1.3-19.el9_1.x86_64.rpm
2a7708702cc92a3ae4cdce4126b34264f8826aff95e81e3857e84fe733265bff
rpm-plugin-systemd-inhibit-4.16.1.3-19.el9_1.x86_64.rpm
a2dee2e1dd3cc40049a500d021858a55128774a78b4c7effc5e8fd7cc90601cb
RLSA-2022:8493
Important: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.14-1.el9_1.1.i686.rpm
48fd68110090a368bf2f23454cd5fb4227ddd7e312101d3415b2868257198b9d
python3-devel-3.9.14-1.el9_1.1.x86_64.rpm
beabc37d468844e408deb670ef0497adc44d7a14060b9f41beb213445fbfcdff
python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm
b952c1061c4c06a74066ee00a44b763a940fffc7f5a7b373d45363581345b5de
python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm
6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279
RLSA-2022:8637
Important: krb5 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
krb5-devel-1.19.1-24.el9_1.i686.rpm
e9437d87122b41e9f67a3f8625c4bec8dd9522653dcb7f8cb351648833d8c99c
krb5-devel-1.19.1-24.el9_1.x86_64.rpm
f9dd6b0c2ad3644a89ccb7b9a0fa736e5307a265ea6b3a6176c470b3a33d039e
RLSA-2023:0282
Important: sudo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm
3c51c1e16d0fb0f70feb41a7bea3b9e142e87aca3aca6e552e75befd4761280a
RLBA-2023:0332
zlib bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix:
* Rocky Linux9.0 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2135745)
rocky-linux-9-x86-64-appstream-rpms
zlib-devel-1.2.11-35.el9_1.i686.rpm
b1c1674d907c001384daf05c9fe0eff545249472c3049f19e96c247be0aad0cd
zlib-devel-1.2.11-35.el9_1.x86_64.rpm
dc6518b2fc127ed37aaf8e32b09159dd9db328d9de7166bb2f8f24ca602f9b97
RLSA-2023:0333
Moderate: curl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for curl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: POST following PUT confusion (CVE-2022-32221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libcurl-devel-7.76.1-19.el9_1.1.i686.rpm
7ad05dc436af09c7642094ec4ad4eb00e84f3473b51d0bba0f55dbd7d76d1d33
libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm
aec15566a0f096caa322970eb819aceae4520f8feac9ed3ec46a649bc6d7ed00
RLSA-2023:0335
Moderate: dbus security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-daemon-1.12.20-7.el9_1.x86_64.rpm
e4bef9396a76a1a35f988e05cabcdbe24abba844d163e99597ae039cf500b21c
dbus-devel-1.12.20-7.el9_1.i686.rpm
ffd7cf2c7d3df426b4188a06c63711e1f96b15c29fbe33481eaa407cebfba01b
dbus-devel-1.12.20-7.el9_1.x86_64.rpm
9d945fe9e08c6a574e23be1dbe12502e233ddb7324e250cc403fa5398a5773fc
dbus-x11-1.12.20-7.el9_1.x86_64.rpm
c5b74a375b87c45afdba308b0eae7bf474754c3d7ea460d600c3acb8681f7732
RLSA-2023:0336
Moderate: systemd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: buffer overrun in format_timespan() function (CVE-2022-3821)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
systemd-devel-250-12.el9_1.1.i686.rpm
921151c64773074869b8df7f17977e220c78b208d5b2148198755ec8cfd9f3fd
systemd-devel-250-12.el9_1.1.x86_64.rpm
9561845b251615a5715cf19ae5ac180cf2f72cfd4b93e6472db40a1663802123
systemd-journal-remote-250-12.el9_1.1.x86_64.rpm
f3d437b037773dcea88ddf212091b9a55471acb33169138759be996306050b81
RLSA-2023:0337
Moderate: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.4.9-1.el9_1.1.i686.rpm
d56de768135c8173e1a48fd540d0d95c0e6f222c8ace97b3065c3bca57c2f615
expat-devel-2.4.9-1.el9_1.1.x86_64.rpm
442a1d6ce6f18fe5e24d2816d8781dd54885432cf72a77f0ab3945a68117049b
RLSA-2023:0338
Moderate: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-3.el9_1.i686.rpm
276956a8fbe2b1be327e2c1dd4357fedf3846313365a713e824d8872d988a33f
libxml2-devel-2.9.13-3.el9_1.x86_64.rpm
c53a522fe38db759678ab1c634127868fd516b781880dedee75aba109041fc7e
RLSA-2023:0339
Moderate: sqlite security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
sqlite-3.34.1-6.el9_1.i686.rpm
9458e0539f8508ed7927ad6fcca5e7d84c0dda4eedfd34c8326a370f3c6c4bc6
sqlite-3.34.1-6.el9_1.x86_64.rpm
b5a603b09425c50ed52067c2bd2fa866a68ac39a1b17086d6ce08fce1e37aa99
sqlite-devel-3.34.1-6.el9_1.i686.rpm
b59bc71172106a4722b36a0ea4d84fdd432af6c50df42c544533d9f60b6478af
sqlite-devel-3.34.1-6.el9_1.x86_64.rpm
e7949f7b0eb0ff292616f0efb3044ebf2f02b49c1123df64ffb08e6d2cf2bfd1
RLBA-2023:0341
iputils bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Bug Fix:
* annocheck reports that no compiled code found in /usr/bin and /usr/sbin (BZ#2147538)
rocky-linux-9-x86-64-appstream-rpms
iputils-ninfod-20210202-8.el9_1.1.x86_64.rpm
b968204aca3bf61196bace1dd638d5f3bd6426aa625f14d182264e9719c05463
RLBA-2023:0342
glibc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the name service
cache daemon (nscd) used by multiple programs on the system. Without these
libraries, the Linux system cannot function correctly.
Bug Fix:
* glibc: Restore IPC_64 support in sysvipc *ctl functions (BZ#2142111)
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-40.el9_1.1.i686.rpm
809dcfd1bb41816d5633c66b90ac759cbb40cdb33cff1c52bb1b114b0956e55c
glibc-devel-2.34-40.el9_1.1.x86_64.rpm
7e7b8ccf16deb632f4d20b56b0a6eda9704c6255b2c04386b9d4e65ad378fe7a
glibc-doc-2.34-40.el9_1.1.noarch.rpm
1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab
glibc-headers-2.34-40.el9_1.1.x86_64.rpm
c4edb39982fbcd3975b254a378b452ea1d73b94f8db90b01027c749c749a9e17
glibc-locale-source-2.34-40.el9_1.1.x86_64.rpm
045c95d9ff47011ee0225aea5115ddbe42fea8c3bc129b9c0d3cb2fea1a7a7e3
glibc-utils-2.34-40.el9_1.1.x86_64.rpm
be083837ee6d4762cde490f3b9cce8421f1f0d2d3d79611e7ec8df1a540d0d7a
RLSA-2023:0343
Moderate: libtasn1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtasn1-devel-4.16.0-8.el9_1.i686.rpm
454331c78e2a86c9bd8ddd28782a95dc8aa2e5309a9efd16d014f67c28e8aed8
libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm
f38461f7aab8690eab2da2769a10e23e4f7a1b28fc457ccd5879f4c321217ead
libtasn1-tools-4.16.0-8.el9_1.x86_64.rpm
be199dfca1202d1be55af3d09ff746d9f408f648785e5e29c6450c0de1d7016a
RLBA-2023:0345
authselect bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for authselect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authselect package configures authentication and identity sources from
supported profiles.
Bug Fix:
* change the default password encryption algorithm back to sha512 (BZ#2151230)
rocky-linux-9-x86-64-appstream-rpms
authselect-compat-1.2.5-2.el9_1.x86_64.rpm
829b7652bdd4b2aa1d417ef8efb8a7ed3bf2d1ea114825069cef2168c8ad98ab
RLBA-2023:0347
sssd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139870)
* SSS_CLIENT: fix thread unsafe access to get*ent structs. (BZ#2141830)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142960)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148988)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152884)
rocky-linux-9-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el9_1.3.x86_64.rpm
eccbe135e9df9e1c11bb358bf5acec78bb2b12d26be98a1e013a3170e3efce1d
RLBA-2022:2305
new packages: udica
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udica.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
udica-0.2.6-4.el9.noarch.rpm
54817f989f1f166523eeeae9442c1621f1e4c1452531c3a4833613442454e659
RLBA-2022:2309
new packages: python-psutil
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-psutil.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-psutil-5.8.0-12.el9.x86_64.rpm
6317c0906b95002754b3a21845df126114a8ce1b74651196e70c049f2b92826b
RLBA-2022:2318
new packages: libguestfs-winsupport
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libguestfs-winsupport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libguestfs-winsupport-9.0-1.el9.x86_64.rpm
7932110c60482d36a73da0788b3e77b3e5bbbf1a3037378f5897f025fbf7d0bf
RLBA-2022:2319
new packages: devhelp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for devhelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
devhelp-40.1-1.el9.x86_64.rpm
e883ade9a929826906ae1808d66dc49439b2c0386c161c5c2251828ca3660a3d
devhelp-libs-40.1-1.el9.i686.rpm
0d7308f54b62f65e89b203ac8bac0b5fe9c91b280b1858e09cec49a00f20d8d1
devhelp-libs-40.1-1.el9.x86_64.rpm
21f09ca3359a6d1f4d0b43bcf4c7ac605bb821675e5f025a9e2855b6194344fe
RLBA-2022:2321
new packages: hivex
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hivex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hivex-1.3.21-3.el9.x86_64.rpm
419e145c2cfffc26fc6439c8042fdd7b34e39d440a93e130cefdba838dcba095
hivex-libs-1.3.21-3.el9.i686.rpm
3cc03ce54f84b8e4c49ba9dbae3ab70ef0bbb6bb4bda08764e1b7f288e2b889f
hivex-libs-1.3.21-3.el9.x86_64.rpm
3204db0bf220ffa122b53cf2c9d93972f837576de92ac730eb5b119abaad7092
perl-hivex-1.3.21-3.el9.x86_64.rpm
513e23e3ee6efb64b2634e92e6cfb43fcc9fd553d959f95d9044947b73ed0772
RLBA-2022:2323
new packages: nvml
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nvml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
daxio-1.10.1-2.el9.x86_64.rpm
deb874ee4297b855ab257aafaea95fab73dcff72dee467bb6d9f87d571ef8724
libpmem-1.10.1-2.el9.x86_64.rpm
594c5dfb4205afffbd250597b1867975ae660c6d088660ec1f309487815f839d
libpmem2-1.10.1-2.el9.x86_64.rpm
abc2a70b9d24dc8c7b93395f8d8f38fc68fee63f837407e5e47696871ead1968
libpmem2-debug-1.10.1-2.el9.x86_64.rpm
4025588361bcd871ff043b7d168027677e728e6aee7d1f892923732c2976a2b6
libpmem2-devel-1.10.1-2.el9.x86_64.rpm
6f4db16a75bdb075568a27a93bc3ef42feab20c7c70fe8a3310fdfb2e8746169
libpmemblk-1.10.1-2.el9.x86_64.rpm
268956db1650cf2107eaf852d8ebedab47a4671a1ebec5ecfa226a3bae38b5a2
libpmemblk-debug-1.10.1-2.el9.x86_64.rpm
e9a0a48f73eac91ed54aa91d183bb3b517e05d6dc640e3bd8051866075eddb66
libpmemblk-devel-1.10.1-2.el9.x86_64.rpm
32268084f61346b062925d37838b816797bd240e5426ba58234ec9d1c24544ce
libpmem-debug-1.10.1-2.el9.x86_64.rpm
fd19262cdc9fb34195a7958ab94ff74e3975eb4e7000e1ab11d582f818bcecef
libpmem-devel-1.10.1-2.el9.x86_64.rpm
e054c99d8d0e7a793e25597fbd462e8b9e550424b141e8948666ec29c64fd31a
libpmemlog-1.10.1-2.el9.x86_64.rpm
2ac80c20f9df80ef4f6b619f330fdd78d75574b162d2ab4451d71fe657f1ce35
libpmemlog-debug-1.10.1-2.el9.x86_64.rpm
27ac1e27b51074d83695cedd5b6d655d5142d365b47ef32a0c98480567007253
libpmemlog-devel-1.10.1-2.el9.x86_64.rpm
59bf2adbeaf4ba578aefc6f1941f62f61ac981af406cdb7ec32e9ee2c55a30d8
libpmemobj-1.10.1-2.el9.x86_64.rpm
7cbafb3c2c87692c4dff0a2b4be0baad0b8dae32e53d04b0da6cf1dbd4ba76aa
libpmemobj-debug-1.10.1-2.el9.x86_64.rpm
f656bc7148a9ef1a89a366c17a6df7400fdc57a31453b776f3dd8882e23f6702
libpmemobj-devel-1.10.1-2.el9.x86_64.rpm
d970ae3991156e5628064aefe0b7bfe1320a1771258e2296c9d32fc55d38b215
libpmempool-1.10.1-2.el9.x86_64.rpm
69ecdf513b924c69695eb43b8bc49b46f69f79d42cd25fd7472651cafcf4622b
libpmempool-debug-1.10.1-2.el9.x86_64.rpm
8d1cd134b6ea707cbcff40c39c1034fd880b9d97dc6567b129eacd93fbe30b96
libpmempool-devel-1.10.1-2.el9.x86_64.rpm
6f4231908548bff2294524bb8e49ba7eb978f0ba147c34ab4a3d0e3d87d68a07
pmempool-1.10.1-2.el9.x86_64.rpm
f3edd0117b7f2815fa8b6c5314407b615bb47b648bb76eecb638fbabb6b866d9
RLBA-2022:2325
new packages: libserf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libserf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libserf-1.3.9-26.el9.i686.rpm
764d428b435c1dcfa73132faa79d4807b6a289a515a38d98d693b212f6d16ca0
libserf-1.3.9-26.el9.x86_64.rpm
fc083199cfeb80e0a8afaeee5694208ea72778f43983cb676268601907c954c1
RLBA-2022:2328
new packages: pipewire
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pipewire-0.3.47-2.el9.i686.rpm
5959f4c9795565db471cb48285baa8cedb1523edb0a49a85fc24e5e0f9fdf932
pipewire-0.3.47-2.el9_0.i686.rpm
78f3a5e519b4ee96d863d9ba4b3565365f617ad5583e131ce7d5dbbf8184644f
pipewire-0.3.47-2.el9.x86_64.rpm
3de3a83596a47b935d33bdc0bd66090295b02239b0cb1bea4cccf3958d3f6df8
pipewire-0.3.47-2.el9_0.x86_64.rpm
adf65844a10a8cea61e41ffda9df8213438e43cfab3df9668ca83d20580c51f2
pipewire-alsa-0.3.47-2.el9.i686.rpm
306f3e302d86f97336fc3ce58c941c65156c20afc2df2053945494a6dea290ca
pipewire-alsa-0.3.47-2.el9_0.i686.rpm
4bf5b7445820ea10cecdfdf0b54fb134936c73772133613d794f666c13e01fa7
pipewire-alsa-0.3.47-2.el9.x86_64.rpm
fe6b1e032263d0d7c4aaaec9eeb4913b24d03794de30f40bf88e6d2d8e443f47
pipewire-alsa-0.3.47-2.el9_0.x86_64.rpm
c51a21f9b6e1e029bdf7ac320e6f1e7dee4dd8aa3287a29571962df9f92f0770
pipewire-devel-0.3.47-2.el9.i686.rpm
803c0900add1cc0bdf16964d4d42a74ca9bfe1db88ba897741640618b4a30768
pipewire-devel-0.3.47-2.el9_0.i686.rpm
e224d8da11ca73f586698bd63ce6cdf51412b31e935ec0734c6035163e0b9415
pipewire-devel-0.3.47-2.el9.x86_64.rpm
1b80dbba8c30cde1f574587f158a11c50815b699cbb59ec19d25b6ae34d4c781
pipewire-devel-0.3.47-2.el9_0.x86_64.rpm
8c13bff2248b69fbfadaab52829244107b7dccd5ea1ac878b3d96632d11de85c
pipewire-gstreamer-0.3.47-2.el9.i686.rpm
176368d405004d1be22432a1fdd2c7856c6ac42c82d4d41646f91189c4ea16c5
pipewire-gstreamer-0.3.47-2.el9_0.i686.rpm
0fad63f51b9846aabb50705d83f295dc776c11df4e81f8f54fe6c9ef23e8db29
pipewire-gstreamer-0.3.47-2.el9.x86_64.rpm
07019486ea9968f3fcfa2436370b1065673c510f872285a5d6363cab5d9e0160
pipewire-gstreamer-0.3.47-2.el9_0.x86_64.rpm
1394fd3d4b854330d3d13858ea7b3040782eb85ae0d27fdba6a9bbbd74dd26ae
pipewire-jack-audio-connection-kit-0.3.47-2.el9.i686.rpm
92c3f5ab981bc430c21102c2ff04f0dba8e8f06a3b17b899768ba6eb6b804e82
pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.i686.rpm
609b64b11edebb55cd83728158ac3baaee0e78d7b04bbbbb673f8ce6ef4534c3
pipewire-jack-audio-connection-kit-0.3.47-2.el9.x86_64.rpm
aa7ea3528e16a8af6aabf7b4f300548ba25eb56c4a0ca82a9d22603e2eed029f
pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.x86_64.rpm
06b057d2d6ebb8ec1d314dc0bd56eb3108dd839513253fa4942db78963ba81f2
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.i686.rpm
a501d458ae5a43c3c1c1c5a40f98cbf7d74e20b31928b158dadba80ad838ad0c
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.i686.rpm
5b392954b71927ebb460970806535bd9859a38ebbd6ced14b1f510518e3fc912
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.x86_64.rpm
6bc6089139b156c5afa64891e6395fbf7a4d84fbb835569093ea6908e699b43c
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.x86_64.rpm
6dd8353c6bc29febe1ebdf348a02751a0268bb48a8cf687184584f42a23ba04d
pipewire-libs-0.3.47-2.el9.i686.rpm
6dff526d939f72cc31545a2d83142787f555fcb7f29805160d2b16d19e7fca5a
pipewire-libs-0.3.47-2.el9_0.i686.rpm
21eeb0d2776d467205bc323e3e116a0316e53aee99e57cc12cd28be957afd1e9
pipewire-libs-0.3.47-2.el9.x86_64.rpm
0c2d96713249488829737d7107396fdc566f87031931ed105623bcadd44cbcef
pipewire-libs-0.3.47-2.el9_0.x86_64.rpm
556c112b74be8c56f77fd31da9fdf43a34544e973313022a4cc0e7bda37e3971
pipewire-pulseaudio-0.3.47-2.el9.x86_64.rpm
7415b8fde19ea9bb78959a7fcc30e945f07bbd05643a56efe60138c7a86ab00f
pipewire-pulseaudio-0.3.47-2.el9_0.x86_64.rpm
9ff68cf2fa5df1a951bc282d64e3c48b62e0e24bd1e88bfdd6e869e1294c5b0b
pipewire-utils-0.3.47-2.el9.x86_64.rpm
01de374851cb6f1989858bfba16cf220b38141da9da1e4cf9c4d54e4bdba65ee
pipewire-utils-0.3.47-2.el9_0.x86_64.rpm
f629232bebeccb0f15c7d5353ef38d878f91d8debcbc2debf589360e6236e412
RLBA-2022:2332
new packages: libuv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libuv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libuv-1.42.0-1.el9.i686.rpm
83559a7fc25392875981ad359bea9191ab1a57ee1b20326a21e960adb796aaa8
libuv-1.42.0-1.el9.x86_64.rpm
f6410030faa3742c603bf6cb83a6c183af7f54931b7131899d27b84eba2a535d
RLBA-2022:2333
new packages: google-droid-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-droid-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-droid-sans-fonts-20200215-11.el9.2.noarch.rpm
b1f42ac011506010a6e1e75ad65770d6a907c4fc3ac1e240b577bf4c0ebbea8d
google-droid-sans-mono-fonts-20200215-11.el9.2.noarch.rpm
cd22214cbc62cfb485818bc5372b634311c21d124aed246d012b5c3a8e955d81
google-droid-serif-fonts-20200215-11.el9.2.noarch.rpm
df7b2b6b8aeac1386fc2d01b49c6e09e57984eae863e72d19944142b4228ae89
RLBA-2022:2335
new packages: flatpak-builder
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak-builder.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-builder-1.2.2-1.el9.x86_64.rpm
59077807b106baa7e87ac3d59807a00d64fd99748a9ff22a2a88820ad9b79e76
RLBA-2022:2337
new packages: resteasy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for resteasy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-resteasy-client-3.0.26-15.el9.noarch.rpm
d40d5975d4bded909f13de9bbfb206ecda9a963e81a2148e3ef3e13f88c195cc
pki-resteasy-core-3.0.26-15.el9.noarch.rpm
ce9e2e9b809e5b278dae5f411c8644e5ed84ce4c95dc0deb2fc60eda48ae7383
pki-resteasy-jackson2-provider-3.0.26-15.el9.noarch.rpm
6427fc10b739350fc46f21253bbab10efc6dfe58828651598332bad6d03ed966
RLBA-2022:2346
new packages: jss
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jss-5.0.3-1.el9.x86_64.rpm
3c1cf2a2ac4aa918d80b1101abffe89c3b25b09250958ecba59f6e40b1b62098
RLBA-2022:2347
new packages: jackson-modules-base
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-modules-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-jackson-module-jaxb-annotations-2.11.4-8.el9.noarch.rpm
e2553e02a8e0b5629ecf746d7831aa392412be30c7a9d9ef33698491ca39e2b0
RLEA-2022:2358
new packages: js-d3-flame-graph
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for js-d3-flame-graph.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
js-d3-flame-graph-4.0.7-1.el9.noarch.rpm
6367726243e008cc3eac71a80fc434aedf05821194d8078b703839c38cfef2a3
RLBA-2022:2366
new packages: tomcatjss
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcatjss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcatjss-8.0.0-1.el9.noarch.rpm
6aed98268ad54cbf0e771d579f2274ebcedf460eff72ba8c8d3a1a6119592e0d
RLBA-2022:2367
new packages: ldapjdk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldapjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ldapjdk-5.0.0-1.el9.noarch.rpm
c8ee60c5a68c25da964a182d1b0c4ee00bf617c94e05382dec38a74ca6eb8f88
RLBA-2022:2369
new packages: emacs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-27.2-6.el9.x86_64.rpm
46aad26c8380125d22978d88ab4f9fd0905f2d96acb1f8b297144c53ef558887
emacs-common-27.2-6.el9.x86_64.rpm
5632fc384ba44b82ca8ab327d6feeadf5c84036da790cca6bbf0b1840457f4f8
emacs-filesystem-27.2-6.el9.noarch.rpm
602bb41ecc4c7f0690bcf07105ebd468e3ab50c856d27bf1f02e1c3292a29a24
emacs-lucid-27.2-6.el9.x86_64.rpm
14b0d64ed26ea0ba198dc027a10c8ddf51714a488c83221a916e5f06c7a4f7f0
emacs-nox-27.2-6.el9.x86_64.rpm
3a7a89f6f63a9781cdf0bc1ec34172d0ead85a5fc6618eef2557f6dd86deefea
RLBA-2022:2375
new packages: dwarves
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dwarves.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dwarves-1.22-1.el9.x86_64.rpm
b2a0897bbe16d9916ab8ddb44cc14e9e3913168575e23c59b6b8c8f7d8df57a5
libdwarves1-1.22-1.el9.i686.rpm
d62ca19172c762a6bcc681ce4af26bb62cca8716249659fdf027564a961f098f
libdwarves1-1.22-1.el9.x86_64.rpm
2a1d8a4d51adbc3820fe07643a51f42660fc8b75624ae64532b28c3bd5e722af
RLBA-2022:2377
new packages: memkind
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for memkind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
memkind-1.11.0-2.el9.x86_64.rpm
5d13c1ea03776e9d29c07dbe58aad08e106a1841ee39ac3a05a2f65a2dcef4e9
RLBA-2022:2392
new packages: libical
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libical.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libical-3.0.14-1.el9.i686.rpm
b86f33ae0ea0166b1d080b95c81771f55450166c014af99d2bbeae3022b577ed
libical-3.0.14-1.el9.x86_64.rpm
ec973313c55795424cb8e4ad3c17cd7ae95997ec812b377d38a4963a9998ed55
libical-devel-3.0.14-1.el9.i686.rpm
8dc0d506a3f733ec58c6cf2eab0e8f81605f0694ecb88b00f89667019403f62a
libical-devel-3.0.14-1.el9.x86_64.rpm
735b5b58b5bb16c540857dd80058c41100dc462e26652e1f5b21872c31d6df21
libical-glib-3.0.14-1.el9.i686.rpm
7c4c52d0413a100a69e71dabebf54bd1386c96762016ed683879b52dffa94b66
libical-glib-3.0.14-1.el9.x86_64.rpm
cb9c5620c547574bec339ecf2f7184eee37133d25879a96e49e28b2fadc15e05
libical-glib-devel-3.0.14-1.el9.i686.rpm
0a63d1c0d62a9623779d67b617def1d63ff5524a00ebe1e1dfa61b9c890121ff
libical-glib-devel-3.0.14-1.el9.x86_64.rpm
2a75f49a4fe9f799f8901f6fef64d37a4a5e837fe9b9d30537f2fca6dadbb28e
RLBA-2022:2394
new packages: tcsh
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tcsh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tcsh-6.22.03-6.el9.x86_64.rpm
a81016748a5d13df50b7271571372585873f7fa02d2545b9e5776dc7c6079173
RLBA-2022:2396
new packages: appstream
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for appstream.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
appstream-0.14.5-1.el9.i686.rpm
c99e533591bb4d472cb4861ada7730cbdc9d510b8b9ca8abdbd634e7e74c524e
appstream-0.14.5-1.el9.x86_64.rpm
b9f5cae3c6406a04a1d8f208616cc018217d166c51f496a4bd08b9163a1599cd
RLBA-2022:2400
new packages: libjpeg-turbo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libjpeg-turbo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libjpeg-turbo-2.0.90-5.el9.i686.rpm
79053792d2695935a2b95d49c7858df91734639bb991e051c48dbdae75a40396
libjpeg-turbo-2.0.90-5.el9.x86_64.rpm
c48fa172b999d4101e3c3762345951f99837e98ff30ceebf1a9f0f16208847ce
libjpeg-turbo-devel-2.0.90-5.el9.i686.rpm
26a689974cdc5139f86835f5c681709dcc429b710c02c6c591b1db466e7f942a
libjpeg-turbo-devel-2.0.90-5.el9.x86_64.rpm
5d28b5094204d82d1ef763a42e9b77aa968e5472857b20b3e4e0445a0bd8214b
libjpeg-turbo-utils-2.0.90-5.el9.x86_64.rpm
e6a67414b8453cee40563f55654fc2abd9fedaf4b956c4e64ea6fda86dff01d6
RLBA-2022:2413
new packages: udisks2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udisks2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libudisks2-2.9.4-3.el9.i686.rpm
c72b824b39a74d8696aeb7ec5cd907707a1fcbd754fad2cd04e06205520cb2df
libudisks2-2.9.4-3.el9.x86_64.rpm
ed7b91cc3fc2ac6f7cbdc0fcae5872488a6c5597d8740c8ae7754013686d200c
udisks2-2.9.4-3.el9.x86_64.rpm
0338d861fb0d7c048619a27449efceafc9d0a438727b797c298ef3bcb2423376
udisks2-iscsi-2.9.4-3.el9.x86_64.rpm
5c14415b05965cc6940425ee32926cc599c52daa8821df51d84a633fcc515945
udisks2-lsm-2.9.4-3.el9.x86_64.rpm
66f35294c4983e86ebddc8becf55bb15bffaa6e438acbb4482337d8363bad7de
udisks2-lvm2-2.9.4-3.el9.x86_64.rpm
4d9a9c8939b950aa0afeb37927c6ccea70c5599596e835172b58d608dd7841a9
RLBA-2022:2403
new packages: accountsservice
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for accountsservice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
accountsservice-0.6.55-10.el9.x86_64.rpm
c6db19a9e8fe952630fb3c9d6cc85f69789aa289381d7770bb7aab09f6afecca
accountsservice-libs-0.6.55-10.el9.i686.rpm
559c41422d74b01dd38feb83a8f550e7570c7b721b0ccae1547645804c5a71f6
accountsservice-libs-0.6.55-10.el9.x86_64.rpm
a61d2ab25776e4869fad61f0bfd2e89899ee655e7828d8983e524d07cfdea8ce
RLBA-2022:2407
new packages: kdump-anaconda-addon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kdump-anaconda-addon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
kdump-anaconda-addon-006-13.20220128git9603258.el9.noarch.rpm
cc2df17ee2e9ebf37bc36c62759af775f5247ecff042fecad731abae9a21d40c
RLBA-2022:2411
new packages: libvirt-python
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libvirt-8.0.0-1.el9.x86_64.rpm
cc72af92f331dcb805bcec84e08fb83d88ae24603d6ed57be6a387d31e20be82
RLBA-2022:2412
new packages: check
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for check.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
check-0.15.2-6.el9.i686.rpm
874be8db879f79a8591740c8627099923a45b226d0b1efcd383756a49325ac93
check-0.15.2-6.el9.x86_64.rpm
5b03d7999f97ab5ad09e4b47b1588d851e0db99e43c79116e785d5a12c7d058a
check-devel-0.15.2-6.el9.i686.rpm
bfc782d7dc6dae70cd71a3c6f173a7353164bdf373ac7ba316be8eba42098544
check-devel-0.15.2-6.el9.x86_64.rpm
5d139e9d0976f4da53eba8f8f7c8110c859c26f568631842c6573f387294551a
RLBA-2022:2424
new packages: wget
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wget.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wget-1.21.1-7.el9.x86_64.rpm
c2ff8ef263f7fd77f9e999cd9f35a3c04a158acc065efed413456792f8f7ffc7
RLBA-2022:2416
new packages: appstream-data
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for appstream-data.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
appstream-data-9-20220302.el9_0.1.noarch.rpm
ab80b8cf5b42b71df8de8ab4bb99d46cd36ad1594e61a615b63b14164395c595
RLBA-2022:2420
new packages: createrepo_c
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for createrepo_c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
createrepo_c-0.17.7-4.el9_0.x86_64.rpm
e16425dd36fd05a79db1b9e00aff464c600a8ff66d7b2fe96eefc2b623e801ac
createrepo_c-libs-0.17.7-4.el9_0.i686.rpm
5d16436d83159e7affd3a31cb1686d85f437febb6dc533250c06cc2a72815141
createrepo_c-libs-0.17.7-4.el9_0.x86_64.rpm
5e874a3f33e0bc2100c735d523dafd97eee487b3de0be4c28202587636cd4c15
python3-createrepo_c-0.17.7-4.el9_0.x86_64.rpm
ac15f4c0ce4d70f36af8bc8dd9a42b97209dba40062adb29dc2ae2983317f84a
RLBA-2022:2422
new packages: watchdog
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for watchdog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
watchdog-5.16-2.el9.x86_64.rpm
df00b993647c77b09fe54e10f45b3d5c6c3401291b34d7959fab13bfda7740f4
RLBA-2022:2423
new packages: python-rpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rpm-macros-3.9-52.el9.noarch.rpm
f82b79bb8c4d24d5f038c05121f59fad10d7e6cc0fe41b5cd8a7d4413e6d09d5
python-rpm-macros-3.9-52.el9.noarch.rpm
cd61fd5094890aafb8eb2b55058d0caaf0e7327cae5541479b64ca332afe472e
python-srpm-macros-3.9-52.el9.noarch.rpm
507b18e7016e92b68b200102f55150747c03076d1e34a5a3ba140e1735faa9b5
RLBA-2022:2425
new packages: gdisk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdisk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdisk-1.0.7-5.el9.x86_64.rpm
f0554a66524bd2e62789ec017aa3721c33893d07ffd529d43cbc842262e2f894
RLBA-2022:2426
new packages: rust-coreos-installer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-coreos-installer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
coreos-installer-0.11.0-4.el9.x86_64.rpm
5cc10733415fbd9d6d11b22e984277fb4f0262bcdf82572d90f1e9e74f96fd0d
coreos-installer-bootinfra-0.11.0-4.el9.x86_64.rpm
f4dd9a813b956627b39fd1c92698016f8242c8afa98f8d4480832ebe611193ab
coreos-installer-dracut-0.11.0-4.el9.x86_64.rpm
088290b5c798e3e28265eaedf7146ba8748294469d3345c64a5bb9775a19a3af
RLBA-2022:2433
new packages: exiv2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for exiv2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
exiv2-0.27.5-2.el9.x86_64.rpm
0ab3e8caf7eae710774468976dc4efc92a8f8284ab3b44832e438e00fb017f29
exiv2-libs-0.27.5-2.el9.i686.rpm
4f8458a1036a76f621e4cdc1be26bf508a4388fd48783bbff6be7f31940ddf38
exiv2-libs-0.27.5-2.el9.x86_64.rpm
d4724e035f97ff114f7400edec23acb754b0b6586275c90bc8d501b2b995dab6
RLBA-2022:2438
new packages: exempi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for exempi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
exempi-2.6.0-0.2.20211007gite23c213.el9.i686.rpm
fab9d129a3000559abc1ef9dad2498b36bda24d0833d2a9d2eac363a469075e4
exempi-2.6.0-0.2.20211007gite23c213.el9.x86_64.rpm
705b67d95bf5106f7e7a9d9b5fd8258347f2a9cd4c107bc5c30a2603c79b8ce7
RLBA-2022:2441
new packages: maven-resolver
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for maven-resolver.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
maven-resolver-1.6.1-9.el9.noarch.rpm
6d3482a7a58e801812875c73975ae80a5396613724593c82621c4f710263dadc
RLBA-2022:2444
new packages: jq
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jq-1.6-12.el9.i686.rpm
0631ee92182046159a3f4341d55bf019bfffdf7e3a0e4d5f8c00845aa88d0d78
jq-1.6-12.el9.x86_64.rpm
21263379b6c4d9bf1a40acb07ccd7b42a299031bdf70387041b90b50d5f587a8
RLBA-2022:2445
new packages: maven
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for javapackages-tools, maven.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
javapackages-filesystem-6.0.0-3.el9.noarch.rpm
b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3
javapackages-tools-6.0.0-3.el9.noarch.rpm
bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181
maven-3.6.3-14.el9.noarch.rpm
927085462768f8c5324c2b514013b57ab1d4edd0824fbcf19941ad12b6146a11
maven-lib-3.6.3-14.el9.noarch.rpm
a2bf639d6a73b7db1ecb51fd1e9a0b6e8f3be2cd2ac546672694b707844377b3
maven-openjdk11-3.6.3-14.el9.noarch.rpm
c011fbb97732621901480150dcd2393ed34eb6a330ac2e0cffeda38b87881ce7
maven-openjdk8-3.6.3-14.el9.noarch.rpm
f86e0f9eae59ffff3b747234512e7ae5c53c5cbdd43f5b8dd124f90f77820928
RLBA-2022:2446
new packages: ksmtuned
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ksmtuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ksmtuned-0.1.0-1.el9.x86_64.rpm
51b081cba24111d7e2ef03c98bab8879b4373d27f0caa165973d80b6bba662ac
RLBA-2022:2450
new packages: liblangtag
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblangtag.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liblangtag-0.6.3-8.el9.1.i686.rpm
3443d050d0fe4f3990282d9d2c6780e3e2748e7e27f742a0e1f14ca497d0abb2
liblangtag-0.6.3-8.el9.1.x86_64.rpm
8369fcd984d95e31134d637b7893be7d414117c5719e378a764537b36a991de4
liblangtag-data-0.6.3-8.el9.1.noarch.rpm
065fac7c05d3e968bf395dfd61bfec2f173244351cd12e77461a00d7a033c71b
RLEA-2022:2452
new packages: kernel-srpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernel-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-rpm-macros-185-11.el9.noarch.rpm
d836fc7f59884c4922b04cc663f594b91662b4276102d0a84653b6795d247b3e
kernel-srpm-macros-1.0-11.el9.noarch.rpm
13756a83577da6b61f0dfae132e7a4955c672e6a323c4b977783b857f716c496
RLBA-2022:2456
new packages: adwaita-icon-theme
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adwaita-icon-theme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adwaita-cursor-theme-40.1.1-3.el9.noarch.rpm
0f83fe6dca8a97b0e7ce055aa5aa2240ef6e48cf875bdea8a938d6781da481df
adwaita-icon-theme-40.1.1-3.el9.noarch.rpm
fbace700527680af0efdb9606dc1ff450ccd5f61de75cc4e5f97cae434c57eb7
RLBA-2022:2457
new packages: adwaita-qt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adwaita-qt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adwaita-qt5-1.4.1-1.el9.i686.rpm
b28211fbf15143458ded9614859448c2612eaaf177255de89970d527f12d5023
adwaita-qt5-1.4.1-1.el9.x86_64.rpm
a57f906e7b4baacf03f7468944d899aed9073fad4bf455a696985c4db229004f
libadwaita-qt5-1.4.1-1.el9.i686.rpm
45c61acad604df80d320253caaaa8b0150a2f61ecd315f8e1c8ce11cd4c06b2e
libadwaita-qt5-1.4.1-1.el9.x86_64.rpm
fe76b5523661dbb4eb459845548a3d90d5835f99c311f8b32f9d786c1b702d79
RLBA-2022:2458
new packages: libstoragemgmt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libstoragemgmt-1.9.3-1.el9.i686.rpm
0546372061909d29d048acaa2a967fee4cfb87ff0d0ed9a2476b25d855e7a265
libstoragemgmt-1.9.3-1.el9.x86_64.rpm
6e257b5e887466f9a79f8d26502b38780f8037da4f3413a4bef1aa6ea2361eb8
libstoragemgmt-arcconf-plugin-1.9.3-1.el9.noarch.rpm
ff1bd143abefa4edf2d4282647623510fbecfeaee527f04ac866a50df3a57285
libstoragemgmt-hpsa-plugin-1.9.3-1.el9.noarch.rpm
2e878f9190bdc4755b7d3942e6d22acc85bc74806826e6f4e0a79146109d2730
libstoragemgmt-local-plugin-1.9.3-1.el9.noarch.rpm
34fc303faed416d336aee8e13a0d94b3ed848a05d62dd309a8dbbc7459ee0de9
libstoragemgmt-megaraid-plugin-1.9.3-1.el9.noarch.rpm
970a5e0ad4c639317caf2c523079437df83c13cde5cbc2d99a65b1bdb6d9e456
libstoragemgmt-nfs-plugin-1.9.3-1.el9.x86_64.rpm
828a31ff417276cdc93faab9f9231fe091e835398dec5a03b7111e328f695f62
libstoragemgmt-smis-plugin-1.9.3-1.el9.noarch.rpm
1eb8a4dab5429adb7a2e15be41dd62fa78d8530e64b7d57a2ed7584029b0da8e
libstoragemgmt-targetd-plugin-1.9.3-1.el9.noarch.rpm
d88b517b69d2178b5e9e199b189c8fcd13175de2e742f0bcf530eeef5898fdf6
libstoragemgmt-udev-1.9.3-1.el9.x86_64.rpm
d1fffa96caefa03640ca0cf7ea8d138c1cc61a2256c6f005b9cd947977461bfa
python3-libstoragemgmt-1.9.3-1.el9.i686.rpm
de493de47939478c2d770e3579ddcbf3202fcbb04e263a2d2a92466ebe435e1a
python3-libstoragemgmt-1.9.3-1.el9.x86_64.rpm
ab95ada794564bb369cab180ab912e57d6755f24be902ebe390c3de6a0ea9a87
RLBA-2022:2460
new packages: wireplumber
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireplumber.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wireplumber-0.4.8-1.el9.x86_64.rpm
adcf205fb635d08933179b35b045f4dc31a31b31b166ad13e4b5ab5e73319934
wireplumber-libs-0.4.8-1.el9.i686.rpm
e35832342cf238538f5d3667b1b9b6f38ce2a3168c03abb83ec266bc9ab1606a
wireplumber-libs-0.4.8-1.el9.x86_64.rpm
52d86f8c1b70a33db928845cdc13d54734b79f4e5ca3133a5629e60be56f3b8d
RLBA-2022:2462
new packages: gnome-terminal
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-terminal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-terminal-3.40.3-1.el9.x86_64.rpm
a0cefb89fdb9bbed21dffb4caa4b19ea1eaaf157c707571bc28559ccbe694fd0
gnome-terminal-nautilus-3.40.3-1.el9.x86_64.rpm
d2136bf6a067ec4337f74d2ff48685cb7e2ef8c041a53bc44f74f365a7734e1b
RLBA-2022:2463
new packages: kernelshark
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernelshark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
kernelshark-1.2-9.el9.x86_64.rpm
c413be58954f425f7e8d6ae4fc2a87872014e8658c744f4471ef5b12b4d73f5c
RLBA-2022:2464
new packages: vsftpd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for vsftpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
vsftpd-3.0.3-49.el9.x86_64.rpm
ce2527df2f94c34359f495732051c205461028c979725a4fb2a1488cc0bc8546
RLBA-2022:2465
new packages: papi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for papi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
papi-6.0.0-11.el9.i686.rpm
2aac5c156882065c543fd392821f25313046906b4bfbf337591d0cf204181fa9
papi-6.0.0-11.el9.x86_64.rpm
0f9f908ef115104702f3f299412b3295f614c328535be833048db08fe989e1ba
papi-devel-6.0.0-11.el9.i686.rpm
26499511f7f716a87a0f093ad95bd7307a85884dbb3cb8667bd3c4c589abd510
papi-devel-6.0.0-11.el9.x86_64.rpm
30753d3dd15e694c3b00b4e01f6ea208ff7e80b8d957a4a8725bde49f930c4af
papi-libs-6.0.0-11.el9.i686.rpm
2c5d78e8777a5af149ac8724b0a87d10ac722a70cc4694c60fc3e1fcfc095faf
papi-libs-6.0.0-11.el9.x86_64.rpm
4a46b827120e761cf65e9695b02fc650c4272520d1dfdfea665a49e4519809b8
RLBA-2022:2466
new packages: libecpg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libecpg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libecpg-13.5-1.el9.x86_64.rpm
827d780680f2275fe5e9ab67d3d602b2d105af00239a55cb1d777e53583dbbd9
libpgtypes-13.5-1.el9.x86_64.rpm
24cbec009eddcfc7076367ed6522f2e691fb7bacbdb93df120ca9de695a25076
RLBA-2022:2467
new packages: libglvnd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libglvnd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libglvnd-1.3.4-1.el9.i686.rpm
b4d03065053102daa3ac1d014e34a4186ad02f58ab77e455812c8faa89de7072
libglvnd-1.3.4-1.el9.x86_64.rpm
0c8ad9eb89bed8a7b2452298c588e3bddb153eaf6f84e208dd1c9c5744d3a4d9
libglvnd-core-devel-1.3.4-1.el9.i686.rpm
ed6c35132517b2cec19390bfe8b516def1ef7fc4ba9b58d4647aef4b77afc3f3
libglvnd-core-devel-1.3.4-1.el9.x86_64.rpm
a2f93de8ac1df81255058347afcb88cf83107f656fa4bb8f00a3740da8ddce5c
libglvnd-devel-1.3.4-1.el9.i686.rpm
4d86fa3d235a6f638f00d679e10d56b01b6f15ad8f2339ee2755d2252ab04229
libglvnd-devel-1.3.4-1.el9.x86_64.rpm
c492f1394210560fe483a7dc3ee414014791b02ed191971577665d25221d8e40
libglvnd-egl-1.3.4-1.el9.i686.rpm
1a4035ecd5b2ccffd12abe0503b7874fa0db730d87345e797938763a2a6b0bb8
libglvnd-egl-1.3.4-1.el9.x86_64.rpm
6962b3c3c943981a9ab8a3eacbedd35b9f32e6ce50b5e071857b34e4b8c6082a
libglvnd-gles-1.3.4-1.el9.i686.rpm
a2f05eacce009ab51e54558f7c952e640fb6a24d233b2aa124a1ec01c4a88f70
libglvnd-gles-1.3.4-1.el9.x86_64.rpm
326af5eedd78fe96abb148dbb07ee48f443abe35673876716bd1eecb4b25382a
libglvnd-glx-1.3.4-1.el9.i686.rpm
e4aab2ee7593f84011104627ed85ce7954408fc239aa998b5f35da4243ab292e
libglvnd-glx-1.3.4-1.el9.x86_64.rpm
5cce5da3a7f1e6bcdfaf2be93a63dd4a2d1fa343c50079e4c69b045d8549fce0
libglvnd-opengl-1.3.4-1.el9.i686.rpm
9828f8b742b59b38a7c50a9e646afe61a3820f95cf47f59117e971c3bb94bb88
libglvnd-opengl-1.3.4-1.el9.x86_64.rpm
d49582ba0be32a420d30b95ad6e35d4b1e5b61c87c74f28f6cb82668e54d27bb
RLBA-2022:2477
new packages: totem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for totem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
totem-3.38.2-1.el9.x86_64.rpm
7d46f365675aceec166e48262915ede9d32e89f78172d23b3a3252f8a8af2de3
totem-video-thumbnailer-3.38.2-1.el9.x86_64.rpm
f8f38a481e269c3efc5d096c305628fe0a4d8d69e4373c30fba0c92b3fa96003
RLBA-2022:2480
new packages: texlive
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for texlive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
texlive-20200406-25.el9.x86_64.rpm
837a54a5cc06c9fbc84b0a1c2208b9c50c9b22b2061b300021fa47edb028635e
texlive-adjustbox-20200406-25.el9.noarch.rpm
23986ac559b8a930cea51afeefc45693c1f52f3ec61ec8decd7121fa37a39371
texlive-ae-20200406-25.el9.noarch.rpm
67dbe8589fe1279d7e0eb69e74d398f98723b6c5c4553fbee9d3b580997055ca
texlive-algorithms-20200406-25.el9.noarch.rpm
ecfbee5ee927ed4a5f4bcbc59b96b9f2984495392cd55072463e1abb26fdbffb
texlive-alphalph-20200406-25.el9.noarch.rpm
92a182f81eb744da3555b91b709e0a83f0806266e0487e8fd53fcbd3bae7cfeb
texlive-amscls-20200406-25.el9.noarch.rpm
d07a868d557c286fa763d87c51b029942703218810da8777ad597fef9d88b3a6
texlive-amsfonts-20200406-25.el9.noarch.rpm
eaaf57ef9a79e796e70cfa004aec5e88ff30b5ea8ee01a6b828ed7f25cc13f00
texlive-amsmath-20200406-25.el9.noarch.rpm
4cd3814d72aaeb03bbfbb29070ef69dd3e6f73d2c1ede68163b56c02ef3ace3e
texlive-anyfontsize-20200406-25.el9.noarch.rpm
38efa1236c4cdce4086b04814eac594cb6761be22757665314c80e16f559fa60
texlive-anysize-20200406-25.el9.noarch.rpm
9e44abf02a32f415b678813f77f48025a78285ca520a13afd0daedd3b6c96e02
texlive-appendix-20200406-25.el9.noarch.rpm
19ffa63b7f3b9480edb919fa4681237726d8d8b9fe8f3b4acbf76a0cb44f57b8
texlive-arabxetex-20200406-25.el9.noarch.rpm
50531935361743f2a10cffc17f072dfd4b945a98290b97e5355118d9c2441eff
texlive-arphic-20200406-25.el9.noarch.rpm
1e6e4c8699a3320f4b1dfc47640a5677cda047dc455ec7752672f7fe2affb111
texlive-atbegshi-20200406-25.el9.noarch.rpm
426f80b252c6768c59de4119b06d8ca53c178fe2e391e9d39eec1ed74c061681
texlive-attachfile-20200406-25.el9.noarch.rpm
2d5811e84279a70a355ed937b90d90154b72f111bf9cb5f215ca50d6be3d2916
texlive-attachfile2-20200406-25.el9.noarch.rpm
61f392911c9d355d48c3a7dcc5ffe595bc071f2728cd222893bf2bff95f363b0
texlive-atveryend-20200406-25.el9.noarch.rpm
5caffd52e1c44edb146c3d022bc7c157941b6010a19931934107feec92a971a1
texlive-auxhook-20200406-25.el9.noarch.rpm
b8aaa92a5fe9da0f51588cc06fd485230fdae231a2231b3545248eac89ced0c7
texlive-avantgar-20200406-25.el9.noarch.rpm
0826f7b6bf012527612f1b85260656ed9fbcba8a3cd53f67d89161c8848dfe80
texlive-awesomebox-20200406-25.el9.noarch.rpm
8e7653afd6a2a38af116d14f4d54cf3b53455f669dde540066f2bb03bc438ec8
texlive-babel-20200406-25.el9.noarch.rpm
5be9822084cc127b43e513f0efb9a8e46dd9e9fd0cbccc540a0a00ea14fa20bb
texlive-babelbib-20200406-25.el9.noarch.rpm
ea1ffa5c9b6ee670e44fbd2a71aee7907c87bd68aab2b5e5a8a516060762ba7d
texlive-babel-english-20200406-25.el9.noarch.rpm
f50470c5ff5a09b5ebcbf32546dd8be46de1a910840388e4154a64d16a5120ac
texlive-base-20200406-25.el9.noarch.rpm
e9888fe78a25175ab1b60d871dbaa178f8832d46cdd2ec636d2c441361f761f2
texlive-beamer-20200406-25.el9.noarch.rpm
82a80262cba453c83c873b7763d54bb3df53ee37fe031c2cc4643ee5cf19e4f0
texlive-bera-20200406-25.el9.noarch.rpm
a7df84d164ebe2609db6e1885dc9c994a85b81bce9bf22a588c1eb337a59c051
texlive-beton-20200406-25.el9.noarch.rpm
d6052d826ee2a1107d1d5915ed8a7d00528d3a1d60d95b42b2f17f7aa5602ed8
texlive-bibtex-20200406-25.el9.x86_64.rpm
53ed42f4c7a3a487f95c9dc9f40c98374f55940e2758f7452a169e7fde6a2610
texlive-bibtopic-20200406-25.el9.noarch.rpm
8cb74c5eeb22f097f0292bd21d822e89f0e7c87035682f64f714052b52f8b11b
texlive-bidi-20200406-25.el9.noarch.rpm
e8513731892093bcdfeb92e160019ac12d7a206ef6a9a347a30d1913dcece1f7
texlive-bigfoot-20200406-25.el9.noarch.rpm
05f1b753b6f8b98ea18a985e1185d400bb52ad36fa09d86f31dd98f783b99217
texlive-bigintcalc-20200406-25.el9.noarch.rpm
1b93279ecd762db12fbae6471a5871373fbdf0e087fd90a647e6d8b4b1193948
texlive-bitset-20200406-25.el9.noarch.rpm
6a6e98448af522c41ac187a7e08b4d705e7b7dce5fe7ff38d7007804bafec845
texlive-bookman-20200406-25.el9.noarch.rpm
cde8fc4d040bf79a99f509ac741aafc191ab2d653120c9a961db8853d32ba8c2
texlive-bookmark-20200406-25.el9.noarch.rpm
76bc6cf466907ed85d86f4b7be09bbb61c4c9526c08f93504b2713d13765ac5a
texlive-booktabs-20200406-25.el9.noarch.rpm
c15ad22c2f99309b8dceeff2adcdb3e91a02ccf508b637fa21c9c16291ec222c
texlive-breakurl-20200406-25.el9.noarch.rpm
40a305d18e457aaa7b0e35490cdddd5a2e4e886a755940a297ed5341eb5d3348
texlive-breqn-20200406-25.el9.noarch.rpm
20ef84afe747e30c445ff8510e98164904a1a98b035cbfa6b2d6ad47cf773960
texlive-caption-20200406-25.el9.noarch.rpm
3af05f99f997f13f5f089f0d51079ad3314a4c3e9388c1c292fa50b000107e9b
texlive-capt-of-20200406-25.el9.noarch.rpm
0bf59ff906dc33ce60efe158818faebdf673c0f72b3c6b00f5f16f68be6e0688
texlive-carlisle-20200406-25.el9.noarch.rpm
93a6c357f517cd0d4a13dfbb9efa80dbc3c0d1775da75ec6628d805b47d58452
texlive-catchfile-20200406-25.el9.noarch.rpm
2d9703c560956ad8eb8d4df38463098133ea802cca5a2740e82500238f57e5f5
texlive-changebar-20200406-25.el9.noarch.rpm
4ba7ce4338aff5e83c7e19761329d3987593d62c49ec9f9e4380a6f09adc8914
texlive-changepage-20200406-25.el9.noarch.rpm
d2b5d6b49959ca70a749fcb46c2702572c6a74a99ad390dd49ef35f048e8290d
texlive-charter-20200406-25.el9.noarch.rpm
6af22d6463efd8db26e3f9811efbc603865cca00db81601536acab1306a7afc2
texlive-chngcntr-20200406-25.el9.noarch.rpm
c6ea0ae1cdd3f1a093605346734a17d8536f8da4032797be97cdc6a11d03d2f0
texlive-cite-20200406-25.el9.noarch.rpm
c5b7ac2bc24456796dea1f22b10e1fc379e41171b38f08f140e683e401c30785
texlive-cjk-20200406-25.el9.noarch.rpm
574c427c93450cf5b0d31f48bcaebdaf1c3b6796bd02b0ecc3dfda146711ad9d
texlive-classpack-20200406-25.el9.noarch.rpm
d03c425e78d02f77c4bd6e9540253ac80e2d25b236ba1686484d82c0b4344d14
texlive-cm-20200406-25.el9.noarch.rpm
5bc610d26cc86c52dbe924c936d0170d8e324a229991b5e281bf8f31161cec5e
texlive-cmap-20200406-25.el9.noarch.rpm
4078d0d604008cbcb92eccebf235ae7f27ff6dd5918c04eae6e2abf465873efd
texlive-cmextra-20200406-25.el9.noarch.rpm
553dd883223d85c53104fc1c8478f80cd4ad9ca6f6797ba9ee89945098e845a6
texlive-cm-lgc-20200406-25.el9.noarch.rpm
243cb790c082db01380d1b47baf622bced06f0fb095caded509810af51112a52
texlive-cm-super-20200406-25.el9.noarch.rpm
545582ac9cf1e191e71ee111467fd4c2f4c931cf5e33992e3d5f1ffb40a97799
texlive-cns-20200406-25.el9.noarch.rpm
38dcc549680c69fc71e7379b4170fedd46a890a38b68b99696c3d6d8b67363c5
texlive-collectbox-20200406-25.el9.noarch.rpm
3d814cff7b9bee0b3bea8a368e81d08afedb7fba7a632b112dd389bb7f22b1e4
texlive-collection-basic-20200406-25.el9.noarch.rpm
741f64f4eb99e6e93637957e6f731eb57e3772a362fed6ab6693f9e1bdef4e93
texlive-collection-fontsrecommended-20200406-25.el9.noarch.rpm
a0d3b69578a582e3a781c70c745581657c519550b11819bc801cff1e1eb3d0e4
texlive-collection-htmlxml-20200406-25.el9.noarch.rpm
3b21bf473604f3a49327752f3a469d56fb8450f523dec2274c7df878bfead59e
texlive-colortbl-20200406-25.el9.noarch.rpm
639db372d27d02efb0dbcceeff5157535652ca9078f117fadd8ef7fc1da1cae1
texlive-collection-latex-20200406-25.el9.noarch.rpm
c85e9fe109f3bdec6e6cf3dd1ecf1e2193e8196987cd32875f83860e3abc7809
texlive-collection-latexrecommended-20200406-25.el9.noarch.rpm
b3bb4918d2242e6949e11890d0ba7578f84a88bc500cbc4b4e584f492e4ffd62
texlive-collection-xetex-20200406-25.el9.noarch.rpm
21d612c87d033640430f4b0c3f0cdc15ede733d7d860fc91ee8f7e6df4cf7fe8
texlive-colorprofiles-20200406-25.el9.noarch.rpm
bae084b4179948804595581fa5704309ea56409dc525ff4448b1f2146e514c37
texlive-context-20200406-25.el9.noarch.rpm
6add123fdb48ed0e1992f91a80852d6145879bae1c746d57286e2d7dda6ee44c
texlive-courier-20200406-25.el9.noarch.rpm
ddcc817b45352ed31d6af3ca35d8f6a053815de62f29b8d39e7b02ae1c022ba7
texlive-crop-20200406-25.el9.noarch.rpm
f831ed203a3c4abf147f28cd16316a36996dbf4fed70014e2691fee1aa4e5144
texlive-csquotes-20200406-25.el9.noarch.rpm
330f17438e14ec7c149aae6a488ce6e5d6b89cd7c55df24a71a479f9b4e9a49b
texlive-ctable-20200406-25.el9.noarch.rpm
0461b2cd916f7047f724fd015bc2fe50bbb32ef1be36e6e2e0f9044c7431fb82
texlive-ctablestack-20200406-25.el9.noarch.rpm
438151a5e204296eafe25c63f57fde1b664a3c08c3b6519a11f2eb0bdaef85ea
texlive-currfile-20200406-25.el9.noarch.rpm
fa7cc430ddef9dd5cc8a14d73eec2bdd30e9345645309aafb90b5a81c340d3ec
texlive-datetime-20200406-25.el9.noarch.rpm
e5028b027d09e30e0b2c6bc470f154a23ae525fbfe376c469dc21a6e684b1c2f
texlive-dehyph-20200406-25.el9.noarch.rpm
ec9d231ab6cb646d2138cf81c3344856c87eb53176c9c9bf38c54a6c4202bcdf
texlive-dvipdfmx-20200406-25.el9.x86_64.rpm
cf6aa93a0a5f87cf7c9c3828a449474120d2289897ae322600d8ae8226270017
texlive-dvipng-20200406-25.el9.x86_64.rpm
d60b3300b838f9ebb4ce6e6de9207250abcdd8be7e529073eebaba036f8f8a07
texlive-dvips-20200406-25.el9.x86_64.rpm
743fe301c9609ab05799d0aa31909584524d700d95bc9ea5d21e7fc00dc34db1
texlive-dvisvgm-20200406-25.el9.x86_64.rpm
4c0c4020c59c9deec513ca41c3a17ecc53fbaf7fa5a97739a1af6e2f3bb239ba
texlive-ec-20200406-25.el9.noarch.rpm
7fd5581aaa471e3febf104ff74077d35c629198077719dabf6a9161d77a647df
texlive-eepic-20200406-25.el9.noarch.rpm
507b98fbcea6788b82e0e099b67e68354845f58f727d2f4b451439233a283460
texlive-enctex-20200406-25.el9.noarch.rpm
e52242e8715e403a7949d205d130827fad0b782e6e042e7c951b5b45aadc538a
texlive-enumitem-20200406-25.el9.noarch.rpm
3b2aa3b72090a3b2bd74478fb282a7f4186d9a9e4fe0388be812167430526bfc
texlive-environ-20200406-25.el9.noarch.rpm
01673ba34feaeb303b6710f307bbc9b45aca8e57fd3ae2412b2461e42c542ce8
texlive-epsf-20200406-25.el9.noarch.rpm
0d5cf870c5b572f330f14d65d9f787b061c02a029c145746374898babc93eb2d
texlive-epstopdf-20200406-25.el9.noarch.rpm
bfef6b55fdf5948a7111e6e2598361c062e726e16c1c011ee6cc6338b3f2d526
texlive-epstopdf-pkg-20200406-25.el9.noarch.rpm
3c45ce18cd79225bebb8a54a31863db712d4d607fe561deddbe36477d585c868
texlive-eqparbox-20200406-25.el9.noarch.rpm
9134929c5b0fab7c07feb44a49468467a55069c83985618ae9ead709128d41f1
texlive-eso-pic-20200406-25.el9.noarch.rpm
c55d3fa12a85b7f3e163312a1d1b437f3b8deaf25ffdf1e8a50997c44eb4d7cf
texlive-etex-20200406-25.el9.noarch.rpm
f42611b17fc617a782d28e39c6760fe6e857e68cb93ebffec44a0efe08b492e0
texlive-etexcmds-20200406-25.el9.noarch.rpm
be7efee598e9993843c2dec643e529638a4c44044e17dd3d872fec276768f302
texlive-etex-pkg-20200406-25.el9.noarch.rpm
29f3745eee6f4d29cfa8dba912a0eacc512524c44bd5642d789fdcaff25d5d27
texlive-etoc-20200406-25.el9.noarch.rpm
c8cdf4279fd6cff6bf12e59f0aef2810c25f05089b88710e4d6d59a56ecc7388
texlive-etoolbox-20200406-25.el9.noarch.rpm
ac213fe16f7ec576253a083a1649f99fe748535062e768e80aad66c71d3893db
texlive-euenc-20200406-25.el9.noarch.rpm
5faea46824f4fa276a5a580a2167a13e747ccef32766df3969eb5d100b2412f3
texlive-euler-20200406-25.el9.noarch.rpm
74eceb479639454e6d23f8eca496b0054e113a0defab1f944d98c79694397cc8
texlive-euro-20200406-25.el9.noarch.rpm
3780438bf0cf8f357d0f8c05633574675468a12ceb4812b42c6a7fc617e65c5b
texlive-eurosym-20200406-25.el9.noarch.rpm
6291ba90c0149b3341aa330a2a768761c536607488fa53b2613a5e65bdf7bca7
texlive-extsizes-20200406-25.el9.noarch.rpm
70fc0395d91e9c89dc6b9c348dc8e5a779a6d5daa11245939b82ee798d6a39a0
texlive-fancybox-20200406-25.el9.noarch.rpm
1ee8d299fe06743f27c8c9c8d8e44d884d503773c41741136ac7dc25b41c10f7
texlive-fancyhdr-20200406-25.el9.noarch.rpm
2a52c662c54e9c6f88e9a31b7bbeb2f2577a759ca8d32f335c8f4f078700eb96
texlive-fancyref-20200406-25.el9.noarch.rpm
eaf7309d1318e93b33ece081bfa80c03da5498bfce7f9ace692162deab8db0fd
texlive-fancyvrb-20200406-25.el9.noarch.rpm
fcc2b9ce9fa84d1549af47b78300642ccf96cf42add1c115e727801cfed9c053
texlive-filecontents-20200406-25.el9.noarch.rpm
170059d0db85f126aded1e9db5326e83a6b647e88331a68658a860215545ae16
texlive-filehook-20200406-25.el9.noarch.rpm
780b601a9a006523553e41a934b77d4758cca21c4db034cd7ffeebbb1d7fc1b4
texlive-finstrut-20200406-25.el9.noarch.rpm
63509d82a725cdf89df8b907d74b396002e2cbe0355d910617b2c3bfefe62cb6
texlive-fix2col-20200406-25.el9.noarch.rpm
9c72079f34640dbb57c0c7409ca3dd4ee3e1d336f2cad68a8aa40b0f4dcc4eb8
texlive-fixlatvian-20200406-25.el9.noarch.rpm
1ffa2b1d4cbffd299538823f484f122d1ccb5bb013fac751398e3498a11643dd
texlive-float-20200406-25.el9.noarch.rpm
a03edf1f974a74f15798f3ecdebebe1aad3d64f6a46a7bb71185099d9fd2a877
texlive-fmtcount-20200406-25.el9.noarch.rpm
ad57a3a2efb8a0053260da2b81c0eee925df3c21e328bac88625d44222872b75
texlive-fncychap-20200406-25.el9.noarch.rpm
b33f6ee4889205ad8bc96d4a0ed62ef17ed95c1610c607a114a6d88b88bf5bd1
texlive-fontawesome-20200406-25.el9.noarch.rpm
b046ae3235dd28f2db3c4570bf6cd7fbf9ea0147f2b01f4cf1b009eaa1540ab8
texlive-fontbook-20200406-25.el9.noarch.rpm
63e960f45617067b2ba7b44ee64f94cb1f621a4117d9e8b2b04b142b56efc5f1
texlive-fontspec-20200406-25.el9.noarch.rpm
26dd4bc3f6f39083606cd0305850245adb4dc8435cf121a11d900b2d5131d5b9
texlive-fonts-tlwg-20200406-25.el9.noarch.rpm
6a6456c95c6446fdb155c1c63412afae827076bf1c29aa43e259c55276482962
texlive-fontware-20200406-25.el9.x86_64.rpm
ce2c0ef28202e54dd8713d3f5c6ad28fd287e5be8c33d3c3d1b46e15eaa1b254
texlive-fontwrap-20200406-25.el9.noarch.rpm
2419044f529cf2f2f28a6c58b14553c6060cf7d8c8eff4e28036e9a20134d6b0
texlive-footmisc-20200406-25.el9.noarch.rpm
fa91900e08750f06ca6010d2f40ad994572a1f466113e448d039e763e76f8e13
texlive-footnotehyper-20200406-25.el9.noarch.rpm
ab3ef46a0f83b66db99177eb1ceb2aba0c569637528e6c652708d2bf5fad20be
texlive-fp-20200406-25.el9.noarch.rpm
9d736c64c28c6415acb64d87efd9f8f56414b769c7d0df8600542970b245d5ad
texlive-fpl-20200406-25.el9.noarch.rpm
f972dcfee22a919a58c0f04444616dbbecd82eee32f8ab9bb55052cbf0d9e0ae
texlive-framed-20200406-25.el9.noarch.rpm
17f11a898b718c2109b84ca933a15937d38b97d1e3fa510ffbbcb6c1123a2b62
texlive-garuda-c90-20200406-25.el9.noarch.rpm
25500083a9740ad8588207d892a41b2f6e9ee2c0b5a49294c00f8550455e3565
texlive-geometry-20200406-25.el9.noarch.rpm
9f61e8c972e291783370ffc03960bd130e80b997a72db451eb54477cdcfb8a9a
texlive-gettitlestring-20200406-25.el9.noarch.rpm
16d520d8dc94551dfe06602ac2cb2165e580a71b611b300dfe170452c4fbf23f
texlive-glyphlist-20200406-25.el9.noarch.rpm
543535f55f96dc5e9749c87c54456e4fd92985225860c95ad42cc690eb6f47a0
texlive-graphics-20200406-25.el9.noarch.rpm
171020277bb76ff37ea37ff4cb614d2eed99be9ef38c6479942716de26e45342
texlive-graphics-cfg-20200406-25.el9.noarch.rpm
91b088357f1991f40a46aa2dcac0d584089cb9f48ac417877f935aa9d7b621ae
texlive-graphics-def-20200406-25.el9.noarch.rpm
913a2a729d7bed63b31f783db16882e2c8580ef4f6b4392f2c0db7e3e8245579
texlive-grfext-20200406-25.el9.noarch.rpm
fd0726cdd44c54cc3de496aad0a4b62320f07e1e6e9ce143b7fe8da4695f6130
texlive-grffile-20200406-25.el9.noarch.rpm
5a4943947e30942b0ce97551a3568ee70835c0c2c3690da133e23d603e968a3e
texlive-gsftopk-20200406-25.el9.x86_64.rpm
b662ecdcc75d7ea8bc661c3feedae0aef5032e3c83f72fbdeea649a2f2f48d1a
texlive-hanging-20200406-25.el9.noarch.rpm
b6a32be3292055d832506536925a027bb8ec0dea76feef62bf19dad7e4aa1b23
texlive-helvetic-20200406-25.el9.noarch.rpm
c31516bb0f86bc98aec447d4926ed31b25bdf7e669f321969e45286b0873532f
texlive-hobsub-20200406-25.el9.noarch.rpm
3cddfae64b6d2cc5fa09459282d53b414fb401b5d2290453dbea277ee50302b3
texlive-hologo-20200406-25.el9.noarch.rpm
65d86d0c1c8dbac8504d0c115462f3062300832cfab0afdae8054a7ee827b716
texlive-hycolor-20200406-25.el9.noarch.rpm
62113811f56673efed936b202936a1a81d6610ace5dfd015e219c45ce8f6c3c8
texlive-hyperref-20200406-25.el9.noarch.rpm
446ad06e02b81baeb1aecc3dc8fffad403131e232e2026936fdd37a18f0c8ae4
texlive-hyphenat-20200406-25.el9.noarch.rpm
af6ee67b4bfd13d1203cf4406d7cf58d60f6dd43461558a26e96633d37840daa
texlive-hyphen-base-20200406-25.el9.noarch.rpm
16db2ea263a4ead5386d8fb8638926981aed67a1b4c0ef217a2cd5478566abc4
texlive-hyphenex-20200406-25.el9.noarch.rpm
34517cc2b31232e5db1de5764d52815cf1d96ab25209270a22b637e0bfd8fd76
texlive-hyph-utf8-20200406-25.el9.noarch.rpm
856bb855cc46e20dddbfe3cfe06fd7718ba26cb448ff1c68db27a60fd3d6275f
texlive-ifmtarg-20200406-25.el9.noarch.rpm
82ded51e4f5cc888917eb675c8e0bc317f67aef0f2edc9bf8a122c662dd8b3c4
texlive-ifoddpage-20200406-25.el9.noarch.rpm
17697b642b7f994fcb8e278809505d25146d52b28363ff931a4cbc195cbfdc8f
texlive-ifplatform-20200406-25.el9.noarch.rpm
b55df9029314aec1477b0e1065dbffaf682e3bc8039880bdb11bd54645f3b4cc
texlive-iftex-20200406-25.el9.noarch.rpm
23a72034abc547bbf4dcc7a3180093ccf1e69ef6c9b6fce59a87648814e0891f
texlive-import-20200406-25.el9.noarch.rpm
1ce6711af9a8de0866c60a143062a654c35d4f842f9412fbd412353a253a17b1
texlive-index-20200406-25.el9.noarch.rpm
89acaec879f1aa593fbdfe86e873feed411c08ee01346b7093c83f498eeb84fc
texlive-infwarerr-20200406-25.el9.noarch.rpm
09599e7a8b70f7b2992de3f140089d3942fac23a26f3002c630ffdb8826cee76
texlive-intcalc-20200406-25.el9.noarch.rpm
485e10c2061d44e5abe72b53f882de43a28ca20dfa23b66e4ab51a73873f622f
texlive-jadetex-20200406-25.el9.noarch.rpm
8704abeed3d8a057516a511a60153b4904ef968383d55280067dada0e1dec0d2
texlive-jknapltx-20200406-25.el9.noarch.rpm
8839f070a6630692f26d836ee44b8f4ef49bc26119ee32a3565d8de33cdcdad5
texlive-kastrup-20200406-25.el9.noarch.rpm
5395025b30aeffe738ad59be5a4c29a65c8100455d6eee54c8762c0aa34752d0
texlive-kerkis-20200406-25.el9.noarch.rpm
93b4bf5bf9fa698b52359875d8ee334599651c702cf81b2d3f746e8907b0eafa
texlive-knuth-lib-20200406-25.el9.noarch.rpm
dae531d9b9073c5b6c5cf349a64a954bfb87066bbb92ec99a79ca694579c7473
texlive-knuth-local-20200406-25.el9.noarch.rpm
c1a285c30a7a105b647cef0c146e1aebe4f6087203e43eb311ab063e586f4812
texlive-koma-script-20200406-25.el9.noarch.rpm
d73fdb442093c26ac30398a5b5b41ca9d9fced776ffe273e61b5ce152eda5322
texlive-kpathsea-20200406-25.el9.x86_64.rpm
8461f5b8d21a068ef87ec095073498fba40189e2b0766fdf761caf7a5fcc9f5e
texlive-kvdefinekeys-20200406-25.el9.noarch.rpm
351d028ded3217656df56a77b16d20dc3b96dbb4b2fc6d8bb365f1371ffe6d3e
texlive-kvoptions-20200406-25.el9.noarch.rpm
f17ea1e7870d0eb34f66e12e787915c7da84c86b25e4463b4cb34b07995189cb
texlive-kvsetkeys-20200406-25.el9.noarch.rpm
525c8cb4a6dd0365f4c072fa04d8d9b29276d882e0da0e14697c25aa84ee996a
texlive-l3backend-20200406-25.el9.noarch.rpm
0953725fa1adaf10ce87c8ae26949261340f5a614238112105fade39ed5051d5
texlive-l3experimental-20200406-25.el9.noarch.rpm
4dd0e8e848312d24fdac74797f786b7e3b738790bcf885de289d748ca431d4db
texlive-l3kernel-20200406-25.el9.noarch.rpm
d0178ba34b1bede7f17d43f79ad54a7cd3b254da6895d65a616c22894f74f116
texlive-l3packages-20200406-25.el9.noarch.rpm
d307bbe382bdfff6e01bee4ec179602ac2c83e591c66d6c2f5bb6d5ad99f8953
texlive-lastpage-20200406-25.el9.noarch.rpm
423f90503f8835fb912fd56efc0b3b69cf3dd1c620d12f7ce7f4d43ace16d54c
texlive-latex-20200406-25.el9.noarch.rpm
9da4f0e77b12a1269d6f37b3c4e1177fc62bc902bea4d433332d78728817a562
texlive-latex2man-20200406-25.el9.noarch.rpm
3df9b50d9cf28409df035bf2aee40f54d5d768078f8d647987fb05a32bfa65df
texlive-latexbug-20200406-25.el9.noarch.rpm
193ecf4b3d5a5775f298e31b8e5f2db345e62f345bd25b24850d6b02046f0eb6
texlive-latexconfig-20200406-25.el9.noarch.rpm
38ee316fe6276d64f43dfd376c475af88976c4f4144ce9e9fe9720b92bb005f6
texlive-latex-fonts-20200406-25.el9.noarch.rpm
89fc2b97ed8d1f2b5bd1597d0eaf956f2cf9afcacdf08f3dc30ff6becdbf4900
texlive-letltxmacro-20200406-25.el9.noarch.rpm
1d2fd51cdb742e957af3c89f0c2ba001cf607f5e67ee8e363a117ad7f5b2271e
texlive-lettrine-20200406-25.el9.noarch.rpm
b7cc0e257cec45cbf38b406d2a9a07cc8baff369630a70d4481a97a65286d905
texlive-lib-20200406-25.el9.i686.rpm
5cb9f285421261df4c8cb55c0e9c2a08a81b39b8998abde14528855540352bf4
texlive-lib-20200406-25.el9.x86_64.rpm
2a124e50d9db2a68c45c034cbecdfc8a7eb33efc4cf30d44ee2d477837cec813
texlive-linegoal-20200406-25.el9.noarch.rpm
30df149db842ffd1782eab6f3aa5a49852a7dafcf46ab890bbe421fff5f55a50
texlive-lineno-20200406-25.el9.noarch.rpm
1b0efd7c2420f6ef413c8144ed626f7e6ac00b3ad6565ec2b394f4122909a977
texlive-listings-20200406-25.el9.noarch.rpm
b8ba763edb88516b961ffe8defdef4392353d4200a6b9336bf6356bdccbe559a
texlive-listofitems-20200406-25.el9.noarch.rpm
47a01e02af9dc420e258ae1733ca2c74ec3b9980bfc9c025e1132f0dc4b28425
texlive-lm-20200406-25.el9.noarch.rpm
3792db1db193c08828bac9add69d9d4d1c578d21471588516792c56e602497f6
texlive-lm-math-20200406-25.el9.noarch.rpm
95270a15e0e434ad69ecf292263b5b96845a4b8cbe2847e0f6fe300421b7f4dc
texlive-ltabptch-20200406-25.el9.noarch.rpm
60bea50e637e6f2475eb1fb0ad72f574f48eb2671513dccff549d600ba182667
texlive-ltxcmds-20200406-25.el9.noarch.rpm
f6992f0513512647d2416904e95c754ed4eea5ca13ae85fd577ec96a38b3b109
texlive-ltxmisc-20200406-25.el9.noarch.rpm
bc64226524092303b70ded56960d6a97a1325b7384546b6245c0041ad1a5cf50
texlive-lua-alt-getopt-20200406-25.el9.noarch.rpm
b0065dd35f9b4eaff7da4a6d1ddc0f605de82b265f75d88da8d004cfbbe73dc6
texlive-luahbtex-20200406-25.el9.x86_64.rpm
d91ae8a8c1a7ae8a641fadc3c24553d841af638a4c51b78dd549951c2fb29c0f
texlive-lualatex-math-20200406-25.el9.noarch.rpm
9c5e76878035b327e3bfd934a36bc1ecd2f60c1d9b87eac446db8dca73a7d07d
texlive-lualibs-20200406-25.el9.noarch.rpm
bba0a43a389742c435d139181a98c5b3b7c37c03a6e087d01eaa4a1b5f0e96e7
texlive-luaotfload-20200406-25.el9.noarch.rpm
01f73a8ff7e29329bccdadb8d7a9d1e25dd520875a9d89e1503b031ef5d44120
texlive-mflogo-20200406-25.el9.noarch.rpm
1afc6f046d9812521c2636fc385522ae02ef4ca8d5bd0fa5fb7e5cf50aab99b2
texlive-luatex-20200406-25.el9.x86_64.rpm
87b6db33d2b51feb6ca29488b2428d766232938ab2235bfe2f131693269a2d07
texlive-luatex85-20200406-25.el9.noarch.rpm
05b0fdfbea60ca8ea7785088cfd02a902092fe7c8b8e0bb24021afe66976e03d
texlive-luatexbase-20200406-25.el9.noarch.rpm
513c16c6a87af15a12b9efe129b81474d0b350f641809b5d723ebde474ee3e94
texlive-lwarp-20200406-25.el9.noarch.rpm
e4fff295be0b11e774a3e0bdff9207765536a18bbf6e434a02adf8c2578221d8
texlive-makecmds-20200406-25.el9.noarch.rpm
0036f630755d753612f9cb00524a0b1ed63633d690e6d74c5d47173182562ec1
texlive-makeindex-20200406-25.el9.x86_64.rpm
cc236137949733f0d49227af50a5e4d41d42fef05c3d1022391cb05fec7cf910
texlive-manfnt-font-20200406-25.el9.noarch.rpm
de180eceaaf8d889af7574330d49c9d6262dee26663e62c7b3b33b97cef60bbe
texlive-marginnote-20200406-25.el9.noarch.rpm
864359c8c3712ace44f0eec16b4bced44421f3334b61e581f87da22964b049c9
texlive-marvosym-20200406-25.el9.noarch.rpm
5e9ef272397b6cfddb11dcabe69a00d5f7455fc2c5d25ede85f5280e8eedacd7
texlive-mathpazo-20200406-25.el9.noarch.rpm
58c5790696bcc4a76daf58d3cf86041286ae5dea0b463e2fd19ff760afc7d9d6
texlive-mathspec-20200406-25.el9.noarch.rpm
2e51a33f36543a8d5545b6dfd83f0397b1ec9322a30776bfe61c480e50a802aa
texlive-mathtools-20200406-25.el9.noarch.rpm
81d014b6f9c1d1255ae3b3dab3ad7ae862fe6b47796f182b9945c696eefbe271
texlive-mdwtools-20200406-25.el9.noarch.rpm
efc50baa870fdd49e732ba54982b319027c165352f5c01e040ca5ec4a3d2fc57
texlive-memoir-20200406-25.el9.noarch.rpm
eff39127d155c52bed0e44b897df30bdfb76471cbc459e2d7db5af215b349c7d
texlive-metafont-20200406-25.el9.x86_64.rpm
ace3a3594b1b16a06c69f0244122dbefc74184aa91d4fadaa333d08e85ef8e46
texlive-metalogo-20200406-25.el9.noarch.rpm
fd95b8abd702f3473ed7e80b0d9702345693b89ba1a175d8c939f87a1baec501
texlive-metapost-20200406-25.el9.x86_64.rpm
6fbb79f6e587ee777483734c1e5226ce2c4cf3698283adc66c1db84b7f586cc1
texlive-mflogo-font-20200406-25.el9.noarch.rpm
fb2fac571c04d381cfb61752f63fcb57d30089b09dca7cbdcc20427a5b8484c0
texlive-mfnfss-20200406-25.el9.noarch.rpm
dda66b977ade784044923c3af0999c676bb3f33f75b30347794708e247e8469c
texlive-mfware-20200406-25.el9.x86_64.rpm
58da28904d9ba7afec00aef0981f5e734dcf1e89177f3487d3eca4200245a588
texlive-microtype-20200406-25.el9.noarch.rpm
bf6a25abc838c067acf1fa19ea4a0b8a7047cf27a84206b5b31b29a928b5b51b
texlive-minitoc-20200406-25.el9.noarch.rpm
3c9d58f4b4001f0b1639b4306719fe82009ed4cd4bf64b2bcc2d31a6d5660160
texlive-mnsymbol-20200406-25.el9.noarch.rpm
119ce08b739c292ff2c8e92ad17d13e5dbb9ec50566b585b1646f5ff4c307e91
texlive-modes-20200406-25.el9.noarch.rpm
2b6b01563fc9dae1b7a1c69dc5564462bcbf26fc2e06b1664f99e1cfe6199c56
texlive-mparhack-20200406-25.el9.noarch.rpm
4497f869676d6e90593e23b626ea1a1888a9fe1a5f0cfecb37f496b8539d2dfc
texlive-mptopdf-20200406-25.el9.noarch.rpm
5c2f4670cec9e8aa28153bb426af3c6235ef429e864d9a52d9f07be8bbf8cc88
texlive-ms-20200406-25.el9.noarch.rpm
b10b0154d0376a4610cde1e27a99c68701833548575015060e1c9bfb10958ac2
texlive-multido-20200406-25.el9.noarch.rpm
2ceb75c3b03e832f68bb44cec37c53399ddbc013efb93337bea92ae39a91c1a3
texlive-multirow-20200406-25.el9.noarch.rpm
d8e9725313e1b5b33b69120ac5f3783249338603c963106a301f4c23411ba41f
texlive-natbib-20200406-25.el9.noarch.rpm
994862a0c3432b57cf428fde7d44a946b7a5e28b8db97f36e797220ff8c0c83f
texlive-ncctools-20200406-25.el9.noarch.rpm
978ced7b787affae5cfcefe29a78b05837600ab6b7204d9db01ef59db368b1f3
texlive-ncntrsbk-20200406-25.el9.noarch.rpm
e1247220e2d528dfb8a923f956630b0a7964500950ac5269f9a18fc76791ac43
texlive-needspace-20200406-25.el9.noarch.rpm
cfb8cfd5679c9f8bd87004994b9d49f8c92d3da38cb4d00395cab7cad476e2bc
texlive-newfloat-20200406-25.el9.noarch.rpm
95c0f2f163c39301b5cd52148f96d006ec21ee7aeb8e002cae9d3100f1029941
texlive-newunicodechar-20200406-25.el9.noarch.rpm
400ec7f4812690f8e721e876570b2b9cb0bfe9e5b83487c76d6c00a09d81ddb4
texlive-norasi-c90-20200406-25.el9.noarch.rpm
2cf0fb88ad2f3ade78f77971dc7395801ac75ea84040cf517f373a0a6ea3b129
texlive-notoccite-20200406-25.el9.noarch.rpm
e6ade9f118f2f4526fc2f4512bf2a3893fe06f47053a29acf986d6d220870f92
texlive-pdfpages-20200406-25.el9.noarch.rpm
5484b413c0b52c7ea09da03e8aff7be9791460b86b202f23a8ab8fc19941405b
texlive-ntgclass-20200406-25.el9.noarch.rpm
020362c734bd55750242017ec8f18debaae8cf90041c3b5d2be8d08c5dbecb70
texlive-oberdiek-20200406-25.el9.noarch.rpm
b1ab557ba78c19e427dab7dc6b4672a4c032dac197f2b6f55fcf53ba9987f85f
texlive-obsolete-20200406-25.el9.noarch.rpm
d06c3883791f9b892acb1d45d1a458a896bcd13c428cd985f57f5069b7432a94
texlive-overpic-20200406-25.el9.noarch.rpm
f5549641883ce8a04da34562d93d49567fec38c8b86c940ff7b85f05b38b6111
texlive-palatino-20200406-25.el9.noarch.rpm
f2bf49c285378767dd4278029ddd4c109abf2b4595f8872d0c8e0c0758f82b72
texlive-paralist-20200406-25.el9.noarch.rpm
7b9550d3578d2799a6df4cad660261d170f7cda3d5ce8349c768fbf7d6e92172
texlive-parallel-20200406-25.el9.noarch.rpm
48f06a46cb8a65328f274ba4f574bb748d0ea4e5aad0a6dc08b72894195915a5
texlive-parskip-20200406-25.el9.noarch.rpm
46a6ed23bcec5539cabdb67e2864ce5b88f2c8183e185073b1ad891c39536218
texlive-passivetex-20200406-25.el9.noarch.rpm
67ce13efdff507306be4ae126121cd035215cfc5f71c5cf77c2cb027a703ede9
texlive-pdfcolmk-20200406-25.el9.noarch.rpm
3b3544ceb75d7f9d0569766ec9909e13787267b8f8df4c9c9bf84c448c9bf40b
texlive-pdfescape-20200406-25.el9.noarch.rpm
cc47f90869fe4af51dd17368f6a91291a8e050abc8224afe56e64bdf2c1768cf
texlive-pdflscape-20200406-25.el9.noarch.rpm
e2337ea4964520c8f97109d1181f475157459e6eae5307f0015edb646efbb3c6
texlive-pdftex-20200406-25.el9.x86_64.rpm
91f33963e4364395001058d317100753cf1e1162ae79f87c230238cc289536e8
texlive-pdftexcmds-20200406-25.el9.noarch.rpm
73227e722a6ba1314d0f35cdbd070571cf657fb84a5bdb4d35baa415fe9e9e17
texlive-pgf-20200406-25.el9.noarch.rpm
96c9488dad4eef71ac8c88f4b0892c6783cf79cddb79ec93a2d494db09e6068f
texlive-philokalia-20200406-25.el9.noarch.rpm
0128da4b085b239b266abd80a540cdf13cfccbbbd083ed1dad150750638200bd
texlive-placeins-20200406-25.el9.noarch.rpm
698a46cc7eb8759bebfb3ac156f8fbc24d88c455af179b37c1cbc2f30c98bffe
texlive-plain-20200406-25.el9.noarch.rpm
81f92c89d121442717cc8a4ad13ce1fb63b2cc286e7a6e33479b211d83a408ca
texlive-polyglossia-20200406-25.el9.noarch.rpm
a95d9f25375e4936ce0b6ddc2d72bc180b8c77eca8c18e5ba32b06cbc78e8d7d
texlive-powerdot-20200406-25.el9.noarch.rpm
952942fde6dc86db4f9ed1f24051b79828f64d0bd87b9610be4eaae00b491d1d
texlive-preprint-20200406-25.el9.noarch.rpm
2686e593feb6ecf2269bd5282c6be63b2c3451fafcd22026a9a6235b5d675d05
texlive-psfrag-20200406-25.el9.noarch.rpm
c5afecfd2f68354ea4f6744b6030fc7f6e443ece2107b0937f1d164bbf98965e
texlive-pslatex-20200406-25.el9.noarch.rpm
9847409bd94e3a7f855c66e2826fd1570f73c7980488a021d3b1e99282be5a22
texlive-psnfss-20200406-25.el9.noarch.rpm
03c3544608a35082d9dd549f575c627a3b5906d03ea4b2d2bdc1c9aadcaf0ba0
texlive-pspicture-20200406-25.el9.noarch.rpm
9e3fbb29e121a5211af3e9f4031bce0753cf8f2a6bcbfec7c30560b2108a63b1
texlive-pst-3d-20200406-25.el9.noarch.rpm
aeec938b535b25f3b00e9ee113eaae486ac37cf8a21b8ab61124baec2fb9924b
texlive-pst-arrow-20200406-25.el9.noarch.rpm
25491cceff03df8b1c5ebafc20a952b9b962cc90ccdf871f3f95a19da2eea0ca
texlive-pst-blur-20200406-25.el9.noarch.rpm
19c0a11ebc89ee46c6ed39f08e10dcb937fd3f1d9f797ec0d3ca26825c58f8e8
texlive-pst-coil-20200406-25.el9.noarch.rpm
12826590e1af92e8d56c5a98ef2cca6f8331657b808e3708ae9edd45c64d4058
texlive-pst-eps-20200406-25.el9.noarch.rpm
09c6bebce66f7bd561f42317b5360064620af3b1d17e6b629e3052d5d39a520c
texlive-pst-fill-20200406-25.el9.noarch.rpm
ba011dcde9e06229ac41639779481721fbc605c5ef3f563a7c933cdbb69097ea
texlive-pst-grad-20200406-25.el9.noarch.rpm
9c4de4b759085b0ed7723e8fc8a9a2e8df38dc5d4d68a53122cfd98741412d23
texlive-pst-math-20200406-25.el9.noarch.rpm
a6fecef207a39605788c1c888809ab0334cb2d335b04908e4ccf75376128bcd9
texlive-pst-node-20200406-25.el9.noarch.rpm
3e074a82e14f18d17f2fbef4be40882de6cbef844deac006f6b523e3a0cfb494
texlive-pst-plot-20200406-25.el9.noarch.rpm
da752da70547dd8ef6a4f017d4d3a22b704c5596fec1eee25b00ec34b53df804
texlive-pstricks-20200406-25.el9.noarch.rpm
d89780e5aebd796b75bd64a13619c213ad49dcc0289b91eb0a2da817c1b69848
texlive-pstricks-add-20200406-25.el9.noarch.rpm
70379c9017efd66105b522958d22d60b024e7d7f3914b5c46eafa3cbb70ec6b1
texlive-pst-slpe-20200406-25.el9.noarch.rpm
a4e795690600c2bb92c414e341b8a013d6d19befc6cdaf4a64182d5d395f2942
texlive-pst-text-20200406-25.el9.noarch.rpm
fcf4bdc9a22207aa25a452782f7d5366f73582f5e67eb3f0aa2986fceb89ed73
texlive-pst-tools-20200406-25.el9.noarch.rpm
4c61633afdbfbab31599ab4ffa3f1000819ac02c785b3fae0c2a754da9da6d45
texlive-pst-tree-20200406-25.el9.noarch.rpm
1bc668a2085cd4e07573f31b7b60613fe17b49d2f60c7af0f700ad66897d70b2
texlive-ptext-20200406-25.el9.noarch.rpm
5b5af1a9486ae25908d5973449c9330c62b35a3c5d403541b4ccce72cfb62a15
texlive-pxfonts-20200406-25.el9.noarch.rpm
20ba00aca9571b4b88db8c97f3bb6d041106071e86081b2ebfe2c8bdbee234a2
texlive-qstest-20200406-25.el9.noarch.rpm
6b3eabb90ae5d1e42a54dc54d50c77f22ad00de3e1fc75813ae8f98f011d7c76
texlive-ragged2e-20200406-25.el9.noarch.rpm
ccc1663424a7d7e8c9b2e09bc27ef8fecbf2feeb681830f90fb527150af59b91
texlive-rcs-20200406-25.el9.noarch.rpm
290386a22b1faee86362be1b64a8c871a1d172d15e36890bc2970b1792914b74
texlive-realscripts-20200406-25.el9.noarch.rpm
508bb1c9454ce09edc17806e4df3f6bef0582659fdcd8ee58c464b43032bf094
texlive-refcount-20200406-25.el9.noarch.rpm
d4836ac7c8c8507c9ba52f8f3995e2be0425fb842bee9e27a27a1fc07998c34b
texlive-rerunfilecheck-20200406-25.el9.noarch.rpm
5b125749deca9f4c08273eec2a012bc22ddd0c21d27d41c173ff193bad357999
texlive-rsfs-20200406-25.el9.noarch.rpm
9438a38e43d2a936ca88fd7b96ea3e5618ae87847c1d9e5e1d3d6e9158ba782f
texlive-sansmath-20200406-25.el9.noarch.rpm
0b54104e3a155dff625ec906ccdcd17ab1a9d7b254d89296dd22bb03e9ee7292
texlive-sansmathaccent-20200406-25.el9.noarch.rpm
f017d679e4cf2bf97481d5c4e6c754803aa774570e8146b57dbd26694685affa
texlive-sauerj-20200406-25.el9.noarch.rpm
c2384124bdcc29adba71a86e29a4c1fb126144cec8a9a274a309513449f71025
texlive-scheme-basic-20200406-25.el9.noarch.rpm
604e33cb408eab81c83492aa71778866326d0c39823ff9af142462ed56dc69be
texlive-section-20200406-25.el9.noarch.rpm
c9e8b1953ce2c61e1ad2dd200b9409c37a9435c088b60b1b4c5cb0b53d651313
texlive-sectsty-20200406-25.el9.noarch.rpm
65deaf5972533b9c7c7e56a96906a4e64c1e1963b7f261274cf1aed31c8c59fb
texlive-seminar-20200406-25.el9.noarch.rpm
ede79a44a35fc1ed7bc5cb3b1ec66edaafb18a7396909a5b26c8a79d0f8e9101
texlive-sepnum-20200406-25.el9.noarch.rpm
bea445e926a419a00c9dd5f9e64e4c384f84fd0e3c5943ff08a46e1e60bfb551
texlive-setspace-20200406-25.el9.noarch.rpm
b9375ee1fa009ca226ba030dd30f8edbf2c2756f89f12a5c78506675d173921d
texlive-showexpl-20200406-25.el9.noarch.rpm
0dcc1a6adadcd5f66282d3f1c44f91fc540b22a3a55c3b6439b7fb682a4627e6
texlive-soul-20200406-25.el9.noarch.rpm
df4a2daf964c19791725b1b51855270882be78a13139404aa5b77e23552099e5
texlive-stackengine-20200406-25.el9.noarch.rpm
4522def90f5d7d345cc7d666dd5efc92d84ca1a9c60eafa7cccf6ba034eb6b48
texlive-stmaryrd-20200406-25.el9.noarch.rpm
6f215f784a976c907f6cbb5dca1b593a304c34c6c7625d310375baaa8073acc4
texlive-stringenc-20200406-25.el9.noarch.rpm
c92239d5cd9b940b2b1d839fc5e3ed33c92bd9a2a5534724174791ed0a9c9b66
texlive-subfig-20200406-25.el9.noarch.rpm
09b41a872644f0f859d687baf48319317e326a4f57dd8b8815d0690acc75def3
texlive-subfigure-20200406-25.el9.noarch.rpm
a2f6acaef7c3289ca357cda490ab9dbc758434897d5a6faa7409880ab7d64353
texlive-svn-prov-20200406-25.el9.noarch.rpm
cddf69d3ff8db867b22e1f143e37407a9b22167722d83d5ef1c1a59f7812d89c
texlive-symbol-20200406-25.el9.noarch.rpm
55e6709574343018182bdc912c3d9beb9890eaae2a3faf617fcef013ea61d84b
texlive-t2-20200406-25.el9.noarch.rpm
fa2e2003f8380f601cc0d1caf549336dc65768f07b03e601241d9f68a2ab61aa
texlive-tabu-20200406-25.el9.noarch.rpm
7a2d58c069ab1fa324bb1f6ce4bade227944d8e95782a3bac76c8ea480ca4695
texlive-tabulary-20200406-25.el9.noarch.rpm
f92d6e1af56c2ed6b81ea6078398494028d7ab7b52b007f273f5459ed302e529
texlive-tex-20200406-25.el9.x86_64.rpm
6d07476bd9ae8b9ff2a69a9dfb98640f21725edb4d27470ba215e64487a7e43d
texlive-tex4ht-20200406-25.el9.x86_64.rpm
7f370d30eb1b283b19d9499c3f96bbea23ef2d5f1359b5bdc4eb8b88192a7d4e
texlive-tex-gyre-20200406-25.el9.noarch.rpm
ec064b3921ff28eade93c13b11ae2930a86a0c0b7feb2cf0818b1a8d6212d326
texlive-tex-gyre-math-20200406-25.el9.noarch.rpm
bed88e6700ddd69e5e76d6adb07bb122fb5308e114fa70eb6e981f5ef26587b4
texlive-tex-ini-files-20200406-25.el9.noarch.rpm
a02992283c6bdf768fce09cbfe8b3d0412ce84cf1cc6eac44f45c0cabcc53ecf
texlive-texlive-common-doc-20200406-25.el9.noarch.rpm
ea28ab74687d1a6bea0b7753a83d39b053e76784d144690b4ab297da1a28d296
texlive-texlive-docindex-20200406-25.el9.noarch.rpm
a9f5c9644b7f95e11e138e8379d5b57fa6bcc571bd4fbee734eb0835982b6028
texlive-texlive-en-20200406-25.el9.noarch.rpm
cad82513b5f8592a37c96806903976ee30e3218c9cd1c5bb685eba8ca8b0fc56
texlive-texlive.infra-20200406-25.el9.noarch.rpm
da72db9c7460fab1f640b319784d9474d58c9f216516c1842d81d1c7f4ea48d2
texlive-texlive-msg-translations-20200406-25.el9.noarch.rpm
175e43bc21f4eaa81524094fcd09b7edb5667a9b173ca6525e1ee604a2a7217a
texlive-texlive-scripts-20200406-25.el9.noarch.rpm
c6d1c66776c030852e1b02e1a72f29a686d074062043fd8151e281f4fdf093d8
texlive-texlive-scripts-extra-20200406-25.el9.noarch.rpm
40d8136ad92b59cab6cf045478fd45cb79ae0ae9c31de9be40c8c7a7bfb5c693
texlive-textcase-20200406-25.el9.noarch.rpm
2f8cfadf73e9aed6b6276d0be3995289fe3291acdad2dce168decf56532787f5
texlive-textpos-20200406-25.el9.noarch.rpm
bfb0186e8e9d3a61e3ac74de1abb4c64127e7fe7decf8f7bf1c5ab1a12e5a897
texlive-threeparttable-20200406-25.el9.noarch.rpm
0f255d8e626a80f347b783ce81f1b978119b1e9c900b3e6cdb43e23a8770fbf3
texlive-thumbpdf-20200406-25.el9.noarch.rpm
5a130b14b45b5614f577a922e1e4fc432996aa8791f52537b2482964e13243e5
texlive-times-20200406-25.el9.noarch.rpm
9418deacde7a5d618fd85ef263542d4d609838e34db4ec6cd339440f5ae8f45c
texlive-tipa-20200406-25.el9.noarch.rpm
a8f19dc804f7ac6b1d292271b724e73777143b2868fb438e314ca0c95837fd6e
texlive-titlesec-20200406-25.el9.noarch.rpm
12e0c3b29f9cdf7a89c2bb2bd46dd0d02d6ab1ccc481f9b2a9daf860e1f0345e
texlive-titling-20200406-25.el9.noarch.rpm
b28121941b4e5bc05ef3770f0012bed289b593586ec25370ae1d0762fac8ce76
texlive-tocloft-20200406-25.el9.noarch.rpm
57d2ead533c7a2ea4dee00173ee5066133063c87e0dd8f841e5fa40c1e4782e7
texlive-tools-20200406-25.el9.noarch.rpm
7666ea34c5c50cd3ce19c622a7aca644e3d277ec17498e6097c8e7d3213c9fc3
texlive-translator-20200406-25.el9.noarch.rpm
ed25ee47a6d497b9da17971b90688c6ecce05c2d4043e8c0868dc21d6292fe3e
texlive-trimspaces-20200406-25.el9.noarch.rpm
bf180a21bed6370d0d22495ce8a380da4eb85092d81a43b804744367c2f7b002
texlive-txfonts-20200406-25.el9.noarch.rpm
98c4cfc3718fe4d4ff33708fcf8e07f5c0db260d0b31912ca21c8086d04ef10b
texlive-type1cm-20200406-25.el9.noarch.rpm
a689773174410205b40e55c5b457cf317e25bb84a595c9e76033a39f84e4222e
texlive-typehtml-20200406-25.el9.noarch.rpm
0c50cd800ce54a83c376adfa2f3d67be4a982494f9c70acf884bafb188740f2e
texlive-ucharcat-20200406-25.el9.noarch.rpm
28c0785063de63a0cfc6f3f00bb65141a9763c40a6452bd8b80cc59268b9bf48
texlive-ucharclasses-20200406-25.el9.noarch.rpm
9e7d1246c59514b05ae5534dc6e7fd3d325dba2c43e5d7b4562482dd828fa1be
texlive-ucs-20200406-25.el9.noarch.rpm
ace272d52430f78f859b44bdd14d3779a1ff144720608d86d35fe5dfbae99099
texlive-uhc-20200406-25.el9.noarch.rpm
f273a8b8dffde6f41ea5157905fbc5322b3fa7f5587f3331b7bf7c45892a56ac
texlive-ulem-20200406-25.el9.noarch.rpm
3b703fe1545e3b1848376cd61d9c58a3943b584a8cfb5c7cebe500145deae22b
texlive-underscore-20200406-25.el9.noarch.rpm
c48c3f6077ce0138eb519383de45241574a83a187372f64ca24823989b70de2a
texlive-unicode-data-20200406-25.el9.noarch.rpm
9bd29b49c438c6691ee10688a50e692a61f1ba623e643fd0b5dfc3085fd3abd8
texlive-unicode-math-20200406-25.el9.noarch.rpm
cef2e2188f6bcb94fdc5590a435d29e50bb6976445658ef196292b062e9f9dba
texlive-uniquecounter-20200406-25.el9.noarch.rpm
f5352e9fd14eb60534a040b4a949ec90193aac2755a882b4a525000856c5bcf0
texlive-unisugar-20200406-25.el9.noarch.rpm
2f860da9e67bcb21961011ddd5638044e3058b0d2a875161c09c06f87af38c0c
texlive-updmap-map-20200406-25.el9.noarch.rpm
99dddb855aba0cf9837f2441edac725dbaff64099543552914a84785d7788722
texlive-upquote-20200406-25.el9.noarch.rpm
2094b7f5526adf652180cf09f09e0798ee878a9c46bd0f8e7db04d453a11ca21
texlive-url-20200406-25.el9.noarch.rpm
c12dca17f89b388b5e544b56cd7c24222e6dbd83ef02680200221b1f3fca5cff
texlive-utopia-20200406-25.el9.noarch.rpm
77797f6c90fd67eb9a81e71ad643167571d0048b816dc31d7ecf1bccc1bde398
texlive-varwidth-20200406-25.el9.noarch.rpm
8db316c8fe0e7e3d285a4f43f3fe31a3f14eb03928c82223a22da31d08b95832
texlive-wadalab-20200406-25.el9.noarch.rpm
3be9c56baf2205cc7213aa15db773a377cbc55397f365aaca74eaa1610433dc9
texlive-was-20200406-25.el9.noarch.rpm
a1045da1c6443180b525e021f298be9b98c8d73d651eef627c65288e946c504b
texlive-wasy-20200406-25.el9.noarch.rpm
b70c8baa98f5450279e409c6abc4346d406925e9e508e58c449894035f6bec40
texlive-wasysym-20200406-25.el9.noarch.rpm
353a4132d0325d49776fecba86dfd6302c83f795d6c882d17cf3f4f9eacf3327
texlive-wasy-type1-20200406-25.el9.noarch.rpm
f86fc46d1db9da44cf24e094e8ad945154c470db4db4e4590bc416e5d05790f7
texlive-wrapfig-20200406-25.el9.noarch.rpm
653dcd2b0cdd00d465f35e6804001895c330002e351b2b0666c5bedf69113efa
texlive-xcolor-20200406-25.el9.noarch.rpm
45d29bd70c364ac048caca925267806bc7b398c0c92cb833f57a958458a33d10
texlive-xdvi-20200406-25.el9.x86_64.rpm
26c636cdce22e66c30cfcc71f1cf5abade583e879d3643408171f1ac559af2df
texlive-xecjk-20200406-25.el9.noarch.rpm
a1feeaa1aca990dcc540f3c3864c834156bf26490f32359d23e2612cc8adf4ea
texlive-xecolor-20200406-25.el9.noarch.rpm
cb7e4673d45370bf7d6294f896f13986cc571b002edbddc797d0c03d060b79fa
texlive-xecyr-20200406-25.el9.noarch.rpm
d1d46638c81432a9d1ad2906d655e979e028c71e76b183f4c861f5e7e8c5b1cc
texlive-xeindex-20200406-25.el9.noarch.rpm
c90a43536e43c4ee8d0e5971384d0244892302264dd2b7c01789440953bcac8f
texlive-xepersian-20200406-25.el9.noarch.rpm
364504a4d63aadab975d2f52a0d022c575ff64b4b474f2fad7aa2dd3bdbcf509
texlive-xesearch-20200406-25.el9.noarch.rpm
771e205e39f0621e3f7446e2f8b97c372970300c1205bbc5d7b5be27019cea4d
texlive-xetex-20200406-25.el9.x86_64.rpm
0779e9e75452f4e827b3017a71946bb2568730fb954d3f856ddb40e39e4b8067
texlive-xetexconfig-20200406-25.el9.noarch.rpm
dd2da96c08a88f5f32598e6c07c78e86728eeb3aea12430f5d58bf8e2aadbac2
texlive-xetexfontinfo-20200406-25.el9.noarch.rpm
71e286ef82c45745606f448f8c233a4a78d60ef57038fadd452724dd5ca65589
texlive-xetex-itrans-20200406-25.el9.noarch.rpm
2599a967b0e400d6530083659d8bfe199a01bf888bd451e30cf8182a754847ac
texlive-xetex-pstricks-20200406-25.el9.noarch.rpm
5f01f0b999a680c40bb464e10cba4297f25bb42ae4f219b9a16f7eb02afaeadb
texlive-xetex-tibetan-20200406-25.el9.noarch.rpm
4178bebb0541ffe4cac350e7b41a7810fbe1fcfbcad79f11a87c21242f5bba26
texlive-xifthen-20200406-25.el9.noarch.rpm
6a25652f0272f64ccb4df17d223439e2d2c78fcec55a9d0a6816ead7192ffed2
texlive-xkeyval-20200406-25.el9.noarch.rpm
288ba1407d18f0c156c31a78894851c80dbab1225d27ea4b4bacb022d02d1b42
texlive-xltxtra-20200406-25.el9.noarch.rpm
d4840248317ae32aa5ad710ae9717726dd2d47b931be59594e377155495135a1
texlive-xmltex-20200406-25.el9.noarch.rpm
78bbd46acb7cc5ec1763302e0f22a92b07b1dd003cf27e6e8cc4e65e72a1a83b
texlive-xmltexconfig-20200406-25.el9.noarch.rpm
5664b151f49581412039305093784e35ae431e095a35ffd4e2e36ccddc96ce5a
texlive-xstring-20200406-25.el9.noarch.rpm
2f16884e0c906beea2e2f97ba9639789df25c709759c31a59871d94f3835b4ba
texlive-xtab-20200406-25.el9.noarch.rpm
054d5dab6ab73edfbd43499c42c8e6810fd16b5b79901b45d4754dd9dad77db8
texlive-xunicode-20200406-25.el9.noarch.rpm
ba063ce789a9d57258cafb4e6fb0cdfc1b6e0e32730269118053749f4a5ce749
texlive-zapfchan-20200406-25.el9.noarch.rpm
41b83a458ffd2e359e3a0cfdd44aa7bec199f44642c36c56e5558aab0b19c19b
texlive-zapfding-20200406-25.el9.noarch.rpm
913ab45b626cd7a60b0fec8506263a882c1a9e63f766e619fc46e8414183516b
texlive-zref-20200406-25.el9.noarch.rpm
501847890309386d5549e72547b5df278d430d6a0532cf6d0070a7ad2a34f586
RLBA-2022:2482
new packages: gnome-remote-desktop
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-remote-desktop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-remote-desktop-40.0-7.el9.x86_64.rpm
1bb548a4b0df9716372c983b5e61a13d19df6c8c1f83b200fadb836975061a02
RLBA-2022:2484
new packages: mod_auth_openidc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_auth_openidc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_openidc-2.4.9.4-1.el9.x86_64.rpm
d8e146dcd658eb59cd20c82e56a1759fe8a5e019e1f4f2da41be2c9ef1e3b0e7
RLBA-2022:2486
new packages: setroubleshoot-plugins
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setroubleshoot-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setroubleshoot-plugins-3.3.14-4.el9.noarch.rpm
67e197f8149cfeb09ae0fe8e0f4ad3dd041c317a81fe73e8f0d7cf26b6b362f5
RLBA-2022:2490
new packages: libosinfo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libosinfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libosinfo-1.9.0-5.el9.i686.rpm
325c1a1383a155bd68f8ef9663a0e63799fa7e01ad6675a7d085ea866d461f52
libosinfo-1.9.0-5.el9.x86_64.rpm
69eaf3333428c449d54851af95245a88b6399df1f30915f89bd6f68a59a3a127
RLBA-2022:2491
new packages: dlm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dlm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dlm-lib-4.1.1-2.el9.i686.rpm
6835ff7cd963c6822dd7c19e8c7f48b32faa0b36484a047a74eb5d6a38995c89
dlm-lib-4.1.1-2.el9.x86_64.rpm
a564dbe1861dc4092b61b3399f97a001e73f3ae87dba4f15e9d260fe9de13b0c
RLBA-2022:2495
new packages: xdg-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-utils-1.1.3-11.el9.noarch.rpm
220b2000ec1a08d98897ba2f14e1d115376d9b31057936d8fc35a11e94a83cc2
RLBA-2022:2499
new packages: pcm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcm-202107-5.el9.x86_64.rpm
58e3876c6aab62f467ad1581ca7500d8530a0139e0431528509ddd52b773f32c
RLBA-2022:2500
new packages: scap-workbench
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-workbench.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scap-workbench-1.2.1-13.el9.x86_64.rpm
11625817e9cbdb59a92b21b19530e2d248a887ee1d2adcb03d92a54e9cfb8b5e
RLBA-2022:2504
new packages: qt5-qtquickcontrols2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtquickcontrols2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtquickcontrols2-5.15.2-7.el9.i686.rpm
858bb664e4004634b2756ace5422ae9f824de8458817951d55fbe1c9a2936f38
qt5-qtquickcontrols2-5.15.2-7.el9.x86_64.rpm
e1e1cefb0eb33cf8458c96133346d40d29ecbdd6dd097dd5d70eb250571edefb
qt5-qtquickcontrols2-devel-5.15.2-7.el9.i686.rpm
289b0cb7e47f0bb60d827a991885aaad809d49e99f009b15c5a2a10f81748712
qt5-qtquickcontrols2-devel-5.15.2-7.el9.x86_64.rpm
8cef7bc144bc7a07317159d58e45298bb3e5b2d549e348a437a5ae447d92c360
qt5-qtquickcontrols2-examples-5.15.2-7.el9.x86_64.rpm
4e430442669604c1367f502c07b10ab574b083e79473d8f7532d74ecf2bb8503
RLBA-2022:2506
new packages: libpq
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpq-13.5-1.el9.i686.rpm
79963f26b44799709f05b55ba3633f8b2d39b4b8c07bfd380247b2d9edec7469
libpq-13.5-1.el9.x86_64.rpm
4599a7ea3ee60dfdbc124bfd3fe8cb05fc52bae1d6edefb363c324f0daec1b6b
libpq-devel-13.5-1.el9.i686.rpm
e3267862ab1c7b049f5829816ddc7218ba33d20724708182a236b83574d3d981
libpq-devel-13.5-1.el9.x86_64.rpm
7b15c9c7aca79e4f7b5939517db22b9ab806b9dbc79ec600a81bc34932417834
RLBA-2022:2508
new packages: php-pecl-xdebug3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-xdebug3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
php-pecl-xdebug3-3.1.2-1.el9.x86_64.rpm
82c9b726e9eece6677886d0f70fbed226494bb85fa1d5416d5478a774dea99b8
RLBA-2022:2509
new packages: apr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apr-1.7.0-11.el9.i686.rpm
90b5907faadb1e7878a8dc968762c3c91884c382628850aaa7c27e778811411c
apr-1.7.0-11.el9.x86_64.rpm
24e25d0caf0c4ff47d4fb15cfe717dbb7b7912fced684a5d1ec67b92d2f1499a
apr-devel-1.7.0-11.el9.i686.rpm
3022936af26e8c56bba13c8984582a3950316d245610fd1723f547607e93a726
apr-devel-1.7.0-11.el9.x86_64.rpm
8e923160015c8c6253546ec6c5930da36b0c7a5eb7df2ae1baeda82d3cb36f98
RLBA-2022:2510
new packages: crash-trace-command
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash-trace-command.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-trace-command-3.0-6.el9.x86_64.rpm
5ddad5528d3cdc46dc47db43ad858944325cd70e6e251bd18e21bead821420d4
RLBA-2022:2511
new packages: crash-gcore-command
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash-gcore-command.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-gcore-command-1.6.3-1.el9.x86_64.rpm
01ee46cd4550b25297cee37e722b3a37ca5a2c24ba79e227546aa275f668844d
RLBA-2022:2512
new packages: gtk-vnc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk-vnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk-vnc2-1.3.0-1.el9.i686.rpm
a07efff961dae5dda1a58f66c8d059670ba659f9bda8058579c103d688bf5851
gtk-vnc2-1.3.0-1.el9.x86_64.rpm
493893f13f97a88cb99e9ac929dca31e5e5d8b8b10e119b3869dd9e6ecf0c807
gvnc-1.3.0-1.el9.i686.rpm
e057326de068707e25070236ba953426cf6bc4fe390fbe45552f870d110d5585
gvnc-1.3.0-1.el9.x86_64.rpm
94d3b3c4ebcd1be8155da7b1a0983ab260ddf378f40929c142b54b3d8785efe3
RLBA-2022:2513
new packages: clevis-pin-tpm2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis-pin-tpm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clevis-pin-tpm2-0.5.1-2.el9.x86_64.rpm
2ae38133a9315ba94a9c53aba8e79418838626beb2eb26c142b06abb5858e193
RLBA-2022:2516
new packages: brasero
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for brasero.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
brasero-3.12.2-19.el9.x86_64.rpm
4e1db2914b8c92ff97a498a15de8275b2bdd3bd0b6c51dc9c2c257c66b7f9d0d
brasero-libs-3.12.2-19.el9.i686.rpm
262097853d1f8570d56d915334efa5cf9e83550c554473e60cd5080413148788
brasero-libs-3.12.2-19.el9.x86_64.rpm
3664ec33617ef364a10deb355b2a0571beef62a9f7b6d4c45305610f18e9fdae
brasero-nautilus-3.12.2-19.el9.x86_64.rpm
f3d90f87b674b79883afed64e9c75ded11564533f3a70bb5c40404abe5259730
RLBA-2022:2518
new packages: libmwaw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmwaw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmwaw-0.3.21-1.el9.x86_64.rpm
5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927
libmwaw-0.3.21-1.el9.i686.rpm
c4deef75449986c9f70a0bd378d924b381a1d07224681ac8aea2855d0d48957b
RLBA-2022:2517
new packages: rpmdevtools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpmdevtools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpmdevtools-9.5-1.el9.noarch.rpm
b8feb33ed5e7d18a34d192e496eb4b49cdbd84747cf60ea994cacd7f70a5393c
RLBA-2022:2519
new packages: tang
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tang-11-1.el9.x86_64.rpm
20961a1f20a4ed4830ad87cc7a0d5ad47acc305dfbc097d1fa65cebdaf768783
RLBA-2022:2521
new packages: LibRaw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for LibRaw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
LibRaw-0.20.2-5.el9.i686.rpm
d8b1559627995de547f4717d1a4d66e012768d3677e9e21e7af1a58d49c06c45
LibRaw-0.20.2-5.el9.x86_64.rpm
e6bdf330e3a585687dbba3f343d2d4afa49b4f1c66c33d30b6b7f2cd85bfcdfb
RLBA-2022:2524
new packages: libnotify
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnotify.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnotify-0.7.9-8.el9.i686.rpm
c713d40cb363897c0b5bf7d933e0717fc932b42d05d091f895ae3bfe254a21f0
libnotify-0.7.9-8.el9.x86_64.rpm
938b1ea95bce0a2fa203dc2b737c18be7ec48f2c9547cff0a26678979490e7c5
libnotify-devel-0.7.9-8.el9.i686.rpm
06d7976260a04810fa0cd30ef00a01480cbc5560898f85de65d9b5c10172efef
libnotify-devel-0.7.9-8.el9.x86_64.rpm
81328305de5968cbe36822cff5bc50808f310d5b4718e57ceaadb9bbf31b95cd
RLBA-2022:2525
new packages: libspectre
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libspectre.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libspectre-0.2.9-6.el9.i686.rpm
2b155fc5fd4c6ebc39cf6eccfe55ffa7a9af310ea6579a4e55e92a35aea4da52
libspectre-0.2.9-6.el9.x86_64.rpm
a4af95836f5a61a35574fbe8f4069ee7b52118183dec3b3c253696c6e5a0f0c2
RLBA-2022:2528
new packages: gnome-connections
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-connections.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-connections-41.2-1.el9.x86_64.rpm
c8dfa4da28c4c5b266457647887ea577d50251850ab2b6439ac4eb6d550b3adc
RLBA-2022:2529
new packages: fltk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fltk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fltk-1.3.8-1.el9.i686.rpm
3ba2ccb0a83d922ed3770fb000769c0b4992146c070c3623538b559b3081a4ca
fltk-1.3.8-1.el9.x86_64.rpm
59fddccf1f17cc343668dbaa01f003727cff5de229e65c87c109d2fe3a15e4dd
RLBA-2022:2532
new packages: libdecor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdecor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdecor-0.1.0-3.el9.i686.rpm
51144a547d76e0f18690d22a5903b1e0fd56262112ad8cbf2d884e350121fcbc
libdecor-0.1.0-3.el9.x86_64.rpm
dcbe03cc019c6f35fb17457c6bc3892e221d3f0e85542c06731d56df862564da
RLBA-2022:2533
new packages: gnome-autoar
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-autoar.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-autoar-0.4.1-2.el9.i686.rpm
0fb6184dc20a645ba558d7175204ad042b1929c42cbe7f944af8ff622b267257
gnome-autoar-0.4.1-2.el9.x86_64.rpm
3cf8f13c53e8f94f68dca737be23a3959ceb4e947a3f523179378381f5b84b77
RLBA-2022:2534
new packages: hexchat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hexchat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hexchat-2.16.0-1.el9.x86_64.rpm
bf3551a9442b1635087966f7c1ec82c16109bf1cb49a3b8286a5e18c497abbd7
RLBA-2022:2536
new packages: virt-viewer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-viewer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-viewer-11.0-1.el9.x86_64.rpm
c913309a0abb066c29178f161f4e90e571f4a1fde6693bf725ede713f1d443b9
RLBA-2022:2537
new packages: gtk4
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk4-4.4.1-1.el9.i686.rpm
a2d453941d6d8f8499ef1c117bf20bbaf7bf81d1a0bd1171484db042dcfd8d3b
gtk4-4.4.1-1.el9.x86_64.rpm
c89fa110e5ec31e2e3b74dc3d1386f68a7fef8a80e34c2fd0c30249650c36380
gtk4-devel-4.4.1-1.el9.i686.rpm
58b646256315735b97d6df33174942a9b91df5e5eaf25631067b57c55d28dc61
gtk4-devel-4.4.1-1.el9.x86_64.rpm
ddd09cae4157c81c77a2b3f82ffae50cfb690ee7d54e71b0d57450251629d68c
RLBA-2022:2539
new packages: spice-vdagent
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for spice-vdagent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
spice-vdagent-0.21.0-4.el9.x86_64.rpm
55fa9ca090e47aad3fb379c604ccf29619abbf7ef797a8ce3d32c092a6fa6c46
RLBA-2022:2540
new packages: php-pear
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
php-pear-1.10.13-1.el9.noarch.rpm
2eb530f9ebc42a1821c95cbc4ce649443262714e836dfcedfbf869bf29d83be0
RLBA-2022:2543
new packages: alsa-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-utils-1.2.6-1.el9.x86_64.rpm
3cb428e56df9d340c1ee7886616f2cd840f3f125b673362c4adbd062d4304c0a
RLBA-2022:2545
new packages: satyr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for satyr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
satyr-0.38-3.el9.i686.rpm
2ef329a5d798d863416a2474c5101d1f63f509e459a0a641678c51cb6e89e47e
satyr-0.38-3.el9.x86_64.rpm
a84144e3ea38d97c05f4ed73ec0ed951e40c077ef963ddb21dab697fded79f53
RLBA-2022:2546
new packages: perl-IO-Socket-SSL
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Socket-SSL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Socket-SSL-2.073-1.el9.noarch.rpm
2382ad1e09c5c221da1147bebdb35f98cd895dc8575f9be9901b6dce9071664d
RLBA-2022:2547
new packages: SDL2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for SDL2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
SDL2-2.0.20-2.el9.i686.rpm
6d7d24c4f07598c82efa9980f99a27fb6dd0e3a68a9cc930a6c3f597472f3838
SDL2-2.0.20-2.el9.x86_64.rpm
3b76b222e49e134e9526a621a64ee05cd46d45269df2c8974381fe3c905ed106
SDL2-devel-2.0.20-2.el9.i686.rpm
893879268d2622db009aba39080599a42c3d4bae1f9268e6afbff10e6976198d
SDL2-devel-2.0.20-2.el9.x86_64.rpm
efc14fd51ce5f071335802903aa15821e33b5dc5b12b6fbbb8f4ada66fd10135
RLBA-2022:2549
new packages: wireshark
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireshark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wireshark-3.4.10-1.el9.x86_64.rpm
340fc5ccc766ac99ab350c3cf95b531ba160c7ce48838215bf5701fe002ab3b5
wireshark-cli-3.4.10-1.el9.i686.rpm
230a17aabdf30bc03154b1386952243a0a53b8265c4751e73db0090085120e9b
wireshark-cli-3.4.10-1.el9.x86_64.rpm
54fc2fe4a29d3ebaef62d47d23d76ca5bb9f76914f76967c065372f8200fd899
RLBA-2022:2550
new packages: oniguruma
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oniguruma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oniguruma-6.9.6-1.el9.5.i686.rpm
e8a525cd43c96c1f220b14befd7a38f81eff2485d9ad1af547d894e52d26cf4d
oniguruma-6.9.6-1.el9.5.x86_64.rpm
6db5037eeddf4108851a44f08e71f54b397647e5ad5593c5889714400088bedb
RLBA-2022:2551
new packages: libnetfilter_cthelper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnetfilter_cthelper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnetfilter_cthelper-1.0.0-22.el9.i686.rpm
3217312d80a462edbb3311738dd7d52d8a20f62c07ff0eba910c604ed661c723
libnetfilter_cthelper-1.0.0-22.el9.x86_64.rpm
ff948c3da8285c7c46643a5543b7423336b34857979eb8006596d013cf105aa3
RLBA-2022:2554
new packages: evolution-mapi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openchange, evolution-mapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-mapi-3.40.1-3.el9.x86_64.rpm
33bdb7cfe32c168fa052266d0b47758596c747e5a85ee4a6f53ca260ce537249
evolution-mapi-langpacks-3.40.1-3.el9.noarch.rpm
f9fb374d5c7f32b2c64552141dd4ca3cb5b7b296828d9d789b4ab686b9e4c318
openchange-2.3-38.el9.i686.rpm
79fc1f6c946547f390785171e8bb848d41d79333674011b4f23cac058b2fb642
openchange-2.3-38.el9.x86_64.rpm
fa317bf77b0f276f5e1684ba467c320a2b5ff5d999ff17c87f63ffe880a204d3
RLBA-2022:2556
new packages: qt5-qtsvg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtsvg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtsvg-5.15.2-8.el9.i686.rpm
11657cad1b0710db8b0d0152316f63e6ca8de6063312ee40957786f7ca19b677
qt5-qtsvg-5.15.2-8.el9.x86_64.rpm
5c34148ed3de890cee4766f790d907a71af8146d2476e8d8ac3b54f31f3bc9a9
qt5-qtsvg-devel-5.15.2-8.el9.i686.rpm
e4e26eb6a556c78d00dfa59556910f7e89e84ca15309fcff0eff158d80ebc1a1
qt5-qtsvg-devel-5.15.2-8.el9.x86_64.rpm
983e24391fe0f74bb89db8b304fff3c43c0e2740e93e77631c245c75d16fff13
qt5-qtsvg-examples-5.15.2-8.el9.x86_64.rpm
f10ee33448ef899524d3f2eb154625e545047a6c893af91c9293f66ba2a03fa4
RLBA-2022:2562
new packages: fetchmail
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fetchmail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fetchmail-6.4.24-1.el9.x86_64.rpm
bc1e561d8d71a50160d6f729b80b989a1c37c85e1f74bcb0202f5095ff587478
RLBA-2022:2563
mdevctl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mdevctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel.
rocky-linux-9-x86-64-appstream-rpms
mdevctl-1.1.0-4.el9.x86_64.rpm
cfa9daf2c1bf68578f018a8150117b28a057055513d0583090aa60b1bdfc23e2
RLBA-2022:2564
new packages: ghostscript
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ghostscript-9.54.0-7.el9.x86_64.rpm
fccb7c011bf7fb1071590b2745cfd3b30c7621686645f12be44f69870c4e806f
ghostscript-doc-9.54.0-7.el9.noarch.rpm
8daee07013356a24e5ade282169f7857546d7a6fa60abe29696b82b480489a30
ghostscript-tools-dvipdf-9.54.0-7.el9.x86_64.rpm
f33eec32a66a8922c5a8187eaba0cd7e87d7280ff54360b34acd9ec01b217fb3
ghostscript-tools-fonts-9.54.0-7.el9.x86_64.rpm
6856b83bd33e53ae2d9dab3c4495ae829e7f388803787ceae2cbbbe946a4f1d1
ghostscript-tools-printing-9.54.0-7.el9.x86_64.rpm
8d1fdaf25b0e573fb9ae7b0656033c4b6aa23ea839844ef456a75a3f1cf96df2
ghostscript-x11-9.54.0-7.el9.x86_64.rpm
0d1587d3f31a7faf21ff5d5ab9e7e9128bf4b72e414942fd8f950291a2e8e3f1
libgs-9.54.0-7.el9.i686.rpm
e17c5d163ec3bdb4696ad25a39ee7c6f3e33a6ad49f021f69d0ff39d735ef810
libgs-9.54.0-7.el9.x86_64.rpm
de7f605d8a4d167d0ff06812335caccbcdcbd7e1f0dff072576f15b2211087f9
RLBA-2022:2567
new packages: fido-device-onboard
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fido-device-onboard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fdo-admin-cli-0.4.5-1.el9_0.x86_64.rpm
7911001cda26bee37a0e48d613021e9285624f160da716b11d51bbff21a0b144
fdo-client-0.4.5-1.el9_0.x86_64.rpm
7d8869d88ddb181dccdcf4f8c355c3555056f507f19a0fbf33484b078563e5c6
fdo-init-0.4.5-1.el9_0.x86_64.rpm
580da2589395d71de58e27ce11991ebb1ab69c69ecd7883a43a7b04ac2b8911c
fdo-manufacturing-server-0.4.5-1.el9_0.x86_64.rpm
41ead387e384ae239a1e12b1f394f2d7258f5987f362500a2ad97884f42dcb4e
fdo-owner-cli-0.4.5-1.el9_0.x86_64.rpm
f1d7df9b9912131169cef6e1454b7af100e0f53a6fb64b2863a7113bbe48485c
fdo-owner-onboarding-server-0.4.5-1.el9_0.x86_64.rpm
51eef5558ca8859d3536536f99b482a6797cc5f40c83f29ff8c375beb70d3136
fdo-rendezvous-server-0.4.5-1.el9_0.x86_64.rpm
4200d0bae9acb9e2f92ad1ba467b7e5b58c53f8c959038ab540d0ad1d3cb389b
RLBA-2022:2570
new packages: spamassassin
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for spamassassin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
spamassassin-3.4.6-5.el9.x86_64.rpm
6b9030200c7133f63bd3a434ffe8f421edf28634173c6738de5afadfa74d8b8e
RLBA-2022:2569
new packages: rpmlint
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpmlint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpmlint-1.11-19.el9.noarch.rpm
4abe2e64806b4ca6404086a9b7d795c3527ebadcda9cf24c294805c0b5488edc
RLBA-2022:2571
new packages: geoclue2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for geoclue2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
geoclue2-2.5.7-5.el9.i686.rpm
bc74a47fec7e7d46dfe5b2f6ee745b2ce1822b523bfd3f45ec6407845aa494ed
geoclue2-2.5.7-5.el9.x86_64.rpm
c90750340fd35f6fe572151c7764fb1a377e4a74a98b400fe8a49729c5d2a094
geoclue2-libs-2.5.7-5.el9.i686.rpm
ef8cb7c7cab6e85c4ff5488d4eeaddb7335327d8a927c37820c96d2d6a5b2bcf
geoclue2-libs-2.5.7-5.el9.x86_64.rpm
3f07e6523055281b4f3c3683f3b3a0a440d69531783783166129a925bc9f5175
RLBA-2022:2572
new packages: gstreamer1-plugins-base
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-base-1.18.4-5.el9.i686.rpm
c7cdbfd3525abc08017ac27e4506b3662bb888767960b4cc081962f2ff89b29c
gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm
0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4
gstreamer1-plugins-base-devel-1.18.4-5.el9.i686.rpm
e08ead4412cc6897576fd860009a7eef9042b1c758afc4d7438638ff0f42ac89
gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm
d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457
RLBA-2022:2573
new packages: libdrm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdrm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdrm-2.4.108-1.el9.i686.rpm
f486aed96cbf9332bc2e7d9b4fcc6625a7347e4550028f3ea137c95c97eb686c
libdrm-2.4.108-1.el9.x86_64.rpm
530c0374df7de9d40f10d0aab812be385c5433d3a72daacab6d4578e5e097a69
libdrm-devel-2.4.108-1.el9.i686.rpm
175a0a42c11434ae056dcd1f048b121ab337ef86e62fd139211217afa25d07c8
libdrm-devel-2.4.108-1.el9.x86_64.rpm
7bb6beeaa81ace3edf91168494667fc1da1e1c3a352e1cbaf897b5534e67daed
RLBA-2022:2575
new packages: libreswan
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libreswan-4.6-3.el9.x86_64.rpm
39d3491df69d8917a67c3ba6e6dec852e55cd80e9f4988c8cafe4bbb8fe862f9
RLBA-2022:2576
new packages: inkscape
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for inkscape.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
inkscape-1.1.1-6.el9.x86_64.rpm
f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171
inkscape-docs-1.1.1-6.el9.x86_64.rpm
084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4
inkscape-view-1.1.1-6.el9.x86_64.rpm
75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4
RLBA-2022:2578
new packages: graphviz
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for graphviz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
graphviz-2.44.0-25.el9.i686.rpm
1d9f2dd7f408ee121faddb3cfb75766606331c79e55e9abebaf8f121535f9ba0
graphviz-2.44.0-25.el9.x86_64.rpm
032a47e02640242c70e014e27fd662e4bd5ba5c559657d848910a988b7769cde
graphviz-doc-2.44.0-25.el9.x86_64.rpm
8eda93357e9e14354697152b7ef95324dabcac98bbebb01242ef79f3591df31f
graphviz-gd-2.44.0-25.el9.x86_64.rpm
f0e6d9e100c47fa5e4170812ac440e92abefa253f4b9d153bde3c796b686ca58
graphviz-python3-2.44.0-25.el9.x86_64.rpm
a02e44db1ca835a797f775e18624970a058825ba35df9d25d11110a7e34fdb26
RLBA-2022:2579
new packages: libnsl2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slapi-nis, libnsl2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnsl2-2.0.0-1.el9.x86_64.rpm
f167e9ccc69ac4000940a4bcdc7e3b2b5bb4c74030d10e5151b0b28257d1e355
slapi-nis-0.56.7-4.el9.x86_64.rpm
590a5afdf48fd56554c5577fa6811bb4c2b127810139789f4211af932c0eefa0
RLBA-2022:2580
new packages: python-cryptography
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-cryptography-36.0.1-1.el9_0.x86_64.rpm
ac0312a995704e5480948a1511872da9fab54e9c08c997bb7b1cf51f44256c35
RLBA-2022:2581
new packages: perl-Module-Signature
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-Signature.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-Signature-0.88-1.el9.noarch.rpm
31bef567113daf1a2d95519042c7d138ff308f24be5ce506facd8884abdf887e
RLBA-2022:2582
new packages: go-rpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
go-filesystem-3.0.9-9.el9.x86_64.rpm
5227d232121281c39301f81bda168f6fdc3c736229e5d8b173a6a129ff622271
go-rpm-macros-3.0.9-9.el9.x86_64.rpm
e9aab999cad301bf14cc9792f0d0628e744bb6a6d9030ec93f906c6b06a427d8
go-rpm-templates-3.0.9-9.el9.noarch.rpm
d5546eae726d51c84d8e27d0fefa3770e317a32b5b4feb4f5b12d520c60815cd
go-srpm-macros-3.0.9-9.el9.noarch.rpm
cdc2015013f127552e107ccad833a17ad37a222a99e65cf0766c97cd3ca7d443
RLBA-2022:2586
new packages: libmtp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmtp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmtp-1.1.18-6.el9.i686.rpm
1b5b0832655ae5efc98170f7ee8767090c5f0e146fb7111b073989307526978f
libmtp-1.1.18-6.el9.x86_64.rpm
45ad1fbef857cba6b190d304c036a152323e9f3e9d40224de555d2cdf45e29bd
RLBA-2022:2585
new packages: python-pyghmi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pyghmi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyghmi-1.5.34-2.el9.noarch.rpm
3886531c09999de149da7b7ddcad4e0ba56c9e259cb6f18f72f81e93fb079b8f
RLBA-2022:2587
new packages: aide
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
aide-0.16-100.el9.x86_64.rpm
6fcaa1dc4c67715770486b52d6f282c4fad0ba052dacb200beb85bf31e42ecac
RLBA-2022:2588
new packages: libpmemobj-cpp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpmemobj-cpp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpmemobj++-devel-1.12-8.el9.x86_64.rpm
2c76c09583c12fcad6bcab4a23e219920948a546f5c95727ce8368e70ac57057
libpmemobj++-doc-1.12-8.el9.x86_64.rpm
97f1c0d060bb1f1402a4afc5dac29794f3953d46b6568688965c31870ed5fc3b
RLBA-2022:2589
new packages: libtool
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtool-2.4.6-45.el9.x86_64.rpm
2b234d758f3b10c9c0a5f1527abad8a2b70a28616c1425f4b5b6fd494c316017
libtool-ltdl-2.4.6-45.el9.i686.rpm
ad1a7003fcea82d251ed54e61f22668f5eb2bd73449caea99af6b2ca4eed7539
libtool-ltdl-2.4.6-45.el9.x86_64.rpm
39031cdd1458c857211736b88cef8c9eb60ef7802cc2e9155f0dd8cadc2eeb8a
RLBA-2022:2590
new packages: hostapd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hostapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hostapd-2.10-1.el9.x86_64.rpm
679c0ea8a9eaf5e197c56be4628a3dbbd12b9cb905f81ce82887b0102679d3b8
RLBA-2022:2593
new packages: compat-libgfortran-48
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for compat-libgfortran-48.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
compat-libgfortran-48-4.8.5-36.5.el9.i686.rpm
c0d92d9d3ff6b5f81122672a3775103d72d0e32890b50be39eb67c1e31f5b12e
compat-libgfortran-48-4.8.5-36.5.el9.x86_64.rpm
da0422baf995a6fcbc92c2a42ce89d47f929036c41a8532bfeea99a6a783b92b
RLBA-2022:2594
new packages: flite
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flite-1.3-40.el9.i686.rpm
c31a03001b871e2a8eb8e62869f6abfebe4ee4e2177be1a400f4bc39734c8582
flite-1.3-40.el9.x86_64.rpm
702aaa1634f1ffe04cd6cd3728c34e24b38e6c8926aad131a41478299183f8b0
RLBA-2022:2595
new packages: festival
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for festival.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
festival-2.5.0-17.el9.x86_64.rpm
71d12571f32e1567b2ec8dbd90ad8f17156ea6e7bb309a8772780d90a00d3aa0
festival-data-2.5.0-17.el9.noarch.rpm
5d3c9cce4e93c2e35570f4326083af0dcc972a1ad485e08fdc0482444059b06a
festvox-slt-arctic-hts-2.5.0-17.el9.noarch.rpm
a100049ed3d6be6f84fdf13f7daefaf4bf02ad1e8919eabc43de32263172cee2
RLBA-2022:2597
new packages: speech-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for speech-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
speech-tools-libs-2.5-18.el9.i686.rpm
26b282e26fd84fc9a281e606de7ef1ab55ae45735cd1903863bae3ea7981c768
speech-tools-libs-2.5-18.el9.x86_64.rpm
d5b0526768e9c1ff74914a522a467e59d39cffd277d5e72efeb44cfab3790ff5
RLBA-2022:2600
new packages: OpenIPMI
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
OpenIPMI-2.0.32-3.el9.i686.rpm
16e22a1ff7698c5169b32f9766e2a1028ee664b75246c1775466fd26cccc5ccd
OpenIPMI-2.0.32-3.el9.x86_64.rpm
642e651edcca1752588cf8ab70c02953c72cae2cd7f56e2e3b2549bd634c8b6d
OpenIPMI-lanserv-2.0.32-3.el9.i686.rpm
62bc9ed20b29427116999e51ceaeb1297c02daeeb9e94517ec379aa00293b311
OpenIPMI-lanserv-2.0.32-3.el9.x86_64.rpm
4c82eae23043750ff749e31b010e791bb6c347b844c4048e73007251f71b9362
OpenIPMI-libs-2.0.32-3.el9.i686.rpm
4dcc708af9c28a522899aabac9299a9798175ab75f19ea8e798dab438e0c1d93
OpenIPMI-libs-2.0.32-3.el9.x86_64.rpm
7dd3d958a07e83ae829727dfa59358f9a0caed0202ea4368c927eeb9331b6e88
RLBA-2022:2601
new packages: greenboot
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for greenboot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
greenboot-0.14.0-3.el9.x86_64.rpm
73ceffc59748060cf4cdb4d25aaa4671fc22054e4072ccb3972e040b6205fa57
RLBA-2022:2603
new packages: plymouth
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plymouth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plymouth-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
5491632f8f97666a2d8db6715f089aa34c1fa4557acd2a619858b06f06ae2335
plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.i686.rpm
8d844837cec8aafe906ccb0bd0c8d39a33469aa5b58a6837d76464ca0a1cdecb
plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
79819dedc5e635493b3fc70224a728645e12deaaa31d6916dc49d92ad5195a7a
plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.i686.rpm
e91ea56f94b329a71c5ff9c018d8ac21f640f2a06c93d987edb5e8383ee834ca
plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
7ac51de1c3a54cacfc42c96dc86f12499b0dd49c2599da1f621aa4c2c5daa821
plymouth-plugin-fade-throbber-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
1c0750db912a3a914905b78bf514606b1f0049eca0f8bcb34ce27172d0ca0aab
plymouth-plugin-label-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
6f93469c6ae998f16c38b78139bfaf0eba7f642657695f81581b142a19d67904
plymouth-plugin-script-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
29ea9329990c59b0c722377eb346b777a464d2687ab52359666bf4575681e835
plymouth-plugin-space-flares-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
3cfce895e646e6b9b100a4a550d3166c45f08c3a06987d230939a642029bec80
plymouth-plugin-two-step-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
96f0ef9badf547abf621e6848563c2a5b27c4a0c6468e7f86443a21519fff7a0
plymouth-scripts-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
602a1ec404b2c8f5e4cb66835e235830a8622aeea6c9836c67e7542d1b1b554e
plymouth-system-theme-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
0a5bf089d1b06b26b9f5c5c95a9dbc94df3f7e24451110c64b6ef310bcff6998
plymouth-theme-charge-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
3be601b895d6a5104ed8b21bf4a5d828077c07f5b936ed928d1572f333b8433c
plymouth-theme-fade-in-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
b813d1539feebc7eccd430e049644e46ed002ef97b9aae4ccbb20ee1ff358c40
plymouth-theme-script-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
be94478da75dea04db4a55b4d156faf6365397bac4c96160177a878d55046eb2
plymouth-theme-solar-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
57eb49f0b879c736f94791c8262f6cab04f0aa7ba5c2d2453c7a913df737ee04
plymouth-theme-spinfinity-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
4410d6b71b994f022cc0f7799e22b319789c724918d1a7de4eb26c0b857ff336
plymouth-theme-spinner-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm
a3ba2794c84a6be4e6dfd2f4f19798331e4dd3b9b1c82401280b4c38babd350a
RLBA-2022:2604
new packages: libxslt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxslt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxslt-1.1.34-9.el9.i686.rpm
a5db9d7a0a47d8089ba2e0a3b77503fd671205e1de43d9101f11f72a7a548a6d
libxslt-1.1.34-9.el9.x86_64.rpm
0127ecfbfb6b1f3bafccb4057e882b9f5f39123fdb55d33e64a5f0fb943810d6
libxslt-devel-1.1.34-9.el9.i686.rpm
e515a2b825e91144ddeba22f857312b0e76ad7bd75fd06391c90f39eaa53c433
libxslt-devel-1.1.34-9.el9.x86_64.rpm
adf4aa40236c34a439ccd85d66b2ce9b00dfd066300a138e426dcc8d59aa0795
RLBA-2022:2605
new packages: m4
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for m4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
m4-1.4.19-1.el9.x86_64.rpm
6cc4fdba2bd8de8300ac0ed0917598fe178f56e7a26b05b8ee5a26b7e5e7a860
RLBA-2022:2606
new packages: python-rpm-generators
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rpm-generators.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rpm-generators-12-8.el9.noarch.rpm
0cfa5a242e5b68eb6efee236b3569e76c61287d76ac36f495eb08fef9800528f
RLBA-2022:2607
new packages: gegl04
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gegl04.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gegl04-0.4.34-1.el9.i686.rpm
d4d2f6b32f0b603a8fb0bb9863fdd15986dffe6d571f7fddbdd1889c6e8444db
gegl04-0.4.34-1.el9.x86_64.rpm
f82f5fac1c1f0833648a03ee2e1e017a742e226ef08f7781b97e08df2427c0d6
gegl04-devel-docs-0.4.34-1.el9.x86_64.rpm
caa1a7534d4eb7d0287b210582b008a79fdd31fcac40a44671c7824daf1d0092
gegl04-tools-0.4.34-1.el9.x86_64.rpm
4cde242dde4c14f647b68a78aafbc31137c3a74991cd1eeafd636fca544d0953
RLBA-2022:2608
new packages: gtk3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk3-3.24.31-2.el9.i686.rpm
5c8523beaaed9688950fc210e62a010f703df18310d3af6964181390792f7af9
gtk3-3.24.31-2.el9.x86_64.rpm
93e0f50705292497b818bb5f49939e5f14565130ccbf4268f68f3b6980f6b976
gtk3-devel-3.24.31-2.el9.i686.rpm
987ea7c3ecf3a3f6140b6f00361dc6deea407f1c427227579c4bc04532d8846d
gtk3-devel-3.24.31-2.el9.x86_64.rpm
131f36505eae9d1aa1e192cf80505b9268d0fe40ff262353eaf08d816aa07c65
gtk3-immodule-xim-3.24.31-2.el9.x86_64.rpm
202312c784b3fbd7f296af76f29d761067e9499fcf33bdcddd95af153d01aef3
gtk-update-icon-cache-3.24.31-2.el9.x86_64.rpm
4be87b4d18af9db3941f10257790a763cf6be8238d100eaba7590b530931d640
RLBA-2022:2609
new packages: ps_mem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ps_mem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ps_mem-3.6-16.el9.noarch.rpm
705f3d49c2cdf0bb8d9b1735956a00f1330e0e6c7fdc4222fa1ca5a708845780
RLBA-2022:2611
new packages: libwacom
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwacom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwacom-1.12.1-2.el9.i686.rpm
3c356caaefae99a28ef2ac0d9a7aaef52dbe398ae79a0a4ae645b9e2aa55eaf4
libwacom-1.12.1-2.el9.x86_64.rpm
60d405a6a845c91e1c7e0b0ba4855f039a3b2b6e57a0371e76d6407e9fd890af
libwacom-data-1.12.1-2.el9.noarch.rpm
7b674d89e0eeaf2c1e28fa58ec7d9a5e3ac085c97ac70d36c01a9a4efb6bbf60
RLBA-2022:2614
new packages: clutter-gtk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clutter-gtk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clutter-gtk-1.8.4-13.el9.i686.rpm
f374aa9f68ccf7e2f433f703b89966c4f9fac191ae125aa4443f144ae8ae95c7
clutter-gtk-1.8.4-13.el9.x86_64.rpm
499f337a616734ae28a9a854bc035be3631d004e5770c4dbba5e43033ca90396
RLBA-2022:2616
new packages: gsl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gsl-2.6-7.el9.i686.rpm
89a3f11169512610c938e5f0ba3e6d60e8387674b844d3cf463ee924eefa7e6b
gsl-2.6-7.el9.x86_64.rpm
6ad7c0869388e9fa92edb51cf895cffdda934117bb65031d182f782020281aa5
RLBA-2022:2617
new packages: clutter
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clutter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clutter-1.26.4-7.el9.i686.rpm
7385b695d3bdca3aa5202d99b3ebc911716d0e918f1c64fe0e54c66ab99ae410
clutter-1.26.4-7.el9.x86_64.rpm
8103be0ca89ae9ca5b42e49cc24e8b8be3f1d0a78b8e124f0f983cb329eae44a
RLBA-2022:2618
new packages: mariadb-java-client
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mariadb-java-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mariadb-java-client-3.0.3-1.el9.noarch.rpm
455b468597daf38912a6df0a9de83a5939593f3f9d3f2c2fcb2113a6bca83b42
RLBA-2022:2620
new packages: librdkafka
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librdkafka.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librdkafka-1.6.1-102.el9.i686.rpm
3467bf92cbfca59511a78f68d7c259e1185f1de31945d81f3a6d6c9e3ffde92d
librdkafka-1.6.1-102.el9.x86_64.rpm
10fbf5baefe4958673bbf7cd4f91945ea4fca115a184b7012161edb10af8fd61
RLBA-2022:2623
new packages: python-cffi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-cffi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-cffi-1.14.5-5.el9.x86_64.rpm
acacc0db828d1c799ce2eb01b83f2799627976c40d2ba803f4a84fb4a8bfef84
RLBA-2022:2624
new packages: freeipmi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeipmi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freeipmi-1.6.9-1.el9.x86_64.rpm
9ac36fa6cf7185ca85b45645ed841a64252047bdfcca502561ffdd40a5a2d8eb
freeipmi-bmc-watchdog-1.6.9-1.el9.x86_64.rpm
02d8d90ae839d968ae0908576d200340373b258c3955ddaa5301eb7193b378ca
freeipmi-ipmidetectd-1.6.9-1.el9.x86_64.rpm
6a4157ee20f5218a3146cbbd15a55dd4aeb391a4ac6ee56de9bc1ab1524edc53
freeipmi-ipmiseld-1.6.9-1.el9.x86_64.rpm
a086017d77150d4bc0fb78653ff651ecb27b2e95be8bed7d64c91134068b444f
RLBA-2022:2625
new packages: ipmitool
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipmitool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bmc-snmp-proxy-1.8.18-25.el9.noarch.rpm
fa3e5c3e8a69d6f3d01886923818eb4c150aecebf5f44943ae4a61add8d4af43
exchange-bmc-os-info-1.8.18-25.el9.noarch.rpm
3229d11156343ab7aca8103e8b73ecbda1ba5c8f5da2593dfb6ead7d83ffe1fc
ipmievd-1.8.18-25.el9.x86_64.rpm
c3dc44a53e1a1553885e85a16f30771fbb2ba9a8b2e70eb9db20687b8fc76493
ipmitool-1.8.18-25.el9.x86_64.rpm
7772feb2165d59ac339b9a4f65a0c58a61b3fe4d8a6d1c616e76cd2c4d0c9c44
RLBA-2022:2626
new packages: xterm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xterm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xterm-366-8.el9.x86_64.rpm
752a66e66837c536800810d245cdf2ef74a287fb98ed53e993635c6c788e562f
xterm-resize-366-8.el9.x86_64.rpm
47a505aa55a2e9eaeb4fa24327044c80a9cd24aec2c87a8fb2bc1e6a34feb014
RLBA-2022:2627
new packages: ibus-table-chinese
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-table-chinese.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-table-chinese-1.8.3-10.el9.noarch.rpm
a65d68f0135625f83ab23f896aaa88b449be009eada562b5356b5ed0b7f03982
ibus-table-chinese-array-1.8.3-10.el9.noarch.rpm
d29bee74ef836fa547a4fb52606760fb3906a855f65291f796fe82aa04f65226
ibus-table-chinese-cangjie-1.8.3-10.el9.noarch.rpm
258c81ed4178ac52675ef692b00ffeca159db6c294d8f554a02f6ce8d62cbfb9
ibus-table-chinese-cantonese-1.8.3-10.el9.noarch.rpm
07d34a2d1cb4a35774e7db61e8ee72451c2c0954e1c92dbd40d1010f4802cb82
ibus-table-chinese-easy-1.8.3-10.el9.noarch.rpm
1fad6ccf75b5f0dfaacf9879342a676136acb525bb772886e589b901608f6062
ibus-table-chinese-erbi-1.8.3-10.el9.noarch.rpm
324940da5636347c6e116f8b7201203ee5dd023ca2d21d51de35c9b1c25b91bd
ibus-table-chinese-quick-1.8.3-10.el9.noarch.rpm
7ae64f3fa83f1bd696ca42989f4d2ec87104e4d8a28f4a0c3c7801f101df0bc4
ibus-table-chinese-scj-1.8.3-10.el9.noarch.rpm
3f33a6de68305ec3e987ec7882a49a669e9882baac5e286829c251b28db193a9
ibus-table-chinese-stroke5-1.8.3-10.el9.noarch.rpm
44d54a48bccf0848d72e21aea4d6ff3a50b844f055b74b2c131c614216ae235f
ibus-table-chinese-wu-1.8.3-10.el9.noarch.rpm
636186dc35f0c4682b50d3274d9f03619754ff5715f6f870aa519f6cfaa8365b
ibus-table-chinese-wubi-haifeng-1.8.3-10.el9.noarch.rpm
d9170f96e94adece7c97300e2f5c695f6e66f3410ce5a39a24f44318c4e1b7b5
ibus-table-chinese-wubi-jidian-1.8.3-10.el9.noarch.rpm
2440c7fc3e4b50d9125546af4ddc69c3377a11fb17ba9e5fb38f34a19fc18ab0
ibus-table-chinese-yong-1.8.3-10.el9.noarch.rpm
600477f4796899a827c5207755df9e375d809c3bf443514da356194ec8ee3f6c
RLBA-2022:2628
new packages: perl-CPAN
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-2.29-2.el9.noarch.rpm
0154c44a893525c8e2d0943ee129f3b6a1abbfaf31677b756d7be0bd1dea0016
RLBA-2022:2629
new packages: xorg-x11-drv-evdev
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-evdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-evdev-2.10.6-12.el9.x86_64.rpm
0d069fc6f457d3ae13c3930845c3cfd10b719de03ceabecbe04498bd60ce24c7
RLBA-2022:2631
new packages: libburn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cdrskin-1.5.4-4.el9.x86_64.rpm
864312cf79bb2ca5f7b8e61cf100c9d9a8ea82b57aa3d5270de47b504e6a65cb
libburn-1.5.4-4.el9.i686.rpm
242e6a78e9e854e9343512d6c63bf385f06678770f431ea006a1a170f91bac69
libburn-1.5.4-4.el9.x86_64.rpm
9e09c60e46163d003b03f397578ebbb0a43d4e372e426df617ff9eb71ea7336c
libburn-doc-1.5.4-4.el9.noarch.rpm
f69119c079ee8482dbbf70590080437b9c1bb9f42b584061c2c4d0fb87b1a625
RLBA-2022:2632
new packages: libslirp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libslirp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libslirp-4.4.0-7.el9.i686.rpm
4ea8040d110efcf2c2026862525ce29d33828fe308b1c0b9f74330feae27c32a
libslirp-4.4.0-7.el9.x86_64.rpm
9e139bea16fc979b10db9af8c6f29cd205f50450d09db2a1dd6744512193a4ae
RLBA-2022:2636
new packages: libisoburn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libisoburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libisoburn-1.5.4-4.el9.i686.rpm
cb87162006bd27c1dcf4787287a5d6a8780f78f62187214fdb44e6939f6f61ab
libisoburn-1.5.4-4.el9.x86_64.rpm
4f9ec7761f21fc7aba9c684e1b8a8bee935fc1c3b0aed21928de898360ce0705
libisoburn-doc-1.5.4-4.el9.noarch.rpm
337df7150e276ff90caf232869662b5ffe137f8aa639b114dd64a9cf9d77c507
xorriso-1.5.4-4.el9.x86_64.rpm
39a01394ae4e16a5a469881e5f4febf78a9811afdd95f4ca03b2a104958ad85d
RLBA-2022:2638
new packages: bacula
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bacula.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bacula-client-11.0.1-5.el9.x86_64.rpm
0fa3abc0c689d766467121ea71c833b1f03536806cb776763bed62591b4f19f6
bacula-common-11.0.1-5.el9.x86_64.rpm
991659744ec8da5f4b3a5f2ce8c578b299e669a2e254bfee6f106761a22ba99c
bacula-console-11.0.1-5.el9.x86_64.rpm
f843450b820e3424ade117b46b4ac0681ef930e0ed9b477c35d9edcc9b3dfe7a
bacula-director-11.0.1-5.el9.x86_64.rpm
80ca9d0f90dd4d88140522c1bb03f648f0517ab417dc8221de4130248ebe0839
bacula-libs-11.0.1-5.el9.x86_64.rpm
89b9674fc054a135e11b48da5dc0fa4ce6defa6ce264121ada634de5dc58286f
bacula-libs-sql-11.0.1-5.el9.x86_64.rpm
f7e9fa77342ea78fdcef4b532728e0f1a172270949671141734afabb71675a10
bacula-logwatch-11.0.1-5.el9.noarch.rpm
3c881a83280c8a82a631d46a7848b22b60f30dfa4ad1cc467d2756f7e4ef6075
bacula-storage-11.0.1-5.el9.x86_64.rpm
b3d43e82a6b27a6568df5ca9018556f6a8d7887931dca1bfcb3261ba26e39f46
RLBA-2022:2639
new packages: python-packaging
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-packaging-20.9-5.el9.noarch.rpm
b532d7fbe4a6adbd7b1587d12d7b1e986a49bec02211768889f21e83a8e18674
RLBA-2022:2640
new packages: python-pycparser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pycparser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pycparser-2.20-6.el9.noarch.rpm
00fdae103ab01bb3fe514ae1599920153f4a9f304c194daf3991f68d48ae7eec
RLBA-2022:2642
new packages: tinycdb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tinycdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tinycdb-0.78-18.el9.i686.rpm
c1ef91199807f82745ef0027a3921e260cf69d9e3d43f5c42593b5aa262f802c
tinycdb-0.78-18.el9.x86_64.rpm
008abd579e52e8c38a4565332db611ef1e4bdfafd5a45ee48d28b907dcc703d9
RLBA-2022:2643
new packages: python-toml
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-toml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-toml-0.10.2-6.el9.noarch.rpm
3256db4571395f5fa69ace9bf280b624fadcb4054a7c5a7536be24a2bc91cbcc
RLBA-2022:2644
new packages: libisofs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libisofs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libisofs-1.5.4-4.el9.i686.rpm
6522f79975a7e4cb26cd2b9d75993a5a48255cf5743398a32795f3b97ef9fb85
libisofs-1.5.4-4.el9.x86_64.rpm
725117022cf12d2d090cbaafa47e1402b3f43b699e6ab87ed4e9c890e09dc86d
libisofs-doc-1.5.4-4.el9.noarch.rpm
7d0ca0766359a3e3c8dc221bbdb8075ca73e667acaef61e066d7db0a1f92a782
RLBA-2022:2646
new packages: python-psycopg2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-psycopg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-psycopg2-2.8.6-6.el9.x86_64.rpm
cff5bae0b0d5f8dea4cf1b3c496b223c5cfc3fdebd0317ce8a13d26940f59a16
RLBA-2022:2648
new packages: libmng
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmng-2.0.3-17.el9.i686.rpm
2611115d93e775a5930ebd904dd730e31cbe28b4d098fad42ca99043846c0ff9
libmng-2.0.3-17.el9.x86_64.rpm
1c88d1fecb1dd89a328666336e309ed0e804228db2fb74107792bbaf3da745c9
RLBA-2022:2649
new packages: tog-pegasus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tog-pegasus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tog-pegasus-2.14.1-64.el9.x86_64.rpm
1b703490768c8d00ed91f0a759efb50ae6e0956b45f2719bed0ec6985302edc1
tog-pegasus-libs-2.14.1-64.el9.i686.rpm
4f4f9d2cc30c2ac1139f65802f94178c606a91629d3500bca48570fff7d52941
tog-pegasus-libs-2.14.1-64.el9.x86_64.rpm
c2535c5705b2c81ef78d58ced6b5f94e12c380728e59babe38d26c80944c9755
RLBA-2022:2650
new packages: lua-posix
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lua-posix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lua-posix-35.0-8.el9.x86_64.rpm
9cd617ef1552226282137887520254fcfb96340ce5b7c1b4725fa6f70d415285
RLBA-2022:2655
new packages: sblim-sfcb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-sfcb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-sfcb-1.4.9-25.el9.x86_64.rpm
d5a8864e80c863f72ebb435a46ecefba6914e288759ae656fc6e1900d5fc75db
RLBA-2022:2657
new packages: python-ply
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ply.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-ply-3.11-14.el9.noarch.rpm
668d21e24211e4080c65b67f184afe59dd22b98814d11583c65bbb2897516b7a
RLBA-2022:2658
new packages: numpy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-numpy-1.20.1-5.el9.x86_64.rpm
634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d
python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm
939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6
RLBA-2022:2659
new packages: fio
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fio-3.27-7.el9.x86_64.rpm
857aa63abe2da0fad40d53fcf47b8882489d21c98d802efec1477c30ca010298
fio-engine-dev-dax-3.27-7.el9.x86_64.rpm
56a06543591a112c038684dab3092af15298f4f06895139fda30dbf7d42578b5
fio-engine-http-3.27-7.el9.x86_64.rpm
2021b900bdb515e9d1c7134678dae87f65210d090cd1e8d50b9980bf338a633a
fio-engine-libaio-3.27-7.el9.x86_64.rpm
db94c1f50fc2823ec254ef0742458e96f8780105e9c71429f543adc998786f5d
fio-engine-libpmem-3.27-7.el9.x86_64.rpm
194d011d90a18e1249e7ae97c04c3f93e01c293c6e034a1899c7d37462e54dae
fio-engine-nbd-3.27-7.el9.x86_64.rpm
99e1dec81f9f794dc3b348300f2563798e2061237067bb6fa80fcc3bfebbbf29
fio-engine-pmemblk-3.27-7.el9.x86_64.rpm
b312a069beda94d481e7c251a91c4c786a28cb1490d4f6855c294a08f43be7b7
fio-engine-rados-3.27-7.el9.x86_64.rpm
d92834a0e6f7b7584e10cf971198414139d285c757c8d7e601d53a47dccf13f4
fio-engine-rbd-3.27-7.el9.x86_64.rpm
ba3e345ae89340f6074b0dbc0aebaf31a236a04f6752c2ba2127f27032448ed0
fio-engine-rdma-3.27-7.el9.x86_64.rpm
9320c89427683b1a56b70510c6a83e5414290d63210a8cc5d491ec510b384eb1
RLBA-2022:2660
new packages: disruptor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for disruptor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
disruptor-3.4.4-2.el9.noarch.rpm
e039c6a3c42bad8931b5e8d122389effd25bb1b413d3aacbff011d7f1deb2d26
RLBA-2022:2661
new packages: jctools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jctools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jctools-3.3.0-3.el9.noarch.rpm
4fdae1657a770b34b120784f56a7486f623a99705cdcf0b29e7005a7ae44d542
RLBA-2022:2662
new packages: python-PyMySQL
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-PyMySQL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-PyMySQL-0.10.1-6.el9.noarch.rpm
04765e503f47476a6fd4dd880cec4261e13ffbcdf1d09c762f3eef21a62da74c
RLBA-2022:2663
new packages: plotnetcfg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plotnetcfg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plotnetcfg-0.4.1-18.el9.x86_64.rpm
ab5c886f643c24f90077400fa5e9f8bb4c7ab0657c6fe19a09cd27efd9753359
RLBA-2022:2664
new packages: scipy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scipy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-scipy-1.6.2-8.el9.x86_64.rpm
1103fbcc787606536866b7cffa5d11b2ad54ffd11909b68af51152508a24f5af
RLEA-2022:2666
new packages: mypaint-brushes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mypaint-brushes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mypaint-brushes-1.3.1-6.el9.noarch.rpm
4a7e96357c07e5d64d00af31685a9f86bfa2c1c73a062194b7428255b0ce7dc4
RLBA-2022:2668
new packages: gnome-shell-extension-background-logo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell-extension-background-logo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-shell-extension-background-logo-40.0~rc-4.el9.noarch.rpm
e30bbb75b4e2a9452ae521abc4c324eb10e55199aeb3686f383dae838b185c70
RLBA-2022:2669
new packages: python-attrs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-attrs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-attrs-20.3.0-7.el9.noarch.rpm
26083f3193386d6e1cb3beaa863482642b0193e2a87bed2f6652169f347689d3
RLBA-2022:2670
new packages: cairo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cairo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cairo-1.17.4-7.el9.i686.rpm
2a980f4d03d5a363f76f7862f44c97012b12d946760cf435a18495947a3e9e49
cairo-1.17.4-7.el9.x86_64.rpm
9ea8622b018a10ce3d932e1675f0785138971b6564ddb721511f1aaaaf6489d7
cairo-devel-1.17.4-7.el9.i686.rpm
40ecd612d83bc558617c58305e9f576d56ac8740c08de799090e53161ebe5e06
cairo-devel-1.17.4-7.el9.x86_64.rpm
53cd0368605ed546b5b60db46f2ce4788578a3c00e2a2490f36d62655733411e
cairo-gobject-1.17.4-7.el9.i686.rpm
b255bebc224e792afad348f4d257c205a205664fb71ea7f6c1fbd3d5989a455b
cairo-gobject-1.17.4-7.el9.x86_64.rpm
3f7fa4c94811af3f3ffe49dc0683baee19eeead684f6cab809cd115a89da5982
cairo-gobject-devel-1.17.4-7.el9.i686.rpm
4afe98e2f6ffcbe0bba504c978fc45342dea1639cba2b6e12589ebd39722ea94
cairo-gobject-devel-1.17.4-7.el9.x86_64.rpm
c88a6f00db33fd6d07604f4786502f59c694ba001c872f833fe35e025e7ee5b9
RLBA-2022:2673
new packages: varnish-modules
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish-modules.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-modules-0.18.0-1.el9.x86_64.rpm
15cc227d17bbb7938fb8e7608e309ce6d38e530776d079f05204f18da8ebcf38
RLBA-2022:2675
new packages: xorg-x11-drv-v4l
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-v4l.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-v4l-0.3.0-10.el9.x86_64.rpm
dea6e59dc9ab95bff0bd4958852d8a8d2ff038beb33d4ba8745cbef4b15773a3
RLBA-2022:2676
new packages: protobuf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for protobuf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
protobuf-3.14.0-9.el9.i686.rpm
0585098bfc29b493c94c5b8a89ac6aeb807827cc07cf1a4d6447145e8913b90b
protobuf-3.14.0-9.el9.x86_64.rpm
9b275a54e71b490da335b8b3092ff1137056768cfaeeb014a6b10733f13f8aeb
protobuf-lite-3.14.0-9.el9.i686.rpm
01cbb259b9ebf25b2b37695d0b4a3c5554dea114ef53896567b7b49c13f5099f
protobuf-lite-3.14.0-9.el9.x86_64.rpm
c9a8a6814b1b3ce6115e6c93798de90cde692139e5440a996329ee9c5d55ec4b
python3-protobuf-3.14.0-9.el9.noarch.rpm
4f5a870ac52b5f0cacfa0bdd291998e3e9309a5c044151eaa9edea7adab71e59
RLBA-2022:2678
new packages: xorg-x11-drv-dummy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-dummy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-dummy-0.3.7-17.el9.x86_64.rpm
9344619db03c82ece7fd269fe344cca85e2a1ca252b6a73f558e935e49f3c0e5
RLBA-2022:2679
new packages: xorg-x11-drv-fbdev
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-fbdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-fbdev-0.5.0-11.el9.x86_64.rpm
994c0c700a566e95a02ae039f7b27c5ac87dfbef5e5df37f1e1bf2773a166be6
RLBA-2022:2680
new packages: xorg-x11-drv-vmware
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-vmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-vmware-13.2.1-18.el9.x86_64.rpm
404edc6f2ec6df2a7617bbd88426f48667d491dfc5f44b1330f627af8c000414
RLBA-2022:2681
new packages: zziplib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zziplib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
zziplib-0.13.71-9.el9.i686.rpm
9ab7a8be4608f6b4982a8874f58677beaec8a28ed6c3f85e22d4078d8230835d
zziplib-0.13.71-9.el9.x86_64.rpm
3f8f9fb3ba71e761f50e96baccbe839b377c05d9f6e390ddb65f5cb6c52f0265
zziplib-utils-0.13.71-9.el9.x86_64.rpm
f3734d71b45db8836784f81d4d7cf4ca91b871196de58590cc72afcb31e96109
RLBA-2022:2684
new packages: flexiblas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flexiblas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flexiblas-3.0.4-8.el9.i686.rpm
f336e1a423300a77afb38c3a626c8e476fe7b1e535efa7e5357bb430305434d6
flexiblas-3.0.4-8.el9.x86_64.rpm
297fc04bbc8d672d056339f8d7b46812877cf2472f144b6045861701a4a57afc
flexiblas-netlib-3.0.4-8.el9.i686.rpm
daf8edcd71de545ad8feb844dcbb1aa2a64c7dfd45e27617cbe1fe6922fc20b4
flexiblas-netlib-3.0.4-8.el9.x86_64.rpm
d1aa224e759b5f752c2cfe7bce002f3a3ea184d175296b6cc749db2ad302b253
flexiblas-openblas-openmp-3.0.4-8.el9.i686.rpm
dc1921db8c601f4fe01f341017aee3c1ffbb3b5025b54e218741d3c2c3674d02
flexiblas-openblas-openmp-3.0.4-8.el9.x86_64.rpm
a6d92eff898f6e8d7162a52e52d1b554cb0d9785d6ee1e83c9418060c97c3df3
RLBA-2022:2685
new packages: suitesparse
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for suitesparse.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
suitesparse-5.4.0-10.el9.i686.rpm
3d588e17a43321e1203efa3064ba5d987d615e0cabb764bf00eff3a1dee683dc
suitesparse-5.4.0-10.el9.x86_64.rpm
88b14a30958a781f6cb2e37cd2e37c8f70c5fef52d9481bb5d1cca95df9bd71d
RLBA-2022:2686
new packages: uuid
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for uuid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
uuid-1.6.2-55.el9.i686.rpm
7d776a0ab76bb28cd7124a2ebee07eeb28639e95b95e28c5fd57f1c4d3071dd7
uuid-1.6.2-55.el9.x86_64.rpm
7fb172ed1e52daa4e13c9fc20600c3acc0588dd56e0b00c228ab8d38051f1ef3
uuid-c++-1.6.2-55.el9.i686.rpm
efbc685b44ef484856cf184d529fa9b140c407fcb36246b2b73dfa7bdbbdd05d
uuid-c++-1.6.2-55.el9.x86_64.rpm
7b0ad4180ccd5175e533d0762c58547d6a740a1d28fe3c531d833526843d63fa
uuid-dce-1.6.2-55.el9.i686.rpm
fa16c9a63e4793307c5c9d69ae495b037f4a882bd24dda8cdd1537c5db2df891
uuid-dce-1.6.2-55.el9.x86_64.rpm
c177b0711108792ab0a43af26c37829ce78b19e6db0accaef2d4c71a1ab416ba
RLBA-2022:2687
new packages: xorg-x11-drv-wacom
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-wacom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-wacom-1.0.0-1.el9.x86_64.rpm
bbece39942bcdacf9a7ca991333a4984a50e718a4334a41637a10649ff7273e3
xorg-x11-drv-wacom-serial-support-1.0.0-1.el9.x86_64.rpm
573678790ccc3929cf3c65356d75ec3bab380eab5c58bb438d8a3d60cb9b51a8
RLBA-2022:2688
new packages: openblas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openblas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openblas-0.3.15-3.el9.x86_64.rpm
47461d2fa724b1437330f2fb5cc45073a4c3f598d02880af488ed6e8199c2bdb
openblas-openmp-0.3.15-3.el9.i686.rpm
3e98a4008a4c5c7f43940cabd9ed43469c563fd2274b9c805b256570d5b80f9a
openblas-openmp-0.3.15-3.el9.x86_64.rpm
9fb2ca11be237ff5e3aa5ebcf1466ca5c10389c4a94dd35b01a8ac6a70d98a49
openblas-serial-0.3.15-3.el9.i686.rpm
dd7a77530dd942f00efed08900d22a192ceabfaaba16176ce2a820e231e69a93
openblas-serial-0.3.15-3.el9.x86_64.rpm
774951fbb53756cc9e4d40a3a7cb34ca962ea4986bf8cf7deba3fdcb85703682
RLBA-2022:2690
new packages: gtk2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk2-2.24.33-7.el9.i686.rpm
fef13bd3676631d3fe0151287a9d5ef0919e4f7021f1e40d9d5fdc8e04b645ab
gtk2-2.24.33-7.el9.x86_64.rpm
a5ff6d0a4ea4884492ee43ff851813c5193fac8bb9614fd03e3ccb6f4a0b218c
gtk2-devel-2.24.33-7.el9.i686.rpm
17f22be6035c4cc3cd0608b40b2e51adf1f6e5f5e35967d61b349144840b27dd
gtk2-devel-2.24.33-7.el9.x86_64.rpm
7204ab2db2e5bae2f15c40cabac32655feacb3e60228ba39346cdc69047c4d1e
gtk2-devel-docs-2.24.33-7.el9.x86_64.rpm
e9f9e832c10ab97f63acd590ab86e3f52492040a77e8f1cd85904ce92f1c2d0c
gtk2-immodules-2.24.33-7.el9.i686.rpm
6fa9af22762f243f54736e73221ad7e06582d51ab35480a6dbf0f273c47cf886
gtk2-immodules-2.24.33-7.el9.x86_64.rpm
248dcf74777dd09228718ee69fad6f9e53e4f03741a98e6cb59488bc501da5b4
gtk2-immodule-xim-2.24.33-7.el9.i686.rpm
c60aa6b938b01c3e73e226f681aae51814b181a94976ad4ce4144e7484b3fe3b
gtk2-immodule-xim-2.24.33-7.el9.x86_64.rpm
3d436bcab671daac47b6e3140e19c4dc19f057299d2102fcd635adff36192c18
RLBA-2022:2694
new packages: sysstat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sysstat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sysstat-12.5.4-3.el9.x86_64.rpm
cdf8e58038036a4c049075d2dc89e84379fdc7b3eaecb9df8dd65a7e8c7d55ff
RLBA-2022:2695
new packages: libsndfile
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsndfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsndfile-1.0.31-7.el9.i686.rpm
a9557dfcd6cf92348d40660d30b33e147463f19df3008b2278db48d25ffa79e1
libsndfile-1.0.31-7.el9.x86_64.rpm
5ea30db5acfda545cd737faba2198a359895727129ecba6a6cda1cbc5a7725da
libsndfile-utils-1.0.31-7.el9.x86_64.rpm
f29ff3b04a0e71df22c71fa31e38ecf3ef2a19e3a540172975f60ad12c4fb0f9
RLBA-2022:2696
new packages: weldr-client
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for weldr-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
weldr-client-35.5-2.el9.x86_64.rpm
c45d57bd242d72287d967ddafa7d9032fcdc0edc85f84c5e06b230d3ea5bfd21
RLBA-2022:2698
new packages: butane
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for butane.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
butane-0.13.1-1.el9.x86_64.rpm
b8b27afaaf88085738ba5ab2198aa130de9c3d5b9016f664c9d07b650622f933
RLBA-2022:2701
new packages: rust-ssh-key-dir
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-ssh-key-dir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ssh-key-dir-0.1.3-2.el9.x86_64.rpm
21e8becf78429865faefecff1e0ff2dfc16c6a05789c61374af718ae7b0d1294
ssh-key-dir-0.1.3-2.el9_0.x86_64.rpm
32bf841a986c157d264cfef35f136a1507cae5b1f9ef98ae10b3e6215c9c7466
RLBA-2022:2705
new packages: Box2D
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for Box2D.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
Box2D-2.4.1-7.el9.i686.rpm
98fa11430a32180eabdc114015fe4d23c58307b2f89277d7f618b7a2d8680aff
Box2D-2.4.1-7.el9.x86_64.rpm
20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567
RLBA-2022:2706
new packages: CUnit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for CUnit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
CUnit-2.1.3-25.el9.i686.rpm
2ebe084123d4aa2c6a4f58bdb6909ef4b0de3584cd28219e01cbc6924e0aae62
CUnit-2.1.3-25.el9.x86_64.rpm
793f55b77ddd5001e6a3cc03a7eb574ae50059cb1f99c0396fb31c91d67870bd
RLBA-2022:2707
new packages: HdrHistogram_c
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for HdrHistogram_c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
HdrHistogram_c-0.11.0-6.el9.i686.rpm
ac7c25f4a3a030b3e81c36c130312e6198708bd5889cca3afef774d8aeac409e
HdrHistogram_c-0.11.0-6.el9.x86_64.rpm
ef8389d7975655aed21532a2d8c2077dc406bd74289a3543eb75ebd62d973b4f
RLBA-2022:2708
new packages: Judy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for Judy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
Judy-1.0.5-28.el9.i686.rpm
40ab0948fe2e2f86fef945716a95c1b34ffa57b67818db37e1244103bdac9ace
Judy-1.0.5-28.el9.x86_64.rpm
4c0bd77f043014b45412d5536a33d370fb00b3a729edff70b0717dfed25fc2ca
RLBA-2022:2709
new packages: NetworkManager-libreswan
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-libreswan-1.2.14-1.el9.3.x86_64.rpm
47c47547035bca999e6708032737f4b6102a0c07ab6df79a95be0bb9831283ad
NetworkManager-libreswan-gnome-1.2.14-1.el9.3.x86_64.rpm
697d1dab309b66468b78607688384b872fb598051c781d273a11b751a189702a
RLBA-2022:2710
new packages: PackageKit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for PackageKit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
PackageKit-1.2.4-2.el9.x86_64.rpm
9439d096cda6783d255252f9ce40300dd325201e3f2ad0f97e609a39983a336a
PackageKit-command-not-found-1.2.4-2.el9.x86_64.rpm
f9a7bb3aff8f47f8026cb8c820f3df2230c51e52084deacadadd47f596553df4
PackageKit-glib-1.2.4-2.el9.i686.rpm
81bd6fdf75c9fd76bdf08a6e2cf8474bb79063a87dc9ccbe7c64aba2c5ca9f3e
PackageKit-glib-1.2.4-2.el9.x86_64.rpm
617b3455a255169b99c525ed4907530d6bab052e88d337ffd6ce9d5534b7fd9c
PackageKit-gstreamer-plugin-1.2.4-2.el9.x86_64.rpm
907e151fbd020e2339e6afc731c8f287898b3b53eb9dd64061500c2b783c967a
PackageKit-gtk3-module-1.2.4-2.el9.x86_64.rpm
42cc8cf15e4ecdd43efb85b03dd75704b68e6aff5865aa38bd264a458d475199
RLBA-2022:2712
new packages: Xaw3d
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for Xaw3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
Xaw3d-1.6.3-7.el9.i686.rpm
c946d10af6a5830b969f6ae935b636b0f106d179fff1fcfb777b6e8282e2e941
Xaw3d-1.6.3-7.el9.x86_64.rpm
d413224e63d8185e43cc5809097442238174a8c11180b6a7176cadc0b895673a
RLBA-2022:2713
new packages: a52dec
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for a52dec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
a52dec-0.7.4-42.el9.x86_64.rpm
84b6c7212fa2341c59a44952a29634b2549f007adc9a258771b15f834a3bbdcc
liba52-0.7.4-42.el9.i686.rpm
4b577d1249eaa60effac276f94fe03204989c665c97833f8a5786f8b672502fe
liba52-0.7.4-42.el9.x86_64.rpm
5d6de658fd3f6df004db282f83e5e8a5e16861971c62cef73df357fabc4bf28f
RLBA-2022:2714
new packages: aajohan-comfortaa-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aajohan-comfortaa-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
aajohan-comfortaa-fonts-3.001-10.el9.noarch.rpm
92831bc2b516e0205a93040b899fdb15882ff7f7c908b239ccd7853f43eaabfd
RLBA-2022:2715
new packages: abattis-cantarell-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for abattis-cantarell-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
abattis-cantarell-fonts-0.301-4.el9.noarch.rpm
18353db7e5a97b5ecb4d646394a5a93986fb7682bd90baafc7769be1e2175d6b
RLBA-2022:2716
new packages: acpid
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for acpid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
acpid-2.0.32-6.el9.x86_64.rpm
e450fab884c5db92d4fe42c61f4f6ca078a2e425a1a228259c9ff30502fc3663
RLBA-2022:2717
new packages: adobe-mappings-cmap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adobe-mappings-cmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adobe-mappings-cmap-20171205-12.el9.noarch.rpm
15b236b019ad562117fdb96405e51328dc83a5f09e942313c0867a13aa70f6ab
adobe-mappings-cmap-deprecated-20171205-12.el9.noarch.rpm
b8e6cce53070612a81458ecdaf1461ddee01fbbcde04feb31868b4096c11ac65
RLBA-2022:2718
new packages: adobe-mappings-pdf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adobe-mappings-pdf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adobe-mappings-pdf-20180407-10.el9.noarch.rpm
4db4ce331381545cf7af7a25e7031820483c51847bcaa7c99f8da45fce6d24ef
RLBA-2022:2719
new packages: alsa-firmware
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-firmware-1.2.4-6.el9.noarch.rpm
3dda98070c296819261db7257d39fefd3d0293caa86af3c05ab530c2fd23c150
RLBA-2022:2721
new packages: alsa-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-tools-firmware-1.2.2-6.el9.x86_64.rpm
348d84384cd8e7dbb90f0725c017a87636b9c3559b16b37f39af948c48cbbcf4
RLBA-2022:2722
new packages: ant
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ant.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ant-1.10.9-7.el9.noarch.rpm
5dd82a5473e28d529a8e024f97172316293df4c6a1c1869c937a5292aaa8dbe8
ant-antlr-1.10.9-7.el9.noarch.rpm
ce891388e9a881eee29fa94658980e0013e5f42ddc053b1e03f4165603a36582
ant-apache-bcel-1.10.9-7.el9.noarch.rpm
5e2f32d22f215e315f39668bbd0b1f695e58f0035e8d31a0d8cd52c301b7497c
ant-apache-bsf-1.10.9-7.el9.noarch.rpm
7f2897d381309c6b008f6c34af14923110d8be5c85bc7c4397a2b2515e8906f9
ant-apache-oro-1.10.9-7.el9.noarch.rpm
5257ee162956358ff32dbd5b3a60fe7565512bd7d9e6d3c21d4a9386ac3039eb
ant-apache-regexp-1.10.9-7.el9.noarch.rpm
fed33d36d798aae884b36af109a0a7b331688c3dbb635dea72162aedb015f88d
ant-apache-resolver-1.10.9-7.el9.noarch.rpm
5bb7ba30aaafa875f36179a3f9dec063a07e51f8a80bfda050d06cf12b8c29fd
ant-apache-xalan2-1.10.9-7.el9.noarch.rpm
d106e75933c0afbd6411b4bd44815b8b994f271bd411e4dc7626e23912772ead
ant-commons-logging-1.10.9-7.el9.noarch.rpm
a4c55a42c65f20bcf848f65195b80ce22839383b86394323bcef5a7bbc5ec9bc
ant-commons-net-1.10.9-7.el9.noarch.rpm
3122d26c8967ba9ca689cb8cc62678f5e3c7f49220f0759415dda9976294441e
ant-javamail-1.10.9-7.el9.noarch.rpm
2dd935ae72844e6485473c6dc08413225d8feec03a3fd803dfdfb023108e6710
ant-jdepend-1.10.9-7.el9.noarch.rpm
187e9172164bb6e65da61bb12e5e7c09af167d046523099d6c3c77722f30daef
ant-jmf-1.10.9-7.el9.noarch.rpm
512cb607a1ba59c686132cba975af89ed80cbed860ece7d3f0485d6e5a6f5323
ant-jsch-1.10.9-7.el9.noarch.rpm
cc6a0f89caf58bce281d5ee57acccc827aa9e54b7f9f124c8f92e9f0c8a093b4
ant-junit-1.10.9-7.el9.noarch.rpm
00005d6682fcec33368b40c79136be51cb7fb07811cd8a89dc542b8046f703b1
ant-junit5-1.10.9-7.el9.noarch.rpm
7c35b7ec77937fcd32499896663378f030f1c166f9fd917d70d21f9ca9f2af4a
ant-lib-1.10.9-7.el9.noarch.rpm
29e8c79cbe0a1eca4757ce5874a6d5e1a96a908567c92c6882486d0af5d4000e
ant-swing-1.10.9-7.el9.noarch.rpm
b1d663c9043321e40fb912dd87ac3d83699bfe479f5a45b8b0c7ed612801bd62
ant-testutil-1.10.9-7.el9.noarch.rpm
0847f9bddb7026114f3c4dbe144de6d4f0234f68d3355767ec41583787be223f
ant-xz-1.10.9-7.el9.noarch.rpm
e88547e3ccde8c3d3a52c1d4d5275a1dfdcb2878e833185a2afdb4be6e437adf
RLBA-2022:2724
new packages: antlr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for antlr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
antlr-tool-2.7.7-68.el9.noarch.rpm
ee5331d966b70ce98f207f6ce35c0606bc1267c1336dab3a9835099c0d3851c9
RLBA-2022:2725
new packages: apache-commons-cli
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-cli-1.4-16.el9.noarch.rpm
e4bced660157e7d0e00ab919c581c0027942f15da682b072cb273b4bf13e71c8
RLBA-2022:2726
new packages: apache-commons-codec
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-codec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-codec-1.15-6.el9.noarch.rpm
b90a08c48f3a4fbd2818f5eac8c5d8c929f750c7cfc4ef9b4f05cbc99308f2d2
RLBA-2022:2727
new packages: apache-commons-io
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-io.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-io-2.8.0-7.el9.noarch.rpm
d4b463881cdcf11c963a2554e9d7e61b942748d7b239b25597037a820dc36322
RLBA-2022:2728
new packages: apache-commons-lang3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-lang3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-lang3-3.12.0-5.el9.noarch.rpm
4a62f2bf3193773ea81bb59b1af12ba79c0e709cdf4db04213d3852914cea56b
RLBA-2022:2729
new packages: apache-commons-logging
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-logging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-logging-1.2-29.el9.noarch.rpm
d200953d49f68c73614e68207574dcaac866c0f86544dde92431695323b1cde8
RLBA-2022:2730
new packages: apache-commons-net
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-net.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-net-3.6-14.el9.noarch.rpm
b03b7f1ba91383c647420193e5c30d1a5379c96d33e15cd80d319b71e571c4d7
RLBA-2022:2731
new packages: apr-util
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apr-util.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apr-util-1.6.1-20.el9.i686.rpm
db39e48e07695bb1509dfecc43fd4050c86a8f9d1a02f2fcbf90e4d552cd0d77
apr-util-1.6.1-20.el9.x86_64.rpm
4df3aca6bee14682fbbd835dbaf77e11f6853e1a4a3c0ed61bd8ae8d7b58a233
apr-util-bdb-1.6.1-20.el9.i686.rpm
ecc683ed3cd6d694f464f5ce31cb7e3eba10b5351b4dc1bac11049fc26540f39
apr-util-bdb-1.6.1-20.el9.x86_64.rpm
7a9f7b7d8012e2d5227edb90d7ffe3154039952680d6e6dff50117b5869e2763
apr-util-devel-1.6.1-20.el9.i686.rpm
f963f7fa2a4598df9dbbe892c9a558bf5afe35491d85e448603dab2ed76846e1
apr-util-devel-1.6.1-20.el9.x86_64.rpm
d5edb3c184182ea22e0b4d56e67083387e0c4b07f1f527efb53cdecd9e99567c
apr-util-ldap-1.6.1-20.el9.x86_64.rpm
414345d067ebba19c20b7ed1e81b5c5cac1973b6fd4cc457e26118c9a991b1af
apr-util-mysql-1.6.1-20.el9.x86_64.rpm
7b4b167157717d62ee175c17c986030451f4af7ed1a212dc7917067cce59b584
apr-util-odbc-1.6.1-20.el9.x86_64.rpm
7b6ee924b4baf61f5d7a1f0ca2914936b3227e60d9be0344690a27a810d4e51c
apr-util-openssl-1.6.1-20.el9.x86_64.rpm
293cd825b42b9b69ade16c217162fc3c2a60718142e77a3cdac2d9a21233d696
apr-util-pgsql-1.6.1-20.el9.x86_64.rpm
0a943b5ac371dec132740cb408b03fbac00826a3ed375021f2925ccc483d12f7
apr-util-sqlite-1.6.1-20.el9.x86_64.rpm
2b9494fcb1df01da25dd538cbaac4d5f299b9175b3fe9460c1aa5b91fa723178
RLBA-2022:2732
new packages: asciidoc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for asciidoc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
asciidoc-9.1.0-3.el9.noarch.rpm
2e09e2b0c612860433104af56f9708b2732ae024d37f48386be76f1d66512816
RLBA-2022:2733
new packages: assertj-core
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for assertj-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
assertj-core-3.19.0-5.el9.noarch.rpm
b0ecb801853f69851e15c77175df15a66090a114e187a626696aa4772832e920
RLBA-2022:2734
new packages: at-spi2-atk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for at-spi2-atk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
at-spi2-atk-2.38.0-4.el9.i686.rpm
3f822d11b011f1c904e79743e20ccabb7baf88943654ee3967d95c2380e704fc
at-spi2-atk-2.38.0-4.el9.x86_64.rpm
1b12b3fae8815a0e310a4a9b5e9d2d68264e7d700e50a796078b389966f6c4b8
at-spi2-atk-devel-2.38.0-4.el9.i686.rpm
f8155fa14b8178d18377a2d66a5790c2bfbef9cf15c368892f4bad5ef3828e00
at-spi2-atk-devel-2.38.0-4.el9.x86_64.rpm
b52368b8e0e9288f41e38da8a61669758d37914a85240609398c764de5660125
RLBA-2022:2735
new packages: at-spi2-core
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for at-spi2-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
at-spi2-core-2.40.3-1.el9.i686.rpm
c5befbf6f0306211c228fe795f6db2711b8cd2fdf4dc96a753e88d150738b0b3
at-spi2-core-2.40.3-1.el9.x86_64.rpm
0a3f8604b65c5eaf898777fe01c449a86c7dd55b09c94ee91b538149d89a543e
at-spi2-core-devel-2.40.3-1.el9.i686.rpm
e23ff22711e46bf790cd26139b6976945424281cba97eaa0f359237b3da2c9b7
at-spi2-core-devel-2.40.3-1.el9.x86_64.rpm
1aae527da23a433041fc48f1c947157aac468e84d9577045ccb2c6fd4ead4633
RLBA-2022:2736
new packages: atinject
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for atinject.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
atinject-1.0.3-5.el9.noarch.rpm
6dedd2de396871c941848b4b20d03d421c1c96c22acb0e0ac640f4a15bce3b54
RLBA-2022:2737
new packages: atk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for atk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
atk-2.36.0-5.el9.i686.rpm
c63b6896943d7eccdaea252e4414f832e065a1c0e8cce49d2dc9e2fd9c226933
atk-2.36.0-5.el9.x86_64.rpm
a6d2249e02a7e2b0a8e11963744b677de3573a6f127e788c677fcd7ddfd3d92c
atk-devel-2.36.0-5.el9.i686.rpm
3e7e915488f53f146d83ebfc9895637275b32b44588487d6e5c2bc7ed396070a
atk-devel-2.36.0-5.el9.x86_64.rpm
68c989df1861d3a5e54862413fe25d95be50cfa31189d05e7518ec4e4c08a93c
RLBA-2022:2738
new packages: atkmm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for atkmm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
atkmm-2.28.2-2.el9.i686.rpm
a3283c8a9926f00c86218e7f3117bf7ae9075f60dcb4c6fb01d66ef9f0af3e04
atkmm-2.28.2-2.el9.x86_64.rpm
996adf691e2f558ee1915a6a801bbb8aa13192da905e3799f2489caa00de73a9
RLBA-2022:2739
new packages: autoconf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for autoconf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
autoconf-2.69-38.el9.noarch.rpm
e470bf76ef876897ed2ce1ee703a4ef973a12fc51a27d33d545a63dbe704fa76
RLBA-2022:2740
new packages: autoconf-archive
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for autoconf-archive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
autoconf-archive-2019.01.06-9.el9.noarch.rpm
9e922ad7ef8ff4809583ac89c6fb37e0b25f68f336f03bc3fd1850261922b5cd
RLBA-2022:2741
new packages: automake
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for automake.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
automake-1.16.2-6.el9.noarch.rpm
bf4d3d82d35a393a8c9c087ffa6c47b2a5b7a6c284958b3847300dd080b2267c
RLBA-2022:2742
new packages: babel
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for babel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
babel-2.9.1-2.el9.noarch.rpm
f3accd9dddd30161650e9e28f99b7186e98801d90d58acc05615ffe30bc01b92
python3-babel-2.9.1-2.el9.noarch.rpm
c55826bfc863379eb10d24d0c587c7e194af00d30a51f7968c52c229a66e4ac8
RLBA-2022:2745
new packages: baobab
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for baobab.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
baobab-40.0-3.el9.x86_64.rpm
87e2e00e6e93eb0622067741a6602b5aec3636497b96241dbd12a6e80db3172a
RLBA-2022:2747
new packages: bison
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bison.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bison-3.7.4-5.el9.x86_64.rpm
e8417ab812872ee138f8a74543964f3c06e6bcc12531aefd3fe0a3f2ffb96637
bison-runtime-3.7.4-5.el9.x86_64.rpm
7a9f7bec8b3b2ae7bb94bd3cf95f21ecb916ac57024ba0d9b843c05bd48d659f
RLBA-2022:2748
new packages: bitmap-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bitmap-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm
4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad
RLBA-2022:2749
new packages: blktrace
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for blktrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
blktrace-1.2.0-19.el9.x86_64.rpm
2de11c2efdc662820a967b26c5b7e842f9cf9ab6702414e99f4a8d3d8ea580c9
iowatcher-1.2.0-19.el9.x86_64.rpm
2507b85e1d1b2bbb1e57b0d720395eea1ceab4cdfd27993446ba82b35d3e65e9
RLBA-2022:2750
new packages: bogofilter
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bogofilter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bogofilter-1.2.5-8.el9.x86_64.rpm
ae16e0981b814e71fde10f570b23003ce42427ae7532539965aea074991c6388
RLBA-2022:2751
new packages: boom-boot
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
boom-boot-1.3-3.el9.noarch.rpm
4e377cd05de07063587ce5348ad804829f6994eca0e0ad24dd359662f86b8b8e
boom-boot-conf-1.3-3.el9.noarch.rpm
69577d2692f75fb821ac342f7960293ad6570249a7c9608df9baff1f8e7083e5
boom-boot-grub2-1.3-3.el9.noarch.rpm
b87cdfbcc5fe206e7018276fe3ec0f03ebb8ec4026834b445a2f4f3e7919a307
python3-boom-1.3-3.el9.noarch.rpm
8cbd7653ea62af9e4375a1968bea4d2b0a30ffc55b8c16c565c2258fa60190c5
RLBA-2022:2753
new packages: brltty
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for brltty.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
brlapi-0.8.2-4.el9.i686.rpm
4f58e4734101da0ec4a4a69d30556a08ca5d61d2e8dc031f6d4e6b9351f43db1
brlapi-0.8.2-4.el9.x86_64.rpm
2e1893c8d0320d9a7468b83cc004358dc21b3006333b204f22e89b23c396ee87
brltty-6.3-4.el9.x86_64.rpm
c92737eb21fe4ef4ac3a934cfde2f972c0660fa457f381f66feaa7d894c06b8f
brltty-at-spi2-6.3-4.el9.x86_64.rpm
803c487acac17226150166a33690a017402d207b813730610b1eee9403a8e5ba
brltty-docs-6.3-4.el9.noarch.rpm
bd3f6a056e9c6f2344f2e9da7a8af704742ce43246b95920b7a5d28c15dc29eb
brltty-dracut-6.3-4.el9.x86_64.rpm
283ecca9cd5317079b6f7205b358fc22035692b383800cc33d70a054803e753c
brltty-espeak-ng-6.3-4.el9.x86_64.rpm
4284e3168009e5620a55463081bf23bb65cca2a1a9969593be4ec5cf4c0da50d
brltty-xw-6.3-4.el9.x86_64.rpm
ecfaf4e783016f12e3a174926654172cbd103c88f1d3bb16e6c94239d5cb97ff
python3-brlapi-0.8.2-4.el9.x86_64.rpm
c8ae0204e61bb181d491a5e606f9b9fd3b3f34d4c16274983a9eeba3f7dd7e68
RLBA-2022:2754
new packages: bsf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bsf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bsf-2.4.0-43.el9.noarch.rpm
b9f7e00bf8070255a3438cd9ce423a05056e884aa10486b7c705344c7692ae6e
RLBA-2022:2755
new packages: byacc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for byacc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
byacc-2.0.20210109-4.el9.x86_64.rpm
60eadd40d143f481682507bc0a31c9aca44e3c87939053b983932571b30d12b8
RLBA-2022:2756
new packages: byte-buddy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for byte-buddy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
byte-buddy-1.10.20-5.el9.noarch.rpm
1f8f8d3fdf7fb9864ae4b7e1bb0ccef1b2d85f8406f29ee6e751305e5122e952
RLBA-2022:2757
new packages: byteman
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for byteman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
byteman-4.0.16-2.el9.noarch.rpm
674e1bab462bf187003ce0796c5d9194eedabb42bcd90eb417da65c8b83fc2fd
byteman-bmunit-4.0.16-2.el9.noarch.rpm
756ed9a5337fe28227f0a6dac11f3a592f4d2427797d45d126c6815a0c5be0e3
byteman-javadoc-4.0.16-2.el9.noarch.rpm
afaf1b76f4ea594b6b196b918ffa3c7580abf5e143136d75ed51f3626b9c6250
RLBA-2022:2758
new packages: c2esp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for c2esp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
c2esp-2.7-24.el9.x86_64.rpm
8f2d7128704d404cc3d8223830bccc84fc4cf70b9227fa4e4b4d2bff272436f7
RLBA-2022:2759
new packages: cairomm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cairomm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cairomm-1.14.2-10.el9.i686.rpm
e1a04d0a759d803f26e2c2c06cea3611b3da6760ed7abbe979bbf9528d4b7149
cairomm-1.14.2-10.el9.x86_64.rpm
74216e92ac5d1452d6d8fde90970c1769ebfebb0bfaf86610070221a008851b2
RLBA-2022:2760
new packages: cdi-api
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cdi-api.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cdi-api-2.0.2-5.el9.noarch.rpm
47c872a8badb47fd59604af059267200281f516d1a5e3c1ea0f31ee62e483e95
RLBA-2022:2761
new packages: ceph
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ceph.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librados2-16.2.4-5.el9.x86_64.rpm
e59213c6429466f265fb8bc48811413c25d0766b86229a654ff874593f2bd66b
librbd1-16.2.4-5.el9.x86_64.rpm
ec4fe5aa004e38a1f162f3b5b0cd520766bfd3686064f4733bfe4c271e207902
RLBA-2022:2762
new packages: chan
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
chan-0.0.4-6.el9.i686.rpm
51d10380210c94afa8e1ae35bd1b3395783a1afc45505fddfee5e41a564709f7
chan-0.0.4-6.el9.x86_64.rpm
7fe938841d6ddb01c3437de71f55b1e700c42cafae857666184e007244ec9e5e
RLBA-2022:2763
new packages: cheese
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cheese.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cheese-3.38.0-6.el9.x86_64.rpm
4f3d318b65fbeab7711191605495ca327930c80921c2271ca7ad604b67728acc
cheese-libs-3.38.0-6.el9.i686.rpm
fc54a5149a39b4aa8becbcd349add1b3a2450d1a27fd811319847f05a5abbbf6
cheese-libs-3.38.0-6.el9.x86_64.rpm
fa0642643e7ccf6af406af7b966dc63ac723372b7ec9596a058802cce4afd141
RLBA-2022:2764
new packages: chrome-gnome-shell
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chrome-gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
chrome-gnome-shell-10.1-14.el9.x86_64.rpm
6dc5c5e9ac162ed887442252180b73e150747ec267dbf725d477e0198363112c
RLBA-2022:2765
new packages: cim-schema
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cim-schema.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cim-schema-2.43.0-14.el9.noarch.rpm
fcdc10383b4d308dcda9a61d3b6a45d8a63f2cf7abbec06ee1773d82eeea6cc0
RLBA-2022:2766
new packages: cjose
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cjose.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cjose-0.6.1-12.el9.i686.rpm
a2e35185bca9628a39aa2be64c5c557aa4b1cf3660ef0e3a2a68d52533b97582
cjose-0.6.1-12.el9.x86_64.rpm
33e80558b78a36a3b42ef08dd455ffcf53ae5651805849f63f4c9789b24bafe8
RLBA-2022:2767
new packages: cldr-emoji-annotation
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cldr-emoji-annotation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cldr-emoji-annotation-39-2.el9.noarch.rpm
e1894ecbeeae87956621a41e53e866cb7e2e38fde92baa824b81d7a99e54f360
cldr-emoji-annotation-dtd-39-2.el9.noarch.rpm
d17597c0b485a385e09cfa136c441cb19b3b11ba6b525f991c124f53ef18fc23
RLBA-2022:2768
new packages: cloud-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cloud-utils-growpart-0.31-10.el9.x86_64.rpm
a87779012026b5a6875875690291b7c222b6c38e4f9e1a0a091ff207f061e907
RLBA-2022:2769
new packages: clucene
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clucene.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.i686.rpm
970e8147a2c48661553ab681a235dc8b1190cfd613938315dcdce7061cae1e12
clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm
37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836
clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.i686.rpm
3653af34451e04e59e1557457b7f7086c2e9743b8c1aca4ba09de5ed0e7bf704
clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm
cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c
RLBA-2022:2772
new packages: cmake
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cmake.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cmake-3.20.2-7.el9.x86_64.rpm
1a66674b62288319c001b776e9d899a99a7137ff2274c3a5a33f59d37af58771
cmake-data-3.20.2-7.el9.noarch.rpm
0ff25e58986c65b2d412516476ef690bd8d0285ac05b5ed0c1c1d9ade597a09d
cmake-doc-3.20.2-7.el9.noarch.rpm
a049cf081975f91a4175682e4586cab51ecd4daf5884a86956f36e07960fe209
cmake-filesystem-3.20.2-7.el9.i686.rpm
f0c7140e1f4b6d0a99301ee55a0307bc8d278f91116c10154075be92c85552d8
cmake-filesystem-3.20.2-7.el9.x86_64.rpm
08777ad8dddfbd07fe838ed879eebffaa3d5d9daf381efaeae4514a496034e86
cmake-gui-3.20.2-7.el9.x86_64.rpm
91c78667cffb30ab94aaf450bba3a2d6ab91678202aefeddc23e77d00dab2feb
cmake-rpm-macros-3.20.2-7.el9.noarch.rpm
46e1833802525aecdf3d4b3aba944e86beba8fdd0b5704dd2ed3f9fe23fb9133
RLBA-2022:2770
new packages: clutter-gst3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clutter-gst3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clutter-gst3-3.0.27-7.el9.i686.rpm
95c10e7aa0df49781d0cf4974b4212a7603e5db7727c7285b05a7e5f3db6eaea
clutter-gst3-3.0.27-7.el9.x86_64.rpm
554022c3f21c07521446278aee967f203afcf49e660ce2eaac3751eea3625f5f
RLBA-2022:2771
new packages: xmlrpc-c
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xmlrpc-c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xmlrpc-c-1.51.0-16.el9.i686.rpm
5a81a5c0e5d75cbb5ce0fe9dca46e9dee9f4caf1067e6780b315ec4a335bd13c
xmlrpc-c-1.51.0-16.el9.x86_64.rpm
868d74bba6ca7ed13ab726f0896386c1b9686fa8cafc8efa2b933750be3bffac
xmlrpc-c-client-1.51.0-16.el9.i686.rpm
7eab73cd2c6f4fa2b1bfaa79b6329f4bb1744ee845efcd72e6ccd10b1a8e9f04
xmlrpc-c-client-1.51.0-16.el9.x86_64.rpm
ca2049bf5a67878490aa43cc1090edec7522e9c6edf3d369a99cd6a0b92b2eb6
RLBA-2022:2773
new packages: cogl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cogl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cogl-1.22.8-5.el9.i686.rpm
2534b8318ce9cf1ec3b6b042ef3d768f06bd5e94646ebe05c0c028ccf2ce5d91
cogl-1.22.8-5.el9.x86_64.rpm
947147d22024780ffeaf42960ccbcaa7874fd5b9235b3647d00d5d4224bdbda7
RLBA-2022:2774
new packages: color-filesystem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for color-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
color-filesystem-1-28.el9.noarch.rpm
83d1c78a4a69e98511c0a6e265bfece24eefeaddf24b3c0e159a5d8d83f65c5e
RLBA-2022:2775
new packages: colord
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for colord.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
colord-1.4.5-4.el9.x86_64.rpm
d7c5c64892db81088deea94b081cb75427dc2644c8b0667d97f099bd63af0dd0
colord-libs-1.4.5-4.el9.i686.rpm
8abbb5d71189e7e24cae54c7978aa736bdeaeff35305c30edbd101faf1c5c18d
colord-libs-1.4.5-4.el9.x86_64.rpm
09c659915ffc516d047be14b1e4b57df743052a69f8430e2d2fc0f37d2660f97
RLBA-2022:2776
new packages: colord-gtk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for colord-gtk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
colord-gtk-0.2.0-7.el9.i686.rpm
1ac08299a4d797c479add475812d3a4a2d0902ffb1c474ef1e5dcfca2804ebe2
colord-gtk-0.2.0-7.el9.x86_64.rpm
ae066554d51f28833860765c9985c3d86fb1ce903fb43a1950c152d6d5c3080f
RLBA-2022:2778
new packages: console-setup
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for console-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
console-setup-1.200-4.el9.noarch.rpm
d71ad7656545fb081782542f0a5b2e00e46928cd42b06f336674d459fb358b58
RLBA-2022:2779
new packages: convmv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for convmv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
convmv-2.05-11.el9.noarch.rpm
d7121fe742d0f06597b3f4c3489e8c5ecee9789ec0caf5c240e3638889412f6b
RLBA-2022:2780
new packages: copy-jdk-configs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for copy-jdk-configs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
copy-jdk-configs-4.0-3.el9.noarch.rpm
9c02c174900a75f569fc872b5edbe44a57efa1663e5255da56d184f753f14a85
RLBA-2022:2782
new packages: culmus-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for culmus-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
culmus-aharoni-clm-fonts-0.130-20.el9.noarch.rpm
9d9afb92b5b945c8c7da175f1f28ed8aaed0a9c285728ae70f2e29749746fe3e
culmus-caladings-clm-fonts-0.130-20.el9.noarch.rpm
41f81f3abe9bfcea7ebffe5a74d18ce999acf6390e804acab3dd8e65e05752a7
culmus-david-clm-fonts-0.130-20.el9.noarch.rpm
b130fccab53aab8af537bf7f85b6132f9a43be365ecb08abe28c0187b7125e18
culmus-drugulin-clm-fonts-0.130-20.el9.noarch.rpm
76593ff514f755db0da042adbe65b542b6673f725d183f8959dd6ab62a7d8f04
culmus-ellinia-clm-fonts-0.130-20.el9.noarch.rpm
d97e54abd4ae1a3bec72fba9abd343de87bd86ce1c52bdee1a4a5fe85a6d9aae
culmus-fonts-common-0.130-20.el9.noarch.rpm
efe74c04e14ad32b34c39298a43d7f6a5529e63042ae7910070a5a2c85ae0187
culmus-frank-ruehl-clm-fonts-0.130-20.el9.noarch.rpm
0475c30eb17dce8a7419e1467e723094a8b791c0621e8a211c5826fc7202ffa2
culmus-hadasim-clm-fonts-0.130-20.el9.noarch.rpm
e66dfe3e57c617e283cde75967871c5348229d51ecf72f36c1e29ed75f8d43d7
culmus-miriam-clm-fonts-0.130-20.el9.noarch.rpm
6d2f826ce8ccddbc3686b5d94052b5553a7639d3be7a637cf54185964d8e5ec3
culmus-miriam-mono-clm-fonts-0.130-20.el9.noarch.rpm
ee634b8ca0e15423e41ace9664a52a8c5520549f19966c38bbacc9e6fb683cb2
culmus-nachlieli-clm-fonts-0.130-20.el9.noarch.rpm
0adad41f3cc1aa6e30b955a8518b7335fa1ec6934b05de7d6d66f22c8a5f95ea
culmus-simple-clm-fonts-0.130-20.el9.noarch.rpm
5c6fe02cfb06c456e49bc5e72b48020b52cd8896eed1a384fa8659519184782d
culmus-stamashkenaz-clm-fonts-0.130-20.el9.noarch.rpm
84591be035ba54339313fd44b2074474981d44fd34d2f3acb9a51ec19b810598
culmus-stamsefarad-clm-fonts-0.130-20.el9.noarch.rpm
463ba512a8d6a3363710c22945d20ba198b38681a63a83684b604673074fcdaf
culmus-yehuda-clm-fonts-0.130-20.el9.noarch.rpm
cb46c5dafa21ffdeb147fac155df69a9165ab4660178e56233e7e471e095d010
RLBA-2022:2785
new packages: dbus-glib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-0.110-13.el9.i686.rpm
f9aa849366180eba292a8140215a4ff9b1e84e3f582ab8b84d70a528dad31fd4
dbus-glib-devel-0.110-13.el9.i686.rpm
ccd4bf66b10b72f2720022147bc48a5ea5306fc1ba32d2bcdb2727edfc9dc1c0
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
RLBA-2022:2783
new packages: cups-filters
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-filters-1.28.7-10.el9.x86_64.rpm
822a67d58c1fb35bea6f385daf76cf6a64588f316f681a46e6fc5711480f1567
cups-filters-libs-1.28.7-10.el9.i686.rpm
44660e330435eb3a969556c44daf710bf97e2d0ea30091643e708737d5e6d1b2
cups-filters-libs-1.28.7-10.el9.x86_64.rpm
41f1d3d844c6b480af9417bda4ecfb6c1eedd70d0f2faa66223b28723ca1f53a
RLBA-2022:2784
new packages: cups-pk-helper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups-pk-helper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-pk-helper-0.2.6-14.el9.x86_64.rpm
5711c16516695d77ae4267870d8774311ce65365fcc765679bdd81b6de977452
RLBA-2022:2788
new packages: dcraw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dcraw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dcraw-9.28.0-13.el9.x86_64.rpm
3945723f7d02c91aae93134e5aaa5aa294668dcc3d86db61fb6dfdbb8e5044eb
RLBA-2022:2786
new packages: dconf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dconf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dconf-0.40.0-6.el9.i686.rpm
f860c1fa4ff7178ab91831ebdd73fb6f64de1ad170d3f2162b5ae9c848a5ea83
dconf-0.40.0-6.el9.x86_64.rpm
094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f
RLBA-2022:2787
new packages: dconf-editor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dconf-editor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dconf-editor-3.38.3-3.el9.x86_64.rpm
8edf61647d6a87000844bd8e0582b9c8a112acb81813893e79ee8f7160d31dd8
RLBA-2022:2789
new packages: debugedit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for debugedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
debugedit-5.0-3.el9.x86_64.rpm
fbf01d928226d8b1e18edcf15ddc7520791661f637ac1a5db410e9a58517a12f
RLBA-2022:2791
new packages: dialog
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dialog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dialog-1.3-32.20210117.el9.x86_64.rpm
4fdb03442000fedf51cba70f413a0b002c3e4ec72b306153f9c91b548e05ff1d
RLBA-2022:2792
new packages: diffstat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for diffstat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
diffstat-1.64-6.el9.x86_64.rpm
2e3add93be2417a8f94e6763891b7807bb480da5041432ee8c36b20b08d9cb92
RLBA-2022:2793
new packages: docbook-dtds
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for docbook-dtds.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
docbook-dtds-1.0-79.el9.noarch.rpm
b8bdacafd4506c393438dda55fea36adb755d05fc35c99c839e641aef79c2414
RLBA-2022:2794
new packages: docbook-style-xsl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for docbook-style-xsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
docbook-style-xsl-1.79.2-16.el9.noarch.rpm
ad433be83a77c2d83afceb7b21f012a4d34a965dc0a776ff49f396f787f18894
RLBA-2022:2795
new packages: docbook5-style-xsl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for docbook5-style-xsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
docbook5-style-xsl-1.79.2-13.el9.noarch.rpm
1a0b26de25a2b14cb4d4dc09f589848baab7145c1d5541572e3e719dd043fa5f
docbook5-style-xsl-extensions-1.79.2-13.el9.noarch.rpm
7ae3e64d30b464dada89bc72c33b157d96057eb5415f3ab5e4c3774b9448e7ad
RLBA-2022:2796
new packages: dotconf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotconf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dotconf-1.3-28.el9.i686.rpm
577963b3f5ffc5b96a7b0fe97f5262eba3c3d4ca6673b44d7c3f153f86f9f599
dotconf-1.3-28.el9.x86_64.rpm
38bd484ae88051ef3aea8738f0fe000ed6689a82626ab8b566e989112f7dadb6
RLBA-2022:2797
new packages: double-conversion
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for double-conversion.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
double-conversion-3.1.5-6.el9.i686.rpm
3f130dc129debba21a67aca0c5966c036f4a223d9e579a2bf49c7e7ca006b01e
double-conversion-3.1.5-6.el9.x86_64.rpm
1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977
RLBA-2022:2798
new packages: driverctl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for driverctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
driverctl-0.111-2.el9.noarch.rpm
e77dd4061be1384ba336ef3dd2ba144e51776fa8c2c47ca16fe41a7ddfee0d66
RLBA-2022:2799
new packages: dtc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dtc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dtc-1.6.0-7.el9.x86_64.rpm
55952eeccaec6ed26b033ceb1cfa678e20181ee3db74f147e23c4343989aa79b
libfdt-1.6.0-7.el9.i686.rpm
d4b7dcdf9bc5f77ae4398acbfb455bf4e860ff7da0632ca03f2b310c11c88962
libfdt-1.6.0-7.el9.x86_64.rpm
f42aef8f779f79c3fdf5767a93e6949e77af7108e6afcd0da9a3dc8596a67366
RLBA-2022:2800
new packages: dwz
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dwz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dwz-0.14-3.el9.x86_64.rpm
4cf8e5643393772d34196405ee8843da1c00c156b3b1b76805c2e7f22a911d87
RLBA-2022:2801
new packages: emacs-auctex
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for emacs-auctex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-auctex-12.3-2.el9.noarch.rpm
86ab115b6c2fb8b35cd2706326da2a7574872c3b9b86c2e7b9e37f0838045836
tex-preview-12.3-2.el9.noarch.rpm
c84194090a3c8bcff55bdc57aa2afd91f91c04d5b2844b28e33e7f987b133a98
RLBA-2022:2802
new packages: enchant
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for enchant.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
enchant-1.6.0-30.el9.i686.rpm
58f587b655325a44884be6182e1942abfd4b73b9089fbb52fd1d76dab25db171
enchant-1.6.0-30.el9.x86_64.rpm
9856037a6491beb254a0e3d460ff52c232cdaf205064cfd2d3871af683a3b009
RLBA-2022:2803
new packages: enchant2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for enchant2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
enchant2-2.2.15-6.el9.i686.rpm
d65d036c48523257678eda1071cbfd79a827e15924cf8c295e3bc227d010c0d5
enchant2-2.2.15-6.el9.x86_64.rpm
f0ac2534a1dd08b82840623a8472d5c88e12d830df402ba7300421667a1c4be9
RLBA-2022:2804
new packages: enscript
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for enscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
enscript-1.6.6-28.el9.x86_64.rpm
cc7f6cb185faf4e77817c127f22181c1aa9990829635fde12a6c0be7f645214d
RLBA-2022:2805
new packages: eog
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for eog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
eog-40.3-2.el9.x86_64.rpm
327a435f70240b998b544ae52d88500c186c786876b9f03c8fc243b634b536fa
RLBA-2022:2806
new packages: espeak-ng
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for espeak-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
espeak-ng-1.50-7.el9.i686.rpm
303cff5af8450fa62e4ca56dc96e2b3ba87f0d329fa614a4d513ec5451c0eb0a
espeak-ng-1.50-7.el9.x86_64.rpm
2063ab95d5f7fb821d29ddf7fa7ea89be880dd2d46ec1d49113509cd437ace45
RLBA-2022:2807
new packages: evolution-ews
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-ews.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-ews-3.40.4-1.el9.x86_64.rpm
086f243bfd6e5f2d5bbcff154412f04b497dd3b11e4a6066026b8f71c4060e7c
evolution-ews-langpacks-3.40.4-1.el9.noarch.rpm
4b31c7ec19f5faa7b9bbff90cff988f0cc593e4c376bbd9526d0b0cf300f6499
RLBA-2022:2808
new packages: expect
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
expect-5.45.4-15.el9.x86_64.rpm
e890a6d145e259cca893006ab1694d3ade888eea110db6acd5b7eecdfa03682c
RLBA-2022:2809
new packages: fdk-aac-free
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fdk-aac-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fdk-aac-free-2.0.0-8.el9.i686.rpm
fb4ac77f03e71594b02f3c4dd5669e24ae5d68ba5e2570a90632250df4f7eaf8
fdk-aac-free-2.0.0-8.el9.x86_64.rpm
fd2889679e75a7fb50fca56f56f802fc5114af9b24dcc53af8b621ffd579156f
RLBA-2022:2810
new packages: fftw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fftw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fftw-3.3.8-12.el9.i686.rpm
a874d81e852854fa1f69e4c6ad5202e5d0f27a034990c3809d5a169d01d68128
fftw-3.3.8-12.el9.x86_64.rpm
761d5c76f0b417f53fdd27fec6e51748d47cfae543de1c0cdf75a26d68d88051
fftw-devel-3.3.8-12.el9.i686.rpm
d8c48a040b19ec49608b3513142b4e3156c06ff6761a18167ec1c37df308e455
fftw-devel-3.3.8-12.el9.x86_64.rpm
ae33de7c8d47953bdacd0a0e2a17bcb8cfc1efb015f52b40a9f09390f27ecbc6
fftw-libs-3.3.8-12.el9.i686.rpm
cdc05bb0c089fdf43167fd04636d00f241f2e87ae27734d1f8d98afe43800519
fftw-libs-3.3.8-12.el9.x86_64.rpm
2f84faa5aafca04d4a3833ff201e5212d9ba03366a343c242f2779d6a906a8e8
fftw-libs-double-3.3.8-12.el9.i686.rpm
ff634ae36b5a85c7fbedb07b1753db9a2d431c9065654213e533c6b7bf0ac65b
fftw-libs-double-3.3.8-12.el9.x86_64.rpm
f2abe9068f5662f29fd5bdabea1189154519f4bd926d6103a590f1fcce9ab249
fftw-libs-long-3.3.8-12.el9.i686.rpm
21c699b766311aef915ed641d29fb6726f865b3f76f516f59e59aae8daf0ab72
fftw-libs-long-3.3.8-12.el9.x86_64.rpm
8bf5ec47fdd06e32574813af31c7a279b60ffbfce8b57b0e65aa3e7db845a582
fftw-libs-quad-3.3.8-12.el9.i686.rpm
97ac3c93517c4f8a17a76e68ff586bbbf589942b5c3e2bb37dc5587a616b555b
fftw-libs-quad-3.3.8-12.el9.x86_64.rpm
cdb5f2159787bb36f0ae9f4c6c7bb3f2847f37986496920914f346fced958903
fftw-libs-single-3.3.8-12.el9.i686.rpm
6eeed678747c0122928b8046ede45388ba88077c27b949a98321176ee1f1e20b
fftw-libs-single-3.3.8-12.el9.x86_64.rpm
eeb531a232788956f7e8be19fc4e1fddea929cfeb470b533ad89dcc79874578d
fftw-static-3.3.8-12.el9.i686.rpm
23fe76ecad1ca04517f3c94609a8d09f7fc2ddc5f3e855bc127e396c4cd7e1c1
fftw-static-3.3.8-12.el9.x86_64.rpm
bdc8eaeca6d1f4e541316cef152f5492a51937d5e0c9b5426a313703aefb120d
RLBA-2022:2811
new packages: flac
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flac.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flac-libs-1.3.3-9.el9.i686.rpm
36e1f3d2361fc21cfbffad997e7b785132bd8b1b49a2ded5744e28aafee5cb30
flac-libs-1.3.3-9.el9.x86_64.rpm
de6a904c5e61c6584df04ec88cef318b0308e5afe3fafdc32c491dba683d0987
RLBA-2022:2812
new packages: flashrom
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flashrom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flashrom-1.2-10.el9.i686.rpm
dd4952acf55651e128d987bf01a426988de3de3b56a8519ede2e7944f05b236a
flashrom-1.2-10.el9.x86_64.rpm
bf5164e953876885ed31fd913b17314b9a37dee1e0b6285a4b45ee2ee346577f
RLBA-2022:2814
new packages: flex
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flex-2.6.4-9.el9.x86_64.rpm
4a2a543e1419723dc825cfef657802f99ab3b8e231843d34c0c822b16339a78b
flex-doc-2.6.4-9.el9.x86_64.rpm
71377f54b9e6064c34f31eed1270fa519781adc6126b4215d0f477235e1803d3
RLBA-2022:2815
new packages: flute
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flute.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flute-1.3.0-27.OOo31.el9.noarch.rpm
59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308
RLBA-2022:2816
new packages: fontawesome-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fontawesome-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fontawesome-fonts-4.7.0-13.el9.noarch.rpm
bb42bd81ccab839dad5ea9bda83a0269ab630e7939fb5d43ea21d7a3dc7168a2
RLBA-2022:2817
new packages: foomatic
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for foomatic.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
foomatic-4.0.13-19.el9.x86_64.rpm
32803af6154bd2891ae0678b51e24fb52e4cb838094f59b714e2e351ca82d5ff
RLBA-2022:2818
new packages: foomatic-db
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for foomatic-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
foomatic-db-4.0-72.20210209.el9.noarch.rpm
8a0621fa5bc6c38e0b0a469dadbf92e8ffba91ef2d5fd4325550159a760550cf
foomatic-db-filesystem-4.0-72.20210209.el9.noarch.rpm
f6cf92515c2f66117a30571048681e63b2b3c8d48018f6ca19a39a6ff759642d
foomatic-db-ppds-4.0-72.20210209.el9.noarch.rpm
8e9f9fa2ca5d6813c578afe9d2c3bb76650b44ff572640b5bceb6fdfc288fed9
RLBA-2022:2819
new packages: fprintd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fprintd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fprintd-1.94.0-3.el9.x86_64.rpm
57af6bb5cca318f01c7d63ac8733a0ed2cd28df809091438bf4828509913de70
fprintd-pam-1.94.0-3.el9.x86_64.rpm
954c0cba8e61774f02aa24c6954c53cdb2fcd5007a99ad634782fff178f0aca5
RLBA-2022:2820
new packages: freeglut
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeglut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freeglut-3.2.1-9.el9.i686.rpm
323b5e56cc72d0c9f83df1e64f1ef86c18a4f5566e8b2011213a7f93f81026ec
freeglut-3.2.1-9.el9.x86_64.rpm
401261f14c32a69cf59b80ef5d6288f2a78a96830f7de1eb5d0ea7b15043c812
RLBA-2022:2822
new packages: fstrm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fstrm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fstrm-0.6.1-3.el9.i686.rpm
73a245018de5e2c0574f06c3d51288f5ad6edeefcd64fe6a7a990c4028b10e3a
fstrm-0.6.1-3.el9.x86_64.rpm
631c5c264a5d22eb4be9d03afe491f5534d8af9176a03806772f047e6fd53eab
RLBA-2022:2823
new packages: ftp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ftp-0.17-89.el9.x86_64.rpm
38fd7d19e35afc0890b093d9a0cec1e823743140edd86929e8d4adc425c3e90d
RLBA-2022:2824
new packages: fxload
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fxload.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fxload-2008_10_13-21.el9.x86_64.rpm
ee0b3e24f82e608d604ae92106ffb6a3129a9bc2021b97655639f3f97752b0d5
RLBA-2022:2825
new packages: gc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gc-8.0.4-7.el9.i686.rpm
b801d760125d4a65dd69c00840825bbdf49436924772f5846129f7c8984176ff
gc-8.0.4-7.el9.x86_64.rpm
d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d
RLBA-2022:2826
new packages: gcr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcr-3.40.0-3.el9.i686.rpm
7c49d62269121f860049e503a033709bdfcd3ce85fdeb69a7e700c8fda07b8b6
gcr-3.40.0-3.el9.x86_64.rpm
315df43169c7b5a97b097179cc8cafe0e02ce36ac5befeb1aa34735f81f646b0
gcr-base-3.40.0-3.el9.i686.rpm
be9a856938a88a9ed05ab6e8dc4115a9e26113ec8219cb9857eb50b0293d577c
gcr-base-3.40.0-3.el9.x86_64.rpm
a180e148356b8477746c7dac1091e08b6b4067b9edf5e04b4238510cc8ed4a27
gcr-devel-3.40.0-3.el9.i686.rpm
b4c2b7dbb3e15dbc58e67cb3d9aa9abca8150c84e11e2ae6e98f8b55b2705cf5
gcr-devel-3.40.0-3.el9.x86_64.rpm
69d17212f6fe401d0433562609c45226989ce6b4a2dbd056badc0ce4bdc6f3ae
RLBA-2022:2827
new packages: gd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gd-2.3.2-3.el9.i686.rpm
d99035f196badf515afd15fcb314b758bb9407482ac83748a0bc2608b6bf62c1
gd-2.3.2-3.el9.x86_64.rpm
9291c9f9c183e58b48d25bfeb4d6bc19f281fc53ceb0a99ebb7044a925fd8b0d
gd-devel-2.3.2-3.el9.i686.rpm
7fb6d68e7f7abf24e84b129d39f2b9ba682ccef5980bf22d5ffd24f2626e81b3
gd-devel-2.3.2-3.el9.x86_64.rpm
a6d1645f145aeba8dab2fd1c8fd279aad0c3947ac0d3812aa70f109f0ead22af
RLBA-2022:2828
new packages: gdk-pixbuf2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdk-pixbuf2-2.42.6-2.el9.i686.rpm
1f821cf3440c3dbd0921eaaf1d78600884768b143c19799cccc9d08f66c12fa9
gdk-pixbuf2-2.42.6-2.el9.x86_64.rpm
c49e2787cb1125c68ada0d454294b784eafcc7f0c5f2bde350a8aa5e4c06fff7
gdk-pixbuf2-devel-2.42.6-2.el9.i686.rpm
a8c89b82c1b36f1d4e916057c7d48ba6d0d4897f63e6de1d56dd4f055a2284fd
gdk-pixbuf2-devel-2.42.6-2.el9.x86_64.rpm
9175e8153149bc62821444f8b4238668f7dce9336663a05c52366ed0295845f5
gdk-pixbuf2-modules-2.42.6-2.el9.i686.rpm
8b7b6c33ff5d89e6d640955ff597615ec46c0bec82a2ab4d2977a2a812ee5c31
gdk-pixbuf2-modules-2.42.6-2.el9.x86_64.rpm
708eeff086a38b98320d9e64a58d4f66514d38c504e59b52a12640ed5e3f2b71
RLBA-2022:2829
new packages: gedit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gedit-40.0-6.el9.x86_64.rpm
46e14906bb99cf95c07a93190ab35c29ec61a4d88b5b6fd9df71bb2a11a26aaf
RLBA-2022:2830
new packages: gedit-plugins
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gedit-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gedit-plugin-bookmarks-40.1-2.el9.x86_64.rpm
2a04de639aa9d9ab01e30380db89d744c22ead784eb50cdbba897121e7f90b2b
gedit-plugin-bracketcompletion-40.1-2.el9.x86_64.rpm
b1ef2f9d30a594e0dcfa144d767e4819630c23326b9bd9580f9750fb3d7a86a0
gedit-plugin-codecomment-40.1-2.el9.x86_64.rpm
54db8f81d99f6f5fea6554e3b3b944b0c6649df384c8e3346758c037744ed9b8
gedit-plugin-colorpicker-40.1-2.el9.x86_64.rpm
0633b0d18c7754e0a552f65e26dd92ccf1b1f34fb9f65ddaf28f8478b90b0c42
gedit-plugin-colorschemer-40.1-2.el9.x86_64.rpm
03898007e64bdbf725f1893fb7c17670f0e72fb84340917249ddd54de1e0b697
gedit-plugin-commander-40.1-2.el9.x86_64.rpm
bdebc34f6300fca4404aff1171cb4ae18ff6ce263490621f2ee7f85328e31119
gedit-plugin-drawspaces-40.1-2.el9.x86_64.rpm
de9028c4a6743c8e74ae8a6cbd01863c7b431802f093100f806d54d8632141ce
gedit-plugin-findinfiles-40.1-2.el9.x86_64.rpm
04780acaed8cb8557f92e30645f280dea734958cb0f14c905edfbea15410f400
gedit-plugin-joinlines-40.1-2.el9.x86_64.rpm
a5b1c1cc32f67d34e51491e7d4e272476926804e180977cb56ccc20662bd7e3f
gedit-plugin-multiedit-40.1-2.el9.x86_64.rpm
7f0a5a49587932c2a636e46bb9a6a7927636a51cf4a852f5cf3647cfe1393a9d
gedit-plugins-40.1-2.el9.x86_64.rpm
d6351d3d71a3ee599d2f0459a1bf9473de5edf292ff71cf26783c0ff6b4b7776
gedit-plugins-data-40.1-2.el9.x86_64.rpm
3bc616a477efa7d2edfca86d4d9b34344cec94d382fcd0fdd195fe21602568ed
gedit-plugin-sessionsaver-40.1-2.el9.x86_64.rpm
dcb46c0d2e947ffdc982409ec0fe666cd0cd12c3a1dc0157a2268cc9ea14974b
gedit-plugin-smartspaces-40.1-2.el9.x86_64.rpm
fb5f463c01ee046cf266d683cecaf947889938a8672f3ee28a56be21f49693c7
gedit-plugin-synctex-40.1-2.el9.x86_64.rpm
6995bc8005f398221e5c31021523a312362ff6cf4984eb59398e4b9282357b2d
gedit-plugin-terminal-40.1-2.el9.x86_64.rpm
e09d8268880f3ae823adcb6dde982dd9ac94c17b441cea3d38803882206b855d
gedit-plugin-textsize-40.1-2.el9.x86_64.rpm
dd3082a04e8a87051b02a1e59168a98703dcb60f186ff114ea2fccebb94d5f7b
gedit-plugin-translate-40.1-2.el9.x86_64.rpm
c3e77e4bf5ba8484f387fdbe90738d7efb60c45e946f4f3457b18c38334e9a15
gedit-plugin-wordcompletion-40.1-2.el9.x86_64.rpm
8a736a19b456318aa331fc0b7f161e31dcd52647c19dfb272d74fbc76be64cc0
RLBA-2022:2832
new packages: geolite2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for geolite2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
geolite2-city-20191217-6.el9.noarch.rpm
ad26fa3b94cdf6332f303f3456ef46aa133c020a528cee6642850411e0695f34
geolite2-country-20191217-6.el9.noarch.rpm
624b1f89debfa315a6141c861aca66bb3b4df44034b75be0b2a4b31e89ec3e2b
RLBA-2022:2831
new packages: geocode-glib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for geocode-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
geocode-glib-3.26.2-5.el9.i686.rpm
5b902cd41e3ce44ba4997a633980a794cc75dcf0e66d86f5ad32a82fd5a31100
geocode-glib-3.26.2-5.el9.x86_64.rpm
7231dcb73cadb06a7aa057b9274d9b2343edea98444a1f96e6ce13bc2c884b23
geocode-glib-devel-3.26.2-5.el9.i686.rpm
ad29a1c1507e7e401871d2f70465042196a502d067fc3f0ff0ce028b835bfbb0
geocode-glib-devel-3.26.2-5.el9.x86_64.rpm
7d4723076498d340c5f36acd59f790a864dbc7be4cd1635f8e9ee45bc620e4f0
RLBA-2022:2833
new packages: ghc-srpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ghc-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ghc-srpm-macros-1.5.0-6.el9.noarch.rpm
b0a7d5bc94309feb1b4284e81d1905bcfa4ea1be6e4281e2ce4f2a81037bbdc5
RLBA-2022:2834
new packages: giflib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for giflib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
giflib-5.2.1-9.el9.i686.rpm
30254d1ef5dea01cecefb885d0ca1d594c75f3b5b95d3e2aa80282ca85638b59
giflib-5.2.1-9.el9.x86_64.rpm
2bf958b7910eec4acbbd05a50988ec73ab469f95b4ecb66fd94e6fcda5ce3050
RLBA-2022:2835
new packages: git
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
git-2.31.1-2.el9.2.x86_64.rpm
92e2638e66d5251fb60041118ddef480cad39cf8a63c2cd74c6178f855b70793
git-all-2.31.1-2.el9.2.noarch.rpm
d72122ad692b5aa2e211fd4f967963a090705c0b2aa732e62f258d59a83a29d5
git-core-2.31.1-2.el9.2.x86_64.rpm
f0cf85dc06e6a011d1260a49eb0413186a21b10eb3994d0d6f7be1557ec03d3a
git-core-doc-2.31.1-2.el9.2.noarch.rpm
00661514e7725bf4c3aa4f6eb9320afa68fc0f5b6696b9aa2c91c71f350098bf
git-credential-libsecret-2.31.1-2.el9.2.x86_64.rpm
44ad06011dae10d2d0a9bdd499925bde235c8f747e3815709f6a28caa0dd5067
git-daemon-2.31.1-2.el9.2.x86_64.rpm
2f9182b76717a630d914080e34cbcfa636b66e926500500f869c6550381ed1dd
git-email-2.31.1-2.el9.2.noarch.rpm
bd4b553254ee70914e3503d32af1fb6d5f9787fb8142092e02b415c152b1fdd0
git-gui-2.31.1-2.el9.2.noarch.rpm
2c5741b7bb2abfb1f70b0b4c6917af6ff128dfb4a0c06aaec63e1a512dcb5cb7
git-instaweb-2.31.1-2.el9.2.noarch.rpm
890c167d4cb6f097094e709bbc20c78a0feb5da712cdbd059a4ed4d99dd01b95
gitk-2.31.1-2.el9.2.noarch.rpm
f92063b5fa6b5af42aee0aff0546f1d6ecffe07447855c62b5e15b43295bd920
git-subtree-2.31.1-2.el9.2.x86_64.rpm
758b315dc0ee1f620d5aa26a018ee64fa8a008989424fe80a953fe10ae0c7e41
git-svn-2.31.1-2.el9.2.noarch.rpm
09d939d6c20a4125e3c58b57ef501f30592b50957adbc4cc4d17d1db92393f4e
gitweb-2.31.1-2.el9.2.noarch.rpm
6a3afef85437a58ecaaca470c69de3641c40318b175dd612ebc2b210493e3268
perl-Git-2.31.1-2.el9.2.noarch.rpm
29bea815d1845882343874a2772945877209a4f17634f5dfc3723872f9dcf57b
perl-Git-SVN-2.31.1-2.el9.2.noarch.rpm
dbe6a04aec1b67299448716cc566ac8f66f513415991b1411649bce667b0b3a1
RLBA-2022:2836
new packages: git-lfs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-2.13.3-5.el9_0.x86_64.rpm
63cf1802904a33fc7648d6348b4ad13b16f614bf07bbca937c524c9204928ba0
RLBA-2022:2837
new packages: gl-manpages
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gl-manpages.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gl-manpages-1.1-24.20190306.el9.noarch.rpm
734c22cba6a7c4701be92a9be1ace7ae88ce884359e4a92b7b67973a9ad9165b
RLBA-2022:2838
new packages: glade
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glade.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glade-3.38.2-4.el9.x86_64.rpm
d655d360c8f7d84ca894f9412edc66bec57589abb33cf758ffccc004db66dd9d
glade-libs-3.38.2-4.el9.i686.rpm
5e51150a7b3f44789f5bfe69596427461f86dfe540bb8a865f09e96c1ab1e741
glade-libs-3.38.2-4.el9.x86_64.rpm
e5dc8b4c72d7f5bd9b4f3fa43285e227748a8257d08191eb7ea17e5869e1ed81
RLBA-2022:2839
new packages: glibmm24
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibmm24.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glibmm24-2.66.1-1.el9.i686.rpm
76904f186a31bc1f18d0506c9b92c752b62668edc885f95807dd00485f06fc79
glibmm24-2.66.1-1.el9.x86_64.rpm
a9c054a0e3ef1f92748658b37f9d31f8681aa0462d39606fda704eacbec262e4
RLBA-2022:2840
new packages: glusterfs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glusterfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glusterfs-6.0-57.4.el9.x86_64.rpm
fb1aa921fa0e5cb8f2f0b8a74c7eb6d7ff2b7fd2397009acc77dc23a63b07a90
glusterfs-api-6.0-57.4.el9.x86_64.rpm
d29b493ad331af375925be7c5c2985b0244d7e0f6247359254344bf2b86010b6
glusterfs-cli-6.0-57.4.el9.x86_64.rpm
19c92fc959ebc32bc35ada0cfdfc171959955641f95ea415c29e922225e6051f
glusterfs-client-xlators-6.0-57.4.el9.x86_64.rpm
f1b289cf13a9e52182eb6df4b4ea5c565a768645175a0dc4e13c043629cfe8ee
glusterfs-cloudsync-plugins-6.0-57.4.el9.x86_64.rpm
11d1929b17484a7d11d80648baf2dd0bf4d8bfd299359a3126e430c755640ea0
glusterfs-fuse-6.0-57.4.el9.x86_64.rpm
3103c9a8f3c2e3e258a029afbb561770dd3c30b1479f9a02a7c7027620ce4e77
glusterfs-libs-6.0-57.4.el9.x86_64.rpm
28763675d65a9edee8eee41023b658e2c1fdecf7858960710113b9ba5ad8c46f
glusterfs-rdma-6.0-57.4.el9.x86_64.rpm
af2fb2b1f58b0d43f38088af1c355b474accb52843ba4c84a0366a3500c41473
python3-gluster-6.0-57.4.el9.x86_64.rpm
2fe0c4617ea091c03b77b987069c59a293ba2b30686bc1b0cfc7daefd9a6568d
RLBA-2022:2841
new packages: gnome-backgrounds
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-backgrounds.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-backgrounds-40.1-2.el9.noarch.rpm
8672bb678675c011a1746bfc0e30380728139e0d813ad33ba9c11f9b81bde6e5
gnome-backgrounds-extras-40.1-2.el9.noarch.rpm
f3f95fdde45e61ac2fbf5d87f50c1eb9ed33a91f8661934a816205a178ef4800
RLBA-2022:2842
new packages: gnome-bluetooth
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-bluetooth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-bluetooth-3.34.5-3.el9.x86_64.rpm
32d9d9d8416830e1c782dc2ab237780b52bcda1f7cbaed13546340850c24b702
gnome-bluetooth-libs-3.34.5-3.el9.i686.rpm
51aa8f36c36d0f35636c2aba605987cec0afb891213c0bf8db3ae835d23bc7b4
gnome-bluetooth-libs-3.34.5-3.el9.x86_64.rpm
e2664fed2264e854636b55fc54e8cfdc35f4573c9f191451fd6e0101bc6f7e2a
RLBA-2022:2843
new packages: gnome-calculator
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-calculator.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-calculator-40.1-2.el9.i686.rpm
8c696235a147866563bd307e5803928bb752724655d0d8c0b69079f26af12eaa
gnome-calculator-40.1-2.el9.x86_64.rpm
2c7b1bef8ffa7fb33ee9026c1894aece7fc1705723289a2133166f09943153e1
RLBA-2022:2844
new packages: gnome-characters
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-characters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-characters-40.0-3.el9.x86_64.rpm
a6a8afd02be61f99489628b6262d1fd381ba27abf20a461a16f0fe645c832f97
RLBA-2022:2845
new packages: gnome-color-manager
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-color-manager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-color-manager-3.36.0-7.el9.x86_64.rpm
4f9712c2835f961a880d82b1f2da229f87c838eb56e772194714ca39dd317617
RLBA-2022:2846
new packages: gnome-common
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-common-3.18.0-13.el9.noarch.rpm
344cd16a517f8780b7e2417fbe74f28f037bd2ce75907f943a295e07c5b77af6
RLBA-2022:2847
new packages: gnome-desktop3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-desktop3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-desktop3-40.4-1.el9.i686.rpm
64e027523c9c72ea4788670f2b078b7cb976bae845dd225ce407a2262fa8bc9d
gnome-desktop3-40.4-1.el9.x86_64.rpm
7f3906f5643216d14633968c60319bdb9aa99523a2595aaa8666b6255756790c
gnome-desktop3-devel-40.4-1.el9.i686.rpm
45ede6bbebc009359f1646df24bd7636ee325b2d7e28a0c71e123cfa248665bb
gnome-desktop3-devel-40.4-1.el9.x86_64.rpm
e56202fd8215e18e13fae1e82fdd4ca0230e8e35f07ffd20717b93a3c1c8c6bf
RLBA-2022:2848
new packages: gnome-devel-docs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-devel-docs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-devel-docs-40.3-2.el9.noarch.rpm
513028d6269f94524e57076af20c25adeb907e5f269999022cddac870263ba45
RLBA-2022:2849
new packages: gnome-disk-utility
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-disk-utility.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-disk-utility-40.2-2.el9.x86_64.rpm
8fd3621d0f10f47818f0c246ade4131a3a928d31236c2695abc951be1a09b87b
RLBA-2022:2850
new packages: gnome-extensions-app
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-extensions-app.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-extensions-app-40.0-3.el9.x86_64.rpm
4b59d569c2d49d906055526a5eca0c0cac250ce1658435d135085256839675be
RLBA-2022:2851
new packages: gnome-font-viewer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-font-viewer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-font-viewer-40.0-3.el9.x86_64.rpm
85d0f1e2e677d2eda076cbbf439e9a96eeb445c9cb4740eeeaca8dac9cce2438
RLBA-2022:2853
new packages: gnome-keyring
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-keyring.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-keyring-40.0-3.el9.x86_64.rpm
9d0f45f353391acca405b382844e5cb5bf296a3012f893da5eae12b7590664af
gnome-keyring-pam-40.0-3.el9.x86_64.rpm
00933fa1c62c7dd9bb840ffb45fc952366bf2ff6e2f86b3f7295e34b3f2d3e1a
RLBA-2022:2855
new packages: gnome-logs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-logs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-logs-3.36.0-6.el9.x86_64.rpm
688fe03b5fb957f9f5ea67b848cfcab2c63534d96a6b47f776df8c609ed320e5
RLBA-2022:2857
new packages: gnome-online-accounts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-online-accounts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-online-accounts-3.40.0-2.el9.i686.rpm
33b9bf8ef37add4b3bf9944bd20a70c57d9f57b3d819370a6b8b82ef50352b7b
gnome-online-accounts-3.40.0-2.el9.x86_64.rpm
964dcbe239ef892246568ca063ef610a88fb2c9b386d604810d79af1aaa7fca3
gnome-online-accounts-devel-3.40.0-2.el9.i686.rpm
6ea4d506ffa66474522091cf9f72f8d74e1b02d184ab686aeadfb105ff0ba1d7
gnome-online-accounts-devel-3.40.0-2.el9.x86_64.rpm
4141e75f821415d728058027f3e13cb6997ea4e33b3a18c34ce43e875de693de
RLBA-2022:2858
new packages: gnome-photos
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-photos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-photos-40.0-4.el9.x86_64.rpm
5a9c0d1dbb22f8a6941c62009ca5db066bcdd02452e17d0dc9d9b5d605d3f93a
gnome-photos-tests-40.0-4.el9.x86_64.rpm
e4b7f28c062cce283fe353ae0a5e17dd737bf0ba7ea761edea8a5a7052fa93eb
RLBA-2022:2861
new packages: gnome-themes-extra
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-themes-extra.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adwaita-gtk2-theme-3.28-14.el9.i686.rpm
4bdd952c99fc450ecb8b81d814f38a43f7733ac18b789fc3145debf6a6f6aa26
adwaita-gtk2-theme-3.28-14.el9.x86_64.rpm
3e5a07db4d49ad384dfc66751676c6e612012f276be54fc63d65f0cb6068b74b
gnome-themes-extra-3.28-14.el9.x86_64.rpm
6b59aee877850f99ca99b2d9ce93d47cc814507b4be54fcb66fac235c7717f56
highcontrast-icon-theme-3.28-14.el9.noarch.rpm
7b64e07c748d2121bca76d1e8a0ceab5b166e88e56a285a4efc52ff062424fbb
RLBA-2022:2863
new packages: gnome-user-docs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-user-docs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-user-docs-40.0-3.el9.noarch.rpm
45e2806211f0c60ebd20d6f0a27b57b2b6f018ba2ce80793d59f2f017b9e68f9
RLBA-2022:2864
new packages: gnome-video-effects
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-video-effects.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-video-effects-0.5.0-7.el9.noarch.rpm
e7c3ac2ff0e8f39233961bc7799cb614677c68b88e3e63503a505cbdd5b28801
RLBA-2022:2865
new packages: gnu-efi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnu-efi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnu-efi-3.0.11-8.el9.x86_64.rpm
77562b902143902037054582b389e011a6ca588d2d0c338c8f48a8b57d41f10b
RLBA-2022:2866
new packages: gom
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gom-0.4-6.el9.i686.rpm
cf13deb56e11566ffe1c2a888eacd410a7aedb0f4db8130cfd6e922e0a825a1a
gom-0.4-6.el9.x86_64.rpm
c21b08763cfd46987d2754bcd21ac91fa63b80d25ca03dfbed00a01a25827910
RLBA-2022:2867
new packages: google-carlito-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-carlito-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm
e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4
RLBA-2022:2868
new packages: google-guice
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-guice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-guice-4.2.3-8.el9.noarch.rpm
227b36966c2d5f5bb32099845b30eaf4d7efbe1e6c0c7646447b09e911de9f78
RLBA-2022:2869
new packages: google-noto-cjk-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-cjk-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-noto-cjk-fonts-common-20201206-4.el9.noarch.rpm
77e6ccf7598f49e26fad88fe958204f63afb68747bb8a8268ef5ebe7433eb463
google-noto-sans-cjk-ttc-fonts-20201206-4.el9.noarch.rpm
5684559192ca1ce0c04c74f24bea09734b634370ccc16205f6cdb24adf5b3caf
google-noto-serif-cjk-ttc-fonts-20201206-4.el9.noarch.rpm
be6aa71a448e9074af2651ab4e8ab890a6d3d623c49b9477e17fbf03f7591850
RLBA-2022:2870
new packages: google-noto-emoji-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-emoji-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-noto-emoji-color-fonts-20200916-4.el9.noarch.rpm
2037b162cb3560d93289fa41d45af22afc6370183def183fd1932a433ac14625
google-noto-emoji-fonts-20200916-4.el9.noarch.rpm
8e65582822fcd3933a3dd3d1b476ac44edab76d0823bd45fdafc95bc531a9cbe
RLBA-2022:2872
new packages: google-roboto-slab-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-roboto-slab-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-roboto-slab-fonts-1.100263-0.17.20150923git.el9.noarch.rpm
bb4bc3df4180d3bfec185477da05294a9de19ef9b800cabd7ed5cb74fc5d0d77
RLBA-2022:2873
new packages: gperf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gperf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gperf-3.1-13.el9.x86_64.rpm
40769b94f00249f6bf833e5b054365ca9fed848ec92d7fed0c34df5572846692
RLBA-2022:2874
new packages: gpm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gpm-1.20.7-29.el9.x86_64.rpm
bf3321babffdc82846b674dba6d17604ae5976a3c61e0d384402f77f8daa11d1
gpm-devel-1.20.7-29.el9.i686.rpm
a9d8cd849c41b73f303a377e1b0e08f137e0622577e7f27af25fb067a45ea643
gpm-devel-1.20.7-29.el9.x86_64.rpm
de3e7ff8bcfe4c443b71f2c0e276ac72ecdd714b782d7e009348ecb75658bb2e
gpm-libs-1.20.7-29.el9.i686.rpm
0f8768e74d33b13935940e8f193af6aa8bab1be739f1f863df3903f85ba6fcfa
gpm-libs-1.20.7-29.el9.x86_64.rpm
d3d16ddd48bf55f086e6c324d67bc2fb4e9bdae14fddb56840ae53487c920ecb
RLBA-2022:2875
new packages: graphene
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for graphene.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
graphene-1.10.6-2.el9.i686.rpm
fccb8a52929bfef3d48cc190a4a74d7e14052d978ed2860f3c856c1719eee53a
graphene-1.10.6-2.el9.x86_64.rpm
fd99d16e7fb06b79d6d3adbe5a656e44112b37aa478a6151a23f0a3e2aa4fc63
graphene-devel-1.10.6-2.el9.i686.rpm
960c3c9bed2dc3aa8a823cfcff0b24d32b6ecd644b82bc6f6a498087249dda62
graphene-devel-1.10.6-2.el9.x86_64.rpm
570fbe9263e2fef3e94965e3b0e2c53b4a069b5eb9c25d00d43e17b0c9608112
RLBA-2022:2876
new packages: grilo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for grilo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
grilo-0.3.13-7.el9.i686.rpm
7ec02e80f4e7de0bdc9b19f692402aa9b4a1f53a0d9e7b16529c34352d28d139
grilo-0.3.13-7.el9.x86_64.rpm
d4babfac25650071f258a4c6203e50ac33cbfe494356599f929c0b1f62183527
RLBA-2022:2877
new packages: grilo-plugins
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for grilo-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
grilo-plugins-0.3.13-6.el9.x86_64.rpm
d18586f8604435a5d407ee8644cbd248a20e1eeb2af2f70990e634ba1492dfe0
RLBA-2022:2878
new packages: gsm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gsm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gsm-1.0.19-6.el9.i686.rpm
ba0398d8afdc072c359bd393dd945eadf26d0e12a4093984c924b0e147c7cd32
gsm-1.0.19-6.el9.x86_64.rpm
a5ff96d8d96d8fb89d6febcff7b0615448984be8d2fa18960a7d05351aea69b7
RLBA-2022:2879
new packages: gsound
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gsound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gsound-1.0.2-15.el9.i686.rpm
4144c3311786ad3f883104fd9fe0eef552e6332a6b0a2e5591070d2cd2d3a927
gsound-1.0.2-15.el9.x86_64.rpm
f7e0df19cccfb6c735fba8155ae84494d4415956fc4d4685e1b3f84862a08b85
RLBA-2022:2880
new packages: gspell
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gspell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gspell-1.9.1-3.el9.i686.rpm
2912bd96e0bc2f9afaca635a046b241ea43255eac2f2342176266b79406e3373
gspell-1.9.1-3.el9.x86_64.rpm
c1a520e082ae470c3134508db102a390f5ffd09105ca56bc944d82b4c1cf4cbe
RLBA-2022:2881
new packages: gstreamer1
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-1.18.4-4.el9.i686.rpm
8712974a333df308cc1ff8b86cbbc17c0c9c7d16fbdefdd2d8daf285ce7ff084
gstreamer1-1.18.4-4.el9.x86_64.rpm
1f42c80d0c92269ab5d21f36bf4929067ffa160e601bf8338dcc4cf9676704f5
gstreamer1-devel-1.18.4-4.el9.i686.rpm
dc7ca6cce3528a206d2d3c61213a8266c51ccb345102f14aafe80d8e4f69ba03
gstreamer1-devel-1.18.4-4.el9.x86_64.rpm
09542d576034247bc7dfa2c35c594dc252191c0c743c80a86ab710ce8e4c6679
RLBA-2022:2882
new packages: gstreamer1-plugins-bad-free
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-bad-free-1.18.4-5.el9.i686.rpm
85265e248cbc46f1a417b19608d070396598de4c7b196a7e43466a2c6e66b75a
gstreamer1-plugins-bad-free-1.18.4-5.el9.x86_64.rpm
9e9563da7d22b5944b83e33ca46352b7904a900fd6b94401ba5118d4b2e41823
RLBA-2022:2883
new packages: gstreamer1-plugins-good
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-good-1.18.4-5.el9.i686.rpm
dc3c2e83c583937a399043bbb255ae3f8b9a1b15a2eac6be16d99c04ce4b34a0
gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm
ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1
gstreamer1-plugins-good-gtk-1.18.4-5.el9.i686.rpm
2c4039d6d99f9cf631fbec97f0a0b02cfcc4a90e17755f40c8926eb0af0e42bb
gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm
1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13
RLBA-2022:2884
new packages: gstreamer1-plugins-ugly-free
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gstreamer1-plugins-ugly-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-ugly-free-1.18.4-3.el9.i686.rpm
02caa0fe5a4f3e05892c14a25f817588e34bf57fe90c38f46b6c347685f9c8b9
gstreamer1-plugins-ugly-free-1.18.4-3.el9.x86_64.rpm
9c2424fa970f3f8784edf6be058a403d75d5e74d02e949cc09edcb275308357d
RLBA-2022:2885
new packages: gtkmm30
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtkmm30.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtkmm30-3.24.5-1.el9.i686.rpm
09cbe824cc75e411f24988e64c62afcf6c8ae1500a7136cc2dac7bb3a449ecb5
gtkmm30-3.24.5-1.el9.x86_64.rpm
2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a
RLBA-2022:2886
new packages: gtksourceview4
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtksourceview4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtksourceview4-4.8.1-3.el9.i686.rpm
37e80b2c99ebd7fe2aecfde032d4a46c43f156dce88e63d1773ea6efc2d1dce7
gtksourceview4-4.8.1-3.el9.x86_64.rpm
d08ef82031b8dfa8a8d047e20656819c1964188b515a117d2c76ee64309cd907
RLBA-2022:2887
new packages: guava
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for guava.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
guava-30.1-5.el9.noarch.rpm
219085b48874b4ec87431af3388cb61a9ca40dd6eab82e590b37d8b91d37c285
RLBA-2022:2888
new packages: gubbi-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gubbi-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gubbi-fonts-1.3-10.el9.noarch.rpm
c432bf9494b195068ef28895a4431576f845e00ba3770587485029956baeda6c
RLBA-2022:2889
new packages: gutenprint
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gutenprint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gutenprint-5.3.4-4.el9.x86_64.rpm
611eeca70013ecb228a977149085bb999181ea93b2445612c90aef2bcc9d3a10
gutenprint-cups-5.3.4-4.el9.x86_64.rpm
4951b4e992fd3fe0fdb18d64d317e2fa5e83e0efe65f7a6431b8374dc155afdf
gutenprint-doc-5.3.4-4.el9.x86_64.rpm
00224971ff625563c8a21fc869de88774dc0c46efa42cf37d1ec70861d31495d
gutenprint-libs-5.3.4-4.el9.i686.rpm
5bbc90a938c8de875ba924f3f3bd59534ce8f5edb6e9c09987c369ad5f2bba9f
gutenprint-libs-5.3.4-4.el9.x86_64.rpm
3edd40f0b32147da05c1f751a170090eb98cfe26b6dec9085287cdfae33eee02
RLBA-2022:2891
new packages: hamcrest
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hamcrest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hamcrest-2.2-7.el9.noarch.rpm
df9f44dcf80056602fc9555da3d4b098ab33e407a36901f472e89f9f4a34b2c5
RLBA-2022:2892
new packages: hesiod
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hesiod.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
compat-hesiod-3.2.1-16.el9.i686.rpm
34c435d77f4dd01cfa849b4df2805a4ada1074ca0bedb63df55d3609e9d47788
compat-hesiod-3.2.1-16.el9.x86_64.rpm
683c784ebb749a027c494cb306c0660bbc6cbee997e4e7d8da9d3a94684bb1b0
RLBA-2022:2895
new packages: highlight
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for highlight.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
highlight-3.60-5.el9.x86_64.rpm
7674e2f36faaf9eb1b419f54e0303f6fc77b59db75c1c08c95d35309fa8a5b7c
RLBA-2022:2896
new packages: hplip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hplip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hplip-3.21.2-6.el9.x86_64.rpm
43a2f679f0b7f451f29a6aedde5696de76c6af8d9af7fb47ea9022dc1339f6ce
hplip-common-3.21.2-6.el9.i686.rpm
27294a5c93522dde8cf449435403520715816edfd6e184f6cfadffc3781475a8
hplip-common-3.21.2-6.el9.x86_64.rpm
578a3344565e32295f03a7ea6eebe4681f68ab7216272101f9c6d6c374cf5325
hplip-libs-3.21.2-6.el9.i686.rpm
c38ee2756b67a4d24d42bf34fe0c15b2200c03c73d91f68b12c382e7f5ef4e88
hplip-libs-3.21.2-6.el9.x86_64.rpm
344713541c4f54f365548056b02bb5e53848844c51c8350267fc4b3df1fbe28a
libsane-hpaio-3.21.2-6.el9.i686.rpm
abb7d9f5c0cdbf7512e6b8f24a978da0d6212587ef19aae834248dfd2fe0c316
libsane-hpaio-3.21.2-6.el9.x86_64.rpm
9603711e8af3d97528dc3aa12db4105eaf289deac4bdf25db651f72a0bdce692
RLBA-2022:2897
new packages: hspell
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hspell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-he-1.4-15.el9.x86_64.rpm
8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45
RLBA-2022:2899
new packages: http-parser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for http-parser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
http-parser-2.9.4-6.el9.i686.rpm
65b4f6a663f4fd7392477fe6f2629a715a9a85e90852c878fa46fac418d06c6a
http-parser-2.9.4-6.el9.x86_64.rpm
e77cbe1ec76e3aaf209b9cffd6372fd02db1efebd94d344b5509b77ba5b21d8a
RLBA-2022:2900
new packages: httpcomponents-client
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpcomponents-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
httpcomponents-client-4.5.13-2.el9.noarch.rpm
aa9bd4932146ffdcce0042433570a1a9308419488f43d8ec12040cb1110ff7a8
RLBA-2022:2901
new packages: httpcomponents-core
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpcomponents-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
httpcomponents-core-4.4.13-6.el9.noarch.rpm
6a5be7b8a5732e3a9da091b4be0ee6cc6de95d3129df00643c9c7204bf63b111
RLBA-2022:2902
new packages: hunspell
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-1.7.0-11.el9.i686.rpm
4be5731128ad451d513d88067ed271f8a7b2e6b3cd654356a700d01586442ddf
hunspell-1.7.0-11.el9.x86_64.rpm
192d276b99a211ac8a32d11cdd38fae940ba7cce7cd4552ac4a3471dfb7941c8
hunspell-devel-1.7.0-11.el9.i686.rpm
c06037767a8dee8ac3a82a21a413ea240eb5d4fa930ad3b19803df37d7c3113d
hunspell-devel-1.7.0-11.el9.x86_64.rpm
2f5a70da8d774c2e867692584703ae338593f78046365a2980177f3a9c2338dc
hunspell-filesystem-1.7.0-11.el9.x86_64.rpm
dbe33c0b7e160306d3b0fa6e6c8e1c7e1b58ed655541a5f673a51b83fe54f710
RLBA-2022:2903
new packages: hunspell-af
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-af.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-af-0.20080825-24.el9.noarch.rpm
af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c
RLBA-2022:2904
new packages: hunspell-ak
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ak-0.9.1-10.el9.noarch.rpm
57ee4c195da06e23defcabc0b0bf07c672527b8e39682a25e96274d779996d85
RLBA-2022:2905
new packages: hunspell-am
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-am.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-am-0.20090704-22.el9.noarch.rpm
7767f5e28e51f6008303819daaa4c4e13f576caa25f37e0697864154fe99e682
RLBA-2022:2906
new packages: hunspell-ar
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ar.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ar-3.5-15.el9.noarch.rpm
c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0
RLBA-2022:2907
new packages: hunspell-as
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-as.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-as-1.0.3-25.el9.noarch.rpm
72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48
RLBA-2022:2909
new packages: hunspell-az
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-az.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-az-0.20040827-26.el9.noarch.rpm
b71b00abd18e20134a39cd511571e4b0a2b0f7a97742f064d454354349086716
RLBA-2022:2908
new packages: hunspell-ast
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ast.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ast-2.0-7.el9.noarch.rpm
5b4419c03a50591cfed5f9c02c81ece564649d20a58d99abacd804c0fa83881d
RLBA-2022:2910
new packages: hunspell-be
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-be.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-be-1.1-23.el9.noarch.rpm
8d0061e0a50c475297b5e5b2d32617eed40116c3242ca9957b250278039342b3
hyphen-be-1.1-23.el9.noarch.rpm
66eb397cbb264b99a5f69f7eed9a1f09a22c571da616330ffff3969ea7b9b895
RLBA-2022:2911
new packages: hunspell-ber
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ber.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ber-0.20080210-23.el9.noarch.rpm
84992758cbc66349ef2feb283be4d725eafc4a39d7a68d90fc23abee7748baf6
RLBA-2022:2912
new packages: hunspell-bg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-bg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-bg-4.3-22.el9.noarch.rpm
3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793
RLBA-2022:2913
new packages: hunspell-bn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-bn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-bn-1.0.0-17.el9.noarch.rpm
7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e
RLBA-2022:2915
new packages: hunspell-ca
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ca.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ca-2.3-19.el9.noarch.rpm
98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d
RLBA-2022:2914
new packages: hunspell-br
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-br.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-br-0.15-9.el9.noarch.rpm
ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3
RLBA-2022:2916
new packages: hunspell-cop
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-cop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-cop-0.3-21.el9.noarch.rpm
b5365fb78d385167fcc261b408bb36f1ed06906339910907274eea9c84777f88
RLBA-2022:2917
new packages: hunspell-csb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-csb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-csb-0.20050311-25.el9.noarch.rpm
9759bc89de0385d48fc2254d5ae24ce303c30416ab497ff58c36da76271991e1
RLBA-2022:2918
new packages: hunspell-cv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-cv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-cv-1.06-9.el9.noarch.rpm
68db95b419ef15007b38771ebb2d44b1955405ff6fb6aa582a80fd67f97685ee
RLBA-2022:2919
new packages: hunspell-cy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-cy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-cy-0.20040425-26.el9.noarch.rpm
6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469
RLBA-2022:2920
new packages: hunspell-da
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-da.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-da-1.7.42-17.el9.noarch.rpm
396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d
RLBA-2022:2921
new packages: hunspell-de
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-de.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-de-0.20161207-9.el9.noarch.rpm
3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495
RLBA-2022:2922
new packages: hunspell-dsb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-dsb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-dsb-1.4.8-9.el9.noarch.rpm
12f43ea8f41447db9595956817c26c09abce0807358445e5bd617ac807ee5226
RLBA-2022:2923
new packages: hunspell-el
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-el.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-el-0.9-9.el9.noarch.rpm
3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395
RLBA-2022:2924
new packages: hunspell-en
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-en.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-en-0.20140811.1-20.el9.noarch.rpm
2344e1c4e53457de1ea59abe7295363a65ebcc777f87f0e1b40408fdbadf1b99
hunspell-en-GB-0.20140811.1-20.el9.noarch.rpm
f5e9b7e2d2ddd82070bbaacf15a1c285249cd7fd7834545fbc067b4d14149a91
hunspell-en-US-0.20140811.1-20.el9.noarch.rpm
77b40af385edc4dcd9118c5d58e595a6dff5735c263c066bdb93f2cc21bc182d
RLBA-2022:2925
new packages: hunspell-eo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-eo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-eo-0.20100218-8.el9.noarch.rpm
a547315ecca1f52d4855880d0ca6edffbcf86989ea6267250ac2b1354fcc589c
RLBA-2022:2926
new packages: hunspell-es
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-es.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-es-2.3-10.el9.noarch.rpm
0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713
hunspell-es-AR-2.3-10.el9.noarch.rpm
257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2
hunspell-es-BO-2.3-10.el9.noarch.rpm
ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de
hunspell-es-CL-2.3-10.el9.noarch.rpm
715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb
hunspell-es-CO-2.3-10.el9.noarch.rpm
1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446
hunspell-es-CR-2.3-10.el9.noarch.rpm
1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4
hunspell-es-CU-2.3-10.el9.noarch.rpm
3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5
hunspell-es-DO-2.3-10.el9.noarch.rpm
8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310
hunspell-es-EC-2.3-10.el9.noarch.rpm
0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5
hunspell-es-ES-2.3-10.el9.noarch.rpm
0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4
hunspell-es-GT-2.3-10.el9.noarch.rpm
5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d
hunspell-es-HN-2.3-10.el9.noarch.rpm
c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81
hunspell-es-MX-2.3-10.el9.noarch.rpm
6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0
hunspell-es-NI-2.3-10.el9.noarch.rpm
76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6
hunspell-es-PA-2.3-10.el9.noarch.rpm
64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68
hunspell-es-PE-2.3-10.el9.noarch.rpm
1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c
hunspell-es-PR-2.3-10.el9.noarch.rpm
ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d
hunspell-es-PY-2.3-10.el9.noarch.rpm
b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0
hunspell-es-SV-2.3-10.el9.noarch.rpm
6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd
hunspell-es-US-2.3-10.el9.noarch.rpm
128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550
hunspell-es-UY-2.3-10.el9.noarch.rpm
a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73
hunspell-es-VE-2.3-10.el9.noarch.rpm
d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8
RLBA-2022:2927
new packages: hunspell-et
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-et.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-et-0.20030606-27.el9.noarch.rpm
801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90
hyphen-et-0.20030606-27.el9.noarch.rpm
4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab
RLBA-2022:2928
new packages: hunspell-eu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-eu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-eu-5.1-4.el9.noarch.rpm
537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38
RLBA-2022:2929
new packages: hunspell-fa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-fa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-fa-0.20070116-26.el9.noarch.rpm
4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c
RLBA-2022:2933
new packages: hunspell-fur
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-fur.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-fur-0.20050912-24.el9.noarch.rpm
2861dad40134e36a5171610672698daae5ed03d4fdf7e95e392b94896148a0c1
RLBA-2022:2930
new packages: hunspell-fj
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-fj.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-fj-1.2-23.el9.noarch.rpm
329dd11b662d286d35435095d3a5ef2eca7a5de06e0c4986cacf29c2018ef406
RLBA-2022:2931
new packages: hunspell-fo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-fo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-fo-0.4.2-16.el9.noarch.rpm
9a10a443dc3a7300312aaabfda7030755a406b8da3e17f8ddf7339eb05a9af5e
RLBA-2022:2932
new packages: hunspell-fr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-fr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-fr-6.2-9.el9.noarch.rpm
c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496
RLBA-2022:2934
new packages: hunspell-fy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-fy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-fy-3.0.0-10.el9.noarch.rpm
8910d36a64de74647b3db225432d8b12a6bcabbf9c1b466f0a64c95f77853577
RLBA-2022:2935
new packages: hunspell-ga
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ga.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ga-5.0-10.el9.noarch.rpm
5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73
RLBA-2022:2936
new packages: hunspell-gd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-gd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-gd-2.6-18.el9.noarch.rpm
cc1ef13aaddebf19ce008b66194308d814a569cc977c1cc665691d24e0fb7197
RLBA-2022:2937
new packages: hunspell-gl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-gl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-gl-0.20080515-24.el9.noarch.rpm
21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28
RLBA-2022:2938
new packages: hunspell-grc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-grc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-grc-2.1.5-24.el9.noarch.rpm
653603dc75aa09b2a5012f20dfbd5e176a90435ee5bea0c3e048130d9d6657ec
RLBA-2022:2939
new packages: hunspell-gu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-gu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-gu-1.0.0-17.el9.noarch.rpm
66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154
RLBA-2022:2940
new packages: hunspell-gv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-gv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-gv-0.20040505-25.el9.noarch.rpm
7b30fa2954f2740bed478ed50a8b599ab3875799add5d8ff8cdde741c05921f7
RLBA-2022:2941
new packages: hunspell-haw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-haw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-haw-0.03-9.el9.noarch.rpm
4d953b9e7c0e401bc5ab653e245036ba2d542b99bcc9feb912e3afbd47c998be
RLBA-2022:2942
new packages: hunspell-hi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-hi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-hi-1.0.0-17.el9.noarch.rpm
bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507
RLBA-2022:2943
new packages: hunspell-hil
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-hil.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-hil-0.14-22.el9.noarch.rpm
124a244d928483ab2780f3fabf95ae7c527c7ec6b255e5af5a289c00ba7b56f0
RLBA-2022:2944
new packages: hunspell-hr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-hr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-hr-0.20040608-25.el9.noarch.rpm
63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275
hyphen-hr-0.20040608-25.el9.noarch.rpm
c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f
RLBA-2022:2945
new packages: hunspell-hsb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-hsb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-hsb-0.20060327.3-20.el9.noarch.rpm
4621d2beb7900024f0b9b1660f41cabcb86fc0f789bc61cf672beebac4e635f2
RLBA-2022:2946
new packages: hunspell-ht
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ht.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ht-0.06-21.el9.noarch.rpm
00fc65193b4d027fb27ced0c8385c9cabc5f7820bb381589dadcdb4d3397c53e
RLBA-2022:2947
new packages: hunspell-hu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-hu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-hu-1.6.1-21.el9.noarch.rpm
ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca
RLBA-2022:2948
new packages: hunspell-hy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-hy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-hy-0.20.0-21.el9.noarch.rpm
e2d990454959473ed576f26af1db6d0af8b866ca6ce9253d15814944d513b0d6
RLBA-2022:2949
new packages: hunspell-ia
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ia.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ia-0.20050226-24.el9.noarch.rpm
7a4530aeb72bf593ca31a5baa1735a05af38c87f157248f755ec2e5fba466b06
RLBA-2022:2950
new packages: hunspell-id
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-id.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-id-0.20040812-24.el9.noarch.rpm
436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7
RLBA-2022:2951
new packages: hunspell-is
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-is.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-is-0.20090823-22.el9.noarch.rpm
f71821769833f2cea0459ac21d1bf837af2a6a8f577158adf6a28533f144be85
RLBA-2022:2952
new packages: hunspell-it
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-it.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-it-2.4-0.25.20070901.el9.noarch.rpm
c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f
RLBA-2022:2953
new packages: hunspell-kk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-kk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-kk-1.1-22.el9.noarch.rpm
c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417
RLBA-2022:2954
new packages: hunspell-km
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-km.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-km-1.82-9.el9.noarch.rpm
45256a87e25d2491d526a0061c927624e85973113d33eb39bfbdcbd3d1daa3fe
RLBA-2022:2955
new packages: hunspell-kn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-kn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-kn-1.0.3-24.el9.noarch.rpm
57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab
RLBA-2022:2956
new packages: hunspell-ko
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ko.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ko-0.7.0-12.el9.noarch.rpm
70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412
RLBA-2022:2957
new packages: hunspell-ku
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ku.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ku-0.21-26.el9.noarch.rpm
c4304b21c9e1e0920784f2658805b670ef588efa3a44bedbf8bc7aa6c0ded5c6
RLBA-2022:2958
new packages: hunspell-ky
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ky.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ky-0.20090415-24.el9.noarch.rpm
be593c9259cbcf14d251ddd5da8d4d0970b6c322f0f1de2a925810b6b403f6cc
RLBA-2022:2959
new packages: hunspell-la
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-la.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-la-0.20130331-19.el9.noarch.rpm
039e36a149132e2a6c0ec4eebacc12cdcbbaaba909d29a1dd7781089553aec74
RLBA-2022:2960
new packages: hunspell-lb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-lb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-lb-0.20121128-17.el9.noarch.rpm
f49cae2b8801453c6d91649066231a603a54785041f5d6b9de43017ee4adbd70
RLBA-2022:2961
new packages: hunspell-ln
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ln.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ln-0.02-22.el9.noarch.rpm
23eeaae0067c01be61c6ebdb2bde09b070e77f0dac26238a78cb6bda756be376
RLBA-2022:2962
new packages: hunspell-lt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-lt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-lt-1.2.1-26.el9.noarch.rpm
1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5
RLBA-2022:2963
new packages: hunspell-mai
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mai.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mai-1.0.1-23.el9.noarch.rpm
151ae1c7202de3569d075dc01f4ca08a9793a49ff65aa8b58f13ebd1b21d3df6
RLBA-2022:2964
new packages: hunspell-mg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mg-0.20050109-26.el9.noarch.rpm
e384657f05eb9179575e991dbab798de33e0d15faeec3fb88a3c1919e6d251f7
RLBA-2022:2965
new packages: hunspell-mi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mi-0.20080630-24.el9.noarch.rpm
74289457e7ad5e6fd6446b7d1e521fe80ecd1f9391ef47602c4a097bcbaa4adb
RLBA-2022:2966
new packages: hunspell-mk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mk-0.20051126-25.el9.noarch.rpm
5569f02499ffe408afa292e4ee61d9193bbb488cab4661f262214ac38ff95135
RLBA-2022:2967
new packages: hunspell-ml
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ml-0.1-26.el9.noarch.rpm
775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff
RLBA-2022:2968
new packages: hunspell-mn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mn-0.20080709-24.el9.noarch.rpm
22cefac062a6a42b7389ccfb41715cad7d9ee9a1f43d77aae74aaeae80695511
RLBA-2022:2969
new packages: hunspell-mos
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mos-0.20101130-21.el9.noarch.rpm
80a965199a80b9c5ff865d89ff88369c8913ac5c9b53f50ccbd77204e9957e2e
RLBA-2022:2970
new packages: hunspell-mr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mr-1.0.0-17.el9.noarch.rpm
91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650
RLBA-2022:2971
new packages: hunspell-ms
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ms.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ms-0.20050117-25.el9.noarch.rpm
f477493176679dab1c77a7032dedac2f54df556150c5e479b9b163deb9e77434
RLBA-2022:2972
new packages: hunspell-mt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-mt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-mt-0.20110414-9.el9.noarch.rpm
897b5583817f113f6148fe58a17326fdd62610a8f0ab7d16980fa1f03253f4e2
RLBA-2022:2973
new packages: hunspell-nds
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-nds.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-nds-0.1-23.el9.noarch.rpm
9d48b316391b180266434307129549a4b54ebebf84a8037a3ab93c13a712ac5d
RLBA-2022:2974
new packages: hunspell-ne
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ne.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ne-20080425-25.el9.noarch.rpm
30945f0cc3b1e5431e881a89cf4ad082155aeb02ea011a2ffef1c638dcb30cd6
RLBA-2022:2975
new packages: hunspell-nl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-nl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-nl-2.20.19-5.el9.noarch.rpm
e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7
RLBA-2022:2976
new packages: hunspell-no
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-no.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-nb-2.0.10-15.el9.noarch.rpm
2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae
hunspell-nn-2.0.10-15.el9.noarch.rpm
b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30
hyphen-nb-2.0.10-15.el9.noarch.rpm
fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5
hyphen-nn-2.0.10-15.el9.noarch.rpm
1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55
mythes-nb-2.0.10-15.el9.noarch.rpm
e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a
mythes-nn-2.0.10-15.el9.noarch.rpm
17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523
RLBA-2022:2977
new packages: hunspell-nr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-nr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-nr-0.20091030-22.el9.noarch.rpm
1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16
RLBA-2022:2978
new packages: hunspell-nso
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-nso.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-nso-0.20091201-22.el9.noarch.rpm
bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005
RLBA-2022:2979
new packages: hunspell-ny
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ny.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ny-0.01-21.el9.noarch.rpm
d09adcd6c721b35a31016d5f33fddbbde760f07f9e19ec3295f1ea19f2015b91
RLBA-2022:2980
new packages: hunspell-oc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-oc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-oc-0.6.2-10.el9.noarch.rpm
459925b9906ef7ce69d6fd23543b1cbbb54a4b372aa26406554de4dd8f1c315d
RLBA-2022:2981
new packages: hunspell-om
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-om.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-om-0.04-23.el9.noarch.rpm
5b62280873908eae7f96a44e341a39e489cf11918b0ca8de5ea2840fd46d0f13
RLBA-2022:2982
new packages: hunspell-or
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-or.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-or-1.0.0-17.el9.noarch.rpm
a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f
RLBA-2022:2983
new packages: hunspell-pa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-pa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-pa-1.0.0-17.el9.noarch.rpm
a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b
RLBA-2022:2984
new packages: hunspell-pl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-pl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-pl-0.20180707-9.el9.noarch.rpm
bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3
RLBA-2022:2985
new packages: hunspell-pt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-pt-0.20130125-18.el9.noarch.rpm
80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b
RLBA-2022:2986
new packages: hunspell-qu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-qu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-qu-0.9-21.el9.noarch.rpm
d6dd888ae20712e0eee43aaffe08f718c975baa709da43b8fc39856a25d72ad7
RLBA-2022:2987
new packages: hunspell-quh
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-quh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-quh-0.20110816-21.el9.noarch.rpm
02e16dd7c3c8cbd93f0ede166414d490199bfcabd29a98339e33303564c182cf
RLBA-2022:2988
new packages: hunspell-ro
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ro-3.3.7-20.el9.noarch.rpm
cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f
RLBA-2022:2989
new packages: hunspell-ru
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ru.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ru-0.99g5-21.el9.noarch.rpm
8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4
RLBA-2022:2990
new packages: hunspell-rw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-rw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-rw-0.20050109-24.el9.noarch.rpm
eb12e129ac81d2c3bed39f9c94b20fddf1a978b8bedf65dda8f34f3277579c62
RLBA-2022:2991
new packages: hunspell-sc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sc-0.20081101-27.el9.noarch.rpm
1c625cf1bee1e80fae5aab483b649d76fdc13826d68ec8553f0ae8698df7a098
RLBA-2022:2992
new packages: hunspell-se
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-se.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-se-1.0-0.22.beta7.el9.noarch.rpm
729f47a9d4869140be87012022d5f3b9fc19ea00c6fda552faca004f1b880a43
RLBA-2022:2993
new packages: hunspell-shs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-shs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-shs-0.20090828-21.el9.noarch.rpm
aa49d357410a48e937eb95eb94991a26501f8e9f8894ea67bf4dabeebe92123e
RLBA-2022:2994
new packages: hunspell-si
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-si.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-si-0.2.1-24.el9.noarch.rpm
1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783
RLBA-2022:2995
new packages: hunspell-sk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sk-0.20110228-20.el9.noarch.rpm
0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71
RLBA-2022:2996
new packages: hunspell-sl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sl-0.20070127-26.el9.noarch.rpm
29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd
RLBA-2022:2997
new packages: hunspell-smj
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-smj.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-smj-1.0-0.22.beta7.el9.noarch.rpm
6bb30c3b01e151c582097f9153d0f779e14a35d51b04a02331044abd550b823c
RLBA-2022:2998
new packages: hunspell-so
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-so.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-so-1.0.2-21.el9.noarch.rpm
4379c84abab98ed36569ec4a2959bd371c7eb9da322986a3cb6b421de2deb36f
RLBA-2022:2999
new packages: hunspell-sq
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sq-1.6.4-20.el9.noarch.rpm
3efd854bc8df94fa6d1986422ef5b4d8faf838f36f03d8fb3783219dd6a863bf
RLBA-2022:3000
new packages: hunspell-sr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sr-0.20130330-18.el9.noarch.rpm
1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e
hyphen-sr-0.20130330-18.el9.noarch.rpm
441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43
RLBA-2022:3001
new packages: hunspell-ss
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ss-0.20091030-22.el9.noarch.rpm
f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06
RLBA-2022:3002
new packages: hunspell-st
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-st.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-st-0.20091030-22.el9.noarch.rpm
19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858
RLBA-2022:3003
new packages: hunspell-sv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sv-2.28-16.el9.noarch.rpm
e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe
RLBA-2022:3004
new packages: hunspell-sw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-sw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-sw-0.20050819-25.el9.noarch.rpm
c40ae091e04f5f41304c2e3d4ca2c76ab92663a0ee361ae1f3df0a2c2a4f0031
RLBA-2022:3005
new packages: hunspell-ta
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ta.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ta-1.0.0-17.el9.noarch.rpm
328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764
RLBA-2022:3006
new packages: hunspell-te
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-te.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-te-1.0.0-17.el9.noarch.rpm
f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69
RLBA-2022:3007
new packages: hunspell-tet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-tet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-tet-0.20050108-26.el9.noarch.rpm
02c19c18ae5ef509754474acd042391fcbe32211df64465a521dc0e5f8b99e0c
RLBA-2022:3008
new packages: hunspell-th
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-th.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-th-0.20061212-25.el9.noarch.rpm
400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38
RLBA-2022:3009
new packages: hunspell-ti
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ti.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ti-0.20090911-21.el9.noarch.rpm
763e96f82e72c63a4b9eb93e22c968534fdce2386be02caf9959434398ca94cf
RLBA-2022:3010
new packages: hunspell-tk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-tk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-tk-0.02-20.el9.noarch.rpm
5b3227f1ab5732d30e645ae6f9d11bafcff74666d55e7ca107a467cae7d57810
RLBA-2022:3011
new packages: hunspell-tl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-tl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-tl-0.20050109-25.el9.noarch.rpm
5cc5f6f0eaf7f364e1ea775e9807a1a28832712253cf1ba253bdc249dab4163a
RLBA-2022:3012
new packages: hunspell-tn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-tn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-tn-0.20150904-9.el9.noarch.rpm
34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8
RLBA-2022:3013
new packages: hunspell-tpi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-tpi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-tpi-0.07-18.el9.noarch.rpm
3df934fb77f7d9cec84a6767abdeba181072e486a6bcee76d375c052fc27ed93
RLBA-2022:3014
new packages: hunspell-ts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ts-0.20110323.1-9.el9.noarch.rpm
d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3
RLBA-2022:3015
new packages: hunspell-uk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-uk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-uk-1.8.0-9.el9.noarch.rpm
48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f
RLBA-2022:3016
new packages: hunspell-ur
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ur.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ur-0.64-23.el9.noarch.rpm
2c2e1be2a85662c2ca94867d187d597efcf4962d08f1074cea1c0b9abe407862
RLBA-2022:3017
new packages: hunspell-uz
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-uz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-uz-0.6-24.el9.noarch.rpm
53976e6887ae89d9054665faf484383cd18f79420515330fc5f9cc2699692459
RLBA-2022:3018
new packages: hunspell-ve
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-ve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-ve-0.20091030-22.el9.noarch.rpm
98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852
RLBA-2022:3019
new packages: hunspell-vi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-vi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-vi-0.20120418-9.el9.noarch.rpm
7f7b937fd4adbe0bbe57f086c8344479229dc19f14d983da0a04bc74d2ffe2aa
RLBA-2022:3020
new packages: hunspell-wa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-wa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-wa-0.4.17-17.el9.noarch.rpm
bdb9a267757c7e86564c2390915b5a0fe71f298697c77c0095212f749d7130a5
RLBA-2022:3021
new packages: hunspell-xh
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-xh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-xh-0.20091030-22.el9.noarch.rpm
f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf
RLBA-2022:3022
new packages: hunspell-yi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-yi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-yi-1.1-23.el9.noarch.rpm
ed1aaf0ee4e1ab4518a68697ab6d3f85436d12fb40b4cbec2952d2339f8353aa
RLBA-2022:3023
new packages: hunspell-zu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hunspell-zu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-zu-0.20100126-24.el9.noarch.rpm
c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc
RLBA-2022:3024
new packages: hyphen
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-2.8.8-17.el9.i686.rpm
3b5cdc851a6e1e758c0e58635fd029174f6d8af79becbdad05e61dbfaa5ef274
hyphen-2.8.8-17.el9.x86_64.rpm
6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994
hyphen-devel-2.8.8-17.el9.i686.rpm
d6517907a100c574e4e88db0b0fca2098563b5658becac6630f10a9e94a4831c
hyphen-devel-2.8.8-17.el9.x86_64.rpm
c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d
hyphen-en-2.8.8-17.el9.noarch.rpm
17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49
RLBA-2022:3025
new packages: hyphen-as
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-as.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-as-0.7.0-19.el9.noarch.rpm
62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7
RLBA-2022:3026
new packages: hyphen-bg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-bg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-bg-4.3-21.el9.noarch.rpm
d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67
RLBA-2022:3027
new packages: hyphen-bn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-bn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-bn-0.7.0-19.el9.noarch.rpm
ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed
RLBA-2022:3028
new packages: hyphen-ca
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-ca.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-ca-0.9.3-22.el9.noarch.rpm
6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b
RLBA-2022:3029
new packages: hyphen-cy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-cy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-cy-0.20110620-20.el9.noarch.rpm
21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0
RLBA-2022:3030
new packages: hyphen-da
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-da.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-da-0.20070903-25.el9.noarch.rpm
3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6
RLBA-2022:3031
new packages: hyphen-de
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-de.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-de-0.20060120-27.el9.noarch.rpm
215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66
RLBA-2022:3032
new packages: hyphen-el
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-el.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-el-0.20051018-25.el9.noarch.rpm
ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5
RLBA-2022:3033
new packages: hyphen-es
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-es.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-es-2.3-11.el9.noarch.rpm
1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218
RLBA-2022:3034
new packages: hyphen-eu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-eu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-eu-0.20190406-2.el9.noarch.rpm
cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2
RLBA-2022:3035
new packages: hyphen-fa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-fa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-fa-0.20130404-17.el9.noarch.rpm
974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24
RLBA-2022:3036
new packages: hyphen-fr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-fr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-fr-3.0-10.el9.noarch.rpm
ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28
RLBA-2022:3037
new packages: hyphen-ga
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-ga.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-ga-0.20040220-24.el9.noarch.rpm
e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc
RLBA-2022:3038
new packages: hyphen-gl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-gl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-gl-0.99-23.el9.noarch.rpm
7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1
RLBA-2022:3039
new packages: hyphen-gu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-gu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-gu-0.7.0-19.el9.noarch.rpm
1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6
RLBA-2022:3040
new packages: hyphen-hi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-hi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-hi-0.7.0-19.el9.noarch.rpm
531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5
RLBA-2022:3041
new packages: hyphen-hu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-hu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-hu-0.20090612-27.el9.noarch.rpm
4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b
RLBA-2022:3042
new packages: hyphen-id
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-id.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-id-0.20040812-24.el9.noarch.rpm
a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6
RLBA-2022:3043
new packages: hyphen-it
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-it.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-it-0.20071127-26.el9.noarch.rpm
201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9
RLBA-2022:3044
new packages: hyphen-kn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-kn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-kn-0.7.0-19.el9.noarch.rpm
084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41
RLBA-2022:3045
new packages: hyphen-lt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-lt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-lt-0.20100531-21.el9.noarch.rpm
2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3
RLBA-2022:3046
new packages: hyphen-ml
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-ml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-ml-0.7.0-19.el9.noarch.rpm
963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038
RLBA-2022:3047
new packages: hyphen-mr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-mr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-mr-0.7.0-19.el9.noarch.rpm
99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0
RLBA-2022:3048
new packages: hyphen-nl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-nl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-nl-0.20050617-26.el9.noarch.rpm
4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f
RLBA-2022:3049
new packages: hyphen-or
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-or.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-or-0.7.0-20.el9.noarch.rpm
8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d
RLBA-2022:3050
new packages: hyphen-pa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-pa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-pa-0.7.0-19.el9.noarch.rpm
15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91
RLBA-2022:3051
new packages: hyphen-pl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-pl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-pl-0.20060726-25.el9.noarch.rpm
d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef
RLBA-2022:3052
new packages: hyphen-pt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-pt-0.20021021-25.el9.noarch.rpm
0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a
RLBA-2022:3053
new packages: hyphen-ro
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-ro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-ro-3.3.6-21.el9.noarch.rpm
d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e
RLBA-2022:3054
new packages: hyphen-ru
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-ru.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-ru-0.20200325-4.el9.noarch.rpm
ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6
RLBA-2022:3055
new packages: hyphen-sk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-sk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-sk-0.20031227-26.el9.noarch.rpm
7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34
RLBA-2022:3056
new packages: hyphen-sl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-sl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-sl-0.20070127-24.el9.noarch.rpm
9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a
RLBA-2022:3057
new packages: hyphen-sv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-sv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-sv-1.00.1-26.el9.noarch.rpm
ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94
RLBA-2022:3058
new packages: hyphen-ta
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-ta.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-ta-0.7.0-19.el9.noarch.rpm
2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66
RLBA-2022:3059
new packages: hyphen-te
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-te.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-te-0.7.0-19.el9.noarch.rpm
78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df
RLBA-2022:3060
new packages: hyphen-uk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyphen-uk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-uk-0.20030903-24.el9.noarch.rpm
c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7
RLBA-2022:3062
new packages: ibus-anthy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-anthy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-anthy-1.5.13-1.el9.i686.rpm
ab986ab8f658ff1ba64716d3da86c11cd270660c91b08e9e0ba028b38d365dc7
ibus-anthy-1.5.13-1.el9.x86_64.rpm
92d132f11def65d48538222cf5ab69c20c007e4ae1b08bf34ab4b77784f22652
ibus-anthy-python-1.5.13-1.el9.noarch.rpm
69afbf81a7b99beb4ac74227259299f19beceb55ce57a222ef4dc00de56e4716
RLBA-2022:3063
new packages: ibus-hangul
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-hangul.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-hangul-1.5.4-7.el9.x86_64.rpm
31bcd082d993cb409cdc13d552a2dee47eaf7e365f62a5955c68156e77613868
RLBA-2022:3064
new packages: ibus-libpinyin
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-libpinyin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-libpinyin-1.12.0-5.el9.x86_64.rpm
181fb2dff669c9ad378b5080f45a6a9a64f8f3f1f8c3665051390213ceb65ba3
RLBA-2022:3065
new packages: ibus-libzhuyin
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-libzhuyin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-libzhuyin-1.10.0-4.el9.x86_64.rpm
08fbd180a939b28e77a7cce82573719503b3b16a39787cbd2d7b421cebc88ba9
RLBA-2022:3066
new packages: ibus-m17n
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-m17n.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-m17n-1.4.4-3.el9.x86_64.rpm
16568902162c583ac8680d24f1e0d49d6cdc35563de867e937e3f1acb3992224
RLBA-2022:3067
new packages: ibus-table
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-table.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-table-1.12.5-5.el9.noarch.rpm
ce57c2ceb025d2e128c5f6c3c63be2ab14076b190391ecd690f094d8a7257c32
RLBA-2022:3068
new packages: ibus-typing-booster
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-typing-booster.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-typing-booster-2.11.0-5.el9.noarch.rpm
7d483c8521d18de4ff7b3c0312598ab185647a2904106820bc14fbaf85b7ef79
RLBA-2022:3069
new packages: icoutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for icoutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
icoutils-0.32.3-10.el9.x86_64.rpm
5f1532879a57df9e6076c9858658ccda3ef551f231d4e1f3481b3855a999766d
RLBA-2022:3070
new packages: iio-sensor-proxy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iio-sensor-proxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iio-sensor-proxy-3.3-1.el9.x86_64.rpm
60614565fc39e7c45c3ccd45751830c8483796ff813215d87ae36c0c83e73b7a
RLBA-2022:3071
new packages: imath
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for imath.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
imath-3.1.2-1.el9.i686.rpm
578ecc7035a230aae06ab295f0f39bd947828be94907d8ce9ce6fb884292db69
imath-3.1.2-1.el9.x86_64.rpm
4911dfe3104edd6b5fb8b3ca8afdd9eb9e00b74f228c2fd6987c30c99418cac4
python3-imath-3.1.2-1.el9.i686.rpm
98e587201e6cb9a036894f0bdfc8e3672ffc1b8221d0586ec53d24ecd798a421
python3-imath-3.1.2-1.el9.x86_64.rpm
65ec1d3e0b854473eafe6283dae7b1ac63731799bcc8986002de9af65a3c5425
RLBA-2022:3072
new packages: initial-setup
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for initial-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
initial-setup-0.3.90.2-2.el9.x86_64.rpm
dd44707c68c222aa61a239140e144ab6d564791c1a1a28a27dc4bf968299eb37
initial-setup-gui-0.3.90.2-2.el9.x86_64.rpm
64c09af1b243a4abb335679614070ce243673b52f8f7dcfb499f963b5a518824
RLBA-2022:3073
new packages: intltool
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for intltool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
intltool-0.51.0-20.el9.noarch.rpm
a31eb92a2aeb87418a2cbfa6328e1b37c72b3709e56a0d493cc4459941a1da72
RLBA-2022:3074
new packages: iperf3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iperf3-3.9-9.el9.i686.rpm
45339f8aae668338987f12c480c270708b4f1aee3530aee753268451e2f54cc7
iperf3-3.9-9.el9.x86_64.rpm
aa1f19863a7b9f94a97eda4d8d55ab4e914f519ad109802ae42962eecc9bd9cd
RLBA-2022:3075
new packages: ipxe / bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipxe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipxe-bootimgs-aarch64-20200823-9.git4bd064de.el9.noarch.rpm
025ba259d2f55592d92d5a46d421b9ce7c2a91adb2e8e07fe757b9d74bcb5c75
ipxe-bootimgs-x86-20200823-9.git4bd064de.el9.noarch.rpm
00192a333bae22063d4782365c916aad980288d7e2db31a24cc4fb9d7a1e58ee
ipxe-roms-20200823-9.git4bd064de.el9.noarch.rpm
790a3f2840fcca13eb25fee64b11ccfa199084a66b317607bea6ad57d9e558a0
ipxe-roms-qemu-20200823-9.git4bd064de.el9.noarch.rpm
571c22893e831cd0b2f5b79611684a4a9b2d7443444188a8b3d24d2f01115f38
RLBA-2022:3076
new packages: irssi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for irssi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
irssi-1.2.2-12.el9.x86_64.rpm
c561884727973df3f7a069688703c91c04ddfe1b167325a97a1707d3efdf1ab7
RLBA-2022:3077
new packages: iso-codes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iso-codes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iso-codes-4.6.0-3.el9.noarch.rpm
dd178957227a5c9f831f17ba4f98a93261c919355df79c4a0b45e99e9082deae
iso-codes-devel-4.6.0-3.el9.noarch.rpm
a55808c96a7f7db4039952663c1c04be83e7623d0d67399c1cba824d055251d9
RLBA-2022:3078
new packages: isomd5sum
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for isomd5sum.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
isomd5sum-1.2.3-14.el9.x86_64.rpm
981e8444193ca2c8a6b91b35f20ce1bb124afcacb93962e1d28d6a80ceaafc57
RLBA-2022:3079
new packages: itstool
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for itstool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
itstool-2.0.6-7.el9.noarch.rpm
c192f5bb9959a762f7e3cb6e86dbfa63709de34064baaba9ed24b299f0d77b20
RLBA-2022:3080
new packages: jackson-annotations
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-annotations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-jackson-annotations-2.11.4-6.el9.noarch.rpm
662d7fe507e8a64eade7537774cc99fd6bcf6be71d4e6dfe43d0cc1b69268a46
RLBA-2022:3081
new packages: jackson-core
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-jackson-core-2.11.4-6.el9.noarch.rpm
66c0b0d69ea90a1b91d53d00d7a22abe42a9fb404c2f3f314e95ee9847cebbb9
RLBA-2022:3082
new packages: jackson-databind
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-databind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-jackson-databind-2.11.4-6.el9.noarch.rpm
f69b9e4a0c7ceaf8dee7a3bae27921bf79a1d137c4bbd7eb8ada3823f3190627
RLBA-2022:3083
new packages: jackson-jaxrs-providers
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jackson-jaxrs-providers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-jackson-jaxrs-json-provider-2.11.4-7.el9.noarch.rpm
77f9dd898572ff59bb1eba50a7c93d45763dd42588d48fc84608726044f1d1b0
pki-jackson-jaxrs-providers-2.11.4-7.el9.noarch.rpm
b858f61f38495669ffe780b50150ec8b13c071c622a157705bd4edb1b3beb1ae
RLBA-2022:3084
new packages: jakarta-activation
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-activation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jakarta-activation-1.2.2-5.el9.noarch.rpm
dfaf539666f4713dafdc08c7edfcb410bf7f811293bb5e262eaa9a0d4874ed4e
RLBA-2022:3085
new packages: jakarta-annotations
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-annotations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jakarta-annotations-1.3.5-12.el9.noarch.rpm
a7f70d6dfdb497888d71179e7c0a723c4654f76acf7712956d8412c550ddde62
RLBA-2022:3086
new packages: jakarta-mail
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-mail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jakarta-mail-1.6.5-5.el9.noarch.rpm
5103d1786163af1b0f7757ae9e7274a896f83f95ee2d343ae84c53ec9ad527d5
RLBA-2022:3087
new packages: jakarta-oro
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jakarta-oro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jakarta-oro-2.0.8-34.el9.noarch.rpm
8704e29366500c7dfcf348a6a0780a668a7c8646d22f078b80d853199dc32ea5
RLBA-2022:3088
new packages: jansi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jansi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jansi-2.3.3-5.el9.x86_64.rpm
7b9d644b0ad13aa9c0f7708124e5af593693913e54e605512f58d71459a5d0b5
RLBA-2022:3089
new packages: jasper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jasper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jasper-2.0.28-3.el9.x86_64.rpm
dc1799540a58860b46cfbb4abf1b08609a50a28fe9b226a2cd65167b7254268a
jasper-libs-2.0.28-3.el9.i686.rpm
852130e71f05ec3fb892a4f35d59eeff105511a9f80c699c6a388d1e07b9ce7f
jasper-libs-2.0.28-3.el9.x86_64.rpm
5eaa7bbe8f855eaa302766cd16d4222b8c54e2ae2937d8a5db506e1048bf58bb
jasper-utils-2.0.28-3.el9.x86_64.rpm
5bd386eb121fa827cc9f65c0aeeb7599d2404bc1f6bfe0268715321f4335a039
RLBA-2022:3090
new packages: jaxb-api
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jaxb-api.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jaxb-api-2.3.3-5.el9.noarch.rpm
65f8f9705433b38b111f843813270812f5273b98a57e2ed4be072449ccbc3986
RLBA-2022:3091
new packages: jbig2dec
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jbig2dec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jbig2dec-libs-0.19-6.el9.i686.rpm
7de44052a2b5e537ecd15df068f89ad9264df5b0f292b5007be82d8a3a104751
jbig2dec-libs-0.19-6.el9.x86_64.rpm
8d8ec9c50784f2b98a9ac2f0d120b116a388c852933b41d34a096bd7e49d5f0f
RLBA-2022:3092
new packages: jbigkit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jbigkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jbigkit-2.1-23.el9.x86_64.rpm
9596d19d3d486ed3dd8cda76e0267be01554b79ba212d5372593db25d1d31599
jbigkit-libs-2.1-23.el9.i686.rpm
67184db9070f6c8cc1b563d7f1e085423daacef26f3d86d65c6dff6f9ae39935
jbigkit-libs-2.1-23.el9.x86_64.rpm
2b605d8fb73df260c14dafb1bc7a742a0586fbadfecae113315230bf19979a56
RLBA-2022:3093
new packages: jboss-jaxrs-2.0-api
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jboss-jaxrs-2.0-api.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jboss-jaxrs-2.0-api-1.0.0-16.el9.noarch.rpm
dd1b3386910657a1e71d18dbd09c54805e1e8bcd3dd2b51dddef506eb55135af
RLBA-2022:3094
new packages: jboss-logging
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jboss-logging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jboss-logging-3.4.1-9.el9.noarch.rpm
c61be8972f14bace66620885a8026fecc64f44901665273470dd0ae88de66e9b
RLBA-2022:3095
new packages: jboss-logging-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jboss-logging-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jboss-logging-tools-2.2.1-7.el9.noarch.rpm
61d08c5c1d3edfd8d40b126f47ad9e17cc4c49f3bb2347ec8dd87555f04f2066
RLBA-2022:3096
new packages: jdeparser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jdeparser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jdeparser-2.0.3-12.el9.noarch.rpm
09cf5076b842aa6bcecf984ed3cf554575bd9456d889add8b13f2578235fe2a7
RLBA-2022:3097
new packages: jdepend
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jdepend.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jdepend-2.9.1-28.el9.noarch.rpm
f7577a1506f4f0232dc6ffcb35902f1f53a5852b3e894c7e2e4b89f2db132248
RLBA-2022:3098
new packages: jmc-core
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jmc-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jmc-core-7.1.1-5.el9.2.noarch.rpm
28cefe2d6b069fd39dc5b9fe938ddcceb02ebf97c4fefb3e2cad84a10883c12f
RLBA-2022:3099
new packages: jna
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jna.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jna-5.6.0-6.el9.x86_64.rpm
5de6706a2bc1154dd3571a92e295b3e4237e51903a06df5447ec524a4607e40a
jna-contrib-5.6.0-6.el9.noarch.rpm
96f77846701b3b6cb271a77f4c719511f43934c99040518b1e98def7f15f8714
RLBA-2022:3100
new packages: jomolhari-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jomolhari-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jomolhari-fonts-0.003-34.el9.noarch.rpm
c947d398959f60be15eeea68f4e1bbc32d10aa29fcad04152d80b92b31fc2c3d
RLBA-2022:3101
new packages: jose
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jose.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jose-11-3.el9.x86_64.rpm
405cd1c00aecd1d9bb7ca085e4af0bf4023725754df9a6096df36ea086e98a8b
libjose-11-3.el9.i686.rpm
4b0adc4191384d191fb8f03726574460445a54a1c08fdc2c32f931d9bc274518
libjose-11-3.el9.x86_64.rpm
28c04463df72fc361a1f83d9ed5ec5fed641df902847b7e5039ebfbcfa6e135d
RLBA-2022:3102
new packages: jsch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jsch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jsch-0.1.55-5.el9.noarch.rpm
123a345d955d756e5ff7d599bb983ff955bb2d0ee60cc10344040790a843362e
RLBA-2022:3103
new packages: jsoup
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jsoup-1.13.1-9.el9.noarch.rpm
75e744b58b0b413fb4f05ca0aba036e416ddd9c5ec1579a928ed477661e455bb
RLBA-2022:3104
new packages: jsr-305
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jsr-305.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jsr-305-3.0.2-5.el9.noarch.rpm
7199bc454e427504c7084b5c75529b6150f1e4cab9fc7e4e2621ce8c7de1a6bc
RLBA-2022:3105
new packages: julietaula-montserrat-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for julietaula-montserrat-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
julietaula-montserrat-fonts-7.210-6.el9.noarch.rpm
db387c7748ebc066e0fae2880329b8177b47e8f5f4fc04b4b9f9e8c6a8e0e674
RLBA-2022:3106
new packages: junit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for junit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
junit-4.13.1-5.el9.noarch.rpm
2a5753590012ed5d6b51f8cef92c821b34fa316695f7a710f5d057d42b745e17
RLBA-2022:3107
new packages: junit5
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for junit5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
junit5-5.7.1-5.el9.noarch.rpm
3228a66f87bfc070cacfe4985abefc458d84bffb6686bf0ecdc2d7178a955f92
RLBA-2022:3108
new packages: jzlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jzlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jzlib-1.1.3-19.el9.noarch.rpm
a50e904363f5577889b04605528cc9bf12adf554d669e077909c336bda94f7f8
RLBA-2022:3109
new packages: kacst-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kacst-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
kacst-art-fonts-2.0-27.el9.noarch.rpm
e791687a3c5e9e837d797f71601095ed9022b8c6f6e21219cbb55519048538b6
kacst-book-fonts-2.0-27.el9.noarch.rpm
99440d6f3c6ff76b10757c3506caebfd4bb3804009b938dcfca2f7147693ec16
kacst-decorative-fonts-2.0-27.el9.noarch.rpm
b2178fced875cfdeeede82fdaca5395453eeddf5913e8c372a5b96de53d6f827
kacst-digital-fonts-2.0-27.el9.noarch.rpm
02efb071e20fa55c57c16a60485cea7fce2afe0b6e4f3e3081abee711a42aa48
kacst-farsi-fonts-2.0-27.el9.noarch.rpm
e32523fa43a0a14dfd9f06d799c53533083c2ddfd2cb5c5e4362a273ebe2032c
kacst-fonts-common-2.0-27.el9.noarch.rpm
10cdf717a7acee1e51ebaa8f70aa9b45a53f9828fda1532ddf25add9ea6acadc
kacst-letter-fonts-2.0-27.el9.noarch.rpm
da05dc4a4baf91b1f6c849c86a595ae83442ee09f028ef4f24c3fa03fa0aaf3d
kacst-naskh-fonts-2.0-27.el9.noarch.rpm
049cf317c791790b9c25c8e6f6d001efef71fa62c4e0558f942261027e329fbe
kacst-office-fonts-2.0-27.el9.noarch.rpm
7b83333654b5162bb2148df28822ef0899e42328a7145a0db9cf5c136b32bc4b
kacst-one-fonts-2.0-27.el9.noarch.rpm
5c70024db77c8948b707e8787db54aeb1e1cb4e13e5adb3b6df1c42dc75f4c86
kacst-pen-fonts-2.0-27.el9.noarch.rpm
cc8fd86dec4148915dd87484e0cdf8ee4224c54c30feda1cec49e2ce0dcc31fe
kacst-poster-fonts-2.0-27.el9.noarch.rpm
fbadd674df8c15a90c4b2a3b65a12941b8233c2ff3603a442639d9bfe59cfe41
kacst-qurn-fonts-2.0-27.el9.noarch.rpm
8ee6642be2458987a6c1628992ec4c3a4ef7ae91243d6d843859ac552285a194
kacst-screen-fonts-2.0-27.el9.noarch.rpm
f15c0ece7a160ccd896a352d553fe47b6447b35a1931d3fb75fdd71bc46b52a0
kacst-title-fonts-2.0-27.el9.noarch.rpm
96720a93abafc5eab36790b30651d8f7ac775320da5c2692adc923d713fbc3f5
kacst-titlel-fonts-2.0-27.el9.noarch.rpm
a69307c6a8786fe5b10f6c67de962be6701bc919c5a01ef9e08b3aa4c16b817c
RLBA-2022:3110
new packages: kasumi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kasumi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
kasumi-common-2.5-36.el9.noarch.rpm
76d48f5f5b94470188d190ed35c0c4e5fff81e2e848abd41b198f463f5a7efb6
kasumi-unicode-2.5-36.el9.x86_64.rpm
b1330860800ba7cf3953360189482c1ece37b8f76fce4709013ee6a03413c7fa
RLBA-2022:3111
new packages: keepalived
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keepalived.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
keepalived-2.2.4-2.el9.x86_64.rpm
3b7219363a88cc76fd7e985df0c88c7e0a4fade103b357f7752e969832c558da
RLBA-2022:3112
new packages: keybinder3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keybinder3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
keybinder3-0.3.2-13.el9.i686.rpm
cac5227ed6e7082fe098d6fa05041df2863efc8c05704b720d6cb88e14a64380
keybinder3-0.3.2-13.el9.x86_64.rpm
0bdbd7ed5bb46e7dd780b3797cbbae1bc68f5a0a110639ebe59bf5a4719ad1e2
RLBA-2022:3113
new packages: keycloak-httpd-client-install
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keycloak-httpd-client-install.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
keycloak-httpd-client-install-1.1-10.el9.noarch.rpm
dc472168d12c000d18a7f680047f8be1a5dafb88eca1dcec8569daa1ba97af66
python3-keycloak-httpd-client-install-1.1-10.el9.noarch.rpm
d90658e7cb4110d8a43bc32db1d16be5a1e31fb6caff3ab993bf887d308b5a66
RLBA-2022:3114
new packages: khmer-os-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for khmer-os-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
khmer-os-battambang-fonts-5.0-36.el9.noarch.rpm
9fb75792babbdb8e68965ba28a35817e76f993cf833f43b2df417f535e69c286
khmer-os-bokor-fonts-5.0-36.el9.noarch.rpm
9b3b3426481e224df7021299d3c58cb05f44f596cdc6e86b45b29355c6afb73c
khmer-os-content-fonts-5.0-36.el9.noarch.rpm
e1ad432ba58d8ffe219203f40c8087af4c4b205f74cd3c1547608442000dbb44
khmer-os-fasthand-fonts-5.0-36.el9.noarch.rpm
d804a9eb0aa6151ff7a99bddbc42947a3a0a6075cac9e05a2cc57eb87402ded1
khmer-os-freehand-fonts-5.0-36.el9.noarch.rpm
bf4ffd911101f6675639abbd7c20b9a1802a06f436e1a5d6350bcc647f73be07
khmer-os-handwritten-fonts-5.0-36.el9.noarch.rpm
c00faa39dcb95c521c7383c023145739d7675461c432a3357acfba7a5f9a002a
khmer-os-metal-chrieng-fonts-5.0-36.el9.noarch.rpm
705fdb3d2ab2999001c023b453051c14496822a86bf250a7a269b1fa82b22da7
khmer-os-muol-fonts-5.0-36.el9.noarch.rpm
5a28752970fb0b450808f10b8e1481c91572e38a11c898b974e1829d579a5e58
khmer-os-muol-fonts-all-5.0-36.el9.noarch.rpm
c3b1707f7290e2ac274ac263b7de187c41c8e8aff08150a9dae7ec436af923b9
khmer-os-muol-pali-fonts-5.0-36.el9.noarch.rpm
d2de0ed0cddc9b6dacb9ead6718797124d490af65540f0957ab664581992e95e
khmer-os-siemreap-fonts-5.0-36.el9.noarch.rpm
34530de9d239459edaa96468448bdde6a30681c9177d71633910a659610446af
khmer-os-system-fonts-5.0-36.el9.noarch.rpm
8272088d3c878c34647a46c2a4323652996ac739b201b528904597c02986365d
RLBA-2022:3116
new packages: lame
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lame.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lame-3.100-12.el9.x86_64.rpm
417e6c51e7a8cc97bb320e53cbca62048c8e7713e33cee0b041d1af079584c64
lame-libs-3.100-12.el9.i686.rpm
370751aa6422f52e351e03f76aa3af12bbd1cb13b378555256d199855ffda8b0
lame-libs-3.100-12.el9.x86_64.rpm
f4aac40d2863cd00268479ad7ae30a88947f41ad218c9c3b6b794fb3c80b8363
RLBA-2022:3115
new packages: ksh
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ksh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ksh-1.0.0~beta.1-2.el9.x86_64.rpm
3ce230e14c4ed81c488c76be78b90603d4441fafe173a1062828c53084222896
RLBA-2022:3117
new packages: langpacks
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for langpacks.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
langpacks-af-3.0-16.el9.noarch.rpm
295fcda4e6d88cd132f4012a57668b3779f20ed1b195ab2600f10796e82bcbb9
langpacks-am-3.0-16.el9.noarch.rpm
188143cc2e2af204ea2f74640ed6fa7149d7c0a08bc2691b964ba400703570dd
langpacks-ar-3.0-16.el9.noarch.rpm
88289da083feb7a05aebb64c139dbf8d33b05f76466b8b88e14f5b0a1c71e841
langpacks-as-3.0-16.el9.noarch.rpm
050889c2eddbe8b0b223be8e9b4d83e18522a5732fefd675d26a9b2d0a5d232a
langpacks-ast-3.0-16.el9.noarch.rpm
af89bca555089f5da59dcbb67842fe469c06f49cbb220b123d8e12639bb3ca24
langpacks-be-3.0-16.el9.noarch.rpm
7c9c0829fee599d5e69f93c86d34f4d8fd9a4c02614f07a7c3123bc8bbae8234
langpacks-bg-3.0-16.el9.noarch.rpm
97a424686ce05071b620b3753d3953c05ef0348a428085c31920991f30a8d46b
langpacks-bn-3.0-16.el9.noarch.rpm
5c2872dbfc0f8932c88d511a0d119c0b52670bf0ea77765017d91542693c0499
langpacks-bo-3.0-16.el9.noarch.rpm
9201f2c51487a9bce84379cabdefe7c98cd6ee56b3aedf5848eced50b931c782
langpacks-br-3.0-16.el9.noarch.rpm
837150c444feeae9fa588acfa123eb3b8110454422b2591461b3d742d997ee2d
langpacks-bs-3.0-16.el9.noarch.rpm
d5bdc6fb7a1a694bb94807069005d4e64b661789863043ad83dba1df5391719b
langpacks-ca-3.0-16.el9.noarch.rpm
f68f6bbcaa9ea7a97439572176b46127f45f346a68eb32f8bffc20f3eba36916
langpacks-core-af-3.0-16.el9.noarch.rpm
3908d85ca204e138d86b3b26032a72b3c6443e66dc0b18c3862315f9e2f0ed24
langpacks-core-am-3.0-16.el9.noarch.rpm
0f4e280707751c664d51afe63a8840610ec1fe54d0d2fbcbc70cb96ca00ad78e
langpacks-core-ar-3.0-16.el9.noarch.rpm
bc3f877f0d21d75e377e24c9267a01a114128e972e4acebe8d1380776dbb7636
langpacks-core-as-3.0-16.el9.noarch.rpm
6beb3adefa6f35e664aa84fd9f257354e2a6801268e7ef023e29c163ddc8fdf4
langpacks-core-ast-3.0-16.el9.noarch.rpm
2e5f1f781c8ded1caee8e85f5cc3696ae85de1765cf52526ec77a7e3bac1af85
langpacks-core-be-3.0-16.el9.noarch.rpm
a1af1284ac0c5870b5df09af0cdfdefe21cd8b90efeada420645fce715b36ef2
langpacks-core-bg-3.0-16.el9.noarch.rpm
2fbb4fd341069f6e4a61c4d8c73cc6b3f0746dcb8446465bbf5e77f2a1d7e2ac
langpacks-core-bn-3.0-16.el9.noarch.rpm
e8c7e4e7fead44dd96c7028b88e2f8cf52edc71eee9677826a03d0d10d1b641d
langpacks-core-bo-3.0-16.el9.noarch.rpm
c6c58a21a9af4add306f81792beb147a7ed6f74458d934d37540465705e4389b
langpacks-core-br-3.0-16.el9.noarch.rpm
486ff4df2b01de13647c3377b84c5b1f3abb591ac7458b55a1b1e1c2a158b131
langpacks-core-bs-3.0-16.el9.noarch.rpm
2f3b7cdbf9856afd8467ec7eefb9186de9698355d4c7918a2155220a38997e79
langpacks-core-ca-3.0-16.el9.noarch.rpm
193aa70f96e7a9567aa580ba852906802c5a86e9c1fcc817fb4961a8409455eb
langpacks-core-cs-3.0-16.el9.noarch.rpm
1d2ee55a82a6c5ecee350fbd2cbda44418d2ea3f1b7aabb76c4eb65f5baa9da8
langpacks-core-cy-3.0-16.el9.noarch.rpm
02b6b81adbd76754ab2caa52df8789e46eba30fc779cd87c880324977e08be6f
langpacks-core-da-3.0-16.el9.noarch.rpm
549f3e5cc6cd3ca9d37a14c1bd69d9ec4d348fef7f80351132cd41df80c95f37
langpacks-core-de-3.0-16.el9.noarch.rpm
39b5118e7319eb3671f2f3899000fe933379e7c495e9fc14cd967e03c4176452
langpacks-core-dz-3.0-16.el9.noarch.rpm
7179ba1726ccff8d93115aba95fe12446e0e757db7734ecffa23340de3c4182a
langpacks-core-el-3.0-16.el9.noarch.rpm
e9924c60499aac5b88fdece983917c6852ed3e10a796577a5815451d2c36047f
langpacks-core-en-3.0-16.el9.noarch.rpm
39a119cf4213eec89145959cecf5fb600e4ea55c13d8b3f530a493505a6a766a
langpacks-core-en_GB-3.0-16.el9.noarch.rpm
1c2b2e44d7022da3c7aa5d42ba33278d6b72e040d483c2ff0f7437082d092a84
langpacks-core-eo-3.0-16.el9.noarch.rpm
245627298986208933bd04ac9becba2803035b88f9ff9b4f2feed7608cedd42c
langpacks-core-es-3.0-16.el9.noarch.rpm
ca2144b44cf5396bb043d6f737b277e8425eb4403bb57287cac796dda9d7154c
langpacks-core-et-3.0-16.el9.noarch.rpm
282ccbb9288b1772c37dd040aed8fd25de7a980e223931df7245bcd9eabc6b4a
langpacks-core-eu-3.0-16.el9.noarch.rpm
f599e55dc9de31fe327165f7874c70c04228334f42a1bf22b3d55728baee4769
langpacks-core-fa-3.0-16.el9.noarch.rpm
5d66acf8f9c0523ac43ef10959d71b1ca83fca139ae58357b87481a4c6b32598
langpacks-core-fi-3.0-16.el9.noarch.rpm
0ce25b4e4828a6cbfb0c86f023d66054268157c2ab17621d20755fee397ec7cc
langpacks-core-font-af-3.0-16.el9.noarch.rpm
e68c21fd77b63c83c75cddd6c72ce531ad8f51864a66e9c379679b2ecbe05553
langpacks-core-font-am-3.0-16.el9.noarch.rpm
706d300c017646cd23b42b76a604ad06767923958a5ab604928badad4e6b77db
langpacks-core-font-ar-3.0-16.el9.noarch.rpm
0f6f7b10f65e78d3bbd9fadd91ade3eef9c54e402146bfcb3b2091ad9e924f7a
langpacks-core-font-as-3.0-16.el9.noarch.rpm
ce12a4fb9db44e91fd9814d6cd124ae02073fd7f5f63dab309bdec6bb9aff562
langpacks-core-font-ast-3.0-16.el9.noarch.rpm
8c84c03a5c7d9f100f734842923560ec40bc9ab4872369cf9c63d631428df442
langpacks-core-font-be-3.0-16.el9.noarch.rpm
c3869d62ab0111df32560d915e237027f977d01512af20aab16dd1994f0205ce
langpacks-core-font-bg-3.0-16.el9.noarch.rpm
5d9e5f2a371fde432868d81692be2c18efd33c8f00449a5e27cd51408bc46850
langpacks-core-font-bn-3.0-16.el9.noarch.rpm
557a3559b818f904bd73fbcb45f22f9867d423f1172940002b51bfb09e41efb3
langpacks-core-font-bo-3.0-16.el9.noarch.rpm
bf57b250c471100e240f0929fa35fc50a1560af713b009c7e612062075b4636d
langpacks-core-font-br-3.0-16.el9.noarch.rpm
2a13cf6f80771b095ed03ec494e83904aa5635cdc11e7ca59e597e2364f6f452
langpacks-core-font-bs-3.0-16.el9.noarch.rpm
a49eeaecd8a46d9a805a7b743ac06f67be93db5d118d0e4565433457fef38560
langpacks-core-font-ca-3.0-16.el9.noarch.rpm
da8ab4b3598baa703bb4ae2776a2841bf64a38355ef9d3ada935cae1f7752b0d
langpacks-core-font-cs-3.0-16.el9.noarch.rpm
184019c02da3cac743879cd8f1174de956ee1c78954604277d6af8c9b7d34e53
langpacks-core-font-cy-3.0-16.el9.noarch.rpm
ed768a4c763371e09716949ab4b16c20a318200178df5ae4c404ba8091120697
langpacks-core-font-da-3.0-16.el9.noarch.rpm
7d7c0d3512dd78bb9f2bb3966ce751b89e8e16686746d4d340ed5f1e6312e64a
langpacks-core-font-de-3.0-16.el9.noarch.rpm
ad8f6110a0ddec04f0424c5683970d44b93605daf476879159b5a753ac2288e7
langpacks-core-font-dz-3.0-16.el9.noarch.rpm
1db865fc8b8d72e625a2dd1d1f9dc1f0419fc685ce0cac68053098b74507232a
langpacks-core-font-el-3.0-16.el9.noarch.rpm
833bdaf0b84f6ee4ddd676b2747fe39e7d5d7556412c7f430289a8cb52c29eb4
langpacks-core-font-en-3.0-16.el9.noarch.rpm
509ab15479020654e24c0dab1e39fd98c144eed8cc50e0cc3b1ac612bdf82e36
langpacks-core-font-eo-3.0-16.el9.noarch.rpm
ebbb160a0415263f61a03a423cc771c167610b7c39baf2fcac942c833e805ea8
langpacks-core-font-es-3.0-16.el9.noarch.rpm
051889a3d435cc399aeb89e3580e4064fa8e484a77337bd10af0772d2b44e5b4
langpacks-core-font-et-3.0-16.el9.noarch.rpm
af510c8803e8f6dc3aa348914ebb73dfffb23ade56763d4ff6a0c3f6715396c6
langpacks-core-font-eu-3.0-16.el9.noarch.rpm
7f7e9dd733b185b057a4cc760cfe59aeb0223e581c163379e78816f7bd152468
langpacks-core-font-fa-3.0-16.el9.noarch.rpm
3d5c9a74191e92ec67554602a77d6b86db9024e89494b154b2ae6f807c9563cb
langpacks-core-font-fi-3.0-16.el9.noarch.rpm
78f51e4a9ff3729f9b54c388524f745e09849cef5fc40f16608509e9227c4042
langpacks-core-font-fr-3.0-16.el9.noarch.rpm
69c79a55aaaf2f810e3645d9c1572572630ea7d38fbf88e84e9b48e90bdb1e4a
langpacks-core-font-ga-3.0-16.el9.noarch.rpm
ff3fd8f711fec36fa980d135370605636c855b15ee4c8cfdef4d0863b2c49727
langpacks-core-font-gl-3.0-16.el9.noarch.rpm
a1145d419c991b9528f85e1ece16ef334a8c0c323d453d1f1583b77e980bb0ee
langpacks-core-font-gu-3.0-16.el9.noarch.rpm
4b2f78ca7b935e31ae03ca86282474db16bcb724f8a010396eafe5b913536d96
langpacks-core-font-he-3.0-16.el9.noarch.rpm
c4c23d1bba3e7d9626546b8b350b59840a8e3f6490d441b28cfd69af6274a492
langpacks-core-font-hi-3.0-16.el9.noarch.rpm
f6ed2c37a0fb42beb96b47959890adb519027592d7e03e07b1b75fb131152a19
langpacks-core-font-hr-3.0-16.el9.noarch.rpm
23e04e0f4d8c9e81360693a9d7b364c87eadbbf0574937a1148186a985e7b300
langpacks-core-font-hu-3.0-16.el9.noarch.rpm
9c9e2097e53b8637bce20f8245b48e2c228ef48bf06e34553ac7feece9e6ba13
langpacks-core-font-ia-3.0-16.el9.noarch.rpm
8f6e92d5d5766d47e46ff2d36949883ab666dd605de32947899168f898ebae39
langpacks-core-font-id-3.0-16.el9.noarch.rpm
f3b959f7ad54b518ebff77dffa872bde9f88436592f77298d14c0cae5970b1db
langpacks-core-font-is-3.0-16.el9.noarch.rpm
df1cdfea39bdd905ad76cc56c4228533c07692eeb76645da4acecc7ab7778513
langpacks-core-font-it-3.0-16.el9.noarch.rpm
c2b7b96e1e41db6b031ae12de79cce5ad0a1290dcebbbf8f4f03b4695790cce5
langpacks-core-font-ja-3.0-16.el9.noarch.rpm
f5814ca3a3df35e3e9e7cdddf61a5bdee2d214c50b0dce33056926e1bed26056
langpacks-core-font-ka-3.0-16.el9.noarch.rpm
a4416a14e46059dfdf21d9b7f72995ecc38f87d093101b7998f190c97e624572
langpacks-core-font-kk-3.0-16.el9.noarch.rpm
a309bd3c05585daa011fd5568012b0df9da2ca5728cca14178e249f4e228cd69
langpacks-core-font-km-3.0-16.el9.noarch.rpm
c2dd2624f5f7ca87d7c7834a871d0d96a5f934b33dd64443e4917c3712818947
langpacks-core-font-kn-3.0-16.el9.noarch.rpm
769716696358cb82433fc04df1517ac2d617971f9bde63984ecf1222072157ea
langpacks-core-font-ko-3.0-16.el9.noarch.rpm
5bb002a794c420f30c5853fd8a96bb1aa6457d5b3a6a53ad9ce04a8f249d2c3b
langpacks-core-font-ku-3.0-16.el9.noarch.rpm
04015a1899875bba22fc6da6bc8240867b8f86e3ec9e4344707986c2bb577e86
langpacks-core-font-lt-3.0-16.el9.noarch.rpm
542029a20ef425373ada7d0a3beceef1aff1a7f768ff843c681ffa3dcb58f39f
langpacks-core-font-lv-3.0-16.el9.noarch.rpm
0df50751d75ffa7696c310531bdd16e1afe6c14078e5d1d510370dec2fdeea10
langpacks-core-font-mai-3.0-16.el9.noarch.rpm
b734fe5773826de334999530c689caf31078092a66e1e3f1c666bd2c587b85fe
langpacks-core-font-mk-3.0-16.el9.noarch.rpm
bfe066433462146158d4faedc0a6988cbfe97c5b0354163c8832afc4caadb088
langpacks-core-font-ml-3.0-16.el9.noarch.rpm
5aab937ef43cf560f02835b2875b5bcd20a0fc460bcc174b009741e884435a25
langpacks-core-font-mr-3.0-16.el9.noarch.rpm
390b662eb4fdf647d797ef331be1137536aa9f33e5cac6dec435926ffef9fbb0
langpacks-core-font-ms-3.0-16.el9.noarch.rpm
ea55c03fae3e8020b4f6fa45c66b81a8370ff16eaa79be9a09b6323e8889db7f
langpacks-core-font-my-3.0-16.el9.noarch.rpm
4d565e23de47a98e38065561ec2769cc60da1720ca9c35a3879fe52d489a9a4e
langpacks-core-font-nb-3.0-16.el9.noarch.rpm
26b2cd59f7c66107fdcec4dac1c27fe56981ab2457cc8bfbc9cc7c5424491a48
langpacks-core-font-ne-3.0-16.el9.noarch.rpm
7236e9c05cad09e68a89a55bd596d480028ff961b13b171a79df90fcf079ef70
langpacks-core-font-nl-3.0-16.el9.noarch.rpm
5f164a23a03f23c6774874f99e449599a7f6d74448a0938b4714cd7601a6c086
langpacks-core-font-nn-3.0-16.el9.noarch.rpm
1de52a965fea14255181370d6702134f093e95fb93c7a3e91b70535c2b4983a0
langpacks-core-font-nr-3.0-16.el9.noarch.rpm
99ff1a33aea5ea995bb1aaa7bdc84a8303bda9d99ed4caa446d90236cc5874c4
langpacks-core-font-nso-3.0-16.el9.noarch.rpm
8b1a8a2e9ffcceb79577ce0c08001c4cfc40f377140dcb82785b1ecf98803259
langpacks-core-font-or-3.0-16.el9.noarch.rpm
ea03adc166ec92d566e290a7566457151e9224a2db22480c3f4bce9210bdd5d5
langpacks-core-font-pa-3.0-16.el9.noarch.rpm
02dba674ddda95cf01168175255c19c871faf8c72d55ae327dbae93539e751ea
langpacks-core-font-pl-3.0-16.el9.noarch.rpm
be88f8769850cb9b7f694c943e9e9875b759781d282e8c51bcc6ccc4f3dd62e6
langpacks-core-font-pt-3.0-16.el9.noarch.rpm
c8aede284a001a6ce2cca61d4e6173ca6e8f41294319e65a895f7fa932735bd3
langpacks-core-font-ro-3.0-16.el9.noarch.rpm
7b099d68a8b69d758940d8adc52104cf520fe08b3d8eb37192ed68d20deed3d7
langpacks-core-font-ru-3.0-16.el9.noarch.rpm
e0e4977d70d4d0e5e948adaeddda588e033c0aceb511861dd761dce3ec9067c5
langpacks-core-font-si-3.0-16.el9.noarch.rpm
e85cae9313286ea94bb1051f0dc2b7e79d936f1c4c584851a9688b1811e00901
langpacks-core-font-sk-3.0-16.el9.noarch.rpm
658ab85d1d70e8264344407ca2c5527f10d4ba8d21fd8dc88a51bda885e0f9ef
langpacks-core-font-sl-3.0-16.el9.noarch.rpm
090ed99c61fdfb3656b14769f6db6eb20826f726b8ef55f585636d67ee3b27c4
langpacks-core-font-sq-3.0-16.el9.noarch.rpm
81af32686fd1486836dc6536b95efc0255e654df229d8062931d498526d52593
langpacks-core-font-sr-3.0-16.el9.noarch.rpm
922cd69354437f21c3d77821859a3c36a1a791e7741fe54a6426f7d18c214b3a
langpacks-core-font-ss-3.0-16.el9.noarch.rpm
5ae2b1c4c410b7d5ef4a4bc41ebf5024905d2e4c42986c16162e5c2f7692ee87
langpacks-core-font-sv-3.0-16.el9.noarch.rpm
71424c9075e3262b9d92d61e9c665dbb01f8a350758c988516826efdf35c3ed7
langpacks-core-font-ta-3.0-16.el9.noarch.rpm
57551674e4fd14383892edfb90fdd19315a2c17efc9771adaaf22ed9d3030287
langpacks-core-font-te-3.0-16.el9.noarch.rpm
e4f4c538018996ba39969657b202e491d65e87de271564fc8e9c781656e77125
langpacks-core-font-th-3.0-16.el9.noarch.rpm
9ddc34f9a9ca94c33d2c619f1951983e953a1720ba0a62d2ffcf4298ee230093
langpacks-core-font-tn-3.0-16.el9.noarch.rpm
3933b31fa6b302020e42ce39fc0d3a9b173782b7b8123bc365fd3333c0ecb674
langpacks-core-font-tr-3.0-16.el9.noarch.rpm
8a57e76aa50a68800c180668f44e8cd80444d2d9b391cbca4886a19638d57b44
langpacks-core-font-ts-3.0-16.el9.noarch.rpm
4c4bdfc47a3ed63e7b9a54951aa67508665a3f8f2c94506e105e95816432b301
langpacks-core-font-uk-3.0-16.el9.noarch.rpm
2f9156e97c0ac2d2f4e3c4c3564c560e45010a1de40dd138ec69f62cbf7631d0
langpacks-core-font-ur-3.0-16.el9.noarch.rpm
6b42444e3af30d2913e6ac411a5733e1dafe0e6b7aad72ab59df7712208ce6c5
langpacks-core-font-ve-3.0-16.el9.noarch.rpm
870ad012e83432c77195cf59de0885766b966d424999e9a45c5a86d4eb0940b7
langpacks-core-font-vi-3.0-16.el9.noarch.rpm
34f72a70a3fa24a36b3196440c86f3fadb2eb6714158260d778861a045512c9a
langpacks-core-font-xh-3.0-16.el9.noarch.rpm
3bc11f4352e587c69ca954c316de0bcad7c6ac495802ed86f271de719eda6525
langpacks-core-font-yi-3.0-16.el9.noarch.rpm
5f8d15d6e88c09d96518d292d58c86fa69062111539b7ad629d424a1e9d38df5
langpacks-core-font-zh_CN-3.0-16.el9.noarch.rpm
d157d7768a828663fc76129831440f4cd065de12203f86351848056349fcfd93
langpacks-core-font-zh_HK-3.0-16.el9.noarch.rpm
353741ee6bda6b41d761955ade343a8bf463a8ca6035bf0aab1883558ae07508
langpacks-core-font-zh_TW-3.0-16.el9.noarch.rpm
62db3aeadf1ba629510c25687ad39973724ed58448e384a45534ec5e6d4610ce
langpacks-core-font-zu-3.0-16.el9.noarch.rpm
3c91d6dfce28024538502676b7a5808eebf893447653f4a9be559f0e82ac0974
langpacks-core-fr-3.0-16.el9.noarch.rpm
5d118bd31770aa5dca7ac7b059a3570855117f74952367ef7237a307f502f402
langpacks-core-hi-3.0-16.el9.noarch.rpm
95c5c9418852d4bbbc7cebba8f2e503839a5e3fda064e5bcfcbfa6208761c008
langpacks-core-ga-3.0-16.el9.noarch.rpm
b896176ee6e88a73c80955e132de8c0ba8006237b2dab15514fe1a1af0d441d9
langpacks-core-gl-3.0-16.el9.noarch.rpm
da83ec057fd8ed1c87055c6b03e12204560ed63a3a5b784642086cc7d039f0e5
langpacks-core-gu-3.0-16.el9.noarch.rpm
fca2624a6db9fa32af8c840f9168b1ec977b1403b70629c6326b293e91b17493
langpacks-core-he-3.0-16.el9.noarch.rpm
f743d8bd9bf365a19041c88ed2c5d7ce2ad53d0a4452ddea4925bb99152e616a
langpacks-core-hr-3.0-16.el9.noarch.rpm
ceb857b7bd119f28b562d38ef95193873ae9d938d3256a2cacfdd6fe95e7a66a
langpacks-core-hu-3.0-16.el9.noarch.rpm
18b489902a14c7949e4ea1996732f9fb72f162e766fd04e904541cc03cd9b084
langpacks-core-ia-3.0-16.el9.noarch.rpm
a1c31f046d24660f8449372a0eecfd1a406eb81398e112fdcf39156384785213
langpacks-core-id-3.0-16.el9.noarch.rpm
aeec24ae85622ba773db5b9b723491878f9b340c5a98f7fb6471ff7af39d3f66
langpacks-core-is-3.0-16.el9.noarch.rpm
db05ef394ecf2d950812e0f20d55968c6e2a15608cb6acdda76ee0f272d7aa51
langpacks-core-it-3.0-16.el9.noarch.rpm
3ee2e34348ee9074f430d75824b5b42d80b9425f148811edc0567f5cb698ee61
langpacks-core-ja-3.0-16.el9.noarch.rpm
5cd588fb9621bbf406731a500ff92e4f7be9653b3b415d06e545360d7fa7a99b
langpacks-core-ka-3.0-16.el9.noarch.rpm
6a07809725c1352e4c196fa4546e99ea2a13ea84379236153e5ff2209da1509d
langpacks-core-kk-3.0-16.el9.noarch.rpm
4c5a08135cfbfeb15f811cccd0323fe243f1e5f46160e7c80b7485b656236d66
langpacks-core-km-3.0-16.el9.noarch.rpm
5825e2ce1460aeb9c70f6c24a664a40186a42fc33fc8534839a08e5844d1e4a3
langpacks-core-kn-3.0-16.el9.noarch.rpm
b2efa051aab646e8ad57620eaac8b2c440444a88c1f525501ce651d075884c6b
langpacks-core-ko-3.0-16.el9.noarch.rpm
7e65953ce16d42f0bc4e4bc4510b49ee5e79705f4c5c9921188433545eaa11a3
langpacks-core-ku-3.0-16.el9.noarch.rpm
f4b052b15a5f78fc0ebdd2c839f51bf35c8f9d3c38c126fd49293d7f9cba6d87
langpacks-core-lt-3.0-16.el9.noarch.rpm
5a9449973e5105cc117317a4810239cdb8b03b7df43efe59bf7ca3d9ce477c68
langpacks-core-lv-3.0-16.el9.noarch.rpm
f2dd16c75f61a7511dc438130598a8d36d860a8493aa51e7d26d77769bc42545
langpacks-core-mai-3.0-16.el9.noarch.rpm
ef4d3a7f6825711093c7df6a12fe3917ecd6ada4c61b08f7e82d2c968d5810bf
langpacks-core-mk-3.0-16.el9.noarch.rpm
47279306636831fdc45f86bb5d0700d25f5c4573b66ecb3dba9ee2d3707374f6
langpacks-core-ml-3.0-16.el9.noarch.rpm
d0c942f898643c98bc77f528ebe102d5abaadba194dee25e5c15ee3457325cc1
langpacks-core-mr-3.0-16.el9.noarch.rpm
aac9db5eee0b648e9882ee2ae95ed50cbd81fdc624ee188809a18e1fea5382d1
langpacks-core-ms-3.0-16.el9.noarch.rpm
5cc7ce3d61ed2321a1b9cea917704175021482ed00e1b0ee9c470c61808912f6
langpacks-core-my-3.0-16.el9.noarch.rpm
4cddbd0514135daf207825973933aace25b203b278daa48a860b5bda10f67cc5
langpacks-core-nb-3.0-16.el9.noarch.rpm
8d20e1ae89e6b1051669e38cff27cb7c85170875c8087fbd4a96dca3b6f719e5
langpacks-core-ne-3.0-16.el9.noarch.rpm
47cadb25dee249c6af1b22751d7f4b69f57bea828a5917b7a52531c63f38e405
langpacks-core-nl-3.0-16.el9.noarch.rpm
5c22e79b43f60da286fde90e01f8e57325a2305b9a8e92a009868d60e709113e
langpacks-core-nn-3.0-16.el9.noarch.rpm
a609299b16966a1589b603f6935cfaad1ab189e629d43d6819e6229c5b27eff9
langpacks-core-nr-3.0-16.el9.noarch.rpm
7354e43ffbd9c43240cf0b31decddf66c197a4a458cec70b231738f5a58f432e
langpacks-core-nso-3.0-16.el9.noarch.rpm
e0167f1d9a9e59fd5a2bfb4fd2af307e0ec0378fd154f3ba7e0119c9c4801d45
langpacks-core-or-3.0-16.el9.noarch.rpm
75293d1259b3b52432dcb4a3ae5ea23bd4c91b0d1f80b93c476cfd13edd3ba3e
langpacks-core-pa-3.0-16.el9.noarch.rpm
32902d26d0f191afaa8716d1b398d1abb74a850f994d294e459248a2d2191e93
langpacks-core-pl-3.0-16.el9.noarch.rpm
434fa590796ebf0606d8dc1832d0aa54be6cd7dc106e297c65ca2935a147d33b
langpacks-core-pt-3.0-16.el9.noarch.rpm
47826a98e7e383f28df119003ae9c20278a5c98899a3777796dc645f8a7d5e1d
langpacks-core-pt_BR-3.0-16.el9.noarch.rpm
ed06add08cabbd428094e2e86303000178e65b4de267f0890949859920e8f264
langpacks-core-ro-3.0-16.el9.noarch.rpm
cc5df04747af1e43c1d3cd2fceb81f649bfe479555ee8161f558ad3b9c128523
langpacks-core-ru-3.0-16.el9.noarch.rpm
5285b52c39b28a1664dd63debe57212f143976ad847120875a603207fecdbba6
langpacks-core-si-3.0-16.el9.noarch.rpm
df02b8cee8cccbaa0353c9db13042c500f9fe9ee0faa21bcb3780688f4b59178
langpacks-core-sk-3.0-16.el9.noarch.rpm
d015aa064ff059f24e39fa32367c3310ee62dbacfb2ee16c3b731468ae7e87f1
langpacks-core-sl-3.0-16.el9.noarch.rpm
741c47f8083f6f892b8ce6d60ee09402800620320da88171dd296b235b17fee0
langpacks-core-sq-3.0-16.el9.noarch.rpm
ba818cbaeced0f115acc79b195a4350ec3c23b5f850469d6d27d85639ed1418b
langpacks-core-sr-3.0-16.el9.noarch.rpm
4f64f9c9ec8c8be7eca9cc3e83e75541450122c99d061e04a76558b5ccc9efbd
langpacks-core-ss-3.0-16.el9.noarch.rpm
0cb0ceaa62194de5bac17a3abd9cbb8dace92c3f6dc1a6bbc79d380ff2f25f99
langpacks-core-sv-3.0-16.el9.noarch.rpm
c78314e8b74afdea72cbd3cea3787189ce94eff738fdfa56d53bbc7d6629c7d6
langpacks-core-ta-3.0-16.el9.noarch.rpm
31434deec643fb47f028752e9e8a68b55063a242fee416ab37e8d38cdf7b45f0
langpacks-core-te-3.0-16.el9.noarch.rpm
5136fdda8c0a4c0a68185fa8d8b6c0944bb2a37d7faf3917e900035a53dbc9ea
langpacks-core-th-3.0-16.el9.noarch.rpm
8e2c238e5821f543bb422aad2f9114371b5e8a8cea6cde1fad415522856d7f9e
langpacks-core-tn-3.0-16.el9.noarch.rpm
7e8c17e10d0079447d90e9c75ab1348a6f47d0d5dc6e3cfa2a6d2ddb7b6d1d4f
langpacks-core-tr-3.0-16.el9.noarch.rpm
32f0134ae1a1ea28e2dae7baf8ea072bf04b1d7497d36ec1a4cee91d1d6ad624
langpacks-core-ts-3.0-16.el9.noarch.rpm
a0cb93779b46fe4a7bf0fd76b73123ae5c97106277bfe20b6ea3d43a326a02a3
langpacks-core-uk-3.0-16.el9.noarch.rpm
5f5d30a5648861679987605517e26630f4498dd09c2d86dacd327bcafa1cf120
langpacks-core-ur-3.0-16.el9.noarch.rpm
862d17b30d8a0ac6e5b9a47387cdb376fb8eb39543e0b5abd396deb1a1c7b8f9
langpacks-core-ve-3.0-16.el9.noarch.rpm
b9fe237445e52de90240aa72ea828b3d23a03796163050525653de9bbb46442b
langpacks-core-vi-3.0-16.el9.noarch.rpm
a933d7cc404062004529469dd740d7f5f2469a8606bc151e4f37ea31f864fcc1
langpacks-core-xh-3.0-16.el9.noarch.rpm
8e779cc31b00576e74e7deb976d6455b22531562fe32b7e982c344af8a60bcbd
langpacks-core-yi-3.0-16.el9.noarch.rpm
cba285522c98c34cafce47ff55cf5fb9572e9b160b230499bf78fb26ac0b5d3c
langpacks-core-zh_CN-3.0-16.el9.noarch.rpm
0b676e12d5d6712c58c08f1e353ebfadd39f8184d52397f189dcf782c807cbda
langpacks-core-zh_HK-3.0-16.el9.noarch.rpm
cb436e5c5487b8af73b7c80028524666d322d1c86a6c90c93e556616b93d5730
langpacks-core-zh_TW-3.0-16.el9.noarch.rpm
3b180a791572c1e218a516af22c2f4a234e13f360c2bd0cb18edef6aee499dac
langpacks-core-zu-3.0-16.el9.noarch.rpm
fcb616effd535db0d88f6206d66738c3c0e494000c7d1e6900fb1ed71042ac49
langpacks-cs-3.0-16.el9.noarch.rpm
5ef553e463013ab5df4a77e4e448392e146fb64f4bff1cfdc027e73e8b5c457f
langpacks-cy-3.0-16.el9.noarch.rpm
eb73d9d9b0ebecc9063ec69fc5cc4f44884628c6663b0305a7191fd309b3ee00
langpacks-da-3.0-16.el9.noarch.rpm
023bc270118e920d59106dfde9d2ff8ce455fe835c982354526d135e6a6f66a9
langpacks-de-3.0-16.el9.noarch.rpm
96b421f490086ebcb7fe963369f95530fe41377d39af33706f3c5e608750b60c
langpacks-dz-3.0-16.el9.noarch.rpm
24f18d9eed0c0e276955f85f9a2531a8700b8154c837473f7267f35cf79d4ebc
langpacks-el-3.0-16.el9.noarch.rpm
a7de98c2e438a228a1f59d4b42d8dd39ceb167157f3ab8c672aedaee28af2631
langpacks-en-3.0-16.el9.noarch.rpm
591882981e4e5835b47c21b591e63f3907f1aad59764e4479c0bcc8b6ae51ab6
langpacks-en_GB-3.0-16.el9.noarch.rpm
6c30d3e49cb90bdf8cccc7a636c4439f8e219afc29125f76f6e5c635d45dc936
langpacks-eo-3.0-16.el9.noarch.rpm
57a02b7749c6219dd568b96360c534b894826c81cd9fc9511454f792ef62d28a
langpacks-es-3.0-16.el9.noarch.rpm
eed4b5403c5c0047dba6e8c62294191343065908bf20d50358362dc20efdd666
langpacks-et-3.0-16.el9.noarch.rpm
0fb5d09b477c40df17f28ba0834e3dcf4637093e3c38a39235e0f54120af07d8
langpacks-eu-3.0-16.el9.noarch.rpm
661e496809d1002534c8243359c027e56105550a395099efab2ced1264884d49
langpacks-fa-3.0-16.el9.noarch.rpm
e029de9b7617a63324abcbf3f9107c9f0a4220281022fdf4a35d7deb0e1f47ce
langpacks-fi-3.0-16.el9.noarch.rpm
48c8b97e70006d2367b9b523b964b76383d78fa6b0b1753a098c7d173add9846
langpacks-fr-3.0-16.el9.noarch.rpm
ce6e99107a62ef8bbc2b7ae05328c5448dfcd5695c0d4ebe69e34075a437f70d
langpacks-ga-3.0-16.el9.noarch.rpm
5071c301345228b9efea6d15b1a3308c6bc9eef7356eb9dd9e565350153288ae
langpacks-gl-3.0-16.el9.noarch.rpm
1e26f4f7583852dcf2528fc6918ec9d99c11789a6fd14f7225dc83447cdb37c3
langpacks-gu-3.0-16.el9.noarch.rpm
b760bfe86bf99a0bc0589471c5a37b8a5a3cd1d0f0ab75ae6b61189afe5d50da
langpacks-he-3.0-16.el9.noarch.rpm
52fbce2034023f11093cfed880e6c5bac5f6d212798ed96aa9b74d1f03ea953e
langpacks-hi-3.0-16.el9.noarch.rpm
11ffa93eb287237b224ed864179594b5c177ee1a435636ebc4e9e9ac16f5020e
langpacks-hr-3.0-16.el9.noarch.rpm
a3642337d64b630b74555a1e84727adc2b363686c957565246a916726915e83b
langpacks-hu-3.0-16.el9.noarch.rpm
a5a00bba9dd51810b2fcf53a9f1a576c0772e634167e243744b258aa0a954d3f
langpacks-ia-3.0-16.el9.noarch.rpm
0e45604b78bf51a3955e71b709d525175912773cd740c6d3b1070a78ecf0e9a0
langpacks-id-3.0-16.el9.noarch.rpm
65b3615ed0002c1d0a147908a9cc3b8503438d90018dbf2edc865382046902c3
langpacks-is-3.0-16.el9.noarch.rpm
4c2085f396970ab20573c7db11ac09b0f2591c7281ad6729560ab8e67abe3a88
langpacks-it-3.0-16.el9.noarch.rpm
3f5652190e8bb810b335ad9c2f49a85740f4a622dc967fbeaa0acb6d5bf52e1a
langpacks-ja-3.0-16.el9.noarch.rpm
2bd94b44715f9a205deb62936739533984ff8bdd2031b802f218b054497d1b24
langpacks-ka-3.0-16.el9.noarch.rpm
6224d40970f2dafab580702d7cf23fde3cce7da890b059f2fcc6279fe6ffdb52
langpacks-kk-3.0-16.el9.noarch.rpm
153c577ad96cb3acc8b24e8a5817667ed1471444cc2904d3a193a80fc3b8b299
langpacks-km-3.0-16.el9.noarch.rpm
eb2fb5ed6756745044950efa3b368e44c3b80d56cbc578cc6969dac2643c0ea8
langpacks-kn-3.0-16.el9.noarch.rpm
9c3d92859f7cee7b05d366f2e7b4ab785bad53f9e1062d51f7fa4621c7996968
langpacks-ko-3.0-16.el9.noarch.rpm
3294e549413e8c1ddb0d21b87c16d2c57c08d0a28a5d170f0d8ba3f854ef4028
langpacks-ku-3.0-16.el9.noarch.rpm
8b49a842cba1bbd0a6243f0af222214a9fa5cb4838464d3bab1fe12e8a664bbe
langpacks-lt-3.0-16.el9.noarch.rpm
e3c5129d69bd6aa6650c4b204fa7cc3ce3ba4a3d6db8f67f41110414e0401cf6
langpacks-lv-3.0-16.el9.noarch.rpm
2aa2420ed38392bdd5c7eafb5d5726e91c2a0a3b49e7581e829425e12897914b
langpacks-mai-3.0-16.el9.noarch.rpm
cc36e2f4f42e6660dce6592d0387f95ed6bfe0b9ea03c244ae9acdca9c7104d4
langpacks-mk-3.0-16.el9.noarch.rpm
5e931debc3032308d754defd1e55553e21681db41fa7a4c55dec821a738e3bba
langpacks-ml-3.0-16.el9.noarch.rpm
d143c98424ecd756978473d0e5f9ae918148ac9f3575481d3b889c2ba301db69
langpacks-mr-3.0-16.el9.noarch.rpm
111b190e645f4d05befc1cae2e7b49b4de769493832df93b1e8e8dccc0dc642f
langpacks-ms-3.0-16.el9.noarch.rpm
9f311bb5c3cb6f72b4159918bd4444e071ac7de251ae3a10c917c39a814c61ce
langpacks-my-3.0-16.el9.noarch.rpm
cf1d730f9254fc49c99ae8790de7eb534834ce5492a7b199ddcd6e85e5f7000c
langpacks-nb-3.0-16.el9.noarch.rpm
72ca706585234a6900288f0b91d078a51b3502435f137b5820d7a4d709b8f35e
langpacks-ne-3.0-16.el9.noarch.rpm
2aed7a059c4a46f559a77170bcb36e3ce681204ac3a16c1544b267680988c239
langpacks-nl-3.0-16.el9.noarch.rpm
ca4ca411a52dee255a8a1d31ac97a734f4f358e67e8379dde03902391dcf5d89
langpacks-nn-3.0-16.el9.noarch.rpm
e75a932706641deecab47be576b80fe99d915fa0476f3267d68849587a0a7202
langpacks-nr-3.0-16.el9.noarch.rpm
ba7060d50e2795be40b166285013b9b68a6df19ddb83b1d3e7ca151bfe5dbf1c
langpacks-nso-3.0-16.el9.noarch.rpm
f12a64d270f4443825dfd954ecb15a032a1c8ad5a25fdd66ed74570f38bf97aa
langpacks-or-3.0-16.el9.noarch.rpm
3399992ae406a9869e049f47a0e22ceee10e087a6dc959d215e8de2f635c21af
langpacks-pa-3.0-16.el9.noarch.rpm
cab192440537f54d3407b00b1f827c5beecc184dfac1f28606ed0c70305e627f
langpacks-pl-3.0-16.el9.noarch.rpm
807605e33e3ff60c4a2f0c40e51543dce16fb67780f2f8c2b23de43cf246a7ef
langpacks-pt-3.0-16.el9.noarch.rpm
622dd74889c4765ebee036fbe6d055c326d71678ae3f93bbc49e6f21ee162f48
langpacks-pt_BR-3.0-16.el9.noarch.rpm
2ceb2719f9bfb779bd7874d0961a76785259286206f087d95577158cf6e340e6
langpacks-ro-3.0-16.el9.noarch.rpm
54f08655c837e598f4fc9ec1b7197918db1786c4a8f88887bf8601d2887ebd11
langpacks-ru-3.0-16.el9.noarch.rpm
d5d3db5295816767a695fe170047bad093463ceefd62935830bb25e4c6b0b08d
langpacks-si-3.0-16.el9.noarch.rpm
169b0dc60c5b4dc441e8446b4cfd4659a340324aa2bebe68fd01a4e329ed3f8f
langpacks-sk-3.0-16.el9.noarch.rpm
74380d25c4eb6eb22f9ebd4d0c04cc0d337886a1b7a2adf3d33e5b8336f87e5c
langpacks-sl-3.0-16.el9.noarch.rpm
def3078301060403fcced79413fda197a6a8cbecf97c0122968184ac8f83e5c4
langpacks-sq-3.0-16.el9.noarch.rpm
7d681f147e162b539307c0c26d7af7867a894fab0a33c042a498c0315dbbc2a4
langpacks-sr-3.0-16.el9.noarch.rpm
9e2d6691d81975e4dc15144cb48af32eb3023af9f35db4efe1684c2aa3b693a5
langpacks-ss-3.0-16.el9.noarch.rpm
10e27bda386153372b03715e88c7c7afa0fe75375f30ac744752b1f17e8daee5
langpacks-sv-3.0-16.el9.noarch.rpm
bb7510c6af2d476946864dc12638fc1716ef49b0248728e48940dcecd5347dd8
langpacks-ta-3.0-16.el9.noarch.rpm
4e051b5dcb4ce10c94d55f2c5d5cc24f1c09cd705af61b51436e2e44c70c40e9
langpacks-te-3.0-16.el9.noarch.rpm
2dabc8ecb97df0a5c8486f46e439907d8535720f0c37b8028e790e5972299340
langpacks-th-3.0-16.el9.noarch.rpm
ad395b750c82e64aa71b56dc10e5435996f5bd0777b24856010790bc3b0d5950
langpacks-tn-3.0-16.el9.noarch.rpm
102cf9b6a2bd6f31fa8cc87c826e7b1be9d8b10c822bb4f2531bda4bf4c00cbb
langpacks-tr-3.0-16.el9.noarch.rpm
3d1eda13fe541dc4562b8e81e347c0e138e3ccfc8bc1468854eb749df5a51cb9
langpacks-ts-3.0-16.el9.noarch.rpm
46e35afc77f2692210085e8b5bba613f0e9108e0637eb66ca7574ca0b53f1066
langpacks-uk-3.0-16.el9.noarch.rpm
05293e9c10d79264f39a3c7f5f926977ddf3f7f698ca2d1b59dedfc07409a5ee
langpacks-ur-3.0-16.el9.noarch.rpm
fbf037b911f636f6c04d43ad5b2904331ff2784519469fdb7045287678c3241d
langpacks-ve-3.0-16.el9.noarch.rpm
92e855e1c3f3e5eb52f348525bd86685cdd847f26eb3fa4ba577c1008ff8dcaf
langpacks-vi-3.0-16.el9.noarch.rpm
624b785333c9587326aedbf1b43ced6e5cce3a6750fd308de3d6a7a114657f59
langpacks-xh-3.0-16.el9.noarch.rpm
f1f0468a75e32e83be84d94236032b169d3eb9f5a794d7f413efd29fb6e6aab6
langpacks-yi-3.0-16.el9.noarch.rpm
78397df9310f8696ec51d8e041d7930863f95a60a7bafa96fc9a94618a919eba
langpacks-zh_CN-3.0-16.el9.noarch.rpm
e3f7d868b93efa040b8e044a64fb67c09de82d78c3bd69391a33cce60675f02e
langpacks-zh_HK-3.0-16.el9.noarch.rpm
f606960f23f7db4e872e359eefe2e8f9d9cf8a02be9fe34e170270ead8d21996
langpacks-zh_TW-3.0-16.el9.noarch.rpm
3d88a4abce16d0bd18c107ea0e86f2b8d074abbb003e9549492158954fe045a4
langpacks-zu-3.0-16.el9.noarch.rpm
48d8ccf74425be8fbb68e8d6fb5102a0a768f2ae3b9c5ad1d86420fcb7160bf9
RLBA-2022:3118
new packages: langtable
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for langtable.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
langtable-0.0.54-4.el9.noarch.rpm
1560d5022abbc0a1eba93bc177c3d092968178a1847e6c83403536bb3470c0d8
python3-langtable-0.0.54-4.el9.noarch.rpm
ef91f4287e03a212219573ff97afe054571404f7d6ed30b3c74801f77217b9c6
RLBA-2022:3119
new packages: lapack
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lapack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
blas-3.9.0-8.el9.i686.rpm
ebad46f4e2fad45e534ba6bbc9df153d6842b9c169f4f6c0f978bddfbb498f13
blas-3.9.0-8.el9.x86_64.rpm
851f8672e184a9559b9eac883f9d313effc98b229b5c6998f08fb95af576ebbd
lapack-3.9.0-8.el9.i686.rpm
7dfc8c6a5d60dfc23303e3dfd75e97fd1882106bfc3d5cc4aa0458e6d02484d6
lapack-3.9.0-8.el9.x86_64.rpm
1a536d4d6cb79bd3f8aa0d31d941fc58aac684438279fcdf27fce903ba9d1357
RLBA-2022:3120
new packages: lasso
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lasso.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lasso-2.7.0-8.el9.i686.rpm
b934f1997ec363f8e2956bafb2b6d10f9fc121f9e0d2ca4944fe19bc21e0c434
lasso-2.7.0-8.el9.x86_64.rpm
7eeeb43b7b5d00e565534830cefa11aa3cf0e787a017dd0a9ab23c9f7c236906
RLBA-2022:3121
new packages: lato-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lato-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lato-fonts-2.015-14.el9.noarch.rpm
f2d21e33e88eaeb3966ec400278279de1b5067d0e8eb08fb0e1647a35c3f6551
RLBA-2022:3122
new packages: lcms2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lcms2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lcms2-2.12-3.el9.i686.rpm
0bb687a9dc452f451f0dd8ea188ce2caf347abf1c0f1a992bdd45afcf59a1c7d
lcms2-2.12-3.el9.x86_64.rpm
f7cf689b4e88369620ed8f2a8077126e728935b3a78d8c16f44f81d6b38bb1d1
lcms2-devel-2.12-3.el9.i686.rpm
3a586695430a41b98abca198dfea61476b667406f3e0f01da88b907c925d60cf
lcms2-devel-2.12-3.el9.x86_64.rpm
acdf2128872c75f4a9f26537ec94113bf08828408e14c3ba9b90ca8c3abc1c98
RLBA-2022:3123
new packages: leptonica
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for leptonica.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
leptonica-1.80.0-4.el9.1.i686.rpm
6c9873fa0a49c1b6051c5192888f7a5529408042d89b2f8fb5431982a3a453b6
leptonica-1.80.0-4.el9.1.x86_64.rpm
5ad6e3210ab480dc1b42d200d11c8c0df1a1772e3ed549b87bdede4074fb9e44
RLBA-2022:3124
new packages: lftp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lftp-4.9.2-4.el9.i686.rpm
6aa420195797d630af13a02179e70a6d6e325ba25389fbd53fb91fe2f55f8e90
lftp-4.9.2-4.el9.x86_64.rpm
7f439c7364d18e6e0e4d87ee41b663f904ce7976372a3f4b1cb0df2c4cbdd67e
RLBA-2022:3125
new packages: libICE
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libICE.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libICE-1.0.10-8.el9.i686.rpm
af047dc8772a2cae6655bc6a322ddd8de9bb06773e4eb3fc8cf2a03adad2d7a8
libICE-1.0.10-8.el9.x86_64.rpm
cf73a6d5729b2888f5f629f45106e47ae673c72b902955784d3abef7c9a13696
libICE-devel-1.0.10-8.el9.i686.rpm
70ff7b8c0814a6ed5887639d36ea90b24498d5ff1e50df02151445b4bced2f2b
libICE-devel-1.0.10-8.el9.x86_64.rpm
eff8e3cb5370258f1a04205effe1741b0cbbbe728027145cb220ebb0fa15352b
RLBA-2022:3126
new packages: libSM
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libSM.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libSM-1.2.3-10.el9.i686.rpm
d116c1eb65b9ca72c8c64f3d7097044a5494ebaee7352893d9b1046a73562788
libSM-1.2.3-10.el9.x86_64.rpm
86af171005be195c9296a65c0f86b744f608c0ec7e14459d0836e33a8d0129f7
libSM-devel-1.2.3-10.el9.i686.rpm
9bb836e5c6eafe0dbf4dc40c6f505f78341e1c0a61d95d57d54a145e763e619a
libSM-devel-1.2.3-10.el9.x86_64.rpm
306a7e15d3095532a378382c308875bde7881a43746e71d2659bdad8a02df561
RLBA-2022:3127
new packages: libX11
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libX11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libX11-1.7.0-7.el9.i686.rpm
1d79c9c277e81e11540d4f6b5a8849b7a34a1a8bf1bc1a201976a02b01389063
libX11-1.7.0-7.el9.x86_64.rpm
8162e2d25c807c473f8559f042bbebed27fe6acb9ec8df46d243850f3a687fa5
libX11-common-1.7.0-7.el9.noarch.rpm
ada046fb459ae18b792e570ecbdf3bc89afadf45b0f7e10761fdd00c061c4c62
libX11-devel-1.7.0-7.el9.i686.rpm
4d2274b809b32edd13fa196f03e4745032af9d01deaaa13855d86b4df7e2b470
libX11-devel-1.7.0-7.el9.x86_64.rpm
50b556b29899f258863b35dd099ee7d2b5731b3216eb552e23e3d20f9c45c7e4
libX11-xcb-1.7.0-7.el9.i686.rpm
38bafd811016229ce899b546722b399d5487026126ba14d1ed26804839f4b30e
libX11-xcb-1.7.0-7.el9.x86_64.rpm
7b9e224a0c54f1a4eae7eba0d86ff1cddf2117c63cf25f9be1d402d351cb40cd
RLBA-2022:3128
new packages: libXScrnSaver
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXScrnSaver.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXScrnSaver-1.2.3-10.el9.i686.rpm
58eb5c3c334afcb5e85a614ab4c82c485115b0d98afbf8f098f1a56e09bde6a1
libXScrnSaver-1.2.3-10.el9.x86_64.rpm
9f8ba1b5e19febf274a8d1de46db7c64fc223a42f1144b975321815813ac4b82
libXScrnSaver-devel-1.2.3-10.el9.i686.rpm
7456d09a85ba908c0cc6e141b93a38d30600c80bd568443463a59a6919c8f7f6
libXScrnSaver-devel-1.2.3-10.el9.x86_64.rpm
3f85e1afa903e62e1f8a85216ed85d741ad92b89eb5015fbb09bb8d0e7b7e126
RLBA-2022:3129
new packages: libXau
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXau.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXau-1.0.9-8.el9.i686.rpm
57cb9e6bbe5949bd4fa26f55e93840f35d530ace542ecd3d50273bd2e82c47cc
libXau-1.0.9-8.el9.x86_64.rpm
335f72e8070dd3179d129af94b6bd272c0b4a4b83ffa38522e393ee3706acf4c
libXau-devel-1.0.9-8.el9.i686.rpm
102e1dfb6a0857ddff98d102e2c7ff4b52579f6737b5ba1c471c3c13348c66a6
libXau-devel-1.0.9-8.el9.x86_64.rpm
0a47fab42690110686d56742aa81b4d1cca60ebd6eb10f4d5c8a7edcfce41011
RLBA-2022:3130
new packages: libXaw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXaw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXaw-1.0.13-19.el9.i686.rpm
85068d34af740eef32a9c6ce7b4528ebf85d6226d6cf352d51561e1ccdab92be
libXaw-1.0.13-19.el9.x86_64.rpm
85266646b841f398a2ee65797419cf89f2bc7cacc89295e243936e936a4338d4
libXaw-devel-1.0.13-19.el9.i686.rpm
1b07b4ddaa7c23c6a856a76866f63d3a41c9b2d09f22b0369ba4161888fc4f37
libXaw-devel-1.0.13-19.el9.x86_64.rpm
21fd7f310ad107212607fb1cff9a3c2691c317843c0ba59c84cbd88ecd4e0107
RLBA-2022:3131
new packages: libXcomposite
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXcomposite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXcomposite-0.4.5-7.el9.i686.rpm
83c5832afc94953b00af288f62a3e646023e72351e25b7042acf3af8b1402602
libXcomposite-0.4.5-7.el9.x86_64.rpm
d63a25a6ec5b44371569aaf0790e58ef88a7deae5a97c0824389c2e28212786b
libXcomposite-devel-0.4.5-7.el9.i686.rpm
4da99bbc611fa5b4a114b1e7071672adbce0335f2368dc46f762693aa4e1d2cb
libXcomposite-devel-0.4.5-7.el9.x86_64.rpm
0b3f223536564caf1463579dbbae8578a788b0b6e6ac9aa365e146f6c226658a
RLBA-2022:3132
new packages: libXcursor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXcursor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXcursor-1.2.0-7.el9.i686.rpm
79ff6cf56df3da5fd843a664485d02831ca25c812d4554c4b60c39b5f13f7f1a
libXcursor-1.2.0-7.el9.x86_64.rpm
311e8fa754d5897c8e790cca9ab281936f66e795704f7cbe18baec13f692608c
libXcursor-devel-1.2.0-7.el9.i686.rpm
8b24aa4e0a967a7acee3b55267e0105fee81ededc1f008acaf8873dda7233aae
libXcursor-devel-1.2.0-7.el9.x86_64.rpm
2e0135f7d4af771339ed4a7b179138b8af4a892da81e5d29b47cba9cd0016090
RLBA-2022:3133
new packages: libXdamage
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXdamage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXdamage-1.1.5-7.el9.i686.rpm
bfa94f8edec93659c528174d3f93c8a603bb6c15fbda0db6c6003c951ef10d0e
libXdamage-1.1.5-7.el9.x86_64.rpm
e35fb4a9b632ca4226f4d2a81ffced45a23825149d6edcafcefb896c3a38e59c
libXdamage-devel-1.1.5-7.el9.i686.rpm
bd9fb6243077c017cabbd580ed82734a40512a1396a8d13e63fb031f1ab6415d
libXdamage-devel-1.1.5-7.el9.x86_64.rpm
a482efaecd2006efe7cb85588beacec03a36fabdfdcec2d4ed1b539acaed5cd4
RLBA-2022:3134
new packages: libXdmcp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXdmcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXdmcp-1.1.3-8.el9.i686.rpm
7ae237f0f1643a37171a33aac3ddc18ddd06280f2b6cfb4ff83934c4e588804d
libXdmcp-1.1.3-8.el9.x86_64.rpm
a9ca0c3bcebc9d7e882c55c444e342e04aab1a2a90a95aafca0eb1dd258e2d93
RLBA-2022:3135
new packages: libXext
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXext.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXext-1.3.4-8.el9.i686.rpm
4f7579380c046a045b0c75facdd87b7e15c3c6363a01e855e54713dda3679875
libXext-1.3.4-8.el9.x86_64.rpm
45c8e6d796a66e91b5b4230e493be44fdafe389592eb2cce6400d209b0ac5f9f
libXext-devel-1.3.4-8.el9.i686.rpm
9fd81ea3cdb4b1a8514a66a9abd80ee0981b72d0cb4bff0fa3f192b0072c57ce
libXext-devel-1.3.4-8.el9.x86_64.rpm
9112ebe132868a03ec755ee5824ced4c4664ea979f7a509c5d07fce2aa29930b
RLBA-2022:3136
new packages: libXfixes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXfixes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXfixes-5.0.3-16.el9.i686.rpm
cb72af73b2057af146be88b02d96942f6c36341e4f192400fff731919088841c
libXfixes-5.0.3-16.el9.x86_64.rpm
c2089ff858c950e403f302b071e2c6a871a424ac1ac8f6eb29bc24e61b692dcf
libXfixes-devel-5.0.3-16.el9.i686.rpm
a0db3ab53eefd615dd45ff479df77915ec1766256360365104e8efe9e3f50312
libXfixes-devel-5.0.3-16.el9.x86_64.rpm
ae95e774652f6364e708c12ba259c37fef6bc4e25e898e8ba6d6112ee7443013
RLBA-2022:3137
new packages: libXfont2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXfont2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXfont2-2.0.3-12.el9.i686.rpm
09fd6f7d2433fb7b0587dbb7010a0d547b63030c397526040c38bb07de7b40ad
libXfont2-2.0.3-12.el9.x86_64.rpm
fdf69ba1bb50bcf1d182e51fe2ef943a06d60eff01d8df6d0ce94d943177063b
RLBA-2022:3138
new packages: libXft
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXft.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXft-2.3.3-8.el9.i686.rpm
1912dfe8bd492369c8a865a9af23029386adea611f04c2f906665565036d6d48
libXft-2.3.3-8.el9.x86_64.rpm
7fd443896652bbc7685fbda98d2ddaea36cf9f4840b8c79fe77005dc1315e194
libXft-devel-2.3.3-8.el9.i686.rpm
fb9f04690b0cb168e08d37d518c572e92960e48ebf240066ece0d55446e1d7b7
libXft-devel-2.3.3-8.el9.x86_64.rpm
7fb33dd8a3a88816c44f229704d2b38dc15c63b38c34aec57b37eda1b68d1626
RLBA-2022:3139
new packages: libXi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXi-1.7.10-8.el9.i686.rpm
94f0da337b2112dd7626b3a7f4c48bc8831867455dacb8fc8413eb3c4c7bdd22
libXi-1.7.10-8.el9.x86_64.rpm
f9299e304d6ceca0afecacc52e3a8f1ded57d522bf0d4df80727b4038688e445
libXi-devel-1.7.10-8.el9.i686.rpm
6f38df4b29b9d641fee9eae32fb489812f0b87f41dfbcf4557e0b5a3f0d7dce9
libXi-devel-1.7.10-8.el9.x86_64.rpm
17c1bd58fb23258069b28b04d6e48e972584ea4604e114ebadca7ecdacf9aa82
RLBA-2022:3140
new packages: libXinerama
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXinerama.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXinerama-1.1.4-10.el9.i686.rpm
23c4a2b53f055676d0bde64b3771c552c93310fb0c9ea3df4b8ddf44ef27bbc6
libXinerama-1.1.4-10.el9.x86_64.rpm
aa25538dcbab918287de6cc0dfa7b585cee4ea1c35ed01ce4ed22bb13e69c83c
libXinerama-devel-1.1.4-10.el9.i686.rpm
9522afbb753d16d92c9b7ad76dd5a0a0a0734b3ef0215d23a53caa2e5dac7d48
libXinerama-devel-1.1.4-10.el9.x86_64.rpm
20e00bd0ad1da9c1fe0d5b265a2ad1dabf9cea980967fc52a01d39ad2be02060
RLBA-2022:3141
new packages: libXmu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXmu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXmu-1.1.3-8.el9.i686.rpm
45abc3a9e72669a606c2aa9411a5578838e9d57aa856a5d0c64e3203d4c409cc
libXmu-1.1.3-8.el9.x86_64.rpm
d19e8bcce562a3bf1ca45510d3ce5ea76f31bbda14d64c0b882c73331c2bb8cb
libXmu-devel-1.1.3-8.el9.i686.rpm
caa3d3afc923b00373f9d014d4595f78649f1277a43fff84ba0c01a285e2e870
libXmu-devel-1.1.3-8.el9.x86_64.rpm
5aa71da0d8db9cb1706560934360f3e7a3f6352772f67709e6576208efd95d62
RLBA-2022:3142
new packages: libXp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXp-1.0.3-11.el9.i686.rpm
fa27510d1ed4118e2869871a009553b33546d6cbe8ba362cf69d78a5b1739d4e
libXp-1.0.3-11.el9.x86_64.rpm
14d4cbc45d7c31c6b9d66bda9f78ae1ca51c939d7eff66dfd61557d5d4c64929
libXp-devel-1.0.3-11.el9.i686.rpm
4e2d35804980cfa4626ff2e0516c2e666f49d370c9055ac0188c8f3164550d94
libXp-devel-1.0.3-11.el9.x86_64.rpm
6302e0a1b54ebe8732509cad56dbb97a7878084c12349d9f8fcbe28978fa93ac
RLBA-2022:3144
new packages: libXrandr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXrandr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXrandr-1.5.2-8.el9.i686.rpm
06119d874152a7fe522fbf69be76cb5459c5683ef117feb5ebbed7cc2c6e1a87
libXrandr-1.5.2-8.el9.x86_64.rpm
adb1b07da2091c35027477f6c24d1874a6965565fd0f21a9ac1a0a6f8104407d
libXrandr-devel-1.5.2-8.el9.i686.rpm
aaee00be97bf3f22d0801d8e863da3923d073dd62908d66d8e1ce35c5fea10f1
libXrandr-devel-1.5.2-8.el9.x86_64.rpm
4e874d224a9209bf44a3ea87ca92e9f742585892753a6018f209b46ea5bf7052
RLBA-2022:3146
new packages: libXres
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXres.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXres-1.2.0-14.el9.i686.rpm
b511a9b138e0dea98ddbb278cf12ef0773a7164e10079867bb0959a369fcb930
libXres-1.2.0-14.el9.x86_64.rpm
9211d57a5d2f77ce93b7f743b02aae0c4aea71076e03fbf93a341f669f880ba7
RLBA-2022:3145
new packages: libXrender
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXrender.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXrender-0.9.10-16.el9.i686.rpm
c6a41f3a5ddd6c74efdbd3e6a6325cd817d286d242aabe7db7dce723a5b16b2b
libXrender-0.9.10-16.el9.x86_64.rpm
1e7f886a15aafea4345a6c5679b97f4690ca03d80168984cfa34dcd785159361
libXrender-devel-0.9.10-16.el9.i686.rpm
bb56479293d846e85cf435ff5f72866d5c914eee1c6dc4d5b8cba94ba53adc05
libXrender-devel-0.9.10-16.el9.x86_64.rpm
d4e647bc73ff22c752f62c11135ca8b2afa1e002a5bac0d7be11bf9fec7d95fd
RLBA-2022:3147
new packages: libXt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXt-1.2.0-6.el9.i686.rpm
caf787a46cfd27d39e37d39f02b9b78d6efc5b2e71e3f50b4be6e32148255eca
libXt-1.2.0-6.el9.x86_64.rpm
63443cb00ae22dacc37cef0934017d5d9ba106d281fb34f2a76164033fc435d7
libXt-devel-1.2.0-6.el9.i686.rpm
5d328158362dbe862ef50a2a798d75278b80a2b8f7353456559833eae8f734c4
libXt-devel-1.2.0-6.el9.x86_64.rpm
198e40b37857fcb735963b7621a0fdc07f9391b937bd9d9c625eca97080c4521
RLBA-2022:3148
new packages: libXtst
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXtst.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXtst-1.2.3-16.el9.i686.rpm
0acf01b3f6d246e8ac689777737ae87ba7c72444f3b935fc21e8c6e702753727
libXtst-1.2.3-16.el9.x86_64.rpm
83f234bc485ed247fe5bd283acb1458d53329525318dbbf7f29121bf4fd2543a
libXtst-devel-1.2.3-16.el9.i686.rpm
2060e85e72d21b0c5c11d8152710204db3dae05f262d40f5e29978f8eceaeec9
libXtst-devel-1.2.3-16.el9.x86_64.rpm
fb0968ab4ecd7252d060d22845212bb4dda69a1434794a15e9b8cfbeac859929
RLBA-2022:3149
new packages: libXv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXv-1.0.11-16.el9.i686.rpm
71f624dcec94cc84ea10e9651b684fcd3c941f37b33377b76a6e7fd1a49ce4a1
libXv-1.0.11-16.el9.x86_64.rpm
5d14bad7acdb5b036fe1e280b0a816ae78de449f7bd10dc876178e3f8d24a2c1
libXv-devel-1.0.11-16.el9.i686.rpm
07ad8d4dea5f92aac50ddcee2dfc09ea7f9b0123834e9672658e834ef0b90d5e
libXv-devel-1.0.11-16.el9.x86_64.rpm
6a15d4a5d158d40ae5d09a5feb4d0c76faec1192b7b04c87a9345c43bdf960a5
RLBA-2022:3150
new packages: libXxf86dga
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXxf86dga.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXxf86dga-1.1.5-8.el9.i686.rpm
a60b1cb2dd225059e822fa423b6923401e77bdb454e2085502709768386bbb10
libXxf86dga-1.1.5-8.el9.x86_64.rpm
9ea5d7e3888548c823c25a43f025a81d5184107a5d6c42fb399cecd2d3fe8d22
libXxf86dga-devel-1.1.5-8.el9.i686.rpm
7851a33e96e23e19f3622504aff6802c69dbe61f2d0df33f6bae1bbbdb4d8e11
libXxf86dga-devel-1.1.5-8.el9.x86_64.rpm
925f01d80e93b763c4ac513bf47d1b958fa99fd8fe0e1369c3c54d4b18654767
RLBA-2022:3151
new packages: libXxf86vm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXxf86vm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXxf86vm-1.1.4-18.el9.i686.rpm
ad183ce975f759327653bd9b24bfd306eec6df2a98be87bb17ba2dbbc4696f4f
libXxf86vm-1.1.4-18.el9.x86_64.rpm
05bfc543291a482c3de7804ca66a5451edef43c91d2b599bce81bfbb44b93cdd
RLBA-2022:3152
new packages: libabw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libabw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libabw-0.1.3-7.el9.i686.rpm
15eab9c13f7883ffab9187677e1b96eddf87c9cfa431423315d7952397bb32af
libabw-0.1.3-7.el9.x86_64.rpm
57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09
RLBA-2022:3153
new packages: libao
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libao.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libao-1.2.0-22.el9.i686.rpm
469a646509499191fb645cf230b9fddc5e8fba17ab1167f1f6fc48d0eb6f5064
libao-1.2.0-22.el9.x86_64.rpm
44d77e9fe8733a8eca10eba8354b2e24a76db036844d08e7422f9f2825e4fd58
RLBA-2022:3154
new packages: libappstream-glib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libappstream-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libappstream-glib-0.7.18-4.el9.i686.rpm
5282207860b80ce69969b865e94693ee353c33beabb31f7f19c32aa36d33c33c
libappstream-glib-0.7.18-4.el9.x86_64.rpm
7599776277f865bf7778711d3d62185d42309847b94801c74a8623ebf0ae526e
RLBA-2022:3155
new packages: libasyncns
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libasyncns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libasyncns-0.8-22.el9.i686.rpm
222f5228a91daff60bb51e0a351fd14b881e299a21ebfb8d8f84888e60150cdf
libasyncns-0.8-22.el9.x86_64.rpm
c4e0f32330d3eba8546a9f8b92952f1cd461d09a92cd7d80751d16338acee6c7
RLBA-2022:3156
new packages: libatasmart
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libatasmart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libatasmart-0.19-22.el9.i686.rpm
170f9363063be2f4a2a5539e69147d4f2d5956798c764eb7cb2352b0e4cb5c52
libatasmart-0.19-22.el9.x86_64.rpm
d4fbcc1d9b791040471311860f5eba8404816e367b00004b50d76859c06c5ce5
RLBA-2022:3157
new packages: libbase
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libbase-1.1.3-31.el9.noarch.rpm
0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738
RLBA-2022:3158
new packages: libbytesize
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libbytesize.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libbytesize-2.5-3.el9.i686.rpm
e6ab43d53294c1dfeea578058c326a337922e8bfe2cf300f40de732a71d318aa
libbytesize-2.5-3.el9.x86_64.rpm
2f33d75361f43d90983fcccff3c972167efa4906900121ad885e7c86cdc7f5fa
python3-bytesize-2.5-3.el9.x86_64.rpm
039bdcd5a20ac8721beab51a51b10dc1c5f4ee9196c205279bd49b65095b9487
RLBA-2022:3159
new packages: libcanberra
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcanberra.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcanberra-0.30-26.el9.i686.rpm
36fa6a0f18f6ab7b146bb9e1a6c4f6777ce12a2dddab1655feea509d9de93750
libcanberra-0.30-26.el9.x86_64.rpm
c23330111faf4001c75b9abcc529199abd7c29d931fa1545ab278333a6d2773e
libcanberra-devel-0.30-26.el9.i686.rpm
0d27fd277ac91b1c57d54615ca6eee190d507d2e8e2c1c1d4d4616cc3167cf1b
libcanberra-devel-0.30-26.el9.x86_64.rpm
0a95f8ae61c6e5a3177d56ab95b0e6b6416b4d69e8a1ebe1af8ed622108391e6
libcanberra-gtk2-0.30-26.el9.i686.rpm
7087b4014a50edd82eac0efe6764c17a55f76081924fb01ad91df02d98ea79bd
libcanberra-gtk2-0.30-26.el9.x86_64.rpm
ef64949a88b809cbbc7281117938b5ccc5c8ae0ebc10b44be59f3aef50d63713
libcanberra-gtk3-0.30-26.el9.i686.rpm
62a00913d58ebca5c05319c76c17089c03ae2f88e75a5624142578bc14383f70
libcanberra-gtk3-0.30-26.el9.x86_64.rpm
ccdd9f877f9ccd1d2854cb17d3a215c22547aed31f1af788a2d47847ebdcdb79
RLBA-2022:3160
new packages: libcdio
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcdio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcdio-2.1.0-6.el9.i686.rpm
f816e5b4ea4373ed93b4f4479eec6dc011718d57bf3e0bce12db97701083f8e6
libcdio-2.1.0-6.el9.x86_64.rpm
1bd1452dc0bad4a41c8adfe3e876860f8324881918f6f626078fbfb112de5a0e
RLBA-2022:3161
new packages: libcdio-paranoia
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcdio-paranoia.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcdio-paranoia-10.2+2.0.1-6.el9.i686.rpm
43a79ae64d746b9b2922f183031b3af4e49f45f35682a14b440bfdc28b7fdd0f
libcdio-paranoia-10.2+2.0.1-6.el9.x86_64.rpm
d08101ba49a6f93a6ef2a531b0c4efd713aa3dedb8e6a8a1be45afe9292d835c
RLBA-2022:3162
new packages: libcdr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcdr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcdr-0.1.7-3.el9.i686.rpm
0614480e3518b8982c318bbbb1e71097b1ec74dd9bb21eee0c3f007b2775657b
libcdr-0.1.7-3.el9.x86_64.rpm
416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22
RLBA-2022:3163
new packages: libcmis
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcmis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcmis-0.5.2-12.el9.i686.rpm
7744f7b1ce14a64f30d210727a8b57135e1a85e152b0ce1cd1a2db708f7a5f48
libcmis-0.5.2-12.el9.x86_64.rpm
a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76
RLBA-2022:3164
new packages: libdatrie
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdatrie.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdatrie-0.2.13-4.el9.i686.rpm
fd1e5f28c41e4123ee3beb34cf13eecdf68fe8db96017fa617b80bf7593f170d
libdatrie-0.2.13-4.el9.x86_64.rpm
820f090a87181c921892fdb5744c53cb935eca5e303d4adbaba0d04ae35a4a61
libdatrie-devel-0.2.13-4.el9.i686.rpm
4f35387a2506b3b0106d91118ad55bafc636d5d49d4bc4f7ce61d456866ccb25
libdatrie-devel-0.2.13-4.el9.x86_64.rpm
1e326749acfccabeb330a0e6fb6600442ebd116f71f890a60a58406496793b98
RLBA-2022:3167
new packages: libdvdnav
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdvdnav.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdvdnav-6.1.0-4.el9.i686.rpm
76f165127ca3a9676370f91987a0af1410bb6ed35828efd51c15e79be72c29cb
libdvdnav-6.1.0-4.el9.x86_64.rpm
3faa815709ce56d5e019796131157f206f16dc55ba873c1242424b0cbae94a70
RLBA-2022:3169
new packages: libecap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libecap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libecap-1.0.1-10.el9.i686.rpm
e6303a586e9eed0b96650c898f825ef09128014946e7bb03cf931a2d3c17e9cc
libecap-1.0.1-10.el9.x86_64.rpm
7197f3758ca4eb891cd6df1251bdb3556af1eecc58c05b091b25c349081199a7
libecap-devel-1.0.1-10.el9.i686.rpm
fc5c26b6269f02cc26f4f1cde051aadce672a49fd0b03961128f286380394548
libecap-devel-1.0.1-10.el9.x86_64.rpm
e888d59fab8ebafae165120df6c0e24fb78e7ebeddd2ed4d5393b6ddbd24682d
RLBA-2022:3165
new packages: libdazzle
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdazzle.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdazzle-3.40.0-3.el9.i686.rpm
2dfee94e36b5d9f987e57f78f70477ba2eb8a7ccf21a7d190d87f2aa10ab4808
libdazzle-3.40.0-3.el9.x86_64.rpm
334b0b1a1acf82ed6efb046bb71f7230256fae18045d1492fe021798e2b88199
RLBA-2022:3166
new packages: libdmx
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdmx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdmx-1.1.4-12.el9.i686.rpm
9aeec567f7e56ebe90254b7e5d3182b17424ccd9f2d9b425d0e466ec24a966f0
libdmx-1.1.4-12.el9.x86_64.rpm
9b4246817e5840a5a5e4c5bc4f88f9b13d570066db9da556cd40829726ed4e79
RLBA-2022:3168
new packages: libdvdread
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdvdread.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdvdread-6.1.1-4.el9.i686.rpm
02bb37f8edb271f636a3f772511782716a2729c46bbc1e29404d212eef95d0d3
libdvdread-6.1.1-4.el9.x86_64.rpm
ffa468092ad6a2ce5166376778704a54fa28c153ef80ccf8c422643428f42adb
RLBA-2022:3170
new packages: libell
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libell-0.41-4.el9.i686.rpm
14d84d178d9d928babe8ed1556d57f1e3d56989177c6955f5a6b607950edeb26
libell-0.41-4.el9.x86_64.rpm
76f3bd812341db30417414c03a9474cbc3570c00e8fa09147d800cb42deff533
RLBA-2022:3171
new packages: libepoxy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libepoxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libepoxy-1.5.5-4.el9.i686.rpm
64faf19b50658179e10fb44d48b6a1ba256abbf30938095c0d5d1e5f97b4153e
libepoxy-1.5.5-4.el9.x86_64.rpm
6520de86c5183ff8b3ddfe27640b898627ef3987419128dd71c088f5d5e9bcb3
libepoxy-devel-1.5.5-4.el9.i686.rpm
5ae17bf8c560f66e13329995ddfa39ea0ee7b52bfa8cd90527a78ff0461f447c
libepoxy-devel-1.5.5-4.el9.x86_64.rpm
86b2a9988f3ed5b7f9c810e525588f98a2667af67e1aacdb61556ba30eb1af4a
RLBA-2022:3172
new packages: libepubgen
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libepubgen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libepubgen-0.1.1-9.el9.i686.rpm
848402b649eef92488c6bb20b97b5d2e33b6be248980eb7297dd362d9ab899fc
libepubgen-0.1.1-9.el9.x86_64.rpm
cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398
RLBA-2022:3173
new packages: liberation-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liberation-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liberation-fonts-2.1.3-4.el9.noarch.rpm
7d7ba08fa5bc1e356c8039fb512953ef13d943a984268b3eb2eaa2c6bad83862
liberation-fonts-common-2.1.3-4.el9.noarch.rpm
14af23e3af64c7548ef01e923484512a471bf4df80ae022c7967180519d12ba7
liberation-mono-fonts-2.1.3-4.el9.noarch.rpm
dd7103b13739d6c67ad6b79bac32971794ac96171fb21da541821e37fa59cc03
liberation-sans-fonts-2.1.3-4.el9.noarch.rpm
cf9cc9c939c501a69079a87b872a33ab34b9a9e49c4118856dc4a30bc1f80f49
liberation-serif-fonts-2.1.3-4.el9.noarch.rpm
6148528532a0dcf81bfe74aa92b7b9ed29d8c9a052f0964083796cf4735c5602
RLBA-2022:3174
new packages: liberation-narrow-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liberation-narrow-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liberation-narrow-fonts-1.07.6-9.el9.noarch.rpm
d390ff7a104b1b49d73a71c18c67bcd5ad10813a0cf260ac83772d9413ba3366
RLBA-2022:3176
new packages: libetonyek
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libetonyek.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libetonyek-0.1.10-2.el9.i686.rpm
74fba126b9ca06ec0529f675d88a1af2898c8302d9b5fb61e99954027c331e6a
libetonyek-0.1.10-2.el9.x86_64.rpm
a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806
RLBA-2022:3177
new packages: libevdev
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libevdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libevdev-1.11.0-3.el9.i686.rpm
c301d9e380ad02e5545ddbd703d4fdff8094d4a79bc0b7b276efde8e7a83f9cd
libevdev-1.11.0-3.el9.x86_64.rpm
6e62f64bd004b988017571a11b72d9b177d75368236f17af81b4c479ce8d5e31
RLBA-2022:3178
new packages: libexif
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libexif.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libexif-0.6.22-6.el9.i686.rpm
1330df60b4d35e14c8bc3556379bf81c15178b24a4c4496fc12325fad45b55ed
libexif-0.6.22-6.el9.x86_64.rpm
e72ca599be38763524b3c1c5d6ea5c1efc5f20cf979398f4628caff834dffe62
RLBA-2022:3179
new packages: libexttextcat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libexttextcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libexttextcat-3.4.5-11.el9.i686.rpm
afddb67e3855df0f64de8906d43aa38d09465b1cfd88260927730dc4c9f20b23
libexttextcat-3.4.5-11.el9.x86_64.rpm
693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245
RLBA-2022:3180
new packages: libfastjson
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfastjson.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libfastjson-0.99.9-3.el9.i686.rpm
25b6c34763c7134e9c6d5154c2f53aae041fd319fc1aa21be52e2b456feb764a
libfastjson-0.99.9-3.el9.x86_64.rpm
ce22f4ed04a47249099a2af7bba764e0f4b93c62798e27f6dd936b1e6c964c62
RLBA-2022:3181
new packages: libfontenc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfontenc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libfontenc-1.1.3-17.el9.i686.rpm
7eab7eddb95eb1a69c87ec92653673e56edd35911f072a97c0bc630d7e2f4784
libfontenc-1.1.3-17.el9.x86_64.rpm
867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23
RLBA-2022:3182
new packages: libfonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libfonts-1.1.3-35.el9.noarch.rpm
6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081
RLBA-2022:3183
new packages: libformula
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libformula.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libformula-1.1.3-32.el9.noarch.rpm
bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b
RLBA-2022:3184
new packages: libfprint
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfprint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libfprint-1.94.0-3.el9.i686.rpm
604d53446f84e7250328fc9ff7d0c31ea796fb5e8e170eab3e6bd50abd3fab7f
libfprint-1.94.0-3.el9.x86_64.rpm
0646a04de10e47e9271fbc6455cbca18c6e92a81b6af96c7aeff84e235ae0173
RLBA-2022:3185
new packages: libfreehand
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfreehand.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libfreehand-0.1.2-11.el9.i686.rpm
427c2fd77ae5b14283c2d75cb67305d5b821c77357948b3c01d006187145d0d5
libfreehand-0.1.2-11.el9.x86_64.rpm
443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d
RLBA-2022:3186
new packages: libgdata
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgdata-0.18.1-4.el9.i686.rpm
3e5b9ada7f6794d2bc4fac9cefd88cf3d7333c10284c2e0165147180edb6eb83
libgdata-0.18.1-4.el9.x86_64.rpm
5a5fa4a6f766cf6f3ea9a8c93c54f34f96ebb16e14e5e4483586970e8efca8d5
libgdata-devel-0.18.1-4.el9.i686.rpm
0bc1d7d49ec888794e1fe27e2589d1b4dfddc4c7f0e012cbaeda9c6b1e73d48e
libgdata-devel-0.18.1-4.el9.x86_64.rpm
3a95a739d8ca86e36ca4b6a5e38995a1032e1ddf56d547f3838b89527c09eb2f
RLBA-2022:3187
new packages: libgee
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgee.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgee-0.20.4-3.el9.i686.rpm
f7adcbdbb49d7d8cefa10010bedeff35bf78a8e23be3468de372376b71352910
libgee-0.20.4-3.el9.x86_64.rpm
b20ed763002259f17e874d773f3ff2d0eff98a5a9484e3bd1d432364ee8b1f1f
RLBA-2022:3188
new packages: libgexiv2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgexiv2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgexiv2-0.12.3-1.el9.i686.rpm
6fd8f0801bc33dc8b0ca2257d91127cd7ac5f8501dab381629edaca2ec69825a
libgexiv2-0.12.3-1.el9.x86_64.rpm
2c790b11c35cf67d89d712066bfffe00697c03754132982e5612c324e0711fb0
RLBA-2022:3189
new packages: libgnomekbd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgnomekbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgnomekbd-3.26.1-7.el9.i686.rpm
42ec8b35c0a5828d3cf7a48275da3b16fb36b9d435be228a58fbada21333737c
libgnomekbd-3.26.1-7.el9.x86_64.rpm
e5901c188bb6a726b17dc2cd043f9be18eb59683680e2e7f4d0e91678ff61da6
RLBA-2022:3190
new packages: libgphoto2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgphoto2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgphoto2-2.5.27-3.el9.i686.rpm
9650df7d068f00150d823cd7f1fb89d5c38af1dad1e86c1e840d0d908835a2f6
libgphoto2-2.5.27-3.el9.x86_64.rpm
260a2f87c175166a42d08a868bb6c552b9ce5cd397b502f1f002edf5c1cb2e97
RLBA-2022:3191
new packages: libgsf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgsf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgsf-1.14.47-5.el9.i686.rpm
9fc75f93143ea7e0e3fcaf2faaa816647b0e23a28408592300a26dd892e0aabc
libgsf-1.14.47-5.el9.x86_64.rpm
9cf8de72cc1ea995664a249615ea0b79e53ea52b89067e3937a589b48d788540
RLBA-2022:3193
new packages: libgweather
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgweather.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgweather-40.0-3.el9.i686.rpm
be841a1deb867d670c161cd31a33188d6866973a57cf29008a05e1314275c3aa
libgweather-40.0-3.el9.x86_64.rpm
84c0f17d7f8c3a3e2a36f63f42db096a1ec34893a3a4e6ec7146f645ff6d83b4
libgweather-devel-40.0-3.el9.i686.rpm
e8cae45cdd64f8073580a7865b940b91544606250b2838eeea5d3f10aea4a3a6
libgweather-devel-40.0-3.el9.x86_64.rpm
7a5baf6719fe929c7c1b22160fe64d18b2147f6b2714657dc36207e26373c77d
RLBA-2022:3194
new packages: libgxps
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgxps.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgxps-0.3.2-3.el9.i686.rpm
5d420d3ed10735a4a574258c652c718d9ff7ee2c6a7fb8ac94551386b55e8ee3
libgxps-0.3.2-3.el9.x86_64.rpm
f4c1f9a5d197b12a508a482f0cee6d91e1645f76e97bd72b532f45d5fca69ad7
RLBA-2022:3195
new packages: libhandy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libhandy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libhandy-1.2.3-1.el9.i686.rpm
e57deb2b95d881bf3c12eaef1c64be32dc3b9dc107a31e74c0c399a0854c4f11
libhandy-1.2.3-1.el9.x86_64.rpm
01cb40c89ed3624a8277f9462a44875be992e17efb40a4537323b0d997149e50
RLBA-2022:3196
new packages: libhangul
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libhangul.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libhangul-0.1.0-25.el9.i686.rpm
15359952a1d887b1cc1b3c76ac3b62e9d297b7ae468e3055db4561c63f99ab27
libhangul-0.1.0-25.el9.x86_64.rpm
4e232f09cb2b0563c8f5f36909fcd4a7d059b0abc609941f9ddb2477e1ccb3a3
RLBA-2022:3197
new packages: libieee1284
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libieee1284.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libieee1284-0.2.11-37.el9.i686.rpm
98e04fc8dd411458e9047d8ddb945ec083939ef3112cf6d039bd50da8870e850
libieee1284-0.2.11-37.el9.x86_64.rpm
28a8daa97a8ff1e88f424ce906f934ffddcaa9541ef24df640cf96e9a45a60b5
libieee1284-devel-0.2.11-37.el9.i686.rpm
ab99da8647569cd48cb81fb3d38fba1568f1968232cf3e66241ef95ea5787dc3
libieee1284-devel-0.2.11-37.el9.x86_64.rpm
22a4c1bcff277537494fd93abc2de17bd31d489c5ff7b441604232d0d0e1deda
RLBA-2022:3198
new packages: libijs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libijs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libijs-0.35-15.el9.i686.rpm
b6df42217e67e1b299aab1d50c5196e6ee6a8648be06f578176c915eb4dcc24a
libijs-0.35-15.el9.x86_64.rpm
eeca220487e0fa7e50fbbe153a4c432a2319ad20bcd0e3790db90dab46e786a9
RLBA-2022:3199
new packages: libipt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libipt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libipt-2.0.4-5.el9.i686.rpm
b8aa4cf7b59d46c51cf9d7c6224f011401b3143ac6c05c540010c042dea30818
libipt-2.0.4-5.el9.x86_64.rpm
966988eb26b800f623b3a08bfdb4082530f37406de0ca4818f285e92eec3eff3
RLBA-2022:3200
new packages: libiptcdata
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libiptcdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libiptcdata-1.0.5-9.el9.i686.rpm
fe281a4be45e8dc0327d42aedacc9eb6ce87d32237561c0993545cac45686de1
libiptcdata-1.0.5-9.el9.x86_64.rpm
15e54296720aabbd8ee28980061beed948f30b616a374015749bfb4f49455764
RLBA-2022:3201
new packages: libiscsi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libiscsi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libiscsi-1.19.0-5.el9.i686.rpm
e7736e38354966e6d3096cf505716d47a4b34efe53bfa2597ec76606a3481610
libiscsi-1.19.0-5.el9.x86_64.rpm
bb6a093ac9d3f261870486369485426c25a106286bd3b175e396b03c9b75a938
libiscsi-utils-1.19.0-5.el9.x86_64.rpm
89186895b0b4a8c82c5ce8b0d327829d1831b479aeaed44b4a9eeed272142c94
RLBA-2022:3202
new packages: libkeepalive
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libkeepalive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libkeepalive-0.3-16.el9.x86_64.rpm
6af75fe40cad11a8f932629d71dcd23c9178679ff46e81ecc0825c78b6496f7e
RLBA-2022:3203
new packages: liblayout
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblayout.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liblayout-0.2.10-25.el9.noarch.rpm
15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291
RLBA-2022:3204
new packages: libldac
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libldac.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libldac-2.0.2.3-10.el9.i686.rpm
42948af8aa73c83341eda1875708e54d074525ff33a6cb695237c526193cbf4b
libldac-2.0.2.3-10.el9.x86_64.rpm
1e41be409fc5c440e2e64226879a23b6c98dd12366702cb448162f8d23f22a2d
RLBA-2022:3205
new packages: libloader
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libloader.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libloader-1.1.3-32.el9.noarch.rpm
76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1
RLBA-2022:3206
new packages: liblockfile
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblockfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liblockfile-1.14-9.el9.i686.rpm
9d9ec19c8803b3081d64ce74062a2c49eb9431a1155daafc30c47bc7897f167b
liblockfile-1.14-9.el9.x86_64.rpm
5de17271fe6db36e5a5ac7110479196946e6536a9cdf5d09a1d7482cb3c3c636
RLBA-2022:3207
new packages: liblognorm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblognorm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liblognorm-2.0.6-4.el9.i686.rpm
c09b6a1800adc53732bfdb280a914e04866b1449eb323741359be1c089c1502e
liblognorm-2.0.6-4.el9.x86_64.rpm
64a9e05963063dcb3b49731ae08021d4bd4485eff394cce5d305c5939b839977
liblognorm-doc-2.0.6-4.el9.x86_64.rpm
a6a435dcc7fba0fe999978400a72d4e054950db26f316fce23387136b50c217f
RLBA-2022:3208
new packages: liblouis
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liblouis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liblouis-3.16.1-4.el9.i686.rpm
606ba88939bbb6b3ec37968acdb2e71533a7bc9bdfecb0c6406067c3ddb2090a
liblouis-3.16.1-4.el9.x86_64.rpm
aec3d40939ac98a69c80509d5a299cba61d96c743960b03126399f8430798b17
python3-louis-3.16.1-4.el9.noarch.rpm
a4945addf0b5a6369ab3e741ae4ed598caa67384a88950a9edea2bef94dab160
RLBA-2022:3209
new packages: libmad
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmad.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmad-0.15.1b-33.el9.i686.rpm
2ddd7588a9187ff7e7e03f3194df2f93dbaa42bbaf3f04658fd06504b3936e8c
libmad-0.15.1b-33.el9.x86_64.rpm
d16b55c3b7e09a4b1dfd31ca8f6a02e29ae216135645cd6fabe3d4381c16027b
RLBA-2022:3210
new packages: libmatchbox
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmatchbox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmatchbox-1.9-30.el9.i686.rpm
3fad43c41f943b2f8703a161063f1dcbd45f3191eaa01062d4aa61198b9354f8
libmatchbox-1.9-30.el9.x86_64.rpm
e8a4dc827547a108ac311b7eccf3b6744a2ca915d5325675b0fce47d46673fae
RLBA-2022:3211
new packages: libmaxminddb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmaxminddb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmaxminddb-1.5.2-3.el9.i686.rpm
3c0acb144438dd4a3251ba9bf26499510bc5421b05888cee0128a910c18180a8
libmaxminddb-1.5.2-3.el9.x86_64.rpm
a42f8a9f73ecf3ca7fb709e72dd4bce9213d34027db57f8d27dcf512e8bccbfc
RLBA-2022:3212
new packages: libmediaart
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmediaart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmediaart-1.9.5-2.el9.i686.rpm
62d7da2b60aa84a696062405f4292a6cdc814305f111c8fa179391f3d3784ce1
libmediaart-1.9.5-2.el9.x86_64.rpm
6d586a9a5283bf08e3df1297f71589d3c26a4ce4418454868cc967c38fc56053
RLBA-2022:3213
new packages: libmicrohttpd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmicrohttpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmicrohttpd-0.9.72-4.el9.i686.rpm
38e34b52510e5c2b9cab48908f27f210c72c96b4fad418db928594129b3ca708
libmicrohttpd-0.9.72-4.el9.x86_64.rpm
12d851dd92e0653994dbc906f4a8b4f51e1b2addb7d8e3ad1000d5c334946fba
RLBA-2022:3214
new packages: libmpc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmpc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmpc-1.2.1-4.el9.i686.rpm
5e871c25709599583289e64d0c96d0409187afdd12554741b2fe76e69b1781e5
libmpc-1.2.1-4.el9.x86_64.rpm
c4def74fc686113748590ce9bc8591092947be804650ef56aa161e049660273e
libmpc-devel-1.2.1-4.el9.i686.rpm
2c358fb8bf0c5e04f8a47be84a1b6972502eeb65ee42be0999c268a800a3eb39
libmpc-devel-1.2.1-4.el9.x86_64.rpm
578b41fcba5bf0f26ce832122dcf572637263180c1f46b74c14ff51c49f93e87
RLBA-2022:3215
new packages: libmpeg2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmpeg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmpeg2-0.5.1-24.el9.i686.rpm
650b842357176930da5ef81d7cf9d6c0a19298d5a1cc1d6abf9d3c6efbf45889
libmpeg2-0.5.1-24.el9.x86_64.rpm
54145513ea13f614c5b1afb5c98aa565d066891704aeaad13d5f1c06c3a367cb
RLBA-2022:3216
new packages: libmspack
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmspack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmspack-0.10.1-0.7.alpha.el9.i686.rpm
f2a9b4fc2d2c45552f8b9142d324cc233df9289db182c457fec2e832f79afd0e
libmspack-0.10.1-0.7.alpha.el9.x86_64.rpm
07447328f3a90b61846cbbb915dc2a567c4834281a6a7509750bc5b2c46ab415
RLBA-2022:3217
new packages: libmspub
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmspub.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmspub-0.1.4-17.el9.i686.rpm
7c79c4f328b2c3e7a64d1cd1ede3d97f545a8f5886369bb2dc3b0c57c9738fbd
libmspub-0.1.4-17.el9.x86_64.rpm
134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e
RLBA-2022:3218
new packages: libnet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnet-1.2-6.el9.i686.rpm
88c9b8668fcc6fbbbc7d6d6cd8ed9ee35862748fd8df48c211741545e98d015e
libnet-1.2-6.el9.x86_64.rpm
3ee2d74468370c1bcd5c5107dbedf048db66f8b59830c88fe86755b8c4a2c998
RLBA-2022:3219
new packages: libnetfilter_cttimeout
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnetfilter_cttimeout.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnetfilter_cttimeout-1.0.0-19.el9.i686.rpm
20984916cf9363f01256082d992f5f0235e5afd6337c91f713deecb8a8b1f94a
libnetfilter_cttimeout-1.0.0-19.el9.x86_64.rpm
d24f20c24b9b138c557d2455eeb03ccb31993773647f7bee8c256b562c9d95f9
RLBA-2022:3220
new packages: libnetfilter_queue
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnetfilter_queue.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnetfilter_queue-1.0.5-1.el9.i686.rpm
a20f3daeb6ad4563efee619888333d15e6751a3b8acc1f2b4e72abfa66b370dc
libnetfilter_queue-1.0.5-1.el9.x86_64.rpm
0c4a355e01b60072b74a981c78b70c745944f5cfc6a9b0e6fe1cfe7e8b501e8b
RLBA-2022:3222
new packages: libnumbertext
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnumbertext.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnumbertext-1.0.6-4.el9.i686.rpm
5c0421283ca492d718e7ef345b190fb428c609df3251a1721528ffa35c6732af
libnumbertext-1.0.6-4.el9.x86_64.rpm
ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab
RLBA-2022:3224
new packages: libodfgen
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libodfgen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libodfgen-0.1.8-4.el9.i686.rpm
59f4c7d7ec9e8b38087557615e96b3ed6cf7735e8784912a568772ad838d2b6c
libodfgen-0.1.8-4.el9.x86_64.rpm
0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2
RLBA-2022:3225
new packages: libogg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libogg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libogg-1.3.4-6.el9.i686.rpm
20917d6a4ccf6ceb102be4e4b87b1adc528018b10dec0570ec0ef9691b8ea4cf
libogg-1.3.4-6.el9.x86_64.rpm
b9185380df1f9787e93de2e32b0dddbd24d0017371e7b4ae2106ff0bbe8819da
RLBA-2022:3226
new packages: libopenraw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libopenraw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libopenraw-0.1.3-11.el9.i686.rpm
0f324e9dab8bd1b8a020c68b727ddf13c21b464fb0c7c15db4dda6304df772a1
libopenraw-0.1.3-11.el9.x86_64.rpm
74e200911c2d54b820bc99d7d7a047d9a3ae6292c17b53a45788c48c423d718a
RLBA-2022:3227
new packages: liborcus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liborcus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liborcus-0.16.1-8.el9.i686.rpm
dbd3df3daa47ca8ad07c2cb4c1b001b21c814f49c669635b449ffb44359b600d
liborcus-0.16.1-8.el9.x86_64.rpm
8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec
RLBA-2022:3228
new packages: libotf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libotf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libotf-0.9.13-20.el9.i686.rpm
a0b8fadc20e33bf80462351fdd64eb7bbdb85a93d68663238d269cd7b15501df
libotf-0.9.13-20.el9.x86_64.rpm
700b83ff56ac549011be218ce33ecb880668f4ee5c8f000339f1d5872fc8f766
RLBA-2022:3229
new packages: libotr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libotr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libotr-4.1.1-13.el9.i686.rpm
7ef0020630a7f8681453f388a829b85525df5133be23e0e849df3758b0981e73
libotr-4.1.1-13.el9.x86_64.rpm
8a2b08884cfa3fb9f941e7f64e185e148b240a99db37679debbe5b1ae62c76b6
RLBA-2022:3230
new packages: libpagemaker
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpagemaker.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpagemaker-0.0.4-13.el9.i686.rpm
338ab38a840c16c19149f3fc208f328d405214aee0f299311afa985485955bb2
libpagemaker-0.0.4-13.el9.x86_64.rpm
aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542
RLBA-2022:3231
new packages: libpaper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpaper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpaper-1.1.28-4.el9.i686.rpm
9c1cfd14e7657e857ba6fdb5fe42cdae021f4679590371b36709e6499cb151bf
libpaper-1.1.28-4.el9.x86_64.rpm
8210eca90ce2987b21e389bb943e1da9cf8b61182143b819068feaad12f9128c
RLBA-2022:3232
new packages: libpfm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpfm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpfm-4.11.0-6.el9.i686.rpm
1adff96fd145e2db14921a6501275c421851c3b5812dada6cb586aa4009dc6f5
libpfm-4.11.0-6.el9.x86_64.rpm
988348915075d1eb3b2d7f27091260f13d1a14b268abe7d23fec0a901742c32a
libpfm-devel-4.11.0-6.el9.i686.rpm
bdea2b369a95285f968a2a554519505cf822130b6e858f0aa1bffc52a9066c73
libpfm-devel-4.11.0-6.el9.x86_64.rpm
8924ecef7341192116bb8a113dc7a5b2bbda9a31ac4c60e5a6c472e0d4af7947
RLBA-2022:3233
new packages: libpinyin
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpinyin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpinyin-2.6.0-4.el9.i686.rpm
a473c2b7021e268c7addb47dd45da8afd919fd7a65747fb0cbe7b3902a88f74e
libpinyin-2.6.0-4.el9.x86_64.rpm
84c519fb305618e62520954b2e7109cd667e96cb66e77c440a42e287d40305d3
libpinyin-data-2.6.0-4.el9.i686.rpm
a8f6e8f90ee153e667f94e5b882b0aa79be773b2d20e85e77fb1852d8724fcf8
libpinyin-data-2.6.0-4.el9.x86_64.rpm
364e0e36d28bf78a56dc7fb75cb01ff7509e3ee9bbe3162bd21b2ea5455e7dda
libzhuyin-2.6.0-4.el9.i686.rpm
7c310955743d5a64bdce6ad4cb305b017991dad613895a6f4dc4aa207a7e1c44
libzhuyin-2.6.0-4.el9.x86_64.rpm
3786988bf101f7256d0227d8e2ec41169410385225754c0152fd5174059509fc
RLBA-2022:3235
new packages: libpst
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpst.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpst-libs-0.6.75-12.el9.i686.rpm
61ce9a5ec35f77d2e65393bdfc1ca0b7fe4035a5388e4fba3f8404a50347aa86
libpst-libs-0.6.75-12.el9.x86_64.rpm
366b18d4bf80f7df74c255e23b8a9d84b90bb5059fddd977053a9a756516300b
RLBA-2022:3234
new packages: libpng15
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpng15.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpng15-1.5.30-14.el9.i686.rpm
288c78f9e3abe01fa6de4ac40e5de3c224a16245bbdf91f27cd5c2f45a6fb5e0
libpng15-1.5.30-14.el9.x86_64.rpm
579b779680c0497bbc49f0b068a34b9a6ecc830d03e3240e1f91757145f62b67
RLBA-2022:3236
new packages: libqxp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libqxp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libqxp-0.0.2-11.el9.i686.rpm
e6c5a11101c0eefe3acd6d6a5974c78e3fe0f9a299c66de59000ec3df0e23c42
libqxp-0.0.2-11.el9.x86_64.rpm
68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71
RLBA-2022:3237
new packages: librabbitmq
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librabbitmq-0.11.0-5.el9.i686.rpm
3192b3e578a9ef68a57ca3756867054a3e412dc8aacc05afe99ca3775f3a1124
librabbitmq-0.11.0-5.el9.x86_64.rpm
5dd63c92bf9cd9ffbb1ef0c391ac3f8ef2cac279867b222523fe10754e4eb966
librabbitmq-tools-0.11.0-5.el9.x86_64.rpm
863da4b3ebe909be94de567ca549a11b55b238c99bdca527612eadcf0dc8ac7c
RLBA-2022:3238
new packages: librelp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librelp-1.10.0-4.el9.x86_64.rpm
634fc3d551060e09c87c2b8a7ed0cbe09eda683db669832ec27e8795f218a39e
librelp-1.10.0-4.el9.i686.rpm
e7e6502880c5a56a9cd719597bd17a009479e770e588997041a5b635e827aaf3
RLBA-2022:3239
new packages: libreoffice-voikko
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreoffice-voikko.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libreoffice-voikko-5.0-10.el9.x86_64.rpm
d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0
RLBA-2022:3240
new packages: librepository
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librepository.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librepository-1.1.3-31.el9.noarch.rpm
7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378
RLBA-2022:3241
new packages: librevenge
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librevenge.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librevenge-0.0.4-22.el9.i686.rpm
dd8c1b6e44ab1e6b81506264c45f278cfa248a01a04786238e809332743688bf
librevenge-0.0.4-22.el9.x86_64.rpm
08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007
librevenge-gdb-0.0.4-22.el9.x86_64.rpm
66247af870ea73812480bab041210ddd24dc87f965a69941437a4c392e5f900c
RLBA-2022:3242
new packages: librsvg2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librsvg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librsvg2-2.50.7-1.el9.i686.rpm
28834770f52040b8f0a5aaf7ab7c7854f809b634c1489432224164c0e42e5493
librsvg2-2.50.7-1.el9.x86_64.rpm
d507e190bcab36b3a224fa4efed7416fe6c65fad462f191d7855f2f24609794e
librsvg2-devel-2.50.7-1.el9.i686.rpm
bf4bb5ecc8b77a527e188a0f1f6ee43ef7254439949e8eb76e0d073758b649e7
librsvg2-devel-2.50.7-1.el9.x86_64.rpm
089de21919e73d223335f4dafeb4ea7a69cb7022cadf0eb6626e922322bbe244
librsvg2-tools-2.50.7-1.el9.x86_64.rpm
6fdb15ae0835a14d36d84699e2f86846f168d0d5b30cf6b656eeb4ce4f627b8d
RLBA-2022:3243
new packages: libsamplerate
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsamplerate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsamplerate-0.1.9-10.el9.i686.rpm
b9a2596179cf9d14cde1428ab8ff76256a1b0fe56fad3d89d271126fc5130f47
libsamplerate-0.1.9-10.el9.x86_64.rpm
be6aa29c121874ef865b8d389dd5794d47345d21b6ce75f3ec19d4e74863e88a
RLBA-2022:3244
new packages: libsecret
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsecret.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsecret-0.20.4-4.el9.i686.rpm
0df332237678359c814c5400aaa00d366869d9b98bb14bd759123a3d3a360b78
libsecret-0.20.4-4.el9.x86_64.rpm
27b6dc9dde386ee9de16b53144b252dbbcdcea614dc56ab2fe3e1423c004eea1
libsecret-devel-0.20.4-4.el9.i686.rpm
d77c7a1ed7f5dac196cae5f65b9c74db754c30de95d5def334eb18273f334cd0
libsecret-devel-0.20.4-4.el9.x86_64.rpm
f87f569fca3447a04048e9ed5bb59c281f541bb16c30ecf6b11d0f5595905632
RLBA-2022:3246
new packages: libshout
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libshout.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libshout-2.4.3-7.el9.i686.rpm
836c00412b47853a30ae3dc559a64bc24a7bcc80b6f45693959c46cda657d581
libshout-2.4.3-7.el9.x86_64.rpm
4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435
RLBA-2022:3245
new packages: libserializer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libserializer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libserializer-1.1.2-30.el9.noarch.rpm
d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68
RLBA-2022:3247
new packages: libsigc++20
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsigc++20.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsigc++20-2.10.7-2.el9.i686.rpm
10184fb9e994cbc01712fb5f39814eca6832ac0116120d2470337a67b69f7ea9
libsigc++20-2.10.7-2.el9.x86_64.rpm
7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb
RLBA-2022:3248
new packages: libsmi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsmi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsmi-0.4.8-30.el9.i686.rpm
f1615a441cc6f8052bc86d5158b6f3438f4174352b5cd79769f7e9df1994ecb7
libsmi-0.4.8-30.el9.x86_64.rpm
08db49177ea850d5725a600d421c433fa3d26ebf33d8289f42ca2a07a094ae3a
RLBA-2022:3249
new packages: libsoup
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-8.el9.i686.rpm
62f74b93cf517bb5c22fa32070a96db967c7cc8841cad28033fffadb4be36ec4
libsoup-2.72.0-8.el9.x86_64.rpm
29de6bc5022554f6554629c453fd8f021248c5a134a2147310c8facb967caef1
libsoup-devel-2.72.0-8.el9.i686.rpm
4957447415f5cdcb8360352e45f1f0370735d3f71b66d0583d01fff3ca2919ef
libsoup-devel-2.72.0-8.el9.x86_64.rpm
bc56983bc66b6aa4f67e482a5134c0e02619c32f7d0c8d82f6ea33dd5ae37966
RLBA-2022:3250
new packages: libspiro
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libspiro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libspiro-20200505-5.el9.i686.rpm
10b60185dcff95be5ae92fc3d67d175ddacf30ebf65a95f37d53224c86859000
libspiro-20200505-5.el9.x86_64.rpm
0c246134e555367789a517502a37f257468b43adb4ef3b44d28e82d0bd7900a5
RLBA-2022:3251
new packages: libsrtp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsrtp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsrtp-2.3.0-7.el9.i686.rpm
5e9ff370b92cb19c5a32d8f45829aa00b9af96c653641a53ae4fda290d498cf3
libsrtp-2.3.0-7.el9.x86_64.rpm
a6b7bbf89719c0062d1342bd726417577ec259f10e510f13d4fb5f6ad60acfca
RLBA-2022:3252
new packages: libstaroffice
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libstaroffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libstaroffice-0.0.7-5.el9.i686.rpm
f372a67b2727decb4ac55c309fea187fde90ce36d3a0d7b1a28b908334ab13b8
libstaroffice-0.0.7-5.el9.x86_64.rpm
bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783
RLBA-2022:3253
new packages: libstemmer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libstemmer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libstemmer-0-18.585svn.el9.i686.rpm
bedd4d56f895d5f3c4d96412b9a75a1220c5b12b8ea42d8650040cfd405075c2
libstemmer-0-18.585svn.el9.x86_64.rpm
1c100c574348ee586077add5d13aa526b47cf69f88eb51750555d86a3e7127d0
RLBA-2022:3254
new packages: libthai
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libthai.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libthai-0.1.28-8.el9.i686.rpm
6197202ec079801b0424e9a92e178c93feed8e3fd309c48d878b73cd6975d6f4
libthai-0.1.28-8.el9.x86_64.rpm
06babaa62e1fd04f0b7bfebaa55d9d3beb215f1543356be6b25ee7d0cb0a948b
libthai-devel-0.1.28-8.el9.i686.rpm
f5b97b428d94d6cb01efde0283a8e08af7f71fffc914dd97d5d9fd08c19cfb43
libthai-devel-0.1.28-8.el9.x86_64.rpm
a1bc54db633e3e8499f810037322f0fa5ea701e49d8c444e8122a2245a14545c
RLBA-2022:3255
new packages: libtheora
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtheora.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtheora-1.1.1-31.el9.i686.rpm
d5b91e82dcd7eb6b9947417917534db7196c7c44848f2387413aee32b9b5a8ef
libtheora-1.1.1-31.el9.x86_64.rpm
d3b85db64000a3b859d7bde0076a28a52c7be5fa40636cc64d695b10372684ea
theora-tools-1.1.1-31.el9.x86_64.rpm
93e136126f9fe2a80e8cbfc30fccdb09244c6d35776716c07da53407fdcf1756
RLBA-2022:3258
new packages: liburing
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liburing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liburing-0.7-7.el9.i686.rpm
bb52884e5a7e7a10ef273cad1bd78a0eeccca55782e3f5d27fabca844477605e
liburing-0.7-7.el9.x86_64.rpm
fa78ff026c3f74fddb55dcc7a56325390f7f4dd9d4e8b99786d35de47f1bfdf2
RLBA-2022:3259
new packages: libusb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libusb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libusb-0.1.7-5.el9.i686.rpm
d71d66bb4a6b9ecac9b63c6ef20287945f94da5b8036156358523554b341bf29
libusb-0.1.7-5.el9.x86_64.rpm
ae368057141ae71e4b683222ca810d4b6547518a77b4748ea06863f5b774f844
RLBA-2022:3260
new packages: libvdpau
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvdpau.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvdpau-1.4-6.el9.i686.rpm
68e9094c677d1e71399211fb37155a1af49d3eae73b48f1b3359892b5eee7fd4
libvdpau-1.4-6.el9.x86_64.rpm
2d7d51005a7a087334a6faa61462e7715cbe18a87832f8ebaa7febcac08b3cdc
libvdpau-trace-1.4-6.el9.i686.rpm
573219ba4515664c75151a7e5a3e53fe60142d1ddbd789f5f8e577052e3702c1
libvdpau-trace-1.4-6.el9.x86_64.rpm
f78ef13ee698bdbd9dfd66ddf390cc1e6708dcea4b2b63ccc5758e992926b01e
RLBA-2022:3261
new packages: libvirt-dbus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvirt-dbus-1.4.1-5.el9.x86_64.rpm
f8d32c75cd95b9be8670e6f6e92546515b707a1026768a879a28dbefb56fe172
RLBA-2022:3262
new packages: libvirt-glib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvirt-glib-4.0.0-3.el9.x86_64.rpm
ece24cff3cea037bd2a04e2cec8ca15ce3f6fcda4b99891e3e3d1bd763a6e150
RLBA-2022:3263
new packages: libvisio
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvisio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvisio-0.1.7-9.el9.i686.rpm
e73b392b8bceaff01beb14f1a5f9f23f34d762a6852a55536df22bba70d4b9d2
libvisio-0.1.7-9.el9.x86_64.rpm
ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324
RLBA-2022:3264
new packages: libvisual
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvisual.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvisual-0.4.0-34.el9.i686.rpm
40752c55ea79166853b4ec737fcfce73cec438ac45c55a86b3e3db35e08a46df
libvisual-0.4.0-34.el9.x86_64.rpm
628fd8d18ae0ec4cc213baca32c3fd0ad18150f17edd19ec25afdb5bf637f760
RLBA-2022:3265
new packages: libvoikko
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvoikko.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvoikko-4.3-7.el9.i686.rpm
82209dc6c6bbf5896668414a544f4a40668f394c68da3d6631e132608b112620
libvoikko-4.3-7.el9.x86_64.rpm
700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a
python3-libvoikko-4.3-7.el9.noarch.rpm
73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f
RLBA-2022:3266
new packages: libvorbis
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvorbis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvorbis-1.3.7-5.el9.i686.rpm
12ec8f87938e116a09577c72f5cff90044785d75f1a67edab32c4087e901f145
libvorbis-1.3.7-5.el9.x86_64.rpm
c57530fcd760d7c465826b85dd5dabc086b7922e875da914cf30744c77197dca
RLBA-2022:3267
new packages: libvpx
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvpx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvpx-1.9.0-5.el9.i686.rpm
aa9f90478f5d6030cabe42290bf9f49e5d105ab0cb76dde262df5bcc2a68c7b1
libvpx-1.9.0-5.el9.x86_64.rpm
c622cd5eaaec519f1c49e197259d54d20076536bf31d208bc50325bdaf298723
RLBA-2022:3268
new packages: libwebp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwebp-1.2.0-3.el9.i686.rpm
3f5170905cb36ae60209b56ef69238af3bed0fd910f87ddc0aa76d3aa0374964
libwebp-1.2.0-3.el9.x86_64.rpm
3d19d8c911cfaa907698f9d4bedf9aa22269a67fb707fe4148b2e4261244235e
libwebp-devel-1.2.0-3.el9.i686.rpm
349098e5e9957c5401f89de303f362ab0133c6a7f00748d8daf83bc751f550fc
libwebp-devel-1.2.0-3.el9.x86_64.rpm
65b8a68fbb345a96a17266e035261f01b9aaf38dd7e0a0c7710e82ad1bfe1caf
RLBA-2022:3269
new packages: libwnck3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwnck3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwnck3-40.0-2.el9.i686.rpm
8f6aff2b36fb1404422431f0ce53ccbc0e5023ba4e22835a5e3cc5cde74e56cf
libwnck3-40.0-2.el9.x86_64.rpm
2d418875f04a64e1f6eeab44fda6fce33b6a9fc8f050c4d2975aa5b1301c20b8
RLBA-2022:3270
new packages: libwpd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwpd-0.10.3-10.el9.i686.rpm
7a7a81462e70ba3b04632e7694866b7786a34ec8a30e3916d70da4ec738fbd6c
libwpd-0.10.3-10.el9.x86_64.rpm
4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215
RLBA-2022:3272
new packages: libwpg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwpg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwpg-0.3.3-8.el9.i686.rpm
0932067af1048e45cdffb7bfa263dfa146b3692da08f7704576b88f9b933030e
libwpg-0.3.3-8.el9.x86_64.rpm
e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562
RLBA-2022:3273
new packages: libwps
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwps.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwps-0.4.12-4.el9.i686.rpm
50219656c7e51cde2a8969e40a69227e03cce44c11d8db925bc56171cd1d223b
libwps-0.4.12-4.el9.x86_64.rpm
62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0
RLBA-2022:3274
new packages: libxcb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxcb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxcb-1.13.1-9.el9.i686.rpm
ae05ff23ab6ae681b53fa403b819a6bff0f2c05e33151429910c17f121a66831
libxcb-1.13.1-9.el9.x86_64.rpm
759581ab8b7935e159beb690be7c5279a5642d5ce0deb369b12396962bf1257c
libxcb-devel-1.13.1-9.el9.i686.rpm
fcb6338210a3206c20bec7c570045ae4c44bcb9905ee0824678dc58ce54bc131
libxcb-devel-1.13.1-9.el9.x86_64.rpm
961afe230fee8f27acdfb5bdd528b35e5138f83c1032f374100e756fe9e44f06
RLBA-2022:3275
new packages: libxkbcommon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxkbcommon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxkbcommon-1.0.3-4.el9.i686.rpm
ff047f229e11c8cd6e605e6fde1e08a9e877d1ab1c1f8abed5e6048228d2d415
libxkbcommon-1.0.3-4.el9.x86_64.rpm
e806faf168de52e934b88a52aa6c16a87cedefaae97d130e4bc10a997d14f93f
libxkbcommon-devel-1.0.3-4.el9.i686.rpm
238934e35501c6aae0c6c6f35422d897750003c3654a5ebcdae7b71b47a6d299
libxkbcommon-devel-1.0.3-4.el9.x86_64.rpm
fdb28b3722d1bd7b512d391ca7d5dd38e4af9ff49b07186608b8f70c285a0aa9
libxkbcommon-x11-1.0.3-4.el9.i686.rpm
8401daedace1a858177e9a416d0d8b32dd3d98059a39da37c74c76fb2ce7dce9
libxkbcommon-x11-1.0.3-4.el9.x86_64.rpm
80d6c9dad2ac97f6ecc5295b8995f90f4d0c91f6fd40998400b2be7477d9579f
RLBA-2022:3276
new packages: libxkbfile
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxkbfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxkbfile-1.1.0-8.el9.i686.rpm
68a552b5ac8f3a43ef8351713c527f9f1d61796246aa83661b41e0d625a032ef
libxkbfile-1.1.0-8.el9.x86_64.rpm
e2b4cfd781ce91e12cd760c612d4ed603f763d17ef215ea603be5b4c91b4c82f
RLBA-2022:3277
new packages: libxklavier
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxklavier.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxklavier-5.4-20.el9.i686.rpm
cdd597c7213f04d166f6617123ee095273294429d4e9642ecfb5b4a6f36f8bdf
libxklavier-5.4-20.el9.x86_64.rpm
ac50408016c8b60f9cef61af20b3c8986e020b7d006f82f7e8b1377d82254834
RLBA-2022:3278
new packages: libxshmfence
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libxshmfence.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxshmfence-1.3-10.el9.i686.rpm
7bc4c251d37aafe4cffcc96961544ea617acfae0507ab9660facb63b529b49e5
libxshmfence-1.3-10.el9.x86_64.rpm
4f10626c3a16e3f22087d208ffa45868558c155123b0c7d4c0c55d696e19aeec
libxshmfence-devel-1.3-10.el9.i686.rpm
eb34910011b0b3d969c6cb944322ab08228e40e2f2308e72cd5af368546800fa
libxshmfence-devel-1.3-10.el9.x86_64.rpm
62a4b8689fcd3622f53ac0571e57c98374d4e41ee5cc1596481262e6a7f6ea18
RLBA-2022:3280
new packages: libzip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libzip-1.7.3-7.el9.i686.rpm
9a208bf2a59163641eb32a444e6f679ce5cbed0f26877f598f3cf408aa0acca7
libzip-1.7.3-7.el9.x86_64.rpm
3c60ebff40aef76fdd88aa98aeafa39d037ca266f6318dc76d0adc52e9e73fa0
RLBA-2022:3281
new packages: libzmf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libzmf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libzmf-0.0.2-18.el9.i686.rpm
369e0756c34d763951bc0f53951fef4bb3f96dcc27a918827598e6fffc95c42e
libzmf-0.0.2-18.el9.x86_64.rpm
fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b
RLBA-2022:3282
new packages: linuxconsoletools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxconsoletools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
linuxconsoletools-1.7.1-3.el9.x86_64.rpm
3311bbbf4dea96d94ece964434224ac9ff49dc4ef1a83194011ffe3091ebe584
RLBA-2022:3284
new packages: lklug-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lklug-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lklug-fonts-0.6-26.20090803cvs.el9.noarch.rpm
d1399564b5148247c7a1b4a84c933900d74d172ced271d3ff3092a672782284e
RLBA-2022:3285
new packages: lldpd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lldpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lldpd-1.0.4-10.el9.i686.rpm
6b4e3f4c97f725e49770c04f11a0c4cab92a9b5ea1222a2f2b0131fe4b9ec99e
lldpd-1.0.4-10.el9.x86_64.rpm
d4d29cc1b54a7898578622b67ce3b1b08c70a3aa5741a71be0d6b1bf98379a88
RLBA-2022:3286
new packages: lm_sensors
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lm_sensors.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lm_sensors-3.6.0-10.el9.x86_64.rpm
af7cc35aec437b5a31358196c52e232b7f31397160c420136d030815b7f9efc0
lm_sensors-devel-3.6.0-10.el9.i686.rpm
cded0d31277f5d9310731f6f97eef57d7ca5730de23a28ffdb634f94c928657f
lm_sensors-devel-3.6.0-10.el9.x86_64.rpm
57fc09080295affcb5f96ca558b16c9bc81b6e0a5f4935e2c7938f00fdb123d3
lm_sensors-libs-3.6.0-10.el9.i686.rpm
6f00005f964696e756e11fedcc91faceb0179472bfa0615246ffb3e0ead4df4b
lm_sensors-libs-3.6.0-10.el9.x86_64.rpm
52bc9efe00740e12b81dc4c3eb67b6adbdfc2b4496e281b487c92802be6468a2
lm_sensors-sensord-3.6.0-10.el9.x86_64.rpm
1cc062f499a0b3e4c62366fb32e2866d01bed49a7ef8757866c8b8465c015407
RLBA-2022:3287
new packages: logwatch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for logwatch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
logwatch-7.5.5-4.el9.noarch.rpm
e57f612dfe6ba6d0abf0c224279288ba05a7cfc37a8cce8257ad67d776a2c489
RLBA-2022:3288
new packages: lohit-assamese-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-assamese-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-assamese-fonts-2.91.5-13.el9.noarch.rpm
dd0026f340e88e7435152571d46116064438cc02b1885aea6216a72fe16e9ab3
RLBA-2022:3289
new packages: lohit-bengali-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-bengali-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-bengali-fonts-2.91.5-13.el9.noarch.rpm
84981f5f4b0f1a72f973106cd5e5695f23e67eca027c35b2745661ad757f65de
RLBA-2022:3290
new packages: lohit-devanagari-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-devanagari-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-devanagari-fonts-2.95.4-14.el9.noarch.rpm
46f3f8a880a174111869ad20f7cee8fb35d3f33ed59747682e9bf349da80cfd7
RLBA-2022:3291
new packages: lohit-gujarati-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-gujarati-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-gujarati-fonts-2.92.4-13.el9.noarch.rpm
e3729242c57233d1752e902e4eec4d5114ea40753100332d21e0692863b68ac3
RLBA-2022:3292
new packages: lohit-gurmukhi-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-gurmukhi-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-gurmukhi-fonts-2.91.2-14.el9.noarch.rpm
7c4d71cc1674ee655d1bd00f8eb0d60a7544a6ccf084e5a6dffa350f4ab76dc8
RLBA-2022:3293
new packages: lohit-kannada-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-kannada-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-kannada-fonts-2.5.4-12.el9.noarch.rpm
2bd661e59f18131dd694451a3ccec94182c8f9abe4b62f88142f716839433105
RLBA-2022:3294
new packages: lohit-marathi-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-marathi-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-marathi-fonts-2.94.2-14.el9.noarch.rpm
6135d57b0b05c146f16ffa1a4b084d16ea2bf81ecc2418be3518d8f6f5a76b73
RLBA-2022:3295
new packages: lohit-odia-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-odia-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-odia-fonts-2.91.2-13.el9.noarch.rpm
68aaf9a0e0be99f545242ec556ff1422c011ae94d27496fdf5cf1dcb4ee156c3
RLBA-2022:3296
new packages: lohit-tamil-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-tamil-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-tamil-fonts-2.91.3-13.el9.noarch.rpm
41c892f760174b8317a7c89ebf4604fe9ef64d6de63b70cb72fa243fd3004889
RLBA-2022:3297
new packages: lohit-telugu-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lohit-telugu-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lohit-telugu-fonts-2.5.5-12.el9.noarch.rpm
9c7b7dc3f3f84f4626e95582108b45f9a9d43f9b282f3af642324490bed73b2c
RLBA-2022:3298
new packages: low-memory-monitor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for low-memory-monitor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
low-memory-monitor-2.1-4.el9.x86_64.rpm
ab671224e3f150c2e671f7a2090a2e3094cd7b47fbfe0680f7579b3c937faab8
RLBA-2022:3299
new packages: lpsolve
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lpsolve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lpsolve-5.5.2.0-28.el9.x86_64.rpm
8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b
RLBA-2022:3300
new packages: ltrace
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ltrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ltrace-0.7.91-43.el9.x86_64.rpm
6e3ad1850883ae0963f7f3f73d27fdceb777ece4d709d5abaddb9f2b3d4169a2
RLBA-2022:3301
new packages: lttng-ust
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lttng-ust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lttng-ust-2.12.0-6.el9.i686.rpm
0a51fb0887b3fd2c9a0439dc804973a31b5f44838c4672dfc42dec50a54c31c5
lttng-ust-2.12.0-6.el9.x86_64.rpm
6c10518bc5b9c00502ac1540567ae0248e38380662619761d9f385ea37f7a4b4
RLBA-2022:3302
new packages: lua-rpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lua-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lua-rpm-macros-1-6.el9.noarch.rpm
6c583d025d0677b41df376a87f9b0dead705ac39dfd1d8a3973891a5d67df450
lua-srpm-macros-1-6.el9.noarch.rpm
a5cab6e3a6ecb1d3a87c1573d0e993ff042e5948fa8e8262740b53c69eac2390
RLBA-2022:3303
new packages: luksmeta
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for luksmeta.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libluksmeta-9-12.el9.i686.rpm
8bd74f4f9eb8aada11471c42d7c0bd2a9dc397a242650b23d83e32ccf6762d24
libluksmeta-9-12.el9.x86_64.rpm
391474425feaf13f8a877c870568e576859a050f932dece2b48a7300053578bd
luksmeta-9-12.el9.x86_64.rpm
9a09f7555f075d8f18e9a683e452d9a712f143a0bbe730fc5c6459e243070a72
RLBA-2022:3304
new packages: m17n-db
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for m17n-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
m17n-db-1.8.0-16.el9.noarch.rpm
8f82bdc58bbb537f38d5acb8e16a8b744beeceba739850b11169aa83ae7f4690
RLBA-2022:3305
new packages: m17n-lib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for m17n-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
m17n-lib-1.8.0-13.el9.i686.rpm
9c87b908872e06aadfda0afca2a6a99084beec759ff31499983bac8faf73ceda
m17n-lib-1.8.0-13.el9.x86_64.rpm
7e5b76f5c91a2cd8194add1eea0d9618d08c45703c44ebf180dede59ab226418
RLBA-2022:3306
new packages: madan-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for madan-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
madan-fonts-2.000-32.el9.noarch.rpm
cc0aa6edbefe20c323d282bba5f50003330e66a51c1b9b7db01b70f59692f3f4
RLBA-2022:3307
new packages: mallard-rng
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mallard-rng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mallard-rng-1.1.0-7.el9.noarch.rpm
2bd81c9d55885e161631eee718511cce8c83126726025cc7be1929ae320f9b9b
RLBA-2022:3308
new packages: man-pages-overrides
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for man-pages-overrides.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
man-pages-overrides-9.0.0.0-1.el9.noarch.rpm
27b882340d6653aa7de966639494146368b2c537e29381b986683f1d4a358f0d
RLBA-2022:3309
new packages: mariadb-connector-c
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mariadb-connector-c.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mariadb-connector-c-3.2.6-1.el9_0.i686.rpm
d04f5a3d8a1cdce03afce92687c69e44a638ea37986aac8d897301c3142dc1ba
mariadb-connector-c-3.2.6-1.el9_0.x86_64.rpm
007d48646e32a1747734871f4169495fd04ae62b670a9a5ebcca9997329f6a8c
mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm
35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f
mariadb-connector-c-devel-3.2.6-1.el9_0.i686.rpm
a623746a24198a03da5590ed9deb4b95733b352fde940f7f67cf92c12e9cf5ac
mariadb-connector-c-devel-3.2.6-1.el9_0.x86_64.rpm
2562fbfe459c902520b792ca0827024402b856c0eab28da8df59e2bcda2bbb31
RLBA-2022:3315
new packages: mecab
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mecab.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mecab-0.996-3.el9.3.x86_64.rpm
62631d13849946a0b31605ff6b214de5cffb8f218cee25e652982e60066edb9f
RLBA-2022:3310
new packages: mariadb-connector-odbc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mariadb-connector-odbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mariadb-connector-odbc-3.1.12-3.el9.x86_64.rpm
74daff791c4bf8f5c4c1dc4d5846ddb641448311312ff0fb6efc6c7e3f4fc4dd
RLBA-2022:3311
new packages: matchbox-window-manager
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for matchbox-window-manager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
matchbox-window-manager-1.2-31.20070628svn.el9.x86_64.rpm
3d5aeef416ad33923643c6ac742de6f4a61f3f0920a78bb747fb30b04768a5c4
RLBA-2022:3312
new packages: maven-shared-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for maven-shared-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
maven-shared-utils-3.3.4-2.el9.noarch.rpm
0a94272c449294555eae6fd085d5a8d5af746d8bd31069eda701c2556243e4e7
RLBA-2022:3313
new packages: maven-wagon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for maven-wagon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
maven-wagon-3.4.2-6.el9.noarch.rpm
da1f99fd64f685c69f3a8e7be5f8da0fbbcfcab1ff239e091349fc1913edf64b
RLBA-2022:3314
new packages: mc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mc-4.8.26-5.el9.x86_64.rpm
fd2dac26e2e8d8367e44fdbf14e116ea3db9f6916bdfc524cb49d31d33d2fdb8
RLBA-2022:3316
new packages: mecab-ipadic
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mecab-ipadic.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mecab-ipadic-2.7.0.20070801-24.el9.x86_64.rpm
a04682a17aa693899bd7718c353c19e1aabb983a74ced51d93c0c89af30d62db
mecab-ipadic-EUCJP-2.7.0.20070801-24.el9.x86_64.rpm
3769899266c580c211f7c4bed345b155efc322052d404e9c66183d0958495d6a
RLBA-2022:3318
new packages: memtest86+
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for memtest86+.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
memtest86+-5.31-0.4.beta.el9.x86_64.rpm
529cf2a32a069db1118b63430c160a26b2b8a715a726f9ee88ed24af370ca2e0
RLBA-2022:3320
new packages: mesa-libGLU
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa-libGLU.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mesa-libGLU-9.0.1-6.el9.i686.rpm
ef518088bcb902d102d8f42deafa52d0c266c947a7cf69449cbd0b8f26dac826
mesa-libGLU-9.0.1-6.el9.x86_64.rpm
c7da4f0a399f5b9d5833dc1f5d0f388d9b5ecf6cd7ad6fbd9397f5a661393a68
mesa-libGLU-devel-9.0.1-6.el9.i686.rpm
fa22305485c2ec64f82e53665f9f95386229d715ab05a2cc3f18aa842398aed9
mesa-libGLU-devel-9.0.1-6.el9.x86_64.rpm
58c44993f0ef419b8722e91cd3a988bcd3bc1d2e1a08b84217e06f5d7c2b9460
RLBA-2022:3321
new packages: mesa-libGLw
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa-libGLw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mesa-libGLw-8.0.0-23.el9.i686.rpm
cc0071e42974969c2fa6f8777d0c8f23e66c18383d75f8fa2b4a0204f22315c1
mesa-libGLw-8.0.0-23.el9.x86_64.rpm
1fdf4c16d17cd3ec8a72f425f5e592e4b133fa5c96c02c99be0bfb5eac049a6c
mesa-libGLw-devel-8.0.0-23.el9.i686.rpm
1faae05d27578cbce54e575978096ec1c7fbf4bba9733e726beb0eb1bf7fbd49
mesa-libGLw-devel-8.0.0-23.el9.x86_64.rpm
6eeed9906edf564c09eaf3d43cfd9492d84f8756038adc83704db64500ed6da1
RLBA-2022:3322
new packages: micropipenv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for micropipenv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
micropipenv-1.0.2-5.el9.noarch.rpm
447d54febe87b918826fed41981355c33230347e6bfd9005d03a7b2c8c079d5e
RLBA-2022:3325
new packages: mingw-srvany
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-srvany.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw32-srvany-1.0-29.20210127git89f2162c.el9.noarch.rpm
969bf17d1ca59d9be2d6bef5f7e78220eda9e0bc915b92edba5cb7f60bdb06ad
RLBA-2022:3326
new packages: mkfontscale
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mkfontscale.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mkfontscale-1.2.1-3.el9.x86_64.rpm
35068992e79d872eb9fcd11a986910de00799d574cb746f8429ced2578d7c782
RLBA-2022:3327
new packages: mobile-broadband-provider-info
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mobile-broadband-provider-info.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mobile-broadband-provider-info-20210805-2.el9.noarch.rpm
683b53df6181ceff28d57f74c7ee8a44a22c3d36cca5877a429a8b7233c1e82e
RLBA-2022:3328
new packages: mod_auth_gssapi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_auth_gssapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_gssapi-1.6.3-7.el9.x86_64.rpm
26f6e7a698f56c88e27333db327cc4224ded51809ace25f00fd778446f191f9a
RLBA-2022:3330
new packages: mod_authnz_pam
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_authnz_pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_authnz_pam-1.2.2-3.el9.x86_64.rpm
14e0506013e9188f7c00ef16f17e97e6c4f491b1067c8c45715c80e1d168857a
RLBA-2022:3331
new packages: mod_fcgid
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_fcgid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_fcgid-2.3.9-28.el9.x86_64.rpm
9d3f2d119905d026e01e46d8718e523fe24430b06ae2be6853f60c4bde588f7a
RLBA-2022:3332
new packages: mod_http2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_http2-1.15.19-2.el9.x86_64.rpm
fd31034a7df3b458dcaa3a0eba86b80fd53dcbbce566587b2c51929bd39255ea
RLBA-2022:3333
new packages: mod_intercept_form_submit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_intercept_form_submit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_intercept_form_submit-1.1.0-15.el9.x86_64.rpm
a325ed17b39ae759c71a46fe332af0965d963da0d04f0542e2b531fd7137a613
RLBA-2022:3334
new packages: mod_jk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_jk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_jk-1.2.48-22.el9.x86_64.rpm
97674abd7f01ea94cde6847f6793f591cd1780e24ef24b962dfabae94bc7e7ad
RLBA-2022:3335
new packages: mod_lookup_identity
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_lookup_identity.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_lookup_identity-1.0.0-15.el9.x86_64.rpm
1ec92c31cc2fbfbcaefe1d63297643ae251d5893a38ddc4e8740f20cfdc9329a
RLBA-2022:3336
new packages: mod_md
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_md.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_md-2.4.0-3.el9.x86_64.rpm
0d9a0f4f5dd82929e8306be4be80765280e5ebe7c9c1ea7f8e05b4da7ebb7572
RLBA-2022:3337
new packages: mod_proxy_cluster
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_proxy_cluster-1.3.14-23.el9.x86_64.rpm
4602affdf3cc3e628482523eec14b94d46f823de8b723bf5896d4707a107ed8e
RLBA-2022:3338
new packages: mod_security
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_security.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_security-2.9.3-12.el9.x86_64.rpm
17261bdc873959db7743d4890e03689ba318c541b7ee9b6d5d76da649f5fecc4
mod_security-mlogc-2.9.3-12.el9.x86_64.rpm
f4fe13bc74055b4dbfd127b8c9fb378281601c5d02ba26c90da56bfa94abc39a
RLBA-2022:3340
new packages: modulemd-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for modulemd-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
modulemd-tools-0.9-3.el9.noarch.rpm
30c86ee4a454c2126f24dbc6ba8d5497f8a246d369520000b1f101a35ffcf1f2
RLBA-2022:3341
new packages: mpg123
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mpg123.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mpg123-1.26.2-5.el9.x86_64.rpm
e13ca78b6d8fb99769efd2278f067f3a220fa75a642360d364a7b8a7e353a2c0
mpg123-libs-1.26.2-5.el9.i686.rpm
387fa6a59ee2a0907adbff5db5f35cc274db141225402208268edf7c53dbc1ad
mpg123-libs-1.26.2-5.el9.x86_64.rpm
ae5017ee654fefc2b93283e0cf40d33512992d3f2285c3a183be55fca1d847b4
mpg123-plugins-pulseaudio-1.26.2-5.el9.x86_64.rpm
ffa9b74b8322132864728b547937f93898132f1e7aeb696227ca187bb78d266b
RLBA-2022:3342
new packages: mrtg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mrtg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mrtg-2.17.7-10.el9.x86_64.rpm
39d710e93487d6df6608978dd1aa49e3b97dbce6d2759afc8289453bb37971a7
RLBA-2022:3343
new packages: mt-st
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mt-st.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mt-st-1.4-7.el9.x86_64.rpm
8c1e07fda57422f0e42683e74dd1cd6a0a2c9be904d918d4b44254417a7bc396
RLBA-2022:3344
new packages: mtdev
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mtdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mtdev-1.1.5-22.el9.i686.rpm
a0bcf811abe4c46e53f9d829a86d5bbe01492460ee943e6c71cc4e76c69ee326
mtdev-1.1.5-22.el9.x86_64.rpm
c359a327063719ca24169d600b4c53693d89a881079b9820fab7b8f8e211cff9
RLBA-2022:3345
new packages: mtx
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mtx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mtx-1.3.12-26.el9.x86_64.rpm
aa712e9b6483f35593cd056df86dc551fecd3d95b4f19649eb9b1c796fc49680
RLBA-2022:3346
new packages: munge
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for munge.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
munge-0.5.13-13.el9.x86_64.rpm
3ddb5c379b6227315c28fc0ac84e891f778ac54ebfac59abfe5a420ec0c4944a
munge-libs-0.5.13-13.el9.i686.rpm
0bb6b2d8086965b9c229d4d3d2244cba80229373582b94f84f4ee200d5967f05
munge-libs-0.5.13-13.el9.x86_64.rpm
915122ccb6bd1903e3280ca64889ac98587098c2002fb2451a2ccd6e17e76bcc
RLBA-2022:3347
new packages: mvapich2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mvapich2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mvapich2-2.3.6-3.el9.i686.rpm
290f20ad060e46bb47908dadcac3165802d146da4b6dad56263d52334bfecd29
mvapich2-2.3.6-3.el9.x86_64.rpm
d40244c339969261b3016e89a5bdaecaf54e620fc44c6014e2b658f8ef8af472
mvapich2-devel-2.3.6-3.el9.i686.rpm
73a5561960be21b4953bf40ff0d930d441c7e4ef51a3b8f4b1d53b95a7b37829
mvapich2-devel-2.3.6-3.el9.x86_64.rpm
03cb36382df386c5d40f8fddb9b252cd87ffd5675862131660041865f010241d
mvapich2-doc-2.3.6-3.el9.noarch.rpm
26d068dc07b6831b9651445a2c3197565c4c64ad3eceaa3bfe4fb5908603d26f
mvapich2-psm2-2.3.6-3.el9.x86_64.rpm
ca36499080d6ae8032e76af3668d41813e03dd50194e1b98c2d66c77ae9e4332
RLBA-2022:3349
new packages: mythes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-1.2.4-18.el9.i686.rpm
19a25ed9efd23383829dff20c0c3af47628333e141966c78c3edf1066bb8eb7a
mythes-1.2.4-18.el9.x86_64.rpm
9c5a4860e65c3f859797d4117386f9bf94c50cd54c4e95610a62e40294d9eeb0
RLBA-2022:3350
new packages: mythes-bg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-bg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-bg-4.3-21.el9.noarch.rpm
1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb
RLBA-2022:3351
new packages: mythes-ca
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-ca.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-ca-1.5.0-24.el9.noarch.rpm
ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b
RLBA-2022:3352
new packages: mythes-cs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-cs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-cs-0.20070926-27.el9.noarch.rpm
c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e
RLBA-2022:3353
new packages: mythes-da
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-da.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-da-0.20100629.15.16-22.el9.noarch.rpm
2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233
RLBA-2022:3354
new packages: mythes-de
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-de.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-de-0.20210302-3.el9.noarch.rpm
56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298
RLBA-2022:3355
new packages: mythes-el
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-el.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-el-0.20070412-27.el9.noarch.rpm
a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393
RLBA-2022:3356
new packages: mythes-en
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-en.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-en-3.0-33.el9.noarch.rpm
cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83
RLBA-2022:3357
new packages: mythes-eo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-eo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-eo-0.20180330-8.el9.noarch.rpm
c55f617fb7604137dab74afa18454a6dbb3ebf687b5f0b7732205c51a1bc6e8c
mythes-eo-0.20180330-8.el9.noarch.rpm
e382eccb945d331b618b8e0feb5395609d7d16abbf7a062c11715a88166791e2
RLBA-2022:3358
new packages: mythes-es
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-es.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-es-2.3-10.el9.noarch.rpm
5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2
RLBA-2022:3359
new packages: mythes-fr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-fr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-fr-2.3-19.el9.noarch.rpm
c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb
RLBA-2022:3360
new packages: mythes-ga
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-ga.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-ga-0.20071001-27.el9.noarch.rpm
ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3
RLBA-2022:3361
new packages: mythes-hu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-hu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-hu-0.20101019-23.el9.noarch.rpm
95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967
RLBA-2022:3362
new packages: mythes-it
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-it.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-it-2.0.9l-26.el9.noarch.rpm
c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6
RLBA-2022:3363
new packages: mythes-nl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-nl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-nl-0.20130131-17.el9.noarch.rpm
1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121
RLBA-2022:3364
new packages: mythes-pl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-pl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-pl-1.5-28.el9.noarch.rpm
ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2
RLBA-2022:3365
new packages: mythes-pt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-pt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-pt-0.20060817-27.el9.noarch.rpm
1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36
RLBA-2022:3366
new packages: mythes-ro
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-ro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-ro-3.3-22.el9.noarch.rpm
b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7
RLBA-2022:3367
new packages: mythes-ru
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-ru.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-ru-0.20070613-25.el9.noarch.rpm
9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3
RLBA-2022:3368
new packages: mythes-sk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-sk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-sk-0.20130130-19.el9.noarch.rpm
03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed
RLBA-2022:3369
new packages: mythes-sl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-sl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-sl-0.20130130-19.el9.noarch.rpm
620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d
RLBA-2022:3370
new packages: mythes-sv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-sv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-sv-1.3-21.el9.noarch.rpm
9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3
RLBA-2022:3371
new packages: mythes-uk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mythes-uk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mythes-uk-1.6.5-22.el9.noarch.rpm
bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d
RLBA-2022:3372
new packages: navilu-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for navilu-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
navilu-fonts-1.2-19.el9.noarch.rpm
631312dae346453d8f0d2b469ca52d9ed268a625b1d279710dbb8c6c8bcb686e
RLBA-2022:3373
new packages: neon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for neon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
neon-0.31.2-11.el9.i686.rpm
ebf152c95e89da818070828e4c8354b179c4677f516bc9811cda1d2cfbde0465
neon-0.31.2-11.el9.x86_64.rpm
30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed
RLBA-2022:3374
new packages: netpbm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netpbm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
netpbm-10.95.00-2.el9.i686.rpm
469eb9451f4508b38adfe76e72ae4655856ad0d52d99e2ab30af070406eab7f9
netpbm-10.95.00-2.el9.x86_64.rpm
214d751e41a68f659ac8fd869c835d6258e9ee0243b6c93673d42a4a1e28c6a0
netpbm-progs-10.95.00-2.el9.x86_64.rpm
d9e8a1d308e2547a8ae6e0e968535861b1cfa6e154d7fd8fa2b467e45b6f4408
RLBA-2022:3375
new packages: nmap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nmap-7.91-10.el9.x86_64.rpm
ee236ffca7659faeb51bd74ac7dc6667867a79b30c27b1344ccd7d96b6e83a1b
nmap-ncat-7.91-10.el9.x86_64.rpm
68c404293d3a392dd0576d5f683c7448a912de26b6ba59900951308e8c308473
RLBA-2022:3377
new packages: nss-altfiles
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss-altfiles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nss-altfiles-2.18.1-20.el9.i686.rpm
c93b0f98b5ea2e3e7ce14aa7741bf8fb130eef5a5354407c8df8bf8f323223c2
nss-altfiles-2.18.1-20.el9.x86_64.rpm
f9beabe66d217b949578d08ea868893679e1516a7171439f9fe991e8ebd9d1a2
RLBA-2022:3379
new packages: ntpstat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ntpstat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ntpstat-0.6-6.el9.noarch.rpm
9bac2db04d262d94abab1f16b8e4a560831a33fdec3a12338c7614eb4739c69e
RLBA-2022:3378
new packages: nss_wrapper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss_wrapper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nss_wrapper-1.1.11-7.el9.i686.rpm
e7a13920e6db64f5f604a6daaf383af6a25feb93cd402d30139b36c8e3a6ad39
nss_wrapper-1.1.11-7.el9.x86_64.rpm
7842d293712037a0c80f850859d3f2c0455cdcb76a4c17b1ce0c9f059a43a0fc
RLBA-2022:3380
new packages: objectweb-asm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for objectweb-asm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
objectweb-asm-9.1-5.el9.noarch.rpm
4dd93dcacd0a3f36b6f1191dc286780de798c2a0190a0cf769eed9bb12bf81fc
RLBA-2022:3381
new packages: ocaml-srpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ocaml-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ocaml-srpm-macros-6-6.el9.noarch.rpm
d3734ecf41e5adca9ee09baf59e7a3a54481cd7bfad00e433d0fedb0eea2d924
RLBA-2022:3382
new packages: ocl-icd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ocl-icd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ocl-icd-2.2.13-4.el9.i686.rpm
81c3e18424d366ca07070a35d1cb084a2c113b7a4df846413b1b82177f25b761
ocl-icd-2.2.13-4.el9.x86_64.rpm
89c3df8be01178f6b06eca5c2025ef11e4983c50afdcf83c66454441aef9f6b0
RLBA-2022:3383
new packages: omping
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for omping.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
omping-0.0.4-26.el9.x86_64.rpm
a63f04d48c3112f9bb908204f919b95e1b74489f99f5bb5ac149f2a36c9c10f1
RLBA-2022:3384
new packages: ongres-scram
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ongres-scram.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm
67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580
ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm
ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9
RLBA-2022:3385
new packages: open-sans-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for open-sans-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
open-sans-fonts-1.10-16.el9.noarch.rpm
c7e8849df2eda286fd6660d82cc79bf7881d6af06105b8f2bf2d03e94e29ecdf
RLBA-2022:3386
new packages: openal-soft
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openal-soft.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openal-soft-1.19.1-16.el9.i686.rpm
8a3074d181183fd37064fa3f89c2016335868f2c8e26c7fba7685cb1e2263b86
openal-soft-1.19.1-16.el9.x86_64.rpm
a73661c62a75bc6aedbe47c67cfa5dabadd8f828732227b521e548ba9d2784e7
RLBA-2022:3387
new packages: openblas-srpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openblas-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openblas-srpm-macros-2-11.el9.noarch.rpm
c36ae20c96419534745708b7a93f20ce19f47e953233ca17c4994e25cd4d7c59
RLBA-2022:3388
new packages: opencl-filesystem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opencl-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opencl-filesystem-1.0-15.el9.noarch.rpm
d1365a4d760c5a07c29fc6bd80a8481336e1004f2e655b3b785c5cf18f7c09af
RLBA-2022:3389
new packages: opencl-headers
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opencl-headers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opencl-headers-3.0-6.20201007gitd65bcc5.el9.noarch.rpm
c0bc450d9442efd83aadd1770dc07e9b72dc917ef6047fb7bb8f62cd214d16db
RLBA-2022:3390
new packages: opendnssec
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opendnssec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opendnssec-2.1.8-4.el9.x86_64.rpm
3cf3df63f0edfb5d0a091005cfe7d8b1f3c213181ef687313ac53fabd944f070
RLBA-2022:3391
new packages: openexr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openexr-3.1.1-2.el9.x86_64.rpm
cad2b18ef4e06fdc32c7d62aea55a161d5f989cc3a506e9fd0317a78ca76048d
openexr-libs-3.1.1-2.el9.i686.rpm
b95d50ff0fb0ff2061f17d1fbddfda9cbaafe6b99de1744f5b814aca1d4b1d35
openexr-libs-3.1.1-2.el9.x86_64.rpm
6b152c299a73ac7bd009eb1f709a72e416a36682d2d4b115ffa4c834262477c9
RLBA-2022:3393
new packages: openoffice-lv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openoffice-lv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-lv-1.0.0-15.el9.noarch.rpm
f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f
hyphen-lv-1.0.0-15.el9.noarch.rpm
3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa
mythes-lv-1.0.0-15.el9.noarch.rpm
38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264
RLBA-2022:3394
new packages: openoffice.org-dict-cs_CZ
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openoffice.org-dict-cs_CZ.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hunspell-cs-20080822-16.el9.noarch.rpm
d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784
hyphen-cs-20080822-16.el9.noarch.rpm
18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a
RLBA-2022:3395
new packages: openslp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openslp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openslp-2.0.0-30.el9.i686.rpm
a722b82b8ed979603dd12b793670f5c9c1cbdc61a5aa2d5299dcafa6f69845b4
openslp-2.0.0-30.el9.x86_64.rpm
fc24a741a1d5fc5e2536b9903817e7cca60b720fc602c88f947121bad4050f97
openslp-server-2.0.0-30.el9.x86_64.rpm
8a9172f34df509d625123e6b13b453ab97169692c38146d35bb6fab30d6aea49
RLBA-2022:3396
new packages: opentest4j
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opentest4j.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opentest4j-1.2.0-9.el9.noarch.rpm
2ac518475aeb4bd5d8aaf664cf53304169fa237a13271ebbd8d82f947a194876
RLBA-2022:3397
new packages: openwsman
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openwsman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwsman1-2.6.8-22.el9.i686.rpm
4010ab11dd7b743bcf97e624813012d32ff2f27bde863ee228687595559417a7
libwsman1-2.6.8-22.el9.x86_64.rpm
2f30722870cccdb82b6449c9f7ce2626670a468925e602ecddb1c4414d4f7861
openwsman-server-2.6.8-22.el9.i686.rpm
d91a049139bf23dcbf728f4a7fd7f3a1b99725cded1a1d7265ab0b3631ae024d
openwsman-server-2.6.8-22.el9.x86_64.rpm
4f3da3696a5048e2d6f5f7c669ededd3e651b996f77df6dcc641b6e4f4c993f4
RLBA-2022:3398
new packages: opus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opus-1.3.1-10.el9.i686.rpm
f470999334727d845bfe2bfac6e31264d4573b7a978b5a3d2a59ab6a1839cc51
opus-1.3.1-10.el9.x86_64.rpm
a871c8c2662df51308853f4561cec2f1d7f948ab0a53ba1493f06a01e504f56e
RLBA-2022:3399
new packages: orc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for orc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
orc-0.4.31-6.el9.i686.rpm
c7ee17dd26a7e08fe2a4aee71bde3310b61123d696161e8cd765b0e0c9625146
orc-0.4.31-6.el9.x86_64.rpm
576764e1949b329ca17ba895be5ddab29472fbfac8be45d16f20a9d595f0d8a8
orc-compiler-0.4.31-6.el9.x86_64.rpm
5a1a5c037aeb555cfe6c88f16a6cb237f04a0fe2c434e9b2b7833e7f855bbfd0
orc-devel-0.4.31-6.el9.i686.rpm
759527a00245e1642ab3abed06dbce368b1b0b0914707d8457adabead12642e0
orc-devel-0.4.31-6.el9.x86_64.rpm
e447a415c6c395e88d9cfc4ce3ee88ad2298f82964a9d701c91811e97bec1732
RLBA-2022:3400
new packages: orca
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for orca.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
orca-40.0-3.el9.noarch.rpm
072db53cb31fe01840c4865c4cc4eb86259298c7ddd8fbcb91444149dbec6ed4
RLBA-2022:3401
new packages: osinfo-db-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
osinfo-db-tools-1.9.0-3.el9.x86_64.rpm
ead1a0c072b15e08587f888395a77efd6e7e1e5864004be9ab294b16c3f1876f
RLBA-2022:3402
new packages: overpass-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for overpass-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
overpass-fonts-3.0.4-8.el9.noarch.rpm
a945a57b6e385bcf03a4793b1ec6a68028e91097f143e278e749c4f9239e4fe2
RLBA-2022:3403
new packages: owasp-java-encoder
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for owasp-java-encoder.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
owasp-java-encoder-1.2.2-6.el9.noarch.rpm
0206e2b90330b93ea379ef2c373a02cc604dd01e6a55811f4911d73ebae2412c
RLBA-2022:3404
new packages: paktype-naqsh-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for paktype-naqsh-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
paktype-naqsh-fonts-5.0-5.el9.noarch.rpm
0816601f43b21491924c9424d46cc3ab6449739f71085c2983fa219dd5df24af
RLBA-2022:3405
new packages: paktype-naskh-basic-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for paktype-naskh-basic-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
paktype-naskh-basic-fonts-5.0-6.el9.noarch.rpm
1b25b765640e8c65f7e5b6d7bd26ce45d4e4e6814e6c54138561fd9f1e6cc02d
RLBA-2022:3406
new packages: paktype-tehreer-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for paktype-tehreer-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
paktype-tehreer-fonts-5.0-5.el9.noarch.rpm
ba483b5b1776a9152131a29ed47d164413d0b9e35fe756ddfa227eac7c5d8382
RLBA-2022:3407
new packages: pango
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pango.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pango-1.48.7-2.el9.i686.rpm
fe231369b196617584dd72fdba18d992c31c45b5527b7e0096d5e2fa8f4297b7
pango-1.48.7-2.el9.x86_64.rpm
befb665fe617febb70cefff6fa3313b9d7f87a7cf99e9ed067c7535c4aa9d558
pango-devel-1.48.7-2.el9.i686.rpm
e93b3d14aa79b7cda01541aef433a655c116877a8e1418b2d23abe940627d935
pango-devel-1.48.7-2.el9.x86_64.rpm
e7ad675e5684c63a943d6d7147c2abbcf399098788196eb19d7ebcf2b3ba00fb
RLBA-2022:3408
new packages: pangomm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pangomm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pangomm-2.46.1-1.el9.i686.rpm
855650062ca7fb0eaadc31283bc67acfe04a99eb46b8b5a09b3a8e736d1611e4
pangomm-2.46.1-1.el9.x86_64.rpm
4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376
RLBA-2022:3409
new packages: paps
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for paps.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
paps-0.7.1-4.el9.x86_64.rpm
31e8ece3aa187469afc8dc16ba296e0e0037e10acad23600e26ab8909b4a86ef
RLBA-2022:3410
new packages: patch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for patch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
patch-2.7.6-16.el9.x86_64.rpm
76b4b0ebecb7dc952372923a96c8f653a723c15299b3f8b7d2aa2ff37c8d948c
RLBA-2022:3411
new packages: patchutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for patchutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
patchutils-0.4.2-7.el9.x86_64.rpm
e6eebdc12804383f1986c09b95a6ca89b9567b7919ba3788bee8ab11e2dd875b
RLBA-2022:3412
new packages: pavucontrol
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pavucontrol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pavucontrol-4.0-8.el9.x86_64.rpm
b0a763ad1f790d0c6e7cf8ff32cb0cfd9e536fb248cd219b88e5122ec3009be1
RLBA-2022:3413
new packages: pbzip2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pbzip2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pbzip2-1.1.13-6.el9.x86_64.rpm
cec244f76528d0c2d7faa94a66e2987a2578c3b3b3051e14c76dd65f4729479b
RLBA-2022:3414
new packages: pcaudiolib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcaudiolib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcaudiolib-1.1-9.el9.i686.rpm
28a9a8e20e39aca766f65abd145bfa66ca83a93640ae1c0441502ee8d944b81c
pcaudiolib-1.1-9.el9.x86_64.rpm
56da3b87ffd26641d1903dc632fd86e92c3268e5cfeff849833f592649be3122
RLBA-2022:3415
new packages: pentaho-libxml
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pentaho-libxml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pentaho-libxml-1.1.3-30.el9.noarch.rpm
d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4
RLBA-2022:3416
new packages: pentaho-reporting-flow-engine
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pentaho-reporting-flow-engine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm
561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776
RLBA-2022:3417
new packages: perl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-5.32.1-479.el9.x86_64.rpm
e33ab1b77636e133143215f0c59d01007aa4ce99cb2f7ccdaa5a35aa44ac2315
perl-Attribute-Handlers-1.01-479.el9.noarch.rpm
1306819729e96e27da3c69160a9e383aa49431ca396669fb2219d68a694ad707
perl-AutoLoader-5.74-479.el9.noarch.rpm
de126737f2568d7cc48ace946b5c5a8b00123ef1655a2ef3eabdc3931bd51a3e
perl-AutoSplit-5.74-479.el9.noarch.rpm
a9cdf12b568bbd2d05e0af8ef4a0f90d8b1b466a118d66c23784ce5495598354
perl-autouse-1.11-479.el9.noarch.rpm
379a9157fde71791fce35097fa0df9db038b071e67ac05a6e757a37b5e27ca2e
perl-B-1.80-479.el9.x86_64.rpm
80504c6be273e46037d16ed933b61b97e776adfef2d43cac081b38505528bb17
perl-base-2.27-479.el9.noarch.rpm
617fc317493cf592d17b1d0f36f12f9160ca4510a2801b258d641e869abb2870
perl-Benchmark-1.23-479.el9.noarch.rpm
c8a38526a3e5c84afbc241772985c64b68929b693282fcda826d5c6ff6ff6f3a
perl-blib-1.07-479.el9.noarch.rpm
f88b66ef6c64c9687754bbe918c68018667f78d2381bb7d633f0069955317337
perl-Class-Struct-0.66-479.el9.noarch.rpm
45770669108af7457ce79781831593f480acccf54478909e96d4c7ed0a80984a
perl-Config-Extensions-0.03-479.el9.noarch.rpm
95e2e3d1c0914f34199e94ee50d7535a086f0feea1b1bd9134fd18acf9b5919b
perl-DBM_Filter-0.06-479.el9.noarch.rpm
fc369fa6a8ed44a3739b9236c2438f109e2b99d724b86412603cee5f8b9f7a72
perl-debugger-1.56-479.el9.noarch.rpm
22b3a23bd34da5736e371fc1ef97c852ccd641e8c570a8bffbc4141666f37823
perl-deprecate-0.04-479.el9.noarch.rpm
f16ddedabfd6eb9f27212730cf7b64cc01a8d0156e465d87ee39983815888422
perl-devel-5.32.1-479.el9.i686.rpm
6d444ffce62549d805791f3fd4c8dcac98ff253cbfb97f4f526ad11002f813b4
perl-devel-5.32.1-479.el9.x86_64.rpm
52319d0bcf957455dfbf4bb1ba989d8ce1260a33ffad2b9fb459e4abbbca3a12
perl-Devel-Peek-1.28-479.el9.x86_64.rpm
d0171e37d2da8004f50c84b23288432e36f888aeee733024cdc7fcacc2f9f139
perl-Devel-SelfStubber-1.06-479.el9.noarch.rpm
03da81dcad3d204013ee1b847531619aa900c1dece5846985e20dfd466b0d76b
perl-diagnostics-1.37-479.el9.noarch.rpm
9a718213410853f9e6d915ff894650e6f5e286aaef39e246ab9cbb2c6b8647db
perl-DirHandle-1.05-479.el9.noarch.rpm
1f990bc9f79235d1949d2ece7d1fe0bfd61862a564133785cbf6facec4e3e5ba
perl-doc-5.32.1-479.el9.noarch.rpm
a66f79d53538a2b34375e75b515ac62f7ad4d32e97a3a2e108a509ca0cdd21af
perl-Dumpvalue-2.27-479.el9.noarch.rpm
6e824780bcedfa7cc8f25902581cb63b14af52a6459cc1c9b78575daca522378
perl-DynaLoader-1.47-479.el9.x86_64.rpm
7d67e9d680baeb6ccc7e265dca114ed00c1928a5b63989e480d859c77ecd1b39
perl-encoding-warnings-0.13-479.el9.noarch.rpm
a5a1d52a3f0e6c090370c0d09c48de801390c67e85c17d886470c3b7731488bd
perl-English-1.11-479.el9.noarch.rpm
6873fe92a079403ccaf19cf5b2d2fc653f7ca5104cf456265bc3d64899e6f157
perl-Errno-1.30-479.el9.x86_64.rpm
9294d0854d99c320d06255a4949a850d0e5d85739a83b946a0ea18c5af9b31a0
perl-ExtUtils-Constant-0.25-479.el9.noarch.rpm
80a14d83ffae2b23863c086cc9936b49e207197f499552126d6be72df595debb
perl-ExtUtils-Embed-1.35-479.el9.noarch.rpm
b48608ee1ed1488bf2fcfa65101f28152d7a0abce0c06cc34bb35fe4cf7c2f8f
perl-ExtUtils-Miniperl-1.09-479.el9.noarch.rpm
c53f4d9aab3c372097a192645d0f0d483607139be895c1c9d6f0ae10dea47794
perl-Fcntl-1.13-479.el9.x86_64.rpm
56cb35e61436eef1e1cc9e4baa541680db3f38211d0aaa0bd9de833a1a63746f
perl-fields-2.27-479.el9.noarch.rpm
486ba18d3fa23f4445287731c30a48e17bfb972295df599b184e948236ac3494
perl-File-Basename-2.85-479.el9.noarch.rpm
17454567c250ec113ac216de94e9c1bba733de373f9ce1a5065f146ac44e0e50
perl-FileCache-1.10-479.el9.noarch.rpm
90ba4138ef7f11afb807472f87c1b077bbb685af3f4c53946b2f00a442587ee9
perl-File-Compare-1.100.600-479.el9.noarch.rpm
5230e821b757029dd346e36cc7d2ebebea6eb2db824c41950c839dbfa143aa1f
perl-File-Copy-2.34-479.el9.noarch.rpm
64b6824c5aecb0b2e8d81b9e3350adc5e7548c25aba9748359f8781f7b038cb0
perl-File-DosGlob-1.12-479.el9.x86_64.rpm
6a2beb8892bbe4d6dc3067fdf666ad0ca037e18519cca15511bbe09f81a22183
perl-File-Find-1.37-479.el9.noarch.rpm
6edb8d78319a62b9933eb05f196cf4c5c80ea92a0c6e3c3f93a2da788d1811bf
perl-FileHandle-2.03-479.el9.noarch.rpm
fe8a728b970834e974577ccc3352f6f2bf8642d4f25903845651fcd4c641814f
perl-File-stat-1.09-479.el9.noarch.rpm
28312b10f75967a7df9cbb302c730092016be042920f473e5f4d652ea720a0f1
perl-filetest-1.03-479.el9.noarch.rpm
6e68d7d2dec5a7b6cdb736cf2c5abb3e9b16ffd69c329981e2a2fdc4831cd346
perl-FindBin-1.51-479.el9.noarch.rpm
48de689527c8004fb2d1a72ab7497581f5bef9920cad51b7a31a79013312a813
perl-GDBM_File-1.18-479.el9.x86_64.rpm
77a2b828226f8d7aca828890e9ec5e4d6e8232866ab752b54584d4a486b95282
perl-Getopt-Std-1.12-479.el9.noarch.rpm
340c7e9a511fc53d82a9fc584bdad8215e4d0eebb5d7d2568af8b38a460b5009
perl-Hash-Util-0.23-479.el9.x86_64.rpm
6cdbb8366e1eb3dd4495a8a8e351a027a73b6ff30b11c6cfa73414ac4470b801
perl-Hash-Util-FieldHash-1.20-479.el9.x86_64.rpm
7415b030f2a4feab08d4570fd36f7aec7617a15c2ebceb0b659cb08d7bb9a466
perl-I18N-Collate-1.02-479.el9.noarch.rpm
dd3c8fc259b61ef01b78a7f9398f3de2e4a9a51955ef3cf397696e9a35d48e5a
perl-I18N-Langinfo-0.19-479.el9.x86_64.rpm
a502cb3b1f1131eff971e3bce520767aee4bba313b99635006a78ef76f491a35
perl-I18N-LangTags-0.44-479.el9.noarch.rpm
e64c35a0ea9566be4cd8b1c236c39587aa4bd7c3bd6a26d83aeea08d635acbef
perl-if-0.60.800-479.el9.noarch.rpm
d93d6f5ab112030ace26dedc156d8f6e007553b2319e6a604ce4297d5263a812
perl-interpreter-5.32.1-479.el9.x86_64.rpm
ff8daff6eae5efd96fff88d01ff6da824483d51dee6d5268b1497e60b7fcc319
perl-IO-1.43-479.el9.x86_64.rpm
92acc2529705ef4f7c4d27be78e22681c3965641db45f9a096dfc0b324df2c85
perl-IPC-Open3-1.21-479.el9.noarch.rpm
86beddded68d9ec55d36d0ef7c42228c3fdc1103263fe1d9a18c00f438a14fd7
perl-less-0.03-479.el9.noarch.rpm
a0a342d3aec542a53cf96ab91dd2ce870d99b6af9cd236d778148f10745047b8
perl-lib-0.65-479.el9.x86_64.rpm
7f7111d81acbffe263faec49857bbebe9e0ed5db4aff8102e75bb3a52ace3885
perl-libnetcfg-5.32.1-479.el9.noarch.rpm
d81d853116bbff5df8fff3c891042d249a83ce4ce72f725af22c10922b95bb65
perl-libs-5.32.1-479.el9.i686.rpm
a2f05a5d0991e660f9570fa9e6483d25cd046e36eec393041c6d5e59b1d041b1
perl-libs-5.32.1-479.el9.x86_64.rpm
df20b5ec749712b747812adc5d65128888d67b891a11ad8ef990de645952e174
perl-locale-1.09-479.el9.noarch.rpm
38ec2e1a1b3eded8c0aae1e8eeb314303c8734129b0b784ccdafbae46d7f17b9
perl-Locale-Maketext-Simple-0.21-479.el9.noarch.rpm
13fb77e5f71b91d94b0dced57e08a1ee7e6a4212d302bb0de30d507b5b7639d8
perl-macros-5.32.1-479.el9.noarch.rpm
d43cdb8257da464255221693e7b386482f3b95bb60f23fe6fa04b5226a28f09d
perl-Math-Complex-1.59-479.el9.noarch.rpm
576e774249e1df2de036505faa3f18fd41696e940fcd697cf227e644aac1476f
perl-Memoize-1.03-479.el9.noarch.rpm
8bf8a8e6c20ca9393f6795ad88dac1c3ba0224b71ee42784c21bea8ce5459086
perl-meta-notation-5.32.1-479.el9.noarch.rpm
56b1d3a2a814523756753d845974dee94f13fb9c13cbb9719d4600cf049a7a33
perl-Module-Loaded-0.08-479.el9.noarch.rpm
d1b76475a866ef663c9e552893e0c894f199c3a0acb5766c1c2ba59fab16529d
perl-mro-1.23-479.el9.x86_64.rpm
d071dac6870f5bcdaa6be3ae1be348efee96a1514e2a6b03ee3af5b7a14af945
perl-NDBM_File-1.15-479.el9.x86_64.rpm
fce0f451a8dde16ca037bae31ae6135dd00c3b290200b12ff24a4805383b5ff6
perl-Net-1.02-479.el9.noarch.rpm
c863c8ab9bfbcdcd6b536665b69ab79d2f8e73475b7e91e5fbdeb35cb225b8ae
perl-NEXT-0.67-479.el9.noarch.rpm
1fac0bacfdfba85156d89b14364c824922a8080e5af76571b1d548d128065c40
perl-ODBM_File-1.16-479.el9.x86_64.rpm
79de369c22015e1439efd9aca5c53c817b1f0d489a22b90893d2005cf4d30ec2
perl-Opcode-1.48-479.el9.x86_64.rpm
bac67c6ec0a893e09c29b0bfcced117050799a9b2d788b7402a5394891992b39
perl-open-1.12-479.el9.noarch.rpm
47b23621952aed071a574d14b09c635bf24a7049bdbb02280f35756d5b821d8f
perl-overload-1.31-479.el9.noarch.rpm
f482b8996a6d0d84161f6862353882114aa9ad98460891f13384cc7f6ce37ddb
perl-overloading-0.02-479.el9.noarch.rpm
16d4fa2d70531bb0a7cde3caf6afaa67a25604eb64ceb2870811eb2f693456d9
perl-ph-5.32.1-479.el9.x86_64.rpm
8e7faa030561690b64b0be43682660f872f4003e22f3eb34f01b9ab1841309a0
perl-Pod-Functions-1.13-479.el9.noarch.rpm
5f49ca25e407bbc56169a51c2cf06c0a935a5334dabf65dca53fc45ecbe88575
perl-Pod-Html-1.25-479.el9.noarch.rpm
ea4b11a3d8c8a457f71ecb8107cecb68f549281f2fe7204c7dedfb859464dae1
perl-POSIX-1.94-479.el9.x86_64.rpm
7cb7aa9eb5821378476a9c78985013dc18c9d9da8dca87afe79822b26b68ee55
perl-Safe-2.41-479.el9.noarch.rpm
28db03ce508ca215f9d3ccf0c2798ee205806bacd71a7ea3aa632aa3938eae1e
perl-Search-Dict-1.07-479.el9.noarch.rpm
b203f0f75cd146fbd0d74c9a1308bf593f8f4f1fa715751079ef776e35ba58e0
perl-SelectSaver-1.02-479.el9.noarch.rpm
5c1d254f27e258df2ff1c37cb979485fe2068a02e796473daab2a1d7382cf82d
perl-SelfLoader-1.26-479.el9.noarch.rpm
d0f7227f90244271723cf652dc3580d5addb2d814b18b35b40df30b67dbcfd60
perl-sigtrap-1.09-479.el9.noarch.rpm
fd0400b4dca1b73d5871c3ff61a74a636a6891cf07c382d5974b034acf0c1979
perl-sort-2.04-479.el9.noarch.rpm
22063eb4e21da51f363c03ff68f2e52783dadb9d9a9455421038644eaa27ba47
perl-subs-1.03-479.el9.noarch.rpm
97915fa7a4e0d80c5f947cee182db0a4a595b38af54752226b4e0c216a3bb2a1
perl-Symbol-1.08-479.el9.noarch.rpm
8490f7b67ee7b1c58ce1a6bdc6578ec9bc997c14a9e03eb746769167e4a7e621
perl-Sys-Hostname-1.23-479.el9.x86_64.rpm
7472ae5bd85b641847db7cbedbd9a82649d1311071d12e2fce09a23ff7dfc82c
perl-Term-Complete-1.403-479.el9.noarch.rpm
a603d3dce35a5b86266ae545ec80aa84213ebc325bce69d813edaab03ed976f0
perl-Term-ReadLine-1.17-479.el9.noarch.rpm
1a0c85ffee7a3d4e7f9d285dae4b4a2452da4ec51dbcc17ea7fef5e9326185a2
perl-Test-1.31-479.el9.noarch.rpm
ab455afd77ee3f19e715e4cb8c4d439bea465e5340aeed5f100fd96462ecf0e8
perl-Text-Abbrev-1.02-479.el9.noarch.rpm
d85d4d9a3b7aedd9bcffda3fb9e7f3af3afbad3ce5a94e511bc8202c7c44dc43
perl-Thread-3.05-479.el9.noarch.rpm
0dec0ef10efc7b57790d770d410412706bff3d6a454fdaa83b366ac2139c0277
perl-Thread-Semaphore-2.13-479.el9.noarch.rpm
3e397205265c3ec8bbaa1effe9a6e252f772abbdf170e774f3fd08c5a94a9f88
perl-Tie-4.6-479.el9.noarch.rpm
a5a73678e556dc0ee54c07fcd10f93634cd4db24021265f69f5a38623e1dfb90
perl-Tie-File-1.06-479.el9.noarch.rpm
85711f2ea7466fa753a4001b3c2cf7ea2ba039d1b34f67170241ca6dcb2f9990
perl-Tie-Memoize-1.1-479.el9.noarch.rpm
746c0e9c5a67cfb26c781f596457f5591d31cf8a6b2af5e52591ef0e0a438e32
perl-Time-1.03-479.el9.noarch.rpm
a6de2353b343ae13c2ba72b1b0415b4dbfae51538fe3e5e2b3b05d1ac9414457
perl-Time-Piece-1.3401-479.el9.x86_64.rpm
ac8c280211dc2669793c3aaa807b212a69aeddb65de817f4383f5899eea66dff
perl-Unicode-UCD-0.75-479.el9.noarch.rpm
1c886c53e3984fb2d5e4d4a547b4a4a2fb54d9b1679764993ee78397ab549ad2
perl-User-pwent-1.03-479.el9.noarch.rpm
a8b82c2c6a4095761959c75c46c4e3485c9888b06ff2163497472080c7e8455b
perl-utils-5.32.1-479.el9.noarch.rpm
eee7dbfc25a96a722a6ccc4ddbdcd0b7954fd5fffefb6b47408267241812fc07
perl-vars-1.05-479.el9.noarch.rpm
5d7248a460e62639ed4ee82565b54f672258a2d09511d4150a73a3c2fd87ffd4
perl-vmsish-1.04-479.el9.noarch.rpm
f2d6e9869251e6ed929e4a9ac1b2aaab2668f6fb4a5447105bd4dbc60f06d99f
RLBA-2022:3418
new packages: perl-Algorithm-Diff
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Algorithm-Diff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Algorithm-Diff-1.2010-4.el9.noarch.rpm
1dbbf8ac9314c0bf90a7dae471dfe53108397b35d4b25209139b76b1e24df351
RLBA-2022:3419
new packages: perl-App-cpanminus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-App-cpanminus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-App-cpanminus-1.7044-14.el9.noarch.rpm
aa994e604155e03ae9ae787d467b39059ab859881029ad2c5ba8492748d44e84
RLBA-2022:3420
new packages: perl-Archive-Tar
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Archive-Tar.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Archive-Tar-2.38-6.el9.noarch.rpm
c185824c00390e992023ba28c65103d104d4fe86d2586a061ceaac24fe09cb4e
RLBA-2022:3421
new packages: perl-Archive-Zip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Archive-Zip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Archive-Zip-1.68-6.el9.noarch.rpm
69ea2f4b2d67ab411992385c3b51b9e56d6cf95c587029a3ecb49c9f9004f957
RLBA-2022:3422
new packages: perl-Authen-SASL
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Authen-SASL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Authen-SASL-2.16-25.el9.noarch.rpm
d13bbcfd15e24e34cba72125cb8d36cac7b6e13830d7cce2b6bc0de5982bf441
RLBA-2022:3423
new packages: perl-BSD-Resource
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-BSD-Resource.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-BSD-Resource-1.291.100-17.el9.x86_64.rpm
ea2140915bf07e65ad3ec5c895561df214791a813c3c496c3387fc53e74646b4
RLBA-2022:3424
new packages: perl-Bit-Vector
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Bit-Vector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Bit-Vector-7.4-24.el9.x86_64.rpm
b2a381dbba67e3a92d4c0909e65371ef6e4df7bc817430da91576099efee895d
RLBA-2022:3425
new packages: perl-CGI
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CGI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CGI-4.51-5.el9.noarch.rpm
c2878b39cbadab12d0ce72f74a3969bc9c88862c87524103347378d96d861313
RLBA-2022:3426
new packages: perl-CPAN-DistnameInfo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN-DistnameInfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-DistnameInfo-0.12-23.el9.noarch.rpm
c22d80fc015994622993fe1de1ed7f05599c33c5c300e9412b8f39504a5b4510
RLBA-2022:3427
new packages: perl-CPAN-Meta
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN-Meta.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-Meta-2.150010-460.el9.noarch.rpm
82c3fd673a8b44ef1e719598aabfc9d3007b4bb4294c1630c0f6d75562b855c3
RLBA-2022:3428
new packages: perl-CPAN-Meta-Check
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN-Meta-Check.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-Meta-Check-0.014-17.el9.noarch.rpm
ccfc82c6ba27bc145dc42f39f0256b6f4b1e3f49b8d161a01afd6fa959d133ad
RLBA-2022:3429
new packages: perl-CPAN-Meta-Requirements
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN-Meta-Requirements.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-Meta-Requirements-2.140-461.el9.noarch.rpm
031a64259a5674f770541c9596a947cb9634633c4facd888d59134edbaa0bdea
RLBA-2022:3430
new packages: perl-CPAN-Meta-YAML
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-CPAN-Meta-YAML.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-Meta-YAML-0.018-461.el9.noarch.rpm
89eae1dfd600e246e8cdd69078caa903201eedce276a273bdbed4dbf830a6e46
RLBA-2022:3431
new packages: perl-Carp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Carp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Carp-1.50-460.el9.noarch.rpm
d7b68a8235ad65d52d2d40d0608f876a8b13b1a3dcadae2f09b126407db17ee0
RLBA-2022:3432
new packages: perl-Carp-Clan
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Carp-Clan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Carp-Clan-6.08-8.el9.noarch.rpm
deebe1d98e741aa8b77bc767a6a817349e809d54abbdfeb24e4459bdc3e90826
RLBA-2022:3433
new packages: perl-Class-Inspector
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Class-Inspector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Class-Inspector-1.36-7.el9.noarch.rpm
b72c5061210e5281d51f7321a2f8143018aa8bb662b084b4651b361aa1729ec4
RLBA-2022:3434
new packages: perl-Clone
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Clone.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Clone-0.45-6.el9.x86_64.rpm
54984bdf012986eac17bda4c736f400ca57b32236dddeb0d0c0c2ae8ca9d4ed7
RLBA-2022:3435
new packages: perl-Compress-Bzip2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Compress-Bzip2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Compress-Bzip2-2.28-5.el9.x86_64.rpm
20655c91677cd4eb2f98c6b42facc40e5bcdae271f0e493f3637683d5e5d6fd0
RLBA-2022:3436
new packages: perl-Compress-Raw-Bzip2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Compress-Raw-Bzip2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Compress-Raw-Bzip2-2.101-5.el9.x86_64.rpm
e3b52e1bc33ffb244e0f7792941d02fe72a93917922acc4ecfe4f07748a89c03
RLBA-2022:3437
new packages: perl-Compress-Raw-Lzma
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Compress-Raw-Lzma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Compress-Raw-Lzma-2.101-3.el9.x86_64.rpm
fc9b0fa2bd5e74f7d7b1d6b83a20d8ec370f574120bcd18d49bb5c092f540bf3
RLBA-2022:3438
new packages: perl-Compress-Raw-Zlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Compress-Raw-Zlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Compress-Raw-Zlib-2.101-5.el9.x86_64.rpm
c427d20a5b1ec8bc1bd51e7117e5f0a12f46f63fe2f699ed68ef96761bf907eb
RLBA-2022:3439
new packages: perl-Config-Perl-V
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Config-Perl-V.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Config-Perl-V-0.33-4.el9.noarch.rpm
edc1020a208f99dd038f04afc6a5456fe6f062160bddc3639ae23fcfc28464dd
RLBA-2022:3440
new packages: perl-Convert-ASN1
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Convert-ASN1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Convert-ASN1-0.27-24.el9.noarch.rpm
295d8d287c126ef467d1665cc7fb878df35f0f5395c081ebd4deb2c917d7f842
RLBA-2022:3441
new packages: perl-Crypt-OpenSSL-Bignum
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Crypt-OpenSSL-Bignum.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Crypt-OpenSSL-Bignum-0.09-16.el9.x86_64.rpm
9bdee3f4e03f8de0bc6eda1108f924189e7cc3ba35ddf61b984aaaf4cfda30ed
RLBA-2022:3442
new packages: perl-Crypt-OpenSSL-RSA
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Crypt-OpenSSL-RSA.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Crypt-OpenSSL-RSA-0.31-13.el9.x86_64.rpm
e28b237917209dd7d385ea85f9bef5ab9630d11652d35b2c89bbb1e612450c2e
RLBA-2022:3443
new packages: perl-Crypt-OpenSSL-Random
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Crypt-OpenSSL-Random.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Crypt-OpenSSL-Random-0.15-14.el9.x86_64.rpm
cdf3681ebc3371879ac7979b01741df1d859a6c4a23015fe3d97c1e82dc4b8bb
RLBA-2022:3444
new packages: perl-DBD-MariaDB
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-DBD-MariaDB.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-DBD-MariaDB-1.21-16.el9_0.x86_64.rpm
e97495599d4a243789303524a1d9ea9bc48c5a2203d9332c2f3af614e4cde163
RLBA-2022:3445
new packages: perl-DBD-MySQL
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-DBD-MySQL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-DBD-MySQL-4.050-13.el9.x86_64.rpm
a3550f83d14ddf7650b7ab4e32d280f8ea6897e082b259512eeb51a4048f64e6
RLBA-2022:3446
new packages: perl-DBD-Pg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-DBD-Pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-DBD-Pg-3.14.2-5.el9.x86_64.rpm
0c1eca976d8975ec447ce14c219a46c0b2fbf939ea81901f12a0efbb353c09c3
RLBA-2022:3447
new packages: perl-DBD-SQLite
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-DBD-SQLite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-DBD-SQLite-1.66-5.el9.x86_64.rpm
5f643508f4703ed5d89c0a6e608f937d78b0bdb8d4db52846a04c44342a32b64
RLBA-2022:3448
new packages: perl-DBI
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-DBI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-DBI-1.643-9.el9.x86_64.rpm
2b1cd9e1274fa806c9d84c88fe585cbe270c597fa8d2eb5c866c3b5a8571ee18
RLBA-2022:3449
new packages: perl-DB_File
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-DB_File.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-DB_File-1.855-4.el9.x86_64.rpm
4d6bb98553fa745eace516d22ec186eec0a228ad89d920ca40851dd5d209b599
RLBA-2022:3450
new packages: perl-Data-Dump
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Data-Dump.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Data-Dump-1.23-18.el9.noarch.rpm
e26a176594d468957d49bd3be728bff3143fc2182d3a436bf1731926566a659b
RLBA-2022:3451
new packages: perl-Data-Dumper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Data-Dumper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Data-Dumper-2.174-462.el9.x86_64.rpm
9de98b2b4bff63d413158a65bba5334d8536c6eb1b3398d76f024e0e9f74ce75
RLBA-2022:3452
new packages: perl-Data-OptList
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Data-OptList.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Data-OptList-0.110-17.el9.noarch.rpm
8f5242e63e752a1a6bfd1230533c0ff8068f8991369b1ac005322922913603ec
RLBA-2022:3453
new packages: perl-Data-Section
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Data-Section.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Data-Section-0.200007-14.el9.noarch.rpm
268d059ad9b62e5184228da7300c40eed458813adda64813f8a5cf67785beac2
RLBA-2022:3454
new packages: perl-Date-Calc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Date-Calc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Date-Calc-6.4-20.el9.noarch.rpm
3ed9f7f8bc2c0170fbb8f29013c13111a7b1deaa54b8c7635cf7b1d7cb6e94e6
RLBA-2022:3455
new packages: perl-Date-Manip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Date-Manip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Date-Manip-6.85-3.el9.noarch.rpm
f3b9c8433aa02aaa3727aa11b4ea1a6781e807855e36aaa3067e6f6a0d8fa5b0
RLBA-2022:3456
new packages: perl-Devel-PPPort
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Devel-PPPort.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Devel-PPPort-3.62-4.el9.x86_64.rpm
09968fcd23247b3587cb2b04df143a4736930329371cf3c67fbf4a803eb22240
RLBA-2022:3457
new packages: perl-Devel-Size
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Devel-Size.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Devel-Size-0.83-10.el9.x86_64.rpm
09dadd63a55e5aab24ff6c30cfc89faf914e8401dd95f8aba5941daa4cea4a6e
RLBA-2022:3458
new packages: perl-Digest
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Digest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Digest-1.19-4.el9.noarch.rpm
5016ad372d63577fae720e9ee3f5249eb72d063397bf19f0de746c7ea88154a7
RLBA-2022:3459
new packages: perl-Digest-HMAC
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Digest-HMAC.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Digest-HMAC-1.03-29.el9.noarch.rpm
41a244cd7c87efc75498145d2f04da9f736c43ed116ae73e4556087492186007
RLBA-2022:3460
new packages: perl-Digest-MD5
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Digest-MD5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Digest-MD5-2.58-4.el9.x86_64.rpm
b1f4db8af3cab8814a4fea1c773a0f2e4c7d011fddaad24b1c28f2bfd0ddb144
RLBA-2022:3461
new packages: perl-Digest-SHA
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Digest-SHA.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Digest-SHA-6.02-461.el9.x86_64.rpm
1ad99c1e7fbfc9099806768d8e9730fff8b61e05e364b75b401bfa8195e15a3f
RLBA-2022:3462
new packages: perl-Digest-SHA1
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Digest-SHA1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Digest-SHA1-2.13-34.el9.x86_64.rpm
3256a7f5dc777b6f4b7e7347491a8b22a71990e75c30156491131c0902d7784f
RLBA-2022:3463
new packages: perl-Encode
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Encode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Encode-3.08-462.el9.i686.rpm
b0814aee28defbe03d936dd810dcd67b0bd3037acd2790dae66ea4cbf5cc4567
perl-Encode-3.08-462.el9.x86_64.rpm
e82e31795bc9935d931f3a3d1e6c047a53bad58639a5416ba6dc109f9bf7d21b
perl-Encode-devel-3.08-462.el9.i686.rpm
6418f7d4273c6fc180547021d25685f710f400cecabc38b8452c7c131ba6ed9e
perl-Encode-devel-3.08-462.el9.x86_64.rpm
1d2dd8d8c69cfe60d90caa8eed816c88b316077a4432048877fcfb8ee7d4e13b
perl-encoding-3.00-462.el9.x86_64.rpm
78be2b82921e3510ac1e8c9134dcdd07ae886a148254bcecc74f1b1f1f50c6b7
RLBA-2022:3464
new packages: perl-Encode-Detect
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Encode-Detect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Encode-Detect-1.01-37.el9.x86_64.rpm
d5efce87a69c7593b06ffa3f158cd55d7ad7cd1dd81076a27eccce643579c208
RLBA-2022:3465
new packages: perl-Encode-Locale
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Encode-Locale.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Encode-Locale-1.05-21.el9.noarch.rpm
e724850e82ea3ea4a32d6b9b33430317898ff17959578e7aa1ee56e5cc9b5da5
RLBA-2022:3466
new packages: perl-Env
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Env.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Env-1.04-460.el9.noarch.rpm
b760bf7138cbd7d3cfffba1f1c70714eff11314ba3426f9100799e3397645c8b
RLBA-2022:3467
new packages: perl-Error
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Error.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Error-0.17029-7.el9.noarch.rpm
cbd8a8136141df16d087caaed262a8bfa6f973f993893920322d400941a603ef
RLBA-2022:3468
new packages: perl-Exporter
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Exporter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Exporter-5.74-461.el9.noarch.rpm
561a49eff3da57f0b88fc3251691998077d34555af431695525babc6aac09dae
RLBA-2022:3469
new packages: perl-Exporter-Tiny
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Exporter-Tiny.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Exporter-Tiny-1.002002-6.el9.noarch.rpm
9644047a354af748fb99f01dfdb472cd385e4f554761e854943c73aadddadc2f
RLBA-2022:3470
new packages: perl-ExtUtils-CBuilder
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-ExtUtils-CBuilder.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-ExtUtils-CBuilder-0.280236-4.el9.noarch.rpm
603ec2b9cc5338988631fcdf168e457b7a4d86f199d56f95e05ae0055add9bba
RLBA-2022:3471
new packages: perl-ExtUtils-Install
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-ExtUtils-Install.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-ExtUtils-Install-2.20-4.el9.noarch.rpm
35025f907a34a24559259292c7734df02da90feb99ba52cccfb9797f06bacc33
RLBA-2022:3472
new packages: perl-ExtUtils-MakeMaker
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-ExtUtils-MakeMaker.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-ExtUtils-Command-7.60-3.el9.noarch.rpm
e4828127d1d18cab13b36bbc0164b6e64a3118a2d79ba870276614c9f977176f
perl-ExtUtils-MakeMaker-7.60-3.el9.noarch.rpm
4b3b90c4c770ef084db9df1cd8f57a0cff653f6a61b2a77b91b02ff2bc4908f5
perl-ExtUtils-MM-Utils-7.60-3.el9.noarch.rpm
c0e2a133565b5331007a88277cd876d84d73b1b785f10ab9652b1fe73d45a3cf
RLBA-2022:3473
new packages: perl-ExtUtils-Manifest
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-ExtUtils-Manifest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-ExtUtils-Manifest-1.73-4.el9.noarch.rpm
eed523a4484449313b5541bcd4e9a22b05574cb8fa9981ed713dd596060d39e3
RLBA-2022:3474
new packages: perl-ExtUtils-ParseXS
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-ExtUtils-ParseXS.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-ExtUtils-ParseXS-3.40-460.el9.noarch.rpm
024db0a83463bceedbafd2e03dc73c26a2755dceba6bbb3fed293a20ba1f3a6d
RLBA-2022:3475
new packages: perl-FCGI
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-FCGI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-FCGI-0.79-8.el9.x86_64.rpm
fe4cd017a701cf8f19fe1c525e97a056ec823b435ce88f9d766f30b32067c21a
RLBA-2022:3476
new packages: perl-Fedora-VSP
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Fedora-VSP.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Fedora-VSP-0.001-23.el9.noarch.rpm
9d3be38d11e891d04950edeb670463808dba327e20bb88f0886e58f22a5206ab
RLBA-2022:3477
new packages: perl-File-Fetch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-Fetch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-Fetch-1.00-4.el9.noarch.rpm
9cd9cf4200e0e6cd51bb273aa8ee666495edf942111e14875903b174fb9fe4de
RLBA-2022:3478
new packages: perl-File-HomeDir
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-HomeDir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-HomeDir-1.006-4.el9.noarch.rpm
449e34d1e638be8f260a66e13b95d6650fe479a172b373b5edf476dcd7798097
RLBA-2022:3479
new packages: perl-File-Listing
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-Listing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-Listing-6.14-4.el9.noarch.rpm
cbbe55ccdb4e8741e444453883e4357dea8ef5ffe5335c0a6be22a3b619f2874
RLBA-2022:3480
new packages: perl-File-Path
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-Path.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-Path-2.18-4.el9.noarch.rpm
8d47e85b8f150481c64cdad38199cb527b3f4e0aaa18f7c04157f08ccc6b44ea
RLBA-2022:3481
new packages: perl-File-ShareDir
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-ShareDir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-ShareDir-1.118-4.el9.noarch.rpm
8e8a84756798aeaebd6a05d948b504eab648475879f6e8a385e42065b0d345b5
RLBA-2022:3482
new packages: perl-File-Slurp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-Slurp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-Slurp-9999.32-5.el9.noarch.rpm
e9aba7ab7b3f8cd4212fe681f7f15c088dc35d3993a2c0cc6d65fbd46fa01a31
RLBA-2022:3483
new packages: perl-File-Temp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-Temp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-Temp-0.231.100-4.el9.noarch.rpm
ac408a99cdc94ae249761fa5f1ac9b0db794267527e07df78d36515b09c2a1a0
RLBA-2022:3484
new packages: perl-File-Which
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-Which.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-Which-1.23-10.el9.noarch.rpm
ce5be7b329adf24a1decd1f3eeca549e5b2234d7c361df42014d308682683251
RLBA-2022:3488
new packages: perl-GSSAPI
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-GSSAPI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-GSSAPI-0.28-37.el9.x86_64.rpm
967474d536893021c189f716481d9989e857e16686e92408b281975c5c105479
RLBA-2022:3485
new packages: perl-File-pushd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-File-pushd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-File-pushd-1.016-12.el9.noarch.rpm
85fd535307c0f981f5db48c6dda33fcc86b3a1b3c9afe249d94ef8a4674f7ed3
RLBA-2022:3486
new packages: perl-Filter
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Filter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Filter-1.60-4.el9.x86_64.rpm
4a15e0473c0c3169d5c9086153825654f66cabf14d8623cc8b4e1676d4858f9e
RLBA-2022:3487
new packages: perl-Filter-Simple
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Filter-Simple.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Filter-Simple-0.96-460.el9.noarch.rpm
5d91da27972df85f942d82d4d503f965148890e7ea3a536736474bc190c30917
RLBA-2022:3489
new packages: perl-Getopt-Long
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Getopt-Long.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Getopt-Long-2.52-4.el9.noarch.rpm
073ab80a2867bff161163125c13ac9433488681ed27aabaa784021c0f423518e
RLBA-2022:3490
new packages: perl-HTML-Parser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTML-Parser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTML-Parser-3.76-3.el9.x86_64.rpm
e1873d6f9871f883f04c52f6ef050c491286144f4bcf21b86f458cc21fbb5715
RLBA-2022:3491
new packages: perl-HTML-Tagset
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTML-Tagset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTML-Tagset-3.20-47.el9.noarch.rpm
1838325d3407148223b5ce089b67242fa17a9a04a1877edfda7e7038fd839321
RLBA-2022:3492
new packages: perl-HTTP-Cookies
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Cookies.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTTP-Cookies-6.10-4.el9.noarch.rpm
dcb475a6e9d9268777a8cca1a159edd58eeed0693425cd8c6edd6f72fe91116e
RLBA-2022:3493
new packages: perl-HTTP-Date
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Date.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTTP-Date-6.05-7.el9.noarch.rpm
92aef93cc1e0528c5148edf2936364816e3812f242debe84bec54c1060aec3c0
RLBA-2022:3494
new packages: perl-HTTP-Message
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Message.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTTP-Message-6.29-3.el9.noarch.rpm
d179234a25cedee93eb2163722dbef66dd53cdf6a1a5ecba532285ab964ace89
RLBA-2022:3495
new packages: perl-HTTP-Negotiate
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Negotiate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTTP-Negotiate-6.01-30.el9.noarch.rpm
b054f87b5a5c67b5cb534d5201c224fa32857e37ffc32b573a142f88059a87c0
RLBA-2022:3496
new packages: perl-HTTP-Tiny
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTTP-Tiny-0.076-460.el9.noarch.rpm
28677597158fd32f04e633e51164d4f9ce6da979ff1bd0da68ee1590ba754df6
RLBA-2022:3497
new packages: perl-IO-Compress
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Compress.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Compress-2.102-4.el9.noarch.rpm
be23bc2b0a107c636f62325a43d73e3bc1b84cd0677a7f6c34da2fa156ab2e82
RLBA-2022:3498
new packages: perl-IO-Compress-Lzma
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Compress-Lzma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Compress-Lzma-2.101-4.el9.noarch.rpm
08f98963bd66df23d5389ac915143dc35236667a95f6cf0e25193bba19942659
RLBA-2022:3499
new packages: perl-IO-HTML
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-HTML.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-HTML-1.004-4.el9.noarch.rpm
e6e9c3fa506a4a720a81ac49d6c3e7de3306c566c466c7d1d91a5630b3aced8b
RLBA-2022:3500
new packages: perl-IO-Multiplex
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Multiplex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Multiplex-1.16-21.el9.noarch.rpm
752d392d2b1fd3631a6505b59aebce7b3be8a41332d25c3552dceb7cab3c8433
RLBA-2022:3501
new packages: perl-IO-Socket-INET6
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Socket-INET6.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Socket-INET6-2.72-24.el9.noarch.rpm
b8eb2bcf725df25d0a2e3e413bb54f0cfa2f5f4250030a495792bd1e208e2d83
RLBA-2022:3502
new packages: perl-IO-Socket-IP
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Socket-IP.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Socket-IP-0.41-5.el9.noarch.rpm
ffb4b46f1ed518b2275bdf732212082387a6f3021e1a7cd3b1c6ec6e6ea7ce09
RLBA-2022:3503
new packages: perl-IO-Zlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Zlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Zlib-1.11-4.el9.noarch.rpm
8d8a06a3250886cff35fd7c676f31a142db5a5238567a0b468049d3d536f8ea3
RLBA-2022:3504
new packages: perl-IPC-Cmd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IPC-Cmd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IPC-Cmd-1.04-461.el9.noarch.rpm
7b156ce1cd9fcd733fdf89492f8c91541fcd0613a1118bbd077e86f1982ba72a
RLBA-2022:3505
new packages: perl-IPC-SysV
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IPC-SysV.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IPC-SysV-2.09-4.el9.x86_64.rpm
1b007d757ea0e90338faf1ac0adba1fe5bb34d75b4c3f13b2b57b6a2bc74ac00
RLBA-2022:3506
new packages: perl-IPC-System-Simple
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IPC-System-Simple.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IPC-System-Simple-1.30-6.el9.noarch.rpm
9bc344e9aecc4f1145353a7a10c86065e6e8251c9bc8a8b2daa184b5226f8c8b
RLBA-2022:3507
new packages: perl-Importer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Importer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Importer-0.026-4.el9.noarch.rpm
961384283477a817b634a9a27b067f169d40f241ee0773c7cc1d9aac3d17d6c1
RLBA-2022:3508
new packages: perl-JSON
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-JSON.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-JSON-4.03-5.el9.noarch.rpm
30b4a3296838ded87d7346a5ab1e6f64aef81bb187c4f7ed2fe80bc916fbf7ab
RLBA-2022:3509
new packages: perl-JSON-PP
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-JSON-PP.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-JSON-PP-4.06-4.el9.noarch.rpm
9d27fd287fdfd4a13eb24b9a4e0d68e48ac634f11c57dfa1e876da0de1dd8a2a
RLBA-2022:3510
new packages: perl-LDAP
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-LDAP.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-LDAP-0.68-5.el9.noarch.rpm
26dc56345a94677e90ed46d8ae1d2cd0d2a52980d6d806a46e8682a1fee59bf2
RLBA-2022:3511
new packages: perl-LWP-MediaTypes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-LWP-MediaTypes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-LWP-MediaTypes-6.04-9.el9.noarch.rpm
1999f5d1ae99b8b59f944cb8b51b58952b0dae0c4c3265d75d027f907c3808cd
RLBA-2022:3512
new packages: perl-LWP-Protocol-https
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-LWP-Protocol-https.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-LWP-Protocol-https-6.10-4.el9.noarch.rpm
113be1626293361507f8b63f58b69eb2292af1601e81c8a4ade0c26681ffb53b
RLBA-2022:3513
new packages: perl-List-MoreUtils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-List-MoreUtils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-List-MoreUtils-0.430-4.el9.noarch.rpm
f41a09f7711081bcec18c44c05b7eb6189a6b1191465ec64d6d5d42f95992569
RLBA-2022:3514
new packages: perl-List-MoreUtils-XS
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-List-MoreUtils-XS.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-List-MoreUtils-XS-0.430-5.el9.x86_64.rpm
ab378f3f43db217b4887a4077d8e4bc193a8e801a03d66ae393e4a0b890e7d6d
RLBA-2022:3515
new packages: perl-Locale-Maketext
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Locale-Maketext.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Locale-Maketext-1.29-461.el9.noarch.rpm
7cd906e4dc9c5286ef980f158173c9e3e5af79a5834616b98136c72d65f37656
RLBA-2022:3516
new packages: perl-MIME-Base64
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-MIME-Base64.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-MIME-Base64-3.16-4.el9.x86_64.rpm
5c45dad965abc4f062efcf37bb260d28cf38b4b7f79f02308f5526d5de3874fe
RLBA-2022:3517
new packages: perl-MIME-Charset
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-MIME-Charset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-MIME-Charset-1.012.2-15.el9.noarch.rpm
5efe57553c23fc2ff4e91e3d57109e6fbd268d1e6dc647b9a17e63f570a756fc
RLBA-2022:3518
new packages: perl-MRO-Compat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-MRO-Compat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-MRO-Compat-0.13-15.el9.noarch.rpm
a3addd832690871caa3e6fe554cafe1e8776c85f810cddb7f9ec8d48a3a7ecb6
RLBA-2022:3519
new packages: perl-Mail-AuthenticationResults
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Mail-AuthenticationResults.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Mail-AuthenticationResults-2.20210112-4.el9.noarch.rpm
0bd5fdb99cfd58d606058cd9e0ed96c9b124b87a4c49dc162f72e1285703f84a
RLBA-2022:3520
new packages: perl-Mail-DKIM
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Mail-DKIM.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Mail-DKIM-1.20200907-4.el9.noarch.rpm
18324a95928a700e49ba149be53235ff900dae5d9b132bec43cbbe2027afa7bf
RLBA-2022:3547
new packages: perl-PathTools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-PathTools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-PathTools-3.78-461.el9.x86_64.rpm
463e8e1704053e1cbd984c15d47ca12dbab1dc6cc774df014f1ac0e52009adfc
RLBA-2022:3521
new packages: perl-Mail-SPF
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Mail-SPF.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Mail-SPF-2.9.0-26.el9.noarch.rpm
fabd4031b2cad31090073d63012c6024a9d300e58e2509a27895db89c96ab4e5
RLBA-2022:3522
new packages: perl-Mail-Sender
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Mail-Sender.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Mail-Sender-0.903-16.el9.noarch.rpm
53eb6842605a8b85b7d05d97ce41cf2a3c9b6e53c4481d211b8d2a6c61c5631d
RLBA-2022:3523
new packages: perl-MailTools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-MailTools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-MailTools-2.21-9.el9.noarch.rpm
6a625f97c9bfdaaf8e4e2c51bac3938b218dbe66ad1584e707deaa0a21190c71
RLBA-2022:3524
new packages: perl-Math-BigInt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Math-BigInt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Math-BigInt-1.9998.18-460.el9.noarch.rpm
bb2ae0f30f9aa03356b2251304d1ad37c44783f47987eae727835007556b8ce6
RLBA-2022:3525
new packages: perl-Math-BigInt-FastCalc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Math-BigInt-FastCalc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Math-BigInt-FastCalc-0.500.900-460.el9.x86_64.rpm
262b7c7d5286064546bad5872911ee2823e5e610fcfedda0b44b2719a0efac5c
RLBA-2022:3526
new packages: perl-Math-BigRat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Math-BigRat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Math-BigRat-0.2614-460.el9.noarch.rpm
d52c59bcca97e2b9de7ff572697aea906f3cd5e6f2b38d0602b22884510a6076
RLBA-2022:3527
new packages: perl-Module-Build
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-Build.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-Build-0.42.31-9.el9.noarch.rpm
2f57ee5b0bf897ecce1921e9b1dc2ae3ddb6cb8cc97dd3d22caec2dcb2ed161a
RLBA-2022:3528
new packages: perl-Module-CPANfile
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-CPANfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-CPANfile-1.1004-12.el9.noarch.rpm
e62d30cbf07e8b18d85f016c07c131123f684f8317f13be6f4a969bcfa84b992
RLBA-2022:3529
new packages: perl-Module-CoreList
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-CoreList.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-CoreList-5.20210320-3.el9.noarch.rpm
45835adf2872ac762d6013b113d8645bd01bd0f86357a08857a3036ee3991f2b
perl-Module-CoreList-tools-5.20210320-3.el9.noarch.rpm
63d197040742424a8c3843e798639e07627125dc2a421684f36642d2b4b5fd0b
RLBA-2022:3530
new packages: perl-Module-Load
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-Load.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-Load-0.36-4.el9.noarch.rpm
1d7ba4a7c941d27969480bd0e422180f5acb2f7ef3ec6d587608b576a2c15eae
RLBA-2022:3531
new packages: perl-Module-Load-Conditional
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-Load-Conditional.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-Load-Conditional-0.74-4.el9.noarch.rpm
a9f6a7e1673b07dfa93dcf3e92730693e36d41e320a943161e0de4a4a113a939
RLBA-2022:3532
new packages: perl-Module-Metadata
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Module-Metadata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Module-Metadata-1.000037-460.el9.noarch.rpm
1d65c7124fa1acceeb2f6907cc89f64afddfa9defee31df4300a09f660be720d
RLBA-2022:3533
new packages: perl-Mozilla-CA
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Mozilla-CA.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Mozilla-CA-20200520-6.el9.noarch.rpm
c0c93096a5ce0448ec12a8bb04a6180844d1e133dab824953aa332404a6af81e
RLBA-2022:3534
new packages: perl-NTLM
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-NTLM.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-NTLM-1.09-30.el9.noarch.rpm
e5cc95ebf3f212c70f5f57e05d260f078cfd994eb3a9aa5108a02ac253e19e1c
RLBA-2022:3535
new packages: perl-Net-CIDR-Lite
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-CIDR-Lite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-CIDR-Lite-0.22-2.el9.noarch.rpm
4c7f7d0b9a276c8164b80159319f7a088948b6bddefde3adac66690b590ddcbd
RLBA-2022:3536
new packages: perl-Net-DNS
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-DNS.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-DNS-1.29-4.el9.noarch.rpm
cc71d58536bbdb09d4429384f3a8dbff94b5beaa551352c460dcd8dc1d3372a0
RLBA-2022:3537
new packages: perl-Net-HTTP
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-HTTP.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-HTTP-6.21-3.el9.noarch.rpm
81fbe9e80470dd1443b5d34eaaa2def28d67a05a55d9c0b6f8b3045b236e2124
RLBA-2022:3538
new packages: perl-Net-Ping
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-Ping.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-Ping-2.74-5.el9.noarch.rpm
bee847af91eb9f61f6669176233e8830d014e6242e38d30541c5d2f5e99d86aa
RLBA-2022:3539
new packages: perl-Net-SMTP-SSL
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-SMTP-SSL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-SMTP-SSL-1.04-16.el9.noarch.rpm
d6c6eab9eb9967aa0971f1659d1ec7e3d5868747c0cf860eefceb33678c64726
RLBA-2022:3540
new packages: perl-Net-Server
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-Server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-Server-2.009-14.el9.noarch.rpm
e2c79c4392a753a6835af65a0c370bb265179d2c30285e60246a8fcd351f8071
RLBA-2022:3541
new packages: perl-NetAddr-IP
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-NetAddr-IP.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-NetAddr-IP-4.079-18.el9.x86_64.rpm
b1979e8695be37603de43c02f8e6efba13d9007abd9a532e400c6a17e4088ff7
RLBA-2022:3542
new packages: perl-Object-HashBase
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Object-HashBase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Object-HashBase-0.009-7.el9.noarch.rpm
2f923490f38a9f1b64dcb3b55ef1905436c7bc3482f8997e591bc9dd34cd16e3
RLBA-2022:3543
new packages: perl-Package-Generator
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Package-Generator.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Package-Generator-1.106-23.el9.noarch.rpm
51882324f0082ac01a7dec367370ea2ade8c379bae7eae992f3fd6916d8b8025
RLBA-2022:3544
new packages: perl-Params-Check
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Params-Check.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Params-Check-0.38-461.el9.noarch.rpm
f76e4edeaf723a5aedf3f511f1af6aac4c7c7e5797d9387ebe92e90e7470c5bf
RLBA-2022:3545
new packages: perl-Params-Util
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Params-Util.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Params-Util-1.102-5.el9.x86_64.rpm
6d1078f176ad5a41414034ccfd7e0a3eaf31b57e0800ae223ec074fa5a5dc595
RLBA-2022:3546
new packages: perl-Parse-PMFile
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Parse-PMFile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Parse-PMFile-0.43-4.el9.noarch.rpm
4601a7f42072469242f898c962190bb8197eb473dce25cbe6215f66f1fd519e5
RLBA-2022:3548
new packages: perl-Perl-OSType
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Perl-OSType.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Perl-OSType-1.010-461.el9.noarch.rpm
3dc6cadf2b2be5bdf90192d985beacc077b1b2c9d7f73dd3ff5ba1bd0d709b23
RLBA-2022:3549
new packages: perl-PerlIO-via-QuotedPrint
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-PerlIO-via-QuotedPrint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-PerlIO-via-QuotedPrint-0.09-4.el9.noarch.rpm
e951e57589275b490a0c3f3ab9f8749474a4a5608c20d904bf2cf999252b3be2
RLBA-2022:3550
new packages: perl-Pod-Checker
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Pod-Checker.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Pod-Checker-1.74-4.el9.noarch.rpm
71355d44503378b78b90f4efe3f5d2fe46ad223245070d71e9d6ab7ce8032683
RLBA-2022:3551
new packages: perl-Pod-Escapes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Pod-Escapes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Pod-Escapes-1.07-460.el9.noarch.rpm
0dc13de132f255b6c13618a32a9b95dce434d998b8300a30ea412ff75abb84ec
RLBA-2022:3552
new packages: perl-Pod-Perldoc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Pod-Perldoc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Pod-Perldoc-3.28.01-461.el9.noarch.rpm
4bc4888efc7cc0b39aea13267e621d245d35e8e808603ca0f3a9434fce8d2e8b
RLBA-2022:3553
new packages: perl-Pod-Simple
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Pod-Simple.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Pod-Simple-3.42-4.el9.noarch.rpm
aaac71076e517a13ca7459918761c66a460f0fd993cb510644af7e5978d2fbcc
RLBA-2022:3554
new packages: perl-Pod-Usage
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Pod-Usage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Pod-Usage-2.01-4.el9.noarch.rpm
cab7aea2d5686233dea13aa7ae4de48a9b6cc9a81f73f6f1448558f8e6423862
RLBA-2022:3555
new packages: perl-SNMP_Session
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-SNMP_Session.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-SNMP_Session-1.13-28.el9.noarch.rpm
f1adf0e24512fdf575e759287be3c8caea0d581b50f663b897e9d6c7d02110b1
RLBA-2022:3556
new packages: perl-Scalar-List-Utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Scalar-List-Utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Scalar-List-Utils-1.56-461.el9.x86_64.rpm
3c4720fe49d11a8b5909c9c52bbedf227645b1b774d402bde4ecdda9191c0cef
RLBA-2022:3557
new packages: perl-Socket
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Socket.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Socket-2.031-4.el9.x86_64.rpm
1f21b37d47f95b550e26db0c0b5f257db65123b3846cacbed9bc3c36b9b65a8f
RLBA-2022:3558
new packages: perl-Socket6
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Socket6.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Socket6-0.29-11.el9.x86_64.rpm
5d4391e7c49e1c46172e8d65ff4547dbd4e27d27f88feed794c3dc86dd4a57a2
RLBA-2022:3559
new packages: perl-Software-License
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Software-License.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Software-License-0.103014-12.el9.noarch.rpm
63157ec199846a4ebb1be6b3d0d2787c79da86b98dc4e3432f66ff5a5bf431da
RLBA-2022:3560
new packages: perl-Storable
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Storable.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Storable-3.21-460.el9.x86_64.rpm
98f0b75a6a7de6aab4821e60f78596fae47b29d4b93e6a2ae4dddf5c626368a7
RLBA-2022:3561
new packages: perl-String-ShellQuote
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-String-ShellQuote.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-String-ShellQuote-1.04-34.el9.noarch.rpm
7708f506618917b5e57a98960905423d8ea1157213ea06247c0cadc009bf7c05
RLBA-2022:3562
new packages: perl-Sub-Exporter
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Sub-Exporter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Sub-Exporter-0.987-27.el9.noarch.rpm
842ed8c31564ed07922d39cfb796e7d2ec702583e2746c7da4f2994467efd459
RLBA-2022:3563
new packages: perl-Sub-Install
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Sub-Install.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Sub-Install-0.928-28.el9.noarch.rpm
a7480912bc6c02cea71ada2404ec76dc6dd1abe8755cecc126adcdc81866a8da
RLBA-2022:3564
new packages: perl-Sys-CPU
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Sys-CPU.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Sys-CPU-0.61-26.el9.x86_64.rpm
7b2986b85e27d3db48cb03013eee70289ff93394af91f2bea4d8cb80dbdbcd8d
RLBA-2022:3566
new packages: perl-Sys-Syslog
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Sys-Syslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Sys-Syslog-0.36-461.el9.x86_64.rpm
7739cd6137aa2969d59822e5ec09809b7328ef74ca7eef4bdafd01ecdf4632c5
RLBA-2022:3567
new packages: perl-Term-ANSIColor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Term-ANSIColor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Term-ANSIColor-5.01-461.el9.noarch.rpm
b22daf7a57ec0b5ad94880f1d61b78d44f91541e0c6aac9447196a6afb369957
RLBA-2022:3568
new packages: perl-Term-Cap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Term-Cap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Term-Cap-1.17-460.el9.noarch.rpm
09d0193df1b33a3b6710e9bcb187a52353afc12751fb03f2fb3a241171af7b31
RLBA-2022:3569
new packages: perl-Term-Size-Any
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Term-Size-Any.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Term-Size-Any-0.002-35.el9.noarch.rpm
70ffc9048f270f48edb74fa0e7e044ec3395d306453843ed35bc071a655f0b82
RLBA-2022:3570
new packages: perl-Term-Size-Perl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Term-Size-Perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Term-Size-Perl-0.031-12.el9.x86_64.rpm
5152784552cea31b85c752794e71b7883bd4dc9d92d10de1d01337a3b1479ea0
RLBA-2022:3571
new packages: perl-Term-Table
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Term-Table.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Term-Table-0.015-8.el9.noarch.rpm
dbcc8e7d764e0d5e7a775b4e1e4417a98aed5341597aec67f33f09213614ee94
RLBA-2022:3572
new packages: perl-TermReadKey
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-TermReadKey.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-TermReadKey-2.38-11.el9.x86_64.rpm
ec952a672accbd5a7d9a2733a25d2908ab592bf4f47b810bdac5398fa53ce96e
RLBA-2022:3573
new packages: perl-Test-Harness
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Test-Harness.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Test-Harness-3.42-461.el9.noarch.rpm
0c2deb3fc2d9e01e99b80736f6e832ef2859686a2c152847a0c75fdf2542fec4
RLBA-2022:3574
new packages: perl-Test-Simple
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Test-Simple.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Test-Simple-1.302183-4.el9.noarch.rpm
7863270cbe326425269bb033a1bb1a9dfbf8ba9704f7b44297d247a3c1ad31fc
RLBA-2022:3575
new packages: perl-Text-Balanced
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Balanced.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Balanced-2.04-4.el9.noarch.rpm
239d21c24144f6bd06845ed5845302082e446e16c1700d9d2cea2e51dfb8dade
RLBA-2022:3576
new packages: perl-Text-Diff
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Diff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Diff-1.45-13.el9.noarch.rpm
4d07d3c7faeccb724d0f723468434c1d2a7897aa11c13377a469bff8cce5555a
RLBA-2022:3577
new packages: perl-Text-Glob
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Glob.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Glob-0.11-15.el9.noarch.rpm
1ee780aa8b60a8ade62020b7ca590a80579fd93a9ff2e0568b43708d8cd32e43
RLBA-2022:3578
new packages: perl-Text-ParseWords
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-ParseWords.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-ParseWords-3.30-460.el9.noarch.rpm
f42e27499c2060ed69355d0a9ebf3d65e15dca452a15620ca68c53442bc4d7f8
RLBA-2022:3579
new packages: perl-Text-Soundex
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Soundex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Soundex-3.05-20.el9.x86_64.rpm
eddf7e521195e2a814d16a2d710234511b236dc14e9d910080904f8ec0233b33
RLBA-2022:3580
new packages: perl-Text-Tabs+Wrap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Tabs+Wrap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Tabs+Wrap-2013.0523-460.el9.noarch.rpm
64378a33545ba69912e8be9c49720ef73616ce9b8a3bc28f9bfc1b2cca352e0a
RLBA-2022:3581
new packages: perl-Text-Template
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Template.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Template-1.59-5.el9.noarch.rpm
4a6fa7d6dc321ad0bb383ceffcd7b94d72f99a0272e399a226e90b70d6fc8f54
RLBA-2022:3582
new packages: perl-Text-Unidecode
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Text-Unidecode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Text-Unidecode-1.30-16.el9.noarch.rpm
6f56cfa1dc914fcdef60da4e7e056b23af10cd3711029a5f55a84c5ebdb4d66a
RLBA-2022:3583
new packages: perl-Thread-Queue
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Thread-Queue.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Thread-Queue-3.14-460.el9.noarch.rpm
3b2e22e8dd868564b29b1389d8769a1aa6ee1edcefd8569e8bf78db630a93e52
RLBA-2022:3584
new packages: perl-Tie-RefHash
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Tie-RefHash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Tie-RefHash-1.40-4.el9.noarch.rpm
44b208af45f344989d7cf63e0a9f620f924eb2217dcf8284e2dd805ef841cb9b
RLBA-2022:3585
new packages: perl-Time-HiRes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Time-HiRes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Time-HiRes-1.9764-462.el9.x86_64.rpm
9c4c81b7e7e7a2727f0c4b02f300b2ca1dd43e96cde488ed9bc81dbb2e833c2a
RLBA-2022:3586
new packages: perl-Time-Local
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Time-Local.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Time-Local-1.300-7.el9.noarch.rpm
d989488e3beff23f6209ca8de9fa16e6f0f61ed0343acbd44b21292c3fc028be
RLBA-2022:3587
new packages: perl-TimeDate
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-TimeDate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-TimeDate-2.33-6.el9.noarch.rpm
57953da3f375363b69f83e042db462bbfd6743281a1e3c7aaad9479b1c6d79e9
RLBA-2022:3588
new packages: perl-Tk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Tk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Tk-804.035-7.el9.x86_64.rpm
9e720a020005d77c21abbcd38d35bf43a9205ee5f8abbb6cdb3e2fe342183f13
RLBA-2022:3589
new packages: perl-Try-Tiny
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Try-Tiny.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Try-Tiny-0.30-13.el9.noarch.rpm
857b0cabab1edf39d4c09c51e620fee02eb753a69e021c0856e6abd23cf38be8
RLBA-2022:3590
new packages: perl-URI
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-URI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-URI-5.09-3.el9.noarch.rpm
3bdb35f88ab875c7b5ff3c09adc2a08c5ed20517a3bbc068022ea43b0776be83
RLBA-2022:3591
new packages: perl-Unicode-Collate
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Unicode-Collate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Unicode-Collate-1.29-4.el9.x86_64.rpm
f127558904ea4af9a279e7e29e66fbb95080a77d221dcea628cb236392c0d88d
RLBA-2022:3592
new packages: perl-Unicode-LineBreak
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Unicode-LineBreak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Unicode-LineBreak-2019.001-11.el9.x86_64.rpm
729a0e3ecfe1217e525bc57fe7f264437e23f6459e8d3ddf951674defa4adeb8
RLBA-2022:3593
new packages: perl-Unicode-Normalize
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Unicode-Normalize.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Unicode-Normalize-1.27-461.el9.x86_64.rpm
6be1fdbd0890149103be1f6efe7091240eb5ab7e049c418881dd55086b78a0b3
RLBA-2022:3594
new packages: perl-Unix-Syslog
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Unix-Syslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Unix-Syslog-1.1-41.el9.x86_64.rpm
a358699a5ce894c1bd67fac2c0d1c58465c9c9497c47efa762e650ad1366396a
RLBA-2022:3595
new packages: perl-WWW-RobotRules
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-WWW-RobotRules.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-WWW-RobotRules-6.02-30.el9.noarch.rpm
56e68900d8d2dd6c0e43cf7717363f6a200a9a432181e2836a0bf686dadd21a1
RLBA-2022:3596
new packages: perl-XML-Catalog
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-Catalog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-Catalog-1.03-22.el9.noarch.rpm
358a3b2e27a8c660eed601a6c4b99da5058358798844701afb2df86fc7336d57
RLBA-2022:3597
new packages: perl-XML-LibXML
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-LibXML.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-LibXML-2.0206-5.el9.x86_64.rpm
c8857fafa2815d6e0c2efc183e1483bbfc352aa66f135a29ee149fd0a7c33d93
RLBA-2022:3598
new packages: perl-XML-NamespaceSupport
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-NamespaceSupport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-NamespaceSupport-1.12-15.el9.noarch.rpm
45052043ca1fb9a4c0c155b564fa4f69b9a75a67e81d0ee25a8fe5ea850af842
RLBA-2022:3599
new packages: perl-XML-Parser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-Parser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-Parser-2.46-9.el9.x86_64.rpm
8a2ba89dfceb09500829f6efd3f41154b95060500d2f40626bffbbd052bc294e
RLBA-2022:3600
new packages: perl-XML-SAX
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-SAX.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-SAX-1.02-8.el9.noarch.rpm
0261c5a5f0eef24ed425d93e08dccf7dc3cd108a5898721bb0985861a6a8c273
RLBA-2022:3601
new packages: perl-XML-SAX-Base
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-SAX-Base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-SAX-Base-1.09-15.el9.noarch.rpm
b52d29239c42f3e7c3cf17bf8ff7448b2177304e712fb89b2052a646247134d8
RLBA-2022:3602
new packages: perl-XML-Simple
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-Simple.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-Simple-2.25-13.el9.noarch.rpm
d6090f175b89db4b6de14ec5424ac959fb1ae6cf78cad9d237c0cbfe624e3b6a
RLBA-2022:3603
new packages: perl-XML-TokeParser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-TokeParser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-TokeParser-0.05-36.el9.noarch.rpm
02525e6e9d58c6c2745cf63c575f7c3cc378e9be6070801c278eb9a86e27a9d7
RLBA-2022:3604
new packages: perl-XML-XPath
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-XML-XPath.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-XPath-1.44-11.el9.noarch.rpm
26572bf19093a6a2901cf4086f78896bdbc56fabea8c218c427abee34b2281c2
RLBA-2022:3605
new packages: perl-YAML
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-YAML.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-YAML-1.30-8.el9.noarch.rpm
bc66c253ac1fdfae1df596454fe0ec0b72cb1b49ae483a3880d1b35bbee5980f
RLBA-2022:3606
new packages: perl-autodie
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-autodie.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-autodie-2.34-4.el9.noarch.rpm
2c9ef7bca6c14575f2d2359f5326c0a96353c922f5a93cf78068d1aedcac660b
RLBA-2022:3607
new packages: perl-bignum
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-bignum.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-bignum-0.51-460.el9.noarch.rpm
a406efeede23bac497b67c3a2e6b4765afbeb950a22580306eda7c321748e27c
RLBA-2022:3608
new packages: perl-constant
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-constant.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-constant-1.33-461.el9.noarch.rpm
eb777f7ac52af61f65c85ffe9b81c05479ba90153cac98217d9cf6889812f378
RLBA-2022:3609
new packages: perl-experimental
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-experimental.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-experimental-0.022-6.el9.noarch.rpm
72889b97b331351164d11927220132d87bc67d8d6fde821f8c91eb49a9470acf
RLBA-2022:3610
new packages: perl-generators
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-generators.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-generators-1.11-12.el9.noarch.rpm
b102f03c897fb4a2d72503a776506c5c93d969c2eb1cda0e10fbb4c93c95c0ff
RLBA-2022:3611
new packages: perl-inc-latest
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-inc-latest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-inc-latest-0.500-20.el9.noarch.rpm
7111da2e663660b38ec93361c06ca6e71737721d93c76a3679b1c56a381a4303
RLBA-2022:3612
new packages: perl-libintl-perl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-libintl-perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-libintl-perl-1.32-4.el9.x86_64.rpm
2c8f4642aadcd8ecbe1f4b959dbde1e0343988dfc6bb2b527157f5a04eff45e8
RLBA-2022:3613
new packages: perl-libnet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-libnet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-libnet-3.13-4.el9.noarch.rpm
e369b44b80d60ade095dda03c59d3eb7fa5fb2632f60e593bdefdac7b84eb02f
RLBA-2022:3614
new packages: perl-libwww-perl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-libwww-perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-libwww-perl-6.53-4.el9.noarch.rpm
12b287c41f889db8672712795e68da88c40bf00aa0290cb5abb95c0674d1fef1
RLBA-2022:3615
new packages: perl-local-lib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-local-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-local-lib-2.000024-13.el9.noarch.rpm
c122133a1bcb1fbfd21d70ac0a80fa61272550d45a841c4c5be5bb84d828a041
RLBA-2022:3616
new packages: perl-parent
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-parent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-parent-0.238-460.el9.noarch.rpm
3a66910d2ab5c5b5e574b5377dede0fbaa87012bcd7130d66027d3f6117df03b
RLBA-2022:3617
new packages: perl-perlfaq
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-perlfaq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-perlfaq-5.20201107-4.el9.noarch.rpm
21032d25448b2c2433b065797235e71bfc664ca2599a523a34fee4e86fcdb830
RLBA-2022:3618
new packages: perl-podlators
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-podlators.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-podlators-4.14-460.el9.noarch.rpm
8aa609d0999aa7c5701eddd93d024607980aac5f81e927f37c1f8a6312d3bbd7
RLBA-2022:3619
new packages: perl-srpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-srpm-macros-1-41.el9.noarch.rpm
d513c5c2a9a51bc7af808b7619ec8aaa9495d72f34b403a9d0b8a839bad4e41a
RLBA-2022:3620
new packages: perl-threads
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-threads.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-threads-2.25-460.el9.x86_64.rpm
31f7667a17020530a996f8ba35fe51418bc17ac97e30441fa91708cb2c2d305e
RLBA-2022:3622
new packages: perl-version
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-version.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-version-0.99.28-4.el9.x86_64.rpm
3f9c065b12664605cf79dce003bb6e5de19d67947e79266a6e55db0a380ebc34
RLBA-2022:3623
new packages: pg_repack
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pg_repack-1.4.6-4.el9.x86_64.rpm
7e7efdc1094c5f9a38ae4c87e43f88fc5a5b4c51efe87648f7576b36a8e8b33c
RLBA-2022:3624
new packages: pgaudit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pgaudit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pgaudit-1.5.0-6.el9.x86_64.rpm
a4f1e312e8f121b48b2764c33dead36c0f0200202d50c06f27176f7efd6f4fbf
RLBA-2022:3625
new packages: php-pecl-apcu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apcu-panel-5.1.20-5.el9.noarch.rpm
aa48096ed5141719e41c942ff1742328bc4b1b45aff90f413c82b0ad6e4a4bf0
php-pecl-apcu-5.1.20-5.el9.x86_64.rpm
d4761c7c1f804587af6cbf16334dec38a205262585c14b50d40e7741006dffe0
php-pecl-apcu-devel-5.1.20-5.el9.x86_64.rpm
cd16cc7d7c22ca65d1357d692e8af1ef6348f461d047321544e2da024f17185b
RLBA-2022:3626
new packages: php-pecl-rrd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-rrd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
php-pecl-rrd-2.0.3-3.el9.x86_64.rpm
f9091f3ae0609f1e7187ff1a078cf5f227ee086ec8dcece21f8a82911018ad7c
RLBA-2022:3627
new packages: php-pecl-zip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-zip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
php-pecl-zip-1.19.2-6.el9.x86_64.rpm
df4f29fd82b9bd90758f162ea8e642374b48d63ee10d0fcd5f9868ac2d14b70f
RLBA-2022:3628
new packages: pinentry
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pinentry.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pinentry-1.1.1-8.el9.x86_64.rpm
bcb0d7145aca311a6f20a5de1e62b12619113a6a15ae7d623fdc9120d641c610
pinentry-gnome3-1.1.1-8.el9.x86_64.rpm
8b46f7455fac5003608090f86f8a184fb22d263aceca7203d55926a753e35cfc
pinentry-tty-1.1.1-8.el9.x86_64.rpm
6ecddc6df311d64358d5c56a171cd89adee511f1b3a76680946a89d1683b3660
RLBA-2022:3629
new packages: pinfo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pinfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pinfo-0.6.10-29.el9.x86_64.rpm
1b992a7869847abff963d04803f5ee6100a1e31c112d3354be0a02d894884e69
RLBA-2022:3630
new packages: pixman
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pixman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pixman-0.40.0-5.el9.i686.rpm
636feeb25f0b8a27b9fdadf67374e2a6e4a44b262de5d9746586706f0611cfc2
pixman-0.40.0-5.el9.x86_64.rpm
6d3812d5e6841c69ff695feff0ac2bbd8e04287d822e71f1ae865925e8a2a33d
pixman-devel-0.40.0-5.el9.i686.rpm
4772f0a9f1da57817ce4cc209dec5a882b1e4af2ab084ec5aa3f8313017129b7
pixman-devel-0.40.0-5.el9.x86_64.rpm
1a058e78bfb2eb09d0666e6c55f5b81d81d011eb2589d7110fb674e90094c9da
RLBA-2022:3632
new packages: plexus-cipher
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-cipher.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plexus-cipher-1.7-26.el9.noarch.rpm
616df0e391dc7da441c78842ad3e3807574d400cf9c68abcbd93871e76e6db13
RLBA-2022:3633
new packages: plexus-classworlds
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-classworlds.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plexus-classworlds-2.6.0-10.el9.noarch.rpm
8c6a69374e6ea7b2ce0c6d15b99b774999f91ff89294e3420fa2022b2b0d83b6
RLBA-2022:3634
new packages: plexus-containers
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-containers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plexus-containers-component-annotations-2.1.0-9.el9.noarch.rpm
f5edcaf7dab261db1805329b8c412eda7df5ba79914b8d22cab525456c99f4dd
RLBA-2022:3635
new packages: plexus-interpolation
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-interpolation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plexus-interpolation-1.26-10.el9.noarch.rpm
018c48c1263bfc572932fdca5b4536e92f3676e27e5bd58d89cdf57547612f7a
RLBA-2022:3636
new packages: plexus-sec-dispatcher
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-sec-dispatcher.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plexus-sec-dispatcher-1.4-36.el9.noarch.rpm
45707c479b62265612634c7a5716e1d17e4647ffdf8c4893e2707dc441bf49f9
RLBA-2022:3637
new packages: plexus-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plexus-utils-3.3.0-9.el9.noarch.rpm
15fbe0eed0c8e02cbc48f98ed0ac2e7f52ed1d34913d65673a9916ea9bac726f
RLBA-2022:3638
new packages: plotutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plotutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plotutils-2.6-28.el9.i686.rpm
697af251383eb52ca796257282fd9170262606ea926fb6be1544074f81f320d9
plotutils-2.6-28.el9.x86_64.rpm
af80a16fa2fa3e56b3d428cdbebca52c1952d7d3f1e4a0a5dbdc8fa120e0b7cc
RLBA-2022:3639
new packages: pmdk-convert
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pmdk-convert.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pmdk-convert-1.7-8.el9.x86_64.rpm
10b7bb5155a8d1f705138bd57f84e39cf6d7d1d1c14e40e1b770179d8c30a392
RLBA-2022:3640
new packages: pmix
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pmix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pmix-3.2.3-3.el9.i686.rpm
672bb9d43dcecd1346da1a847ed5e2c62fb2e2431edf67c856687fe5fa07d155
pmix-3.2.3-3.el9.x86_64.rpm
4838715128aaa803720759c84f246995741b53d300274f93b2d0e2391f25ac26
pmix-devel-3.2.3-3.el9.i686.rpm
b1c55fd9467b5e4ea2e01b4caa6c1e9eacdd4376f997e45995a391ef9a0f8ed2
pmix-devel-3.2.3-3.el9.x86_64.rpm
e53f0f34f5e04dcee5f8dddce347ff4f4e97aaf6240940cb350e3c714549ca1c
pmix-pmi-3.2.3-3.el9.i686.rpm
67729116f4f549fd23e4ef0f74f2d3252c75c0d8aeaef6998bad2d5b71efde56
pmix-pmi-3.2.3-3.el9.x86_64.rpm
aefe9bee17cf196fec6c88a12df756e9fa9d0eb415dd788d7f78ab6ac5253d99
pmix-tools-3.2.3-3.el9.x86_64.rpm
7610d7645fbb82aa8fe9c952878e2eda871098e923ac10559e9d3209799d0bf9
RLBA-2022:3641
new packages: pnm2ppa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pnm2ppa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pnm2ppa-1.04-52.el9.x86_64.rpm
ed32639b1e0a7d578139868c920e0f494c2e32f903fb4e1ed7feab813aeeb217
RLBA-2022:3643
new packages: poppler-data
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for poppler-data.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
RLBA-2022:3644
new packages: postgres-decoderbufs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postgres-decoderbufs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postgres-decoderbufs-1.4.0-4.Final.el9.x86_64.rpm
e62b537b1fa74e079aa18a01ba08846bb6d44f30918f9323d66666ec128175f7
RLBA-2022:3646
new packages: postgresql-odbc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postgresql-odbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-odbc-12.02.0000-6.el9.x86_64.rpm
bfe997de09ddf12632e1814c2c08a6ec7d89cd10b65c61e6f2ea697c6b7438d5
RLBA-2022:3647
new packages: potrace
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for potrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
potrace-1.16-7.el9.i686.rpm
c3aca949ff100eecb2e26cd9821c4597942dd88dd2dd229459711d4b1a4b5f1d
potrace-1.16-7.el9.x86_64.rpm
85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802
RLBA-2022:3648
new packages: powertop
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for powertop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
powertop-2.14-2.el9.x86_64.rpm
4d30ae5c8bc4470fc7069117aaba0f11df9bd53cdada5dc970564d74437664f3
RLBA-2022:3649
new packages: pptp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pptp-1.10.0-14.el9.x86_64.rpm
5a7f6c3d482a3752109abba3a0eaf15f048dedb80b7a378fcd7967a5ae9ac6ad
RLBA-2022:3650
new packages: procmail
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for procmail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
procmail-3.22-56.el9.x86_64.rpm
6a9c72658f1751af33304e93c2e15cd8f55e1393a0518de432d6db93e3d618bd
RLBA-2022:3651
new packages: pt-sans-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pt-sans-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
compat-paratype-pt-sans-fonts-f33-f34-20141121-23.el9.noarch.rpm
549cd72566f4b91ae6dc01efe25fcc41d43403d99880d261222b3dfdbc7fb7a9
pt-sans-fonts-20141121-23.el9.noarch.rpm
9c1d857eebbee5a1d46bcdaba0b002bad75706456e176f20b4d1974529d7b282
RLBA-2022:3652
new packages: pulseaudio
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pulseaudio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pulseaudio-15.0-2.el9.x86_64.rpm
4fcb2ea115d1bf762816c6c9ece5bb8151919bc362478de8c5cef3339ac5b166
pulseaudio-libs-15.0-2.el9.i686.rpm
c906baf77d790e020887ac615f1001e00ff6b666199f48d33997f7de2fae4de8
pulseaudio-libs-15.0-2.el9.x86_64.rpm
b0c38349e1ac517c131c9eabfb9f952692684126775305b9a73ead98ae1acfba
pulseaudio-libs-devel-15.0-2.el9.i686.rpm
33baf79c08bfdfa9b05d5fbc305d1cf1d78ee99f0767b8900bfd828a45b50c37
pulseaudio-libs-devel-15.0-2.el9.x86_64.rpm
a397f9a40a63c13c7f4fa1189336dc69749b40894536488f32b7dac28b436a94
pulseaudio-libs-glib2-15.0-2.el9.i686.rpm
c4f864cd17022f536b4341edd36c27c6437643925dec374c61f0c7308c6cf1e5
pulseaudio-libs-glib2-15.0-2.el9.x86_64.rpm
1fd0991cb4406ab257063eeacc7696a3fd7b15bc29316c06336b7c94ad1f1f53
pulseaudio-module-bluetooth-15.0-2.el9.x86_64.rpm
2497e669925a422aa77c7f760534c13ed7d3a738c45c9cc8420630c8bf9bd730
pulseaudio-module-x11-15.0-2.el9.x86_64.rpm
f0099ef154190278449846d518c0b20091ae2132ab2edd599bcdd9600d88081b
pulseaudio-utils-15.0-2.el9.x86_64.rpm
b5d640aa277bf74a70502e54a78cb4d2c41312afb99a2d2850749e39e35610cb
RLBA-2022:3653
new packages: pyatspi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyatspi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyatspi-2.38.1-3.el9.noarch.rpm
89df4356f2a01de616a73e752e050aaf8a7f1d4b15c1937bd8111e49e004f157
RLBA-2022:3655
new packages: pyelftools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyelftools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyelftools-0.27-4.el9.noarch.rpm
1943df3aa568cad776237bb4946f592132e1d693aebf4332bbf98cfc55d7be69
RLBA-2022:3656
new packages: pyodbc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyodbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyodbc-4.0.30-4.el9.x86_64.rpm
c8a1f2d1f971092c887c6021d712c57eac2fb50891f094bb2bc9cdd0c684c381
RLBA-2022:3658
new packages: pyserial
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyserial.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyserial-3.4-12.el9.noarch.rpm
fc0998943302fc164c42d97083a4593bf49e4903fac807edf7a650d57e0e3904
RLBA-2022:3659
new packages: python-appdirs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-appdirs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-appdirs-1.4.4-4.el9.noarch.rpm
0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102
RLBA-2022:3660
new packages: python-argcomplete
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-argcomplete.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-argcomplete-1.12.0-5.el9.noarch.rpm
1dcb32bea866d4ee0082e8f18a9d779e5d90558e18c78a60c971066b111709f2
RLBA-2022:3661
new packages: python-augeas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-augeas-0.5.0-25.el9.noarch.rpm
d331efe5f85d3a1735f92a23dbc0dd08ccc5e5b67c33dfcb57cb02b17fe3390f
RLBA-2022:3662
new packages: python-configobj
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-configobj.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-configobj-5.0.6-25.el9.noarch.rpm
6c4a4973b2604e0e6b79d7d16b19ab6dc467672b2e8889c483a1e2de882d4430
RLBA-2022:3663
new packages: python-cups
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-cups-2.0.1-10.el9.x86_64.rpm
fc0c1f6333fdbdf05c34bd835c9369f7585fc74531b570b0e022b69ca919db15
python-cups-doc-2.0.1-10.el9.x86_64.rpm
af5c18ad7cc26909220b0f43529a30920ad6bba28bc93cc780af29200bc06331
RLBA-2022:3664
new packages: python-dasbus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dasbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dasbus-1.4-5.el9.noarch.rpm
cd47bf4dcd1613f8d23f423983c4e1747a5c54f31dc9b1e86a5c9ef696862260
RLBA-2022:3665
new packages: python-dbus-client-gen
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dbus-client-gen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dbus-client-gen-0.5-5.el9.noarch.rpm
d52a6e36a9b35e64331b2d4fcb4fecee6f895e902f7cfa13eb25dfc056b4f6df
RLBA-2022:3666
new packages: python-dbus-python-client-gen
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dbus-python-client-gen.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dbus-python-client-gen-0.8-5.el9.noarch.rpm
f5f0b742933f67fd3e4dc51c3fc5248ae1b5e3450dde59ba186664a9bc975a1b
RLBA-2022:3667
new packages: python-dbus-signature-pyparsing
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-dbus-signature-pyparsing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dbus-signature-pyparsing-0.04-5.el9.noarch.rpm
ca759b2fb44772121318add34db4c0804e758c9f6ffad6e088fd8d85b292d208
RLBA-2022:3668
new packages: python-distro
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-distro.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-distro-1.5.0-7.el9.noarch.rpm
cd390e4162f7675ec2af86c265300555b6eba149a04c3fbd8a4bfd0ae7161f80
RLBA-2022:3669
new packages: python-enchant
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-enchant.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-enchant-3.2.0-5.el9.noarch.rpm
477e0c70f084c79a0a301abb1907133b78f4d6ae8070c0b9ca550d036f88330b
RLBA-2022:3670
new packages: python-gssapi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-gssapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-gssapi-1.6.9-5.el9.x86_64.rpm
b51314b1ce48a94a4388eb55f1a8236cfbe0c2530aeed89ceee8b0ccd4dbfc25
RLBA-2022:3689
new packages: python-oauthlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-oauthlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-oauthlib-3.1.1-2.el9.noarch.rpm
8cf1ffa50e304f71ba8a90c318b4276a16c2a9a63140be486992adf1726c5063
RLBA-2022:3671
new packages: python-into-dbus-python
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-into-dbus-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-into-dbus-python-0.08-5.el9.noarch.rpm
c0b5e0fec847c477fb6f8ef331f62e5c85a1fd007fc8cc6ee7c3ffc0b7d49bca
RLBA-2022:3697
new packages: python-qrcode
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-qrcode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-qrcode-core-6.1-12.el9.noarch.rpm
3b81b8bb734166e53d02d430e7a085abade18983c6b33472b5347616f2d7942e
RLBA-2022:3672
new packages: python-jinja2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jinja2-2.11.3-4.el9.noarch.rpm
450c6930ad5829b425311e920b37abba521e0f64d180e68066af948c5f710ab3
RLBA-2022:3673
new packages: python-jmespath
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jmespath.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jmespath-0.9.4-11.el9.noarch.rpm
1472a91a3959c86180064a56dfa58a317ba3fa102ebac203edeea1545c2b4135
RLBA-2022:3709
new packages: pytz
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pytz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pytz-2021.1-4.el9.noarch.rpm
3e14e3479cb226537cf886aa771e3f9c1866ab0354d92efb51d087705e3f2c15
RLBA-2022:3674
new packages: python-jsonpatch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jsonpatch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jsonpatch-1.21-16.el9.noarch.rpm
3e95e115269dd22ec6ca88ebd83f7bb903f82ee9efcbf71ebf476414d2cf465d
RLBA-2022:3675
new packages: python-jsonpointer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jsonpointer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jsonpointer-2.0-4.el9.noarch.rpm
21cc6275d3b3c4b2cba404a3838102b889baff286b71e8883a47f0080c657f0e
RLBA-2022:3676
new packages: python-jsonschema
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jsonschema.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jsonschema-3.2.0-13.el9.noarch.rpm
dc8da354c531d71d7ea70cd2e5b49004128ba221e580c7bf1341da813eba078d
RLBA-2022:3677
new packages: python-justbases
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-justbases.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-justbases-0.15-6.el9.noarch.rpm
9275d665532b3c455ab276d3157808c66f32123ede49b83aac8de3fa1d2ce4fd
RLBA-2022:3678
new packages: python-justbytes
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-justbytes.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-justbytes-0.15-6.el9.noarch.rpm
a0b50a65a668bf1b7eb3737e7d0108172014cff7df90842ec624733488e451b3
RLBA-2022:3679
new packages: python-jwcrypto
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-jwcrypto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jwcrypto-0.8-4.el9.noarch.rpm
55b1e29f417d1017bcb86509e0dd1c664d2b8f74d79a3d8f3f20a7c2b3befeb7
RLBA-2022:3680
new packages: python-kdcproxy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-kdcproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-kdcproxy-1.0.0-7.el9.noarch.rpm
ae0c7ddbda09ea266548730867fa43e9aee6bf59586222a6fdbee374a4a18dd8
RLBA-2022:3682
new packages: python-libevdev
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-libevdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libevdev-0.9-4.el9.noarch.rpm
558d0b5e19478d870b97acb0e4f36611f9db75d0418fa572c70a41758128ea9d
RLBA-2022:3683
new packages: python-mako
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-mako.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-mako-1.1.4-5.el9.noarch.rpm
49c288329b2eb5f5f3016f6fe5a58c4a96e87d84477171da4522e4f109428d15
RLBA-2022:3684
new packages: python-markupsafe
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-markupsafe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-markupsafe-1.1.1-12.el9.x86_64.rpm
84a34118418d2c0554c2add71d7368dbdeb2f99977697b93b62c8db8bb66e879
RLBA-2022:3685
new packages: python-meh
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-meh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-meh-0.50-4.el9.noarch.rpm
1f7f64920e1d2096918570f1c68f995a94495590eb35936e46b9fdac1cc1c498
python3-meh-gui-0.50-4.el9.noarch.rpm
4c077f548930aa9091e98ce27507c598540692350cceb7a664e48f7432a8f510
RLBA-2022:3686
new packages: python-netaddr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-netaddr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-netaddr-0.8.0-5.el9.noarch.rpm
7423fe191e035fa4e1b31498be0674f9a7d261e45b6b54fe179507b841b29736
RLBA-2022:3687
new packages: python-netifaces
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-netifaces.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-netifaces-0.10.6-15.el9.x86_64.rpm
864a5352211ce78061ae155ed2b6b2ca07c67a30abdd98a44e43f9e058c243c2
RLBA-2022:3688
new packages: python-networkx
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-networkx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-networkx-2.6.2-2.el9.noarch.rpm
1f7b90fcdb6dc183b3b1fea691929321a5f8182e286442590270a80308f5eab9
RLBA-2022:3690
new packages: python-pid
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pid-2.2.3-12.el9.noarch.rpm
140cd7b5994b89fa4b631efac5b23353eb50557ee1afc87cb14bfdab5b768f86
RLBA-2022:3691
new packages: python-prettytable
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-prettytable.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-prettytable-0.7.2-27.el9.noarch.rpm
3fabd970a0ffc0353cd3354180f11c4171ee151d58269389710b9d15f5878638
RLBA-2022:3692
new packages: python-productmd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-productmd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-productmd-1.31-3.el9.noarch.rpm
4ec024eb82897eeeb9398ab6c982a35c6105b666886ad3b83945a64c0f882b44
RLBA-2022:3693
new packages: python-pyasn1
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pyasn1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyasn1-0.4.8-6.el9.noarch.rpm
0343d620c8306ec8d609af7142a2e9ffe66fc7bb38c1104f1293c5e922c2d749
python3-pyasn1-modules-0.4.8-6.el9.noarch.rpm
df0e78f0f3b2e33eb23b95bad31da1bda1eb3ef648dae33a47c485f5fed9a603
RLBA-2022:3694
new packages: python-pycdlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pycdlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pycdlib-1.11.0-5.el9.noarch.rpm
a6343a68eca91e0fd909655664276ff511b855f68c810967471d53063ede54e3
RLBA-2022:3695
new packages: python-pycurl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pycurl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pycurl-7.43.0.6-8.el9.x86_64.rpm
497b37bcd9d70baf21cddaf39d2303612263d6eb81b66e862a1f2597667abcea
RLBA-2022:3696
new packages: python-pyrsistent
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pyrsistent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyrsistent-0.17.3-8.el9.x86_64.rpm
33d3d13e076a409a150f9e40558314195a239912ae9a58417a3d4f78fdd939b2
RLBA-2022:3698
new packages: python-qt5
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-qt5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-qt5-5.15.0-10.el9.x86_64.rpm
7c12e19178c37196791a9bed0df043c9d16ac716d47f1dd1e9899b74352a0e1a
python3-qt5-base-5.15.0-10.el9.i686.rpm
ec233def053bfad702e51ffbee3c7cc143c526a2930305b1be34f56a989e6a49
python3-qt5-base-5.15.0-10.el9.x86_64.rpm
e8bc08e9f5cc3a7110da633ee025706f9ba8649922b0f63ce720db7af0b91582
python-qt5-rpm-macros-5.15.0-10.el9.noarch.rpm
64ae41547c82b58a0832fe57b4bb6ef66599074f3117867fbf064aae548eebf4
RLBA-2022:3699
new packages: python-requests-file
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests-file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests-file-1.5.1-4.el9.noarch.rpm
3e99f9d762c5ea065578d34178f6abde35e8028fc0c87f7c3ee2da454611ce7f
RLBA-2022:3700
new packages: python-requests-ftp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests-ftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests-ftp-0.3.1-23.el9.noarch.rpm
2b59c9b787db80bbeb150339a5adfeb5ce00e2914790893f15b9ddabab8d47e3
RLBA-2022:3701
new packages: python-requests-gssapi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests-gssapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests-gssapi-1.2.3-3.el9.noarch.rpm
5173eb3b4176f6c89dc40fafc675b86fa62e3d48bed92f6225defbeb56dd24a6
RLBA-2022:3702
new packages: python-requests-oauthlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests-oauthlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests-oauthlib-1.3.0-12.el9.noarch.rpm
d5e57903f4595e07d17a1f2034f58fab80da5c874d7a472b1d315f38051f4bd7
RLBA-2022:3703
new packages: python-resolvelib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-resolvelib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-resolvelib-0.5.4-5.el9.noarch.rpm
a7903327eb375e671b9e4a99c70eca9e6db018560c7d6a282ab67ab50168e921
RLBA-2022:3705
new packages: python-scour
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-scour.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-scour-0.38.1-5.el9.noarch.rpm
442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b
RLBA-2022:3706
new packages: python-simpleline
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-simpleline.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-simpleline-1.8-3.el9.noarch.rpm
019b7e28659ecd08a5fa4299dc3a0d859f8f1c782143cd054e77760c5d2c812c
RLBA-2022:3707
new packages: python-urllib-gssapi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-urllib-gssapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-urllib-gssapi-1.0.2-4.el9.noarch.rpm
5cac4ce2b13c50cdda99c16f18685d43b904e1c463e561580d424c4ccbe2cab6
RLBA-2022:3708
new packages: python-yubico
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-yubico.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-yubico-1.3.3-7.el9.noarch.rpm
dad60e6c1c2b50ddfef4ac0ba3bd88397a43a78b5453b6e8f2ada55caf4a6968
RLBA-2022:3710
new packages: pyusb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyusb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyusb-1.0.2-13.el9.noarch.rpm
030c649ed6b736080f5e52abc5fb659072149590b6167704497052973fac018c
RLBA-2022:3711
new packages: pywbem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pywbem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pywbem-0.15.0-6.el9.noarch.rpm
d3521dfc08622e5ee5279d9c8ba77cd1f871e64d57abe908ff163135fb33244a
RLBA-2022:3712
new packages: pyxdg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyxdg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyxdg-0.27-3.el9.noarch.rpm
2c63144daa29faf585df966a1714deb5283b2661a65ccf8dc8576e78b1d31b32
RLBA-2022:3716
new packages: qt5-doc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-doc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-doc-5.15.1-4.el9.noarch.rpm
4feaf02bcf6e6f128fb1f348767403a1d02607a52ed5f00a013e9c047d9cb4c5
qt5-qt3d-doc-5.15.1-4.el9.noarch.rpm
eddd1b37caadb34faee508c9782ba8c51aba6405bfbf542560d1363daecf54a7
qt5-qtbase-doc-5.15.1-4.el9.noarch.rpm
095ef84f3fa0e525f26e6ef45a9b3a3b31b7cf2b210751e62729b20a4e6ea034
qt5-qtcharts-doc-5.15.1-4.el9.noarch.rpm
bfd2d4a3c7566a0dc12ac27a57deceaf124df50a8b727ecae31753a2a26ffc0f
qt5-qtconnectivity-doc-5.15.1-4.el9.noarch.rpm
2230430767f905cf3e41e85eacf28735ac7543a54e5ba0ce7c80d703f8c85d6c
qt5-qtdatavis3d-doc-5.15.1-4.el9.noarch.rpm
aca48e9612e54489881068b658b6c38afded94e8d0af986a9ab82a3d9b51e782
qt5-qtdeclarative-doc-5.15.1-4.el9.noarch.rpm
babae625dfb97e81d7eb78a8260de63bc1b1884550621357d353c1afb16c671f
qt5-qtgamepad-doc-5.15.1-4.el9.noarch.rpm
2226a26e06995d918ed14e688066128ec1aa212bf5f08d71a9d2a204f7992db9
qt5-qtgraphicaleffects-doc-5.15.1-4.el9.noarch.rpm
9c0da1fc3f4ce12a9ef33846a3ec1217f9a4c98bf61a177d4ebbf3d6edb5e620
qt5-qtimageformats-doc-5.15.1-4.el9.noarch.rpm
23537e0aad92d1143f28e115e1e4bd5853edac20b13de2d2bba782406f400d53
qt5-qtlocation-doc-5.15.1-4.el9.noarch.rpm
5d57fd6b8664cdbc02fc31a5034e5c1c1051620ba361518bd5fe61b78e246edf
qt5-qtmultimedia-doc-5.15.1-4.el9.noarch.rpm
0f34be5f2ccc7974043c1908ac0691be827f829c3e3db110347aee3436ebe5e1
qt5-qtpurchasing-doc-5.15.1-4.el9.noarch.rpm
1021211698e24d59d6ef7548688e53a214e3f644d08929177541b69455659e96
qt5-qtquickcontrols2-doc-5.15.1-4.el9.noarch.rpm
a856d6db1177df02835a8bf77718e66414b32707ff670cb6f8c6f01aba099b4a
qt5-qtquickcontrols-doc-5.15.1-4.el9.noarch.rpm
d3a3ee21d431d79814c53cdcdc2c3f9a1ad434f49761f2d367a6759aee8d9efb
qt5-qtremoteobjects-doc-5.15.1-4.el9.noarch.rpm
2f73a86ecbc6e36e01097ff825b2e8735a6498eb634a3cf00819ed49427d0825
qt5-qtscript-doc-5.15.1-4.el9.noarch.rpm
a8a93d95fb0f656512c76cecc0eb262b747affdfd9fc4cd1860331a1a383126b
qt5-qtscxml-doc-5.15.1-4.el9.noarch.rpm
2e463d3f298d6773bea70e3fb0fe1e4e5fc69cd77fd95422d0e04f130155a961
qt5-qtsensors-doc-5.15.1-4.el9.noarch.rpm
ed02acbab9c7bc3a65e7779abbd77e787d53252fb8b7604ed38224afbcbddf46
qt5-qtserialbus-doc-5.15.1-4.el9.noarch.rpm
aac704ce4780fa8fdd02ccdfe061824c1900d16d4dce8da01f2b8b9b97bdb485
qt5-qtserialport-doc-5.15.1-4.el9.noarch.rpm
ee6574410b687d76db0aa868d0bb7944abb485b5ec06048cd3a6f9e98b8c1058
qt5-qtspeech-doc-5.15.1-4.el9.noarch.rpm
b3d1b1bc94bd620f97892ac158e350f98ce7fa33995ec002c1506db826417dcd
qt5-qtsvg-doc-5.15.1-4.el9.noarch.rpm
ad52b61cdcc912fa7d6250b2b9911b2e5fa5414e647e4144582f0b0027fff792
qt5-qttools-doc-5.15.1-4.el9.noarch.rpm
4695f8cdafadfc9bf0e9fc48bcb30140948fe4ed86056b33f13dbc95aa837195
qt5-qtvirtualkeyboard-doc-5.15.1-4.el9.noarch.rpm
b7851a730e1afb405ea1e4854fe0203cb4790d9604078cfaa80724b54a8a084d
qt5-qtwayland-doc-5.15.1-4.el9.noarch.rpm
4076a92d094c5a4aed2c2e1462f3ea36bd7b8f2b22b1940ac3aeee3e6b6db6a7
qt5-qtwebchannel-doc-5.15.1-4.el9.noarch.rpm
412ee215dd566bf72263843e60be5ad745b76168c90b79f84285b8137d383b0f
qt5-qtwebsockets-doc-5.15.1-4.el9.noarch.rpm
860e9c69376480a872ba1253dff05c08ce7abc248a3da285e96c6454c22ae088
qt5-qtwebview-doc-5.15.1-4.el9.noarch.rpm
d5bb9d1e4c79089567f5af3d40cbc28a1d8715b2b54ec60ad5c69b464cc21d79
qt5-qtx11extras-doc-5.15.1-4.el9.noarch.rpm
aea1147d2de0b91036212edc08e2001255497a8511faf1fdeeef52f4fb223783
qt5-qtxmlpatterns-doc-5.15.1-4.el9.noarch.rpm
6b1474bf679b4470be96f504f9f41d2004d8075c91fa633f39f107498a3ee2ae
RLBA-2022:3718
new packages: qt5-qtconnectivity
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtconnectivity.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtconnectivity-5.15.2-6.el9.i686.rpm
0804df27a04070c95342e4d455ee67089c2903ac03c2f46a5ea481229681f0ac
qt5-qtconnectivity-5.15.2-6.el9.x86_64.rpm
38400344f2401878ea60141f54f3b37f36b1e10f0023b7b8f29b9e826dd2388c
qt5-qtconnectivity-devel-5.15.2-6.el9.i686.rpm
ea50388b5773d6eb016865c7873d9e583364d0740cf708361bbdc590ebc35372
qt5-qtconnectivity-devel-5.15.2-6.el9.x86_64.rpm
c2a76665a5df2be196eaab003aabb6d5a89f4305167e1cee63eebdff41b02f1b
qt5-qtconnectivity-examples-5.15.2-6.el9.x86_64.rpm
ceb04c445922ff7921e2c98877050fc390c3c896defe5278b36e60bbc2e401f7
RLBA-2022:3720
new packages: qt5-qtgraphicaleffects
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtgraphicaleffects.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtgraphicaleffects-5.15.2-6.el9.i686.rpm
dbe68bf0ecbaaff9e8fcf3abd1f222b72e8d1dfab92f652661fcbd9f65bdcf65
qt5-qtgraphicaleffects-5.15.2-6.el9.x86_64.rpm
0ab05641c6ca96b30ad191d4090a990dd2c4a8344c780b125c154d3441ef6f75
RLBA-2022:3721
new packages: qt5-qtimageformats
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtimageformats.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtimageformats-5.15.2-6.el9.i686.rpm
aa5daabbebd00d18be77388abc57753ecb3868cc4cc1765b1035e1a247c26a1c
qt5-qtimageformats-5.15.2-6.el9.x86_64.rpm
df0fae3e9f634971dcb7d3285425f7095175267acb60db83099d40bacfba8afb
RLBA-2022:3722
new packages: qt5-qtlocation
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtlocation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtlocation-5.15.2-9.el9.i686.rpm
c7be9c31029ab505e7bd8a47b63df0d0095d6b800ed978ad3408df522d6774e5
qt5-qtlocation-5.15.2-9.el9.x86_64.rpm
2529d293af1cba7839548d36cb747ab9f6b801277141921033d18f0d28cf69b4
qt5-qtlocation-devel-5.15.2-9.el9.i686.rpm
3cc70b39413d529d8be7c2e2838373eaf653f5c2e92796cb99009ade1f6cb93d
qt5-qtlocation-devel-5.15.2-9.el9.x86_64.rpm
9ffeb65e723d012ddf685b8e72540f97e224980a86bcd6b2b7a0de5d1a4070c6
qt5-qtlocation-examples-5.15.2-9.el9.x86_64.rpm
7f3c4abc1ad4e35ba23aa38a0ad2876252105e00add1d1b631f970acb89103aa
RLBA-2022:3725
new packages: qt5-qtscript
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtscript-5.15.2-6.el9.i686.rpm
abfa93bb6cf65642faa094af093b5fc4eb6bfac19a5c9d1d737776d839a5d94b
qt5-qtscript-5.15.2-6.el9.x86_64.rpm
a1f75b7dcb733557b659674b3c37cc488bb70686ef955c33634d7faee60a038a
qt5-qtscript-devel-5.15.2-6.el9.i686.rpm
0aaf2d56c4fba1ac6daef17d08e48e9dff1d3da9e4a7b32326c9ed2ddcea0eb4
qt5-qtscript-devel-5.15.2-6.el9.x86_64.rpm
6dab6d3aca0ab17a0d26fcb15f8314c76789761b1456f7b292cf268ac7781f8b
qt5-qtscript-examples-5.15.2-6.el9.x86_64.rpm
ddf5d9d0826c8648b7b30e04f64c7460b4aa23667c76d228be20e9a7361fbee8
RLBA-2022:3732
new packages: radvd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for radvd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
radvd-2.19-4.el9.x86_64.rpm
da7091258f09fc71cabb6d7b8473d5315233f396af6746809d3755e164a92857
RLBA-2022:3733
new packages: raptor2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for raptor2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
raptor2-2.0.15-30.el9.i686.rpm
f1b879eed10e406a7065feea0837cbd070165626b237b1bc4ca50a33d3ff2e41
raptor2-2.0.15-30.el9.x86_64.rpm
e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e
RLBA-2022:3734
new packages: rasqal
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rasqal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rasqal-0.9.33-18.el9.i686.rpm
8b033f5670a7de5bd6ff12fb28d6b30cc892b09e92057645e58b78a92cb59c02
rasqal-0.9.33-18.el9.x86_64.rpm
da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f
RLBA-2022:3735
new packages: redfish-finder
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redfish-finder.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redfish-finder-0.4-9.el9.noarch.rpm
590979e19e727c077106c05e63b538d76194fdf2996fb398a39c9bea99508478
RLBA-2022:3737
new packages: redland
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redland-1.0.17-29.el9.i686.rpm
0ea55ae47181c641201888c4bcb594570b1b8736c9aed5b41aab64ccc5d6502b
redland-1.0.17-29.el9.x86_64.rpm
487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d
RLBA-2022:3738
new packages: regexp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for regexp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
regexp-1.5-37.el9.noarch.rpm
49554c0c181463be34e862e47b84246e690df6ab43b4474571a57e80a5ce56af
RLBA-2022:3739
new packages: rest
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rest-0.8.1-11.el9.i686.rpm
5fc5e042ef67118a033ae6cc4958a8410df6de24c8673ee5227c46767e3264a1
rest-0.8.1-11.el9.x86_64.rpm
b7a0c01eb27c9d9a6eb1d4b474838f71b6b299347cd211c7e7e0a7048c461d11
RLBA-2022:3741
new packages: rpcsvc-proto
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpcsvc-proto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpcgen-1.4-9.el9.x86_64.rpm
127234a4100d5dfb8feba7b90208ab0a95506c1d0196382fa016316c2b3bf5c1
RLBA-2022:3742
new packages: rpm-mpi-hooks
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-mpi-hooks.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpm-mpi-hooks-8-3.el9.noarch.rpm
1a9803e2f02ea3cafaf3e2278cbdd59e0c4439a726928f4263ccc21b05ccacd2
RLBA-2022:3743
new packages: rrdtool
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rrdtool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rrdtool-1.7.2-21.el9.i686.rpm
89f84955e94b7e26b8d0ae23089aa0a011cd44ebef0172d6a9ba81cb0726fb1d
rrdtool-1.7.2-21.el9.x86_64.rpm
832825221ed2936a61364a4afca0a0611a5d3e1b9ea3e550a3ff05cb4f3c1776
rrdtool-perl-1.7.2-21.el9.x86_64.rpm
842bac750fab9cae29bf1fc3af7de85e08fe7341421d3fa0cbf455894264a9cf
RLBA-2022:3744
new packages: rshim
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rshim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rshim-2.0.5-2.el9.x86_64.rpm
1676d0db451a2e697c9cf1c49ed2a0f50ee785bdf5ad6cf46401d049dfb7cb47
RLBA-2022:3745
new packages: rtkit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rtkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rtkit-0.11-28.el9.x86_64.rpm
c1f75d252c80b24dc5f7dc34c558698c88684b987ad5ae7411f7908555770e65
RLBA-2022:3746
new packages: rubygem-mysql2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rubygem-mysql2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rubygem-mysql2-0.5.3-11.el9_0.x86_64.rpm
ce6a2c9028ca12855944fa30885afbc22fbe20771bb3a89712f98841d29ae97f
RLBA-2022:3747
new packages: rubygem-pg
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rubygem-pg-1.2.3-7.el9.x86_64.rpm
c8211a675f8a6ca093481111838bff2daa32863d5f84b08840fe9bc060294f1c
RLBA-2022:3748
new packages: rust-srpm-macros
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-srpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rust-srpm-macros-17-4.el9.noarch.rpm
d24e845e8bd18f2420543ae792d98a823b313de698c432d7345e1889568d789f
RLBA-2022:3749
new packages: rust-zram-generator
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-zram-generator.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
zram-generator-0.3.2-7.el9.x86_64.rpm
d6365ea8dbcc3e4f1bd0dca273dfab96459182a277956c22c929dfe15cd15505
RLBA-2022:3750
new packages: s-nail
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for s-nail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
s-nail-14.9.22-6.el9.x86_64.rpm
155ccbc5775ed68306e317da252a20291ae64532da23a7bfdd83568d28d385e7
RLBA-2022:3751
new packages: saab-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for saab-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
saab-fonts-0.91-25.el9.noarch.rpm
f285e6ce1b9e7324d296d7912a5310c3ee72fa9e6a63e555d67e3f2389b8729f
RLBA-2022:3752
new packages: sac
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sac.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sac-1.3-37.el9.noarch.rpm
4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e
RLBA-2022:3753
new packages: sane-airscan
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sane-airscan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsane-airscan-0.99.24-3.el9.i686.rpm
5ea31873b33c855b61a9d0baea8eb7462d68bd235a4b7547aef3f4d6c5088838
libsane-airscan-0.99.24-3.el9.x86_64.rpm
c8ee9819ad85821da5f714df358eaf40da70785b0f0d5c090d855fe5b29056f8
sane-airscan-0.99.24-3.el9.x86_64.rpm
6c92ddaf8c82d9156af7bb01516079476c633dd4bc6289ec94ba0c7dda5de2ca
RLBA-2022:3756
new packages: sbc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsbc-1.4-9.el9.i686.rpm
4c75cd168e189acf23a34d1295fcf90f563fe50996aea3859890e8b4ac1963ac
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:3757
new packages: sblim-cmpi-base
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-cmpi-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-cmpi-base-1.6.4-20.el9.i686.rpm
0079c11d1915b1ad762ba7aee330c9aad5ea8de79234dd0a6296f4fab8fb1125
sblim-cmpi-base-1.6.4-20.el9.x86_64.rpm
bfbb53d2a302a94be9e9d2a9a705db08e522cb9ea2a975ccf4963d75f6d7c741
RLBA-2022:3758
new packages: sblim-cmpi-devel
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-cmpi-devel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcmpiCppImpl0-2.0.3-24.el9.i686.rpm
bdb0a14dfdf2fb44bfb1c77b0f54dffe8e0967c7089099bd5fd6f582aa763b0b
libcmpiCppImpl0-2.0.3-24.el9.x86_64.rpm
f56d5ef507e47fdba672e0cee7c154790ab3cdf03c8305761ced24fd1802160a
RLBA-2022:3759
new packages: sblim-indication_helper
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-indication_helper.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-indication_helper-0.5.0-8.el9.i686.rpm
84a7ca586ba84247d4e40b83108afa6dfe3711ec1bcfca3fd6769525b8f4cd91
sblim-indication_helper-0.5.0-8.el9.x86_64.rpm
891eee8b544c0a6bfcdaba3e4058b3472e1e3c1a21fcbe04e3ecb7786d986a8a
RLBA-2022:3760
new packages: sblim-sfcCommon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-sfcCommon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-sfcCommon-1.0.1-19.el9.i686.rpm
510c5f5c886fb642c991febc12b11e74f75a4dda027b1ab92149b35df09e8e78
sblim-sfcCommon-1.0.1-19.el9.x86_64.rpm
69d179e4308caaf0d06203065fdd13a519a00b0521cb129e165235ce142669cc
RLBA-2022:3761
new packages: sblim-sfcc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-sfcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-sfcc-2.2.8-18.el9.i686.rpm
ae1375c4a40e0282579ca77e8c8c4f679ed7a79064df0d7e26d77126a66a6b3d
sblim-sfcc-2.2.8-18.el9.x86_64.rpm
b487b3f634a8072a0153366dbabec2f729266320c28f7103e14fbc8e5c4087b0
RLBA-2022:3763
new packages: scapy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scapy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-scapy-2.4.4-5.el9.noarch.rpm
ed652a097831710be2b84c850661f68e28ed8e82a27e6f24602e205ffe711252
RLBA-2022:3764
new packages: scl-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scl-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scl-utils-2.0.3-2.el9.x86_64.rpm
7d756665c09b0af15269e4688ef3cc2ab9250b4297233dd9fe37419af051a3d0
scl-utils-build-2.0.3-2.el9.x86_64.rpm
34a4c60c7c5c5b88645247d869455f2c2d53769a75a84fb66cee9f6144e55acd
RLBA-2022:3765
new packages: scrub
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scrub.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scrub-2.6.1-4.el9.x86_64.rpm
4d5f0ad9dfe121dbf329f3ccae02c3fc6c33d1a7937eda744096dfaf470e5c37
RLBA-2022:3766
new packages: seahorse
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for seahorse.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
seahorse-40.0-2.el9.x86_64.rpm
1f123c901c6fe7f88fd79ff7d4ca8e34d9569edb53c0a33cdc51b4063728ce80
RLBA-2022:3767
new packages: sendmail
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sendmail.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sendmail-8.16.1-10.el9.x86_64.rpm
0c6a02ca170b3c6d9e39f645df27bbe91fff20c763eb1fa810c9f06fb176d3f2
sendmail-cf-8.16.1-10.el9.noarch.rpm
d9d513de6a486ebd8e39241d43908f99e359bbcdb970a04cea98cb3b06124404
sendmail-doc-8.16.1-10.el9.noarch.rpm
c9eccaf1122d9d221d3d3e012abf1e7f034dfb7e6b3901b82e1cd15de2039131
RLBA-2022:3768
new packages: setxkbmap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setxkbmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setxkbmap-1.3.2-5.el9.x86_64.rpm
175a58ad49221dc62e79210d09c9984259a370e16dfaf192581464a86cff557e
RLBA-2022:3769
new packages: sgabios
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sgabios.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sgabios-0.20180715git-8.el9.x86_64.rpm
83ea82b1673ca93fd0f572088b4814b9c3496be442c7ee7e52d1f50123fbff18
sgabios-bin-0.20180715git-8.el9.noarch.rpm
db0f39a52c7f388a8718f5820bb04cb385135ca6fed3b715d55d0cefd423c0d5
RLBA-2022:3770
new packages: sgml-common
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sgml-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sgml-common-0.6.3-58.el9.noarch.rpm
d989a4e4fa61b65f13e77fcf02eccbd0e401d695f9d0d664ef0827ebe8cf193f
xml-common-0.6.3-58.el9.noarch.rpm
47ddd3f701924b321c3349e2ce4ecc65cd3d38635fbebf889565b983f4f73d7f
RLBA-2022:3771
new packages: sgpio
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sgpio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sgpio-1.2.0.10-30.el9.x86_64.rpm
4aca7fe7ce15adec65d1ed4ff9f6a231fd7743c71409a5d12037af07aad1ffad
RLBA-2022:3773
new packages: sid
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sid-0.0.4-6.el9.x86_64.rpm
aefbe5b6aeeeb56baa5090a13469f44bcc595e350214e7f61f100e7575ae3261
sid-base-libs-0.0.4-6.el9.x86_64.rpm
f5075c036088cafcfbbb96115d471ef0ecb0eed92611f0395c7378e056096e0a
sid-iface-libs-0.0.4-6.el9.x86_64.rpm
75e5381ab8a82c7a16e944da6dbf2d9239ed18188723aacd3a8beb0fc26b3e75
sid-log-libs-0.0.4-6.el9.x86_64.rpm
1070b58406d82d0d8eaa62648765d1567658e2f52b71c73456875dd15c7d5bf8
sid-mod-block-blkid-0.0.4-6.el9.x86_64.rpm
8f49a8f263a08ff4e0fb6ca332547dc40e43a5e2547c124c92a93974fb5525ea
sid-mod-block-dm-mpath-0.0.4-6.el9.x86_64.rpm
f99c799718c5c5fae7fb0dd299d09fbff450a00fc69b40d753e67844a8029834
sid-mod-dummies-0.0.4-6.el9.x86_64.rpm
453113b343037b91083d298fab467bc74f727f08edbf7222c354246bc67a005f
sid-resource-libs-0.0.4-6.el9.x86_64.rpm
71cfa37e5e2fc0faec0105f1ae4c519cfd1ae42d8ab82c3cb376470e259ec39a
sid-tools-0.0.4-6.el9.x86_64.rpm
da6b3c8a1d5cb13a1520b298e2a747201e7fd06fe9695bc12f38203da92bbe64
RLBA-2022:3774
new packages: sil-abyssinica-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sil-abyssinica-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sil-abyssinica-fonts-1.200-23.el9.noarch.rpm
aca5948bc0a5d64c1a1f093149dc43d1555dd97038b1a2ff9a16176b21b7caac
RLBA-2022:3775
new packages: sil-nuosu-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sil-nuosu-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sil-nuosu-fonts-2.200-4.el9.noarch.rpm
872f68f3fbdf30ea5c1595737deaece15432bae591ee7449f0d9f7e65c724228
RLBA-2022:3776
new packages: sil-padauk-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sil-padauk-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sil-padauk-fonts-3.003-9.el9.noarch.rpm
220bfa0f9ae56b9e194de353b1b1af193220138f6a4aa04e749a96d8ec425bc5
RLBA-2022:3777
new packages: sil-scheherazade-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sil-scheherazade-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sil-scheherazade-fonts-2.100-14.el9.noarch.rpm
1c81bf6e93feea0b11bc87251c68f660b072fe043a4f300ad4d98d477f75d4f5
RLBA-2022:3779
new packages: sisu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sisu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sisu-0.3.4-9.el9.noarch.rpm
4ea28b4be16fb4fb26529434820a0827f39e5f82e5ccae248eb60d4a9705cdc1
RLBA-2022:3780
new packages: slf4j
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slf4j.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jcl-over-slf4j-1.7.30-12.el9.noarch.rpm
f582f4c2af30eb5376da09c58113b308ab52c5e5817db1d3da940c5639ed9484
slf4j-1.7.30-12.el9.noarch.rpm
d58d7801d7898ba2b512a359d8a6b7be33015014e0b7be6110ad9465739e275c
slf4j-jdk14-1.7.30-12.el9.noarch.rpm
5dcd5497b279f1f933497b4b7fd4f3ecae088299ee5ab9f7dcf579046869b55c
RLBA-2022:3781
new packages: smc-meera-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-meera-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
smc-meera-fonts-7.0.3-5.el9.noarch.rpm
ef11aac047bee255983a3efb7e74609e831f00bdb98fee80a56802d66d674815
RLBA-2022:3782
new packages: smc-rachana-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-rachana-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
smc-rachana-fonts-7.0.3-5.el9.noarch.rpm
8ecbd6245902a22a97870252c49bdc223a6b884db71f942c8090e22f532aafcb
RLBA-2022:3783
new packages: socat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for socat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
socat-1.7.4.1-5.el9.x86_64.rpm
ab551ed42075c017fb3979ef53cdd9c1c9098be96f6f298e904ffafdd3dfaaa1
RLBA-2022:3784
new packages: softhsm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for softhsm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
softhsm-2.6.1-7.el9.2.x86_64.rpm
fe82b9bf43fa64862d0304be1746218403e3b8ecf7c3dd54e237e3324ab8188a
RLBA-2022:3785
new packages: sombok
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sombok.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sombok-2.4.0-16.el9.i686.rpm
6a6f82bba895fd6bc87998a2531590ecf7f94038e4fe921d55e271ccc074b923
sombok-2.4.0-16.el9.x86_64.rpm
bbdf901953eecac3f748618c50a3a9212777421090090ed5168b681c3307b7ca
RLBA-2022:3786
new packages: sound-theme-freedesktop
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sound-theme-freedesktop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sound-theme-freedesktop-0.8-17.el9.noarch.rpm
621b97f40db0f7f8a967eb4a30496f6d7f5c7a5947d60f10d953a8de14d2ba89
RLBA-2022:3787
new packages: soundtouch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for soundtouch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
soundtouch-2.1.1-8.el9.i686.rpm
ca1c6bf0f7ce6324345c1317fdbb8008817d03d27b9f2bc29f354ae7628f2b32
soundtouch-2.1.1-8.el9.x86_64.rpm
397f8334994abc648fdfe8e78edccb1a74bfeb0fd0c9ff848fd8a287de12417b
RLBA-2022:3788
new packages: source-highlight
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for source-highlight.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
source-highlight-3.1.9-11.el9.i686.rpm
8afdf7d2653bd8c72883d712fbed91e06ffaded7f96116a346e4253ee483e1c2
source-highlight-3.1.9-11.el9.x86_64.rpm
8619f82da1a29154e604f210149ab8c29dc4ae530b634fa1e041bc9d029921b6
RLBA-2022:3789
new packages: speech-dispatcher
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for speech-dispatcher.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-speechd-0.10.2-4.el9.x86_64.rpm
afd90e71ecbdbc65150ff6b81e226a6ae6313548e8fe31466e8d018da8be5508
speech-dispatcher-0.10.2-4.el9.i686.rpm
fb8ba36572f6c14895deab790dd6edb64a5644bd6fa70efaac54bf43b73d5fbd
speech-dispatcher-0.10.2-4.el9.x86_64.rpm
71364933dfd516b2565ad30ae2a994a484dd8c64201037b66e215ec11c114bc3
speech-dispatcher-doc-0.10.2-4.el9.noarch.rpm
3567ac1059ac4af0e4b17d4d7eeae7c98d401f0679efe97db51ff36e0aa925d3
speech-dispatcher-espeak-ng-0.10.2-4.el9.x86_64.rpm
136b61a27f320d43954767a38402e4164a38b72edd3081b39927708043197d80
RLBA-2022:3791
new packages: speexdsp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for speexdsp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
speexdsp-1.2.0-5.el9.i686.rpm
cfca123abf370d71f90668f5595e4b52d4b2c45d30365a27211f23c2f52d07a1
speexdsp-1.2.0-5.el9.x86_64.rpm
98d6b07df75b9a44d71b4cc08b7d0e0f68c42d4694900bb3ed583392fe014cea
RLBA-2022:3792
new packages: splix
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for splix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
splix-2.0.1-0.46.20130902svn.el9.x86_64.rpm
f7e0ac4801449ca420010193ae3369daa86693753d85979bac7524d41ba1e293
RLBA-2022:3793
new packages: sshpass
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sshpass.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sshpass-1.09-4.el9.x86_64.rpm
788d3639aeace23cfd8fd0fb93fa8ec1af851df48cfc244df6565e1cd7673a7c
RLBA-2022:3794
new packages: startup-notification
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for startup-notification.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
startup-notification-0.12-23.el9.i686.rpm
0a2711aace1ad050107a200486a1a23780b3222fe84b27af24ee70083b4aad2b
startup-notification-0.12-23.el9.x86_64.rpm
0cee3e1666928fbaefc35c3bb6683f712b1d79d228e9ab1b0e4e70f0d2c5eb33
startup-notification-devel-0.12-23.el9.i686.rpm
e601669950b1e4f97f9885b3296ee901df697d662f1e0e8bce06a6707b1e9a6c
startup-notification-devel-0.12-23.el9.x86_64.rpm
6afd04039cb17b22e2782e90ebd234ea6fc428461a084efc125829d0aada3ef3
RLBA-2022:3795
new packages: stix-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stix-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stix-fonts-2.0.2-11.el9.noarch.rpm
71602b2204573bf414ee6f2745d9046904260b4b20d87e45d2a6349e2ca8bc45
RLBA-2022:3800
new packages: switcheroo-control
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for switcheroo-control.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
switcheroo-control-2.4-4.el9.x86_64.rpm
a8072633d0a5dbc8fa12a87d590d294f0a865323abd34652087947349280de77
RLBA-2022:3801
new packages: sysprof
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sysprof.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sysprof-capture-devel-3.40.1-3.el9.i686.rpm
7b5f34384d5d7359592b67ea6a7a4dcc6b42dac02174017f8c52b2195f7ecc0b
sysprof-capture-devel-3.40.1-3.el9.x86_64.rpm
25c16fceed630b41cb80882a7d74c8284bea8d8316c5254412429d994168f79d
RLBA-2022:3802
new packages: system-config-printer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for system-config-printer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
system-config-printer-libs-1.5.15-4.el9.noarch.rpm
17112be2cf3c9c9b3fd9cd6527a9feed03116487f528e3e28b07ab1176069758
system-config-printer-udev-1.5.15-4.el9.x86_64.rpm
16ed28948a7d87d06ceb9137dd5b1c36db0ad86d835bf2901254fb905f82d002
RLBA-2022:3803
new packages: taglib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for taglib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
taglib-1.12-6.el9.i686.rpm
770aa70de0b1480bfd11ad7b575e4afc88b05f3b0ab33869c2792c36df9c4a2e
taglib-1.12-6.el9.x86_64.rpm
cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10
RLBA-2022:3804
new packages: targetcli
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for targetcli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
targetcli-2.1.53-7.el9.noarch.rpm
b42866fd04e52979638aa1f51a369b563446b50ab4dbf821d0ed2850b9c3648f
RLBA-2022:3805
new packages: tbb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tbb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tbb-2020.3-8.el9.x86_64.rpm
612fbc16c0f54c12a3b340edd867ba58b85dc85ae23226f068805a578922b76f
tbb-2020.3-8.el9.i686.rpm
4e16671eabfebb11ad01a2b7c57a91734a952cabf1b1b6383e6af18bce3a9937
tbb-2020.3-8.el9.x86_64.rpm
1b1c4ff9fce70dbfe9a88ade638ee91d2c62192c2d79dd80c35e88cff9049ed8
tbb-devel-2020.3-8.el9.i686.rpm
2d3da020036f0a5e84bf20058d3b73b999043a2873f90e2e119035445bbd4aa2
tbb-devel-2020.3-8.el9.x86_64.rpm
98c2222d584cdbdea1bb0fe2453130da93fdeb21ab7273a6859c02596a352e70
tbb-doc-2020.3-8.el9.x86_64.rpm
297c1c1175278b45b9885f185ccec242ba193d9f49cd71974f0d5a6b2cc1c082
RLBA-2022:3806
new packages: tcpdump
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tcpdump.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tcpdump-4.99.0-6.el9.x86_64.rpm
b3d3db0980ae4df8252c244c939d7e38bd45c518ddeb140c8814c20ad409a99b
RLBA-2022:3807
new packages: teckit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for teckit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
teckit-2.5.9-8.el9.i686.rpm
27ee3b3becc73ae0ce78ad268f158c932d2905fc5286d1db2dbcf758ab1c8898
teckit-2.5.9-8.el9.x86_64.rpm
fc83324f7d2c5606ca8997d66f07c4e6c0533f7ba073ebef9b2920b5262430d7
RLBA-2022:3808
new packages: telnet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for telnet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
telnet-0.17-85.el9.x86_64.rpm
1ed2da93f521063e07d8e69835a53f80bf23ba9aede52371e972a642348d384b
telnet-server-0.17-85.el9.x86_64.rpm
439ab47e535802ac623781ac5878744e877113474a9c9915102dbfbce05560bf
RLBA-2022:3809
new packages: tesseract
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tesseract.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tesseract-4.1.1-7.el9.i686.rpm
9ed5cf59dc78c7d41f5b19bb58fef52cc6ee96994e498c1c557b516b26a12870
tesseract-4.1.1-7.el9.x86_64.rpm
22eb25be7aa98d836e2123e3e92165eb5d28906448eadb528a18b8aff903be39
RLBA-2022:3810
new packages: tesseract-tessdata
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tesseract-tessdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tesseract-langpack-eng-4.1.0-3.el9.noarch.rpm
0ce5864fdc5759e7fb335d15cf4262df21aa1c1c6ea7164cd16938e553daaf89
tesseract-tessdata-doc-4.1.0-3.el9.noarch.rpm
75a212885953459b2f2de99dad327b9c0bac9499200da98f874840fc899e7bfa
RLBA-2022:3811
new packages: tex-fonts-hebrew
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tex-fonts-hebrew.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tex-fonts-hebrew-0.1-36.el9.noarch.rpm
df87d0cbd179d281da99bf140a9212ba358a5ae47ccf5e3d366b225ac9b64c7c
RLBA-2022:3812
new packages: thai-scalable-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for thai-scalable-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
thai-scalable-fonts-common-0.7.2-5.el9.noarch.rpm
7ed8dec028fe34adaeeeab4e8dddfa42749d9237ad3e22528e47207aef87c979
thai-scalable-garuda-fonts-0.7.2-5.el9.noarch.rpm
b08a9de6c131693e4ea43e252c6c3bb47cead642fa573a4a3019661264867408
thai-scalable-kinnari-fonts-0.7.2-5.el9.noarch.rpm
e5f7942ee66305777083f8254143b091544afeece2197f87eab20039c83265de
thai-scalable-loma-fonts-0.7.2-5.el9.noarch.rpm
93a4f24ad1bdf2294c35968e0aa59ca10c013d57e438b1a750872d82f2e782fd
thai-scalable-norasi-fonts-0.7.2-5.el9.noarch.rpm
1a60b0969404b135aa650861bfc73523bf3d4320b8ce85f4d65df2f73fed4e03
thai-scalable-purisa-fonts-0.7.2-5.el9.noarch.rpm
2e92930ddf54221e025200e3bac21684edb219659bf0a0a3909983af9e9f5938
thai-scalable-sawasdee-fonts-0.7.2-5.el9.noarch.rpm
438eadadc97b7729cc2bf003b534d897a0e2ece93bcdd230fa15456531222b71
thai-scalable-tlwgmono-fonts-0.7.2-5.el9.noarch.rpm
4793778b9d95a34e42fa11cf379d41f8626469f3452ac5ac9dae1bb165df9608
thai-scalable-tlwgtypewriter-fonts-0.7.2-5.el9.noarch.rpm
45b71f41fd8adbf53ff4ea293346ff71bbdd21fb8c2c21b90e7090c0840e325d
thai-scalable-tlwgtypist-fonts-0.7.2-5.el9.noarch.rpm
d93ccbef4d07edcc7c6f0154e444018c35ae081d4a4d51e277da66406a7f842a
thai-scalable-tlwgtypo-fonts-0.7.2-5.el9.noarch.rpm
bef6ff79d876885c6dcf446a93123780d697dea52cf6977da38d31bdc742ba53
thai-scalable-umpush-fonts-0.7.2-5.el9.noarch.rpm
9d2a7e3213c86ffc035c04f1ff23b68ee52281c50870ffee38c9fccffe252dab
thai-scalable-waree-fonts-0.7.2-5.el9.noarch.rpm
dfc3820558f7f03f3af8de67f8d2bdac3f35acc491bf4e1461c68a2fe549bd0f
RLBA-2022:3813
new packages: thermald
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for thermald.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
thermald-2.4.6-2.el9.x86_64.rpm
13e17fd99fafc0b687b5b658443e7bf5933b59c4a7060cd0a5e621a425d25a6b
RLBA-2022:3815
new packages: tmpwatch
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tmpwatch.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tmpwatch-2.11-20.el9.x86_64.rpm
fe568c7e2f6f974f824d5158247949e7801e410d81c29052c88309f0fd4f7dde
RLBA-2022:3816
new packages: tokyocabinet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tokyocabinet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tokyocabinet-1.4.48-19.el9.i686.rpm
66ae03931ccf6fe69ab0c4a37d7345e9e6ff0ae03d6cf879633cfe2c3108086d
tokyocabinet-1.4.48-19.el9.x86_64.rpm
7cd8691fee0bf215fd3f3cfb180f55dc83a911932bb2d7fa815704a1c2730039
RLBA-2022:3817
new packages: totem-pl-parser
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for totem-pl-parser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
totem-pl-parser-3.26.6-2.el9.i686.rpm
0a587ba63d677848b7d138c15996337f6249434a33f84b01187da555987db647
totem-pl-parser-3.26.6-2.el9.x86_64.rpm
394d2becb707ad123cbba4086f9f2f4b3e8f6085f701a250c0d06d98ca56fceb
RLBA-2022:3818
new packages: tpm2-abrmd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-abrmd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tpm2-abrmd-2.4.0-3.el9.i686.rpm
104352d629646cd27a24709ccad36c71a172815c233a8d6db238ec9e60bd4cac
tpm2-abrmd-2.4.0-3.el9.x86_64.rpm
6d484992c071bc0fd7b5f7a34bf0a1686292f17ed7aee332b3ac59ed066bc6bb
RLBA-2022:3819
new packages: tpm2-abrmd-selinux
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-abrmd-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tpm2-abrmd-selinux-2.3.1-6.el9.noarch.rpm
e57c39c511676bae27d50e167f9cc4ce62423305cebc754cf365d234fbed009d
RLBA-2022:3820
new packages: tpm2-pkcs11
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-pkcs11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tpm2-pkcs11-1.5.0-9.el9.x86_64.rpm
343e835f5fda28b52210596d9e06cfe275a49b1bfeed63e92d92dfb3dbeec5de
tpm2-pkcs11-tools-1.5.0-9.el9.x86_64.rpm
439c29015424a1d36850338392fb32f546890754e9e711756c814b91974eb6ee
RLBA-2022:3821
new packages: tracer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tracer-0.7.5-4.el9.noarch.rpm
fdb78da65e9b324014ef29839028562946e6dc64014de42f74fbf00c54983e22
tracer-common-0.7.5-4.el9.noarch.rpm
969fec274b7ef0a2efaf1c63f3aa563a86e2052f95d8d21a97b632260270c925
RLBA-2022:3822
new packages: tracker-miners
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracker-miners.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tracker-miners-3.1.2-1.el9.x86_64.rpm
15096e6f9ce8824811f2be8fe15e9fb583b2cbac478920361033682fa95bf2b1
RLBA-2022:3823
new packages: ttmkfdir
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ttmkfdir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ttmkfdir-3.0.9-65.el9.x86_64.rpm
6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6
RLBA-2022:3824
new packages: twolame
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for twolame.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
twolame-0.3.13-19.el9.x86_64.rpm
cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f
twolame-libs-0.3.13-19.el9.i686.rpm
2491f6bd787256fcddd9744e4fe24a2f24f78d30b84574d7f33458bd5ce13e91
twolame-libs-0.3.13-19.el9.x86_64.rpm
d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0
RLBA-2022:3825
new packages: ucs-miscfixed-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ucs-miscfixed-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ucs-miscfixed-fonts-0.3-29.el9.noarch.rpm
8f79e7be9441d49fcce7264faa2fdf37cc2545f0577f86e90f7688cd4f3daaee
RLBA-2022:3826
new packages: udftools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udftools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
udftools-2.2-5.el9.x86_64.rpm
ec0d2a4ed3f9cb5b4fb1e7ce2f675ffb8239299467a5658bcfd6661328d2b207
RLBA-2022:3827
new packages: unicode-ucd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for unicode-ucd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
unicode-ucd-13.0.0-5.el9.noarch.rpm
2989fcda957146e6e99a2557911a16bf516c6dbd44b160a3fe2dd60ecd35aac6
RLBA-2022:3828
new packages: univocity-parsers
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for univocity-parsers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
univocity-parsers-2.9.1-5.el9.noarch.rpm
63486718d9ccf8c0abec530eabad75f003c619bb1337c4cc025f42cbf9757dd4
RLBA-2022:3829
new packages: unixODBC
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for unixODBC.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
unixODBC-2.3.9-4.el9.i686.rpm
b0095841ba397a08ff989f84bb460c55d6b24334225c0e10369936cede74880d
unixODBC-2.3.9-4.el9.x86_64.rpm
d3776e7cfe06372d483b9a9996885e522c4584645fce0cf72b7a974e7ed294ad
RLBA-2022:3830
new packages: upower
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for upower.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
upower-0.99.13-2.el9.i686.rpm
76d06d001fa4859f5611690fab33851afb3d7544c248dfb8cf226c129b118680
upower-0.99.13-2.el9.x86_64.rpm
a3a5f9aa134f5b8064275d47b3bd5595a5eaf7ae6503b79a2ae360a16d2c522e
RLBA-2022:3831
new packages: uresourced
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for uresourced.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
uresourced-0.4.0-3.el9.x86_64.rpm
6a456903cc49d96c0bf3f4cb22a208996b0852d9c82ecdd94860d53298f9c427
RLBA-2022:3832
new packages: urlview
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for urlview.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
urlview-0.9-31.20131022git08767a.el9.x86_64.rpm
77cc8514cc7d38bad60a04dc6faa289dac5f53646bf828ef5e9cca6c3351e839
RLBA-2022:3833
new packages: urw-base35-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for urw-base35-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
urw-base35-bookman-fonts-20200910-6.el9.noarch.rpm
27daff9c1c54ed196339f8de7c2f651579c2627a405511fdb5fb107549ed40db
urw-base35-c059-fonts-20200910-6.el9.noarch.rpm
68870a40414ee33bceb8775e7c02c1f3b490e87e9c412e8139811f0e9c784df7
urw-base35-d050000l-fonts-20200910-6.el9.noarch.rpm
fe7c0d5b7f92593bc46de6a47a236184a786edd0536639eed140d56370164d42
urw-base35-fonts-20200910-6.el9.noarch.rpm
5de538f5dd77bc99018fb6bbcc3729045034fb784914d599c2cac56aa15fa461
urw-base35-fonts-common-20200910-6.el9.noarch.rpm
dbc689f47f1cc1513038fbebef960699572654ac2245b5db5ead26a07face05b
urw-base35-gothic-fonts-20200910-6.el9.noarch.rpm
6c27be8e0be44052fb554614024a0600cd8cb310778b61c9c7479837b5bc8bac
urw-base35-nimbus-mono-ps-fonts-20200910-6.el9.noarch.rpm
fb6a1f46b19380b9c077ac1813a02cdceb2cb6e50845f1ac448c9df38fb76be6
urw-base35-nimbus-roman-fonts-20200910-6.el9.noarch.rpm
b4f7f1dcd3ab5786d7c7b7e5b797fd9ca1eb0e65ba9a0dafc29aaedb5caa32b4
urw-base35-nimbus-sans-fonts-20200910-6.el9.noarch.rpm
3cb9a04fc4144d15aa7410cd9417e288f6a75c0a270d67acaaf7f4c523ab1b00
urw-base35-p052-fonts-20200910-6.el9.noarch.rpm
9cba57467c10f97d5d2d57086b5c05b5f5e0367ab5dab3922386bd320d54f19d
urw-base35-standard-symbols-ps-fonts-20200910-6.el9.noarch.rpm
2296069a2889ba1bd00896024ca18623133f029bc812906d6dd4d5b2aa76e15f
urw-base35-z003-fonts-20200910-6.el9.noarch.rpm
dce1f19c50d2f98c17c466c9b30e3f933e29b5169e10b28d6852d1ca8e66ddaf
RLBA-2022:3834
new packages: utf8proc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for utf8proc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
utf8proc-2.6.1-4.el9.i686.rpm
36bb973bd88f62bd8fde384f2124c8d24b4ec48334ee695f65933e570f0998e9
utf8proc-2.6.1-4.el9.x86_64.rpm
db0abef61f3d5f662bc3293e2e8f7a50c9afd5c59eb13119c01e3ba02d732dc8
RLBA-2022:3835
new packages: v4l-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for v4l-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libv4l-1.20.0-5.el9.i686.rpm
3f33c4c41b2931ace0374c6e9a6ae6abdce1d4eef5bb6dbe175bcf72855600d6
libv4l-1.20.0-5.el9.x86_64.rpm
959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3
RLBA-2022:3837
new packages: virt-top
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-top.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-top-1.0.9-21.el9.x86_64.rpm
2207ecd308260f7c90476e89b237fdeba5ed74b03498e80d59f11da413ebc717
RLBA-2022:3838
new packages: voikko-fi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for voikko-fi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
voikko-fi-2.4-5.el9.noarch.rpm
e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36
RLBA-2022:3839
new packages: volume_key
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for volume_key.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-volume_key-0.3.12-15.el9.x86_64.rpm
6d7d8df897eab3b6b585533b22411d486e8e222a9f2fdb5b6013f56e1601558e
volume_key-0.3.12-15.el9.x86_64.rpm
3ea811e885fd3605d2a7375e13cda87371a6fad479acf447303142b63fad4383
volume_key-libs-0.3.12-15.el9.i686.rpm
f2df8943c829869284187429ff877ef46c1e96875a322b2426f55da17ae3799f
volume_key-libs-0.3.12-15.el9.x86_64.rpm
af73662f47ac8ac947921451a9852f47083ca565ac724e5eaef01703479e7dde
RLBA-2022:3840
new packages: vte291
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for vte291.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
vte291-0.64.2-2.el9.i686.rpm
c0158d2b79be8f0cd01fffde4e9a0426b3cad635f9536cb482ace5ef45b85ec8
vte291-0.64.2-2.el9.x86_64.rpm
8766225fa4af594b3e4d89c27f6e17c07e65db0deb3f5f47012f593db8efdd47
vte-profile-0.64.2-2.el9.x86_64.rpm
3f5e54b75573a6291a6aeec9d33cbc8396ff0cd2094c811ad2e7c607bbe88017
RLBA-2022:3842
new packages: wayland
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwayland-client-1.19.0-4.el9.i686.rpm
10da5e36c6a85e0bea11d6ac9b765e52a2126c717546ad3ccface9aeb584b8f3
libwayland-client-1.19.0-4.el9.x86_64.rpm
4c1718061503d972dd4ed0938ff4ed2d098779a323b6b122b026539411f988fc
libwayland-cursor-1.19.0-4.el9.i686.rpm
f7e9de7c807f69385cf6ddafe81640c400c9696a4e148fe826278a049375b9c6
libwayland-cursor-1.19.0-4.el9.x86_64.rpm
b6db085e0d17a50846d4b754ac2f0d4d45253458e48c76d7150dd64eb0ec3c84
libwayland-egl-1.19.0-4.el9.i686.rpm
765027814218d8f3a5dc27f432e465322376f53c182495383980537613cdc342
libwayland-egl-1.19.0-4.el9.x86_64.rpm
ddc80ce52d2a663a8ae7746caa0bf0d945d8fface6c768b151d715b495f8067c
libwayland-server-1.19.0-4.el9.i686.rpm
6e660150d7bf0d41f72190b16a105c882a088888beb278f341c04c50087c0792
libwayland-server-1.19.0-4.el9.x86_64.rpm
c0ee5e7824dff3ce76be1814f896a29fdc2736105e771d36571acc00c8755a2f
wayland-devel-1.19.0-4.el9.i686.rpm
c9dce228490cd1b126fff95982373a92badeded83119395c223d9e154bcc21f9
wayland-devel-1.19.0-4.el9.x86_64.rpm
dd2df486776c681755529d13af199429304257886a3dd0abf477edd26d4b52d7
RLBA-2022:3843
new packages: wayland-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wayland-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wayland-utils-1.0.0-4.el9.x86_64.rpm
6336a085f7de16dfc73a7508fb87cb2990ee8d5c17cf000c8a8e1c4404a770f6
RLBA-2022:3845
new packages: web-assets
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for web-assets.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
web-assets-filesystem-5-15.el9.noarch.rpm
01139b240fb56cd16afd43eab59464a09b707b3759a9956e840d3528fb0e30c2
RLBA-2022:3846
new packages: webrtc-audio-processing
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for webrtc-audio-processing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
webrtc-audio-processing-0.3.1-8.el9.i686.rpm
f0a2f60c037f99b9f4a327ce927263ffb95e4babf5ae5ee63d7d9aed2472d953
webrtc-audio-processing-0.3.1-8.el9.x86_64.rpm
252da90e9f9cfa879cd6b43b6d94006e484989e1d1bb29f25782e53c7d1b6458
RLBA-2022:3851
new packages: wsmancli
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wsmancli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wsmancli-2.6.0-15.el9.x86_64.rpm
716a53907bbdc80e5ea2af2dfd1487a5514b71aaf0239884f7e0b5b42bd58ab0
RLBA-2022:3852
new packages: xalan-j2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xalan-j2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xalan-j2-2.7.2-10.el9.noarch.rpm
96237e4d04c6e60d326da30769034bf757e509354a571c05d45f66ba3b36fe99
RLBA-2022:3853
new packages: xapian-core
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xapian-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xapian-core-1.4.18-5.el9.x86_64.rpm
6f9fbad5d01b5cd867e8003f0a50ec06e6fadae27c4b4d7e38d01a5e9f864849
xapian-core-libs-1.4.18-5.el9.i686.rpm
6f22af2f9f1b9036cb3f51d9ebc474ffdd06c7b9bbad46eecadc3ed8d37b2ffa
xapian-core-libs-1.4.18-5.el9.x86_64.rpm
f5c59961ae8b373699a8508fee22d3e400c27d63d7b846dc2b0b72bddba51f9e
RLBA-2022:3854
new packages: xcb-util
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xcb-util-0.4.0-19.el9.i686.rpm
0ac9cf44589711419ae7bd79c8ec49eb7d08e1964ef6bb0d9eb2cb55d4e3c7fb
xcb-util-0.4.0-19.el9.x86_64.rpm
7cb6a5c9d331f25440d75472451659ce8c7193c0a46d083679076a939c80efaa
RLBA-2022:3855
new packages: xcb-util-image
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-image.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xcb-util-image-0.4.0-19.el9.i686.rpm
212668c0e7b6fcade0eb2adc928e6bb4c14a0713142d9439d983451b48d5677b
xcb-util-image-0.4.0-19.el9.x86_64.rpm
25604daacebd1f6e0502d5c9807d0e96d2bfe18f34245654d559e0c9209b9f43
RLBA-2022:3856
new packages: xcb-util-keysyms
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-keysyms.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xcb-util-keysyms-0.4.0-17.el9.i686.rpm
852b680f305f1e75f78992462b56d5a9f6adcbcf09a166caee357a646119a494
xcb-util-keysyms-0.4.0-17.el9.x86_64.rpm
9a4e1d6c677d70eb0200d444c410ee0599208cfa506a32f7ddb8c7d22190c7e3
RLBA-2022:3857
new packages: xcb-util-renderutil
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-renderutil.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xcb-util-renderutil-0.3.9-20.el9.i686.rpm
c5b78153bc5a0e11cefdf1c789a0fc96839d3b385245b1ae44da3cb786022a0e
xcb-util-renderutil-0.3.9-20.el9.x86_64.rpm
56dfdc833cd2e53cb1f31972ccaea38810c124c6a5ea99fc00a7f24b54d1e187
RLBA-2022:3858
new packages: xcb-util-wm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-wm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xcb-util-wm-0.4.1-22.el9.i686.rpm
03c94065c218596aeaf3eb6a84eaecbe6d16598aaa823fe7a98e4fc066f8d9f2
xcb-util-wm-0.4.1-22.el9.x86_64.rpm
2614e58579e0cb4d14d41cefeba7f30a67174040780e72dea051b4ee42109e17
RLBA-2022:3860
new packages: xdg-user-dirs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-user-dirs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-user-dirs-0.17-10.el9.x86_64.rpm
af7fa1b02fd48e314a1b914f7d7fba26f66724cc04edfa702c9ef98296a344b5
RLBA-2022:3861
new packages: xdg-user-dirs-gtk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-user-dirs-gtk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-user-dirs-gtk-0.10-22.el9.x86_64.rpm
6d9b2ed8bc6b477553b17352cc0320d0f4c8742ca326e69cc259849546a3af79
RLBA-2022:3862
new packages: xerces-j2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xerces-j2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xerces-j2-2.12.1-6.el9.noarch.rpm
9912d7a3d0d9ed74f3ab29f236ba4be91b398cdbf5404335c6d3f6f3c8035b42
RLBA-2022:3863
new packages: xhtml1-dtds
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xhtml1-dtds.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xhtml1-dtds-1.0-20020801.14.el9.noarch.rpm
317d3e7d720f4a895105c28b62821ec7fca90322ac7f1c2e25ec3d722223b54a
RLBA-2022:3864
new packages: xhtml2fo-style-xsl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xhtml2fo-style-xsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xhtml2fo-style-xsl-20051222-24.el9.noarch.rpm
ba22387cc7497dfce4c6b84c292f0fa7f9da7ebcd690cf0f167c2570e1a96aa4
RLBA-2022:3865
new packages: xkbcomp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xkbcomp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xkbcomp-1.4.4-4.el9.x86_64.rpm
057eb52b686afd12713d130d797b582568939380a97c75fd08a51b881dcf7337
RLBA-2022:3866
new packages: xkeyboard-config
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xkeyboard-config.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xkeyboard-config-2.33-2.el9.noarch.rpm
673889fd77ce740d79e7da7cb58dfdb8937a9d5c02ba7533288231d1797e1b15
xkeyboard-config-devel-2.33-2.el9.noarch.rpm
0e8127aadca58056758f7e804ef45904b5a713e82a29f732b910e5788e255d19
RLBA-2022:3867
new packages: xml-commons-apis
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xml-commons-apis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xml-commons-apis-1.4.01-36.el9.noarch.rpm
69fd151623173d92fe13f9c81341c17c63c9c9bb790b39875194018ff2d34bd6
RLBA-2022:3868
new packages: xml-commons-resolver
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xml-commons-resolver.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xml-commons-resolver-1.2-36.el9.noarch.rpm
3376229b156ac137e3fdcc11786e961b602ecd64c02711ab7200bdfa5b420231
RLBA-2022:3869
new packages: xmlsec1
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xmlsec1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xmlsec1-1.2.29-9.el9.i686.rpm
4e9685a302690dbdc6b57b46d51606ffae53ca62913a46567be2c1377ff03e13
xmlsec1-1.2.29-9.el9.x86_64.rpm
ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a
xmlsec1-nss-1.2.29-9.el9.i686.rpm
1ef78b843b2a6c7c68e58b779084f96ac0d37e41211aacf9fe6c604f5c108f00
xmlsec1-nss-1.2.29-9.el9.x86_64.rpm
04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2
xmlsec1-openssl-1.2.29-9.el9.i686.rpm
acf490edbf994c753f9c42ce32c02342c9db9d844d7ade70815c1b78cf89b7a3
xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm
435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679
RLBA-2022:3870
new packages: xmlto
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xmlto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xmlto-0.0.28-17.el9.x86_64.rpm
cf1e2083aa1af1b6c0dcbd46bebc622bbf785fc5f3ee2c193771d926e8d93f6b
xmlto-tex-0.0.28-17.el9.noarch.rpm
850876b10c3ce58d402d7022d9316c073e2705a4810a5742345a9d79e579cddb
xmlto-xhtml-0.0.28-17.el9.noarch.rpm
f0bfa44747904ef4de45036466bfa45c1b45005ab24cf8b922d773bb3e60b1ec
RLBA-2022:3871
new packages: xorg-x11-drivers
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drivers.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drivers-2021-4.el9.x86_64.rpm
e0a3ff613e8309715716f2261744aa40c5973f4a4a84a418b480ed582007ec20
RLBA-2022:3872
new packages: xorg-x11-drv-libinput
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-drv-libinput.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-drv-libinput-1.0.1-3.el9.x86_64.rpm
252b9e40118afa28a3aa656ba49b4d4b12b779d8157bf197f972961049a6bb2a
RLBA-2022:3873
new packages: xorg-x11-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm
99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd
xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm
8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f
xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm
3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2
xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm
6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001
xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm
09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90
xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm
d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445
xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm
431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6
xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm
6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b
xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm
6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039
xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm
f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c
xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm
e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d
xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm
0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434
xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm
51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4
xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm
982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669
xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm
f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d
xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm
a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec
RLBA-2022:3874
new packages: xorg-x11-proto-devel
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-proto-devel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-proto-devel-2021.4-2.el9.noarch.rpm
e56a232af57e20bdbd4162651917e116c8da4597fc25035aedaaa7cf6e721c59
RLBA-2022:3875
new packages: xorg-x11-server-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-server-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-utils-7.7-44.el9.x86_64.rpm
db9a2ea42ce248925cf537a9b827e5f41a1e59d28d6774af93d424fe25db6db5
RLBA-2022:3876
new packages: xorg-x11-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-utils-7.5-40.el9.x86_64.rpm
9e17b1311d933e8707be20c92eaa9a7b40e9985ddc65b8f6d5e485dd3df85076
RLBA-2022:3879
new packages: xorg-x11-xinit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-xinit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-xinit-1.4.0-11.el9.x86_64.rpm
e025062361419edb3fdc3ededcfce87d01c4c740aa9a138ca3164717c43c56b1
xorg-x11-xinit-session-1.4.0-11.el9.x86_64.rpm
eb377dbec0a1e63e4a6cbe417785d4f7aff36186d18ec4ff72c546d7c120465a
RLBA-2022:3877
new packages: xorg-x11-xauth
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-xauth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-xauth-1.1-10.el9.x86_64.rpm
55a6b4a89e861e6f9adeecb6a2734bf346068c8c081d7b815f801559ab22b44e
RLBA-2022:3878
new packages: xorg-x11-xbitmaps
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-xbitmaps.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-xbitmaps-1.1.1-23.el9.noarch.rpm
333aaeff4f242c1f5cd6756eda241eccb999eefe2dc4ca97bc31bd52832b7648
RLBA-2022:3880
new packages: xrestop
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xrestop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xrestop-0.4-29.el9.x86_64.rpm
9d65be001dbababe8c1771d2bd42e69e4692689fa3b55a0d419495e401ab12ba
RLBA-2022:3881
new packages: xsane
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xsane.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xsane-0.999-42.el9.x86_64.rpm
bdf6d4a867f9479c26e9ca8a2e73b50cc9a35f197dbef2f7bed3f57095796462
xsane-common-0.999-42.el9.x86_64.rpm
33d0392d8b5f4ac9b982f2f634e2a70d68443a76698e2845edce6f5b28c80796
RLBA-2022:3882
new packages: xz-java
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xz-java.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xz-java-1.8-14.el9.noarch.rpm
dbcf68720ed7133daf5db12c3c8f1efc1601bfd337ead77297c70aaf25a999d0
RLBA-2022:3883
new packages: yelp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
yelp-40.3-2.el9.x86_64.rpm
e5ba9b0bb5f9d48b88be39e35811908daf2dd823e652d926ee8ab9235c3a7db2
yelp-libs-40.3-2.el9.i686.rpm
59189b36defd21cb4552570c7febdbe994282635eaed98fdad4e15c99131aaa3
yelp-libs-40.3-2.el9.x86_64.rpm
53b2396f3745a5f3e9321574d4753db9b9f6d78f42ecb648309741408acc4b27
RLBA-2022:3884
new packages: yelp-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yelp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
yelp-tools-40.0-3.el9.noarch.rpm
b4904b00d20709705969d6aff3fdfb43537b24354c5511cb19ee177fc5b5bc18
RLBA-2022:3885
new packages: yelp-xsl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yelp-xsl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
yelp-xsl-40.2-1.el9.noarch.rpm
377dd62e39485f2ef7064baf2074f9a5bec76a84df8969ad22bf77632b964665
RLBA-2022:3892
new packages: ipvsadm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipvsadm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipvsadm-1.31-6.el9.x86_64.rpm
82ffa43a89992c6db273657d1ab294b5b4236b23e46637f52d77e4dd0377bb75
RLBA-2022:3886
new packages: zaf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zaf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyphen-af-0-0.25.20080714svn.el9.noarch.rpm
6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c
hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm
04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603
RLBA-2022:3924
new packages: libsepol
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsepol-devel-3.3-2.el9.i686.rpm
577b40db2c564022daa7923a023c66536f538a0a2e4197da6a7100affeebed85
libsepol-devel-3.3-2.el9.x86_64.rpm
15e7cbdb5e18f9ecb6f4ea67e6c1f50d7f60d792ac2aa853b215966eb36919fc
RLBA-2022:4006
new packages: lksctp-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lksctp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lksctp-tools-devel-1.0.19-1.el9.i686.rpm
bbad1f38ae16ba9f300d75717f1849c0d2228ebd3c32f3a584e626612c7171eb
lksctp-tools-devel-1.0.19-1.el9.x86_64.rpm
bc7349d2cc90e0d56629d3a37583b7417df5b36244d241fbec309c973eb2b1ae
lksctp-tools-doc-1.0.19-1.el9.x86_64.rpm
9bc4f3a52fab5c8d8237034191960ff645f08d1b07422f67a6ea63ffea36666c
RLBA-2022:4043
new packages: e2fsprogs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for e2fsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
e2fsprogs-devel-1.46.5-2.el9.i686.rpm
5924b4aa0a7d3314b0434c10a732af5db5e26d064969bc6e6b63cc7bf1207656
e2fsprogs-devel-1.46.5-2.el9.x86_64.rpm
1a26ce2407c4a01723257909ba91a852fe0ab99c365e0a8f646387a2e03d2600
libcom_err-devel-1.46.5-2.el9.i686.rpm
dbf151414532438ea0a23466a54e1268dedabae1425d328426e2d2a52e31275c
libcom_err-devel-1.46.5-2.el9.x86_64.rpm
74336c77500b3d509bc4261ccfd0587f5effe82ea84f8d203733e6402665107f
RLBA-2022:4070
new packages: dracut
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dracut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dracut-caps-055-45.git20220404.el9.x86_64.rpm
e550c033d067ef181d538c0ea5e811f2bba566adfa012b352fca14463ab8836b
dracut-live-055-45.git20220404.el9.x86_64.rpm
1964f85b810607f0e2b9a377e6d4046bbe668889ad2a52f41ae760743c3ddb33
RLBA-2022:4119
new packages: file
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-file-magic-5.39-8.el9.noarch.rpm
438f21f96e7e14f365119f6f3c39ecf146d2c6ce5b1a6174d68f3dbbac63e495
RLBA-2022:4172
new packages: libnl3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnl3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnl3-devel-3.5.0-10.el9.i686.rpm
90d977e14dee91b42a37eab8ead88ef0f353e028461fafcc707b71017cb6a892
libnl3-devel-3.5.0-10.el9.x86_64.rpm
48e23d8018d31086a6af90557e4635a7f0906b0c2597b2a32cf5744ac11e6e71
RLBA-2022:4571
new packages: inkscape-flatpak module
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsigc++20, gc, poppler, inkscape, poppler-data, python-scour, libwpd, librevenge, libwpg, pangomm, python-lxml, potrace, gtkmm30, double-conversion, gtkspell3, python-appdirs, numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
double-conversion-3.1.5-6.el9.x86_64.rpm
1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977
gc-8.0.4-7.el9.x86_64.rpm
d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d
gtkmm30-3.24.5-1.el9.x86_64.rpm
2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a
inkscape-1.1.1-6.el9.x86_64.rpm
f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171
inkscape-docs-1.1.1-6.el9.x86_64.rpm
084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4
inkscape-view-1.1.1-6.el9.x86_64.rpm
75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4
librevenge-0.0.4-22.el9.x86_64.rpm
08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007
libsigc++20-2.10.7-2.el9.x86_64.rpm
7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb
libwpd-0.10.3-10.el9.x86_64.rpm
4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215
libwpg-0.3.3-8.el9.x86_64.rpm
e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562
pangomm-2.46.1-1.el9.x86_64.rpm
4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376
poppler-21.01.0-12.el9.x86_64.rpm
18fd7f5209755b145d523d305f900ca11a393c35b711da5902fc85db39bdfe5a
poppler-cpp-21.01.0-12.el9.x86_64.rpm
52c26fb209ef63a62e8399641fce4f8f87f4662d1290a173120417c1f191726d
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
poppler-glib-21.01.0-12.el9.x86_64.rpm
06cf367d138624fc9f15d7803f9cda28e823aa7575f56971f01dc4b9b5677c39
poppler-utils-21.01.0-12.el9.x86_64.rpm
2be4571777d7925f19631c21d087639486260267a0d7bcaa500d49a44a5579ea
potrace-1.16-7.el9.x86_64.rpm
85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802
python3-appdirs-1.4.4-4.el9.noarch.rpm
0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102
python3-lxml-4.6.5-2.el9.x86_64.rpm
4653357b461c3b84a3a99489f8a12c3ab9fefba525cc5c5124b5dabb555b0f6e
python3-numpy-1.20.1-5.el9.x86_64.rpm
634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d
python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm
939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6
python3-scour-0.38.1-5.el9.noarch.rpm
442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b
RLBA-2022:4572
new packages: firefox:flatpak
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:4573
new packages: thunderbird:flatpak
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:4579
net-snmp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* snmp within the container doesn't work well (BZ#2075537)
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-7.el9_0.1.x86_64.rpm
45c7fdf8bf7ac6873f0836dd4b5b9359ad1426f8e0b7c2dc50db7b4b24c5e77c
net-snmp-agent-libs-5.9.1-7.el9_0.1.i686.rpm
34386bc8151023ac08fed088cae847fbcdf6c225b30a0be60ecc837cd66ff27d
net-snmp-agent-libs-5.9.1-7.el9_0.1.x86_64.rpm
5c34051105cfeadcc20cd1b0ee7a657ad7964a91a7d4d6e4bb023aacce2a7173
net-snmp-devel-5.9.1-7.el9_0.1.i686.rpm
e9b29003e4aa7b52ebf51da7323935394bd2d3c96ac4d1bc8109e59ae0eefe4a
net-snmp-devel-5.9.1-7.el9_0.1.x86_64.rpm
68cbf14158d98027adc73958b26b40b5e19d4e11d077c8822baf6a0f5c984462
net-snmp-libs-5.9.1-7.el9_0.1.i686.rpm
112c41409b7cfd1bd61ed78e827fe263dd12b507c97126b6be17478ddd96a32b
net-snmp-libs-5.9.1-7.el9_0.1.x86_64.rpm
30715b3db6c7797ede2f3014db8a4b367d64ff5176173d6fd752b2dae9351d0c
net-snmp-perl-5.9.1-7.el9_0.1.x86_64.rpm
da1af97bfa7c44f028e4b574657a69d62143d9fecc996c76911ff79bf7d98b99
net-snmp-utils-5.9.1-7.el9_0.1.x86_64.rpm
63c6fec11b84ca7b9bc0dc713db458663a9f44fd91f6b12dfe4581fc4fc66d1a
python3-net-snmp-5.9.1-7.el9_0.1.x86_64.rpm
0f91007d6139d5d60efabc69cfa31f1b78b9f5188ec70235502c5609524ac0b5
RLBA-2022:4580
sscg bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sscg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sscg utility helps to create more secure "self-signed" certificates. These certificates are generated to create a CA certificate that can be safely imported into a client machine to trust the service certificate without the need to set up a full PKI environment and expose the machine to a risk of false signatures from the service certificate.
Bug Fix(es) and Enhancement(s):
* --subject-alt-name IP:127.0.0.1/255.255.255.255 causes "ERROR: Cannot allocate memory" (BZ#2075546)
rocky-linux-9-x86-64-appstream-rpms
sscg-3.0.0-5.el9.x86_64.rpm
ce4a3a03d7c5c9445cc07c4df208eccbbfdafe08cccd2fd0c01a3b6b84150e7c
sscg-3.0.0-5.el9_0.x86_64.rpm
7b4c82d678abdc622d3eb4a68afdbb86f6318ebea6b006ec372d36ac21fc7e3b
RLSA-2022:4591
Important: subversion security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for subversion.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.
Security Fix(es):
* subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_dav_svn-1.14.1-5.el9_0.x86_64.rpm
284783052a3cc8b203e48ef7b30d097a089aa4e9e3517867d980cc4af9185d95
python3-subversion-1.14.1-5.el9_0.x86_64.rpm
bdd3d7d716e8912a6bda4ff45a20595dfead59bb9a503323970432ee10025def
subversion-1.14.1-5.el9_0.x86_64.rpm
920e01a52d9d3241348dddd189b8c064fbb1904372a7de24297941f5e0faba90
subversion-devel-1.14.1-5.el9_0.x86_64.rpm
be9df5a5d97a38e28f04aa7f7cb2e8bd0a3b3c5c6b7093ecfe38161a58b05713
subversion-gnome-1.14.1-5.el9_0.x86_64.rpm
4ac73805e5878513498c749f56520f45cb221591a8025ed399b3f9af3ac3c82f
subversion-libs-1.14.1-5.el9_0.x86_64.rpm
08bad3deed67586ceb777fd9db6373e6980f86e5caebfc38a5caddc2ab072f87
subversion-perl-1.14.1-5.el9_0.x86_64.rpm
0d47c4aa3fb6d27e11dc98dcda2e992f68c0f3ad3137a62ca4ae96ac449023b1
subversion-tools-1.14.1-5.el9_0.x86_64.rpm
9544a761081529ab2f38bba30f7b5add42d12d5a558d5277242d23ca259a5762
RLSA-2022:4771
Important: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.7-1.el9_0.x86_64.rpm
cc8c60ee1801752b701ac7b8ccfcefbfc7d556cf531c70d1b5cbef8fb6a9cf7e
postgresql-contrib-13.7-1.el9_0.x86_64.rpm
5da2535f20a24e3aa76cd23d139722af277440d92ab16266fc0a1e1cfa3c0086
postgresql-plperl-13.7-1.el9_0.x86_64.rpm
66f4a43340e555b56624a754a47f83b968d6025e56c513abe18acae3997a1fbf
postgresql-plpython3-13.7-1.el9_0.x86_64.rpm
d13138960d9a5b1063f1d74655037d1a0fc3cf15b2dad83cb8b857205bcf8465
postgresql-pltcl-13.7-1.el9_0.x86_64.rpm
a6a5d9d7647f5a0f2ddb2d476adbc0f15dab9be5fb207b7363d8237b47710d50
postgresql-private-libs-13.7-1.el9_0.x86_64.rpm
31ef0736ba0c5d7049117680753c6d4c5a49890680a61a7c6650cb16421bfaf7
postgresql-server-13.7-1.el9_0.x86_64.rpm
282c46ff5e02769a6cfecd69db0f25bc8c999b9559f4780091f1c52c7f619491
postgresql-upgrade-13.7-1.el9_0.x86_64.rpm
ea4e6ef1216bc8c55ad4d8ff40e544458f559496f6c8eab28006619e8ef8b3c8
RLSA-2022:4899
Important: compat-openssl11 security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for compat-openssl11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl11 provides the legacy 1.1 version of OpenSSL for use with older binaries.
Security Fix(es):
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* compat-openssl11 breaks in FIPS (BZ#2091968)
rocky-linux-9-x86-64-appstream-rpms
compat-openssl11-1.1.1k-4.el9_0.i686.rpm
c0b8d921fc2ca35ae55d999ff21db099bc2810230f856ab8cc7d6ed2c98fdb6c
compat-openssl11-1.1.1k-4.el9_0.x86_64.rpm
3929a00e792a462066fa54dfa79e84500fa5e2f1569605c89e73471e88514850
RLSA-2022:5257
Moderate: libinput security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libinput.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices.
Security Fix(es):
* libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libinput-1.19.3-2.el9_0.i686.rpm
e9d68adfae00cf791a9ed850ff4ad2e501ae96ed69ac9cc25df32c435d050c33
libinput-1.19.3-2.el9_0.x86_64.rpm
7a98c935e19a670d1c6d2463b419d3bf4e57fcf7bd13e74eaaac91feff0877ef
libinput-utils-1.19.3-2.el9_0.x86_64.rpm
57d33785e1d06dd26e6b42a6efa99b0fb5d7977a14bcf8ece045c4c938aca0ad
RLBA-2022:5260
fence-agents bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* fence_apc, fence_ilo_moonshot, fence_lpar: missing "import logging" (Rocky Linux9) (BZ#2086839)
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-20.el9_0.2.noarch.rpm
9f2dae8de9cb289e1aac1ed2713b143a6993bf0dceb196ee7c298985427d63af
fence-agents-compute-4.10.0-20.el9_0.2.x86_64.rpm
d610d569299678b14b854e2f9b5b9b75f9ff47d0cbe698ef0d0f0355e6b5a851
fence-agents-ibm-powervs-4.10.0-20.el9_0.2.noarch.rpm
23231bfdc495e434490994b30a93bef88d018a7fca39fc0a5ce5b2de7ad30123
fence-agents-ibm-vpc-4.10.0-20.el9_0.2.noarch.rpm
b27314a3760b4d6d7403f4b2b1933ef63b9bc5e6be444c126cb302327767a460
fence-agents-kubevirt-4.10.0-20.el9_0.2.x86_64.rpm
44dd7bba7c13491d3afcefd5ba62692c563088f60b4b2813d0e9ce151a0122dd
fence-agents-virsh-4.10.0-20.el9_0.2.noarch.rpm
fdbf5d9846829d59f5f91f4e0171526c4a86794749a36e442f02e905eb2f4b70
fence-virt-4.10.0-20.el9_0.2.x86_64.rpm
6fbadb5ed15fdd63904dbcaa1ad9dbb6ea7b7bd20ce14dcc0fedde6312ed4f91
fence-virtd-4.10.0-20.el9_0.2.x86_64.rpm
d234a8aa56497fde8967f1f487e00e38ace2a6c4d1d0bf0640599454400ad0c9
fence-virtd-cpg-4.10.0-20.el9_0.2.x86_64.rpm
f68eb3b27a7402a474e57c6f1de41dff4da1cd7e4bef3e7562111d59e6d0dd74
fence-virtd-libvirt-4.10.0-20.el9_0.2.x86_64.rpm
06aaf7c3a8a8f3372784a332876288d76cbe24b6a25e9914bc7fdfeaefacba98
fence-virtd-multicast-4.10.0-20.el9_0.2.x86_64.rpm
4837560ebd1b7a73f1c86c7aa0664f8880eaaca12b0259eab9d36ef2aa5625c6
fence-virtd-serial-4.10.0-20.el9_0.2.x86_64.rpm
7e8736db577efbbfa25a451802705fecca2c889fca53cae9255206dd2f735a43
fence-virtd-tcp-4.10.0-20.el9_0.2.x86_64.rpm
4b27839d245ba1a6d526a365c917e016db404b9fc6dabdf5fd797ebab84ecbcb
ha-openstack-support-4.10.0-20.el9_0.2.x86_64.rpm
af708364b7df2d800fab4b61528473a2858ca6846275f463d82c76b3077f6e22
RLSA-2022:5948
Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql-selinux, mariadb, galera.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5).
Security Fix(es):
* mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669)
* mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048)
* mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050)
* mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051)
* mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052)
* mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376)
* mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377)
* mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378)
* mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379)
* mariadb: server crash at my_decimal::operator= (CVE-2022-27380)
* mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381)
* mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382)
* mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383)
* mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384)
* mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386)
* mariadb: assertion failures in decimal_bin_size (CVE-2022-27387)
* mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444)
* mariadb: assertion failure in compare_order_elements (CVE-2022-27445)
* mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447)
* mariadb: crash in multi-update and implicit grouping (CVE-2022-27448)
* mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449)
* mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451)
* mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452)
* mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455)
* mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456)
* mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457)
* mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622)
* mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623)
* mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659)
* mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661)
* mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663)
* mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664)
* mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665)
* mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
galera-26.4.11-1.el9_0.x86_64.rpm
be8e0004017ead821c09dd4d96caa34af82dadecb520f290aaad6030ea35ed66
mariadb-10.5.16-2.el9_0.x86_64.rpm
8834aa6d622ab64a22234e2f045f22f6e0330ea957550901150a3a4d60d3ac0d
mariadb-backup-10.5.16-2.el9_0.x86_64.rpm
8e553970a520e0e779c66b51f56e088434b1796059e3dc57a148de1fb4593e22
mariadb-common-10.5.16-2.el9_0.x86_64.rpm
f774514657c4fbd6987f0d341529950e4a23fa7371a63e30c94a3c9dbfb96948
mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm
d03f1b8eaae455a6da4af82164282edbe47fc5eb5cb59df882dd434703bacc87
mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm
017756d95c87df2b4e987df03be570c1f2e73aa5c7720e50e245975d2a08fc4a
mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm
5fa9f2e2b8b96dc639b869f8f1381ce0e6b1af0aa4d716e4c716c827ec0e141a
mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm
6c4342de09226eb2d9376f7fb3100b461bac03369ad84af3f3a625e5d495fd0d
mariadb-pam-10.5.16-2.el9_0.x86_64.rpm
8a60b6f0162c1783e20718ad949a7e4ada40220ba5e02080420cc25ebeb7ea73
mariadb-server-10.5.16-2.el9_0.x86_64.rpm
89f0325781e8f4a360f37828d38d41d35afa7e413fee01356a064f6b98128a1a
mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm
2de215b7a47169ee0b6bec71ffdbcbf8d9f91fbc2c1f1b58f1ee31660a4af634
mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm
7b98204667205e2108a8c93ef2893f53922e9e2ad9b639703ed35e8979ac0de9
mysql-selinux-1.0.5-1.el9_0.noarch.rpm
3eb39d87c5a04055a947b1bc7800521d9dcc6b405189e53201e3f79716a680d7
RLBA-2022:5954
fuse-overlayfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a
fully functional file system in a user-space program.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - fuse-overlayfs (BZ#2111736)
rocky-linux-9-x86-64-appstream-rpms
fuse-overlayfs-1.9-1.el9.x86_64.rpm
a1fd525022c9dd098f6fd4a6f8b0992a1703a09edc150e860b2f68b88ce89898
fuse-overlayfs-1.9-1.el9_0.x86_64.rpm
0fc694e7a8a1d452449d730ec4573bb96e8e5be99a98e8ee09e65dee164952e0
RLBA-2022:5961
slirp4netns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slirp4netns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The slirp4netns package provides slirp for network namespaces.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - slirp4netns (BZ#2111627)
rocky-linux-9-x86-64-appstream-rpms
slirp4netns-1.2.0-2.el9.x86_64.rpm
e3cacad672f5369a5f1a759d15a5e5e3fc8b511d51d3f720276a8a01ec867a06
slirp4netns-1.2.0-2.el9_0.x86_64.rpm
e22ca6482a3026204f0857880b187459d2773a4e594121c73191bd3706cb4697
RLBA-2022:5962
yajl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yajl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator.
* Regular rebuild for 9.0.0.2 (QR) - yajl (BZ#2111628)
rocky-linux-9-x86-64-appstream-rpms
yajl-2.1.0-21.el9.i686.rpm
586f257769f8fdaa8dc113a960fa9d4e4f6fdefd8b8464e48d9527d035b23661
yajl-2.1.0-21.el9_0.i686.rpm
ce5e6ace7e1ca65f6ddd67e4a4a7e109206a5c2d557c646613e0cb8d2adcfc0a
yajl-2.1.0-21.el9.x86_64.rpm
98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de
yajl-2.1.0-21.el9_0.x86_64.rpm
0a66ac8a71ba35e7087fdea5f7fcab8fefbe6d5b4e0a3e3442d37c0066f5cadc
RLBA-2022:5967
firefox:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the firefox Flatpak container - they
will not pushed to any public yum repository, but rather to a special Hidden
compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:5968
thunderbird:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the thunderbird Flatpak container -
they will not pushed to any public yum repository, but rather to a special
Hidden compose. (Doing this keeps signing and other operations consistent with
the main Rocky Linux packages.)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:6412
thunderbird:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the thunderbird Flatpak container -
they will not pushed to any public yum repository, but rather to a special
Hidden compose. (Doing this keeps signing and other operations consistent with
the main Rocky Linux packages.)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:6413
firefox:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the firefox Flatpak container - they
will not pushed to any public yum repository, but rather to a special Hidden
compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLSA-2022:6585
Moderate: ruby security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109428)
Security Fix(es):
* Ruby: Double free in Regexp compilation (CVE-2022-28738)
* Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ruby-3.0.4-160.el9_0.i686.rpm
309bf5ce4950e616142bb32a937c55fe01e9cb03b9bb90664515d61e467f74bd
ruby-3.0.4-160.el9_0.x86_64.rpm
c004947f654a9e14bfeb4bbbc8dc995a5d2aa02bf0b7df2b10e3b928c5a99cda
ruby-default-gems-3.0.4-160.el9_0.noarch.rpm
417fbed7251159f0c663d144e00efda40a10ed58e82fb15348675603e5d3f76e
ruby-devel-3.0.4-160.el9_0.i686.rpm
5a82c5ee3063dd7cfbf7295bbd009e1313723710f41e584eb0e77218d26ec13f
ruby-devel-3.0.4-160.el9_0.x86_64.rpm
d0aca8f7fbf058dd93ca5abd6a3480d698059debed59de5e67c314903bfb02b1
rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm
312bf6ec219a724f2322c862f94a70fceb30fff2c5f909a8a775ebde38910e6b
rubygem-bundler-2.2.33-160.el9_0.noarch.rpm
961b326e76e4d965a937c69699ea3c746822a7f78ef4fcbceb82e8377194078d
rubygem-io-console-0.5.7-160.el9_0.x86_64.rpm
0012db91bed5ed85a142852865b46b5665ac04bebe7e9353cde93ea50dbb4615
rubygem-irb-1.3.5-160.el9_0.noarch.rpm
b382b053e851e49aa1a8940882982ccde6e67ac6e658ed584d808dd3519e6a0e
rubygem-json-2.5.1-160.el9_0.x86_64.rpm
af2d66b886802a445b7d9e55df02e1d25e1ffcc3bab5b7453ececf83347e6195
rubygem-minitest-5.14.2-160.el9_0.noarch.rpm
9edc861cdbc1c57d0084f7cb0ec96b525d4a68ce38154f77dc87c9838f8a7014
rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm
0c07d363626565436743174ff2662f3579fedaf8047b39773c47bab2b29350cb
rubygem-psych-3.3.2-160.el9_0.x86_64.rpm
e0352cd0060859774db7dee8dac70d26c45513b6ddd759f27d7780a7fa396a56
rubygem-rake-13.0.3-160.el9_0.noarch.rpm
ead12b3501cd16da88627055dea6f2527c7a73b7fd7f608fd1a8f608cca2cf5a
rubygem-rbs-1.4.0-160.el9_0.noarch.rpm
751fd61ca2d202eaf1e53f8f362ccd81696b30c71f62c0fc63b136d32d157c0f
rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm
cb911a8b5a58673e057994ff8a0231e9b98560f7b8ba7fa6166f78a0051a4226
rubygem-rexml-3.2.5-160.el9_0.noarch.rpm
155b434f4d5caf04d27176b14492f93da49c7bb212ba11169a9ebe4acde4ec99
rubygem-rss-0.2.9-160.el9_0.noarch.rpm
e669e336ccd53007907207d2996a90207e20d27b6d03dc9021ac30d1c5b732b9
rubygems-3.2.33-160.el9_0.noarch.rpm
6ab3fd3762a955392e8ae03e3b24931a40a9af1bae49feeac465fe2388926505
rubygems-devel-3.2.33-160.el9_0.noarch.rpm
a1ff8e3c133a6a59e1b3b0662178daf34654f28d8ad2030d82c9ba1f07181629
rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm
ce9678bd8941dc0da4ce6aa93f3a1d71dc7c807f0fd2b050e8558afa7491091a
rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm
de1ce9f8adda61375fa95fa9afbc770753793462652f973e9abb4e9f0bb26e1b
ruby-libs-3.0.4-160.el9_0.i686.rpm
fc75dc05a7b4a3a83be134513e716395c68e0324a0b4301812cac32d4a6cadeb
ruby-libs-3.0.4-160.el9_0.x86_64.rpm
e8ba2cfcb7fd136051a9833ef1ea15d6db43d8449af9d71e14ffbd315297bb14
RLBA-2022:6588
python-ldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-ldap packages provide an object-oriented API for working with LDAP within Python programs. It allows access to LDAP directory servers by using the OpenLDAP 2.x libraries, and contains modules for other LDAP-related tasks (including processing LDIF, LDAPURLs, LDAPv3 schema, etc.).
Bug Fix(es) and Enhancement(s):
* python-ldap FTBFS in Rocky Linux-9.1 (BZ#2121547)
rocky-linux-9-x86-64-appstream-rpms
python3-ldap-3.3.1-9.el9.x86_64.rpm
ef62df4cbc90c0b91f31d6fdd84c43bacc46109bc5e5a7867d49c178be3ae58e
python3-ldap-3.3.1-9.el9_0.x86_64.rpm
202b9bd4a849116161ed5ddd2828ea48f99b1570b3123b146c4dc531bfac6771
RLSA-2022:6590
Moderate: mysql security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589)
Security Fix(es):
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479)
* mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413)
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415)
* mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423)
* mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444)
* mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427)
* mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455)
* mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457)
* mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460)
* mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569)
* mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515)
* mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539)
* mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534)
* mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547)
* mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Default logrotate set to wrong log file (BZ#2122592)
rocky-linux-9-x86-64-appstream-rpms
mysql-8.0.30-3.el9_0.x86_64.rpm
788dbc7c20a543535495e7932dd6ef3903bfa80bbd01d121708d28de5f8e77db
mysql-common-8.0.30-3.el9_0.x86_64.rpm
dbcf38131e3e767e49a6fa62a2e05acad826349edd20bf9964a55b947095a188
mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm
dc7607b13722bf8d3668ed1eb65bfb756cfb555766b2d02d36c7621828b76327
mysql-server-8.0.30-3.el9_0.x86_64.rpm
1cefbd31947ab359487aaafda25b0b4a0cccbee5e27de0c7260203e409d6553f
RLEA-2022:6596
nss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.79 for Firefox 103 ESR. (BZ#2093488)
* certmonger startup very slow using default NSS sqlite database backend. (BZ#2097896)
* Allow signature verification using RSA keys <2k in FIPS mode. (BZ#2099438)
* Need to be able to run self-tests at will programmatically. (BZ#2100504)
rocky-linux-9-x86-64-appstream-rpms
nspr-4.34.0-14.el9_0.i686.rpm
da9a89afde13756e2fa42ea0bab3d093c22fd9876a5893ca31e650a89752968f
nspr-4.34.0-14.el9_0.x86_64.rpm
420eb3521b65392eacfb871ce838bdbcd7abddf16d2dc2a58ee7c0f5625cc7e1
nspr-devel-4.34.0-14.el9_0.i686.rpm
ab80e1ad5cc669d533630ccc383a8294f32e8b7382bdd2216956507df5e3bd56
nspr-devel-4.34.0-14.el9_0.x86_64.rpm
0862ab05808dc63064d54c1ac060738ba6ae1a42aab030a3394c6c446a2e59f0
nss-3.79.0-14.el9_0.i686.rpm
d27ffdd27430c64542d96b1e610fad5a80606714473c1296820b2893d79ec859
nss-3.79.0-14.el9_0.x86_64.rpm
42b04cc7a7a1662a4cca25b21d38d8f04af1f488c1ef262a21a292c7990da641
nss-devel-3.79.0-14.el9_0.i686.rpm
2d2b1d4fdacac3ab446ad6f697a6f07af9fdd34d183473c3130800557330d657
nss-devel-3.79.0-14.el9_0.x86_64.rpm
c282fc485cc583b6f7a13a40a705cf25dca020537e7a1deac53e6e586cdfabbf
nss-softokn-3.79.0-14.el9_0.i686.rpm
aa791bfe4d33fd711224c9937218618259d4b12afbb49e3a1a4811c0d429b026
nss-softokn-3.79.0-14.el9_0.x86_64.rpm
af7e726fe13bbca4eb826fc16ceb0b50c909576189debce00e0f19fcab4e9df8
nss-softokn-devel-3.79.0-14.el9_0.i686.rpm
167888c9b121cd46ad5ced0979b360c5e9d97d36db22bfa51a923e683b86a131
nss-softokn-devel-3.79.0-14.el9_0.x86_64.rpm
7d2ff5aaea4a655c266cc2c1343969ce359f44f915ba202106a8c59d2a7dffcb
nss-softokn-freebl-3.79.0-14.el9_0.i686.rpm
8b9f5be29178cc90e75964f81aebdad4deaa1ceb5c05f83cf24a153022afa505
nss-softokn-freebl-3.79.0-14.el9_0.x86_64.rpm
212cb24c631dc01e03305890dca92b8191e9eb6f04348d0b9ec8eb478e1e7631
nss-softokn-freebl-devel-3.79.0-14.el9_0.i686.rpm
f0741edde112e0b5e8f2a6fe18cef30030b6bd9830834fedd4ffd894b542f48e
nss-softokn-freebl-devel-3.79.0-14.el9_0.x86_64.rpm
82ea250fb6baf67918f68f5f6474d3016575d16ed65730445c168f3a2f37886f
nss-sysinit-3.79.0-14.el9_0.x86_64.rpm
d5a216dd6c8ae27508ea36d8a4142cf63af6662e317f9d7eeb4b00add59c0219
nss-tools-3.79.0-14.el9_0.x86_64.rpm
3b7f30ae8e303cf072ad131464b75a65ba4045164a97da6e8d18010ba8b63082
nss-util-3.79.0-14.el9_0.i686.rpm
b0c1d68163c1901e770c938a9639cc8e5e4990866b1850035265113e8d00fb3b
nss-util-3.79.0-14.el9_0.x86_64.rpm
55720d07d5ed6e98d0951dbcf84f44f01ca6e95c15b11397740f0062eece0f49
nss-util-devel-3.79.0-14.el9_0.i686.rpm
822b6ac4779997da2dd9bc48dc57c80b4e4c889bc055b3fd31ff9d06dd1c62d2
nss-util-devel-3.79.0-14.el9_0.x86_64.rpm
e5f5b4b8d99f7bc9c67dedec95bbe6e91868698e7a46b58043e5ae55793f6168
RLEA-2022:7320
ostree bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es) and Enhancement(s):
* Update ostree to latest upstream version 2022.5 (BZ#2127868)
rocky-linux-9-x86-64-appstream-rpms
ostree-2022.5-1.el9.i686.rpm
23a185b07b0cc39438e7b90bbcce197cefa9f7d1cb3acf46c179a557721dfa7c
ostree-2022.5-1.el9_0.i686.rpm
a8df3ab9797bf59bfad66839a85cf86bf627b071ba419de1b8ed4d9679564d03
ostree-2022.5-1.el9.x86_64.rpm
6af184ec89b61e57aab331e065d125e27d15acefbbeb79275ade48b7d26b48ca
ostree-2022.5-1.el9_0.x86_64.rpm
b766a327ca745a298505cf93577f4da5ce4c864c193aedc6e3c258b23bb476a6
ostree-grub2-2022.5-1.el9.x86_64.rpm
270c8f82d1dc25fe3fa7c2d256e93e9108043a42ef698b2d593426f78330f23e
ostree-grub2-2022.5-1.el9_0.x86_64.rpm
643a59a13a299ba3e67ad56a783c86284f1a0ff80d52157df8f272713711619b
ostree-libs-2022.5-1.el9.i686.rpm
d41157f436cb396a2e666626b3de7701482976c82050e467b872222b5ff6402a
ostree-libs-2022.5-1.el9_0.i686.rpm
b3097ed10ad10fae2c32fe71a51ae6b9e277a6211966c697686dda302a63a7cc
ostree-libs-2022.5-1.el9.x86_64.rpm
01fb60886745eceaf7b7237d433a21a1d7312c974e7528554dbb1ffdadaad3fc
ostree-libs-2022.5-1.el9_0.x86_64.rpm
30303489e69073bdec707e406cc517ccffcf329ebd2e79e046daed8d1a55f161
RLSA-2022:7326
Important: pki-core security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-acme-11.0.6-2.el9_0.noarch.rpm
fcda9a6c19e5f6ca8ee019f4e8ec264a36fab59931ae706f3ef3fea0bda64bbc
pki-base-11.0.6-2.el9_0.noarch.rpm
88c574b2baa4f46d6283f5bd7ae1eb81d57033394a8514080174ed70a0381c07
pki-base-java-11.0.6-2.el9_0.noarch.rpm
3564101e10ab4a5ab4dc345a2717cfc52c698702ad44a63e3c8d891607ab83ab
pki-ca-11.0.6-2.el9_0.noarch.rpm
a3f74d79a6d637b13ce500f51727065c7da0f45b96e3ac78ece75d843e833d91
pki-kra-11.0.6-2.el9_0.noarch.rpm
48a8fc5e0e19c1ad1f04ebbc818032017a96088a9452619e6c4442c9bbe3adc3
pki-server-11.0.6-2.el9_0.noarch.rpm
74aeee726a1c470265240e92a3d1622e22c817d98f20ded8f2ffa75f228858a7
pki-symkey-11.0.6-2.el9_0.x86_64.rpm
d1e36f6c07621d3aaa452c5295383b9bb713097150bc0fea429230ea2e53c631
pki-tools-11.0.6-2.el9_0.x86_64.rpm
dbb384087b8766b36940e35287fc5972b02465c15c64c4b84ad52f25f00adf3b
python3-pki-11.0.6-2.el9_0.noarch.rpm
c1fcc173399228caceac8fd8851e53334dd3c584969b306645ef7c3156421f55
RLBA-2022:7332
thunderbird:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the thunderbird Flatpak container -
they will not pushed to any public yum repository, but rather to a special
Hidden compose. (Doing this keeps signing and other operations consistent with
the main Rocky Linux packages.)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:7331
firefox:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
These packages will be released only via the firefox Flatpak container - they
will not pushed to any public yum repository, but rather to a special Hidden
compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:7942
crun bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crun-1.5-1.el9.x86_64.rpm
0ea5faf2a6000901348226bf0c7b43fd150adced7d926288b0651a4e520ba87f
RLBA-2022:7943
container-selinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
container-selinux-2.189.0-1.el9.noarch.rpm
6c3c4f04523edcab98dc30ca91ddacde4f6cac160e2976b2bc770c5d889c45b2
RLBA-2022:7944
libnbd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnbd-1.12.6-1.el9.i686.rpm
122eb066879f8beea62fbfce2a4e6c01491ac1779e57831c7e2c39f292e89200
libnbd-1.12.6-1.el9.x86_64.rpm
c797f3a57fb7311e0e60838282b8ebcc8d91e4a0c8015c522c95ea21aaecee0a
libnbd-bash-completion-1.12.6-1.el9.noarch.rpm
1c36a11283ecff43fc6ae7ff9784647bed914d387f2ae062a6e198c5241c2677
nbdfuse-1.12.6-1.el9.x86_64.rpm
3984f4dd265d0c20033bc5ccce8b0e1711a0639315ff3ebd670c8d6981a8cdcf
python3-libnbd-1.12.6-1.el9.x86_64.rpm
4b820903a0f067db41ab286e51d3f11fa9fc543040615fa7527188af6bf62557
RLBA-2022:7946
sscg bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sscg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sscg-3.0.0-5.el9.x86_64.rpm
ce4a3a03d7c5c9445cc07c4df208eccbbfdafe08cccd2fd0c01a3b6b84150e7c
sscg-3.0.0-5.el9_0.x86_64.rpm
7b4c82d678abdc622d3eb4a68afdbb86f6318ebea6b006ec372d36ac21fc7e3b
RLBA-2022:7948
libwpe bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwpe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwpe-1.10.0-4.el9.i686.rpm
148fe8974752511b791892e7f9aecbce4a66b3c0405514312da26bc6b3fd37cf
libwpe-1.10.0-4.el9.x86_64.rpm
75a560e5d26af123a6fd333c63b5159eb27fbddd465ea26f45cd301a4df2dc57
RLBA-2022:7947
wpebackend-fdo bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wpebackend-fdo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wpebackend-fdo-1.10.0-3.el9.i686.rpm
58bbefe66f2994db1a7235d7f415e694ef303980c795121911f422c3d2e5c054
wpebackend-fdo-1.10.0-3.el9.x86_64.rpm
e0c19cb6ead5a0c2fd8eefa26f4cf08c7629d8393fc0d9890348a233297cd03d
RLBA-2022:7949
containernetworking-plugins bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
containernetworking-plugins-1.1.1-3.el9.x86_64.rpm
c4a89113a22f34a6a8d057715d35ad681486f6b5314581ba2856413b6616ea3b
RLSA-2022:7950
Low: Image Builder security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for cockpit-composer, weldr-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood.
Security Fix(es):
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-composer-41-1.el9.noarch.rpm
474c2786d84f9c5daf859f72cb567fec479412067bbc9898bf3ee8276480ff5a
weldr-client-35.5-4.el9.x86_64.rpm
add90ad088fdda8b3b19781acdb9f44051795499628f402375e2205ccb860706
osbuild-65-1.el9.rocky.0.1.noarch.rpm
6ad1d9ff002d476db570ed5e98103ab4758452b2cff6c1ce14f18a70d1e42d87
osbuild-luks2-65-1.el9.rocky.0.1.noarch.rpm
f67ba9bb1798347438c4840a2b944f3ffddbc5737db9e942a6ca6492fc3ff0b2
osbuild-lvm2-65-1.el9.rocky.0.1.noarch.rpm
49726b7817a3b9b36ea3b0a39d60e4a7b2dd124db5f5f0f3807620961ad28635
osbuild-ostree-65-1.el9.rocky.0.1.noarch.rpm
7df336df7aa3c26a37e756623668835996c0c2b4e1f98b71fea3f4112d9e7510
osbuild-selinux-65-1.el9.rocky.0.1.noarch.rpm
f7edd2e04c61e103932e4541a833adab4e5c0f7eeadc2aaa6978305510ea16d2
python3-osbuild-65-1.el9.rocky.0.1.noarch.rpm
04f0065dd32a7e525a96d11c40dae06fcfc32ede99e94e3486018f994c6af550
RLBA-2022:7951
pipewire bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pipewire-0.3.47-2.el9.i686.rpm
5959f4c9795565db471cb48285baa8cedb1523edb0a49a85fc24e5e0f9fdf932
pipewire-0.3.47-2.el9_0.i686.rpm
78f3a5e519b4ee96d863d9ba4b3565365f617ad5583e131ce7d5dbbf8184644f
pipewire-0.3.47-2.el9.x86_64.rpm
3de3a83596a47b935d33bdc0bd66090295b02239b0cb1bea4cccf3958d3f6df8
pipewire-0.3.47-2.el9_0.x86_64.rpm
adf65844a10a8cea61e41ffda9df8213438e43cfab3df9668ca83d20580c51f2
pipewire-alsa-0.3.47-2.el9.i686.rpm
306f3e302d86f97336fc3ce58c941c65156c20afc2df2053945494a6dea290ca
pipewire-alsa-0.3.47-2.el9_0.i686.rpm
4bf5b7445820ea10cecdfdf0b54fb134936c73772133613d794f666c13e01fa7
pipewire-alsa-0.3.47-2.el9.x86_64.rpm
fe6b1e032263d0d7c4aaaec9eeb4913b24d03794de30f40bf88e6d2d8e443f47
pipewire-alsa-0.3.47-2.el9_0.x86_64.rpm
c51a21f9b6e1e029bdf7ac320e6f1e7dee4dd8aa3287a29571962df9f92f0770
pipewire-devel-0.3.47-2.el9.i686.rpm
803c0900add1cc0bdf16964d4d42a74ca9bfe1db88ba897741640618b4a30768
pipewire-devel-0.3.47-2.el9_0.i686.rpm
e224d8da11ca73f586698bd63ce6cdf51412b31e935ec0734c6035163e0b9415
pipewire-devel-0.3.47-2.el9.x86_64.rpm
1b80dbba8c30cde1f574587f158a11c50815b699cbb59ec19d25b6ae34d4c781
pipewire-devel-0.3.47-2.el9_0.x86_64.rpm
8c13bff2248b69fbfadaab52829244107b7dccd5ea1ac878b3d96632d11de85c
pipewire-gstreamer-0.3.47-2.el9.i686.rpm
176368d405004d1be22432a1fdd2c7856c6ac42c82d4d41646f91189c4ea16c5
pipewire-gstreamer-0.3.47-2.el9_0.i686.rpm
0fad63f51b9846aabb50705d83f295dc776c11df4e81f8f54fe6c9ef23e8db29
pipewire-gstreamer-0.3.47-2.el9.x86_64.rpm
07019486ea9968f3fcfa2436370b1065673c510f872285a5d6363cab5d9e0160
pipewire-gstreamer-0.3.47-2.el9_0.x86_64.rpm
1394fd3d4b854330d3d13858ea7b3040782eb85ae0d27fdba6a9bbbd74dd26ae
pipewire-jack-audio-connection-kit-0.3.47-2.el9.i686.rpm
92c3f5ab981bc430c21102c2ff04f0dba8e8f06a3b17b899768ba6eb6b804e82
pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.i686.rpm
609b64b11edebb55cd83728158ac3baaee0e78d7b04bbbbb673f8ce6ef4534c3
pipewire-jack-audio-connection-kit-0.3.47-2.el9.x86_64.rpm
aa7ea3528e16a8af6aabf7b4f300548ba25eb56c4a0ca82a9d22603e2eed029f
pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.x86_64.rpm
06b057d2d6ebb8ec1d314dc0bd56eb3108dd839513253fa4942db78963ba81f2
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.i686.rpm
a501d458ae5a43c3c1c1c5a40f98cbf7d74e20b31928b158dadba80ad838ad0c
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.i686.rpm
5b392954b71927ebb460970806535bd9859a38ebbd6ced14b1f510518e3fc912
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.x86_64.rpm
6bc6089139b156c5afa64891e6395fbf7a4d84fbb835569093ea6908e699b43c
pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.x86_64.rpm
6dd8353c6bc29febe1ebdf348a02751a0268bb48a8cf687184584f42a23ba04d
pipewire-libs-0.3.47-2.el9.i686.rpm
6dff526d939f72cc31545a2d83142787f555fcb7f29805160d2b16d19e7fca5a
pipewire-libs-0.3.47-2.el9_0.i686.rpm
21eeb0d2776d467205bc323e3e116a0316e53aee99e57cc12cd28be957afd1e9
pipewire-libs-0.3.47-2.el9.x86_64.rpm
0c2d96713249488829737d7107396fdc566f87031931ed105623bcadd44cbcef
pipewire-libs-0.3.47-2.el9_0.x86_64.rpm
556c112b74be8c56f77fd31da9fdf43a34544e973313022a4cc0e7bda37e3971
pipewire-pulseaudio-0.3.47-2.el9.x86_64.rpm
7415b8fde19ea9bb78959a7fcc30e945f07bbd05643a56efe60138c7a86ab00f
pipewire-pulseaudio-0.3.47-2.el9_0.x86_64.rpm
9ff68cf2fa5df1a951bc282d64e3c48b62e0e24bd1e88bfdd6e869e1294c5b0b
pipewire-utils-0.3.47-2.el9.x86_64.rpm
01de374851cb6f1989858bfba16cf220b38141da9da1e4cf9c4d54e4bdba65ee
pipewire-utils-0.3.47-2.el9_0.x86_64.rpm
f629232bebeccb0f15c7d5353ef38d878f91d8debcbc2debf589360e6236e412
RLBA-2022:7952
flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-1.12.7-2.el9.x86_64.rpm
8bb0cec4c0557901023742c40ef0c2759e31a3948c2d8fbb7d2c78c6076c6fb1
flatpak-libs-1.12.7-2.el9.i686.rpm
400a47774e5bf05e13cb57bf8ec25c5a96c3860ff3e0f94c8c830c0997539353
flatpak-libs-1.12.7-2.el9.x86_64.rpm
ffb35c77faa2108d5bd36da28cd094205828a09b7f97f5ec87cacf4f8575cc3f
flatpak-selinux-1.12.7-2.el9.noarch.rpm
d11d7884a5d313ba78025a47abe3920c5cdcbcddc4bf365e08e9c3e7617ee7f2
flatpak-session-helper-1.12.7-2.el9.x86_64.rpm
6223689d6c0a575b81f0403baa9b9714967776c8147d31bafc77e68590ea13dc
RLBA-2022:7953
gdm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdm-40.1-17.el9_1.i686.rpm
b38472c3b3eb6bb6ad967af81a07fdef83cf67f0ecf84d790a3ebdaf303e99db
gdm-40.1-17.el9_1.x86_64.rpm
f34bcddc04f3539adf9b14e6e1239bb4b35711f40cf947aea5d18201d7f9d7aa
RLBA-2022:7957
annobin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
annobin-10.73-3.el9.x86_64.rpm
3cc711ca325a622647f5641213e27f63e6e609d007d85527e2f6b754d8a46cec
annobin-annocheck-10.73-3.el9.i686.rpm
765f28aa449fba12f62ac603258f6cff2e672830a46bfb87d7cb25262ce40549
annobin-annocheck-10.73-3.el9.x86_64.rpm
120f83ad85a941dd7a759c33b694e1e21d635391ff2ebacc6de126bd0549c863
RLSA-2022:7958
Low: libguestfs security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for libguestfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libguestfs packages contain a library used for accessing and modifying virtual machine disk images.
Security Fix(es):
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libguestfs-1.48.4-2.el9.x86_64.rpm
cfd2ef2d65a48b3201767956428cbd561570ff669f152d9c354dfb155a94a6fd
libguestfs-appliance-1.48.4-2.el9.x86_64.rpm
a70c590028d24e9401c4e11e3634acddc6822c87b1019bb3c481a3a8264d10d4
libguestfs-bash-completion-1.48.4-2.el9.noarch.rpm
4578ac679f0112fa5798334cefc33a451d75da55fd2dcb6f8201c66189ce8e7c
libguestfs-inspect-icons-1.48.4-2.el9.noarch.rpm
5167b905bf41ef5abf03a3abbe0781f3ad3c4f38e0d1876133c7999b08d71a92
libguestfs-rescue-1.48.4-2.el9.x86_64.rpm
a3da0a51d3b5a995a5f5e0aa7a65898adb85e7d805ffd6ef77f0d5806edcc34b
libguestfs-rsync-1.48.4-2.el9.x86_64.rpm
f832543b432b73bdb35ab22d1ece09a89a5b2206cc31261a3511d525247f1d4a
libguestfs-xfs-1.48.4-2.el9.x86_64.rpm
74282153a9ee4a9bc84a0cfa74f6833a6fb199a02e6a3a220198791ddda6b142
perl-Sys-Guestfs-1.48.4-2.el9.x86_64.rpm
c0b945a6d130b6c9741281b743bbf243be334ad979665a70b5e43a797956b8c6
python3-libguestfs-1.48.4-2.el9.x86_64.rpm
46b91d0e55025b5a5180f562054196062120daf4e85cc08ede2d01b38baeaddd
RLSA-2022:7959
Low: guestfs-tools security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for guestfs-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
guestfs-tools is a set of tools that can be used to make batch configuration changes to guests, get disk used/free statistics, perform backups and guest clones, change registry/UUID/hostname info, build guests from scratch, and much more.
Security Fix(es):
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
guestfs-tools-1.48.2-5.el9.x86_64.rpm
43125f0af7eddbbfc8fe79e1dd74605c9e2e16fa451c3f83c4c5b01f3bdf0215
virt-win-reg-1.48.2-5.el9.noarch.rpm
88c5a14bb96d2d8863e0fa1342183a23a3c19cc2151fc4fc9656eca0929ab1aa
RLEA-2022:7960
rust-afterburn bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
afterburn-5.3.0-1.el9.x86_64.rpm
9450a95a5ef1412c2fc0415624b6a3b554d56d020955aa3aea853e779827d6c2
afterburn-dracut-5.3.0-1.el9.x86_64.rpm
c3e08c4dc232f2cbcfb8d2d6102baea10d8cedd42633e54f7853e01618763987
RLBA-2022:7962
rust-ssh-key-dir bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-ssh-key-dir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ssh-key-dir-0.1.3-2.el9.x86_64.rpm
21e8becf78429865faefecff1e0ff2dfc16c6a05789c61374af718ae7b0d1294
ssh-key-dir-0.1.3-2.el9_0.x86_64.rpm
32bf841a986c157d264cfef35f136a1507cae5b1f9ef98ae10b3e6215c9c7466
RLBA-2022:7961
oci-seccomp-bpf-hook bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oci-seccomp-bpf-hook.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oci-seccomp-bpf-hook-1.2.6-1.el9.x86_64.rpm
e633b1dc42acb852d02782bed060c19a2fd367c3a03a5fbcd3214668e640232f
RLBA-2022:7963
rsyslog bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rsyslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rsyslog-8.2102.0-105.el9.x86_64.rpm
40d277dc72563d90b6e82079f04f4d6a4653950d5ae55fe46f3c1fc5cc5cecf3
rsyslog-crypto-8.2102.0-105.el9.x86_64.rpm
52eca00cef8ae9eef680e2f0dde997903a77b06e44e0c60b738297efed94b336
rsyslog-doc-8.2102.0-105.el9.noarch.rpm
dcd300c713a8e80758e2a66bdf3159b05c88fc89f888d65aad66e6d89531aa10
rsyslog-elasticsearch-8.2102.0-105.el9.x86_64.rpm
2f08e016bc39898340c0eee4616fc1a6416f453435e2a454731e1f0a39549f14
rsyslog-gnutls-8.2102.0-105.el9.x86_64.rpm
cca1d79ee0fdbdda374ae074758432dcf0eceeaff0002c28496cd12442ecbbb1
rsyslog-gssapi-8.2102.0-105.el9.x86_64.rpm
26e137487a6fad618adbe465d50c8439107ba6ba8ee6040c8c0b5cae3b0d36c8
rsyslog-kafka-8.2102.0-105.el9.x86_64.rpm
26510e4ab13f07861198b2d21073b4198aaeda888060d96998bb7e9a1a495cda
rsyslog-logrotate-8.2102.0-105.el9.x86_64.rpm
712f6ea374a8173ad38a7c00c4692b23c16792807df882fc137a4143a1efd05b
rsyslog-mmaudit-8.2102.0-105.el9.x86_64.rpm
4439b4921a61a45ac1f89140cb26a82de701d0165c2fa18513b0a700d78240b0
rsyslog-mmfields-8.2102.0-105.el9.x86_64.rpm
e3832b65c84ea368104b0be39aacf148cf302ff813765c941369acb431baa928
rsyslog-mmjsonparse-8.2102.0-105.el9.x86_64.rpm
31fb268be07a9805114100282a9cf69ff97ca062078a734c942cb64e9f8e1c8f
rsyslog-mmkubernetes-8.2102.0-105.el9.x86_64.rpm
52adbb316dc9d727dd46a41ceec4843087f9c0ec972ac8e99a024a0502dc9c13
rsyslog-mmnormalize-8.2102.0-105.el9.x86_64.rpm
5e82f452580c16e19d870eb0fcc45e6cbac69a6a14759b1245a99bcf6e1d4dd1
rsyslog-mmsnmptrapd-8.2102.0-105.el9.x86_64.rpm
2b89ac3fdc9bb98c91b040a1912ccdc2c4732d0d932d47b95dff87b09bae6455
rsyslog-mysql-8.2102.0-105.el9.x86_64.rpm
807854568e2c2cd18cddf99ee0a993f58b42224ce511224c57cb7881188a0308
rsyslog-omamqp1-8.2102.0-105.el9.x86_64.rpm
baf508f9a9ecb32817c2228d20a561644db795e8f5c633bd02e43e15c195d95b
rsyslog-openssl-8.2102.0-105.el9.x86_64.rpm
a20e1697e01fa0a7943b202bde643d8acbb27dcc2f2df79fff7dfa128a71f09f
rsyslog-pgsql-8.2102.0-105.el9.x86_64.rpm
74b6956f7dc8838f6579ffb92f70e5f530fe117d16ce086ed8346093e3bef9cb
rsyslog-relp-8.2102.0-105.el9.x86_64.rpm
a85071a7891308b41b18d219088f8173f799e1a8d214270aa3b51b0c0a6aa1ae
rsyslog-snmp-8.2102.0-105.el9.x86_64.rpm
82acb6094da9c89b361ed04e3e08b42929770492f9d414c9e718acaa2e348c9f
rsyslog-udpspoof-8.2102.0-105.el9.x86_64.rpm
00f5f9a69400796877abb7c5bf068fb968d4c83231e675298f6d220c3af1bb8a
RLBA-2022:7964
babeltrace bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for babeltrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libbabeltrace-1.5.8-10.el9.i686.rpm
1ffb1ab25185c525b7d43838837e19db99cb6e0bed1115fffaf6ae08b88eb80b
libbabeltrace-1.5.8-10.el9.x86_64.rpm
42473f9f5930f90e707d75e2f7e62bfb9cf8a970f587ea1edcbcf839316b5418
RLBA-2022:7965
supermin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for supermin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
supermin-5.2.1-8.el9.x86_64.rpm
1833a757880cc8920424f21e4105b0c1d75c6d151bb00083ac144ff04336b4a0
RLBA-2022:7966
gnome-software bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-software.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-software-41.5-1.el9.x86_64.rpm
6ea4cbcb15ba48825049ea7b5acef5c2e3ebb06eadeba4ce6662e495fc727c49
RLSA-2022:7967
Moderate: qemu-kvm security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757)
Security Fix(es):
* QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750)
* QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507)
* QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611)
* QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-7.0.0-13.el9.x86_64.rpm
ae8eae1fd9f64728104f48f0e4416dc49dfa2ac17fc194af2eaf81dc8ea2447b
qemu-img-7.0.0-13.el9.x86_64.rpm
6d74ce57e187a7bfe20d01279b8f18599683438a024d00b276fffb66ea107f22
qemu-kvm-7.0.0-13.el9.x86_64.rpm
769ac5fcb981ff9cf793e296cf5a2591f4699745c264c56efdb1f1dc07eec631
qemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm
cd36b49796d4871de044aec91c818699ea3f71f5dc2f7be4deac7da41826a89e
qemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpm
a8c94ce651a4db543fe6113bc9ea8897e846e65ea80442e29df18f40b09bc701
qemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm
8b9a4e1e042ca0fefe7c6a5491ada6cbc9a91976dc019f9c8cec3991abd2cfcd
qemu-kvm-common-7.0.0-13.el9.x86_64.rpm
b7bd4bd0e67fe8d5afb0e0db069a17488ad3f1c0ac403e9da03d38f4c28c5934
qemu-kvm-core-7.0.0-13.el9.x86_64.rpm
6c96fd75832b4325949d3f0890c8ba000fd291af73216da21582bd8a2dab0db3
qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpm
b16a922353b458e40feeac46fd2743b07f40d0c35a5fb0cbaa9805239b7d8896
qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpm
1594ac4b90996a6898ab67af40d79d4e51efff88b1f0921fc9d307d5e4ec1d32
qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpm
00b0f28b9ed6b13a1a06cc44669412978b8baa7ee8820a117db03369f0da2a8b
qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm
eb8158e5858494e042534672ab46a906c700e491aab165049ca54b3533f6f41a
qemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm
5e42fa9b8848829e66928d2cfe0fa6a0b6aefc986a2628a7f900551da3d546b5
qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpm
3ad05a2749d817b07e23c6436b26511c0aad4836b65785bfe18072b6111c0c47
qemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpm
0c1fd80c6b94a4fbfadd3016fed6c5d7b8ad26a14b9098f20f3a5541a8c6b4bc
qemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpm
8388ac531d466e6ca3143bca349190c46646908cfb2c039088e1055a142db402
qemu-kvm-docs-7.0.0-13.el9.x86_64.rpm
0b2cf3ff399ee5450c11f6e143b26f11e8b6c92dabcb8db132da70f6bc1d43e4
qemu-kvm-tools-7.0.0-13.el9.x86_64.rpm
d4e8d8895b3eb2f633f3f2f487e4e93d8b2e49eedaba4f496803d06a1d301680
qemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpm
a0bd84ee2c3ac9515cde434338c7cba0266f47963d173b054c9173468bfd0af7
qemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpm
e5783e862bf56476dbb1664cdc7e3fe4ac3899e877ea2a88401d44fa42118632
qemu-pr-helper-7.0.0-13.el9.x86_64.rpm
f97b900fa1d36cef59b9be4f6cacc04ba07a5f78f2835bdbca22d80878b1f8bf
RLSA-2022:7968
Low: virt-v2v security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for virt-v2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible.
Security Fix(es):
* libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-v2v-2.0.7-6.el9.x86_64.rpm
08a2d7a5a74a2e43f533a66c11482e55a90cc8184432b7486498957f417387d1
virt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm
ba18e3f6854602e1a110e30ea2b77c8bd3e79722e273ed81a7a42224de0448a0
RLBA-2022:7969
network-manager-applet bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
network-manager-applet-1.26.0-1.el9.x86_64.rpm
9758c6b37599c2643a321624dd5d7ef0c08c566b012236e12bb0746f08160e52
nm-connection-editor-1.26.0-1.el9.x86_64.rpm
f715218d2eb47f1a7605281cb2c2d2b39e102d32a30be1f5a3c03cf647d2b977
RLSA-2022:7970
Moderate: protobuf security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for protobuf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
protobuf-3.14.0-13.el9.i686.rpm
e9555809ecf853e7f344596d414137146d51f8578a8e984d1690bf2f9cc52943
protobuf-3.14.0-13.el9.x86_64.rpm
e67d8801918a3200aeaeb3beb7a5a56124ef13c3e5b2f514b33d026ce2ff016e
protobuf-lite-3.14.0-13.el9.i686.rpm
9359605b00acfa9ad58f46976a6fdca7ffe34eacf3bfb911566c5dc822af2020
protobuf-lite-3.14.0-13.el9.x86_64.rpm
21ff481d8f5d8bd08c9a6d192af40c06d7bd923d21a95220c4ed9f46abfd61a7
python3-protobuf-3.14.0-13.el9.noarch.rpm
169c2dc33df72dfd0d6563e4b7b4a811349da6e243fc89f1a0e4eb8ac9c1761f
RLEA-2022:7971
edk2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20220526git16779ede2d36-3.el9.noarch.rpm
d6487d29b107b21fe9e5db07c92e4dc4918e79dbfe3f6a012fb8d2b96989f079
edk2-ovmf-20220526git16779ede2d36-3.el9.noarch.rpm
95ca4bef0aef31d8963e2ca7f7f5cd9e7ca0ace9da0facaee38c5a5d4edc0136
RLBA-2022:7973
tftp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tftp-5.2-37.el9.x86_64.rpm
70193c0aeb7f62e4007c05722102348d224aa4ab01bbdabf93e2096459eac8ad
tftp-server-5.2-37.el9.x86_64.rpm
f252a9225c85a7165bf4d87722058db1e285ff45abf1b17f2b38401d5ea14927
RLBA-2022:7974
cockpit-podman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-podman-53-1.el9.noarch.rpm
13a9c4072ab45ff677e013557e7409d54057ffda5cd4816661379ecd5eca5224
RLBA-2022:7976
libnma bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnma-1.8.40-1.el9.i686.rpm
c0e725e71e3caaa35eee3ef9553f0abb263d3b99b11edc5de1b4c27058143e85
libnma-1.8.40-1.el9.x86_64.rpm
b41cac88cd28e7771ef201647b15687f40fc4c9ba8033a627479f8e53a1b170b
RLSA-2022:7978
Moderate: gimp security and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: buffer overflow through a crafted XCF file (CVE-2022-30067)
* gimp: unhandled exception via a crafted XCF file may lead to DoS (CVE-2022-32990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-2.99.8-3.el9.x86_64.rpm
f3aff4bd98554c12cf0cabdd92a007577f5311fe1e77abe30254611e2862f2d4
gimp-libs-2.99.8-3.el9.i686.rpm
dd6a34ceaf8bf8233df1c8bff59d079a0f04187d4c8d5e1835537858c680b305
gimp-libs-2.99.8-3.el9.x86_64.rpm
2cbd3376d21c0f03c5711e3b1935f167c71ebc9950c6350b0b45ad52dc9c5691
RLSA-2022:7979
Low: speex security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for speex.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Speex is a patent-free compression format designed especially for speech. It is specialized for voice communications at low bit-rates.
Security Fix(es):
* speex: divide by zero in read_samples() via crafted WAV file (CVE-2020-23903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
speex-1.2.0-11.el9.i686.rpm
49787117d378d557b7010f221fc52a9759e117898fc213c696545e8626497ed0
speex-1.2.0-11.el9.x86_64.rpm
4e12db6044b05c8cd37d14cd3e2f113ab2c798b1d4891b325379722b6f688e12
RLEA-2022:7983
ostree bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ostree-2022.5-1.el9.i686.rpm
23a185b07b0cc39438e7b90bbcce197cefa9f7d1cb3acf46c179a557721dfa7c
ostree-2022.5-1.el9_0.i686.rpm
a8df3ab9797bf59bfad66839a85cf86bf627b071ba419de1b8ed4d9679564d03
ostree-2022.5-1.el9.x86_64.rpm
6af184ec89b61e57aab331e065d125e27d15acefbbeb79275ade48b7d26b48ca
ostree-2022.5-1.el9_0.x86_64.rpm
b766a327ca745a298505cf93577f4da5ce4c864c193aedc6e3c258b23bb476a6
ostree-grub2-2022.5-1.el9.x86_64.rpm
270c8f82d1dc25fe3fa7c2d256e93e9108043a42ef698b2d593426f78330f23e
ostree-grub2-2022.5-1.el9_0.x86_64.rpm
643a59a13a299ba3e67ad56a783c86284f1a0ff80d52157df8f272713711619b
ostree-libs-2022.5-1.el9.i686.rpm
d41157f436cb396a2e666626b3de7701482976c82050e467b872222b5ff6402a
ostree-libs-2022.5-1.el9_0.i686.rpm
b3097ed10ad10fae2c32fe71a51ae6b9e277a6211966c697686dda302a63a7cc
ostree-libs-2022.5-1.el9.x86_64.rpm
01fb60886745eceaf7b7237d433a21a1d7312c974e7528554dbb1ffdadaad3fc
ostree-libs-2022.5-1.el9_0.x86_64.rpm
30303489e69073bdec707e406cc517ccffcf329ebd2e79e046daed8d1a55f161
RLBA-2022:7985
nautilus bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nautilus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nautilus-40.2-9.el9_1.x86_64.rpm
68f100394a0abffb6fe435a883e058819296100462791326d145e2af6a5517a0
nautilus-extensions-40.2-9.el9_1.i686.rpm
cb08308623d73ddd9255af3b246d61151841419bde6e0ab3b74f81ca1e0bbec3
nautilus-extensions-40.2-9.el9_1.x86_64.rpm
58433a3da1876b7dccc20c8b5a2e4ccc80f9de76e92a68bcfd1d95f777486a77
RLBA-2022:7986
tigervnc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.12.0-4.el9.x86_64.rpm
182ab6ca165b159ce2796b9565599de6b13e3cc79081c6a0dae9f831aa87f1a9
tigervnc-icons-1.12.0-4.el9.noarch.rpm
ca9181ccf07ac109be00b9053c585edb8c1f84f1f06d98997b107f0ef6cc1f33
tigervnc-license-1.12.0-4.el9.noarch.rpm
b769de1827560d1dbbd0a3fe8e89203c7b31d3ab144abaec805893ed46d47861
tigervnc-selinux-1.12.0-4.el9.noarch.rpm
893a9b43cc3230801d4f1f55d529917e7b997d06eb54b1b90f658316f3869aae
tigervnc-server-1.12.0-4.el9.x86_64.rpm
ca5bee1853ad7e2abfa0a8fa4e6b1e20cc813175974e6a6ca90eaa342cab7288
tigervnc-server-minimal-1.12.0-4.el9.x86_64.rpm
a208cbd8ed486d9e407cd09467cf065664d7fed4e2ebe2f2847391f61d4f6426
tigervnc-server-module-1.12.0-4.el9.x86_64.rpm
25495f0cbdfff59690ff8a53d2b51c097ae10dc6d92057e7693d2faa5144c227
RLBA-2022:7987
rasdaemon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rasdaemon-0.6.7-8.el9.x86_64.rpm
32375a5ce17e90a934d889f052b6c1294bfd78da519898e0c8ab4627ca716256
RLBA-2022:7989
pcp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcp-5.3.7-7.el9.x86_64.rpm
42c7ae3551f33490eff0c258a8193f1eb80c7d379ed1d39161f1edc491c9c605
pcp-conf-5.3.7-7.el9.x86_64.rpm
e9016b737e17f17fbe2f8991384386ff856f4d5c937c363409680cc9925c1c02
pcp-devel-5.3.7-7.el9.i686.rpm
dc79ad982545d20f9ad3648cfb5d49d7dff813abf4c1668ac85b60806d249875
pcp-devel-5.3.7-7.el9.x86_64.rpm
a082d6c06a136e71dfb0b35d25044c912eee9ce63096df514fcc0c5f11e4b501
pcp-doc-5.3.7-7.el9.noarch.rpm
5db779ce5ef2d98e35ad64464124313ffaf6f04420df97037c49e3a4b2b92e46
pcp-export-pcp2elasticsearch-5.3.7-7.el9.x86_64.rpm
aa522bc890efa9732cb74f10d94904bce1e3c1d3cf9ab263a4b81df0a664ba0f
pcp-export-pcp2graphite-5.3.7-7.el9.x86_64.rpm
cac0b1fa8b3151399918c806e04573780485f84bbdb9977ec422e95e3a70487d
pcp-export-pcp2influxdb-5.3.7-7.el9.x86_64.rpm
72aad23fe4110efbb0ba4f2582cde2457a10263caf426efc65e54e592a28f56a
pcp-export-pcp2json-5.3.7-7.el9.x86_64.rpm
4b225f54354e84579278b5785e618995010137521a6896cf14894609a6045137
pcp-export-pcp2spark-5.3.7-7.el9.x86_64.rpm
f5698a76cb6c7fccec67e1ab2352721971d3d2473d804e2830e27761e052e3af
pcp-export-pcp2xml-5.3.7-7.el9.x86_64.rpm
682e12aca0d2b46448e3df4c1e6358cc723804d15a13b170f8fff6eede7505a9
pcp-export-pcp2zabbix-5.3.7-7.el9.x86_64.rpm
c78d0f70e58a491e7d3613bd00cde14e714fd59bd7c59ec0da15f4d1c50c4472
pcp-export-zabbix-agent-5.3.7-7.el9.x86_64.rpm
9a45973f9fc00176c05e07378246f4ab87d37cae4500cdd71a240d91195ce59b
pcp-gui-5.3.7-7.el9.x86_64.rpm
5a0f60cae705fd1268bb0a43b4ba03185109cea2e0eb1b44572f62aee162a6e5
pcp-import-collectl2pcp-5.3.7-7.el9.x86_64.rpm
f02b019c0f28fcdc7f273137c0e47eb44bf8507bb8e5d43c22453f61b18b866d
pcp-import-ganglia2pcp-5.3.7-7.el9.x86_64.rpm
abde6658e2660a76d45f932f958012b0571a67906553ebf1d1c898c60fdca2c8
pcp-import-iostat2pcp-5.3.7-7.el9.x86_64.rpm
de0b64fddb4fcdb61e58900d78983de6d417bcc818da95f1b566ae42ab97d8bf
pcp-import-mrtg2pcp-5.3.7-7.el9.x86_64.rpm
5b537b517e63de8c03ed8e4b37dda109384450c265a59b9f32c3499a45eccb8f
pcp-import-sar2pcp-5.3.7-7.el9.x86_64.rpm
da6ad333590ea6dc381c4841f5992fc314c5955d4ec75e4965cf50f954796453
pcp-libs-5.3.7-7.el9.i686.rpm
54fde7606567b5f49aa2b9e271cc4d145cb21aafb32f60b776c19595bfdb7e29
pcp-libs-5.3.7-7.el9.x86_64.rpm
34a1d3e5f1356fa62a3436fe010724617a03b120e458628527c15cef0dcba418
pcp-libs-devel-5.3.7-7.el9.i686.rpm
b483c2d71c735b0ec55e9504a5d20eb719828bd7eec9503b70acb4e9099d5e78
pcp-libs-devel-5.3.7-7.el9.x86_64.rpm
f4b9fabc38ee97430dd013352cb0e0ebec3b8bb5edc730f46c7f9ef56b11c352
pcp-pmda-activemq-5.3.7-7.el9.x86_64.rpm
4bbef93c6c2b40fc2fc0b0ee36848c9e18b2fd68847214756226184ba1798566
pcp-pmda-apache-5.3.7-7.el9.x86_64.rpm
b03b3247bb4c3eb77edfac387eb560284f2a74f54980b7c05b2cfa4b6042b290
pcp-pmda-bash-5.3.7-7.el9.x86_64.rpm
fb66155466d72090e60e4683c84b9d61caf9c76ef503dff68b7d246aac781d7e
pcp-pmda-bcc-5.3.7-7.el9.x86_64.rpm
41d392dfbf168a54fce27fec31c87a8eff56815f382c8c5344448ba2262176d2
pcp-pmda-bind2-5.3.7-7.el9.x86_64.rpm
4c953afd3f76a25ad4d214466dd79e4d525564aa531a8b8f08d76558105544eb
pcp-pmda-bonding-5.3.7-7.el9.x86_64.rpm
1c627f18331985d5f23d114a015cdd40d2f813aa143612ff6992585d406a302a
pcp-pmda-bpf-5.3.7-7.el9.x86_64.rpm
a84dfe1b5c922b44a797d6bb731218319da912ccd5332759e16b4a809d55097e
pcp-pmda-bpftrace-5.3.7-7.el9.x86_64.rpm
57cc1675145353df62461dd0d6bdd14c462c8b50026ea1433f5176898909e1af
pcp-pmda-cifs-5.3.7-7.el9.x86_64.rpm
dde128247f14a5288a3fc6c873f3f31be82a37e79b222c7a3a9c5f950dd2de7a
pcp-pmda-cisco-5.3.7-7.el9.x86_64.rpm
5742ac46b4f348f481fe3b202b3f9e229b3d0fd0cc8db54aae8f655bac8d305f
pcp-pmda-dbping-5.3.7-7.el9.x86_64.rpm
4c7cd746fcfb119b081d93ccca6ea65b9bce5902887704ba8b2f5fb590233ff2
pcp-pmda-denki-5.3.7-7.el9.x86_64.rpm
adf637dbee92bb4e3a9e11c6f69ffa00612b9a847f588fc11fecf6b63a0d1419
pcp-pmda-dm-5.3.7-7.el9.x86_64.rpm
37f6c1c57c3cd334334eddd63963bda8e4a05fe33feeb2d8022b83785c24fe83
pcp-pmda-docker-5.3.7-7.el9.x86_64.rpm
98fae90773d5c95738f93f488b59a9f581f23865d1f9f3b39b59b7ec02eb54b2
pcp-pmda-ds389-5.3.7-7.el9.x86_64.rpm
228a7585e65a43b81d486403fed67d479a33b38b522de6b955e6b0f209ec1fc1
pcp-pmda-ds389log-5.3.7-7.el9.x86_64.rpm
cabb7fad64bd080771fccf90c8bf0439d3b866ad5dee7871357a29bda1cd864d
pcp-pmda-elasticsearch-5.3.7-7.el9.x86_64.rpm
52fa7b9d64f669ebbe26249a4f94082e70ce8b20b2e953a89aa7e103fec024ac
pcp-pmda-gfs2-5.3.7-7.el9.x86_64.rpm
05294fee0e5961cfef88e0ebce763a6e36de2fd50d3520fca84d0ef821a10cdb
pcp-pmda-gluster-5.3.7-7.el9.x86_64.rpm
43cfb084bb796d355d9dd50ebbd8348e5e944e66b70eaef312558a2789c0272a
pcp-pmda-gpfs-5.3.7-7.el9.x86_64.rpm
5d0701250f27f51b5b1a3d9dc4d9c4008e4531fc08488254bc8d8a17695f2908
pcp-pmda-gpsd-5.3.7-7.el9.x86_64.rpm
9bebaadb58a36ee744554affbc871fe732f53309e74a98a8e9bec417eeb64eac
pcp-pmda-hacluster-5.3.7-7.el9.x86_64.rpm
e210dfa911b6ac36e2408e02e2cb4c04d69552f92a3bf091455f0da3a8316b3e
pcp-pmda-haproxy-5.3.7-7.el9.x86_64.rpm
1f1cc9af51bb8bf34b117b25c16af463acaea93452210739ed392c31273db801
pcp-pmda-infiniband-5.3.7-7.el9.x86_64.rpm
21b94c8fdaea67e011fd82d529255f962752c196686c56e2b6a829925aec5c6c
pcp-pmda-json-5.3.7-7.el9.x86_64.rpm
abef33a2fcd03338092f9d220da7c7a1478a7785f57a1d02e27ccff4e0d40dbf
pcp-pmda-libvirt-5.3.7-7.el9.x86_64.rpm
d14ec3ac6467cb5a91059d1d546858b5df1029b581bc87472d07031440b8b55a
pcp-pmda-lio-5.3.7-7.el9.x86_64.rpm
8b2ed271e688b08e5af7fd8a5cc3cb0425322177d928431c4cd03b05c7cb712b
pcp-pmda-lmsensors-5.3.7-7.el9.x86_64.rpm
9ed0241edf77ec428ea178f0b932d34b948223a734938e6d7392da82d889295a
pcp-pmda-logger-5.3.7-7.el9.x86_64.rpm
72b28e997f68d21ec8b53e1c921de0f29eff7e3268464036c2531ec6262442ba
pcp-pmda-lustre-5.3.7-7.el9.x86_64.rpm
2c9db8b81fc86683ab72c93f8e1feb1bb5939a255912c24b2b7a2844c03fb5ed
pcp-pmda-lustrecomm-5.3.7-7.el9.x86_64.rpm
06522306cef6bf9523ec1f3a002f005289a0479b9bcf9abce2a6598c09c02e80
pcp-pmda-mailq-5.3.7-7.el9.x86_64.rpm
6aa0293807d678d4c55beed8718bdbd01cfa8d1cc1e9150953984a55f97aadde
pcp-pmda-memcache-5.3.7-7.el9.x86_64.rpm
d18a97a2df05dce8f1623dec762563e419fc41ceed78e86265b22ba319ff4d63
pcp-pmda-mic-5.3.7-7.el9.x86_64.rpm
5867752aa9ccf90042b215f749778e1d15f3d27ef1de30fc48b4aff3a936bb16
pcp-pmda-mongodb-5.3.7-7.el9.x86_64.rpm
61a50bbb5a9ce626987f133037714cf924e1a0413a050e395dee0be8cb8ef90b
pcp-pmda-mounts-5.3.7-7.el9.x86_64.rpm
4b1c8938fb54f5edfd6110b60c9d2368cb5dd31e7f1942d1453fc10cf67c3ba8
pcp-pmda-mssql-5.3.7-7.el9.x86_64.rpm
31bc2461c2d0700d7f9f1dc66694c730cff2b2194ec048f8195f316c1930a21b
pcp-pmda-mysql-5.3.7-7.el9.x86_64.rpm
35607851f9a062b09b880519d614f595cdd330e76f4f46e0a13d33031bc378e1
pcp-pmda-named-5.3.7-7.el9.x86_64.rpm
a4278d65ce8d2dd56bd5abe9737030e99b337ab3e450bc0e09e63830d57908be
pcp-pmda-netcheck-5.3.7-7.el9.x86_64.rpm
a1e478a0f38d4695557d0bf426e7b00d4b1cdc5e04a562db4c142c8f08ae5ad8
pcp-pmda-netfilter-5.3.7-7.el9.x86_64.rpm
5fd8a881bae8f91d1744248da0acfa188104593f2db29e9c65776270706a4185
pcp-pmda-news-5.3.7-7.el9.x86_64.rpm
8b6e8bad526e20fbd3072c6010d2e4d84b477dc3fa9521988995537487a18a65
pcp-pmda-nfsclient-5.3.7-7.el9.x86_64.rpm
e8c9dbdaece222ad4da075696307fd22b51ee0cd5d5664357c750c3f82d807a5
pcp-pmda-nginx-5.3.7-7.el9.x86_64.rpm
0eb49c26dfab8923569871ad57b099d39e6673176eb59cb2ee74950a3c90f6be
pcp-pmda-nvidia-gpu-5.3.7-7.el9.x86_64.rpm
4334f9e143a09b85ba8c7f072f70fd648edc365d6e0cf0caa4855745da6a9bd5
pcp-pmda-openmetrics-5.3.7-7.el9.x86_64.rpm
14eec24865c9e25fe8ac172a574424c1a560fdf063f2bb3489a89703e421843b
pcp-pmda-openvswitch-5.3.7-7.el9.x86_64.rpm
3781a368424c297193b82eef7296ed0c8de55fee90db1dc2170d648d0cdc02a3
pcp-pmda-oracle-5.3.7-7.el9.x86_64.rpm
2530b18c4b291e59961544ad48690a4965bfd371cdb70e82db686939e542c580
pcp-pmda-pdns-5.3.7-7.el9.x86_64.rpm
b35a174148194b05358bed97a7e33ad17a0116f0fa89ee313ff6a919095f88df
pcp-pmda-perfevent-5.3.7-7.el9.x86_64.rpm
590b75c0827f04d00905b3af2924dd343811b406734eb97ec1dc584080559be9
pcp-pmda-podman-5.3.7-7.el9.x86_64.rpm
eb3b571a8f15bdf39113162423104db459987586c8b89e3d54529a062cd74c88
pcp-pmda-postfix-5.3.7-7.el9.x86_64.rpm
d7f20e2d7d62bd711e81080c93bed522011a3e13b8e5b492092a67380b3a1074
pcp-pmda-postgresql-5.3.7-7.el9.x86_64.rpm
c5b16753080b48d492acfa47d27503fe87a7a94be230b56e4071989eb6f91b1a
pcp-pmda-rabbitmq-5.3.7-7.el9.x86_64.rpm
8ca2186d184c8fcd760ab74b28b1a34eca850e295903a6faaa3bec9b3f63f0b2
pcp-pmda-redis-5.3.7-7.el9.x86_64.rpm
d773636bb7a5fe1068d2dfa7634384385cb041c99cb5d1f6ee63830f517353f2
pcp-pmda-roomtemp-5.3.7-7.el9.x86_64.rpm
55b2b6c81f3044fdfccc86fc2460ef5b0b244a24a815c304ad50169ac2faf255
pcp-pmda-rsyslog-5.3.7-7.el9.x86_64.rpm
cde07c14e58bd770a197f3bab7d2b33e345eb50f98cf542251dcef2e58fa6b6b
pcp-pmda-samba-5.3.7-7.el9.x86_64.rpm
b0978f929f0d3990e122f8ee616288e636e277fd6bc91ce8bc55708defb4ec87
pcp-pmda-sendmail-5.3.7-7.el9.x86_64.rpm
2b29cbd51a37d94a055fd6d2bdad2e87036c1790cb5f1ce2d382dbb9226f3796
pcp-pmda-shping-5.3.7-7.el9.x86_64.rpm
26a6fde9e14da01a7518c8985734ef2d62a036e8f1778e342d270b731fc06894
pcp-pmda-slurm-5.3.7-7.el9.x86_64.rpm
89b01297e1282f839e2474ce3cd23258794a0488659bb0922ae37158a02dffa7
pcp-pmda-smart-5.3.7-7.el9.x86_64.rpm
d0ba0b074b73adad835e0da94323ab0795615510ab5b15476a7624c67af087ab
pcp-pmda-snmp-5.3.7-7.el9.x86_64.rpm
001c6decb65cc8d6ce3b02138535ae4ae222d33ab4437b9914502316acc106e7
pcp-pmda-sockets-5.3.7-7.el9.x86_64.rpm
ca288c63854d507e9afcecfa170b21675f4bb4b94c6ddd7a02eb1a4c83186878
pcp-pmda-statsd-5.3.7-7.el9.x86_64.rpm
9c0f836537990feb9710bfa9922fd44f4f2408ee3be5ba75425cbb6262f0db87
pcp-pmda-summary-5.3.7-7.el9.x86_64.rpm
19c3e196a4856cb630769c6ca158b85445ee6c5a158b5b7958698689d32cd970
pcp-pmda-systemd-5.3.7-7.el9.x86_64.rpm
a1940210f1c33cbc024a332bb250cdec065fb05602e2d07c86a373afd9a0d583
pcp-pmda-trace-5.3.7-7.el9.x86_64.rpm
4ca5091c96f436eb8e93e85bb3ec4f9cbe7c244e2baea575ddf80e59c7951398
pcp-pmda-unbound-5.3.7-7.el9.x86_64.rpm
1f6e254d7b901d5db7dbd499669168efeac5f976b3dfc3d3c8fd0f484b00ba26
pcp-pmda-weblog-5.3.7-7.el9.x86_64.rpm
830cb130a43bddbfa80015bb4985188b989717eed59174b06b941609cea102c1
pcp-pmda-zimbra-5.3.7-7.el9.x86_64.rpm
c113cee5590adba9bea06c5754159ceb602207c1a24278f6cc036ea191795658
pcp-pmda-zswap-5.3.7-7.el9.x86_64.rpm
1af9801db336d77669a3506bba1b36dbf62184f19c5c1d996aaab7cde94a039a
pcp-selinux-5.3.7-7.el9.x86_64.rpm
e9d759a3d5da0a75e040fc841213fc826a889e4f6fd663c4316a3a90f53dc467
pcp-system-tools-5.3.7-7.el9.x86_64.rpm
41d82d8e3392f4ce1da2f16f42ec49a827b42a053e1eff7f365c74e8089e9f35
pcp-testsuite-5.3.7-7.el9.i686.rpm
39cc6c1f585f0d1e917fa8c397cc31c513c30190403b4851adbe544f2075b972
pcp-testsuite-5.3.7-7.el9.x86_64.rpm
5fa2d6191d6ed868d28d74be131afc1ffcee67e553586d77eb57fa1c35d8358e
pcp-zeroconf-5.3.7-7.el9.x86_64.rpm
f4bf46c644cefdb5512b26f53056a83848533a9250cd384d923bc1bfa6ac6263
perl-PCP-LogImport-5.3.7-7.el9.x86_64.rpm
44fc146b3e583e4dcce189e41cd1da843ca78a136cf3f4053589ea0cb7270732
perl-PCP-LogSummary-5.3.7-7.el9.x86_64.rpm
175b0dd1ea7ed33e0ddef249423c8aed9c9bf5c2dbce73025c69eea4ba3eed89
perl-PCP-MMV-5.3.7-7.el9.x86_64.rpm
25e5691d2bf8c645341fb321d2e5c5f45298bd5b031ec06dc0daacc07e29b900
perl-PCP-PMDA-5.3.7-7.el9.x86_64.rpm
f7cedcf1efc5378cd5ed05a24752556c3c096b8c7b75a9fab77205050d20723f
python3-pcp-5.3.7-7.el9.x86_64.rpm
74a1b9cccba3dcecee9cf3d6d636421ab2b2e4e08a64596dd9cc78792d974507
RLBA-2022:7990
flatpak-xdg-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak-xdg-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-spawn-1.0.5-1.el9.x86_64.rpm
e12118305dffd8e8a421660d7899d4a2008e5659f473b820c3b9758911c1b386
flatpak-xdg-utils-1.0.5-1.el9.x86_64.rpm
806d5734c94fffafd6b432cf9a813c60343fc937ae091d2bab1298387af93820
RLBA-2022:7992
libestr bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libestr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libestr-0.1.11-4.el9.i686.rpm
c89f7091daef0d56cb646aecd063cc89aecb8561d2beb113c8e79de91a3dae6a
libestr-0.1.11-4.el9.x86_64.rpm
311360768204cf58a79d72f92e5fa25671cfdaec398ad3fc90cacfbcfb0f83eb
RLBA-2022:7994
evolution bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-3.40.4-6.el9.x86_64.rpm
63f59c74ffcec300bfff30b8d56d8e2cabbdefda98c2cf49ff0883c09ee45239
evolution-bogofilter-3.40.4-6.el9.x86_64.rpm
4b5cd6d9b38014aa1847327c49f3c3981642b9e797fa35e13fe9340db2053a1c
evolution-help-3.40.4-6.el9.noarch.rpm
7b67cb16b5f085601d654b537b388c090423d90cc851be33dd74e9c195dc4294
evolution-langpacks-3.40.4-6.el9.noarch.rpm
80c1b3448aa997afb16b8696746bc14839c5fc1efb6e013bd0fa268612993c70
evolution-pst-3.40.4-6.el9.x86_64.rpm
222f8d9d65f0cc6d8f027f7788f319a0f1cff29e0833dde131b26fc8cc260867
evolution-spamassassin-3.40.4-6.el9.x86_64.rpm
cd38dec19299bf8b08eea4c871daa3e405986576bc8315d5a62a4e4a86516152
RLBA-2022:7993
mod_wsgi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_wsgi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-mod_wsgi-4.7.1-11.el9.x86_64.rpm
3186a8b911124746e2632ab8be6ecdc289036a884e3e7cca9cec42ada88bc7a6
RLBA-2022:7995
evolution-data-server bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-data-server-3.40.4-6.el9.i686.rpm
da397784c3524325a57ea5bff13a1ba86dfc00ea09c006fca62b68421aa984bb
evolution-data-server-3.40.4-6.el9.x86_64.rpm
6b3e20586e0fb36fd380503dd439750e032ee433daaca2c611fd6e4f3f4f254a
evolution-data-server-devel-3.40.4-6.el9.i686.rpm
e88b5d32a1e761af9658c4bc2af305f2a0da87a490438d73a72de6c65fbc24c2
evolution-data-server-devel-3.40.4-6.el9.x86_64.rpm
03c607ee947a55264a69525b9aa1aec64dad06d8325e1234eb32dbd9d972448e
evolution-data-server-doc-3.40.4-6.el9.noarch.rpm
93ab2ed7576d23b294b1db56171dae650df9b660b2c8bce44a0e6da2e1df184d
evolution-data-server-langpacks-3.40.4-6.el9.noarch.rpm
db81a56031c693d5d1cd9b7e6fd4d88addb685a57aeed735c95724468034dd57
evolution-data-server-perl-3.40.4-6.el9.x86_64.rpm
d871f020d8ced243917204a0012c9e90032614fa5f18eec8b24d7ed85a783ab7
evolution-data-server-tests-3.40.4-6.el9.i686.rpm
f404ad56a2bf7d94822c3620c05115579628b21c20feb677f748e184cb6a9107
evolution-data-server-tests-3.40.4-6.el9.x86_64.rpm
499c75494c55be70cc7ba94d6963b0a5175e2ededa6123277e4d717ea46d4546
RLSA-2022:8011
Moderate: fribidi security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for fribidi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order.
Security Fix(es):
* fribidi: Stack based buffer overflow (CVE-2022-25308)
* fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309)
* fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fribidi-1.0.10-6.el9.2.x86_64.rpm
da453272ba50af82b42370ab516b4de94977072a4069f657c84e5c357d572bc5
fribidi-1.0.10-6.el9.2.i686.rpm
34e056cbd3e37b9cbd1da8430012d747b45d0eceaf9648f2cb507c6527a1539c
fribidi-devel-1.0.10-6.el9.2.i686.rpm
223dcd2aea91860af3b6e68ec99631a3bce23a1c4c752296e6dc2af0b3f16870
fribidi-devel-1.0.10-6.el9.2.x86_64.rpm
4a6b9992cc89bc774d8141080df63af1516eefcdfe6450ec85da36fd47e3e51f
RLBA-2022:7997
xdg-desktop-portal bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-1.12.4-1.el9.x86_64.rpm
5b69bca006861baa18cb3a5e35394012d0ed0b49e18441b4246aecb476684716
RLEA-2022:7999
xdg-desktop-portal-gnome bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal-gnome.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-gnome-41.2-1.el9.x86_64.rpm
7bb9428acc9ef87979050d06e4e975e053a17ccd38d5656039909c20d6be90d5
RLBA-2022:7998
gnome-tweaks bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-tweaks.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-tweaks-40.10-1.el9.noarch.rpm
aaa2c4060fb312151b4c35249fa0a32d4301932f1ea81f57e9cbc68b1a3e9da5
RLBA-2022:8000
wayland-protocols bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wayland-protocols.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wayland-protocols-devel-1.25-1.el9.noarch.rpm
3a912fcd7eaa246e88b4bae743895e34228b4dac59c387b671e4994708954b4b
RLBA-2022:8004
rpm-ostree bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpm-ostree-2022.12-2.el9.x86_64.rpm
ae5615f173f2691dedd7a531190010fab535795e4826e07ea634408bd674f74d
rpm-ostree-libs-2022.12-2.el9.i686.rpm
fba0f7fb3e5742b38d46e02902cad74e2345c925276fb9eb28ebe08593710066
rpm-ostree-libs-2022.12-2.el9.x86_64.rpm
a222c74f2e68887a97bcaa5c2ef20221cf6c33f4e5d4eb8aa832b14ed773b665
RLBA-2022:8005
ipxe bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipxe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipxe-bootimgs-x86-20200823-9.git4bd064de.el9.noarch.rpm
00192a333bae22063d4782365c916aad980288d7e2db31a24cc4fb9d7a1e58ee
ipxe-roms-20200823-9.git4bd064de.el9.noarch.rpm
790a3f2840fcca13eb25fee64b11ccfa199084a66b317607bea6ad57d9e558a0
ipxe-roms-qemu-20200823-9.git4bd064de.el9.noarch.rpm
571c22893e831cd0b2f5b79611684a4a9b2d7443444188a8b3d24d2f01115f38
RLBA-2022:8006
gjs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gjs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gjs-1.68.6-1.el9.i686.rpm
dd220454af47dd472627be699a5f9f0711444405489578c30cba9e3a2ea07187
gjs-1.68.6-1.el9.x86_64.rpm
29a9d4662db1efd9c5be705bf931d7f946e03fed1584b9fb557c97d7a6fff768
RLBA-2022:8007
libvirt-python bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libvirt-8.5.0-2.el9.x86_64.rpm
1de6fbb9601b277c40d0f46d0266b9a337c3998a0b1414a66ad0307df6c2bd0a
RLEA-2022:8014
tomcatjss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcatjss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-tomcatjss-8.2.0-1.el9.noarch.rpm
a94f3c18e8f044139c200e0517b93d550cb16fa5593b638d1977eaa492b6ed2e
RLEA-2022:8009
jss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-jss-5.2.1-1.el9.x86_64.rpm
fa737b0c3ee90e6463989b7c235f2d7686c124895d4219180779dbaa08d2acda
RLEA-2022:8010
ldapjdk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldapjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-ldapjdk-5.2.0-1.el9.noarch.rpm
004262e302baeb622832e882808b98d3c848e00240ef81f026b2898869ffcb65
RLBA-2022:8012
xdg-dbus-proxy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-dbus-proxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-dbus-proxy-0.1.3-1.el9.x86_64.rpm
d577de2e576b019218ef9db79c6364e17bc6cc612909484936cb2e03d3a6c95d
RLBA-2022:8013
gnome-shell-extensions bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell-extensions.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-classic-session-40.7-2.el9.noarch.rpm
990688f4cd3ff5235e13e912e874979c0c8300349cace7518e113b50f8aa1c50
gnome-shell-extension-apps-menu-40.7-2.el9.noarch.rpm
7c0e3186f3d07c4bb540babbb87f256aaf03d6f25ea13edc4cc9066183b8ba2b
gnome-shell-extension-auto-move-windows-40.7-2.el9.noarch.rpm
31fdf452708625689e5d08e4537babaff88caca0c6158577ea6db9a76f2acd39
gnome-shell-extension-classification-banner-40.7-2.el9.noarch.rpm
a2f0cf98bba752734277ca3308b792826ddc9313a744fa7cf704e1f78eb7ba53
gnome-shell-extension-common-40.7-2.el9.noarch.rpm
be9e5b0e1d57ec9b6d3c4ea137c35aac1a44775343f002e5b2ac976ff258352b
gnome-shell-extension-dash-to-dock-40.7-2.el9.noarch.rpm
39ae3b3b5656e4ba3d334ef195a39859e694fd88c7af85f6d171da4871719416
gnome-shell-extension-desktop-icons-40.7-2.el9.noarch.rpm
d2ad825b121db10ea0aa6f90ab6575ebfdb00d544cedbad607ce9db78258185c
gnome-shell-extension-drive-menu-40.7-2.el9.noarch.rpm
c296a856ae2e48020422446f5c53f48222acff8558e039f16d0e5e5b56bd74f5
gnome-shell-extension-gesture-inhibitor-40.7-2.el9.noarch.rpm
c67a680f9d3d7e32dd89a77bfd461b4381508ed9ac5de66c0014533f543fc1a0
gnome-shell-extension-heads-up-display-40.7-2.el9.noarch.rpm
9b511d1bb34b86a24f4b29b883c0a28638df3d62c3a10a8c1bdbb792a3e30e32
gnome-shell-extension-launch-new-instance-40.7-2.el9.noarch.rpm
6e5852626a9790ff7dcdc4b0a3b3d60035dd9cfe33163bab47de94a1988cf784
gnome-shell-extension-native-window-placement-40.7-2.el9.noarch.rpm
4133f12d27d29ca4a710a02a32fb1842c0073b523d55c4b45fe4b79f43984002
gnome-shell-extension-panel-favorites-40.7-2.el9.noarch.rpm
6568cb2f57eac309e030247d64cba70a29eec5a3e7bbc2515d2d7dca73105ca8
gnome-shell-extension-places-menu-40.7-2.el9.noarch.rpm
9c9e347ab95fa105d9e351f044e4e1fb523442448f51b7f3aaacf9f3a7136768
gnome-shell-extension-screenshot-window-sizer-40.7-2.el9.noarch.rpm
219c59ac1826555af1bddfab311ca1573bd495aa086c7088aa11517dc12d3220
gnome-shell-extension-systemMonitor-40.7-2.el9.noarch.rpm
fecb8109d2537434f831abc6271a254c61c3b8e730fdd70aa36be5a0101bf68f
gnome-shell-extension-top-icons-40.7-2.el9.noarch.rpm
8a611b952ad4c5d1bbd96a6e718c70500b1a0c8638b89ebf1839ba6582c7bd5c
gnome-shell-extension-updates-dialog-40.7-2.el9.noarch.rpm
1d6a8f997ed44d3839171b0e706ee6432b480ff0f583a562061c7aa5afa00754
gnome-shell-extension-user-theme-40.7-2.el9.noarch.rpm
4f063f27dd2b89ffe4eaadb73f5da88e8c0f6f48b22897fba15569cc756e9304
gnome-shell-extension-window-list-40.7-2.el9.noarch.rpm
b4f80345761ce454a1194a905ca297d60dfb748a5e72b8b29ef7044614ccf0b5
gnome-shell-extension-windowsNavigator-40.7-2.el9.noarch.rpm
84c94bf7776727e12861f5a4968f1534de22bc0e2c81920b6a9868d7dbd5d0de
gnome-shell-extension-workspace-indicator-40.7-2.el9.noarch.rpm
cf96dbfe2991f2df9514f79e16b72e3cd414381f12c7588eee91824dd5abf6c3
RLBA-2022:8015
python-cryptography bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-cryptography-36.0.1-2.el9.x86_64.rpm
0325bc0114d7326f9207d2b890e937897d416fc9acb97a86ed5d6810f7628f29
RLBA-2022:8017
augeas bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
augeas-1.13.0-2.el9.x86_64.rpm
b4f129cb03300710d2139134f285a7b613c7cb9fd9f61bea7603dac8fa2cfecf
augeas-libs-1.13.0-2.el9.i686.rpm
e04e9fd643a881f9df23e36bfbc2c3959b483fdfdcb6fc2bc6472e738cdfe5f4
augeas-libs-1.13.0-2.el9.x86_64.rpm
0d0f8cdc9e961fde1577a5203f71db7640da59869a62a5de4fd7bb667d6f0bb0
RLBA-2022:8018
lorax bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lorax-34.9.20-1.el9.x86_64.rpm
4ecceef5f5ad62773431607fc2b6bfd98a73f6ce034713cb27c0122873e8cd80
lorax-docs-34.9.20-1.el9.x86_64.rpm
5d3987367ad06e214c622623da6cc7d07d50610e3c528c12ad18a1f90b67c67c
lorax-lmc-novirt-34.9.20-1.el9.x86_64.rpm
6f442aa7d619189764745a14f34cc1edc75ae3d36a727afbf6c9987d4fef3438
lorax-lmc-virt-34.9.20-1.el9.x86_64.rpm
8052d9c1d15b08e15099dcddf6556eb33e5da60e7196a1bee2bca1fd76719e62
lorax-templates-generic-34.9.20-1.el9.x86_64.rpm
be8e3393384c5db7ec2b02283d794e65a85b98e727b63d61b0c91bf783491d3c
RLBA-2022:8020
oscap-anaconda-addon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oscap-anaconda-addon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oscap-anaconda-addon-2.0.0-12.el9.noarch.rpm
fd5384db0a2d285cbe5457a291934c462543e5b5172b913b897b0146c66c4b6b
RLBA-2022:8021
qgnomeplatform bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qgnomeplatform.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qgnomeplatform-0.8.4-2.el9.i686.rpm
4b5b117d2558715ef1d18cd425555747f227bb6c0b5c0cffaa55da510eb9343c
qgnomeplatform-0.8.4-2.el9.x86_64.rpm
1246fc28de4856095b22cc825f3c427e45744bec87f4f476a44cbbf3a4b48454
RLSA-2022:8022
Moderate: qt5 security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qt5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework.
Security Fix(es):
* qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-5.15.3-1.el9.noarch.rpm
c39fef040a43baa7e9026cbaed0724adfca06ee9e078171bab817f2972228030
qt5-rpm-macros-5.15.3-1.el9.noarch.rpm
f8a3d9cbc578d0da895f387154042bbf35e1cdba5a5dbc9e4e3e6182238e0ded
qt5-srpm-macros-5.15.3-1.el9.noarch.rpm
39f47b9331907f8d26120e199684c714acbebc81b6dfe415769ba7ab0788a101
RLBA-2022:8023
qt5-doc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-doc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qt3d-doc-5.15.3-1.el9.noarch.rpm
b3556a302b304d46009f826c3e777f883dd1c1d246bfbc40f8b4cf00933bfd88
qt5-qtbase-doc-5.15.3-1.el9.noarch.rpm
94bd19050ca31afabd3c51c00026bae4db3ef3cf63f4bb9e4114949f85620629
qt5-qtconnectivity-doc-5.15.3-1.el9.noarch.rpm
214766b39b53ff4929a366bb5ed5e66d08a40f3ecc31289fb08eef80935dc4d5
qt5-qtdeclarative-doc-5.15.3-1.el9.noarch.rpm
8612bc82903f03f0e08202e059d26e57a2a4430a9fc09a82d640fd9250263e1e
qt5-qtgraphicaleffects-doc-5.15.3-1.el9.noarch.rpm
f261e70dc417f210e2293383cbbf5c16fe45f1d4a85cf4d10b10b99f0a86188e
qt5-qtimageformats-doc-5.15.3-1.el9.noarch.rpm
1e5f07f2a6f31415bd8ac4f00405981281af382cdd38e62dc8ba50259cde84cc
qt5-qtlocation-doc-5.15.3-1.el9.noarch.rpm
7286513229bf8a719eb643aa18390ec213529e97d77ddef11b10548085a6617b
qt5-qtmultimedia-doc-5.15.3-1.el9.noarch.rpm
eede390598ba9bdf93cadbe225445a7a6563296d79c9fa2fa6a4a0475a68564d
qt5-qtquickcontrols2-doc-5.15.3-1.el9.noarch.rpm
4405bf5cbd416e20f62fcf3933fa61d65dcdb80be01271182da1b75be0740434
qt5-qtquickcontrols-doc-5.15.3-1.el9.noarch.rpm
8c4d8b70b8ea468e3e76a85e452ce6fd4e8a6d6e3e6c44123b8f74380fdd6a17
qt5-qtscript-doc-5.15.3-1.el9.noarch.rpm
24da9173a89b9d98974721de74512d52c337803979235cceb26a6eabfcdfc65c
qt5-qtsensors-doc-5.15.3-1.el9.noarch.rpm
e4438bd2b520ee39ab0fca910bc11026aaf58e286cd692dcfc38758801c70c58
qt5-qtserialbus-doc-5.15.3-1.el9.noarch.rpm
cd780a3244d4d7af5ee419ca2bc5f63b71f9574351b067bbc19b5d1b6949bbf5
qt5-qtserialport-doc-5.15.3-1.el9.noarch.rpm
e66e4e5aac0c9f3e211059639b9e33c836f2f2455cca9a0ca5fb621e8fda73a8
qt5-qtsvg-doc-5.15.3-1.el9.noarch.rpm
777be179df1b2df52be9f2af4ca13b3b9b5716dff86c78989329c5d41bf00fe1
qt5-qttools-doc-5.15.3-1.el9.noarch.rpm
62944d7e3ab4f532874d7d57fd24652ad4fb56671a259927046ad3d9e2d43b5f
qt5-qtwayland-doc-5.15.3-1.el9.noarch.rpm
1a0968b443a1a9aebf097abce7ef5e005d5717750f0ae172c361e6adf73e2a55
qt5-qtwebchannel-doc-5.15.3-1.el9.noarch.rpm
dec17c9313743e1df8d735f98f1a650ef7c58b01f525e487c60817717311f4c6
qt5-qtwebsockets-doc-5.15.3-1.el9.noarch.rpm
4607214d0a2cfa5feb6272fe5bc6d5e4d4d25469ccdf70e37040d71ed3f57721
qt5-qtx11extras-doc-5.15.3-1.el9.noarch.rpm
5c5c8e9c9f404346e918cb31cb50ab4992438417c46e765621b1340aa74fd708
qt5-qtxmlpatterns-doc-5.15.3-1.el9.noarch.rpm
566c57cd2ef171b82b9740f540e5a5137c4350f485dbbbb88bb1e8986b6e166d
RLBA-2022:8024
qt5-qt3d bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qt3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qt3d-5.15.3-1.el9.i686.rpm
73f2c3d3dc90c691fcbadc6dcee936236658f76e2cc4e931c3d57b4ec4564ec8
qt5-qt3d-5.15.3-1.el9.x86_64.rpm
509dc82dd85b25568e73e83dd7a21f8a387941596fd67b02a9b23c5dde1ec027
qt5-qt3d-devel-5.15.3-1.el9.i686.rpm
5c7aae2b8d242c6ce7c6ed3bf099df9e8bbae6957b8c5811aa0837d0a1f0134a
qt5-qt3d-devel-5.15.3-1.el9.x86_64.rpm
a462a937a3279fe2e58c81f864cdceebf5a48f1817d1958b35f9770b1b037e8f
qt5-qt3d-examples-5.15.3-1.el9.x86_64.rpm
c08342b8e1022e85d022d883ba22c0369cd90ae4f23c354e0d67ab112413edbd
RLBA-2022:8025
qt5-qtbase bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtbase-5.15.3-1.el9.i686.rpm
d870f29a05093ed8c7c7168764544825a8cf7f13d2919562d58f8cbad9436779
qt5-qtbase-5.15.3-1.el9.x86_64.rpm
bb0fa3dfdee57234132e94100751f1eecaf49741d0c888d939232431bc0a62bf
qt5-qtbase-common-5.15.3-1.el9.noarch.rpm
b7f8a1a2a84ca826a32f0c4b0772286ca8c9e931d1970dd970395f51bab931d9
qt5-qtbase-devel-5.15.3-1.el9.i686.rpm
e92f1f4a8b2f852fff5f4e5e12fb887085a369414a819737a40fcf0301bf1665
qt5-qtbase-devel-5.15.3-1.el9.x86_64.rpm
e51a6701c2b36a570bfeb52daecbea8de971ed485ad3004688d9cb4ba919a5f1
qt5-qtbase-examples-5.15.3-1.el9.i686.rpm
5994fce320d8aea8b4aa3df77511354ec89535b44ece55aa768e0d65fa851aed
qt5-qtbase-examples-5.15.3-1.el9.x86_64.rpm
a0392c36f7299563c5f04917b0bd9acbad38e4120fa0ecaebb5098116c8e3390
qt5-qtbase-gui-5.15.3-1.el9.i686.rpm
4a63702a587cab5171a78f86c7fd3a40a06ef0df9f0da899d76f7690c3ca7b50
qt5-qtbase-gui-5.15.3-1.el9.x86_64.rpm
5908f0a313cb4000864e3b30922409260a3271dd2dc414b04dabc092967d70db
qt5-qtbase-mysql-5.15.3-1.el9.i686.rpm
9500798c4759ce8b2400247b60461628ccc9e2e0acb50b7507733f33a44d2a76
qt5-qtbase-mysql-5.15.3-1.el9.x86_64.rpm
f16c6c98aa1d650160abe9986341987d4b3da1c2164b6a6cb7c8fa39585683a4
qt5-qtbase-odbc-5.15.3-1.el9.i686.rpm
4632476c41904d7582abdb3c6a09154e777c0f5b71dadcdd137191b62f9b867a
qt5-qtbase-odbc-5.15.3-1.el9.x86_64.rpm
5ecd8a3d00eea40cbb49657eba959c960176272b7beace5d613463168ae9143e
qt5-qtbase-postgresql-5.15.3-1.el9.i686.rpm
fa6fcd520934daba8ec1bcb6ecc542e050d2cb5d58859b069e8e11550177cd32
qt5-qtbase-postgresql-5.15.3-1.el9.x86_64.rpm
866dc2f8be3abcfd1294f18135cae22857b1af4419df02384619ef06c84c262f
qt5-qtbase-private-devel-5.15.3-1.el9.i686.rpm
b5d2231f8b8f58ade0985ddae4946cdaa7fe29a052759bd175616a5f0fe7777a
qt5-qtbase-private-devel-5.15.3-1.el9.x86_64.rpm
100b0bd9fa60b02e7b2b55b9dda0a02b098893947db85eaa465928b5b990c1f4
RLBA-2022:8027
qt5-qtconnectivity bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtconnectivity.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtconnectivity-5.15.3-1.el9.i686.rpm
802d33014ce9c28bd749d975912073b4bb58632ad97580d3e99991772c9eb6ca
qt5-qtconnectivity-5.15.3-1.el9.x86_64.rpm
a0930c3c2d3a2b41ea9112eee8ec4002cac16fc057e5e53772b0b5d07cd0a8ce
qt5-qtconnectivity-devel-5.15.3-1.el9.i686.rpm
5378f8591d76c4507ed0829e75049b122032aa86d236d654c3a1878e234c81b7
qt5-qtconnectivity-devel-5.15.3-1.el9.x86_64.rpm
3d44cc227506c139d8e27381ef18954ce8d6e6f0b0d65552ac4edcbc385072b1
qt5-qtconnectivity-examples-5.15.3-1.el9.x86_64.rpm
7d7640995e81b5bbd9f8d83436453343a53577acbdcae41519d73ad52ff81277
RLBA-2022:8045
qt5-qttools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-designer-5.15.3-3.el9.x86_64.rpm
4ce01af679692e6bf5c8a4f5bf1f01d31cc519d5e03b05cd82d007c297a2fc4d
qt5-assistant-5.15.3-3.el9.x86_64.rpm
efa0a9290ba1cd94ce039ca3c9e38c41aa5801b63d53b5f3351435de31c6a446
qt5-doctools-5.15.3-3.el9.x86_64.rpm
b18c9d827231b7f26fe911a28a64624155c554835c7b236c886396c365de0240
qt5-linguist-5.15.3-3.el9.x86_64.rpm
7369c677b9233e2605e927e0a021e73291f84b469f64ac254c0863f3b99be445
qt5-qdbusviewer-5.15.3-3.el9.x86_64.rpm
2f1fa20c14d089548f6b15361b4c84c24598ca368134f6d22411a8b97d83c3ea
qt5-qttools-5.15.3-3.el9.x86_64.rpm
69a251ae573fbbf055d2660e5d844372cc7949f4165b5045a1f96be2925e4e18
qt5-qttools-common-5.15.3-3.el9.noarch.rpm
2bdeadd79971b6b43faf3833ad88e1d70de58b4629d1546be737a0062589b9bd
qt5-qttools-devel-5.15.3-3.el9.i686.rpm
029b4722ab1d41375311542e23dcab6644d027add865a59845c758122b578ae3
qt5-qttools-devel-5.15.3-3.el9.x86_64.rpm
57f8f0039a1d0054df5097a72f775a7bc7d0602ed3565c307d00ed7b94d20f99
qt5-qttools-examples-5.15.3-3.el9.i686.rpm
b8da8c4a3f1d1d43e67538f3015b0e9db2727e0d9bd9b06b7d6f8084e1fd2477
qt5-qttools-examples-5.15.3-3.el9.x86_64.rpm
985e2934632db4172bfd86a0396104ea9c8bf2b22ab38adbe7b27ec5049e6524
qt5-qttools-libs-designer-5.15.3-3.el9.i686.rpm
b3db65cb59fd7e658166a262095de2c0ee2e910f4da8f13089ee9ead79ad25bc
qt5-qttools-libs-designer-5.15.3-3.el9.x86_64.rpm
40dcc5639acbc53b1fcde54dc6da5f709839bb3d8bdbf7dca377ae43298f43b2
qt5-qttools-libs-designercomponents-5.15.3-3.el9.i686.rpm
93ef3eb0fbe32f8cf6fd04455e6a4d5e5e7480e300ca47e168fe142652f6432b
qt5-qttools-libs-designercomponents-5.15.3-3.el9.x86_64.rpm
9fa09ddfcce3ff237858a0ed367cdd85eae34e1b30bfa4097f4429b4444899f2
qt5-qttools-libs-help-5.15.3-3.el9.i686.rpm
2a7be6e1b47035585fd161827a9ac405459bd305167119a18eb2363c6d4ffaa0
qt5-qttools-libs-help-5.15.3-3.el9.x86_64.rpm
86fa29f515c37c411a9646e37f1dd763dcac3883cf394a17942cdffdfef5db52
RLBA-2022:8026
qt5-qtdeclarative bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtdeclarative.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtdeclarative-5.15.3-1.el9.i686.rpm
eb1b60ba00b0832b4a9567a96b227d771a429a099d1b2757f9b028b5f6eaac89
qt5-qtdeclarative-5.15.3-1.el9.x86_64.rpm
6dd6ce59530a550de5bd2186fe46ab6daaba08fce3c4475614b949082268ad87
qt5-qtdeclarative-devel-5.15.3-1.el9.i686.rpm
0b142fcc6d6d9aa1e551956c6b5e14baedf83de57513d97d53c3d766e8fd3acd
qt5-qtdeclarative-devel-5.15.3-1.el9.x86_64.rpm
b7951169e6fcf052b205e9e84045b90d703d06f3e7fd84d9f86628b45d37c049
qt5-qtdeclarative-examples-5.15.3-1.el9.x86_64.rpm
1c8beee52a729d2996d74f62cd44b1d7312b9a06a653c1d220c241107a5f25d2
RLBA-2022:8028
qt5-qtxmlpatterns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtxmlpatterns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtxmlpatterns-5.15.3-1.el9.i686.rpm
c30dfc9a81f24e0be4c6b2acbfa346fda7105a100a0f75b44539d10e52b6f075
qt5-qtxmlpatterns-5.15.3-1.el9.x86_64.rpm
ea3c416df8543440ff746107e514adcd71628b12148b863a7c427c9c5dc3e35b
qt5-qtxmlpatterns-devel-5.15.3-1.el9.i686.rpm
73314e2a180a4ade9e68ff7ff765537b4e1e3af389132a3035ed76254b4f9172
qt5-qtxmlpatterns-devel-5.15.3-1.el9.x86_64.rpm
8bdf6d8e57944c2072a59c2e7ba7e8f734af7bb389c43eac63d5d1e9d007a350
qt5-qtxmlpatterns-examples-5.15.3-1.el9.x86_64.rpm
967e8e49735edd25c06924bde88f9e157d562d5124a40272e3957a7cb8c0a917
RLBA-2022:8029
qt5-qtx11extras bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtx11extras.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtx11extras-5.15.3-1.el9.i686.rpm
99bfd791eeb20bc40bf626052627419364c42098573a0ede3335852327f394f4
qt5-qtx11extras-5.15.3-1.el9.x86_64.rpm
e2c070f89f2dff6c2033b0751cf3495d68f8d1a5638226d25381bdd1e2056ab8
qt5-qtx11extras-devel-5.15.3-1.el9.i686.rpm
33b7d98b71e9cd760a6468e86f1167eaaaf69ce4cd1605bb38a6807be769717a
qt5-qtx11extras-devel-5.15.3-1.el9.x86_64.rpm
ff47959fb8406ccafbd90ef3c1d8fb7ac1664bb594d9400f24b0bebaed662ee3
RLBA-2022:8031
qt5-qtmultimedia bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtmultimedia.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtmultimedia-5.15.3-1.el9.i686.rpm
8ead89fa7e809b49928ee94edad863e46f69641a6457aedd547a806c511cd4b1
qt5-qtmultimedia-5.15.3-1.el9.x86_64.rpm
a51f5a6a20d4bfc52373a82a8af53743dd6990efd8e2d85fcd8a5c41f3fdf74a
qt5-qtmultimedia-devel-5.15.3-1.el9.i686.rpm
ea1611e7b73a55f98dd0fa22aee18098190676097d11b1dae38152259a775ad3
qt5-qtmultimedia-devel-5.15.3-1.el9.x86_64.rpm
de2897579df9ecfcc25ffd7460056b0b4944064bcf1e4a5241996f43fea1db37
qt5-qtmultimedia-examples-5.15.3-1.el9.x86_64.rpm
6b5deaf459bfce9084b34be6c124c29003d1c6bb163175c77b4d6b6395090178
RLBA-2022:8030
qt5-qtlocation bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtlocation.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtlocation-5.15.3-1.el9.i686.rpm
fcf0341c49c46bb6682fb67e5ff66f404ea694dfe414fb1dcb6dd70d80f0a548
qt5-qtlocation-5.15.3-1.el9.x86_64.rpm
0992ea8582c426f36d91cca6fcfbfc8517c8048030d50aab63da582db42b980d
qt5-qtlocation-devel-5.15.3-1.el9.i686.rpm
14da2dcfb69517e8dc1b25947eeea0060b8d4d2825d7f9c41ac0e2bef42121fb
qt5-qtlocation-devel-5.15.3-1.el9.x86_64.rpm
7db45d25b1f5a502166107db19044445c82f01913b10a13594cc89cfa4234505
qt5-qtlocation-examples-5.15.3-1.el9.x86_64.rpm
ff2bd0e522f802d2e4fb63e13800c61259774d772fff9095c923b69bac5e8010
RLBA-2022:8032
qt5-qtwayland bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtwayland-5.15.3-1.el9.i686.rpm
fc418493920ac8536961c1049384f2013b5758a7dc0a3d6866012bff63b52dab
qt5-qtwayland-5.15.3-1.el9.x86_64.rpm
2a87ff164ee68e58b70d0b7755d10c3b8a5b71d3f07c868f3e842e4bdd0efa6c
qt5-qtwayland-devel-5.15.3-1.el9.i686.rpm
75fae79d0bec1b0fa9b0f96893478fb1f85824dcd73a67be1bfa1dda352fc509
qt5-qtwayland-devel-5.15.3-1.el9.x86_64.rpm
2b0218953b97e573c37f266143289354a36bf5e7c4cac8e39f4fb76f923a0126
qt5-qtwayland-examples-5.15.3-1.el9.x86_64.rpm
c44da717e73949605bc8a56e2fc838a2e46ebca777abc25433c469ffdf0736a4
RLBA-2022:8033
qt5-qtgraphicaleffects bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtgraphicaleffects.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtgraphicaleffects-5.15.3-1.el9.i686.rpm
c424ebb4f814332c03f764f7c5cddbc5af0b71f48d77554effc4027c1d6564d5
qt5-qtgraphicaleffects-5.15.3-1.el9.x86_64.rpm
9dc4742fe2e7958a04dd2eb9f9b348ac41d9609acbdfe32dc71a57398d6652f0
RLBA-2022:8034
qt5-qtimageformats bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtimageformats.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtimageformats-5.15.3-1.el9.i686.rpm
4f440f90cf53d95161f4d57fb9d425eeef99ccd78a41b90a3bc50bb653c52b94
qt5-qtimageformats-5.15.3-1.el9.x86_64.rpm
4a7cdde976e920f4a72ece1abddfafaaf16be9ef0e95f1d2ce03a4eacf2d3b06
RLBA-2022:8035
qt5-qtquickcontrols bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtquickcontrols.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtquickcontrols-5.15.3-1.el9.i686.rpm
bc6aaa6d1a6dac31b0bafeaa38e54fe6023b522b04c3552b633cf6f740d3aaf5
qt5-qtquickcontrols-5.15.3-1.el9.x86_64.rpm
b213558e5f718bd4b84d36ad38f52159cacc48be8531fd0892bb22999eb60b7e
qt5-qtquickcontrols-examples-5.15.3-1.el9.x86_64.rpm
1f62280eeeeec3599a5224c308153b489886ddb55d341a75b309281f6c2a4cc6
RLBA-2022:8036
qt5-qtquickcontrols2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtquickcontrols2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtquickcontrols2-5.15.3-1.el9.i686.rpm
afa65c8f568351d7b4faf854518cfeb7e79cdc3388f779295730f2d0338ab233
qt5-qtquickcontrols2-5.15.3-1.el9.x86_64.rpm
048cca133b6f77dae2356d81d4c5c000cebae8e8109ef5c75566b55d68907118
qt5-qtquickcontrols2-devel-5.15.3-1.el9.i686.rpm
f0ae49ff8e43b17ef1af7d97990b58fa356da15ffa70d49849b75aaf398f19dd
qt5-qtquickcontrols2-devel-5.15.3-1.el9.x86_64.rpm
b491d4b0e3699e80b4a1d71478effc9b934dbd2bc1d18dcc2cda33e2df6b6668
qt5-qtquickcontrols2-examples-5.15.3-1.el9.x86_64.rpm
f213bc3014329dca545d29831885733645745afd45c6df2a5059c70b995c244b
RLBA-2022:8037
qt5-qtscript bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtscript-5.15.3-1.el9.i686.rpm
70e07def441f391b6cdf45bfb223f4ec8c3c6a019a72b35382c38033ffa4f62c
qt5-qtscript-5.15.3-1.el9.x86_64.rpm
9d3331da578e2e2d94efe9d259bae346536e8fdd1946d9788529a25a32d8285a
qt5-qtscript-devel-5.15.3-1.el9.i686.rpm
b90cf3b4fd9242fdbd61588247059a9ed3a736004c77fa0d1b6ba0303d2d697c
qt5-qtscript-devel-5.15.3-1.el9.x86_64.rpm
f5dacf6a3dd9ed5d1823e3ae5a9ce58161f304ead63fca34a990e51ca66c92e0
qt5-qtscript-examples-5.15.3-1.el9.x86_64.rpm
f7e0ce9cc4d5fe41995a0d9c35c0e10f51ffb51ba2728b84c75560ac2727ae24
RLBA-2022:8038
qt5-qtsensors bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtsensors.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtsensors-5.15.3-1.el9.i686.rpm
fec7bcc97b071712ea8608052327f64a221801a17edab539c67855d09d59b6d1
qt5-qtsensors-5.15.3-1.el9.x86_64.rpm
75cf4e933a8d6be5165e3da4b2480b833c9d4887be3c424fe08ff4df9f322713
qt5-qtsensors-devel-5.15.3-1.el9.i686.rpm
c2dd2a8fe839e5566298f142041bac2e6d72e6d0b5729e6526a891b676ea3a71
qt5-qtsensors-devel-5.15.3-1.el9.x86_64.rpm
cd77feb2ccfb3a8bebd4fab49e197f979817568c76cf2498eef57858c41fca5e
qt5-qtsensors-examples-5.15.3-1.el9.x86_64.rpm
710aa63f77c126e307f7f3d55c73550b7fd3686c0afc64c2c22ec13df5025ca7
RLBA-2022:8039
qt5-qtserialbus bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtserialbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtserialbus-5.15.3-1.el9.i686.rpm
2e107888b7d7ab9df53f65a5ee8a1ffb70f6a88a462b25f1dde7f44d81017a90
qt5-qtserialbus-5.15.3-1.el9.x86_64.rpm
a23331485282bd406861aaaa1437b745f6fe757743b5436aff9787c3d92cd907
qt5-qtserialbus-devel-5.15.3-1.el9.i686.rpm
6364950724b0e8c004f59dd8ecdeae33608fc249228db615534b316707a28df2
qt5-qtserialbus-devel-5.15.3-1.el9.x86_64.rpm
16948d8b448a124db092e472736ab7dfca97b6181c5d85da63de8c7edcd18cf9
qt5-qtserialbus-examples-5.15.3-1.el9.x86_64.rpm
5510d5999ac960337d1c3fd0a3a4b6bc3af5700a1e7861bbb1a47b336667be2f
RLBA-2022:8040
qt5-qtwebsockets bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwebsockets.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtwebsockets-5.15.3-1.el9.i686.rpm
70ce8fe626acfd069e873bb2fd773cc0d7e9107797789916dd3a9707d58d728c
qt5-qtwebsockets-5.15.3-1.el9.x86_64.rpm
2755afef17a300b86b577919e2963ce715e99f37b98736c264bdb06714b64af4
qt5-qtwebsockets-devel-5.15.3-1.el9.i686.rpm
338417363bdf761d176b18793a99fa07dd258d17957c08ee56f0c8745cf1332a
qt5-qtwebsockets-devel-5.15.3-1.el9.x86_64.rpm
65fb5e314775f4aceeab0000b77148b1addfd613c21930c338c4d4cf63b21b27
qt5-qtwebsockets-examples-5.15.3-1.el9.x86_64.rpm
9c38fde54d0aef1cd800f21b717564fdb07e16e2aa045809f604640cb4b26b16
RLBA-2022:8041
qt5-qtserialport bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtserialport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtserialport-5.15.3-1.el9.i686.rpm
68aa0cf70713a2b5ed2ac651e42b2afcfa5a06182619ba5347ebc537cb7697e6
qt5-qtserialport-5.15.3-1.el9.x86_64.rpm
e99511468f32805b64e15e1f57eeb2ba3bb53ce67847fd5bb2626373cce52da1
qt5-qtserialport-devel-5.15.3-1.el9.i686.rpm
7ab175be1de666cf53669b14aad77e60153111d9c9bed29ee3fdd69f0dfe1dff
qt5-qtserialport-devel-5.15.3-1.el9.x86_64.rpm
1c258517fead6071ed07875ddfb23ccfec98d4c4929063a0baf4ee60a7daea34
qt5-qtserialport-examples-5.15.3-1.el9.x86_64.rpm
a721aea2a8cdbc75d1d452b31ddf6ff5d3e6e6f737d2dba3f2e34e6f495bd379
RLBA-2022:8042
qt5-qtwebchannel bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwebchannel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtwebchannel-5.15.3-1.el9.i686.rpm
8b414744cfea9a4f93c168dd88643eb3724942f730764d2ec2b882fcb68142dd
qt5-qtwebchannel-5.15.3-1.el9.x86_64.rpm
c6d5f79f34bcaa8209af09c06f053af85872ecdae783eeaef158aa117eebb0ae
qt5-qtwebchannel-devel-5.15.3-1.el9.i686.rpm
72c0cce5754facc935f8b5a85a8d9ad0a329877e7f3451fff49a9fd7e49f702c
qt5-qtwebchannel-devel-5.15.3-1.el9.x86_64.rpm
7e8fc33cf0ea0e1ebc875eef89af3bbebe3867062e89246e99dfb55175437ffd
qt5-qtwebchannel-examples-5.15.3-1.el9.x86_64.rpm
97b3c4abbe2e2b4c7727306b6265e41d1b6e6366f49a82fce6ebe85ca01629c6
RLBA-2022:8043
qt5-qtsvg bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtsvg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtsvg-5.15.3-1.el9.i686.rpm
642e25610d94d7796c2c491f93c4ee75d712d0cdcb0d771d6ec3de0a73e9cbf9
qt5-qtsvg-5.15.3-1.el9.x86_64.rpm
c927686c41ba6c9a559dc66224b41f5548a060c414ea52c31962c64c5182c44d
qt5-qtsvg-devel-5.15.3-1.el9.i686.rpm
c85fdb3a7b4854aafb867f9525dc479bd8b606adff0cf7296fbcbf0e8355fd4a
qt5-qtsvg-devel-5.15.3-1.el9.x86_64.rpm
b3a133846e56ffebd0d677348832c0e64babb4ef95a91e11b74b336b70308f5e
qt5-qtsvg-examples-5.15.3-1.el9.x86_64.rpm
f38f5352627464dd94971c60eae433b3fe312d1e3b2900326a341315012914e7
RLBA-2022:8044
qt5-qttranslations bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttranslations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qttranslations-5.15.3-1.el9.noarch.rpm
cc91c751c585b26969d7ab213b11a7a686d7b0e2d6db4e683c8d46930582e42a
RLBA-2022:8046
sip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-wx-siplib-4.19.25-1.el9.x86_64.rpm
ce9c05e384c0cad52c5a77a3c768edb51076b51cee0ee3bca4a2d17e64a503ff
RLBA-2022:8047
python-qt5 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-qt5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-qt5-5.15.6-1.el9.x86_64.rpm
4ae49a2b238fdf09946943c50eb5c0c2d7e0e44acaad5c776884545fde5e5d0b
python3-qt5-base-5.15.6-1.el9.i686.rpm
00e814a9f223b2094f2e846650d30a36dd75f12785d0639166796658e609e002
python3-qt5-base-5.15.6-1.el9.x86_64.rpm
6c05805ae2171175a4f2f85c0d279fa6c887d6f5b039b461c3331114d70f729f
python-qt5-rpm-macros-5.15.6-1.el9.noarch.rpm
9c5c4f828db0187ab8a3f4c4e0bb11af7a80db9b05acfdbcf1d9d8d9b256b216
RLBA-2022:8048
adwaita-qt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adwaita-qt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adwaita-qt5-1.4.1-3.el9.i686.rpm
6b85dee08df8da9fb8a69af4c48441bccd4303bfd34d4048030d59819c21987a
adwaita-qt5-1.4.1-3.el9.x86_64.rpm
58b091e84bf8f2c7c9c1d012b15c73859f74cb311333fa67a9566afb69e00ba9
libadwaita-qt5-1.4.1-3.el9.i686.rpm
3c6efd06c64f9090af17987a3963514b7d0c4fb68a0d73eab44ce384637f36ed
libadwaita-qt5-1.4.1-3.el9.x86_64.rpm
988445336d33692368b2b23aa7f77376ae10d9341f6231b4717b9f14dc56db6b
RLBA-2022:8049
qt5-qtdoc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtdoc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtdoc-5.15.3-2.el9.noarch.rpm
6d290aad6edc176a63157b18af2af8239e9bb304c7ea8ac01f8296e0bac0be7d
RLBA-2022:8051
seabios bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for seabios.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
seabios-1.16.0-4.el9.x86_64.rpm
8c5595150761c8d1bf01c988f84147b5d17159841e99a88a6b95a9763d706377
seabios-bin-1.16.0-4.el9.noarch.rpm
1bd39c37ea4d9094a080a9179c96f9099f797bb68b5793b876ef45d61133ccdd
seavgabios-bin-1.16.0-4.el9.noarch.rpm
2f35435b9344232b0508ac951f592516c65e6bb67b31d2399f52d097ba5c0e1c
RLBA-2022:8052
cscope bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cscope.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cscope-15.9-15.el9.x86_64.rpm
60a446e57d5a28ebdf9b7cabfe723c238ee6891e9a3855f63af16a64f5cf725a
RLEA-2022:8053
pki-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-pki-acme-11.2.1-1.el9.noarch.rpm
79d51c4e69efe1ec548ee8b00a42e64d8d7263758024f9ae15af8b9a11ac2086
idm-pki-base-11.2.1-1.el9.noarch.rpm
69cc6fd71502b65119229b2af34f072299f558597dfb0924a50f1f06ba9aa198
idm-pki-ca-11.2.1-1.el9.noarch.rpm
b9e8fd5a994b7751f6b57eb9bbf7ebf9809428ed2a092f248d203c1bee73eafe
idm-pki-java-11.2.1-1.el9.noarch.rpm
1dbe1c88a6f900d4cacc1fc2e9dbf97a965928d2c80a5c40fcc78dfb384eab3a
idm-pki-kra-11.2.1-1.el9.noarch.rpm
914c0fc70d8f715f56653b0142b0f99f0fd0dbb83ad3ea4f9c63e1ac7d848e13
idm-pki-server-11.2.1-1.el9.noarch.rpm
ce0891a211529ac8837b85431fe6e574376c53bd86bc1178a433fc977e5363c9
idm-pki-tools-11.2.1-1.el9.x86_64.rpm
4e4fb794ceda4b539e1fc52642ef7226e5ad3c9d6625a146992760f12f4bc51a
python3-idm-pki-11.2.1-1.el9.noarch.rpm
9589aabc7b71dcbc72c2d8e6615c606ac0bf43cdce88eb145a3b4dbe7baf9774
RLBA-2022:8055
virt-who bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-who.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-who-1.31.23-1.el9.noarch.rpm
784584efa81080071f9a7bc3d0ad45c4996f45b3f6bbc14d946f93b25ea03e1d
RLSA-2022:8057
Important: grafana security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055349)
Security Fix(es):
* sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* grafana: XSS vulnerability in data source handling (CVE-2022-21702)
* grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703)
* grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-7.5.15-3.el9.x86_64.rpm
48489bb532801d4939c30266186831da72e3ed7f9ff8a16847212ff292b1d0ab
RLBA-2022:8059
certmonger bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for certmonger.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
certmonger-0.79.14-7.el9.x86_64.rpm
1d2d4db2e7ca5825445517d187e51e1c0c3884222a8a9735939e728551ba219b
RLBA-2022:8058
dyninst bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dyninst.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dyninst-12.1.0-1.el9.i686.rpm
0b91cb0d77fb2e944f901be13cf095dc6588a609bf2ae74c78413ddb946a489f
dyninst-12.1.0-1.el9.x86_64.rpm
222d5b432f0a8a17386e56595cd0ffcb93768ffffbe584bf540961da73a2e67d
RLBA-2022:8060
mingw-filesystem bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw32-filesystem-139-1.el9.noarch.rpm
7011486c107e4902c3143bbcb63904b7f20dafff27a167b2e1be2eebf43994c8
mingw-filesystem-base-139-1.el9.noarch.rpm
e649616756623966b975584c95c99d3e681e57569ff5b69910b1477dcb9f4b3a
RLBA-2022:8061
mozilla-filesystem bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
RLSA-2022:8062
Moderate: unbound security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2087120)
Security Fix(es):
* unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30698)
* unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-unbound-1.16.2-2.el9.x86_64.rpm
6e358e56306b818a80f36b05ac87c1e74f0b86ddeba5eaa6a5849692ccfd9617
unbound-1.16.2-2.el9.x86_64.rpm
87e4b2205c21d1be493191351f8034d942ac07a66e2000d15f4703ef8fb7395b
unbound-libs-1.16.2-2.el9.i686.rpm
3d768c57ba4a56d38962867ce8c1d22f82388b5c95f3bff67e056a224cfb86d9
unbound-libs-1.16.2-2.el9.x86_64.rpm
2b424b32311280a433c0c8a0031c40102afc0eb28ea27bdf1b2c9759861fc860
RLBA-2022:8063
libva bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libva.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libva-2.11.0-5.el9.i686.rpm
f79d5b2eb791ad0c984282d72ff47c060e49112b7138257cf9828ce9bd6a18e3
libva-2.11.0-5.el9.x86_64.rpm
9b6a29b45d3e33f33d7bffe4e5575fc56cd6683a904450fc5f7ec63b690da1a5
libva-devel-2.11.0-5.el9.i686.rpm
e5301e9dd57304294efb2e709fae00cb6e5d879b8eba9354a6703dbc0107a9e1
libva-devel-2.11.0-5.el9.x86_64.rpm
5bc38651a705773d154ed75ad8410f7ebaf5cfa9e3266a4fd20c58db4c2c62eb
RLBA-2022:8064
xdg-desktop-portal-gtk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal-gtk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-gtk-1.12.0-3.el9.x86_64.rpm
b9bd575335d436c028319f671eab37777c24aa8e471cc233783fc727e4d66511
RLBA-2022:8065
sip6 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip6.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sip6-6.5.1-1.el9.x86_64.rpm
d43e145186c16cc8507db2f95beb10e4d7929f15f6fec8ec07bca7272f8b4123
RLBA-2022:8066
valgrind bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for valgrind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
valgrind-3.19.0-3.el9.i686.rpm
89e404809d28ee51579f127b5494ffcbb701630e306f2f8ab7c585d18482908e
valgrind-3.19.0-3.el9.x86_64.rpm
9c444b882b8aba8893096fcc4515807646ec2e0fe67e6fb8f7a4e638fdc02b18
valgrind-devel-3.19.0-3.el9.i686.rpm
63f90bb2db08ed6304928773ebfcb2fe36a4ea81ce4363c1b37f3f706e47881b
valgrind-devel-3.19.0-3.el9.x86_64.rpm
95c1a2b51d73f553ce41f7f63ecf34e72f10200a7954af2831fd6d14ee498ba5
RLSA-2022:8068
Moderate: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-5.el9_1.x86_64.rpm
86550a053b1b2ec69e703cc534c9e264cb2a9345556af643768757f1db6eee78
bind-chroot-9.16.23-5.el9_1.x86_64.rpm
2620e4ef1a59359f9ed1466e916c3283a8ed396f696ba7a3df82b2b17ce6804e
bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm
5528c1e593893f2129e52054b2a5f0c2479e9e82cf699a8dfc4a3866b06bd386
bind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm
3468f1174e597136269c81a5d5a5b7f903b980447136a2c7dfd71b8ac212af4a
bind-libs-9.16.23-5.el9_1.x86_64.rpm
63bd05687d7dd824cc3dc1327f1fcb351c83b243c7299d21ff16adaa523524a9
bind-license-9.16.23-5.el9_1.noarch.rpm
200eb5e4448c07184492f15a0b2380b9165609468b42d4eae0a7fff0a96ad51a
bind-utils-9.16.23-5.el9_1.x86_64.rpm
892e94833846474112aaff4b2640bfe4d03bd737d2e06157ea2932c7b162205a
python3-bind-9.16.23-5.el9_1.noarch.rpm
5ff82fa0977b486ce914a511698c095a498d8ede2fb67019c3f478758f852105
RLSA-2022:8067
Moderate: httpd security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.53-7.el9.x86_64.rpm
e262959dc5e4a257521a20ac25e1594875f554d519b8f6dd15d8a8aadde444bd
httpd-core-2.4.53-7.el9.x86_64.rpm
4dad1e1872e0c2508ed4ce3364545de31cfca689ee2d30c7f856bcaeff5ebfe2
httpd-devel-2.4.53-7.el9.x86_64.rpm
e7a7acef0858ec008543c34c53ced8fa995a0281c7c6055bd22cb841f47e07ab
httpd-filesystem-2.4.53-7.el9.noarch.rpm
aa3d1ee3ff8e4d7e5f74c869d8dfcbe1e737264d57342d30590988590a75aef0
httpd-manual-2.4.53-7.el9.noarch.rpm
39956eb02a68c53fec8ca038d7d5dbefef2f409a6003535eeef68a2a7dc3c2cc
httpd-tools-2.4.53-7.el9.x86_64.rpm
7135226a4cf998c4ff758ccb062f571c32044147c15a0c1522de1676e11f6845
mod_ldap-2.4.53-7.el9.x86_64.rpm
81eda6ed3b2ccca2a1c7b5f2f0e2b4fcc540a6d6a60fc0a0692b439bf719f32e
mod_lua-2.4.53-7.el9.x86_64.rpm
61880e543f2f9b4249241ff0baf4177d46bb1c832b529efa5411afe2f3d3c368
mod_proxy_html-2.4.53-7.el9.x86_64.rpm
3d8b5f95ee1f95fe0ab7e531361ac1c37d1632dca442f5e904e12ca059412072
mod_session-2.4.53-7.el9.x86_64.rpm
67cfa4c4f868e8b28415df65ea7f6e11330d5607645a86c23899a80a2b209cc2
mod_ssl-2.4.53-7.el9.x86_64.rpm
69ae6059fe9d4d89ddc913a147d414a0852a49e7368eaeb88ba4a96153735e2f
RLBA-2022:8069
anthy-unicode bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anthy-unicode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anthy-unicode-1.0.0.20201109-9.el9.i686.rpm
7baf60359794c166514f8465ae08dd4cfb8d0ac4de91c1766898a92d019bbb32
anthy-unicode-1.0.0.20201109-9.el9.x86_64.rpm
1a2f31e0745b82675ff318f873d78a7e1f6058929f96113d4f0d88270a114e6a
RLSA-2022:8070
Moderate: dnsmasq security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dnsmasq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dnsmasq-2.85-5.el9.x86_64.rpm
b9a534d64afe5bd1bff48b859a905ac0387519dfb4a8c3447168a6a4cfc6c178
dnsmasq-utils-2.85-5.el9.x86_64.rpm
911ec6e69e2fbdb3f939b7bcef5060e1efb552b8731c3fa0cb442041b4f6719b
RLBA-2022:8072
slirp4netns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slirp4netns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
slirp4netns-1.2.0-2.el9.x86_64.rpm
e3cacad672f5369a5f1a759d15a5e5e3fc8b511d51d3f720276a8a01ec867a06
slirp4netns-1.2.0-2.el9_0.x86_64.rpm
e22ca6482a3026204f0857880b187459d2773a4e594121c73191bd3706cb4697
RLBA-2022:8074
ansible-pcp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-pcp-2.2.5-1.el9.noarch.rpm
eb2087120965b59259b0a0892e70f5e09a6cbedbdf065fe394691f4d6a9510be
RLBA-2022:8075
systemtap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
systemtap-4.7-2.el9.x86_64.rpm
405d28f1002c5a2de35d3b0547c3e0a6ceff090d8c9af0eefae6db9728bbb73b
systemtap-client-4.7-2.el9.x86_64.rpm
1f87ef8fe12636c10e368d1617639f66c5d7ffcd9f53645bf07c80625eab0aac
systemtap-devel-4.7-2.el9.i686.rpm
221f7e2b0501b51c163f18cc2343b339a7b279e7749dbdd53d956580b9d2ce6e
systemtap-devel-4.7-2.el9.x86_64.rpm
1c5b07c7baa9163bc5ddb40e4fc365a4194236e87a3f8302268972fdd14fbce7
systemtap-exporter-4.7-2.el9.x86_64.rpm
c16fc0dc8927db561cce7eb1bfa21cec8054b04c5d43460339cd3c2b31b386bf
systemtap-initscript-4.7-2.el9.x86_64.rpm
9a14abf1afe2e1bf25c57d1be4f2453f86a3f8b1802f53e79b95c0d2a99d6d1b
systemtap-runtime-4.7-2.el9.x86_64.rpm
3ac728aec765f272f1b1abf932d0d0506de74b8ead4eac159b1bdfc7b2914fa1
systemtap-runtime-java-4.7-2.el9.x86_64.rpm
295617c5388e401a2283987b6adb2f82b6bfd905a401f6d00a7af3018abdef1e
systemtap-runtime-python3-4.7-2.el9.x86_64.rpm
89d269455660abdedcc282de9f592aab6644fbfcec3304554c7ae7649742f93e
systemtap-runtime-virtguest-4.7-2.el9.x86_64.rpm
561e94aa6f580b6d0ed60f4030c52180ba41b3e7d3b4a9d7b8099d3d11bb06ee
systemtap-runtime-virthost-4.7-2.el9.x86_64.rpm
2c0cf1daef9e1b1cf02fb944a7141470fef95c80647f2f6b63bf10f1e07beec5
systemtap-sdt-devel-4.7-2.el9.i686.rpm
87fc3bd51514c5edb1bd4aad4db399873172e89966bfa5d0bd4f2066751f94dd
systemtap-sdt-devel-4.7-2.el9.x86_64.rpm
62f34478649dcd7eff655b2e75f57ece6976d9f43ce2c64a5a5eb5de685390f6
systemtap-server-4.7-2.el9.x86_64.rpm
85655b99f141a2e0cb8aaf3e596e326befcf00f2ed893e6da7ffdbb50a4cc31b
RLEA-2022:8076
rig bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rig-1.1-6.el9.noarch.rpm
b13374b76eebe5eb1caf79526d7b54cf2a96ced5c23bba66c214a049af3481f0
RLBA-2022:8077
pki-servlet-engine bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-servlet-engine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-servlet-4.0-api-9.0.50-1.el9.noarch.rpm
985cabdb4510b5895c66f3966f7117ff64de5eac59c82ec4e879d33cd8869268
pki-servlet-engine-9.0.50-1.el9.noarch.rpm
467b31d4a1c87a1e0a7213597955df9029460f34cba29e985f9656b7db8fdd9b
RLSA-2022:8078
Moderate: flac security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for flac.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files.
Security Fix(es):
* flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c (CVE-2021-0561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flac-libs-1.3.3-10.el9.i686.rpm
3f2055313ca833cb0a0920ed3423656d9f9e5a12d3a72fc3e718f46e97223637
flac-libs-1.3.3-10.el9.x86_64.rpm
e91cebb7bd7e48b93a95aef62a4347b35a153c1a6b2cabb260760dd2701d1192
RLBA-2022:8080
smc-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
smc-tools-1.8.1-1.el9.i686.rpm
18a7feccf584ae7f666ca90ceb7daab4df1482172e3384fc11da72311ae46108
smc-tools-1.8.1-1.el9.x86_64.rpm
12226c7be26507055616a04d6e4e8ad8a1012dca1e64d9ebc4c982a3fa2e2da3
RLEA-2022:8079
whois bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for whois.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mkpasswd-5.5.9-4.el9.x86_64.rpm
818f5b9fa31ab596380cd767a0d266641a38b62140a7bc2629670083e16fdb61
whois-5.5.9-4.el9.x86_64.rpm
ebf6e357d17db0e63c26c505ac000db4f04a6bc2bbc70a78b34688db83672e34
whois-nls-5.5.9-4.el9.noarch.rpm
db1eaee40444c0208bd029d6e656b166bfa11cb7bf97b97e0cf85134d540598b
RLBA-2022:8081
open-vm-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-12.0.5-2.el9.x86_64.rpm
848780e2e5dc46929c586f2d5ea3ed3dda6d254c436545b2d2a06fa0813db7df
open-vm-tools-desktop-12.0.5-2.el9.x86_64.rpm
1984c9769452cc4646a247f81842f4bc9051df38db8b94ac961204de85df1acb
open-vm-tools-salt-minion-12.0.5-2.el9.x86_64.rpm
edffcb89cf7152dfd6435a51b5882a542aa4850fe4b3b34da238577e9f00611a
open-vm-tools-sdmp-12.0.5-2.el9.x86_64.rpm
a6217cc1b821456b9d1a6e42a2c62f5a153f0ff1735240bab5b0e7bcd0b12f2c
open-vm-tools-test-12.0.5-2.el9.x86_64.rpm
04462c0466451bd9aa14693cf0b963fe2e0438000d9e00409c1d6c03d6a123bc
RLBA-2022:8082
stress-ng bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stress-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stress-ng-0.14.00-2.el9.x86_64.rpm
b0b8d99f545678ce08855ebf48897a63abdc0a7c1a950c0a36f6eace9f9df8ff
RLBA-2022:8083
wireguard-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireguard-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wireguard-tools-1.0.20210914-2.el9.x86_64.rpm
34740923a5eec9612be07a1fa9ec295829e89323177585ce69e9b6273f1a82e4
RLBA-2022:8086
mingw-crt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-crt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw32-crt-10.0.0-2.1.el9.noarch.rpm
01409a9f8e5a5ab0d39636ba4b66ffa2f98c85aab9e4fde330bf81c13add37b9
RLBA-2022:8087
hexedit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hexedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hexedit-1.6-1.el9.x86_64.rpm
ef81ba195321df0668abd24e96af92815a0f76a4b98dbf7558f21b7daebf5e8c
RLBA-2022:8089
freeradius bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeradius.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freeradius-3.0.21-34.el9.x86_64.rpm
f33b09c96b838ae0d6b57ccccea9ee31c3de281a2f1cc5e9c825ef9c6583b604
freeradius-devel-3.0.21-34.el9.x86_64.rpm
066ede80cd168386aed64444f8fdb060c14766f7b0b700744d9fd1498d604608
freeradius-doc-3.0.21-34.el9.x86_64.rpm
a518a7218f3d519cfda981f2d8639b88aa8c1e9b065d664f890b6e211a4f6195
freeradius-krb5-3.0.21-34.el9.x86_64.rpm
a12b03a25bcfa99869a23e5ef0e8221f476dbf895e8cae7d68bef37c938e894a
freeradius-ldap-3.0.21-34.el9.x86_64.rpm
7f711c3b8d8d4346e607b703501d6aa2a4716eddbe7cebdebf88d863ad91fdf3
freeradius-utils-3.0.21-34.el9.x86_64.rpm
d1655a586dca9f38af9f28128ea24aed6ab3d42a02b67b0c2a7a9a2e3d47f12c
python3-freeradius-3.0.21-34.el9.x86_64.rpm
1a0114086f03b8c154ceaa671e9a39e7e7cedd9d2b4689eec4c041a9a1a55980
RLSA-2022:8090
Low: runc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
runc-1.1.4-1.el9_1.x86_64.rpm
a06c71f8d70df988d7821a0999b7fdc6d426bdcd45e9e421861730a5eb97a7a3
RLBA-2022:8091
zenity bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zenity.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
zenity-3.32.0-8.el9.x86_64.rpm
7937b3e953976660518b75671ead4057d5da92df1b58985c9b7dc06983644a90
RLEA-2022:8233
nodejs:18 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-packaging, nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLBA-2022:8094
cockpit-machines bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-machines.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-machines-274-1.el9.noarch.rpm
db19c762872c7249d5c0f2740bf3ca15b2f5e3eb19c4226a183740285b5f1563
RLBA-2022:8095
crash bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-8.0.1-2.el9.x86_64.rpm
8f5c0dc2b2e29c9a27aa6743b86da9ea1a27764206c7901d199422f9f3c8a8c6
RLSA-2022:8096
Low: redis security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Code injection via Lua script execution environment (CVE-2022-24735)
* redis: Malformed Lua script can crash Redis (CVE-2022-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.7-1.el9.x86_64.rpm
d1e9d472152616a9ed7c5afa3a65d31eba457c8931c340270584ed7462408b48
redis-devel-6.2.7-1.el9.i686.rpm
b70047765d0e43fcd6dcccd1b5327b3d7ebe428b8c60d9adc70e482eee5b3717
redis-devel-6.2.7-1.el9.x86_64.rpm
ad399d9c692c02f6fa0f8b7a5c36547f1f034d34eb09ba852d9963d9d392c013
redis-doc-6.2.7-1.el9.noarch.rpm
e6058967d045d58fd5abd329601d5f10d762d6c0dc19a0904a9462d9683936d4
RLBA-2022:8097
osinfo-db bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
osinfo-db-20220727-3.el9.noarch.rpm
e33c652133b496d754e93679adebd83c92b03e5522b91e17990ebc89023a8201
RLBA-2022:8099
rust bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cargo-1.62.1-1.el9.x86_64.rpm
38782349338f704413a4e092b7a24f187a6c7fc42bb35792643c138ea50f0fac
cargo-doc-1.62.1-1.el9.noarch.rpm
f29ace2847bee75e097d591b39881d9fbcd53f574cb317470a4da5f12e538ea0
clippy-1.62.1-1.el9.x86_64.rpm
f9562d268c6e0336c0cb86894ad8e2136b4d57609d555856a747dc4f6a0fe3f5
rls-1.62.1-1.el9.x86_64.rpm
383bf337aa83c2be3882ca4916aa7f260018ea2624138713bb3c918476b629d3
rust-1.62.1-1.el9.x86_64.rpm
84ce4f76cd6b848265ebf8d5d98d011354d90b130b916ff61961127298ed2857
rust-analysis-1.62.1-1.el9.x86_64.rpm
9904151cabfc58e5edb72aa6dd3b548278bf395ec555e53dc5b3aa7ed036ff39
rust-debugger-common-1.62.1-1.el9.noarch.rpm
a9eff0f35e761dd1f2e022778d0d24ac2241e04eb86cac6b24cf311a719473c7
rust-doc-1.62.1-1.el9.x86_64.rpm
b046f4b4f3e4fefd4d262409d1168712a1faa1948ed69640f16aee259e22cc3b
rustfmt-1.62.1-1.el9.x86_64.rpm
2c9348db204164f4757f4d0fc97715d5e6002eefe0850a9e9cb7529d0a98f563
rust-gdb-1.62.1-1.el9.noarch.rpm
cc76abc8fce8fcd7054e8995119b23ffc50da6757d6334403ada27a79cac0fdd
rust-lldb-1.62.1-1.el9.noarch.rpm
161042401fc2d3c791a4bf9397b5adfd3b42443d29cf7b28b432efff158ca848
rust-src-1.62.1-1.el9.noarch.rpm
1c9b0616109b8184c0a320b824abc893b27be59190565cdf4a0b813d32f1cefc
rust-std-static-1.62.1-1.el9.i686.rpm
521b99d969e693af20f276b79ccac7eee6d44638a5d82647b34b318a3b382181
rust-std-static-1.62.1-1.el9.x86_64.rpm
1076f6b38be8e58b10b7486b74a3eaec2900e7b79493cd62f759ab9803c36ba7
rust-std-static-wasm32-unknown-unknown-1.62.1-1.el9.noarch.rpm
7f0292daf2ab2f29566976ae970d671f506e00af5b0831dd95eabc4c3292d79a
rust-std-static-wasm32-wasi-1.62.1-1.el9.noarch.rpm
901c16cf44b632b85d77ef9f442e46e7a2db448a9da6c8a6f4702a5b97d311f2
rust-toolset-1.62.1-1.el9.x86_64.rpm
6342b2348e4758473a173c06e1555123b9f007ba75405be95786f396226835bf
RLBA-2022:8102
waypipe bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for waypipe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
waypipe-0.8.2-1.el9.x86_64.rpm
799266e5764308d40d819cc7751023682328a27876454472572a15ec4cc52089
RLBA-2022:8103
motif bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for motif.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
motif-2.3.4-26.el9.i686.rpm
11e78acc01052c7cf025e164699c831c3fdaec684c509630ff204bc8bf7d3c20
motif-2.3.4-26.el9.x86_64.rpm
1ab12debc0b035bcd79878a1248338048d226cb19e4745999397c1e7b565ced1
motif-devel-2.3.4-26.el9.i686.rpm
cbdcf5582a033395dff6148a66751ef8812cb1124d20c9be3e85d205d70a16d2
motif-devel-2.3.4-26.el9.x86_64.rpm
6639a218320aa236d0647792fda7b304d1284de5d12d7c6085a93dece2196223
RLBA-2022:8104
evolution-mapi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openchange, evolution-mapi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-mapi-3.40.1-4.el9.x86_64.rpm
14b353eb1cd9387880d41d61f5913ba2f71462e0fdbb315c7816017e57f440ec
evolution-mapi-langpacks-3.40.1-4.el9.noarch.rpm
14b782e06c8d5b96445b30d289f42ce2ef98fd644ffebc67d359bbfdb2e9a013
openchange-2.3-39.el9.i686.rpm
f39f00372506fd2199a28f342dd97290baf59eabccf9ad91f3ac6e2224cbb61e
openchange-2.3-39.el9.x86_64.rpm
683fe2a1a19a79d433532034db48e049817a95a060d857b99c0a4ccfdefdc1cb
RLBA-2022:8105
python-rtslib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rtslib-2.1.75-1.el9.noarch.rpm
cb61cc1b08659c5a9e188dd3b235d68409a78a8b68d40c58cb1242e22c811bc8
target-restore-2.1.75-1.el9.noarch.rpm
1e6d0e3382703875fb33f4ddeeff009875657a38de1f53b4233e02d4794ae463
RLBA-2022:8106
power-profiles-daemon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for power-profiles-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
power-profiles-daemon-0.11.1-1.el9.x86_64.rpm
8f36c23f7d5c484cd7d4c09390ac8798f05c8012cd49fccb515195ccb6c17d03
RLBA-2022:8107
mingw-qemu-ga-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qemu-ga-win-104.0.2-1.el9.noarch.rpm
b1874c9c00b0123447a769f43c7fd44b9145deb80ba2945a5968b30514064181
RLBA-2022:8108
conmon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conmon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
conmon-2.1.4-1.el9.x86_64.rpm
a6e7d8da82c0800a146f7a1f9e580cf72869dba3b4eda7540cadb2ec34065d7d
RLBA-2022:8109
bcc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bcc-0.24.0-4.el9.x86_64.rpm
dc8664ff176b307bf0af1c044ac3a993c2e237e4e00992810e79b92f2fa91982
bcc-tools-0.24.0-4.el9.x86_64.rpm
cb454150fae77103a7a60411471e187bdde6486e01f524716bb53c3dc17c2ffe
libbpf-tools-0.24.0-4.el9.x86_64.rpm
61f948359838e0b24be6c055f6ee370d1e874a3199ad1767c85f1584a5c904cc
python3-bcc-0.24.0-4.el9.noarch.rpm
03fe2ea438665ff736d127b56b81110f1ecafe948ef365cd0dcd71aa7118fc4a
RLBA-2022:8110
bpftrace bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bpftrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bpftrace-0.13.1-1.el9.x86_64.rpm
c1ffc9d5a7b2a6221dd34f1d0e2cca7b4bd1ab1399740a2eb5a323f7d4950d68
RLBA-2022:8111
gnome-system-monitor bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-system-monitor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-system-monitor-40.1-3.el9.x86_64.rpm
07864250b47c17dcbf357d5d292f7a25f5232b078085cd5a456010a0402f1b1b
RLSA-2022:8112
Moderate: frr security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for frr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.
The following packages have been upgraded to a later upstream version: frr (8.2.2). (BZ#2069563)
Security Fix(es):
* frrouting: overflow bugs in unpack_tlv_router_cap (CVE-2022-26125)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
frr-8.2.2-4.el9.x86_64.rpm
2f53bb26753db000765f8b9320cfdaca605c3727d752f40dfba5a0e55207e6bc
RLBA-2022:8113
ipa-healthcheck bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa-healthcheck.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-healthcheck-0.9-9.el9.noarch.rpm
8541de466c5dd605fda1125675f85ecebce5d6051e6ff97a9724e72d89f3cab8
ipa-healthcheck-core-0.9-9.el9.noarch.rpm
98df424d011891e82f3d5f2d85df24ff35384a786569720201e644697d01dcdd
RLBA-2022:8114
container-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
container-tools-1-12.el9.noarch.rpm
0c92d1a4b4e3662a5974da9674904d0dc487a32b266a893c947ce0e707b2f39f
RLBA-2022:8116
google-noto-fonts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-noto-fonts-common-20201206-4.el9.noarch.rpm
31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd
google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm
bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7
google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm
beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb
google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm
8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f
google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm
c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313
google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm
1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9
google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm
113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0
google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm
a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d
google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm
f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3
google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm
9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579
google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm
574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802
google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm
b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba
google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm
d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8
google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm
bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17
google-noto-sans-fonts-20201206-4.el9.noarch.rpm
28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a
google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm
b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a
google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm
66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48
google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm
5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce
google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm
870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6
google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm
bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953
google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm
a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e
google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm
91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91
google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm
46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f
google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm
1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb
google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm
019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3
google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm
d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c
google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm
ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761
google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm
6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899
google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm
a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b
google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm
d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f
google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm
bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902
google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm
f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba
google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm
bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3
google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm
2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e
google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm
e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420
google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm
ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d
google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm
6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f
google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm
de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e
google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm
df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d
google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm
34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c
google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm
e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137
google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm
387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3
google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm
f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b
google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f
google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm
c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd
google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm
5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35
google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm
46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730
google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm
99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b
google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm
9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7
google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm
525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da
google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm
b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51
google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm
866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334
google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm
0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c
google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm
ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd
google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm
ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911
google-noto-serif-fonts-20201206-4.el9.noarch.rpm
310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7
google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm
254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f
google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm
c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2
google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm
c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d
google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm
fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183
google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm
b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e
google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm
98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b
RLBA-2022:8118
libblockdev bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblockdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblockdev-2.25-14.el9.x86_64.rpm
ec232ec19afc58e1830670fe3d043c1edc64b460571f01cc3ec508c945c7fd52
libblockdev-part-2.25-14.el9.x86_64.rpm
0c2406d943f71a92802b7d3403b0e3717d3459596f5b81edb5a2ce18e059da51
libblockdev-2.25-14.el9.i686.rpm
9105906eba8323f6456921e6bace978a48063fd12ac9435dd83fed48edb8829b
libblockdev-crypto-2.25-14.el9.i686.rpm
45bea335a2dffd88940c1832aabdc0c333ecf8518d28b1a39c362583d47801b1
libblockdev-crypto-2.25-14.el9.x86_64.rpm
de53c858b244a62438f5303b8e78fc3995be020c4d06eff5fadcf056241b33db
libblockdev-dm-2.25-14.el9.i686.rpm
5e1c0b1cfcececef1e3fa5361c9b31a35f69a1c5279663f22793d71a84ef49f7
libblockdev-dm-2.25-14.el9.x86_64.rpm
9be4d629bc8b90a0650bf8c65d26d0f200f91e2d89cceff9d4c044562944915d
libblockdev-fs-2.25-14.el9.i686.rpm
a97b20468f86b3a2bc3f5ba69b7bb53bea69729fac0f8091c8a7dc32e1dcc615
libblockdev-fs-2.25-14.el9.x86_64.rpm
120fbf5e7c0d48ebdead9c4e197e167353c43653ecddbc523be75808f73028b5
libblockdev-kbd-2.25-14.el9.i686.rpm
16c1b7e5c50960eee5d6112ae0988450a174eb2eaa7e15749b80fbe72f0dff7e
libblockdev-kbd-2.25-14.el9.x86_64.rpm
c1862d8c9141a7bb6f63d31191c2d5154f8edebe8a38f77247e44224a9a2ee84
libblockdev-loop-2.25-14.el9.i686.rpm
39147b8c5bd821dd557726f00c9f44e307fa18c3f0ed01d4e8260914ac9ba5fd
libblockdev-loop-2.25-14.el9.x86_64.rpm
e33e7329a6d60ed8c62686fefa2355c12bce7afc2154531f7e5764f4fceba6de
libblockdev-lvm-2.25-14.el9.i686.rpm
a7b7fd5b521a27ddaad5954cd62deb8f7bd56e763d7127d6ed35be88631ab85e
libblockdev-lvm-2.25-14.el9.x86_64.rpm
1e8fd23e0a0935d634a1b62bcb69f264c154efcc6a430abe8a5a633d76938326
libblockdev-lvm-dbus-2.25-14.el9.i686.rpm
3f90372bfab81193adfa4b778b21537b2f414e7e81dbb1410a3b19f3b119fd8c
libblockdev-lvm-dbus-2.25-14.el9.x86_64.rpm
447652b82725bac308da9249850de8903e2567706e5e46813a5c631de96b55e5
libblockdev-mdraid-2.25-14.el9.i686.rpm
bbd533563566864ff91055114ad72840646e70715e52bbd7d8aedd576a740af2
libblockdev-mdraid-2.25-14.el9.x86_64.rpm
fbe0850dae89f3113eb994adc4f4b557e763da1922956d8ab9668e9f7a1e48d7
libblockdev-mpath-2.25-14.el9.i686.rpm
cb0e266ee38e13a24ae3d1cecb41072bc5fcd6458ecfb13576ace62470e322f7
libblockdev-mpath-2.25-14.el9.x86_64.rpm
b6729c29d14133a9fcd1e73b3ad863b135e2ef3fefa44b515f399e6e61855366
libblockdev-nvdimm-2.25-14.el9.i686.rpm
9d3e5ddfea4bb12db934ab22bb3d2ae24d18b0c38dd533c1769640910459b744
libblockdev-nvdimm-2.25-14.el9.x86_64.rpm
a6266b0f28a65a5df598f351a20b0f062ed1953019b416c31ae6e30d01a8d535
libblockdev-part-2.25-14.el9.i686.rpm
2e7cf2c39d7d71fb40ebf2dc8964c3a87df2a02776c6769010804f6ad6d3441a
libblockdev-plugins-all-2.25-14.el9.x86_64.rpm
f3a7b0f27c4bd20e2574980969a69a4791c7eddb135d61c6abfb61d2326a0bdf
libblockdev-swap-2.25-14.el9.i686.rpm
9d100419c7d0c547e12b51a9ef6fd5ea6d84411586a62b69833adf37bd6b6b01
libblockdev-swap-2.25-14.el9.x86_64.rpm
5f804df3e41ae229afe6b0b3af25e25801c980006a871dd68914e31c4b9902ea
libblockdev-tools-2.25-14.el9.x86_64.rpm
7f8ba82e67aaccb5fb1b3a18d3ad0ed908cfae877ab39b1544d269c6959d67c7
libblockdev-utils-2.25-14.el9.i686.rpm
2ab82d85f9041d1113286af43701b509f410618f03bb010bd10724400aa556f3
libblockdev-utils-2.25-14.el9.x86_64.rpm
4848de60b57b346810e8765b660c0a0c3a14cc07073e2ad5316147b05436c8ed
python3-blockdev-2.25-14.el9.x86_64.rpm
199fc9fe2d57d6e39a4aea72901ebdf3612787043e746a0d28bbc10747971ff9
RLBA-2022:8121
sushi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sushi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sushi-3.38.1-2.el9.x86_64.rpm
8e868297c7eeacf2b674a451909193d65d5b5b8b9d6df9c0a924021a4860c791
RLEA-2022:8117
Rocky Linux-system-roles bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rhel-system-roles-1.20.1-1.el9_1.noarch.rpm
b0c48af24ed0999f52c7b92900ff4bc4c31080c55966b9e9e27b9f0e4065916d
RLBA-2022:8119
evince bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evince.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evince-40.5-2.el9.x86_64.rpm
33c622b8ddbbd7999b2ff892935edc2cd729ed6dcfb27de58f0ce19afd7116dd
evince-libs-40.5-2.el9.i686.rpm
c6e323913035c40f9de8f21e1a7607e8bdfb2d500ecc2b3a686d78dd1e76dda7
evince-libs-40.5-2.el9.x86_64.rpm
83bad2f8c7c62550c1ccc905e5277fc137586b206a93745111f61c297116bce4
evince-nautilus-40.5-2.el9.x86_64.rpm
1a1876b9fd0edfa1fe42157be077b44e2d320e0107fb36d2cd564c172384ea69
evince-previewer-40.5-2.el9.x86_64.rpm
4a99f6f96b7f0c5325c6e103c4e998bc663bce14ffdbfa3b57cefd9141ce9162
evince-thumbnailer-40.5-2.el9.x86_64.rpm
7c35b3e9be1e36f0cbe874953f8ca64daa5628a8946918b26e50b128a8d54ce1
RLBA-2022:8120
hicolor-icon-theme bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hicolor-icon-theme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hicolor-icon-theme-0.17-13.el9.noarch.rpm
17372f87e2e2d00215a08ff5c0bcbd30bee9afd77dabc7f969fb996cac457c9a
RLBA-2022:8122
tlog bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tlog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tlog-12.1-2.el9.i686.rpm
06d30d348e0c13aa016482a5a8141ba2df7ec8b2acf9f35118d00257aa10ea13
tlog-12.1-2.el9.x86_64.rpm
78389853dbda96807df3edfff0579e46ae14f6c1790cec57de726939d51614e0
RLBA-2022:8123
python-wcwidth bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-wcwidth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-wcwidth-0.2.5-8.el9.noarch.rpm
44388fd11b95a5343ac1a2489532ecba5c5294247717aadeb47b2340d84f31ba
RLBA-2022:8124
stratisd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratisd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stratisd-3.2.2-1.el9.x86_64.rpm
f9a334e100be3ddb648cfd5cabf8b9e2609d461e328f3007609415ef325d71d6
stratisd-dracut-3.2.2-1.el9.x86_64.rpm
9c47aafb3657c38c12d5b846bfbd640c34bc3e6f520076ecdff581259ca4bcf1
RLBA-2022:8125
stratis-cli bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratis-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stratis-cli-3.2.0-1.el9.noarch.rpm
74a53e77fed71b3c8fc85369f48a7cc4b5a1fc18812a2397a2680f9046bd294c
RLBA-2022:8127
corosync bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for corosync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
corosynclib-3.1.5-4.el9.i686.rpm
08f828de0bc93e38adddca4a33e68935c94fe7eeeeafd4614b38b50951306f0c
corosynclib-3.1.5-4.el9.x86_64.rpm
e243d3ef9369bcce3e44bb51c65c093272f0ea214e0718c0bfbba1f60b363c5a
RLSA-2022:8126
Moderate: ignition security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ignition.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ignition is a utility used to manipulate systems during the initramfs. This includes partitioning disks, formatting partitions, writing files (regular files, systemd units, etc.), and configuring users. On first boot, Ignition reads its configuration from a source of truth (remote URL, network metadata service, hypervisor bridge, etc.) and applies the configuration.
The following packages have been upgraded to a later upstream version: ignition (2.14.0). (BZ#2090647)
Security Fix(es):
* ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ignition-2.14.0-1.el9.x86_64.rpm
8ef30fc7e278f7f5f38e5b225ccd4ef69fa890b6331a071e8b83241e71fb78da
RLBA-2022:8128
checkpolicy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for checkpolicy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
checkpolicy-3.4-1.el9.x86_64.rpm
34e4359abb6d4cbd9c76833f8f0111f64f3dca9f501ef408c216407aebd43d67
RLBA-2022:8129
papi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for papi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
papi-6.0.0-12.el9.i686.rpm
29e784eaf49749a1a01394d24e2e9b8a5ba845110e4d8a96241e45d40513f5ac
papi-6.0.0-12.el9.x86_64.rpm
5101b138e97a8481b3d4e9eb3003b6e6b960f4dbc67e22ce38f257b986ba4d8d
papi-devel-6.0.0-12.el9.i686.rpm
68cc829958782037044d782c0bdfa7a6dce05ec9b87bdf8566257a0dc43b402b
papi-devel-6.0.0-12.el9.x86_64.rpm
8a4f834b392aa5d1fdaefb5eee0d8c6e255969065aabe32d8c9f562dede2cc0f
papi-libs-6.0.0-12.el9.i686.rpm
8b21d28c3454375539d49d1b3c66913a8eb10cd4f5f14d1cdf15ca8c70712ba2
papi-libs-6.0.0-12.el9.x86_64.rpm
315b2961f0ccc8456984959c6706e2343a459043505431f24096bac88374b34a
RLBA-2022:8130
criu bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for criu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crit-3.17-4.el9.x86_64.rpm
b0d3a44deb3513b89013cba7d5b3cbaa734d55de596638e3b7f4466d66b257bb
criu-3.17-4.el9.x86_64.rpm
bbc9c1874678879c4d403170775cbb2d1153a50d01fecda5641db0bec891b6e7
criu-libs-3.17-4.el9.x86_64.rpm
a95784e8d647fef4f1c8d9bcda29077951ffb630b73551b5ba321ec5b8b77eae
python3-criu-3.17-4.el9.x86_64.rpm
0a256b8135e033393cc13cdc15242292daf687617c4018d583cfad98bc131388
RLBA-2022:8132
libgtop2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgtop2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgtop2-2.40.0-9.el9.i686.rpm
f91719fcb177f2c640484f1db38123bd0e43082e4d5237d6073d5ad55e7a8a18
libgtop2-2.40.0-9.el9.x86_64.rpm
5b5b2e4618a5a576afb265befe3ec5276791d4d01383c2367154dca4059611fa
RLBA-2022:8133
cockpit-session-recording bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-session-recording.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-session-recording-12-3.el9.noarch.rpm
7b479bd1ee05980da17af1e7c5ad0d90e7bd9bdb3ff0cad492650dd3e8b27585
RLBA-2022:8134
xmlstarlet bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xmlstarlet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xmlstarlet-1.6.1-20.el9.x86_64.rpm
e26bacf2fc510845611e89482dd688e97849710168b2d178be361cb24fe8b8fc
RLBA-2022:8135
python-pyqt5-sip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pyqt5-sip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyqt5-sip-12.9.1-1.el9.x86_64.rpm
9f11d936058f880263df80c6f230ae9bc35dd7864d35d85d345e2bb04ece580a
RLBA-2022:8136
squid bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-3.el9_1.x86_64.rpm
9e5017077840cbcb4c1d7c190f30c33c432bf81ba609a38ddaa2d2ef28804d16
RLBA-2022:8137
gcc-toolset-12 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-12.0-5.el9.x86_64.rpm
069ffd5abc88929cdcb296b732d20a33dd8e42d72c5b4b9550f41391015da11d
gcc-toolset-12-build-12.0-5.el9.x86_64.rpm
baa40298b58f78796dbd03ac4c9c44bb5b2ed865b24762bae5d54b6398e53fe9
gcc-toolset-12-runtime-12.0-5.el9.x86_64.rpm
e78d7b7ee0ac92420bbb966606deb3a5c33c96ef226aa77176cf5c93988eefb5
RLBA-2022:8138
pykickstart bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pykickstart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pykickstart-3.32.8-1.el9.noarch.rpm
f22736e2ed9afa86dac65c3f47c80a53698fb007e4a1a87a68edbc920d074312
python3-kickstart-3.32.8-1.el9.noarch.rpm
93ba5604ca07622511f8e406eed91469a4cd8856f88630c705f6038c27a862b4
RLBA-2022:8140
gvfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gvfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gvfs-1.48.1-4.el9.x86_64.rpm
1247ffc4409c42fb000d646fa303e26cfb311e5f46885bdea6d9dd46905cd029
gvfs-client-1.48.1-4.el9.i686.rpm
a585589031764f10c19cd9020f930eefb68e23b7a50e87515ccaabe75f9ec61b
gvfs-client-1.48.1-4.el9.x86_64.rpm
95dda415b751b9ad4ee25f1efd61444f4a281df25c6108f33c7e7308c44aecb3
gvfs-devel-1.48.1-4.el9.i686.rpm
2f564278a1e1b2f62fe9e05dea688f66c9b30d8fb6c4bd5db7a1c43862738b90
gvfs-devel-1.48.1-4.el9.x86_64.rpm
0d05239397aa8c74eb8613db193d5312fc3475befe89c42f0ebc2613a15ee4d9
gvfs-fuse-1.48.1-4.el9.x86_64.rpm
2a897cc17aed2261fc25c6a66fa48e2c806fa29c8d286dcab02073e6bde72f6e
gvfs-goa-1.48.1-4.el9.x86_64.rpm
a290d3acce55bbf330bf170ed85067eb1b02ab1a64fe119a86774d47ad875ee8
gvfs-gphoto2-1.48.1-4.el9.x86_64.rpm
0072263d41a2f7067d8dec84e92aebf27557e99077fc5d6120619e2feec8507d
gvfs-mtp-1.48.1-4.el9.x86_64.rpm
bdc9873cdedcdb46bd0b1fda3839149fe06d248614a9ccda92cbc3e689ff2710
gvfs-smb-1.48.1-4.el9.x86_64.rpm
3434aa9e33cd2c9a5de89fc8aa6f4081aa7e371083ebcbbd2e3ca47191a82d3b
RLSA-2022:8139
Low: wavpack security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for wavpack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode.
Security Fix(es):
* wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wavpack-5.4.0-5.el9.i686.rpm
390ef240ec337ca163824773612c73f3da9026b2b2bd9334c05e792e5150103c
wavpack-5.4.0-5.el9.x86_64.rpm
0cb9059f9475aed284b143b6e1075fa61ed0ec330c26fe4d14400663a10ee814
RLBA-2022:8141
libtpms bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtpms.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtpms-0.9.1-2.20211126git1ff6fe1f43.el9.i686.rpm
a979efc2ea3ceec51f355bf7889d557caa05c34112ef59f45b7d545665878664
libtpms-0.9.1-2.20211126git1ff6fe1f43.el9.x86_64.rpm
aece19397d1e86c41c2b834d567ee1f8086faf19378e89bcaf369132f395fa2e
RLBA-2022:8142
yara bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for yara.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
yara-4.2.3-1.el9.i686.rpm
ab4f91581e61679f0306e4a662849f559e0d6aad16d4aeb96eb07cbe1e3bb49f
yara-4.2.3-1.el9.x86_64.rpm
e35e26f6a439fa0de4cb34724af02d7563a5d2188bb6ae2c7d198f9f806b2d15
RLBA-2022:8143
jigawatts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jigawatts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This is the description of an automated advisory - please update
rocky-linux-9-x86-64-appstream-rpms
jigawatts-1.21.0.0.0-4.el9.x86_64.rpm
5da599eb894ae6fd64647434631f2f8987d3855906a29b0c6fe1eab48bd3527d
jigawatts-javadoc-1.21.0.0.0-4.el9.x86_64.rpm
d1dd381a6d43fe73a53a786491b1d1f1f40c8035c5df732779267b8e322397fc
RLBA-2022:8144
gcc-toolset-12-dwz bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-dwz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-dwz-0.14-4.el9.x86_64.rpm
d5818cd21e858306c982772a08ff1973f3024e19060a30431a1e9869049442b9
RLBA-2022:8145
gcc-toolset-12-gdb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-gdb-11.2-4.el9.x86_64.rpm
717724155d20a1d48e2e29dd504ef755d0374fb0ad627c873dd43aaab0437c34
RLBA-2022:8146
gcc-toolset-12-binutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-binutils-2.38-16.el9.x86_64.rpm
dad63b1fce07b6f45004195896293f3dc072847a7836a112ea720a6227c91cdb
gcc-toolset-12-binutils-devel-2.38-16.el9.i686.rpm
969219ccbce2e5fc63373317f9a777203e952f35ae4c3dffc29c62e545ee18c7
gcc-toolset-12-binutils-devel-2.38-16.el9.x86_64.rpm
9078b696d1d3d8024b50a9816adeaf150cda8e65f72eae811bbef016580c1c52
gcc-toolset-12-binutils-gold-2.38-16.el9.x86_64.rpm
e30ee2c6c0c98c44047c9934dd6fc277770305f9b17c7266ef99933a62012d7a
RLBA-2022:8147
gcc-toolset-12-annobin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-annobin-annocheck-10.76-2.el9.x86_64.rpm
c79f7f178d84ca99e5b5a24105b76ff39d2a3b7297fa05d3a70d00830d84080b
gcc-toolset-12-annobin-docs-10.76-2.el9.noarch.rpm
1f0f658f506bd3469cc46a9181062f2b21570ffe3391e17a0fd9596819991184
gcc-toolset-12-annobin-plugin-gcc-10.76-2.el9.x86_64.rpm
2f9d1b9c82d9cdc082d6d925da7c3d335daed50ca581db620e2f7feba0e89538
RLBA-2022:8149
redhat-rpm-config bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-rpm-config.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redhat-rpm-config-196-1.el9.noarch.rpm
24aecb7465b5b95d3857e62a0e412878350eac4678ba73cf14323c312b74d295
RLBA-2022:8150
go-toolset bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
delve-1.8.3-1.el9.x86_64.rpm
edf8ce12472e36dfc8992607b69e5b3855c7b421279e5c9680c23f87da1e8579
RLSA-2022:8151
Moderate: poppler security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
poppler-21.01.0-13.el9.i686.rpm
28afc670a3b7e8cae388e335bd4479bd3b207fa34dd50187ea41497fcba193c7
poppler-21.01.0-13.el9.x86_64.rpm
15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc
poppler-cpp-21.01.0-13.el9.i686.rpm
a5cdeba4f828085c569b3cfc88283e28ae624a8bb3b53f39daaa6c5e08c1b7f5
poppler-cpp-21.01.0-13.el9.x86_64.rpm
054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de
poppler-glib-21.01.0-13.el9.i686.rpm
925299930b6c054547c5d7729b127f000d92644d068d961600d22c1e2adac187
poppler-glib-21.01.0-13.el9.x86_64.rpm
b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40
poppler-qt5-21.01.0-13.el9.i686.rpm
f64c331de77920bcac93049337bbfc401a3aa954c944895167dde73fea7d77fd
poppler-qt5-21.01.0-13.el9.x86_64.rpm
ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163
poppler-utils-21.01.0-13.el9.x86_64.rpm
40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f
RLBA-2022:8152
adobe-source-code-pro-fonts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for adobe-source-code-pro-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
adobe-source-code-pro-fonts-2.030.1.050-12.el9.1.noarch.rpm
a2ae30876e45d49b94caad29fdc085e2f7b0261daf9c95a1540c2823988e3cce
RLBA-2022:8153
sblim-wbemcli bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-wbemcli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-wbemcli-1.6.3-22.el9.x86_64.rpm
b61d03b77ba83b3b7671697bb3302f4d6339424b2412d8b4412ce5180c08e819
RLBA-2022:8154
ansible-collection-microsoft-sql bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-microsoft-sql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-collection-microsoft-sql-1.2.4-1.el9.noarch.rpm
2f46e364529f6e0b54f48653d84ae555935302cbf8564474954e441ab851ba05
RLBA-2022:8155
nginx bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nginx-1.20.1-13.el9.x86_64.rpm
6b99ae591ad364a5543ef1ba624ccc4013688b1d1691f9fa42f147a2a4a395d3
nginx-all-modules-1.20.1-13.el9.noarch.rpm
a598f868f09baf5b1b6be644242975747e698ec66fac18741b1d76bed4d98ebb
nginx-core-1.20.1-13.el9.x86_64.rpm
d9427bd641fff3b6f4dcf42be7166090749c9cd51c226d400ad4ca9fc2aa1ddc
nginx-filesystem-1.20.1-13.el9.noarch.rpm
0ac0934c29f718f4605e79e87d9948ce844e08c9f3d1698fc2df23ce812ec668
nginx-mod-http-image-filter-1.20.1-13.el9.x86_64.rpm
e52687f8d3778d99507cacd3f5f64c6e28571806c02b4965b1e1648f2c177050
nginx-mod-http-perl-1.20.1-13.el9.x86_64.rpm
98941845b5b0a092c125c347d9fb803402d350f9ee37dc4eee2170b0c7bf1368
nginx-mod-http-xslt-filter-1.20.1-13.el9.x86_64.rpm
ab64d591f7c7a36f575b7571f1cf6ae23b8b3a904dce3480ce7a89e9b685af01
nginx-mod-mail-1.20.1-13.el9.x86_64.rpm
5cf54cfdb84b31b1fd161aea6d2cedfe79deef76f6892df5c8c35336088ad606
nginx-mod-stream-1.20.1-13.el9.x86_64.rpm
31e58cfe59c7366cec72fc5f38d85f2dd7cea5a830f785b6c23b42cb8356d516
RLEA-2022:8157
libdrm and mesa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdrm, mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mesa-dri-drivers-22.1.5-2.el9.x86_64.rpm
3ef571cb74688e6739894b4214ae070fbf464ab934fab148886e4329f2886ee8
libdrm-2.4.111-1.el9.i686.rpm
7f872affa17a92f0f35bedb7fe908049ca8446a2783ac0195400412f1ae45391
libdrm-2.4.111-1.el9.x86_64.rpm
9f0231776c4a5b9cb98417530227df7b87fb32423746d6080dc6df4d7b780cbb
libdrm-devel-2.4.111-1.el9.i686.rpm
492d9af6a953bc4046cd9a1e46dc3c2325573d2090fb02e6850578c4087bf926
libdrm-devel-2.4.111-1.el9.x86_64.rpm
8eaf1ec77ceac5c29010a05674aca47433b99954f8fa4c12270522c865a08acf
mesa-dri-drivers-22.1.5-2.el9.i686.rpm
49e0644b9fdf2a83b67563cad899f4269669a6b4b374919c9003c68fccfb2089
mesa-filesystem-22.1.5-2.el9.i686.rpm
6716361d661e98aa6d21dd404434c25ceed468d9caba872eff16a2d453b63881
mesa-filesystem-22.1.5-2.el9.x86_64.rpm
a447cad78cfaf8f8c5026f5617bd8f08e7a4698c5b30ffbacc99bd782bb70053
mesa-libEGL-22.1.5-2.el9.i686.rpm
a710056806c6f698789f9aacd66fc4f9e828e7f0f0e4eff5b39d3b31fdf52163
mesa-libEGL-22.1.5-2.el9.x86_64.rpm
410bc351f74f81a504a50df75db17bb11eb55c0a2adbdd947c4b88c638565199
mesa-libEGL-devel-22.1.5-2.el9.i686.rpm
2e480c3ee9e66fec8d81b96e0fd1a265ba64f6c51b2dc004a0f3d9de5c70ee77
mesa-libEGL-devel-22.1.5-2.el9.x86_64.rpm
b6a737bc98c4c68c6b8bd319328971e73a0747ce2cf32bcd0a692a90e29d9da5
mesa-libgbm-22.1.5-2.el9.i686.rpm
57f2a04c5af1f2fc37434327463e0a1c1ab676eb084055d738d7396825427229
mesa-libgbm-22.1.5-2.el9.x86_64.rpm
6f8546d7d4137b19cc530b9f50873004a6d9eba926b8e0f3752c11716c8126d6
mesa-libGL-22.1.5-2.el9.i686.rpm
bb5db03f778474f650894f0aa906483d3b1a10e19094426ef2f6d210f72c4c9b
mesa-libGL-22.1.5-2.el9.x86_64.rpm
0df365db3d3492e491293faf4c1eaace63aa65355213b370eb2760f2962b3e5f
mesa-libglapi-22.1.5-2.el9.i686.rpm
e8c37970035bd4c12e7c63e983250208a57f70e950ae8eb7b766e8e7e193d501
mesa-libglapi-22.1.5-2.el9.x86_64.rpm
7a62d3da4bd2aa45df8d9a30b528f3bf45e70b6c26e5bdafcea34f352c45a1fd
mesa-libGL-devel-22.1.5-2.el9.i686.rpm
e74db749455a6e774944de2670cff2999fe50b79300e46bacdfae7e922f5686e
mesa-libGL-devel-22.1.5-2.el9.x86_64.rpm
ea395d297e633ab23a305ec0893ba6ac20654aed45d64957ee535c7e0d3d8a3d
mesa-libxatracker-22.1.5-2.el9.i686.rpm
640de554b947a3971ad64c674fb92d1f30fba23ea93780136cd1003acaa81f5a
mesa-libxatracker-22.1.5-2.el9.x86_64.rpm
5db4e60e53b5be0a232549b650b923c22648df305541121dccafc7218f117ec2
mesa-vulkan-drivers-22.1.5-2.el9.i686.rpm
e90c3365d079d18f56838649ecbc9818c79dc72f8fed6c7a6d40771af50e7dbc
mesa-vulkan-drivers-22.1.5-2.el9.x86_64.rpm
351b33e09ee4b52778ce7de94950fe1791e7ddac3a20b8c7730cd3476ead94bd
RLBA-2022:8156
gnome-initial-setup bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-initial-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-initial-setup-40.4-3.el9.x86_64.rpm
e4a1a754630d196a70a040ac837fd77c6aeda12add337bb240273604f92eb9ae
RLBA-2022:8158
sdl12-compat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sdl12-compat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sdl12-compat-1.2.52-1.el9.i686.rpm
21e2d4045b6984c87679e4a97cbaadd0808cb86933d454b31d7fbe94658e779c
sdl12-compat-1.2.52-1.el9.x86_64.rpm
b155c876f6cbc1653cd85021dbf0722adb4b367888ed68eb748845d1e1ef4dd8
RLBA-2022:8159
lynx bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lynx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lynx-2.8.9-19.el9.x86_64.rpm
fb311eadc81278144d71ffe7c2b6779c26a250ec999733ba92347a049bd66334
RLBA-2022:8160
freerdp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.4.1-3.el9.x86_64.rpm
b324ad279b70861510278673ecc3dd75335ff66d9e4b87ae0f2c342c7c0df909
freerdp-libs-2.4.1-3.el9.i686.rpm
b6e677381d4f8ed46b90e69e00c1273d36e4c060f1dd1b933a8eaa07d50fba15
freerdp-libs-2.4.1-3.el9.x86_64.rpm
525944e88aa24c6be8527e5c4a42891891c92d8be22914d3a559802cb56c8a1e
libwinpr-2.4.1-3.el9.i686.rpm
3cd552f55a0178915dc69854f1567143ed3072fa860ab16d5853f5b0999b4b99
libwinpr-2.4.1-3.el9.x86_64.rpm
2ac6eac99b061ad260da0104b576120e563d2cb4d318e58fdd1546d3694fb05c
RLBA-2022:8161
gnome-control-center bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-control-center-40.0-27.el9.x86_64.rpm
e6d2f9afdc86938336580a8a11667134723aa12b690592df76302b875abefd70
gnome-control-center-filesystem-40.0-27.el9.noarch.rpm
684127af116dfec70a98c98fe216d90da936316866bf2bfd795e4098b4ef4b4c
RLSA-2022:8162
Moderate: 389-ds-base security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
The following packages have been upgraded to a later upstream version: 389-ds-base (2.1.3). (BZ#2061801)
Security Fix(es):
* 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918)
* 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850)
* 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.1.3-4.el9_1.x86_64.rpm
3b4cc6473ff5ac1392e616ec97e9443b1453e7d32e91fef6cdb0682be4956c36
389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm
2efe69bf5068be4b868b036e6e7a3871592b770688e24fa61604599fb37fe1a9
python3-lib389-2.1.3-4.el9_1.noarch.rpm
1e7a92e3e3888fc691fffb710723fb26275825319b3d2ef0384e4f7bc845e100
RLBA-2022:8163
libtimezonemap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtimezonemap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtimezonemap-0.4.5.1-12.el9.i686.rpm
6d538f6356694cad5f6f2784db14aacf6ac5e7a96c353595ca46515ffe61e453
libtimezonemap-0.4.5.1-12.el9.x86_64.rpm
f446a32d9f121b709415f9b778394b9e20d012904bc7c24b9d07850e878652ec
RLSA-2022:8832
Moderate: nodejs:18 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nodejs-packaging, nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.12.1). (BZ#2142809, BZ#2142830, BZ#2142834, BZ#2142856)
Security Fix(es):
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLBA-2022:8165
python-blivet bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-blivet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
blivet-data-3.4.0-16.el9.noarch.rpm
7ff48531205fa1ed8871f8d3ecbcb92c1042d5b9b52359ff6ff5681facce8c53
python3-blivet-3.4.0-16.el9.noarch.rpm
ea90e4e4cbf5338eb3e0ebecca93b1ca19ccc0bea135f8f3f3c16243d87cb77d
RLSA-2023:3577
Important: nodejs:18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-packaging, nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
* c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
* c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2023:4327
Moderate: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: schema_element defeats protective search_path changes (CVE-2023-2454)
* postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
RLBA-2023:4491
nodejs:18 bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-packaging, nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es):
* nodejs:18/nodejs: Coredump during --force-fips (BZ#2227918)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2024:0950
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
RLEA-2024:1138
nodejs:20 enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Enhancement(s):
* nodejs:20/nodejs: Rebase to latest upstream version (JIRA:Rocky Linux-21189)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLBA-2022:8166
virtiofsd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtiofsd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virtiofsd-1.4.0-1.el9.x86_64.rpm
839830a0aeab4fa39ff627035b9f64caace968d28315d8e0448fa91a52397377
RLBA-2022:8167
gdb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdb-10.2-10.el9.x86_64.rpm
bbe23d5fde66a4ae7ed4073caa1fbbac83dbf32e19d36a4de2948fd66da10c78
gdb-doc-10.2-10.el9.noarch.rpm
41b24e6cdf8edadef09a42d3a17ae7a05e5b6dbc2c74765df0508ba9ca308905
gdb-gdbserver-10.2-10.el9.x86_64.rpm
e6650f0730a69bf0f8eef55e199c0e0c4466a959d4b694126e270db3058e9908
gdb-headless-10.2-10.el9.x86_64.rpm
c0f6fd4349b441d40e3bcfb5326d92c53fe9ac1a23c0b475cd33b1c53e081fd6
gdb-minimal-10.2-10.el9.x86_64.rpm
47adb160ce09d6a5880286d9c8214c67592ca30a55b6978b6646cd60c4f5ba34
RLBA-2022:8168
fuse-overlayfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fuse-overlayfs-1.9-1.el9.x86_64.rpm
a1fd525022c9dd098f6fd4a6f8b0992a1703a09edc150e860b2f68b88ce89898
fuse-overlayfs-1.9-1.el9_0.x86_64.rpm
0fc694e7a8a1d452449d730ec4573bb96e8e5be99a98e8ee09e65dee164952e0
RLBA-2022:8169
pycairo bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pycairo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-cairo-1.20.1-1.el9.x86_64.rpm
b3ddbe8ce45710aab96976a9dae64958925cf2c2ad4c90cb1e38664e1fc11ca0
RLBA-2022:8170
nispor bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nispor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nispor-1.2.7-1.el9.i686.rpm
86c6609c0df5b810c31d1d7ec2e3b2f7b79bd5da863cbe91627555aa115e0006
nispor-1.2.7-1.el9.x86_64.rpm
14e8f0d959bc0ad63c533714dacffc442f9fbebc225e77a8aeeb899c341ceead
python3-nispor-1.2.7-1.el9.noarch.rpm
55727a20d5fabb52be4f132f88fbf337d3da937f1eb0bf51111db5b6c1e48e47
RLEA-2022:8172
libi2cd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libi2cd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libi2cd-1.0.3-1.el9.i686.rpm
10d70a77548056a1d5c0154143d22808355dafe6a0b2a03463aa3332b9eed9a9
libi2cd-1.0.3-1.el9.x86_64.rpm
8fa092ef4e81fc1645f36c5532571bf5c68d45077d30a232e0b27487534ecd11
libi2cd-devel-1.0.3-1.el9.i686.rpm
a9d19606a26c0290083f09ee738f3f9be396d84aa3aa8e36425a41b6ca44e39b
libi2cd-devel-1.0.3-1.el9.x86_64.rpm
4f4756c8626b1d3ade2699591e62684a16b5650a69d86b5eca844cd8efd52ff2
RLBA-2022:8171
sevctl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sevctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sevctl-0.3.0-4.el9.x86_64.rpm
5be0222bb330bfc1206c076084079f4c4d08bfa548c085c58f1fe85bf8fe27cc
RLBA-2022:8173
libgpiod bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libgpiod.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgpiod-1.6.3-1.el9.i686.rpm
b5112bfa1e5f3c33ef821b5f04636a0c4e8f1706932055881178c5955070b302
libgpiod-1.6.3-1.el9.x86_64.rpm
ac34238f945c69c3c1c3748f6f0ef509f06599796e126edaef0d8abf558269c3
libgpiod-c++-1.6.3-1.el9.i686.rpm
71641e3321fed8da4b4454f9468ffb2bbf23d80227e20e45fa7a58435117f6c1
libgpiod-c++-1.6.3-1.el9.x86_64.rpm
a90d6453a5fa3b184719369f4bbb4407442fc0ad9074db149ec80257f819dea1
libgpiod-devel-1.6.3-1.el9.i686.rpm
bdbf3753f9b3e564cf30987637d3822dec6c56797a1b9493d8b6c31a56da0ace
libgpiod-devel-1.6.3-1.el9.x86_64.rpm
c309dbb0d532ee27f119b6d0dfbadfb575da77fcfe225897d98e3a92efce693a
libgpiod-utils-1.6.3-1.el9.x86_64.rpm
1af76bb3d3e2f7b49948bbebf2684d8be30c9c97a826140bfdea79da33b1bd10
python3-libgpiod-1.6.3-1.el9.x86_64.rpm
87dc1dce492670381b40812a32f0885f69fe7848f9166715f1abcc703cba0539
RLBA-2022:8175
mptcpd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mptcpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mptcpd-0.8-3.el9.i686.rpm
0b593d3abf786dca50c25a44c44b1f52060570781dc74bea55521f46be637a0d
mptcpd-0.8-3.el9.x86_64.rpm
3720605296f5f179f39691619ac61de11cdafa8a8d903be2df23cb09091775dc
RLBA-2022:8176
ldns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ldns-1.7.1-11.el9.i686.rpm
502a935d5f630df45cfbfee0055f4e6dff4156c1d3ba9fea1088dfc41acaa9ca
ldns-1.7.1-11.el9.x86_64.rpm
8ef8279cc9755ac5947e0c5c72df6d420f52082879f9bf75a75d51daa3174674
RLEA-2022:8177
alsa-sof-firmware bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-sof-firmware-2.1.1-1.el9.noarch.rpm
11a8722a5699bc1eeca7991f10288cf0194e5ea3773aef2b6b883df0e4a13ffe
RLBA-2022:8178
xxhash bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xxhash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xxhash-0.8.1-3.el9.x86_64.rpm
a1a93b88a208341014a07b4e227ee8f63ad38f3cadd995530d28717de18630d1
xxhash-libs-0.8.1-3.el9.i686.rpm
46faf9996ebe875735141af9e7a412d2a3b8406b34a205d241b5fed38b01706d
xxhash-libs-0.8.1-3.el9.x86_64.rpm
7e3de1027fe3d3c0934ecfe927698b1f46cff9d0a2f8a9758ecf613b507f9a37
RLEA-2022:8179
alsa-lib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-lib-1.2.7.2-1.el9.i686.rpm
d8fb25ab92198ce8ad68938302056d3deee83da4848f85b7ec03b031d123e920
alsa-lib-1.2.7.2-1.el9.x86_64.rpm
84fdb9af40258397997eecb1f6a46000f03f1c6346787ba5b36517bc1111787a
alsa-lib-devel-1.2.7.2-1.el9.i686.rpm
ba6a5d9318e52f6115a401970e5479ba43367d1717756238e4cb017cf188e847
alsa-lib-devel-1.2.7.2-1.el9.x86_64.rpm
13dd2b2d59e669ffc48a2a7bbea625dcd9b56a0c0e1b81595917aa10c52c77b2
alsa-ucm-1.2.7.2-1.el9.noarch.rpm
58414314f567dfa4dfc60b2b53ae84ebb83992ae6734b1c7a839b9a0569419fe
RLEA-2022:8180
alsa-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-utils-1.2.7-1.el9.x86_64.rpm
1f6a516704a614ecbdf92042a997d18b08b032573c92866fead27b5bae4e5824
RLEA-2022:8181
alsa-plugins bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-plugins-arcamav-1.2.7.1-1.el9.i686.rpm
c1211f799d3d1d3a313716fa7de04d3072da36b0904ebc2a673adb0531fca2f0
alsa-plugins-arcamav-1.2.7.1-1.el9.x86_64.rpm
841441ec5727cdf32ac9fd0d621d81c31567139864569eda06a9e044f93ee3c4
alsa-plugins-maemo-1.2.7.1-1.el9.i686.rpm
4b8ceb4db90de830f26ea28716c120a562e2a31a003bdb2ea8fe680a2d670d29
alsa-plugins-maemo-1.2.7.1-1.el9.x86_64.rpm
171d59aa860a81a80f23e0514985fa49305629250b17fe67bfa34b5466171608
alsa-plugins-oss-1.2.7.1-1.el9.i686.rpm
ce8b869d93ffcf5469782de2e75bcdb73db5ebe00718dcaac7dd05c16264b54d
alsa-plugins-oss-1.2.7.1-1.el9.x86_64.rpm
8558a98367322574df923366f69607c5ff9b98d4133855dab56a8a284cac55c6
alsa-plugins-pulseaudio-1.2.7.1-1.el9.i686.rpm
311efca5973c39e98c72939f3183b108a24727b42c5a69ed28db2c813d390156
alsa-plugins-pulseaudio-1.2.7.1-1.el9.x86_64.rpm
f0306182d2629ed563dc67cad008afe3cded020c883678b088cc6ede7babd0f6
alsa-plugins-samplerate-1.2.7.1-1.el9.i686.rpm
4a469bf14b461dce9bb39444fe5f79fd4205267d8e43aedbc4e008044ae8ad6b
alsa-plugins-samplerate-1.2.7.1-1.el9.x86_64.rpm
8bb3d05cddb725d795f67b545b6489a95ab1edfd3c02afc26867d6ffc2aa1303
alsa-plugins-speex-1.2.7.1-1.el9.i686.rpm
debb39665ad11463123292f43119bbad39256ce691234a58ed161c757477a3b1
alsa-plugins-speex-1.2.7.1-1.el9.x86_64.rpm
11006d3adab8d69166c076dca7452f972f18ec9b42fba1c6b56209dcf404cddf
alsa-plugins-upmix-1.2.7.1-1.el9.i686.rpm
0d887deba9ddd07ebb228848df5e1b3d355553a68d1791edd8142a9fea27be8b
alsa-plugins-upmix-1.2.7.1-1.el9.x86_64.rpm
0999d1ff60102e26f066f97b829352e61a77c16c247ad6fb5f5388ec572f78e9
alsa-plugins-usbstream-1.2.7.1-1.el9.i686.rpm
685595c994452c2f36eebe638184224d3ec78f4404be2fcb226390d8483a1cae
alsa-plugins-usbstream-1.2.7.1-1.el9.x86_64.rpm
ccddca7f9022457151be397111118bd7172cb4e701a463113e55870ce9f1b139
alsa-plugins-vdownmix-1.2.7.1-1.el9.i686.rpm
9788946512a5f7dfb8cfd1be4b4e7b6cefa5b1b4946d84967f7d00f2bdc23ee9
alsa-plugins-vdownmix-1.2.7.1-1.el9.x86_64.rpm
b752f38e00063f7ab4a5ab55632bfbad1907c482eea6c0dbe5ddcc4ce76cf77a
RLBA-2022:8182
realtime-tests bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-tests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
realtime-tests-2.4-2.el9.x86_64.rpm
43c85b357874fc2b8a1827532d9e6f0e2870d5aa0f47c1a0b21936cc0995c3d6
RLBA-2022:8183
libyang bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libyang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libyang-2.0.7-2.el9.i686.rpm
a44011d7d851299bfe41502bc731c6425a1276854d0c3a1eab106bea06bb8464
libyang-2.0.7-2.el9.x86_64.rpm
97422d728343a775487873c4d589ba70d269bddbf8b9f4e26d1524eff48f8e60
RLBA-2022:8184
woff2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for woff2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
woff2-1.0.2-15.el9.i686.rpm
791eac3e45468a6b4866acce5d639d3a71829b0797f4d4ab80520a46159b76db
woff2-1.0.2-15.el9.x86_64.rpm
4f9899b89e5007560d8773b3ed583a1820a1bb9a2fa6a6796dbbc533ae2f0f8a
RLBA-2022:8186
virt-manager bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-manager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-install-4.0.0-1.el9.noarch.rpm
fb4f09ec90f2f618ede3147eaa90a1f36a6aa8ddd204f5985ea7f8fc71aa843a
virt-manager-4.0.0-1.el9.noarch.rpm
ff6c887968e9d6e214da67be056bdf88c608a7fbab6794531920ed2d23c7bd51
virt-manager-common-4.0.0-1.el9.noarch.rpm
a9a7fd82033f1e5cbe4f5e44aacdbdb8f26ec9f3f2ac3496826880cbac1739c3
RLBA-2022:8187
python-lark-parser bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-lark-parser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-lark-parser-0.9.0-6.el9.noarch.rpm
e28a433c4a37b68a19a41a4e824c65a26f0f2ad822cdaaef8ffc804e5b417114
RLBA-2022:8188
python-sqlalchemy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-sqlalchemy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-sqlalchemy-1.4.37-3.el9.x86_64.rpm
2cb693b84aced02b07c585c597c0f6074d5c0c6a1fb32a15bf9bcbd793f14e25
RLBA-2022:8190
keylime-agent-rust bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keylime-agent-rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
keylime-agent-rust-0.1.0-1.el9.x86_64.rpm
9edbae77d20ff689c11cfa6441d3588817fb7d62a418a8e19b36cef7f10aacc4
RLBA-2022:8191
python-alembic bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-alembic.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-alembic-1.7.5-3.el9.noarch.rpm
6f5942cf159b45e15ffc895ea2bf038296c821ace1f4f8afc28d54f2e50735fb
RLBA-2022:8192
python-greenlet bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-greenlet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-greenlet-1.1.2-3.el9.x86_64.rpm
5fa6ab3ce220807cb8cca69b5bb33253ad1b8b21b37e02c9187935216edade4e
RLBA-2022:8193
python-tornado bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-tornado.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tornado-6.1.0-8.el9.x86_64.rpm
18dbaf8ed09764fbc045d958d8fd57e8cc8593138aab06c60126b59fdf8b95c6
RLBA-2022:8195
egl-wayland bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
egl-wayland-1.1.9-2.el9.i686.rpm
4887ea358804b0cbbccfaeab0e0153e2fb61faffac53d58ef075653b39376067
egl-wayland-1.1.9-2.el9.x86_64.rpm
9ccf61e337a05f188a658e7fee97db3a5ce2cc8e42ca78894a4c0cb496c7fe81
RLBA-2022:8196
esc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for esc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
esc-1.1.2-16.el9.x86_64.rpm
7502abf540649cbb5edf9421528ecff0185372de94c7f9f92cd5ced018e6b286
RLSA-2022:8197
Moderate: php security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752)
Security Fix(es):
* php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708)
* php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
php-8.0.20-3.el9.x86_64.rpm
5e175c78aeeecb434e348603c9f64c2658149d836cf5df2ffc1e29cdabc26aa1
php-bcmath-8.0.20-3.el9.x86_64.rpm
49935fb88cc8ac6b59fc29d9ef96ca69275ec126fceea16b9197b858961203c1
php-cli-8.0.20-3.el9.x86_64.rpm
79635d8a99c88749c1cbfa795fceeb0ce6728ee062ae687cc0282c8099783a8d
php-common-8.0.20-3.el9.x86_64.rpm
948160e7119d2928ba5717ec620af563e3b1f440113029200674a6496cd68caa
php-dba-8.0.20-3.el9.x86_64.rpm
c0c18dd3cc4a300371c3a051cecd36175b3195aa8b7bbcb04d5daacf6826571b
php-dbg-8.0.20-3.el9.x86_64.rpm
ddf9727ea726dd63fa0d292ea1f51eea4d8963ca30ea49f79239b90d99db23bc
php-devel-8.0.20-3.el9.x86_64.rpm
339999c377ff047d9e08829588dfdf39356719ae3317d59a939abdd1a42942af
php-embedded-8.0.20-3.el9.x86_64.rpm
bb097d1cbabee71a01baae17f325b30168e99a59c6784a881512e26307b493f2
php-enchant-8.0.20-3.el9.x86_64.rpm
851cbd8b7f0ef7836b9e2f496d2ad8a753ef7b50011e05e6d4e8e8564e71a40d
php-ffi-8.0.20-3.el9.x86_64.rpm
ac7eb942d94d69fcbe2e8e9a2a343b9534fb0c76ebbc5d219d52c78ee25a16c4
php-fpm-8.0.20-3.el9.x86_64.rpm
587f05e5a414002bb464a1c5e9521d78ec805c411f253199422e277f8cc8a91c
php-gd-8.0.20-3.el9.x86_64.rpm
ead40131db50980be39a118cda31b55728a0b7e85e2b1cd677d646780a271f93
php-gmp-8.0.20-3.el9.x86_64.rpm
1b4836a5fcf7b25612f15fc01ba9eca4c69d78efcb45599bc958626cd74f013a
php-intl-8.0.20-3.el9.x86_64.rpm
944cf829386de1b4ff5bd6adfaafc7aa3b3d144be26e2490146a649ea31eb95c
php-ldap-8.0.20-3.el9.x86_64.rpm
7dc0057c96e84fd83f9f5d3e95147cf63b2e01048bfe1b2a411ebb086484b810
php-mbstring-8.0.20-3.el9.x86_64.rpm
5dad49cc5135b8d18d54e83d87edc786ad036b3a1ec22d67b9ae11d9b39dc144
php-mysqlnd-8.0.20-3.el9.x86_64.rpm
be7cffe754ff1a72e35f1191c33c9908bfbff46dca3e508031f312fd48e4b78f
php-odbc-8.0.20-3.el9.x86_64.rpm
c092f39361c909b9881bbd5ae8538c89296badebe9aba40bd70302351df4c3fd
php-opcache-8.0.20-3.el9.x86_64.rpm
58cf1c9d7d7d8a2da1c60e3036b6796f01a98071db7147883b0aac3866ee2877
php-pdo-8.0.20-3.el9.x86_64.rpm
bb6081db58f55d68f78248ab8a3791942d505ecb3d36e1057dd0ab225f427e59
php-pgsql-8.0.20-3.el9.x86_64.rpm
20e544831a519ae4f1a4e53b086268faa24f9165672daa94b81c30d4a303962a
php-process-8.0.20-3.el9.x86_64.rpm
b8402b2ddb1a32cdf3ed00f489b7f5acae90ed3f0833157cf4cf1844e3c2959c
php-snmp-8.0.20-3.el9.x86_64.rpm
f3387477e3c93c21b12543ce93f2196171c8c08bd4691d24a0af988a16b8aa7d
php-soap-8.0.20-3.el9.x86_64.rpm
3798a3a2ee6bcf61d7e7f4410b9fdf45872547a5345eec00d9f45dca574082c9
php-xml-8.0.20-3.el9.x86_64.rpm
e5363d13ea6de9054e1e4858799473c046fee9f523f9083584bba10b6666cfd9
RLEA-2022:8198
rust-coreos-installer bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-coreos-installer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
coreos-installer-0.16.1-1.el9_1.x86_64.rpm
b6a3f953b2d0b6ea51d1541108dc27603c238df01b7510d376c6b5bbf41e886a
coreos-installer-bootinfra-0.16.1-1.el9_1.x86_64.rpm
0f60cb49d4897d90c9c772757a8b000825048e5b6c45a458429d3591273dc773
coreos-installer-dracut-0.16.1-1.el9_1.x86_64.rpm
77e2e821d3e2c6702cb6f4c8ff605bcc0756f8b5bd4f141d2dacf9185ee0b2aa
RLBA-2022:8199
memstrack bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for memstrack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
memstrack-0.2.4-1.el9.x86_64.rpm
2f33a33f249759e30e8ec16f7705ec061947d487aafd55e201731aa43bd3e64c
RLBA-2022:8201
i2c-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for i2c-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
i2c-tools-4.3-3.el9.x86_64.rpm
00051fd0991b600bbd98398f72bf0df4c0a32453ce473ee9153bd40b292aa974
i2c-tools-perl-4.3-3.el9.x86_64.rpm
65f60b4390a953f3fc886737446948184ca5a9e95638ac1524135e3d9dca2ce8
libi2c-4.3-3.el9.i686.rpm
f1cb910320ecafc60fc5796a79d15304ad4edba6926896b0476f9b32571e3af3
libi2c-4.3-3.el9.x86_64.rpm
3c124d4e29d84f6889e3a170a8b1c9702c601786a2a62626064e84e19776d1c0
python3-i2c-tools-4.3-3.el9.x86_64.rpm
12fd5297d4ad389fc6634ef9c3843e178cccc8daf36d6d50671672dd16cfc501
RLBA-2022:8200
qpdf bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qpdf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qpdf-libs-10.3.1-6.el9.i686.rpm
10bb2d031a2c79fc5d47975097d224af197d2897c7a145634f4a7fab0897dfef
qpdf-libs-10.3.1-6.el9.x86_64.rpm
48a7b0df3bd69bdfe0bf1552d774fd3aefe499e7118167159fc04c9d8662f28c
RLBA-2022:8202
desktop-file-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for desktop-file-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
desktop-file-utils-0.26-6.el9.x86_64.rpm
c21437bc05ff7c3dee231b51fecc0da983a7734e39dbbbd7b599c1db29db2204
RLBA-2022:8204
tk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tk-8.6.10-9.el9.x86_64.rpm
82ad90c7cc5ae4e7e881e96877d4bbb11591533b7d90dc784ec1e99aa33300b2
tk-devel-8.6.10-9.el9.x86_64.rpm
b0b183301591e3d13956c3c74cf0810718f4d6427392676b2dc1d680df5c04fd
RLBA-2022:8205
boom-boot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
boom-boot-1.4-4.el9.noarch.rpm
36d899d5655c1d73937495a9d3373a659e7f85e112fb9ea66e44e631df4abb1c
boom-boot-conf-1.4-4.el9.noarch.rpm
7f50d99086c4dcb67b946bc9f16bb26f69aea3106328106eca4efbc5b7b7df51
python3-boom-1.4-4.el9.noarch.rpm
0a86880339a0bfe308f6271fe2e50bf812e4cb56b1a591b7dae4dfe3cf187ce2
RLBA-2022:8206
babl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for babl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
babl-0.1.86-4.el9.i686.rpm
75101daf3a2db0f4478c52fa38ed7aa3983abd31a15fb6a2e26e9dadb33dc6f2
babl-0.1.86-4.el9.x86_64.rpm
713540974c7915151dc9acf6718e37779abde14b42654ada9aef425615c4983d
RLSA-2022:8207
Low: openjpeg2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for openjpeg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openjpeg2-2.4.0-7.el9.i686.rpm
52aaa3e88ca62afea172e795409264945c957b26bb2fc71b0840042a8791493c
openjpeg2-2.4.0-7.el9.x86_64.rpm
380ef2db96766ecee5e15cce67f91b5d73c721672930add64bd35de5da12c6a7
RLSA-2022:8208
Moderate: dovecot security and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dovecot-2.3.16-7.el9.x86_64.rpm
bce9c48cdd6c1728b24154db2df749923d566cd5ba8af9b81020b1a8483df30a
dovecot-mysql-2.3.16-7.el9.x86_64.rpm
f6b6f62fb91c8bf43d28d4adef1cf0bd4b292ff0a9d153c7902046fd59dcd1b2
dovecot-pgsql-2.3.16-7.el9.x86_64.rpm
66791a014213a14247c6070f04d47115ffb492ebe04409f15675dd430460f184
dovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm
260ebeb9e820d106630cf20e2729060eee2a2d53f7e03380647bfae804962b55
RLBA-2022:8209
boost bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boost.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
boost-1.75.0-8.el9.i686.rpm
58ed8937d98085d8e48714de56d2ddbb3f1da3d127b9a18237929d72e0d0f07f
boost-1.75.0-8.el9.x86_64.rpm
2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f
boost-atomic-1.75.0-8.el9.i686.rpm
42e51de336d46116cc659f9b5a58aec31a59f0477a737b741937fb52c59122cd
boost-atomic-1.75.0-8.el9.x86_64.rpm
52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409
boost-chrono-1.75.0-8.el9.i686.rpm
f0c2b20e2433f2d21bda9e1f7cf392926fd73cd6e114e72ed2a7aba3dc71db26
boost-chrono-1.75.0-8.el9.x86_64.rpm
784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f
boost-container-1.75.0-8.el9.i686.rpm
3005167606f243f2741ac6574f8377b70ed0676451ec1bdd5ea96a8d661083fa
boost-container-1.75.0-8.el9.x86_64.rpm
f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b
boost-context-1.75.0-8.el9.i686.rpm
e727bb684649efccb51a80a283dc678e24b506bb9859c3fece10dee5ec98bf6f
boost-context-1.75.0-8.el9.x86_64.rpm
5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a
boost-contract-1.75.0-8.el9.i686.rpm
907a6227e84653a535ce70ac0999a6917448bb3acc610c7662e6257fa1a0236c
boost-contract-1.75.0-8.el9.x86_64.rpm
7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434
boost-coroutine-1.75.0-8.el9.i686.rpm
d4c0a594b6aceb68fba791ca7ac2b2a397818af78a4131fb1b52cc27d9cd6fa7
boost-coroutine-1.75.0-8.el9.x86_64.rpm
1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75
boost-date-time-1.75.0-8.el9.i686.rpm
976c88250567f44bacdc12d5d0b1dcbe8b71974f950e77d697e255a2f9829203
boost-date-time-1.75.0-8.el9.x86_64.rpm
d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98
boost-devel-1.75.0-8.el9.i686.rpm
63901104228b418e873c2c4395808085ecfcdaf574f47c875445a01f09863b7e
boost-devel-1.75.0-8.el9.x86_64.rpm
445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd
boost-fiber-1.75.0-8.el9.i686.rpm
4617722852d77bffb2b8ba431ab8f6258816668428b8704adc3817afcbb55b52
boost-fiber-1.75.0-8.el9.x86_64.rpm
c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369
boost-filesystem-1.75.0-8.el9.i686.rpm
2b10603f623495ecc136ac2e9aa57f3e8c8ae400072033f324a9b41a5eda6715
boost-filesystem-1.75.0-8.el9.x86_64.rpm
9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d
boost-graph-1.75.0-8.el9.i686.rpm
86584c945976a1ebfc2145faed1eb799808909f159013548f372485098e4a063
boost-graph-1.75.0-8.el9.x86_64.rpm
0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5
boost-iostreams-1.75.0-8.el9.i686.rpm
fbf3415c681fd8fa9a693db008b1a1734a0902dd97b2bc3aa31b4a7ef100fb46
boost-iostreams-1.75.0-8.el9.x86_64.rpm
fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585
boost-json-1.75.0-8.el9.i686.rpm
440a0a8742eb8f769c0309939e264688699453f1aaebb48ae36a0360a43b6856
boost-json-1.75.0-8.el9.x86_64.rpm
4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f
boost-locale-1.75.0-8.el9.i686.rpm
8b1d3e963c86da485122fdb5b146ccc7e37070d4f62d682929c15d05d5917ec6
boost-locale-1.75.0-8.el9.x86_64.rpm
675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3
boost-log-1.75.0-8.el9.i686.rpm
340e75e71e371b10ca458fdbb0dbd4e77b512390b094f22fab80ac0225fd56d9
boost-log-1.75.0-8.el9.x86_64.rpm
1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720
boost-math-1.75.0-8.el9.i686.rpm
76c985c84b75a9ff6fafaaa503e5631314f1aa4788a01a2d9694880110264da9
boost-math-1.75.0-8.el9.x86_64.rpm
a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161
boost-nowide-1.75.0-8.el9.i686.rpm
127d21e6569f70094c080d73bf92a8247465627f52b1fd2a36e415fb2f5a2d03
boost-nowide-1.75.0-8.el9.x86_64.rpm
85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1
boost-numpy3-1.75.0-8.el9.i686.rpm
fb77effe64d876c933f28a57a97e8b5297cf2d25eb36625d8f3d359d9dfde10a
boost-numpy3-1.75.0-8.el9.x86_64.rpm
00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b
boost-program-options-1.75.0-8.el9.i686.rpm
5b50ab1238f9302b21440476c9016e7e843d6b9c8b15e62eb959efd9d0bbf3f9
boost-program-options-1.75.0-8.el9.x86_64.rpm
a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e
boost-python3-1.75.0-8.el9.i686.rpm
9026712d638bbc413ea75f3f1a64b84a479063d6d77292751142ead328e21e02
boost-python3-1.75.0-8.el9.x86_64.rpm
872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731
boost-random-1.75.0-8.el9.i686.rpm
6e2c5c68c6662e77385b620f1a22971786e45edb543e6270c7e98ee01d0d7c2a
boost-random-1.75.0-8.el9.x86_64.rpm
b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098
boost-regex-1.75.0-8.el9.i686.rpm
cf2feb7f87ee9bc16661ce07437ccfb538839b95d4a58150494385dba73dd53c
boost-regex-1.75.0-8.el9.x86_64.rpm
7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c
boost-serialization-1.75.0-8.el9.i686.rpm
452ece30edc38c5910f92aab440057f17aa1c98d001041c24e404799433bcdfe
boost-serialization-1.75.0-8.el9.x86_64.rpm
73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f
boost-stacktrace-1.75.0-8.el9.i686.rpm
e1622741e30ad6da37b6e28fcdfa5807cf61bd457c0dcc30fa30c1f99ab4b9c8
boost-stacktrace-1.75.0-8.el9.x86_64.rpm
884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a
boost-system-1.75.0-8.el9.i686.rpm
5126686589b845b18e6763abde79b90edb2a3493aab998882e71ec8099d72441
boost-system-1.75.0-8.el9.x86_64.rpm
b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f
boost-test-1.75.0-8.el9.i686.rpm
5507b687862fc4f9a0e9c6a8fe908f88228d2b5cf5075ac041054a4e97117392
boost-test-1.75.0-8.el9.x86_64.rpm
1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487
boost-thread-1.75.0-8.el9.i686.rpm
ea34b832a8a0b9630271e0d55c19e21a0980d4cd16368d67aec52fe71e98ffd9
boost-thread-1.75.0-8.el9.x86_64.rpm
55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989
boost-timer-1.75.0-8.el9.i686.rpm
e9c7e311d4f212f4c8795b1c40026a01b29601988892a5aa249e1eee68246bfc
boost-timer-1.75.0-8.el9.x86_64.rpm
fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162
boost-type_erasure-1.75.0-8.el9.i686.rpm
a1f84e5e0168d6eda59ae34fbd41f2bd8a297638e88910987d60299293dd4c3f
boost-type_erasure-1.75.0-8.el9.x86_64.rpm
736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383
boost-wave-1.75.0-8.el9.i686.rpm
50d039d5c439f231368fb55fafc9c75b1c75718e45bb90c582f90a919d9a95bf
boost-wave-1.75.0-8.el9.x86_64.rpm
555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba
RLBA-2022:8210
pyparted bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyparted.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyparted-3.12.0-1.el9.x86_64.rpm
0afa7b5034da816c99cf2752ec0d843f76addd01ef3c9280cc3e4a298f453e5e
RLBA-2022:8211
gnome-screenshot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-screenshot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-screenshot-40.0-4.el9.x86_64.rpm
a6c5e1eb1610025cd061fdfcb4ddb2b6b88e7f8c782f175d7c29a4e251154810
RLBA-2022:8212
haproxy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for haproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
haproxy-2.4.17-3.el9.x86_64.rpm
78dbb113b27ff5a265a42987d46723fa2fbfe11e3d44cfce4414ed4dc6b60892
RLEA-2022:8213
nvme-stas bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nvme-stas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nvme-stas-1.1.6-3.el9.noarch.rpm
6dc35cd1f740d622bff0843c8cebc11ce55922367441363193afa60bbd78ffe0
RLBA-2022:8214
perl-Net-SSLeay bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-SSLeay.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-SSLeay-1.92-2.el9.x86_64.rpm
357229b9af77138e17a13553f1fb066fe3701612189ea8383b98ea1e51885e75
RLBA-2022:8215
thermald bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for thermald.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
thermald-2.5-3.el9.x86_64.rpm
091823c2b1375dccf989c7beacca0228ece69bba97c2fc1433a67d623d072ab8
RLBA-2022:8217
usbredir bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usbredir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
usbredir-0.12.0-3.el9.i686.rpm
c593686fe8502b5059088e8dc39b034d414bbaba752c6ad4507e14b76e9810d8
usbredir-0.12.0-3.el9.x86_64.rpm
57fb3b4a5be1eb45e5b172c74cb064e52bfcb0bf71bd1250be5c167c95295919
RLBA-2022:8218
gtk4 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-settings-daemon, gtk4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-settings-daemon-40.0.1-8.el9.x86_64.rpm
800dd0da960865369db3c68aead417ff8cddf4b7c4518168ca9cfcf08284c87c
gtk4-4.4.1-2.el9.i686.rpm
c736a9851ff4f7730a8c3f000e36515cbe28524759958a62c7960290ea149643
gtk4-4.4.1-2.el9.x86_64.rpm
d437e452d1fe83036d5eca55e35589ba02cd2ea4a8fa9e305c0f17b2dd19f97f
gtk4-devel-4.4.1-2.el9.i686.rpm
6e51c38d35a50883388074014e45bbf59dc381ed20a7b8fa8b8cadcd637cc8b0
gtk4-devel-4.4.1-2.el9.x86_64.rpm
caea1db5a795bca96600266cce9f98ee30323c4d63cfea681e4a8695a50365fb
RLSA-2022:8219
Moderate: mutt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mutt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: buffer overflow in uudecoder function (CVE-2022-1328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mutt-2.2.6-1.el9.x86_64.rpm
61d1790586762a83003766cbc478f8c89f5c926018cb6ca060c73eb5ba3d3c19
RLBA-2022:8220
linuxptp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
linuxptp-3.1.1-5.el9.x86_64.rpm
4bde8fdc5d0a442ee994505f36f09018954997ea0f29ddb126265078718317c3
RLSA-2022:8221
Moderate: xorg-x11-server security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm
7d8b5f3399c42339f7c4ee7d3b889fb5083fa4f6d9c681152c59398b7f5efc4d
xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm
2e27abde8895d87a40cde4e7e45d4eb7cc69294658f55183e7fcfe8110ee04a7
xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm
ce545a7d5176f15df483c7a31b60dcd258f632b9a76f80c2c957ef0f83b6a3dc
xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm
70473190d910f0dea1dd79af8fe1d57a02c661261bf203ce08958063ec8ba821
xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm
20da0d88f41ef7b6e7bb191b03fc8934a40652f190f49071afba9c66789ac777
xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm
44de1961729f2d471e990643a072a56de17b01ccbfd606a1cb0212fd1b18564a
RLSA-2022:8222
Moderate: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319)
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpm
60132705c1fff9b7e772066b3c8a26d6a184b5010f979d325f21a3b42ab05290
RLBA-2022:8223
memcached bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for memcached.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
memcached-1.6.9-7.el9.x86_64.rpm
0bad4c2f81ba7832bf7b83d64324cad09cd1b486d3e5be3af77c64955d5216bf
memcached-selinux-1.6.9-7.el9.x86_64.rpm
b751390d0464b4ea36d262cb67461b91f045bd9e9ed6ade29357062aa21d45bd
RLEA-2024:1140
nodejs:18 enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Enhancement(s):
* nodejs:18/nodejs: Rebase to latest upstream version (JIRA:Rocky Linux-21438)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLBA-2022:8232
clevis bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clevis-18-106.el9.x86_64.rpm
e58138c100a2b959897cc248f49ddd35dfc465c092f0d6d950acf64cf4be6a2a
clevis-dracut-18-106.el9.x86_64.rpm
d277cb71560fdb9d14b787b1837cdbf15190ec96b39083e3366cd578f86bfaaf
clevis-luks-18-106.el9.x86_64.rpm
69c5b03a602fc4dd5bddcae71dcd982848efeb438c894122f2abe207aa0c89d5
clevis-systemd-18-106.el9.x86_64.rpm
a75bac460450de46b7dbebec21fd0eca73b4160ede7baf868316d6873bd9adad
clevis-udisks2-18-106.el9.x86_64.rpm
251831b42e94ac3d1e4679e9230493854302ead31e0bcf32b8868e6e638ed057
RLSA-2024:1503
Important: nodejs:18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)
* nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)
* nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2024:1688
Important: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)
* nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)
* nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)
* nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896)
* nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891)
* nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890)
* nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLEA-2024:2162
new module: postgresql:16
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm
44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba
postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm
6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259
RLSA-2024:2779
Important: nodejs:18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: CONTINUATION frames DoS (CVE-2024-27983)
* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)
* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)
* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)
* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2024:2853
Important: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Security Fix(es):
* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)
* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)
* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)
* nodejs: CONTINUATION frames DoS (CVE-2024-27983)
* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLEA-2024:4763
nodejs:20 module bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* Faulty npm package version in NodeJS release causing issues with connections [rhel-9.4.z] (JIRA:Rocky Linux-44942)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2024:5815
Moderate: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)
* nodejs: fs.lstat bypasses permission model (CVE-2024-22018)
* nodejs: fs.fchown/fchmod bypasses permission model (CVE-2024-36137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2024:5929
Important: postgresql:16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks (CVE-2024-4317)
* postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm
44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba
postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm
6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259
RLSA-2024:6020
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348)
* postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks (CVE-2024-4317)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
RLSA-2024:6147
Moderate: nodejs:18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)
* nodejs: Bypass network import restriction via data URL (CVE-2024-22020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2022:8226
Moderate: python-lxml security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-lxml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API.
Security Fix(es):
* lxml: NULL Pointer Dereference in lxml (CVE-2022-2309)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-lxml-4.6.5-3.el9.x86_64.rpm
fa211bf07228f42800523d7e6d2c932f1f9f15812f944947820d29fa4bd27bbb
RLBA-2022:8227
rust-bootupd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bootupd-0.2.7-2.el9.x86_64.rpm
9a0e1470330f67e6a3a065626f9094dcf0727bc5e6d6498f4db6401041c22280
RLBA-2022:8228
virt-p2v bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-p2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-p2v-1.42.2-1.1.el9.x86_64.rpm
94d05e055f21891efb4b075a2839c8938ef316c456d708da8e39306dc3f0cec8
RLBA-2022:8229
mod_auth_mellon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_auth_mellon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_mellon-0.17.0-7.el9.x86_64.rpm
a9fd4dde11407ef5867b6d98654736649367fe62d45d3ec71aab416f97efca6f
RLBA-2022:8230
python-ldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-ldap-3.3.1-9.el9.x86_64.rpm
ef62df4cbc90c0b91f31d6fdd84c43bacc46109bc5e5a7867d49c178be3ae58e
python3-ldap-3.3.1-9.el9_0.x86_64.rpm
202b9bd4a849116161ed5ddd2828ea48f99b1570b3123b146c4dc531bfac6771
RLBA-2022:8234
libmypaint bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmypaint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmypaint-1.6.1-9.el9.i686.rpm
f6bcc99887d1613d6c2fa40291417e4461efb9f8ec51f7f4835eed886fb22463
libmypaint-1.6.1-9.el9.x86_64.rpm
2cc42b9c0b713fef6c2beda9bb4f8aa00a27f4f15154e574e0d1a386d8688140
RLBA-2022:8235
console-login-helper-messages bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for console-login-helper-messages.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
console-login-helper-messages-0.21.3-1.el9.noarch.rpm
bea910a5de9b65a1df9ff25aa90b366bddcbe1ace548e6a817338a2bfe3ae86c
console-login-helper-messages-issuegen-0.21.3-1.el9.noarch.rpm
db679a734f9ef8961bbe4d96fd02d818cb511c1d9ac538f1e6b88b3ba1c22cd4
console-login-helper-messages-motdgen-0.21.3-1.el9.noarch.rpm
a0ec05018f8ce26fcb4dc10eb4153ce197a4a9994791f4c609504d1ba45dc045
console-login-helper-messages-profile-0.21.3-1.el9.noarch.rpm
ea21cf6c9866c4640f4371684453a281dda1fd08f4c08fea1e645e04a862401c
RLEA-2022:8238
maven:3.8 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, maven-wagon, jansi, apache-commons-codec.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__maven
apache-commons-cli-1.5.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
5f60c0f0885af2f6f950afcf45d7f1b95f5e34396261dd8ab6d7cfb442e04992
apache-commons-codec-1.15-7.module+el9.1.0+13170+43ecddfd.noarch.rpm
0220287810e4799917d4db36b17366650576949b14c8618a71dfb1a7682f5fa9
apache-commons-io-2.11.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
93c68ec43f1b49c63479295890c398322ab939ab29ca7e14793be3e42b78dc58
apache-commons-lang3-3.12.0-7.module+el9.1.0+13170+43ecddfd.noarch.rpm
7a97cce8dfb4f34680befc4ed4ee791511f7c4809a53d7c74b6c34b1824d6f9d
atinject-1.0.5-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
cd129e561144604ca32ec4bee7ea7aa4765f8ed2b3c36faf0e32cb1a1f5dcd49
cdi-api-2.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm
96dc9cd4356a07481cb5d88f756fd07ba7af7e8f36bc0d3abd8994f17dde304a
google-guice-4.2.3-9.module+el9.1.0+13170+43ecddfd.noarch.rpm
85f6ee589dac7db7b3758a33e66d9c94d1724fc1ed3ff964f7d8d2b207141dba
guava-31.0.1-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
7053c8ec1dd10a61c90c4b7d7d61f077bab8b34805957c3db312f76553c1905e
httpcomponents-client-4.5.13-5.module+el9.1.0+13170+43ecddfd.noarch.rpm
484bd383b25748ca4e080f457c6722bc4ed14cc96873ae54ab2d9eec52671e47
httpcomponents-core-4.4.13-7.module+el9.1.0+13170+43ecddfd.noarch.rpm
dede20b7e3f22bf3717f8e50258bb8a3fd02b45f533970099ae70d1e90419dc0
jakarta-annotations-1.3.5-14.module+el9.1.0+13170+43ecddfd.noarch.rpm
5a30f1e02cb734a8377b4f3afd1becb24ecdce48c88b2738056880824dde2b5b
jansi-2.4.0-6.module+el9.1.0+13170+43ecddfd.x86_64.rpm
5baf28a6b6225d36009e2411b8363856ea07e2e9dc78266991285c8ea48f19e7
jsr-305-3.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm
52ac49dedf9a4d4d34659161de396aaf24ebab5df8687728c7446ecd00eb189e
maven-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
1df931bcf111accb8fde1274956c1dadf7d44af54eb033df5982d587e56029f6
maven-lib-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
29623a02dd4fa20b10cb5576b2fa742ffbd0ff98b9e0efce7a6c0abae6ea4aff
maven-openjdk11-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
d036e0f520a266cf1a4073fd2daa0d87e2c35e8d6d2fe11559106afc9adef62f
maven-openjdk17-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
7b6af55330bbc4cba5e756870581ab86faac168eed97e186fbff68bc1346c496
maven-openjdk8-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm
25b69af66417f1e5fef95a64ad260b50cbd7c72cebfe049f66df215a587348b5
maven-resolver-1.7.3-5.module+el9.1.0+13170+43ecddfd.noarch.rpm
508ca00cd0867997130acefcce0fb3735dc2b7bf8670522630022218f070d947
maven-shared-utils-3.3.4-5.module+el9.1.0+13170+43ecddfd.noarch.rpm
dcbbe98f91df73f36aa2644486cf31cea32885e4e2aef6ef6bb28fae76bf9dca
maven-wagon-3.5.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
5153d667906734b37ef6d8e212fcf7ffdd6ed1b9355e63711918b6819cb73a42
plexus-cipher-2.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
b11abf8c08095567df1496e4330aceb70a5163268b164bb28e254089db634957
plexus-classworlds-2.6.0-12.module+el9.1.0+13170+43ecddfd.noarch.rpm
c6d49d6b64148f873197a3cc51a507afaf0239101e0124e4a15a531371c8795b
plexus-containers-component-annotations-2.1.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
0f3fb322eaba1f62aff06ec80bcaf501c28a2db6356cc8b6516149a0b2cc3bd7
plexus-interpolation-1.26-12.module+el9.1.0+13170+43ecddfd.noarch.rpm
b820fc3d61f29e6dbca25c09dc2b656a5b12cec378d1ef3d408f474cc688328d
plexus-sec-dispatcher-2.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm
72dd34d0de2d033e4ece01cb917333305955d537c452a4025aaae7a6ada50e68
plexus-utils-3.3.0-10.module+el9.1.0+13170+43ecddfd.noarch.rpm
1cd5464ba8e8aa341ee6e1dc441ccab6b0d9b8d75745f181ed91dafc9d39dd75
sisu-0.3.5-2.module+el9.1.0+13170+43ecddfd.noarch.rpm
3385b54dd2ce04419619aa06506209484c6e3aeeef9879593e1052e4428a1c87
RLBA-2022:8239
sanlock bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sanlock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-sanlock-3.8.4-4.el9.x86_64.rpm
ae38bc1bbd31fe51b7ba7e1a80db2fb855c5c5700c6ee0d22f1eedd3d5a2e5fe
sanlock-3.8.4-4.el9.x86_64.rpm
9b0ca1c638236ac6961e065db951d322d4b1d8fb3c5228232393aaa46480353e
sanlock-lib-3.8.4-4.el9.i686.rpm
38a0134785f72c64785bff4356766e7fc9bbd3b66dc4c8a3c987747967965dbe
sanlock-lib-3.8.4-4.el9.x86_64.rpm
1e471abe195b95065e12e268f67f373aa1b8822af93e3a1c17834a08b3a21ebb
RLBA-2022:8240
libwmf bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwmf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwmf-0.2.12-10.el9.i686.rpm
ba0f271dfc03845d8f9f2ed1cc18e5330fc902673f6e9ea7043e6b9f22ec79ee
libwmf-0.2.12-10.el9.x86_64.rpm
10edb5e9b9fccd66c4e55055bbaa1143a10d0c94b68b64ffca6e23746afa36da
libwmf-lite-0.2.12-10.el9.i686.rpm
4c7d32b35a79a0a41ed50f407d3d5104958114d468abe02ebb4d1762d8244199
libwmf-lite-0.2.12-10.el9.x86_64.rpm
feac0332faf70b0d4020ee6ea093f92c00dbe549ce339e64db5df41178817496
RLBA-2022:8241
oddjob bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oddjob.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oddjob-0.34.7-6.el9.x86_64.rpm
35ffb909d64d80a820904f8c7a75b949de40fa129a19f0906d2d1851f896a3a9
oddjob-mkhomedir-0.34.7-6.el9.x86_64.rpm
e9030611829295ee108b80b4a564988ce58e2ac034ac1e7718ef82f52f638ca5
RLBA-2022:8242
cyrus-imapd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cyrus-imapd-3.4.1-7.el9.x86_64.rpm
b829eb431f81aa37245b13b5950504cf1a5b8c3a18e5099d3df46361c332bf18
cyrus-imapd-libs-3.4.1-7.el9.i686.rpm
225300109af48fca1a8628d7a1afc36af783c913a9b078e4f798649730f4ec96
cyrus-imapd-libs-3.4.1-7.el9.x86_64.rpm
ab15ef771f9e0cbeebb1d24ec281f8e2ba946e1b25494dcb1e45f02bc5ea3851
cyrus-imapd-utils-3.4.1-7.el9.x86_64.rpm
c4548108d8ebd50f5590118ed6f32e4f40aba5fe184e37bd406ad88a9ebe83c9
perl-Cyrus-3.4.1-7.el9.x86_64.rpm
6d059a1c4a2be5194c1dcbf35cfaeb10a6cad898b9a84cf1d5a870c0355b3a7e
RLBA-2022:8244
postfix bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postfix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postfix-3.5.9-19.el9.x86_64.rpm
6bd218d9106aef57f107855f817ae875519db76364c01aadde4aef80b22c9b4f
postfix-cdb-3.5.9-19.el9.x86_64.rpm
dfcc70fdf527193703e989a3afdb519e9ce035f4ffe5830c6a88ffc2f8962d20
postfix-ldap-3.5.9-19.el9.x86_64.rpm
e60921e145ce1c01f69c46946ccd3c6c6073647df4587bf19d340ee62a1b0b8f
postfix-mysql-3.5.9-19.el9.x86_64.rpm
02596c950777c16c311a104ecfd924c8d0b198e5e7a23c83b5bf5824634f39fa
postfix-pcre-3.5.9-19.el9.x86_64.rpm
a5faa2d06088bb997e9e8e17179f387b406330ae703766ec1b43bee21f1a9339
postfix-perl-scripts-3.5.9-19.el9.x86_64.rpm
6d90768263b252bec6168cd52955611e40d15ca4d0be492fc48fcc4ae98399d6
postfix-pgsql-3.5.9-19.el9.x86_64.rpm
518556705128c3a92afdde8f5c3630253304655f353971d8078fe431af2426cf
postfix-sqlite-3.5.9-19.el9.x86_64.rpm
2a1320ae4ab3e1a1eb77db606c1169fffb2ba86cb93b0af06f1ac5d81c9f0888
RLEA-2022:8243
ansible-collection-redhat-Rocky Linux_mgmt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-redhat-rhel_mgmt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-collection-redhat-rhel_mgmt-1.1.0-2.el9.noarch.rpm
a993fc8b1a6fe626b846b1013953840d5a2b351791fce4b775796b1ae3417bb2
RLBA-2022:8245
redhat-fonts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redhat-display-fonts-4.0.3-1.el9.noarch.rpm
61aa9f5a9291c27b6ba9961c0966e69019b396dc7627f0e74478333fa3356a63
redhat-mono-fonts-4.0.3-1.el9.noarch.rpm
887119ab098677e9be1607c63ccc99a2630d507f97e883501f48c56e7a2aca80
redhat-text-fonts-4.0.3-1.el9.noarch.rpm
1b11415a8e7e42aa352258b914e0ef24d4c90a203126970b55b0f73010e28ef1
RLBA-2022:8246
rear bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rear-2.6-15.el9.x86_64.rpm
89cf013f320dede3c9b289033a5976ca6a596f5b9b0eeab2ca970d063a6d8c60
RLBA-2022:8248
xdp-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxdp-1.2.6-1.el9.i686.rpm
beb7c66717ac93db67e54e7d633606d9107b46fb1bcecd5d502068db3441a372
libxdp-1.2.6-1.el9.x86_64.rpm
f71cd63363be4cb761b93786e0cc04e69bc828ff93c2a62a42ff038f9ed4adb9
xdp-tools-1.2.6-1.el9.x86_64.rpm
19ba61dfad9d6e56f9dab6e4e2d0756f5933e1c81a849513417158f99e779607
RLBA-2022:8247
slapi-nis bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slapi-nis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
slapi-nis-0.60.0-2.el9.x86_64.rpm
a532f162ca5ba258aa60b4216af198d7166d587d94631d5e0a3bc98294e2e54a
RLBA-2022:8249
sane-backends bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sane-backends.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sane-backends-1.0.32-7.el9.x86_64.rpm
69e6b7fcc2d2de541cf68673157ec0e5d3681585cfc6d1b6561e004134c56734
sane-backends-daemon-1.0.32-7.el9.x86_64.rpm
53c67e1fa2ccbcc3b20182ffe182c04edcc35c550ef1cf413a587ef393c89ba1
sane-backends-devel-1.0.32-7.el9.i686.rpm
b1f56fc86b06c9a9164b7ec00e5786b81c79d8b881e641f6ac6d047584f250be
sane-backends-devel-1.0.32-7.el9.x86_64.rpm
f918bac272b3be5efaeedcbd406107b3dd1f39184aa69638f9602f924e7851fb
sane-backends-doc-1.0.32-7.el9.noarch.rpm
a9d8c28e58d3b72a99879099ae09e78c6656f162d335d4ab82def47286e3a967
sane-backends-drivers-cameras-1.0.32-7.el9.i686.rpm
4ef594d86228f1d54964068febc2515b305cc38bb9861893a14e56ba69c8859f
sane-backends-drivers-cameras-1.0.32-7.el9.x86_64.rpm
4c73477320cd47a6d330cd4ec7c37dd5b3c76df3771b2afe7387c3a98f630a43
sane-backends-drivers-scanners-1.0.32-7.el9.i686.rpm
ed80ab8a7d9b7a5ff9d315bea58cd461ac2d9bba6e7da7f618a9d6eece8bfda8
sane-backends-drivers-scanners-1.0.32-7.el9.x86_64.rpm
e561568efccd50d05f79850cc70f93d6c5a6b4b9430ec519ea12fc31963fbd50
sane-backends-libs-1.0.32-7.el9.i686.rpm
a93ba014d0f8cd4b6be0fb365ec5ddf478a94a6b6a1c4dd0744489115ab6303a
sane-backends-libs-1.0.32-7.el9.x86_64.rpm
0d94e007729b38860b1c77d1158c0b2b5be6664213073921d97423975a8fd7f0
RLSA-2022:8250
Moderate: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-3.2.0-3.el9.x86_64.rpm
19ca12570537b8613096a4d64f92977eda66c3d9e9d2606c4e36a052d1955f53
RLBA-2022:8251
vulkan bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glslang-11.9.0-3.el9.x86_64.rpm
f7ecb5d314ef2fd7f0a8abc843504569029cb186e8ac4bc8c3312575401f5d5e
glslc-2022.2-2.el9.x86_64.rpm
db08a3be7df205ae7df359599a9610990447807f1c137d5bf0a2e34034297ee7
libshaderc-2022.2-2.el9.i686.rpm
e91e1d8fce54ce7ea74c6812cd89e4123da7cbe79d1489d418a5c0af21b536ce
libshaderc-2022.2-2.el9.x86_64.rpm
09092d63509dd6470f0483962952ddbbdc935f9b31ec2bc979b10d05e4899f4d
spirv-tools-2022.2-3.el9.x86_64.rpm
3d3ef03de9922b424ec842c636f74507c574dc758f80b75b555febed8cac8873
spirv-tools-libs-2022.2-3.el9.i686.rpm
8856b444f1fac96b08a31eaa64d9dcaa150a2e2f104a03fd569575048ade1583
spirv-tools-libs-2022.2-3.el9.x86_64.rpm
d612c378a9dae1745bb90f1380a4ed65ec8baa5b3fa556f3381f95dd93d70186
vulkan-headers-1.3.224.0-1.el9.noarch.rpm
0321defcee4c9eee209c2632f0a11b86318c7a39a4b99df98b6b77e7a356f74e
vulkan-loader-1.3.224.0-2.el9.i686.rpm
184b803588c4ffd5e550936b7d9941f20f3924d4a9b91419d382ce777da872f9
vulkan-loader-1.3.224.0-2.el9.x86_64.rpm
56346c3837cc1785503fd644f2ffe318a65a8394b1e602281e46e7007eda2a24
vulkan-loader-devel-1.3.224.0-2.el9.i686.rpm
e8eaaadad1878d0d83627dfa71095545700c2b626bd8b9fef69a686f53bf0c0a
vulkan-loader-devel-1.3.224.0-2.el9.x86_64.rpm
0e9f444443b42bd2211c01bd760ee660b67b0f6575054040af153c8029e0859d
vulkan-tools-1.3.224.0-1.el9.x86_64.rpm
c329173443d3f915db9747e8053b1c048ad46be5e3a7dc3fbe220eb1b1b2b3de
vulkan-validation-layers-1.3.224.0-1.el9.x86_64.rpm
e02998f51dea7bc2ef836b6de8f31f240a15de5ff3833d73ad661b105ac85773
RLSA-2022:8252
Moderate: yajl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for yajl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator.
Security Fix(es):
* yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
yajl-2.1.0-21.el9.i686.rpm
586f257769f8fdaa8dc113a960fa9d4e4f6fdefd8b8464e48d9527d035b23661
yajl-2.1.0-21.el9_0.i686.rpm
ce5e6ace7e1ca65f6ddd67e4a4a7e109206a5c2d557c646613e0cb8d2adcfc0a
yajl-2.1.0-21.el9.x86_64.rpm
98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de
yajl-2.1.0-21.el9_0.x86_64.rpm
0a66ac8a71ba35e7087fdea5f7fcab8fefbe6d5b4e0a3e3442d37c0066f5cadc
RLBA-2022:8256
qatzip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qatzip-1.0.9-1.el9.x86_64.rpm
1abf3eb09c7ecffb3faa71815faef5f73bacde7542ceef9f9f6f7105f6fb43e7
qatzip-libs-1.0.9-1.el9.x86_64.rpm
a7c4cfbfe0794719a423cb8d123f163a43fd96bf32885d7a072f2e2814b9d733
RLBA-2022:8257
qatengine bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatengine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qatengine-0.6.15-2.el9.x86_64.rpm
f7646fa5230220a0deafb19b09e2a2f79dc2971291531c07b740d4aec85b873f
RLBA-2022:8258
qatlib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qatlib-22.07.0-1.el9.x86_64.rpm
a9d8ca8f3f79b236220b564f1829aa638bd0fa45c43dfc0088410abf11ba41e0
RLBA-2022:8260
gnome-tour bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-tour.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-tour-40.1-2.el9.x86_64.rpm
fbe77165a605cf4898e99d3f77cff02a5e123fd7a744bb432adc0a4f9370e9e1
RLBA-2022:8262
setroubleshoot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setroubleshoot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setroubleshoot-3.3.28-4.el9.x86_64.rpm
6ad1c3a31f3fc7b6656b9bb8a2dfe4e60d42f9050d24ffb8698955e4283d1245
setroubleshoot-server-3.3.28-4.el9.x86_64.rpm
aaf39fed8ad12feb3bbbee62a17f992dde7aa37692c9e5989aa086bc391b1ffe
RLSA-2022:8263
Important: dpdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dpdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
Security Fix(es):
* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)
* DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash (CVE-2021-3839)
* dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service (CVE-2022-28199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dpdk-21.11.2-1.el9_1.x86_64.rpm
284faae4b6d6e9c4c6e2fdde8cf55f4732a1f24999d619fe9c0ba76b22e530cc
dpdk-devel-21.11.2-1.el9_1.x86_64.rpm
ea5404855a7df4fd9fe04662d5b3ab9138b9d61110de5660ed836b3623d25a20
dpdk-doc-21.11.2-1.el9_1.noarch.rpm
1038ad9ebd5eb49b47bd3b94c68449f40858ee91129a50e87e734c86756aa17a
dpdk-tools-21.11.2-1.el9_1.x86_64.rpm
c746ae12cdbd162d7a965e232a0bd898e0d31582c9b3cf8f284563b497e0694a
RLBA-2022:8423
inkscape:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for enchant2, cairomm, gc, libwpd, gsl, python-lxml, boost, potrace, python-appdirs, poppler, inkscape, python-scour, librevenge, libwpg, lapack, gspell, libsigc++20, poppler-data, double-conversion, gtkmm30, openblas, pangomm, atkmm, glibmm24, numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
atkmm-2.28.2-2.el9.x86_64.rpm
996adf691e2f558ee1915a6a801bbb8aa13192da905e3799f2489caa00de73a9
blas-3.9.0-8.el9.x86_64.rpm
851f8672e184a9559b9eac883f9d313effc98b229b5c6998f08fb95af576ebbd
boost-1.75.0-8.el9.x86_64.rpm
2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f
boost-atomic-1.75.0-8.el9.x86_64.rpm
52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409
boost-chrono-1.75.0-8.el9.x86_64.rpm
784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f
boost-container-1.75.0-8.el9.x86_64.rpm
f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b
boost-context-1.75.0-8.el9.x86_64.rpm
5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a
boost-contract-1.75.0-8.el9.x86_64.rpm
7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434
boost-coroutine-1.75.0-8.el9.x86_64.rpm
1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75
boost-date-time-1.75.0-8.el9.x86_64.rpm
d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98
boost-devel-1.75.0-8.el9.x86_64.rpm
445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd
boost-fiber-1.75.0-8.el9.x86_64.rpm
c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369
boost-filesystem-1.75.0-8.el9.x86_64.rpm
9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d
boost-graph-1.75.0-8.el9.x86_64.rpm
0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5
boost-iostreams-1.75.0-8.el9.x86_64.rpm
fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585
boost-json-1.75.0-8.el9.x86_64.rpm
4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f
boost-locale-1.75.0-8.el9.x86_64.rpm
675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3
boost-log-1.75.0-8.el9.x86_64.rpm
1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720
boost-math-1.75.0-8.el9.x86_64.rpm
a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161
boost-nowide-1.75.0-8.el9.x86_64.rpm
85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1
boost-numpy3-1.75.0-8.el9.x86_64.rpm
00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b
boost-program-options-1.75.0-8.el9.x86_64.rpm
a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e
boost-python3-1.75.0-8.el9.x86_64.rpm
872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731
boost-random-1.75.0-8.el9.x86_64.rpm
b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098
boost-regex-1.75.0-8.el9.x86_64.rpm
7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c
boost-serialization-1.75.0-8.el9.x86_64.rpm
73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f
boost-stacktrace-1.75.0-8.el9.x86_64.rpm
884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a
boost-system-1.75.0-8.el9.x86_64.rpm
b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f
boost-test-1.75.0-8.el9.x86_64.rpm
1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487
boost-thread-1.75.0-8.el9.x86_64.rpm
55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989
boost-timer-1.75.0-8.el9.x86_64.rpm
fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162
boost-type_erasure-1.75.0-8.el9.x86_64.rpm
736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383
boost-wave-1.75.0-8.el9.x86_64.rpm
555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba
cairomm-1.14.2-10.el9.x86_64.rpm
74216e92ac5d1452d6d8fde90970c1769ebfebb0bfaf86610070221a008851b2
double-conversion-3.1.5-6.el9.x86_64.rpm
1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977
enchant2-2.2.15-6.el9.x86_64.rpm
f0ac2534a1dd08b82840623a8472d5c88e12d830df402ba7300421667a1c4be9
gc-8.0.4-7.el9.x86_64.rpm
d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d
glibmm24-2.66.1-1.el9.x86_64.rpm
a9c054a0e3ef1f92748658b37f9d31f8681aa0462d39606fda704eacbec262e4
gsl-2.6-7.el9.x86_64.rpm
6ad7c0869388e9fa92edb51cf895cffdda934117bb65031d182f782020281aa5
gspell-1.9.1-3.el9.x86_64.rpm
c1a520e082ae470c3134508db102a390f5ffd09105ca56bc944d82b4c1cf4cbe
gtkmm30-3.24.5-1.el9.x86_64.rpm
2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a
inkscape-1.1.1-6.el9.x86_64.rpm
f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171
inkscape-docs-1.1.1-6.el9.x86_64.rpm
084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4
inkscape-view-1.1.1-6.el9.x86_64.rpm
75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4
lapack-3.9.0-8.el9.x86_64.rpm
1a536d4d6cb79bd3f8aa0d31d941fc58aac684438279fcdf27fce903ba9d1357
librevenge-0.0.4-22.el9.x86_64.rpm
08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007
libsigc++20-2.10.7-2.el9.x86_64.rpm
7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb
libwpd-0.10.3-10.el9.x86_64.rpm
4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215
libwpg-0.3.3-8.el9.x86_64.rpm
e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562
openblas-0.3.15-3.el9.x86_64.rpm
47461d2fa724b1437330f2fb5cc45073a4c3f598d02880af488ed6e8199c2bdb
openblas-openmp-0.3.15-3.el9.x86_64.rpm
9fb2ca11be237ff5e3aa5ebcf1466ca5c10389c4a94dd35b01a8ac6a70d98a49
openblas-serial-0.3.15-3.el9.x86_64.rpm
774951fbb53756cc9e4d40a3a7cb34ca962ea4986bf8cf7deba3fdcb85703682
pangomm-2.46.1-1.el9.x86_64.rpm
4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376
poppler-21.01.0-13.el9.x86_64.rpm
15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc
poppler-cpp-21.01.0-13.el9.x86_64.rpm
054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de
poppler-data-0.4.9-9.el9.noarch.rpm
da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057
poppler-glib-21.01.0-13.el9.x86_64.rpm
b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40
poppler-qt5-21.01.0-13.el9.x86_64.rpm
ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163
poppler-utils-21.01.0-13.el9.x86_64.rpm
40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f
potrace-1.16-7.el9.x86_64.rpm
85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802
python3-appdirs-1.4.4-4.el9.noarch.rpm
0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102
python3-lxml-4.6.5-3.el9.x86_64.rpm
fa211bf07228f42800523d7e6d2c932f1f9f15812f944947820d29fa4bd27bbb
python3-numpy-1.20.1-5.el9.x86_64.rpm
634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d
python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm
939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6
python3-scour-0.38.1-5.el9.noarch.rpm
442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b
RLBA-2022:8430
fence-agents bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es) and Enhancement(s):
* fence_ibm_vpc: Add an authentication token caching mechanism (save token in session for configurable interval) (Rocky Linux9) (BZ#2127878)
* fence_azure_arm fails with 'ServicePrincipalCredentials' object has no attribute 'get_token' (BZ#2127882)
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm
5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a
fence-agents-compute-4.10.0-30.el9_1.1.x86_64.rpm
987cdfdcb4cf9924bb79f8450816d0d9d9c64a16e68b9ee9216aa28b2e504140
fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm
e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381
fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm
5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e
fence-agents-kubevirt-4.10.0-30.el9_1.1.x86_64.rpm
81f39692a3915637682b3c922fab5f48cf18c63836b45a075a16d72196cf9871
fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm
8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8
fence-virt-4.10.0-30.el9_1.1.x86_64.rpm
ad8079229d80d22fa0b8a61057b51407ad042735f9265cbee09e8c01d2b02744
fence-virtd-4.10.0-30.el9_1.1.x86_64.rpm
d38c221fad37130c267cb2e09f09e54c7a1661d8f391298aa667b988f94416f7
fence-virtd-cpg-4.10.0-30.el9_1.1.x86_64.rpm
7311bd308b7fce7626e1f1efceb4a2ebe51142076cf4d47af3b383af25d612a8
fence-virtd-libvirt-4.10.0-30.el9_1.1.x86_64.rpm
7c7a047976567520da46e488d7770e91a655a19440cc4afce78756c6125c7571
fence-virtd-multicast-4.10.0-30.el9_1.1.x86_64.rpm
cb792c9a484d9d15cf5973d6a91e80650cb25bd23d2769ed7eb8852605304c6d
fence-virtd-serial-4.10.0-30.el9_1.1.x86_64.rpm
d4c34e220f40da921730f096c90d89a975509b4d566b16599c7bee32dbc69aa2
fence-virtd-tcp-4.10.0-30.el9_1.1.x86_64.rpm
641685476e28e6708dc334ca1aaf3a92ad48ce39ce395796d44e85e77b7bf30a
RLBA-2022:8432
containers-common bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta (BZ#2123611)
rocky-linux-9-x86-64-appstream-rpms
containers-common-1-45.el9_1.x86_64.rpm
0317217135c1f62f4bbac2e7a2bbee073556e7fab000b8179d04176bf3c7c039
RLBA-2022:8433
runc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Bug Fix(es) and Enhancement(s):
* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 9.1] (BZ#2124700)
rocky-linux-9-x86-64-appstream-rpms
runc-1.1.4-1.el9_1.x86_64.rpm
a06c71f8d70df988d7821a0999b7fdc6d426bdcd45e9e421861730a5eb97a7a3
RLBA-2022:8435
netavark bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Netavark is a rust based network stack for containers.
Bug Fix(es) and Enhancement(s):
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (netavark) (BZ#2136306)
rocky-linux-9-x86-64-appstream-rpms
netavark-1.1.0-7.el9_1.x86_64.rpm
b805d4e34fd20718453196fbdc15a8c0039f9e1619260ea51a3781a92221b2b3
RLBA-2022:8437
ansible-freeipa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-freeipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management.
Bug Fix(es) and Enhancement(s):
* [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132976)
* ansible-freeipa Replica Install Setup DNS fails (BZ#2132990)
* ipaconfig does not support SID and netbios attributes. (BZ#2132996)
* [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135756)
* [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135757)
* [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135776)
rocky-linux-9-x86-64-appstream-rpms
ansible-freeipa-1.8.3-2.el9_1.noarch.rpm
b8daad624892a66649974061a744caf221b30df61e86b052ef643c53ebf71716
ansible-freeipa-tests-1.8.3-2.el9_1.noarch.rpm
19b460be48462862efa1a8dded89994549516dfdb9f714f7f00f3c8e11421cb5
RLBA-2022:8436
aardvark-dns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The aardvark-dns package is and authoritative DNS server for A/AAAA container records.
Bug Fix(es) and Enhancement(s):
* Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (aardvark-dns) (BZ#2136395)
rocky-linux-9-x86-64-appstream-rpms
aardvark-dns-1.1.0-5.el9_1.x86_64.rpm
5ba5a97a46dfe56a33954eeb4ffc3b5e3f3b98d2aa78d9cfe32935cf6f2ca633
RLBA-2022:8439
python-podman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-podman package is a library of bindings to use the RESTful API for Podman.
Bug Fix(es) and Enhancement(s):
* [RFE] python-podman: Podman support to perform custom actions on unhealthy
containers (BZ#2136283)
rocky-linux-9-x86-64-appstream-rpms
python3-podman-4.2.1-1.el9_1.noarch.rpm
fc48be3f554f9ee78ec7fe4d347b9929648d6b37d3d336189edc160295031b79
RLBA-2022:8440
mutter bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop
through OpenGL. It combines the window-management logic inherited from the
Metacity window manager with a display engine that uses the Clutter
toolkit.
Bug Fix(es) and Enhancement(s):
* [AMDCLIENT 9.1 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-9.1.0.z] (BZ#2136747)
rocky-linux-9-x86-64-appstream-rpms
mutter-40.9-10.el9_1.i686.rpm
4e3d16a73c4d923e5e9af5f5a8138cd682cfeb5ab527375cb3e3a323470ffac7
mutter-40.9-10.el9_1.x86_64.rpm
2d3b70879b9922cc48ca36a67b707aee6d8dcd283fffaf3c81104f9e9da621d7
RLBA-2022:8443
Rocky Linux9/skopeo container image update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Skopeo Universal Base Image provides a command line utility to inspect images and repositories directly on registries without the need to pull them.
This updates the Rocky Linux9/skopeo image in the Rocky Enterprise Software Foundation Container Registry.
To pull this container image, run one of the following commands:
podman pull registry.redhat.io/Rocky Linux9/skopeo (authenticated)
podman pull registry.access.redhat.com/ubi9/skopeo (unauthenticated)
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.9.4-0.1.el9_1.x86_64.rpm
2a77ae05a0cb0755f9cbb2c1e699a62fa7c162554295bb2d50a6a1e486c80d6f
skopeo-tests-1.9.4-0.1.el9_1.x86_64.rpm
c28cbaef7f50c84612c7fc66d551131465f1b48136556a093ff4ae5f403405bb
RLBA-2022:8446
bind-dyndb-ldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind-dyndb-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree (BZ#2130614)
rocky-linux-9-x86-64-appstream-rpms
bind-dyndb-ldap-11.9-8.el9_1.x86_64.rpm
3a72e9b5a513cf3ec462e02cfcf10df61fe2d6cc45be0d92f4da32205fd86815
RLSA-2022:8643
Important: varnish security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: Request Forgery Vulnerability (CVE-2022-45060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-2.el9_1.1.i686.rpm
c068a1f9d3a1c249487d18db2f18b2012bc8c6cd9b8ee37e136cdbf6469b5d9a
varnish-6.6.2-2.el9_1.1.x86_64.rpm
e59a3aff50bf54c2855693ea6a88f52aadd286ab784af4b9c19258dcdaef326d
varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm
1f4218dfac56d7056b83497444bf39bd2dd07bceade816145460324491df49da
RLBA-2022:8898
thunderbird:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Bug Fix(es) and Enhancement(s):
* Update thunderbird:flatpak module stream for Thunderbird 102.5 release (JIRA:Rocky LinuxPLAN-137720)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2022:8899
firefox:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Bug Fix(es) and Enhancement(s):
* Update firefox:flatpak module stream for Firefox 102.5 release (JIRA:Rocky LinuxPLAN-137721)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLBA-2023:0006
thunderbird:flatpak bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem, sbc, dbus-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Bug Fix(es) and Enhancement(s):
* Update thunderbird:flatpak module stream for Thunderbird 102.6 release (JIRA:Rocky LinuxPLAN-141433)
rocky-linux-9-x86-64-appstream-rpms
dbus-glib-0.110-13.el9.x86_64.rpm
bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071
dbus-glib-devel-0.110-13.el9.x86_64.rpm
78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756
libsbc-1.4-9.el9.x86_64.rpm
b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd
mozilla-filesystem-1.9-30.el9.x86_64.rpm
725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742
sbc-1.4-9.el9.x86_64.rpm
94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1
RLSA-2023:0021
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm
d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360
webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm
f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795
webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm
ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439
webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm
b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496
webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm
43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3
webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm
543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm
671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm
29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca
RLSA-2023:0077
Moderate: .NET 6.0 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13.
The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154459)
Security Fix(es):
* dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm
9db0dc0600bdea1d83e9cf77244d47746337cd3d132e8d11278559003b4ce323
aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm
551600b9437595edcbeb0ec2b5e5f0267af1e10da9373256f0d797a0289a8885
dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm
9d6fa29af152f6cb805c18a7825a22cfff1735023b30d7f4d1786cd6bad70adc
dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm
58ecd780e4538f926e33de436242765dfa0c61490260ee484747e409e0a46b1f
dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm
4c0201e920e53c917d9fe9b64b17498fe8e8d67e36e5606a3ce234e051578588
dotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm
2b47d910f58052a3881edb2c7eaa066804fc58bd101fba881f9a466e6a9e84b9
dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm
31d66d2443534ec6cd75d4e3f168bf8fcd138192f4459b6235a2818cb15114fa
dotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm
acfc5cb8bdd3bdaf790f2066c7d210bd469a7914c429dd4f94aa7c2635158e4a
RLBA-2023:0080
.NET 7.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-9.1.0.z] (BZ#2154468)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.2-1.el9_1.x86_64.rpm
45a3ea757e590caf1fe512335d62daf8273796fcac047292b1c2d87d135ddd45
aspnetcore-targeting-pack-7.0-7.0.2-1.el9_1.x86_64.rpm
933dff30066a5323eab4d9ab8fe243394a2025d444348588effe1b38b873fea5
dotnet-apphost-pack-7.0-7.0.2-1.el9_1.x86_64.rpm
f5e8e740ecb08cac5385fc703376e33fe476ee725c9405c87ba212e710db7b86
dotnet-host-7.0.2-1.el9_1.x86_64.rpm
39131f5c63acdc7834ae652fa087ce57cadd1a9a95d378033654a89816d8c0bf
dotnet-hostfxr-7.0-7.0.2-1.el9_1.x86_64.rpm
a622fc3fce5da03f4b8cd03be87cfdeb4ee8d18d1ccd3d12390a76b93fdaaa02
dotnet-runtime-7.0-7.0.2-1.el9_1.x86_64.rpm
63bfb252dd6e8f7ffb01d4fa0f8c398f1f9b1118248ad5a9d071543c05d3c57a
dotnet-sdk-7.0-7.0.102-1.el9_1.x86_64.rpm
0dc3dd8c128c66261929c65e9bdcec9f1e7486e000a18cc2352f157acaebc427
dotnet-targeting-pack-7.0-7.0.2-1.el9_1.x86_64.rpm
165b7a4cd93d6876f7b16baaae518090b6c19979a4fc1fa786903cb38b2b02d0
dotnet-templates-7.0-7.0.102-1.el9_1.x86_64.rpm
50a32099402a38ce5cf0f4f9a6a0b8cc1be33680e0f7a9fee18b469825d58c7d
netstandard-targeting-pack-2.1-7.0.102-1.el9_1.x86_64.rpm
394ee25bb288039ecc63f93370b77863cad2d60cc3e0de16af66a04870f16b9c
RLSA-2023:0302
Moderate: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058)
* libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519)
* libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953)
* libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520)
* libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.4.0-5.el9_1.x86_64.rpm
9ad603482201a15f2fe22300f480783803f3533a648cf0c3ac815aa2ede25c42
libtiff-4.4.0-5.el9_1.i686.rpm
a8904df1e994a0a1bd4c0744bab2ae19ef64f51d34b3cc6c1e9f90e4a86dc786
libtiff-devel-4.4.0-5.el9_1.i686.rpm
99887ab930d1a7382528eff8bcf1437a3a173910637bd60d2de0b1f8a7d33ed5
libtiff-devel-4.4.0-5.el9_1.x86_64.rpm
ef870eca9ad97a5edf3db88926078f6d425bba15f2a682454037b6636d474959
RLSA-2023:0202
Moderate: java-11-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-9] (BZ#2157798)
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm
60c900e0e70ad2aa113168d0ad1248e227f72765f35f2ccbfecd7332a0556521
java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm
6ff16801bfc4f869f374a422c0d63f76704b5c2b9381283f7d61a26b5588cc3d
java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm
d5a8739a6eac143ec2e0ee514ef2b75c99bc9537193611e89e16266ce6b5b735
java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm
80e3bf567d65b724252354970f420896b5e7fdfb9a061d11f2d9e50357b6af84
java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm
a6dc49895a69a59fe8b17e4950e71ddfce4631ff1a6917ea4e6e0f1d126d1081
java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm
efeee81819c8be95606f0332b03e9bf263eca50ed3680e76e54ccc500b4ac37f
java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm
4c9a4b8f28722695dcce618d2206825054f21c03c3f5b78d749a837610a82fb5
java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm
130807833f20785a8d94a8f3f2e9140a43b28cbd2b2fb0e4878ec7241855ded2
java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm
7f3dad478f4df0733595a39a172e3fef8a32c9bbc47632cc7a5a300b6aab126c
RLSA-2023:0285
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.7.0 ESR.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-102.7.0-1.el9_1.x86_64.rpm
e8250a15f8ed8a8fc434e3905d38e23ff428c5d1c455055f7cc31b659aa424c2
RLSA-2023:0194
Moderate: java-17-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147476)
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-9] (BZ#2153097)
rocky-linux-9-x86-64-appstream-rpms
java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm
4409381234e9e28121971447acbe4f89491a7559f18934fa55653dc46b0b18fa
java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm
2289ddbca594e14f4f05d39e4da3b3e44f1994c34c4adb912842ad325a22c2a6
java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm
2b5aed4d7296f9f168dfb09f40f0b480453fb4a5fc2e7acf522365541b454f61
java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm
fe66df12861f6373c7e8922a622bee5034f91ff32650fbeb6b59b0ea5689b420
java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm
40f474416097aec3d4d877477170ecf0e4fc1eaebc39eb31090b095c3cb441a1
java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm
384c363d515eec71cb89b4fea5d65b1fc088e4fb42e85b260140011b545f0432
java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm
bd51be60766e26132a7c67cdb701bbef8eb88e2158f2f8bb080077daf8400236
java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm
167de51cc3c1c77aa2a6f9715deaa89d7922bcfb67e7bc933aa41d9ee9eee612
java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm
fddbc4dcdd185cc68d1ee00316f3f524bbc5f3cc3b58193c6b33def4c142421f
RLSA-2023:0304
Moderate: libreoffice security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2022-3140)
* libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305)
* libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306)
* libreoffice: Weak Master Keys (CVE-2022-26307)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
autocorr-af-7.1.8.1-8.el9_1.noarch.rpm
98a866ad23fe0c7ac4349340425b1952cd54817a9ab6773c9a18573655a6552c
autocorr-bg-7.1.8.1-8.el9_1.noarch.rpm
5be15c28438dcafa92f2e410759eda47843898555c99166e8398adae4c7f1b08
autocorr-ca-7.1.8.1-8.el9_1.noarch.rpm
142bcd322b14f574c87a5c774397ba55a6496f2ce2afbf297b3f81eed627d430
autocorr-cs-7.1.8.1-8.el9_1.noarch.rpm
2c9313ce95a2aaaf3bb3b8a999983db1b110e49f4fefe65f9f58a8c9204a50f2
autocorr-da-7.1.8.1-8.el9_1.noarch.rpm
dcf03a78c14c9b775818e62d7ee01fed302d33d666cf1a30f62188b3ab281bde
autocorr-de-7.1.8.1-8.el9_1.noarch.rpm
ac6f40d7c93b2abe62ab1fc52856317ecd9eb335252c8b41f5e22a15f7a3d6b2
autocorr-dsb-7.1.8.1-8.el9_1.noarch.rpm
6e9f8cf9d81aac151fb35e1a2764f132ecc982dd4f9f4d3e088c377b4dcbdcbc
autocorr-el-7.1.8.1-8.el9_1.noarch.rpm
131c22c7baa10ce6030572b97969abe0e895c3363b7473166a1cf17dbca340c2
autocorr-en-7.1.8.1-8.el9_1.noarch.rpm
3187289c9274e083b14457d6bac8abf9988b7e0e4824991090b39a1b2e8a804d
autocorr-es-7.1.8.1-8.el9_1.noarch.rpm
d88a43343f88e9b132ba01c1fb00cb6b6ef7fd8f46d05515cc23143ad7a7bc98
autocorr-fa-7.1.8.1-8.el9_1.noarch.rpm
c5c530940ec82813d2cccdd9d599791faad2a25662a3e73d234305b9896c5b62
autocorr-fi-7.1.8.1-8.el9_1.noarch.rpm
2229172a62e5aedefe8bbdf5c16c13f24526a234de89f10f139f40564268ebc1
autocorr-fr-7.1.8.1-8.el9_1.noarch.rpm
8a38f3140a32919798846b7bd64bc3b95bb853efafa6f665298e5fcae983c86c
autocorr-ga-7.1.8.1-8.el9_1.noarch.rpm
36b3819441723ce83fec6569a3bf909b95eaadd9732ea7e81777dd9601d6716d
autocorr-hr-7.1.8.1-8.el9_1.noarch.rpm
f7795276cf95ee949c8bb232a4b570af198f3927c399b46b16c99e24279eebce
autocorr-hsb-7.1.8.1-8.el9_1.noarch.rpm
88bb6839b571445456084fe15445f9a0f8d8aebc96ec9254527741fc49ad463b
autocorr-hu-7.1.8.1-8.el9_1.noarch.rpm
e96996b3af11a7b07238fa3dda707bf0ec7f48259e0fd5994135b3190f88f446
autocorr-is-7.1.8.1-8.el9_1.noarch.rpm
77ca14ce9a589c1a4259295b7b34e0a78708b9fd57fad324a09a981d2592e1f6
autocorr-it-7.1.8.1-8.el9_1.noarch.rpm
59dbf71bfbd92e94eea6c3be2c4d3fdc75183f8cbc245c24330f972c9102b3a1
autocorr-ja-7.1.8.1-8.el9_1.noarch.rpm
d23e2c44cd49310299fe60cd1fd813004acd59fb27a0f6cce623c09aac1176db
autocorr-ko-7.1.8.1-8.el9_1.noarch.rpm
1add419b3e5e2dd5e631167183b4ceb7c163e6e6b1ca9595324647e06b49c4f6
autocorr-lb-7.1.8.1-8.el9_1.noarch.rpm
cf06d6d997ab839a7fc4a137ccb028da00292a9a543b15c2bc2350f54d790ca3
autocorr-lt-7.1.8.1-8.el9_1.noarch.rpm
aef12d41f081103dd7a8116f61fe79ffa9e5d31cf1f71c83cde4c48f24ec8841
autocorr-mn-7.1.8.1-8.el9_1.noarch.rpm
97928aaa2489720660577e94ce473bb3d825cfe43c0acadb939c5804fa8e33c8
autocorr-nl-7.1.8.1-8.el9_1.noarch.rpm
0ca37421eb5282668ec80111515c0e9c2c2d1fbd18a419c3929082dd6bc01287
autocorr-pl-7.1.8.1-8.el9_1.noarch.rpm
71c1e6f529d3e1f7fabccd2f7fd306542ab7f6321d6c32cc6433d7743b468e68
autocorr-pt-7.1.8.1-8.el9_1.noarch.rpm
e1b8482a30bc4f70587cc0ab2b0058e58c745ff3d8f1caf631293d6f7efe3354
autocorr-ro-7.1.8.1-8.el9_1.noarch.rpm
0388586c4e8af8b9d026f0ba47c9a49834c9d66eaf2c1a134e6b77233e6aae84
autocorr-ru-7.1.8.1-8.el9_1.noarch.rpm
a809c9adb4f697e87b80a47180c03348b5762be1a0ae6395a4559882a6d65b85
autocorr-sk-7.1.8.1-8.el9_1.noarch.rpm
f8aaa94b8524340c21f520e77244ab447d627f126b82b2bab43fa257c37c4f36
autocorr-sl-7.1.8.1-8.el9_1.noarch.rpm
62e85dee0f858cd74c14c5398661ffa21997523490b29d901ee9bf3746b9f1c2
autocorr-sr-7.1.8.1-8.el9_1.noarch.rpm
831491f8902b83343bf9492ee7d5e16ac48e6b4893a3989d20f15250416bfca0
autocorr-sv-7.1.8.1-8.el9_1.noarch.rpm
7afb55a7fecc25e88d962f6a9114f463ddb45bf3b01433fabdf174b4ff111670
autocorr-tr-7.1.8.1-8.el9_1.noarch.rpm
c710b8f912c6629e7466fba317398b73048412a1bbc18863d1c153292f86b60f
autocorr-vi-7.1.8.1-8.el9_1.noarch.rpm
289bd8a57afbd57f77a2e7e10e8015010584361be5c3328ecd25032b926e4471
autocorr-vro-7.1.8.1-8.el9_1.noarch.rpm
4077cdfe5b2f02a5459a867c196591275042152a6d2d1eb32587381d59929657
autocorr-zh-7.1.8.1-8.el9_1.noarch.rpm
2d3cd2fa0d3c890bdbfa4ee9a5797272f56cf1e8fb63fcee3d0c09e7583e6b69
libreoffice-base-7.1.8.1-8.el9_1.x86_64.rpm
57b18282533ed9d7300e08346c5302164355e217f500677c2a241626632653c8
libreoffice-calc-7.1.8.1-8.el9_1.x86_64.rpm
b4f939876bce2bdea906baeaef1df757ae0ef2b80f095b53243617b602f3cd00
libreoffice-core-7.1.8.1-8.el9_1.x86_64.rpm
3abd6d102d7542c276ce820a4c836458ef5397a4911fd285d21ccd5a8a3a039e
libreoffice-data-7.1.8.1-8.el9_1.noarch.rpm
de75ed47ee296c57bdfc71667ab6724d7e657e6e86008f6ec741c7f91b22407e
libreoffice-draw-7.1.8.1-8.el9_1.x86_64.rpm
83cced1404bcaf611ad6760bf2a634ebb8e0a331eb18171593fe317c995efbbd
libreoffice-emailmerge-7.1.8.1-8.el9_1.x86_64.rpm
3aae373899b3abffeb0bd129f52f0bf4da805e707431d6f32ddc40ec5baa4146
libreoffice-filters-7.1.8.1-8.el9_1.x86_64.rpm
46f4124d781e1abde4444591f66fc637af218844c09f49c7177601e3680686c3
libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.x86_64.rpm
aea35a5c39848b8a153296e963d94f6625f9e44cdc2928d404037f62f4185a3e
libreoffice-graphicfilter-7.1.8.1-8.el9_1.x86_64.rpm
50a0ae067353ab983d6d5557d8d19f830c9e696c150883327960d3e89682f468
libreoffice-gtk3-7.1.8.1-8.el9_1.x86_64.rpm
957a501d6ecfbf9ecbf854b35eb6d33f377a4fd2aca89c2bd7c5a1369f3131ee
libreoffice-help-ar-7.1.8.1-8.el9_1.x86_64.rpm
1cee6776d862f6c6f0c449b67dceeb0821a3cb9c22a74cee630d7f1873d764a9
libreoffice-help-bg-7.1.8.1-8.el9_1.x86_64.rpm
12f0745df802a25cf557468f7eb1f80f71bc85917c0b676c2d8027335a7ca01e
libreoffice-help-bn-7.1.8.1-8.el9_1.x86_64.rpm
da16b2a89ffba1b0f8a38d66506357b41a5ea47a558424d902d13e7f0d7d5d52
libreoffice-help-ca-7.1.8.1-8.el9_1.x86_64.rpm
8925f3ac02d9c830ef85555f86c18b915ea1ee4c8beeb032c2b50d9dac627b4e
libreoffice-help-cs-7.1.8.1-8.el9_1.x86_64.rpm
2db61c5edca061761b0692309e3847d4114bf547f7e4bfb27c5bece7a0874e18
libreoffice-help-da-7.1.8.1-8.el9_1.x86_64.rpm
877e8750276393e4edd5b6391695ce8f5a0a4308ea9c8fea408566157b611f40
libreoffice-help-de-7.1.8.1-8.el9_1.x86_64.rpm
1b0147b71ef7a929c75299170a6abe6c63af2e514934133a57405c92688bf8fc
libreoffice-help-dz-7.1.8.1-8.el9_1.x86_64.rpm
d5b61f098b278e99ee9ca6ff2f1f9b145e6df50c518c5a67d9386a61085db1f8
libreoffice-help-el-7.1.8.1-8.el9_1.x86_64.rpm
74c02e8943e4f8d1836721b8bfbdcbc89a2e6c019ed5b5f4559d13ec773c3532
libreoffice-help-en-7.1.8.1-8.el9_1.x86_64.rpm
a76e48f8ea4974cf1997baef1932cec5d25108384ff3ee461223759871c2b3a1
libreoffice-help-eo-7.1.8.1-8.el9_1.x86_64.rpm
7208ae0a3f5d248a7aa4df3da0aee40207414e2fe9c5362c81bad40a5bc6976a
libreoffice-help-es-7.1.8.1-8.el9_1.x86_64.rpm
0b743090e6477a911e0956830ee8ec131aba5309d4bd3649d34bf680983fc70d
libreoffice-help-et-7.1.8.1-8.el9_1.x86_64.rpm
6392a9d0f49f6f12f593f1d7f8153db4c4d23e1481be255be187cbad43824704
libreoffice-help-eu-7.1.8.1-8.el9_1.x86_64.rpm
a033da0d75e50562cc4470c3c45e8c577843138235044b39f72cefcad2ba4d77
libreoffice-help-fi-7.1.8.1-8.el9_1.x86_64.rpm
3397c1b980933a8f61c278d753ee8d92c374bec45f82f43aa102a1f289194b39
libreoffice-help-fr-7.1.8.1-8.el9_1.x86_64.rpm
ba5dee986d1067080ee459aea7fb4ea3a1a8233f72cea582ff734bd75c468a0e
libreoffice-help-gl-7.1.8.1-8.el9_1.x86_64.rpm
99066543c10e5a58798a64dbdc8f0e2f126e8105c04ad38c8c1a3146f870e0ea
libreoffice-help-gu-7.1.8.1-8.el9_1.x86_64.rpm
c04e8a889aebecfab64241ffa35a1206c36cb191096e00da03e4181cdf8b8b83
libreoffice-help-he-7.1.8.1-8.el9_1.x86_64.rpm
52dee689f1c255b36d0d8c52e961ae4b8656ebff66fd85600313f57dfd8585eb
libreoffice-help-hi-7.1.8.1-8.el9_1.x86_64.rpm
0b66126e37449026645069c3c9a92fcc8723954b2bdeff546d7ef0734b1a8438
libreoffice-help-hr-7.1.8.1-8.el9_1.x86_64.rpm
d45d1f3dcb431a0b64c8b5643f43597338e7b23254e5e80847209f12f9c84d3a
libreoffice-help-hu-7.1.8.1-8.el9_1.x86_64.rpm
e2d92cf69ef478e0d40cfe27d8b6bfe79d192d4309dba2563e722d1963c58376
libreoffice-help-id-7.1.8.1-8.el9_1.x86_64.rpm
3229c7c6bc1fc2ad69fd53c79490ffab6a138a514a70a88a1df07b71fce5de4d
libreoffice-help-it-7.1.8.1-8.el9_1.x86_64.rpm
2231a7682f9d2f3d760364c3a9e1cd87ff950c2c9369ee75b619f2c27dda0b78
libreoffice-help-ja-7.1.8.1-8.el9_1.x86_64.rpm
b513d846726c880041a695b20426886249d95ccb3db7209bfe081f920a86f668
libreoffice-help-ko-7.1.8.1-8.el9_1.x86_64.rpm
9e4cecb152033b72a53ac5a095a5038acab8848ddc10c641603de3e4be081823
libreoffice-help-lt-7.1.8.1-8.el9_1.x86_64.rpm
df393089d2f612f87fe7926f47dab15e30d9fe0fd3f80096e58642d4ae35e791
libreoffice-help-lv-7.1.8.1-8.el9_1.x86_64.rpm
feb8eaa5f4c3c81b3bd8ac68022f6828d5fbb5893b143bbd814455355bc3cd23
libreoffice-help-nb-7.1.8.1-8.el9_1.x86_64.rpm
467f45c06f8060ebef477adcd188b4449628391025b35c905f86fe6c50d644ce
libreoffice-help-nl-7.1.8.1-8.el9_1.x86_64.rpm
4e7ba6969d8e23e3ef79a9a96ff713079fb297b76cab9bbff1718b04f0c10317
libreoffice-help-nn-7.1.8.1-8.el9_1.x86_64.rpm
fd7a10c5b9bc841f20c257bc65abd06f2245db2ba8c6f7db151f2ee27b9910ed
libreoffice-help-pl-7.1.8.1-8.el9_1.x86_64.rpm
27e4509519f749422d388af5b6e24ace07257f56b28e3db06b38d48364b0ff60
libreoffice-help-pt-BR-7.1.8.1-8.el9_1.x86_64.rpm
73ea1126020c5bb199333adb344992b8d04c59d7b9a5f453fa7c0e3224334685
libreoffice-help-pt-PT-7.1.8.1-8.el9_1.x86_64.rpm
bf5e248b778859b2a34fda87ce0ed50107786ac80d1db5e9298f5b86ea20bd5a
libreoffice-help-ro-7.1.8.1-8.el9_1.x86_64.rpm
81dc93bf68a3d9a112072588697159cd1cb94c65b35fbdb7dccc03f153b18aa2
libreoffice-help-ru-7.1.8.1-8.el9_1.x86_64.rpm
6f218d76834d34313a54f0b8048b75897ab79e4dc49039437c3030a0ee022348
libreoffice-help-si-7.1.8.1-8.el9_1.x86_64.rpm
bee7f9cea2846f2c39cf96cf0e1ea32593cf853c693c1ad423f1852b144b40be
libreoffice-help-sk-7.1.8.1-8.el9_1.x86_64.rpm
b07900f8cb97a7ed7a9ad82a0b19f4d5379156efa05ebe072f995829260d1099
libreoffice-help-sl-7.1.8.1-8.el9_1.x86_64.rpm
2a8fb15edf23fd13e606a98a8a2014563c9e1bc9c826fd735c4395fbe78d3a0d
libreoffice-help-sv-7.1.8.1-8.el9_1.x86_64.rpm
3768bba8138af97a03f7b7f7a0fbef052285c129b0be30d39c9f9c38a02a147b
libreoffice-help-ta-7.1.8.1-8.el9_1.x86_64.rpm
76e71b02e06de52e546f13f4f0f561b8afc61ff531ccf7e4cd1b017c976c73d2
libreoffice-help-tr-7.1.8.1-8.el9_1.x86_64.rpm
2b37d4ef225049052508560399f3f3de89795626ff86248cbcaaef05cd617826
libreoffice-help-uk-7.1.8.1-8.el9_1.x86_64.rpm
f106df85ba89d100e03c5dcf0ab0b3dd99755e90e9b5d716a77111ab460eac07
libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.x86_64.rpm
176d7f7748aab209a96e1be7ca389a9a24f2838914d9643036b645dede1d5a0d
libreoffice-help-zh-Hant-7.1.8.1-8.el9_1.x86_64.rpm
042c953e1dc9a0bde12143fd05e9301f2d8edabed1468b77d323a985eec5a43e
libreoffice-impress-7.1.8.1-8.el9_1.x86_64.rpm
de369982ff0a2741c432f8fd10daf098a2581b908e0ef02e020436b5dc82bbe0
libreofficekit-7.1.8.1-8.el9_1.x86_64.rpm
05076f3643fc2de1edeee9f697248fc455d64c0923199d2d45d0a93b6567488a
libreoffice-langpack-af-7.1.8.1-8.el9_1.x86_64.rpm
da3aeaca79fb633c67ac334e6e1f5ae920859b5950778be7dde7bdf581b97190
libreoffice-langpack-ar-7.1.8.1-8.el9_1.x86_64.rpm
7357740b78ef97c6e786e22e0de8f4a9e975e14e80ae157eeaed79407584cf6e
libreoffice-langpack-as-7.1.8.1-8.el9_1.x86_64.rpm
48da8f9a7fe08b94f137082717b3b3594641eb4c1be83c4a1959c68608cd6d29
libreoffice-langpack-bg-7.1.8.1-8.el9_1.x86_64.rpm
0e624733f2d83c06af1763f41447458afe6a651c539c570809cd00411f8fd834
libreoffice-langpack-bn-7.1.8.1-8.el9_1.x86_64.rpm
a284954648ccc6f7af85142beeb4ce77377d65146ab48be617c2e72872faa6e5
libreoffice-langpack-br-7.1.8.1-8.el9_1.x86_64.rpm
c7850db59a6c6fef169a7def0b123a9d8104582db9670a468361f9a420899bec
libreoffice-langpack-ca-7.1.8.1-8.el9_1.x86_64.rpm
a9b10907bda9a082745579d9137fe86303067998bf9c777e11b2c46af3c7136d
libreoffice-langpack-cs-7.1.8.1-8.el9_1.x86_64.rpm
004f62c461ffa8b031b7b1178a2dad40de4cb5ed9c081162b401ee0abc64e397
libreoffice-langpack-cy-7.1.8.1-8.el9_1.x86_64.rpm
857b5b0dee6654940dfa86e77110268f9630978f2b5aa99345819e6556e7280e
libreoffice-langpack-da-7.1.8.1-8.el9_1.x86_64.rpm
e3a54189530cdc1c96dd238d6dfa1bb267e6daad7376ba68e1aab9e8b45913dc
libreoffice-langpack-de-7.1.8.1-8.el9_1.x86_64.rpm
c66f8ed05132b9ad4a64ab8ad35663ad570c01b9265997e43c57665cd467ae4f
libreoffice-langpack-dz-7.1.8.1-8.el9_1.x86_64.rpm
bf01d2e836c86f04349780f1ae92343c121d110b4cf5306600be7fa976550ac8
libreoffice-langpack-el-7.1.8.1-8.el9_1.x86_64.rpm
fb1b98f7b63701f2d0a0047fa4d86a08dc13bb4c01a7ba33094c04fc0622454d
libreoffice-langpack-en-7.1.8.1-8.el9_1.x86_64.rpm
eae45b3a1037fabdf5d9e8859fe56560c9af97a2abe1950c659702ae0dd50fb8
libreoffice-langpack-eo-7.1.8.1-8.el9_1.x86_64.rpm
524795ec95bced0b3593fdecb64761ed1570e149d21ad43e7206903ff60b3474
libreoffice-langpack-es-7.1.8.1-8.el9_1.x86_64.rpm
40c87f68987a43a4baceb4dc164b80973c3ee43bb3211a5e47f2f6e96007454a
libreoffice-langpack-et-7.1.8.1-8.el9_1.x86_64.rpm
1822e06ec22784bc5cbe037e3162c07681a76f049689406fc3963af66046552a
libreoffice-langpack-eu-7.1.8.1-8.el9_1.x86_64.rpm
878ab847b89f5b9ccb6da265fcf60800a0c4d2cbaaf2929e277d04d89b1ad832
libreoffice-langpack-fa-7.1.8.1-8.el9_1.x86_64.rpm
3af3c245882fd0eb6f34518ce6b0b27c723201d80862bd6ba527097dff8d0ff8
libreoffice-langpack-fi-7.1.8.1-8.el9_1.x86_64.rpm
4e38129744276b294036fa41586e51cb276344da5e20bb401f98784c98ba1b66
libreoffice-langpack-fr-7.1.8.1-8.el9_1.x86_64.rpm
396c22992ee8d51a8d332ba2997220a1f238a74c98190add02f65e7287b63f1b
libreoffice-langpack-fy-7.1.8.1-8.el9_1.x86_64.rpm
33d7d265814f83b6d76d485e6aa319b6072f8eefd7d720419e0f0c67b4b0dc87
libreoffice-langpack-ga-7.1.8.1-8.el9_1.x86_64.rpm
a1c9570733a65c4998b7378e5460d874d8c4295f63218d33e66097ecf6a7c077
libreoffice-langpack-gl-7.1.8.1-8.el9_1.x86_64.rpm
86458aba6ff59874feeef581b03b716e2350f5a70ef6f6196fff7e91e1c2662f
libreoffice-langpack-gu-7.1.8.1-8.el9_1.x86_64.rpm
53fa3e58d6b0c92bbd87021037b2c0f34425f4650346e49f3d522a2153cc15a7
libreoffice-langpack-he-7.1.8.1-8.el9_1.x86_64.rpm
3019f9c1c643009502a2afffca4d6be9db0efc9b9c11ffbfa655ebfc39b20e8a
libreoffice-langpack-hi-7.1.8.1-8.el9_1.x86_64.rpm
c8eb009e7fec0cc2e4c104c5c178c9efa8c141164ba11f57b81bf74a366bbf65
libreoffice-langpack-hr-7.1.8.1-8.el9_1.x86_64.rpm
3609cb30cc4853f2423d2611e6341df98e2af53a01ddce74c2d7b215be7c2644
libreoffice-langpack-hu-7.1.8.1-8.el9_1.x86_64.rpm
d5a4456a41f5741323aaa1b6decd03a60dd7b454b62abaa9b36d7aeb7e509310
libreoffice-langpack-id-7.1.8.1-8.el9_1.x86_64.rpm
061fe1351ca5de0550542e9076e1a8c31a0896f01285ad7f818126d61f6d206a
libreoffice-langpack-it-7.1.8.1-8.el9_1.x86_64.rpm
450bed82a06e85078c38e11076446a9f270d1224b09b712dd9677bf55cd609a3
libreoffice-langpack-ja-7.1.8.1-8.el9_1.x86_64.rpm
4ba221f1b220fe468eb5f1ee92ce54c536c827f02fe7f5ebf7dd8c040d3f74e5
libreoffice-langpack-kk-7.1.8.1-8.el9_1.x86_64.rpm
e5b5bf45ec1fbe009c0573cb3ab591da20687d219bade4e098208701b62b4104
libreoffice-langpack-kn-7.1.8.1-8.el9_1.x86_64.rpm
c2cfc1eed63c540aebaee11d134e840f33ce14673b4883b262fc28455564c903
libreoffice-langpack-ko-7.1.8.1-8.el9_1.x86_64.rpm
39e8afdb0d655bc8000c5b8b77a30f1ef29c280dc453a0e7442f9260012c20c3
libreoffice-langpack-lt-7.1.8.1-8.el9_1.x86_64.rpm
cdaebe76d376c9b9d6d9e6e89c985133670413bf8fe207e9e0d1dc3b6303621c
libreoffice-langpack-lv-7.1.8.1-8.el9_1.x86_64.rpm
ebdc924c9eec7357ba2493ff19c2ce75a1d18dddcd2feae0934e34d557825b88
libreoffice-langpack-mai-7.1.8.1-8.el9_1.x86_64.rpm
cdd17886c3c66cfaa29801d1c41ecabab499c73e3d3029c8c465cfa8f233a725
libreoffice-langpack-ml-7.1.8.1-8.el9_1.x86_64.rpm
1d5c74c5a4b3f4571a818e4acb9e79d28e6ed0b4849c74d2880215736aa55835
libreoffice-langpack-mr-7.1.8.1-8.el9_1.x86_64.rpm
a03bc0376902dea76099461e3cf9b4ddad7dfcf09d66edd70323e92adb464797
libreoffice-langpack-nb-7.1.8.1-8.el9_1.x86_64.rpm
135f938eed15269d823e49fd8b6e110318084b3e355d2519836fab963a373911
libreoffice-langpack-nl-7.1.8.1-8.el9_1.x86_64.rpm
fd055f3ff95be6244d851998244f8f0a47c96a2e899230ffb3d84e42a8af479a
libreoffice-langpack-nn-7.1.8.1-8.el9_1.x86_64.rpm
399aadb5e0d0f87b376bdbaaf33f1a0cd5480d2317b7b9f16b0c7c8204197abd
libreoffice-langpack-nr-7.1.8.1-8.el9_1.x86_64.rpm
25641b3c5edf2ebe6829ec5cd351f18be2bf9e74214ae3ae845667ebdab91392
libreoffice-langpack-nso-7.1.8.1-8.el9_1.x86_64.rpm
0dbd034032b4042f8f421ee381960d6ebecb2ff7055539b2ec51d9e7888b42b9
libreoffice-langpack-or-7.1.8.1-8.el9_1.x86_64.rpm
7480423d80e9c95ca7714d906b575c2956fee7c3a8c464d0bf41466480328ad5
libreoffice-langpack-pa-7.1.8.1-8.el9_1.x86_64.rpm
41bde9c91c1c383ad2a2a4d16bc108bd42924c2407dd1bbe383cdde8acf51c04
libreoffice-langpack-pl-7.1.8.1-8.el9_1.x86_64.rpm
30eed206605dd3d9d7fcb5bd5818180997e018c4f3fe1e67114693a14b4fd28a
libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.x86_64.rpm
d677f9362e8762f2fa1943dca085f22d9fc58730356fbf7e260b6f1746308d7f
libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.x86_64.rpm
8f343a54dbc82b693ad7898b8d9d564ee5f135be3c3fec0340d0d022979424ce
libreoffice-langpack-ro-7.1.8.1-8.el9_1.x86_64.rpm
485c19891954a4ec2a2b6fe833fb324c36d6f89ea4bd8b01f1e4bb0b158990c6
libreoffice-langpack-ru-7.1.8.1-8.el9_1.x86_64.rpm
aaeebc33758066408294bb57e7b0d7fb500f653bd0385447e520bb9ccc087cf8
libreoffice-langpack-si-7.1.8.1-8.el9_1.x86_64.rpm
aac0959398e6f71bd90bf41301b838c33b82c4bd1fdbeafd806130a97a9e7ad2
libreoffice-langpack-sk-7.1.8.1-8.el9_1.x86_64.rpm
2ef35119737080ed28ebbbc115496bf077b894fac27713340d48b8b517860291
libreoffice-langpack-sl-7.1.8.1-8.el9_1.x86_64.rpm
d967cf834b4d69ce0e66bb046430d02a7c1f1ffd79025d1af0d94ed6e841014b
libreoffice-langpack-sr-7.1.8.1-8.el9_1.x86_64.rpm
c62154d5546ca2a3e45b970709e49ea9f136c1fd917dcc339b6936bc913314be
libreoffice-langpack-ss-7.1.8.1-8.el9_1.x86_64.rpm
d1f8c7f2de492bbcec6f2e6cab5871d9c16ada8c79511a73b2f078bff48df7ee
libreoffice-langpack-st-7.1.8.1-8.el9_1.x86_64.rpm
523899f4b6f1719c12c9eedeffb0617e6c833c5868bbd3d76d7ccda8580a0ce1
libreoffice-langpack-sv-7.1.8.1-8.el9_1.x86_64.rpm
6e6e4f57f4b9de950be0e390da8bb9d4fc645a43ac1876bc3b8bf3bbceb2ab06
libreoffice-langpack-ta-7.1.8.1-8.el9_1.x86_64.rpm
897680819cbf2b0d5f71846d98b386b8de863a0bbd62e2ef138a86dd71205d4d
libreoffice-langpack-te-7.1.8.1-8.el9_1.x86_64.rpm
cabca3e3eb5e1e5dbd4910d55bf170245b7cd3ab53d70f78170bba5d383cd2fd
libreoffice-langpack-th-7.1.8.1-8.el9_1.x86_64.rpm
9872d147b49f7bf2c59c121ea5953eadfca945318c0c1c574c7e3c8f20887822
libreoffice-langpack-tn-7.1.8.1-8.el9_1.x86_64.rpm
f58cc910504897d59671a0a7367d1ac2ceff883192dba167f4866be7cf23795d
libreoffice-langpack-tr-7.1.8.1-8.el9_1.x86_64.rpm
03f7ef93bfb5be6f4d2040571ad0d702b7a8cb2010ec773ffae6e43450c1812b
libreoffice-langpack-ts-7.1.8.1-8.el9_1.x86_64.rpm
787f531de7b32b0d3ca24c513b98f45ddcf5eaa5bd1d8491afaf8268693cc948
libreoffice-langpack-uk-7.1.8.1-8.el9_1.x86_64.rpm
1b22877e3b0a95475fb8d64516890815b62dd7fda42011fad078f11ed1c98647
libreoffice-langpack-ve-7.1.8.1-8.el9_1.x86_64.rpm
a1a1ec674d2b4d02e0fcd82722e6f8d2ff41c510b8a5c45a11a08bbcb74b6fb7
libreoffice-langpack-xh-7.1.8.1-8.el9_1.x86_64.rpm
68b4fdc4fc27b9008ea6aa6d699732913474cc8184c960728935267b6e1c9bc8
libreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.x86_64.rpm
a41c35e49959e114c69fec5b68d8828a3ea871ae9e6a6dfa9add33b1ad647644
libreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.x86_64.rpm
4336e686b910a8bb714c37a9063191cb27375e8ad5527e68cce8be09e0e4d726
libreoffice-langpack-zu-7.1.8.1-8.el9_1.x86_64.rpm
6805ea930cc2a3da45202d047a57e6d922255d4bb382758ef2b9d3cee7d8633e
libreoffice-math-7.1.8.1-8.el9_1.x86_64.rpm
76e4613f50ff1a4f2f5ca8e3e0cc21df68a861202d167f3ab0971cebb7d1bf9b
libreoffice-ogltrans-7.1.8.1-8.el9_1.x86_64.rpm
bfcaf58fd8827dc203f64a02462c44a1c0fdfe14bbe81f0a190af7347875e611
libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.noarch.rpm
a7518cadf02101e619416247f2699d2c9a1906316f56afc6d47b13cf9ed81897
libreoffice-pdfimport-7.1.8.1-8.el9_1.x86_64.rpm
3124261d23fd724dcc54bc722bededefd99a37adaabdfa5e73883bc7a1e9bef8
libreoffice-pyuno-7.1.8.1-8.el9_1.x86_64.rpm
1b8a69dd7a06cb565ca8a9b4eeda9206a7512d4b3b292c7518087c72b7f21654
libreoffice-ure-7.1.8.1-8.el9_1.x86_64.rpm
3473b86db4de1a7b093f8b34f589f6fcf6ba66e1a2331b49a6507ccf12358c1f
libreoffice-ure-common-7.1.8.1-8.el9_1.noarch.rpm
f659477b9c1ea5ab9bb0de86642bf9df0faf7d342350c0adc7b4f3c420521046
libreoffice-wiki-publisher-7.1.8.1-8.el9_1.x86_64.rpm
386cacc2ab280263d1da67f6d4c9c262faef0860e25b8728a37f6e283490574d
libreoffice-writer-7.1.8.1-8.el9_1.x86_64.rpm
1582abb87edda7350c2017b376e751a2cde290b826e5ca7c1e0d754b49b0012a
libreoffice-x11-7.1.8.1-8.el9_1.x86_64.rpm
85ab4c3592df647d3258eeda31c2228616ddef3f0e4d36eb04b52f415faa616c
libreoffice-xsltfilter-7.1.8.1-8.el9_1.x86_64.rpm
f40276b2527383cc58d3cf74ac6fbb20cdd6af0f3d84c1736ac87819bccd7dc7
RLSA-2023:0303
Moderate: usbguard security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for usbguard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature.
Security Fix(es):
* usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
usbguard-1.0.0-10.el9_1.2.i686.rpm
ed1d7851cb634fe120cc8fb62b664d797203278440c07cfd8e0bb50ff3b90a5b
usbguard-1.0.0-10.el9_1.2.x86_64.rpm
237bf57bcb21ec99e0f4f605a1f685c29e8fbd52be85215c8091175a2ca2b3af
usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm
821f7cc58d4632a98a7470a2f86ebfe04c447623af52700a88c28120b955f508
usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm
ff7701135023660d1eb0217503379c5f0bceee00374f4d30c8e847ba04881248
usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm
0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5
usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm
335ecd55f5170814776f7fdcc360afc5acf61947ed0607939d25f8f34c442ad2
RLBA-2023:0306
stalld bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The stalld package provides a mechanism used to prevent the starvation of
operating system threads in a Linux system.
Bug Fix(es) and Enhancement(s):
* Rebase stalld to latest upstream version (BZ#2136572)
rocky-linux-9-x86-64-appstream-rpms
stalld-1.17.1-1.el9_1.x86_64.rpm
def949af97937fda0cc5a1ea4388e42c825f62a31631631e7ceeffc47425ec4d
RLBA-2023:0307
fapolicyd bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fixes:
* statically linked app can execute untrusted app (BZ#2137254)
* fapolicyd ineffective with systemd DynamicUser=yes (BZ#2137263)
rocky-linux-9-x86-64-appstream-rpms
fapolicyd-1.1.3-102.el9_1.7.x86_64.rpm
cd924613bfa40361bd6fc83f191d0731e67b05452dfa0a8df8e70e889d5c8640
fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm
2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d
RLBA-2023:0309
keylime bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime
integrity measurement solution.
Bug Fix(es) and Enhancement(s):
* agent fails IMA attestation when one scripts is executed quickly after the other (BZ#2142032)
* Registrar may crash during EK validation when require_ek_cert is enabled (BZ#2142033)
* Segmentation fault in /usr/share/keylime/create_mb_refstate script (BZ#2142034)
rocky-linux-9-x86-64-appstream-rpms
keylime-6.5.1-1.el9_1.4.x86_64.rpm
4ebeccd3fa45154859133692dd6e8e7f2ae6b60b4451f3294956928ab32b336c
keylime-base-6.5.1-1.el9_1.4.x86_64.rpm
44389a08b4c3b149c3432bd37888893de9bc2c3261069d71a0e873224add559d
keylime-registrar-6.5.1-1.el9_1.4.x86_64.rpm
bc7a81d8e8e9e3547550806883103a9cbc1d95f78b84494c940912a65bbdc91f
keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm
2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac
keylime-tenant-6.5.1-1.el9_1.4.x86_64.rpm
74d2ff21c54cd23d1f2756838008f2640b69a17b4de8070de7c282b47eeaeb43
keylime-verifier-6.5.1-1.el9_1.4.x86_64.rpm
22b126056912799186d289c10e59d6c86b3a802b7fa697722a19fac6a166fb16
python3-keylime-6.5.1-1.el9_1.4.x86_64.rpm
a289908636025492c0a33826cb1057d77c797d8e52dc02d0779f3e844055d470
RLBA-2023:0310
conntrack-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conntrack-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use.
Bug Fix(es) and Enhancement(s):
* Rebase to 1.4.6 or backport fixes (BZ#2126627)
* Fix for covscan results (BZ#2122946)
rocky-linux-9-x86-64-appstream-rpms
conntrack-tools-1.4.5-17.el9_1.x86_64.rpm
74526a63f2aef409c913f379f272fcb8b59069dbe660d08837baa23084616c92
RLBA-2023:0312
tracker bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracker.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tracker is a powerful desktop-neutral first class object database, tag and metadata database, search tool, and indexer. It consists of a common object database that allows entities to have an almost infinite number of properties, metadata (both embedded and harvested, as well as user definable), a comprehensive database of keywords and tags, and links to other entities. It provides additional features for file-based objects including context linking and audit trails for a file object. It has the ability to index, store, and harvest metadata, retrieve and search all types of files and other first class objects.
Bug Fix:
* GTK 3 directly depends on libsoup 2 (BZ#2141023)
rocky-linux-9-x86-64-appstream-rpms
libtracker-sparql-3.1.2-3.el9_1.i686.rpm
aad670c73451ce3a4cdbe60a73d1a207a8495ea7a5fbede4ebc9a102e52e1039
libtracker-sparql-3.1.2-3.el9_1.x86_64.rpm
583a761cca669314c234f24db6a3c5d27550d16dcfbf02f5c9fd53b0da5e57a4
tracker-3.1.2-3.el9_1.x86_64.rpm
64c85f77f05cf0c53dc7b12316289220fd6dc92cff1f11340e9948288fb08eab
RLBA-2023:0311
libvirt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fixes:
* libvirt doesn't catch mdevs created thru sysfs (BZ#2141364)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083)
* qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410)
Enhancement:
* Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094)
rocky-linux-9-x86-64-appstream-rpms
libvirt-8.5.0-7.3.el9_1.x86_64.rpm
c708779a396e230d2c5b07e0bfe51cd01f49ccbd4c83869d8073d60d6370dd64
libvirt-client-8.5.0-7.3.el9_1.x86_64.rpm
7e78e4b314f9391dae14046061f56a0877ba5d2fa8fc6c80e50ef539c8cb8643
libvirt-daemon-8.5.0-7.3.el9_1.x86_64.rpm
48b52a90c97c6b7ad233f63d5e89b6e755018153285734c21f78660409585d1a
libvirt-daemon-config-network-8.5.0-7.3.el9_1.x86_64.rpm
ea06d4aa7466a860568cd37e88f867968d093a0323d9f4d47a57c2bbeb18c91e
libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm
420ff2d0519c7e21815e4beb165018e69bbdc52f3bf3c93b961e9873a55eecae
libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.x86_64.rpm
7e3a7d4ecf369c032a337355427483db927474305d71c1815f888aa28197a218
libvirt-daemon-driver-network-8.5.0-7.3.el9_1.x86_64.rpm
3ed76de2a5b5b77ace56a63991e4b9f57579d0419976dadd00cece896e6be893
libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.x86_64.rpm
ca05c2a76e07f5ff4647ce9db4ad488a0d4f02a7047be7d15618e969a6a1961b
libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm
792d48eae60612d2edef25f085c8d1508d110d575b40c3c4a1631ca7177d4b1e
libvirt-daemon-driver-qemu-8.5.0-7.3.el9_1.x86_64.rpm
b0f28d516b0edc48b0b922dfafa3eb67df028ef014c04e355f31e80aba6005da
libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.x86_64.rpm
de5bb1b4844f9ff342ccc76b99404624c2d77209c7c4de29253080dcc85c6ef5
libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.x86_64.rpm
11d28b80a7e3f9d171f9d48637e61241c66003ae24366dbe34328c0595e37b7c
libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.x86_64.rpm
37d0168e2a00cf5e6928bb0a5bfda4b762fc83455f8d60dd9ee459a0cfc95167
libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.x86_64.rpm
24e8e44a9eae16af22f0a4612baaba359e4df0efa8197bba24b03ce0ad2072bd
libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.x86_64.rpm
4019867e2bdd85da3b6fd73d8649fa476875224fae7f21d06c84af2778797e5d
libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.x86_64.rpm
ac268085630e07135f22f6d3224469f1b1fed919758eb843017c3356e41e153a
libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.x86_64.rpm
43a2dd82596de9414d0e7ada2acaaa89d864a20c5b42623b322ec4b86b0890ec
libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.x86_64.rpm
eb0ac684f2d54aa112510c00b04ba8fca6043aabc83f5b6d3052b5659e701037
libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.x86_64.rpm
92c62e1ff027648c615425c0b1969373bba89fdc99e4c6a95d84be5e1a806c15
libvirt-daemon-kvm-8.5.0-7.3.el9_1.x86_64.rpm
baaf46cf94b070312b786a26aa1f21c16d1e17e7a6a7bf6217b7a0cad0cb3bf5
libvirt-libs-8.5.0-7.3.el9_1.x86_64.rpm
676aee21a6ccef29385ddeb6118c7e29c2ca4250acf8ea9af15905ad3ea44e0b
libvirt-nss-8.5.0-7.3.el9_1.x86_64.rpm
d829f341c6a3e196c3b05e1cee3af14c96f9fd387883a4d76f5afc45af0ccae4
RLBA-2023:0313
nmstate bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix:
* Cannot move bridge port to bond (BZ#2148394)
rocky-linux-9-x86-64-appstream-rpms
nmstate-2.1.4-2.el9_1.x86_64.rpm
e97f018f1f7cd2b042099960fa5340ba729f2bdeedef9347d5e2166cd82d5449
nmstate-libs-2.1.4-2.el9_1.i686.rpm
dd9bbeb03426c672c4fadf6781d0c6b06610031ae44baa56fccc98aaff0a329c
nmstate-libs-2.1.4-2.el9_1.x86_64.rpm
1101d5e8008cfed4b44e4c8307f9b57678479ddb5b1c4769f0f783681bb298a0
python3-libnmstate-2.1.4-2.el9_1.x86_64.rpm
5283d7ae58c28c5872f1207fe6e75d14090db6742cd3581024e3dfb96e8d7d55
RLBA-2023:0314
podman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Bug Fix(es) and Enhancement(s):
* [FJ9.2 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2136928)
* FailingStreak is not reset to 0 when the container starts again. (BZ#2149776)
* SIGSEGV: segmentation violation on s390x (BZ#2150433)
* podman: ubi8 sticky bit removed from /tmp (BZ#2152026)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152043)
rocky-linux-9-x86-64-appstream-rpms
podman-4.2.0-9.el9_1.x86_64.rpm
ce8412fbaa7fd6b47fe9f40bfe3fffb2c175f73d4f25104e715f64adc56854aa
podman-catatonit-4.2.0-9.el9_1.x86_64.rpm
4f2fb4365deabf7265c2af633fae5018ff360228bfc76bf599d3f88cc999d80d
podman-docker-4.2.0-9.el9_1.noarch.rpm
f458a6a217cd912f9d966f529c37f69013ef746104c22639b829b1dfa702d446
podman-gvproxy-4.2.0-9.el9_1.x86_64.rpm
b26f3bde0d57f2b1f7276dd7e3eeb0e81fc63b8149b79e5e481a004abfc23e69
podman-plugins-4.2.0-9.el9_1.x86_64.rpm
068edd55880260e2c3cab7f059da365ceb6f32aeb1a062dbf0615189238570ce
podman-remote-4.2.0-9.el9_1.x86_64.rpm
ffd70f0ea6097b4011e905767ed6ae686c21f518fdd2629a725a2658ab47ce29
podman-tests-4.2.0-9.el9_1.x86_64.rpm
a67d1d437a7b43844234a4e434a5eccd1c103761766f2d4c7ab752d377ff425b
RLBA-2023:0315
buildah bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides command line tool for creating Open Container Initiative (OCI) Images.
Bug Fix(es) and Enhancement(s):
* SIGSEGV: segmentation violation on s390x (BZ#2150432)
* buildah installation includes runc as a dependency (BZ#2150525)
* buildah: ubi8 sticky bit removed from /tmp (BZ#2152022)
* podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152042)
rocky-linux-9-x86-64-appstream-rpms
buildah-1.27.3-1.el9_1.x86_64.rpm
a772360c5fc26bd1e7fa9876dc6a911c2cadd9f0a7ade2ca8676e56b6e2111c5
buildah-tests-1.27.3-1.el9_1.x86_64.rpm
0d0940205101c9b48982d9899eeeb902388510f3be0be45a9512826fb473ba7b
RLBA-2023:0316
nbdkit bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Block Device (NBD) is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages.
Bug Fix:
* nbdkit: error: /home/vddk8.0.0/lib64/libvixDiskLib.so.7: cannot open shared object file: No such file or directory (BZ#2148498)
rocky-linux-9-x86-64-appstream-rpms
nbdkit-1.30.8-2.el9_1.x86_64.rpm
867079f83d60b98561624545fb6dcdc33c15be17a4fd32d0384672bf8a272109
nbdkit-bash-completion-1.30.8-2.el9_1.noarch.rpm
5bcf99b438a3eed79e72f377af0cb7826eca08f26d9722c6fe07cea6aaefba23
nbdkit-basic-filters-1.30.8-2.el9_1.x86_64.rpm
0ce13e80ed907b0e4b8e83de94153c81f4370dc1a1630f453d1c3b45b728f7a5
nbdkit-basic-plugins-1.30.8-2.el9_1.x86_64.rpm
3466dd341ea657ded09196fa0826e601c193f57348ef69d949e0406da7458e87
nbdkit-curl-plugin-1.30.8-2.el9_1.x86_64.rpm
6692b075148c449525ce62f7a72d3c8918d9c1fdd543d32b204fee5ccc223879
nbdkit-gzip-filter-1.30.8-2.el9_1.x86_64.rpm
b18ddb2915c2631bf71b00624c3b871e4b4bca6a8aeed43dbc85210a26eb5ef2
nbdkit-linuxdisk-plugin-1.30.8-2.el9_1.x86_64.rpm
e009b2365155c2d1058d7761ce5d9e6df3aa5cb5fdf94285c3fd513b715bdc06
nbdkit-nbd-plugin-1.30.8-2.el9_1.x86_64.rpm
68b47d17a80513e063fb78691c54d4f48cac11d190fbac5fd7fffbb7b2e87fa2
nbdkit-python-plugin-1.30.8-2.el9_1.x86_64.rpm
cd0e7aa9610de45b69caa26490730006258dffe58ca0d5c602f9a8566c20f116
nbdkit-server-1.30.8-2.el9_1.x86_64.rpm
4c42d726845b1c2dc42cd59704e80ff83aeac9d8d55e97cbd876b391b554d752
nbdkit-ssh-plugin-1.30.8-2.el9_1.x86_64.rpm
a81229467e8cde4ee0559837ae18c4f3fbc6c7253216077c3a8634c5a58108c2
nbdkit-tar-filter-1.30.8-2.el9_1.x86_64.rpm
38b2c68a41a962c9a9f87aef69efdf4ee64317d6a91e09d0029d6039a0ca1be0
nbdkit-tmpdisk-plugin-1.30.8-2.el9_1.x86_64.rpm
c65cdd3c1a224feefd167bb5261ae9547fcde717d4a22d215ee9aed168355fe2
nbdkit-vddk-plugin-1.30.8-2.el9_1.x86_64.rpm
68e95e4d99454fe95f7257ec03f1b6f8241edfae3bfde1c45a505c8679e449c5
nbdkit-xz-filter-1.30.8-2.el9_1.x86_64.rpm
03f3832746fe5fe0cdbb21f3a63608cc505de23ae791fec5addc894b388a1d58
RLBA-2023:0317
hyperv-daemons bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The hyperv-daemons packages provide a suite of daemons that are needed when a
Rocky Linux guest is running on Microsoft Hyper-V.
Bug fix:
* Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150268)
rocky-linux-9-x86-64-appstream-rpms
hyperv-daemons-0-0.40.20190303git.el9_1.1.x86_64.rpm
9ad347656af733f0c9d08193e6de68afe2f1c24128adff9fe1cfc78b21a25721
hyperv-daemons-license-0-0.40.20190303git.el9_1.1.noarch.rpm
fa9059871f00dc113015c27e01e5388e9a52d1b097cd94109f4d4a4bbc886694
hypervfcopyd-0-0.40.20190303git.el9_1.1.x86_64.rpm
617d5a94fef2e4b902531feddeed690e976e40c53b42044290243a3dbfda1ca2
hypervkvpd-0-0.40.20190303git.el9_1.1.x86_64.rpm
8a55232a6b273932785b24fecb7d71713c578450117e564480c98318e426d17a
hyperv-tools-0-0.40.20190303git.el9_1.1.noarch.rpm
0140116450ab5a94be5e1d93e8a9fd4694bc666bf0a2ac5c3c1f43eac4fd85c9
hypervvssd-0-0.40.20190303git.el9_1.1.x86_64.rpm
3efd684f075bee685a748ab5aee1f363a971517d20dc2d4135cde72c0b07cefe
RLSA-2023:0318
Moderate: postgresql-jdbc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postgresql-jdbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database.
Security Fix(es):
* postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names (CVE-2022-31197)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm
ce261fcfbadb40e68387bc472ef528b45f3c3612089125d3c98f262eb8d9b7dd
RLBA-2023:0320
ipa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* vault interoperability with older Rocky Linux systems is broken (BZ#2149274)
* ipa-client-install does not maintain server affinity during installation (BZ#2150270)
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.10.0-8.el9_1.x86_64.rpm
511d2f0c4dd71cd1563504049ee39e9a51b86c60cbb6c83328744706dbcbc55c
ipa-client-common-4.10.0-8.el9_1.noarch.rpm
d1dda6cbb850b804179b67a46dd0d84c1378575495514a6da967bcde9dafc01d
ipa-client-epn-4.10.0-8.el9_1.x86_64.rpm
09439c201ee287e17b1bde1cd1e8c46125b44ae17a219187557a5a66aa15f346
ipa-client-samba-4.10.0-8.el9_1.x86_64.rpm
5d7c12e6a4954d4d126cbf01371eb5639fa585817a2cd151ae0b6aa35585c090
ipa-common-4.10.0-8.el9_1.noarch.rpm
276c52e480e2d7a11b8cc95b95226eac4fe22eb9af91e1177448b2348c6024df
ipa-selinux-4.10.0-8.el9_1.noarch.rpm
63c7492e6faf1f238ec96ce6d48bb903890f745223b44ec0fd48614286c1be92
ipa-server-4.10.0-8.el9_1.x86_64.rpm
ab9243aec5974629b88056b46049d94fa4bb255a86acf5ab30633026ce30bcb5
ipa-server-common-4.10.0-8.el9_1.noarch.rpm
546c8064270726c9f3159d8be7c4c411c72eeaa39c58d5df238272f241350bce
ipa-server-dns-4.10.0-8.el9_1.noarch.rpm
ec35ba0af90eaf5f42c56e0589b41d58b5d6cac6eb7018956658b32b59810754
ipa-server-trust-ad-4.10.0-8.el9_1.x86_64.rpm
4f893f369df72cfbdb122467e8164ceeee3f634ecac0b7640df8fb56e6b74702
python3-ipaclient-4.10.0-8.el9_1.noarch.rpm
50405d81a373f97c8f4aeafd1b35b1f229045d1760ba00e051704b0164bc7ac5
python3-ipalib-4.10.0-8.el9_1.noarch.rpm
d1792d66c98e8351803ac9fc16a8355e672b9ecd7cd8d874e39cd0a187a54253
python3-ipaserver-4.10.0-8.el9_1.noarch.rpm
00ba2877876739f123773f4e06eeac31671771f7b01658747cdc09660cb8d885
RLBA-2023:0319
fontconfig bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fontconfig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fontconfig packages contain the font configuration and customization library, which is designed to locate fonts within the system and select them according to the requirements specified by the applications.
Bug fix:
* need to fix remap-dir behavior (BZ#2150227)
rocky-linux-9-x86-64-appstream-rpms
fontconfig-2.14.0-2.el9_1.i686.rpm
e23f43da28f64ae3dc3dcbb5bafbeaf8672ebbacde6ae553763b83c6c87c2f41
fontconfig-2.14.0-2.el9_1.x86_64.rpm
c8383594be73281a9522d216650b65652f4556a6d3c899531364c30f4df20acf
fontconfig-devel-2.14.0-2.el9_1.i686.rpm
c56c213751cbf8080d751617d7c6fcdbf1bebd958b54602522c7a1613e94904c
fontconfig-devel-2.14.0-2.el9_1.x86_64.rpm
539b15e424cd170f5220f86a20e743f47efbebba93f8167c7e2ae876dc4bc61b
RLSA-2023:0321
Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nodejs-nodemon, nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* minimist: prototype pollution (CVE-2021-44906)
* nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
* nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-9] (BZ#2151627)
rocky-linux-9-x86-64-appstream-rpms
nodejs-16.18.1-3.el9_1.x86_64.rpm
8e40a1e5726e070f2ea790a236b95accfca59e54703b5e716a2ab12f16a97c4c
nodejs-docs-16.18.1-3.el9_1.noarch.rpm
d6319a6ae834b80fcf596aed6094622aab94d6b0e7e7995e60a4261deb029364
nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpm
5a203ad1ced984685b7ee5fd47259d108e8eb6aa740965f7fd625f5572f1cc95
nodejs-libs-16.18.1-3.el9_1.i686.rpm
35cddf28e9bde5789411fa0dc5831aef22e6367518ec036893541210974d4a0b
nodejs-libs-16.18.1-3.el9_1.x86_64.rpm
d853ae9511853003c54ea8427be23ed8af9af3a6463a906bf55ddf32b04eb2af
nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm
86352f40a608e15555df09437aaf424b124c12a6d495528f03b68dd8a2548268
npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm
4e618cf28a7d0dc1dca3786f748dd07ffa11763ef718429dd23b7a998dca0150
RLBA-2023:0322
gcc-toolset-12-gcc bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix:
* __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150126)
For more information about usage, see GCC Toolset 12 linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-gcc-12.1.1-3.5.el9_1.x86_64.rpm
240efc5a8025b87626742043e76698c71c8d557ab3d90b53ad4556b43a9d58fa
gcc-toolset-12-gcc-c++-12.1.1-3.5.el9_1.x86_64.rpm
1a80c27435ade70a9ca5c40552d10ccd0e9ad1944d34ebc1ba46269ccfc87add
gcc-toolset-12-gcc-gfortran-12.1.1-3.5.el9_1.x86_64.rpm
d719147f46b476876370ff592f070da4047a918ee1a1452784232cf547409976
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.i686.rpm
af13c32de778dc1500167468653a770c3032b711a7670cd6b6dc2159493247fa
gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.x86_64.rpm
9f8dbab10ee10dfa615c7b2b2349e920e365749453dd70911f44a16ddf24089b
gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.i686.rpm
6f7a496efb4531cdd75098b5f21bf421b8696447d5804b52521a11394dd12c0e
gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.x86_64.rpm
93390bd75e7c6e47b2b6e6122e49f56aa236a27430ec4e92128e5f17a87a2006
gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.i686.rpm
59dd583a17f5d048a74a171b1c4545b0e92a74456da8334dae472720141f72ee
gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.x86_64.rpm
cf13a09a1fa3169270bb33f4bbeaeec0dd02b9e4ca3ad32dfcd16143dfaa8ddd
gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.i686.rpm
97497f16c61c2cfd94d595c2199c541c17460ee7fa3b7fb81d7881fecdc109cb
gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.x86_64.rpm
7ba04d8a5238045823d787f7507c0a123028a3f54c33882cdb9310700a98134e
gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.i686.rpm
12c0a4baab41ac4c4b11ac31e5c6e005325ed9922e3e46a15acd5035bcc23786
gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.x86_64.rpm
1ff00473daa6e4f0a37310f2302a8127d7d417ec838532979575c5639efe813b
gcc-toolset-12-libgccjit-docs-12.1.1-3.5.el9_1.x86_64.rpm
5a771f1288df8704b9cc4abeeb5ccf22015be5eea36107d2aa6798184954f313
gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.i686.rpm
270bcc360bb3b7d05cf0b9ffbb0571b31b992284a03a3b07a89d3d1519cda726
gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.x86_64.rpm
149f3ad358e1eb9b9e43287874126ad78b96c8c0ee899d6a313bd1d86f8437db
gcc-toolset-12-liblsan-devel-12.1.1-3.5.el9_1.x86_64.rpm
c7978a37ca2221cbbdbedeed9f821772729a9471c25c9d934b76582954528ddf
gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.i686.rpm
6356bb093c428d07bc814af97e5e7973a1eb37c9f8d210c225d67a4dc5b99074
gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.x86_64.rpm
283393df3b22539274f84a2014338766765c1c77b06e804b294745ee2fb2d27d
gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.i686.rpm
6947ce493f2988d670b510f89e0fe2e43e45e6af2f93bd0f8062fe8537a3120e
gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.x86_64.rpm
fdd56b5704bbd3c13e7da63f4dc39b6f081723c2d177f29b333170713a41efdc
gcc-toolset-12-libstdc++-docs-12.1.1-3.5.el9_1.x86_64.rpm
a27c7d679d000a5acdc02f08f5f458bca40568e76db18b8081d1d1e3a0284681
gcc-toolset-12-libtsan-devel-12.1.1-3.5.el9_1.x86_64.rpm
6621d3cea19023bda8217c6f4881239670403b281b86a721bc27c61f06b18975
gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.i686.rpm
81911962c9e6d7407e37f20aced2a135a9752075b2758dd142f95526e2872330
gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.x86_64.rpm
db7369156d1f065b33516700abadb33de2dcf875bc32a8c03094441f4cbde19e
gcc-toolset-12-offload-nvptx-12.1.1-3.5.el9_1.x86_64.rpm
c4ea1a97774d72640ee84a193dda1b3e2029e40c194af956e5606a038c94608c
libasan8-12.1.1-3.5.el9_1.i686.rpm
da5b7989e81fe30070d98be5b1e19b02be3b6812b2ec8c3ac75be70ed88bc096
libasan8-12.1.1-3.5.el9_1.x86_64.rpm
986560f05c7c7f60e1ced423242db9ba823a48d04c921972990163959c586f2d
libtsan2-12.1.1-3.5.el9_1.x86_64.rpm
2c929494b1239a6a114a8f9a789a20ea41f6f1d4c79dbdcb2c5c925cd90b3a40
RLBA-2023:0324
libqb bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libqb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.
Bug Fix:
* pacemaker command "crm_attribute" intermittently fails with error code 102 (2151305)
rocky-linux-9-x86-64-appstream-rpms
libqb-2.0.6-2.el9_1.i686.rpm
f2bb5efe9142fc3e9de3fab35d624b45a64f427ce6b09805815cab3cd8ada97a
libqb-2.0.6-2.el9_1.x86_64.rpm
90c57e61e0139d4aff8aacd0a0f56fe91f75110782c4e910587913df69f2e15a
RLBA-2023:0323
ansible-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Use python re to parse service output instead of grep
rocky-linux-9-x86-64-appstream-rpms
ansible-core-2.13.3-2.el9_1.x86_64.rpm
4f5bd9ddcf7a9fcc7d88d4a39a9ae34ac48d2cccf7e3ebec6a0eab6628a21a16
ansible-test-2.13.3-2.el9_1.x86_64.rpm
c9597222dbc1ae9c55f1087950dedf6e7d632433b6f7c8bc37fc76330f18f51a
RLBA-2023:0325
clang bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The clang package provides a C language family front-end for LLVM.
* clang-14.0.6 should apply llvm#55560 patch (BZ#2151465)
rocky-linux-9-x86-64-appstream-rpms
clang-14.0.6-4.el9_1.i686.rpm
8eba4df98174f745f6609cb722f0590d1a7cd7e0d39ed0fa5a8a80086776d882
clang-14.0.6-4.el9_1.x86_64.rpm
f36118e67a7feaea64fc1977c5286f9bd9c49c2f9baeaacfffc30943ff182986
clang-analyzer-14.0.6-4.el9_1.noarch.rpm
fa04f0b3c73a390908dece4f904882cb893aabd7211c06d4d24511ed120902ab
clang-devel-14.0.6-4.el9_1.i686.rpm
973dbe66dff2fb39a64852680240b77a6d9c3daafd49b47473f8102af531f751
clang-devel-14.0.6-4.el9_1.x86_64.rpm
69560aad07b2bd1ddb6366a36eb92ce6524b0ac70e75611753c48841f0c7a1a3
clang-libs-14.0.6-4.el9_1.i686.rpm
a57dd2ca09cf463f30fe7f2d79a0a7c101eafffbbd4159a7fd3869a0f610c205
clang-libs-14.0.6-4.el9_1.x86_64.rpm
88863b42716650a1d80893b21fd72d04488683b1615b596a75ee9af554220840
clang-resource-filesystem-14.0.6-4.el9_1.i686.rpm
d00ea8bcd430edb790769c74acc60b224cd99e93f103b7f50fba5ab53844c833
clang-resource-filesystem-14.0.6-4.el9_1.x86_64.rpm
30c6333584909896912d705678d57cbfddeb7411949fcdf8ed8802ff8c447cbd
clang-tools-extra-14.0.6-4.el9_1.i686.rpm
3e3a4c17cb4fccc7fd430e3d693a36e845e6f29031e761b4f72bf02063b2b856
clang-tools-extra-14.0.6-4.el9_1.x86_64.rpm
428ec537d10d90c7b8347117c2990007e656bf756dafd3140ef1c92cb5b312d6
git-clang-format-14.0.6-4.el9_1.x86_64.rpm
118a7606099845f5a2643f02dbdb65d0d1318fb7571d38aced27b023dc819155
python3-clang-14.0.6-4.el9_1.x86_64.rpm
1dae356b6af4f400077686e3cbd6ef64d1af0b805f045c68d5171bdacd6f8675
RLBA-2023:0326
gnome-shell bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts.
Bug Fix(es) and Enhancement(s):
* per window screensharing does not work with xdg-desktop-portal-gnome installed (BZ#2144743)
rocky-linux-9-x86-64-appstream-rpms
gnome-shell-40.10-4.el9_1.x86_64.rpm
1b00dfdff75fec87bd09dabf3ec6cfde1df275347bcbafd6d337dd1a8c4a9680
RLSA-2023:0328
Moderate: go-toolset and golang security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang, go-toolset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Internal linking fails on ppc64le (BZ#2144547)
* crypto testcases fail on golang on s390x [Rocky Linux-9] (BZ#2149311)
rocky-linux-9-x86-64-appstream-rpms
golang-1.18.9-1.el9_1.x86_64.rpm
6f1ba51758bafae29919d5ca43693df2f84d0fd266e122e330b1496b554f2395
golang-bin-1.18.9-1.el9_1.x86_64.rpm
7b5f19bb9e0406fe1b27411378ef45607a5ed9c59027023c142fb70c6a5365a6
golang-docs-1.18.9-1.el9_1.noarch.rpm
aa0c932ef3c6d3984c4c82f412c4f37703fc9d2fe174c44f524dbf91e47a5ea6
golang-misc-1.18.9-1.el9_1.noarch.rpm
d791de42d6bf6b8abc153eaf48d80f3107e1046ee5a887b12e77943f1f6490f4
golang-race-1.18.9-1.el9_1.x86_64.rpm
65b61adafe0229d5eb8b05648ccfae2b709fdcb17c1cc6ba2e3c269a4c620270
golang-src-1.18.9-1.el9_1.noarch.rpm
2e5a41097be4f9aac06f6e1d67e7a0a7372112eed25706bd67c6997c8e75ab75
golang-tests-1.18.9-1.el9_1.noarch.rpm
d73463aa9e5471ee48f4bdcd535ee935c65d187bc914c60d3a6f4fecb9cc1a92
go-toolset-1.18.9-1.el9_1.x86_64.rpm
714f154107cb5613974a98ddf6b5e6d479e7de4b007c93534a1fe8a01cf6a998
RLBA-2023:0327
virtio-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtio-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers.
Bug Fix(es) and Enhancement(s):
* virtio-win RPM for Rocky Linux-9.1.0.z (BZ#2145213)
rocky-linux-9-x86-64-appstream-rpms
virtio-win-1.9.32-0.el9_1.noarch.rpm
363a92bc7ea8ad76656a70bd2cc464c99509947d7d75bbbe626c56c0df7915e1
RLBA-2023:0329
swtpm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for swtpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The swtpm package provides TPM emulator built on libtpms providing TPM functionality for QEMU VMs.
Bug Fix(es) and Enhancement(s):
* Test for available issuercert before creating CA (BZ#2152916)
rocky-linux-9-x86-64-appstream-rpms
swtpm-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm
2849b631119b92256d7f8569bb95bb0c47eeacdbdf482a4aa20b9965fcdd762d
swtpm-libs-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm
108535362c53294c2d71305a0b1959062bca7b83b47a37af41623688e7a1eebb
swtpm-tools-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm
e553873ecb50aad9bf8b8c2a4d234443b3bc67c5731cfe7a2d4fe1ea26e31195
RLSA-2023:0383
Important: libXpm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libXpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
* libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617)
* libXpm: Infinite loop on unclosed comments (CVE-2022-46285)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libXpm-3.5.13-8.el9_1.i686.rpm
a9c83e719598aaf946066c421263447564772c3de2fc7d394e9bf2914d895cb9
libXpm-3.5.13-8.el9_1.x86_64.rpm
33892f7917599d8a7581ab7f44e30fa06e777abf9ea17962df937a96929d2a1e
libXpm-devel-3.5.13-8.el9_1.i686.rpm
71fe586c8935e14575a62cfff52a085682481d580c0efb6a3a98da8ea8e5672b
libXpm-devel-3.5.13-8.el9_1.x86_64.rpm
5a6693ca796b7e5e33f5a9d723f6c024992ebba05538c81a33f05e778322128f
RLSA-2023:0210
Moderate: java-1.8.0-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [Rocky Linux-9] (BZ#2159912)
* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [Rocky Linux-9, openjdk-8] (BZ#2163594)
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm
a19683ecb4cbc37da7f3273916a9fcc9a9e7cc375a322e8dc6d2b0bbb865d6cb
java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm
51a05b7182a83d97927c2d364cdda3f9f50706c60bf17a1794c90b61279272f7
java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm
acf9ddf9f4a969224b75b89703fadc0ee1ac7144009961923d8b4cb2e024e92b
java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm
e66aeb439a1f2204e8b7275822e3da4856ba226636d91bd7a80765109a95437b
java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm
d0b1508c5af35809bd42f71964ba8678666e46383c04e6ce396bd2835144fe0f
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm
ef7edb2fc10aee4785d45b3d152c5cf79a3fdbdad6e169ef8ee773cc29f8dfcc
java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm
c2d290ceb0c6b242252e9a950c6278e7936e0c6a1cf070358f644a541be77ba3
RLSA-2023:0476
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: libusrsctp library out of date (CVE-2022-46871)
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598)
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605)
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599)
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601)
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602)
* Mozilla: Fullscreen notification bypass (CVE-2022-46877)
* Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.7.1-1.el9_1.x86_64.rpm
b8efab098baa6845e2d591f54dd3e8fecd44c77fe6a16d0239972d7568084f02
RLBA-2022:2316
new packages: criu
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for criu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crit-3.15-13.el9.x86_64.rpm
90dcb4a657e93c39392f029056810730052929c8f9b26f777fffde66342c1526
criu-3.15-13.el9.x86_64.rpm
bc69909cddce3c323ae44111d97625c5e55bcd9443999c2da785e7e6fe6aa3b3
criu-libs-3.15-13.el9.x86_64.rpm
f88cfc51ecb73aafaac5e07b21ae56e2edb79fc3dbb69f0bf745054cd8ceb37c
python3-criu-3.15-13.el9.x86_64.rpm
83bc7480a7509f88c05f69c60a095bf1ed2a0002b2273ed0eeedac663eac8bea
RLBA-2022:2382
new packages: evolution
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-3.40.4-3.el9.x86_64.rpm
e88e3f0d2fba1c14b71bc6a9520b18ac887c4527d1a1ec956ac5322f81d6e7ff
evolution-bogofilter-3.40.4-3.el9.x86_64.rpm
f9fe57507bcbaede8b88ab42bf0ec2d579c5b5ccf859c6bb16d4c31c4304fe23
evolution-help-3.40.4-3.el9.noarch.rpm
198c2f06773d475648aabbd0d70584946cc3a7e417bdb6782f6e0ccb04e51b3a
evolution-langpacks-3.40.4-3.el9.noarch.rpm
5c79e9c1d3ce7fef1273e7c415e1e484fe68f49c3b7d02336f3ba80ecd006bd1
evolution-pst-3.40.4-3.el9.x86_64.rpm
085b890bc0d6fc5b6f5b5a48a90bda456466ed46fc5cc4e210a5eebe02fd4dbb
evolution-spamassassin-3.40.4-3.el9.x86_64.rpm
07154ba791fde30b35706192484e55d217b5e0c8f55db1a9dc32c20950a94fd1
RLBA-2022:2393
new packages: gdm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdm-40.1-13.el9_0.4.i686.rpm
3a166d8499d3b37e285ca7a01c9031d3ceb5e5d73d7869d9125fe287895f546d
gdm-40.1-13.el9_0.4.x86_64.rpm
229ea6719ab48322e6d1e81a8111e3b2b0e817e21a2a46bd66240f3a8b3d32c3
RLBA-2022:2410
new packages: nginx
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nginx-1.20.1-10.el9.x86_64.rpm
16944abd6bd5e1b5a67d7a69bd0501c28d1b8c7575d3c8ba34309ef35d0674a1
nginx-all-modules-1.20.1-10.el9.noarch.rpm
b5da23624b5f06385adb200e282d078555f0ab73c156d47b662cc833371d314e
nginx-filesystem-1.20.1-10.el9.noarch.rpm
7762b4d66773eb3510bd2628d462b47690efcfebb2404150527fda19a799cc03
nginx-mod-http-image-filter-1.20.1-10.el9.x86_64.rpm
1182ebdf5f410b4a5f488099869f72e7fd563a2b77cae93583c89b9811016e96
nginx-mod-http-perl-1.20.1-10.el9.x86_64.rpm
d6d2e5153f1e8bfc447f8f7ee9e03b8ed6302eea2fa36f858a5f34dc352ab046
nginx-mod-http-xslt-filter-1.20.1-10.el9.x86_64.rpm
746f75e710e356ef8abc7b0c6d4f4d3ef9017c294ec69b96dda8d3f2a3537029
nginx-mod-mail-1.20.1-10.el9.x86_64.rpm
0ed9d2a78eca4227702a70573e01e808699bba1caf4f1c7b6d54a00d4fdffcee
nginx-mod-stream-1.20.1-10.el9.x86_64.rpm
59ac8280e3349d5ef9638cd6f3db010a6e3d301617a6141035bb07afc682ee58
RLBA-2022:2468
new packages: qatzip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qatzip-1.0.7-1.el9.x86_64.rpm
d9cc568c432a714e613bb0ed77753965d18bfd84189a55340e2f4c7ab6266904
qatzip-libs-1.0.7-1.el9.x86_64.rpm
7b94c81509ab9c0c6a0dc38a5314255a7dc745fde751c794bb4b2155d1d021ae
RLBA-2022:2481
new packages: freerdp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.4.1-2.el9.x86_64.rpm
c1acbb0854b7adcdd454cab8498be68833b1abe0982f475840d509dab1136dfe
freerdp-libs-2.4.1-2.el9.i686.rpm
2339d23ec5f79949e88019065b198291bf3234eff52a060416a9174d8a360b02
freerdp-libs-2.4.1-2.el9.x86_64.rpm
bfc2539239dc6cca85003e741d86ba6e094208fc43cc2a7809db11bc4836cf64
libwinpr-2.4.1-2.el9.i686.rpm
fedbfb1792ab31ba61b194c58dfd068a4cdfa48aad1dea1df795e6233554d9ad
libwinpr-2.4.1-2.el9.x86_64.rpm
6cf04ffaffe1843adbdc5144ad3aa7f090b1cd3a3186af490d5358eef1a0c7d9
RLBA-2022:2531
new packages: sdl12-compat
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sdl12-compat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sdl12-compat-0.0.1~git.20211125.4e4527a-4.el9.i686.rpm
1a8e87a6d5362dc6e75d9c0e9aa9c5afbdf07845791f94122d3992db9a83379b
sdl12-compat-0.0.1~git.20211125.4e4527a-4.el9.x86_64.rpm
8e5739585ddd95d6d773d533a83875ca9b98f936c38e58493ed0791df42fabef
RLEA-2022:2566
new packages: virt-v2v
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-v2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-v2v-1.45.99-2.el9_0.x86_64.rpm
93cff49568bba5be35a97477ccfa034027f4750284c9d685314bfefe308e6f0e
virt-v2v-bash-completion-1.45.99-2.el9_0.noarch.rpm
75a545a8d2dfb02464227bd6219253ceb494df77d143458e5af24e0d15fde4b1
RLEA-2024:9283
nodejs:22 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLBA-2024:9286
postgresql:15 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm
b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
RLBA-2022:3755
new packages: sanlock
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sanlock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-sanlock-3.8.4-1.el9.x86_64.rpm
7beb79317d88873ce39b3abe0e20d8ce2c3f5bf83cdbbf1650478b74e78592a7
sanlock-3.8.4-1.el9.x86_64.rpm
b4a19df7699e336173b058a8c1269ec7d3cd0a21d405b4d9d1b19b8cc8810cec
sanlock-lib-3.8.4-1.el9.i686.rpm
9c93dccf98913efc81bed098f31737d464ae3f596c06377c8ae4ceded0bd8367
sanlock-lib-3.8.4-1.el9.x86_64.rpm
613ceed15099385818bb1a5f869eb99fdedb0324f743483f49554e8ce88e10d6
RLSA-2023:0005
Important: bcel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bcel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Byte Code Engineering Library (Apache Commons BCEL) is intended to give users a convenient way to analyze, create, and manipulate (binary) Java class files (those ending with .class).
Security Fix(es):
* Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bcel-6.4.1-9.el9_1.noarch.rpm
0c006b32e4b485fdcadf6c6e79a97aaa7dacba4cc46b097566eb8609e3ee6be9
RLBA-2022:4042
new packages: opal-prd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opal-prd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opal-firmware-6.7.1-7.el9.noarch.rpm
a010e6488ec5bba285b80c50aac9eba40cef7e16aa9e22d00da06978771f77d1
RLBA-2022:3966
new packages: gcc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cpp-11.2.1-9.4.el9.x86_64.rpm
3d7313993678ddc1c8f9268e484087dbbbd481433f971aa0a48791eb6a78ed83
gcc-11.2.1-9.4.el9.x86_64.rpm
219ae4302ea6e1c52d08ab41c903af47439bb8d5f4c79b4db757bf04bda0890d
gcc-c++-11.2.1-9.4.el9.x86_64.rpm
520f4526a226163d6da87e697b368fd82a7a7e42003011e97a00acdc8fca16ed
gcc-gfortran-11.2.1-9.4.el9.x86_64.rpm
7ff5917ee206e70b7d9caae14a8be6d06a99f7e21106cd59222a00443318418a
gcc-offload-nvptx-11.2.1-9.4.el9.x86_64.rpm
88d32e11b4e872e073410e16e92c800cd99f73d5d88d472bf002ed90f09f1c65
gcc-plugin-annobin-11.2.1-9.4.el9.x86_64.rpm
aa1eccb050dd9e27824b31247abf85b94c7ed7568f08adce34094e0ed280cfd6
libasan-11.2.1-9.4.el9.x86_64.rpm
e401256d2288ac83e1380dec1bca19489ddd69b93b714ac888edb60f5114b16e
libgccjit-11.2.1-9.4.el9.i686.rpm
c23865504012e5d4254081413eba16f9d395e219f1580126c722888560e385db
libgccjit-11.2.1-9.4.el9.x86_64.rpm
6065d7f59ec320b3e5cb1e9ff9623681fa83b55ad5410f23ffb092642e06c1f2
libgccjit-devel-11.2.1-9.4.el9.i686.rpm
d5c37541ebed1b4c097d802bddddfda719896f39e405589d3faad68334cca212
libgccjit-devel-11.2.1-9.4.el9.x86_64.rpm
b05c4d04aa3ff2d595fd9bddbb02dc657cec9c213ad723f1664a9dbdf5a4f639
libgomp-offload-nvptx-11.2.1-9.4.el9.x86_64.rpm
6f8c4bb35da8d840ee2223ffa58c8c25d0d84d3cd211f43b67cbfcdf15f93cd0
libitm-11.2.1-9.4.el9.i686.rpm
66d814dec88c32b55f0521945b5c60af544f4758ea0b0aa80dcbcd007b12392f
libitm-11.2.1-9.4.el9.x86_64.rpm
8bced2514660a913562b781bf618e1d23849f30a792556f00f68ec27ff7d823c
libitm-devel-11.2.1-9.4.el9.i686.rpm
49a0ed3b214275d5013ca335708d164459a0620f015a3d486c8d06b2ffa57767
libitm-devel-11.2.1-9.4.el9.x86_64.rpm
7ff041c4f20e6a46d234b2dd506c2ff34862659254dd28b8d5c463148443088a
liblsan-11.2.1-9.4.el9.x86_64.rpm
1300002829fffaabba6fb8353140b3f35278d334cdfe9b38d16d106f845c06bc
libquadmath-devel-11.2.1-9.4.el9.i686.rpm
9c35addfbe60b4a35274d4294057c06bb8dd7c4a687475272137339179c4a2d4
libquadmath-devel-11.2.1-9.4.el9.x86_64.rpm
a4bc023fd09d01ae02deedd37782ecb1f715b394aba81b5685a7f62153e458d5
libstdc++-devel-11.2.1-9.4.el9.i686.rpm
6bea52615a054766d1e610f58549055247accb1b106275e6fb2972ec93f7b2b0
libstdc++-devel-11.2.1-9.4.el9.x86_64.rpm
7f8b95f2c552797e6ab49a3bf611972e74037e959808fa5552c7a077671894d3
libstdc++-docs-11.2.1-9.4.el9.x86_64.rpm
453fd2471ba09c7f52a0a02500c13e9002b115ae83d13a4483dee592c6894687
libtsan-11.2.1-9.4.el9.x86_64.rpm
cdd597fb23878aa006bc90b4c2a4310e2bc0427bc507e1bfce7ab6aacf5ef4e4
libubsan-11.2.1-9.4.el9.x86_64.rpm
8d851f0fa6d735d87ba02879db03c35a469f2bad7815a0b675a568dec6abf178
RLBA-2022:3951
new packages: krb5
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
krb5-devel-1.19.1-15.el9_0.i686.rpm
2ea00ebcc867fd06095d6bec4a2d964d5efd32c7954c3f7945f7ec58af4e488e
krb5-devel-1.19.1-15.el9_0.x86_64.rpm
f6539a7ce0b16dacf9f70b0a1ecdcd3afcacf150300ab8e821910ff5ceec11cb
RLBA-2022:3920
new packages: policycoreutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
policycoreutils-dbus-3.3-6.el9_0.noarch.rpm
f2feef470a0d1a6cf165ff5adad1b23be6e2e095e2709241ef66fdd98d1db735
policycoreutils-devel-3.3-6.el9_0.i686.rpm
e8d6fb980a4bb0fe30ac8f9c23798d2d048c86856c09b69c80dac0781555f03c
policycoreutils-devel-3.3-6.el9_0.x86_64.rpm
77f7a64a4558603f8343f741a93b8c7e97482314a5514a34fc3f9a074b3810a8
policycoreutils-gui-3.3-6.el9_0.noarch.rpm
df1e9bfad0c3c3c53fd441f9686d8584b135ac13f56fb411ced7cab66c3d38c2
policycoreutils-python-utils-3.3-6.el9_0.noarch.rpm
d1c4d722cfaffa28389ecd6502507617f411f71be1343397ab6483568925e6e5
policycoreutils-sandbox-3.3-6.el9_0.x86_64.rpm
822118609e71f79a0a965a598382feb9970b059020dfdadcc10016f8d25f6de0
python3-policycoreutils-3.3-6.el9_0.noarch.rpm
8757f529f306c75fa49ca75a151c4b0d3a7b7aad74d47775ebf02e130cd9466c
RLBA-2022:3922
new packages: libselinux
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libselinux-devel-3.3-2.el9.i686.rpm
8f269d8077b52ec77d8408fd584e36db07e0b187108c8c696732f7baa6e4dd51
libselinux-devel-3.3-2.el9.x86_64.rpm
c32cce1a888126e5abfcb9de1705ddeccd8fa663c3447d9e2005a4e3f87f6eba
libselinux-ruby-3.3-2.el9.x86_64.rpm
b5a92d3044b771cd423104dfbbcec634937fd940c68383eecf105b92d5363d95
python3-libselinux-3.3-2.el9.x86_64.rpm
f68acf3958776f0f72fc994997c83047e0be484d35fd92faba9765bb1d438491
RLBA-2022:3936
new packages: iptables
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iptables-devel-1.8.7-28.el9.i686.rpm
edd044846cecb5042ede940cb7b6ce30323e7f327095815f92805e7a02860b3b
iptables-devel-1.8.7-28.el9.x86_64.rpm
90275a2808592a9f22a4b79bef9a94a5803f714e74be4a2fab31fa83f96ac2d9
iptables-nft-services-1.8.7-28.el9.noarch.rpm
61bcdf76a56ee6a3f0fe7e2547db4d6b005657c4f52995fe1ddbfe7a779c785a
RLBA-2022:3961
new packages: libsolv
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsolv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-solv-0.7.20-2.el9.x86_64.rpm
959cc13b207a84f8c372673527018b14320d78f623ffcecedbf30770321501dc
RLBA-2022:3963
new packages: audit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for audit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
audit-libs-devel-3.0.7-101.el9_0.2.i686.rpm
f279d40edbacb05edf3464d4408fd1e7b35da24e64d243387cdacb794618f02e
audit-libs-devel-3.0.7-101.el9_0.2.x86_64.rpm
e4e89932e8685239613b81cd0272642e220aaea116d00c09a54b1826f2518234
python3-audit-3.0.7-101.el9_0.2.x86_64.rpm
56655399426f0a1004b9444f6338153513fc38ac215f9bb53a01ec8ed888e0e6
RLBA-2022:3972
new packages: lvm2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lvm2-dbusd-2.03.14-4.el9.noarch.rpm
6d2269b1abbc9579fb5d5076b64c730c22c378689f68c9e3f1bcbcc6dbb18604
lvm2-lockd-2.03.14-4.el9.x86_64.rpm
8b0ee2b82761d4ede1aa810d3add9347c6c9583cc3dee72749e52ea99e52a038
RLBA-2022:3993
new packages: firewalld
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firewalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
firewall-applet-1.0.0-4.el9.noarch.rpm
e5e5e32698089d12a3a526440534a18bbd762727614e21a755322ffa7c48b261
firewall-config-1.0.0-4.el9.noarch.rpm
776fafc691108cf3f67086d372b923ab0b63e6ec1aaba010f3647a6a5f111385
RLBA-2022:3995
new packages: elfutils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
elfutils-debuginfod-0.186-1.el9.x86_64.rpm
dce24fdc2dd72d684db0c71845c029b862532cc9d4ec7cc365b1dd17423d9bd4
elfutils-debuginfod-client-devel-0.186-1.el9.i686.rpm
ed10fdf0eef09a22e279687eaf5737f6acace04c8416a329621e2b435cd252fe
elfutils-debuginfod-client-devel-0.186-1.el9.x86_64.rpm
ff81dd90bf9addeaf50d24b2c3a44f07b8566828d9ccfaa529cba9fcbcc5736c
elfutils-devel-0.186-1.el9.i686.rpm
559cfffe9857c3b292a31a742951331ef91e9ba5beacfef28729f4f7406d3a24
elfutils-devel-0.186-1.el9.x86_64.rpm
bf8e160cc2784b85152ad257d382af428c2ce3705eb47e74874d8ee1f8d5ad96
elfutils-libelf-devel-0.186-1.el9.i686.rpm
f87b7e2655dac20cbfd698eaaea3b52c4b0d8b0d2d62b01eadd4ea24511bebc1
elfutils-libelf-devel-0.186-1.el9.x86_64.rpm
45c1a35b889b4a4c2e9916cea63235f68a25cb356601b1941805f97f6bfea02a
RLBA-2022:3998
new packages: ndctl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ndctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
daxctl-71.1-6.el9.x86_64.rpm
97705921968242c61434c12cd10c9e5335b5a0e51ea04ada4e427611ecd695c1
daxctl-devel-71.1-6.el9.i686.rpm
16254f0801b2add6142432d2035d78e4f0a9370f288403b839bc126435dcac29
daxctl-devel-71.1-6.el9.x86_64.rpm
a0e61ee6057a480287606d45b47e59c649bf6ef3249ffa46d22a9c54816b5eb8
ndctl-devel-71.1-6.el9.i686.rpm
1bf5942710d302d2b3f22f51b56bd001aaf24f4a6f7c82c9238d1362a27dc49f
ndctl-devel-71.1-6.el9.x86_64.rpm
1d5db560b7828e9c9713439e9e9474d729dfecf48c598eaafd3fdd65e2178ebc
RLBA-2022:4000
new packages: tuned
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tuned-gtk-2.18.0-1.el9.noarch.rpm
797c55cdf289875ae52078df71af240eac49598dc31c0e570d39e877f9c6ef7a
tuned-profiles-atomic-2.18.0-1.el9.noarch.rpm
ddb5615e338a7e47396aa045ef8818239a5babb88734b48bd795f8f0cff7207d
tuned-profiles-mssql-2.18.0-1.el9.noarch.rpm
554e35b45a5bb7b55d353315505084f2ed1afb8a774330e2b91cd62eada55fa1
tuned-profiles-oracle-2.18.0-1.el9.noarch.rpm
154757635ed08a0a4725465a0df6fae9d6b41fc4c6a302e6d80887f8d760f8c0
tuned-profiles-spectrumscale-2.18.0-1.el9.noarch.rpm
df48f10aea73a0ac5c5e2f11361105b0478ad4178a82949dee85b2eb02913a49
tuned-utils-2.18.0-1.el9.noarch.rpm
6c7e91551314f1102b849c623b0b33e895e082ddf5288078af9a5eaaa1b96ff0
RLBA-2022:4017
new packages: bluez
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bluez.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bluez-cups-5.56-8.el9.x86_64.rpm
ffeaed6329a42c644bf4784d4b6c9b8b8be279b2e0a2c35c06ccdfdc1e649a8c
bluez-obexd-5.56-8.el9.x86_64.rpm
3b437799404440aceb8883ba06ad1baf368575673b2b19e55b6d459269c62a22
RLBA-2022:4028
new packages: nfs-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nfs-utils-coreos-2.5.4-10.el9.x86_64.rpm
6e9b28005d4ff416259a3d3e83ae3077cfa5ea2d3953ee11ceb683cd66a59908
RLBA-2022:4082
new packages: util-linux
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblkid-devel-2.37.4-3.el9.i686.rpm
7d872cf221c680efc24a724d10cddb8cfaefd840c74a018de5bfb99793f68cf8
libblkid-devel-2.37.4-3.el9.x86_64.rpm
d6602748b90f677612df7c6e526ac983456fa32fb1d414879c7e86a656d56a91
libmount-devel-2.37.4-3.el9.i686.rpm
98d20d08ead5771143a090f5c45319be46ba4786abae0a1d45741834dfee43a0
libmount-devel-2.37.4-3.el9.x86_64.rpm
ddaeac502117112e19739b1fd75256ad864c79aedd819f469db5885acb2477ee
libuuid-devel-2.37.4-3.el9.i686.rpm
f31faae0bd656923b2fe54372c45654ad8429c98e9b9fe3f696f365b394c7c0b
libuuid-devel-2.37.4-3.el9.x86_64.rpm
be03ee660679ea532054db411ad5a3a48d4a3619d801f83b0ba4765d93d86dce
python3-libmount-2.37.4-3.el9.x86_64.rpm
6976f10da2cb1ac45ddb3883bb2832eaab3ab4bb7b7a9de9168294c372ef83cc
uuidd-2.37.4-3.el9.x86_64.rpm
76428aec0bd820a4fc421f06257f7198e648cb8ba3abecfff212b9314985d394
RLBA-2022:4090
new packages: authselect
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for authselect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
authselect-compat-1.2.3-7.el9.x86_64.rpm
bee33ad41157da1d683faccdbe8d20c95ed5b3e8e738978eec0343e4b86db84e
RLBA-2022:4107
new packages: dbus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-daemon-1.12.20-5.el9.x86_64.rpm
f0f325b6d9a0f91d38e9211cc59ecc187f4ea564b678d6318234d5a47ca06b59
dbus-devel-1.12.20-5.el9.i686.rpm
645c85ace3a88e0da960d63eb71e19d8072ff2b74b4d2eafd41c29a0c8f23515
dbus-devel-1.12.20-5.el9.x86_64.rpm
dd7516488d946c468c20868f07ae2ba082c1522ef00595979c6914b7b161b9c0
dbus-x11-1.12.20-5.el9.x86_64.rpm
ae54adda84b16c80ca0252eee33d64256b33a09abc36380498e4acef15c10c24
RLBA-2022:4144
new packages: iputils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iputils-ninfod-20210202-7.el9.x86_64.rpm
2b977e9c114dee4b04fb8a9f0ad881ba4ab4b05b74e15f87c074cd37c50eef2a
RLBA-2022:4184
new packages: libtasn1
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtasn1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtasn1-devel-4.16.0-7.el9.i686.rpm
b4a12d69b944ac53999d321413c2f8e78f0e4a7bc4d0bf6f8e62696c0478679f
libtasn1-devel-4.16.0-7.el9.x86_64.rpm
083947d1e6c999292b9d786ad3b656f9606b7ca6a241b00b0cfe388ffa4fc35f
libtasn1-tools-4.16.0-7.el9.x86_64.rpm
c5ef71fb72d64ae2fbbcc2c52b6201faf102b197d86a7ade1c296f3956cf2726
RLBA-2022:4245
new packages: pygobject3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pygobject3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-gobject-3.40.1-5.el9.x86_64.rpm
9dc45c0fb1655c95c5a457069c3d8ba9e2fac360fbcece26bdfadc2e4f006b98
RLBA-2022:4269
new packages: sqlite
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sqlite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sqlite-3.34.1-5.el9.i686.rpm
b60b17734e7e2cb91fc44ccb900f38d33483b5334f21545e141edb0d3e4faeba
sqlite-3.34.1-5.el9.x86_64.rpm
278720ab7dd9d1d051a7d6dd96431a45a781230ffacfa3d358c2b8b81cfb234a
sqlite-devel-3.34.1-5.el9.i686.rpm
7c52d9a89c63ec3d5d9e04e92b2ac0ad12ce760959e86a975b15f2e2b71e1faf
sqlite-devel-3.34.1-5.el9.x86_64.rpm
ab3bcea5c6d74fb90e20aedd32606c4d9a483dea18ad10ea2be002d052ce4550
RLBA-2022:4271
new packages: sudo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sudo-python-plugin-1.9.5p2-7.el9.x86_64.rpm
825b3a7506ae3424f98aa56a1f79251a7032808a5fbdc5ddb551e9dae6e93e0a
sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm
3c51c1e16d0fb0f70feb41a7bea3b9e142e87aca3aca6e552e75befd4761280a
RLSA-2022:4990
Important: cups security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: authorization bypass when using "local" authorization (CVE-2022-26691)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-2.3.3op2-13.el9_0.1.x86_64.rpm
ee54d0856aa9157437cad30e31480799b02ef83b960de0e968e752a4486e8194
cups-client-2.3.3op2-13.el9_0.1.x86_64.rpm
ad1d37c3cfaabf43041c1597b702b2f8d47c1169388552b24274845fb7b0df91
cups-devel-2.3.3op2-13.el9_0.1.i686.rpm
0b1bc55dc61220a8c8864302f36213532900ab84deb6dba77ffb3d311f3a2268
cups-devel-2.3.3op2-13.el9_0.1.x86_64.rpm
caa31783a2770fc4c0730b256aa66f671ff4b16c7f988c4f5462d883192608bf
cups-filesystem-2.3.3op2-13.el9_0.1.noarch.rpm
24d7b252f37861c66c75960b675f8567afac6debd8c22e2550e49735aa9f1b2a
cups-ipptool-2.3.3op2-13.el9_0.1.x86_64.rpm
fd151a8071b6ee25852125644a2af6e6433fc53c1e01ea4062faf209f0d89cde
cups-lpd-2.3.3op2-13.el9_0.1.x86_64.rpm
9744acf38443b619e2592a76060e70e074e4b3d6ad25e0e5245c4bc31943c884
cups-printerapp-2.3.3op2-13.el9_0.1.x86_64.rpm
4a4ebcdcb0c02f1e721b6520cd2a361d4ee050e45892983802bde061d83e5f5c
RLBA-2022:5247
samba bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* PAM Kerberos authentication incorrectly fails with a clock skew error (BZ#2079301)
* /etc/samba/smbusers erroneously applies unix group memberships to user account entries (BZ#2079302)
* samba.conf's force user issue when the user only exist in the active directory and not locally (BZ#2079305)
rocky-linux-9-x86-64-appstream-rpms
samba-client-4.15.5-108.el9_0.x86_64.rpm
8d4ba033de71183854f348826db8d58a0f79db94c9f1c8cc66a1a35027aa0de9
samba-krb5-printing-4.15.5-108.el9_0.x86_64.rpm
fdb98bd343a25621670d6df5b721559ee91ead06bc2a866d4301cadb9ba765f1
samba-vfs-iouring-4.15.5-108.el9_0.x86_64.rpm
9505a32bfa4482ea9a162b26dbedcb7348560dfc540e42ec01f98bc700bb335c
samba-winbind-clients-4.15.5-108.el9_0.x86_64.rpm
a11b86af58d4f64b232edec8c32322b04e6d67c0a5ede92a9a2906d155f0e191
samba-winbind-krb5-locator-4.15.5-108.el9_0.x86_64.rpm
e4dc3b8b1ade25fe33016b9b8bf986db51fc1a67d7a98280c55ed72c5fd8cd6c
samba-winexe-4.15.5-108.el9_0.x86_64.rpm
e26697edfee6290d782d5e12b2704a50ec6fd28e78bda201493e0b9261587126
RLSA-2022:5250
Moderate: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-1.el9_0.1.i686.rpm
ef15fd7b046dfa16b27132a3712c99d55497cde9c193607ba22b8e90bf561e90
libxml2-devel-2.9.13-1.el9_0.1.x86_64.rpm
391a89d2dc668e96be2ae14f9efb8a95f0af0c7702a993f9c2b5a3094c150ca0
RLSA-2022:5251
Moderate: pcre2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for pcre2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
* pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c (CVE-2022-1587)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pcre2-devel-10.37-5.el9_0.i686.rpm
f0f9b8a5c753b290bdcffbc75708a35e7666d19b9b1283979d6afeddc777ce9a
pcre2-devel-10.37-5.el9_0.x86_64.rpm
5eafd829509f47ca9b416a0a55c18afcc901e837bec1592b9f0d5a15ca3875cf
pcre2-utf16-10.37-5.el9_0.i686.rpm
3a7a3e23ca684fbe3688ae6435c6a1bd8b355e7e1b00aabaa95319c002f9eb97
pcre2-utf16-10.37-5.el9_0.x86_64.rpm
75dafc7573d9043b86d7717a0d392b00da07d8bf6e1eef0d4902b74191ad9363
pcre2-utf32-10.37-5.el9_0.i686.rpm
596579a04fc174a90ce8bcbe27f291704cc33b15b4665c34b8eda5d599052f44
pcre2-utf32-10.37-5.el9_0.x86_64.rpm
4ff058acbafffd6059f8ff607bae7e5e9d3faba1f9d8ae6d30ac99e4c9da4dac
RLSA-2022:5252
Moderate: libarchive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different
streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images.
Libarchive is used notably in the bsdtar utility, scripting language bindings
such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: an out-of-bounds read via the component zipx_lzma_alone_init
(CVE-2022-26280)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bsdtar-3.5.3-2.el9_0.x86_64.rpm
5b4b61f05a40d4d78800d1b3c9d6b9e7daa92accfbe83aea2b64ee9f2c1636e4
RLBA-2022:5255
NetworkManager bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager 1.36.0 loses DHCP lease and doesn't try again (BZ#2094715)
* IP assigned through DHCP became secondary IP address (BZ#2094778)
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.36.0-5.el9_0.x86_64.rpm
bd3ce08427d0888d2d2d9d909b85ac65adc218e79cb9b83d4fa3c17b2af3cf6f
NetworkManager-config-connectivity-redhat-1.36.0-5.el9_0.noarch.rpm
2238897a2eb071aee7a6a754ad172a7c22e25798bc5dcb7d8cd7fb76e1361f09
NetworkManager-dispatcher-routing-rules-1.36.0-5.el9_0.noarch.rpm
386a5933590c5c534847a1fed2c3b1745d72776290388e5cec8fc54534c158f3
NetworkManager-ovs-1.36.0-5.el9_0.x86_64.rpm
6ad5f463097d51760ea40b6aed85aaec2ac36135e40038d7ae2b1c0d5d5146ac
NetworkManager-ppp-1.36.0-5.el9_0.x86_64.rpm
4671f544fb165e9df0c48e9b7e1d73e700f0f1a2266b4d43c46555674537a728
RLBA-2022:6150
selinux-policy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* Insights-client is producing lots of AVC when run on Rocky Linux 9 (BZ#2106147)
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-34.1.29-1.el9_0.2.noarch.rpm
f09efc8abf36fd6b69e32ba2e88e221c8a4e77ba12a7ee4486c9d3021178a53d
RLSA-2022:6157
Moderate: curl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for curl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP compression denial of service (CVE-2022-32206)
* curl: Unpreserved file permissions (CVE-2022-32207)
* curl: FTP-KRB bad message verification (CVE-2022-32208)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libcurl-devel-7.76.1-14.el9_0.5.i686.rpm
f6ff1f26b1413b49482e77b562c2392f0dab7fd46d8889fe391fb5773f892308
libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm
6ca1fde15768528667f7b1cc32969469979456fbed3462933b1aa119c5545bfb
RLSA-2022:6181
Important: rsync security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
rsync-daemon-3.2.3-9.el9_0.2.noarch.rpm
24aac731a966a490230f03358ce93bcb08f9082d48954d519723c18b502f8ff0
RLBA-2022:6598
openssh bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix:
The "scp" utility previously changed from the Secure copy protocol (SCP) to the more secure SSH file transfer protocol (SFTP). Consequently, copying a file from a location to the same location erased file content. This update fixes the problem for the following syntaxes:
* scp /myfile localhost:/myfile
* scp localhost:~/myfile ~/myfile
This problem persists for the following syntax:
* scp localhost:/myfile localhost:/myfile
(BZ#2108409)
rocky-linux-9-x86-64-appstream-rpms
openssh-askpass-8.7p1-10.el9_0.x86_64.rpm
aa0f7cfac336f1faa31be2765565a3b64e944f80d1ce2feb7144beba9db3e85d
pam_ssh_agent_auth-0.10.4-4.10.el9_0.x86_64.rpm
012053d49bdf23aea5935847421804a39623321dcb03f130cd89208d9c4cdd27
RLBA-2022:6599
pam bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Bug Fix(es) and Enhancement(s):
* faillock command does not read faillock.conf option (BZ#2112888)
rocky-linux-9-x86-64-appstream-rpms
pam-devel-1.5.1-9.el9_0.1.i686.rpm
e17b4faa940ed5e6933cebaa208c588b334a13b551fd99cd45fb4f9bfe53a22c
pam-devel-1.5.1-9.el9_0.1.x86_64.rpm
d2e2b73e0b2048d09e459510875d2828165594abf8571a4e9ce2732a0f3b1fb4
pam-docs-1.5.1-9.el9_0.1.x86_64.rpm
86e7b7b4b0e55d7a990999968c7459b951f9d194be664ec83c0a00992f0f9106
RLBA-2022:6603
openldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.
Bug Fix(es) and Enhancement(s):
* OpenLDAP pulls in systemd in the minimal installation (BZ#2116520)
* Rebase OpenLDAP in Rocky Linux 9.1 (BZ#2117752)
rocky-linux-9-x86-64-appstream-rpms
openldap-devel-2.6.2-1.el9_0.i686.rpm
eba98a638493858a584e43247d1d29a8e80a59438c6bd55506ef03ae12fd8b85
openldap-devel-2.6.2-1.el9_0.x86_64.rpm
ceff8cb49fa8f459aa6f4a6eeb0a170cc605d149c51c52ab399aa9d43aaa7757
RLBA-2022:6604
systemd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* [INTEL 9.0 BUG] [VROC] Reboot hanged after OS installation with XFS filesystem (BZ#2087677)
rocky-linux-9-x86-64-appstream-rpms
systemd-devel-250-6.el9_0.1.i686.rpm
ed3527736f64b0a274e98ac354aacef6456de03f20333e6a2b6d67ab20d677e5
systemd-devel-250-6.el9_0.1.x86_64.rpm
9a1b1d8cce34b3fe439642074a8e38bd9db85893948c1084d8747612205d5aa4
systemd-journal-remote-250-6.el9_0.1.x86_64.rpm
2ef1d6942775dbb6188a4606b25cc9e24f99814011a8e23f710bc1d10ea0967c
RLBA-2022:6605
glibc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
* glibc: Incorrect results of POWER9-optimized strncpy (BZ#2095450)
* glibc: Backport __rseq_* symbols from glibc 2.35 (BZ#2115828)
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-28.el9_0.2.i686.rpm
8bb7b394a31221bce6ff539660eb5e8e8cc2086c5c8a79e065d86fa4e4b1a14f
glibc-devel-2.34-28.el9_0.2.x86_64.rpm
75c3f456ec041d1d52e88eaa367786072e2400388243b9d28f2a6a0e2d766e89
glibc-doc-2.34-28.el9_0.2.noarch.rpm
9d11b1ba2af38ec99e39c6b456c231899c73422233deefbd2a2d0f6c0b5816e0
glibc-headers-2.34-28.el9_0.2.x86_64.rpm
bd89a186d17679d2d445b9f137368de85acf6ac2a3606219a15848aa4782f703
glibc-locale-source-2.34-28.el9_0.2.x86_64.rpm
2443d95158112e0365fedb3a3d7926b0231007dff05818c72ee273ec574d5d2f
glibc-utils-2.34-28.el9_0.2.x86_64.rpm
a7c0107131efbed4c7556ae3335d545c381ebf9205dad909164533d089da9035
RLSA-2022:6838
Important: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.2.10-12.el9_0.3.i686.rpm
cd3b103ab71201927a60b21cf7763b7eaafb10b0d8c690cedeafaeec5bafa4a1
expat-devel-2.2.10-12.el9_0.3.x86_64.rpm
6ef4c315e1f18b5d509cafb75ee61bd2c2f7ba62349f7b1e9d2797cfc9071976
RLSA-2022:7314
Moderate: zlib security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for zlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Security Fix(es):
* zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
zlib-devel-1.2.11-32.el9_0.i686.rpm
1c7eec88d3d7e53ad2084a98e2892a116e24d495a27515974f6a3b3d2a458a26
zlib-devel-1.2.11-32.el9_0.x86_64.rpm
f00b4cf2b1f9700e406a0884d685550b822a5fed2fce8809456213e7ec9c80f2
RLSA-2022:7318
Important: kernel security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653)
* execve exit tracepoint not called (BZ#2106661)
* Matrox black screen on VGA output on some systems. (BZ#2112017)
* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129)
* watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857)
* Update cifs to 5.16 (BZ#2127858)
* Bad page state in process qemu-kvm pfn:68a74600 (BZ#2127859)
* vfio zero page mappings fail after 2M instances (BZ#2128791)
* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970)
Enhancement(s):
* Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129453)
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm
d48de17dcf61ee687d07ed4652243cacb59fa645cfc9006d69d76871e66b0183
kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm
ac9e8501f1a4a3988b09f583e667740206106ec706530f010c563b7a43f915be
kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm
4448682e13b9d79413903692c69a8f178aed2a4515a6d690982a7489fc8a36ae
kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm
d032e48b6650c9858aeb69cfadacf78f94a9e3d9b1a744d332dd50463ed78568
kernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm
c324897e0fe3e3b77884ca4b66ebc62b3a56f5886607781e5d00f99575184563
kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm
e1dc2066beaaa614c96362ae63abcef47b9ee52207c3b34f21f92c7d7c65ff80
perf-5.14.0-70.30.1.el9_0.x86_64.rpm
e88e0ac29c1429e73e927c05af72c47a059d55f90afdab9c14440968ccfcf0d7
RLBA-2022:7321
cockpit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Bug Fix(es) and Enhancement(s):
* Login fails with "This web browser is too old" with upcoming Firefox and Chromium browsers. (BZ#2129056)
rocky-linux-9-x86-64-appstream-rpms
cockpit-packagekit-264.2-1.el9_0.noarch.rpm
07cbb5803fcdefa49f0ac720e6a20aafa4a3709757acb0cf3e83c076097bbf43
cockpit-pcp-264.2-1.el9_0.x86_64.rpm
31741f7b861d7929f038c3fe22208563750dc93e73da5900f3a00b0930d1bc76
cockpit-storaged-264.2-1.el9_0.noarch.rpm
43366ebc9869313e810d8c7cfa434661b20088356efea24bbff3143eec52d330
RLBA-2022:7322
rpm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124603)
rocky-linux-9-x86-64-appstream-rpms
rpm-apidocs-4.16.1.3-12.el9_0.1.noarch.rpm
50ad53a724227293c7bc3a1db31f5a529ca9518516353d7cb6e438a674945407
rpm-build-4.16.1.3-12.el9_0.1.x86_64.rpm
5f396fdf40ee3eb8f0876d20943ce56751f6adbcaf11c181105c0ef5ee3e2391
rpm-cron-4.16.1.3-12.el9_0.1.noarch.rpm
5eff50744be4a4a0f2115aa33385f78488a47cbe264e4b4aba6877d3711bfe63
rpm-devel-4.16.1.3-12.el9_0.1.i686.rpm
475b90c492344022ca7ef3b75ef02b0b54d9a3fa1e35a9d76ff7024bda885ffe
rpm-devel-4.16.1.3-12.el9_0.1.x86_64.rpm
adf04ad68aae60e08f4ecf3f59bf6ac232940a296865cfe98dcc421e8e826e7f
rpm-plugin-fapolicyd-4.16.1.3-12.el9_0.1.x86_64.rpm
d827a69786e956bc0ce19c1e5cc77f1df612da441a352f6f51f0dc43435fab0d
rpm-plugin-ima-4.16.1.3-12.el9_0.1.x86_64.rpm
d2788db9cc9d631313f16c50eb70acb8308cd111f794b199e656c8c7ea526508
rpm-plugin-syslog-4.16.1.3-12.el9_0.1.x86_64.rpm
5a54558af520232676e0a1a002939f4ec334f8ea2d8f447fbe746c3675276cec
rpm-plugin-systemd-inhibit-4.16.1.3-12.el9_0.1.x86_64.rpm
49e39d1beb7c202170f6d5de8caefef7ef8243f79261140203466dbab28eb0f1
RLSA-2022:7323
Moderate: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.10-3.el9_0.i686.rpm
87ce0f7dccf5c1ca01979df95949b75ab7e77fd96b5bbdbaf1b72e7182459c44
python3-devel-3.9.10-3.el9_0.x86_64.rpm
9269432164d049f44e37882a99fc53b8567ca71b3506e6712cf5db7847996c59
python3-tkinter-3.9.10-3.el9_0.x86_64.rpm
36f78893310df4c321bc4bd8a1a1c962312aa4c553875e84a3043ac8bc3fc597
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
a151170fcabcc8eaf38ed871d741a75388eeccf6063a9b7b5eb0289cb5ede468
RLBA-2022:8499
tzdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border
with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal
time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
rocky-linux-9-x86-64-appstream-rpms
tzdata-java-2022f-1.el9_0.noarch.rpm
70571d1a7150ad2243e4fde1a8cde3212f8639b272e663d385883efcc15d8fdb
RLBA-2022:2306
new packages: cockpit-podman
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-podman-43-1.el9_0.noarch.rpm
53f5008bbb4930a4dbaf70cbbc90d03e13058d32d72fcaf89c1db45d4fc58c70
RLBA-2022:2310
new packages: frr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for frr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
frr-8.0-5.el9.x86_64.rpm
1cf19708005c8f340a2c92b083657d2fb4cb7081fdd4dae90bc55b8edd50447c
RLBA-2022:2313
new packages: qt5-qtdeclarative
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtdeclarative.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtdeclarative-5.15.2-10.el9.i686.rpm
89c3daaf3d616ac7a820528125942b4834ba83696266d691047a065bd469b333
qt5-qtdeclarative-5.15.2-10.el9.x86_64.rpm
b7ec96c3f94a112bbc0e03dbf15ff472c2e1af1eabe58d8ed41e868a5ca7b0d0
qt5-qtdeclarative-devel-5.15.2-10.el9.i686.rpm
bfd1769f46a2b2d8c8c96c2bbe4bee6afad33bb4c3fea7102055d02937fc56e1
qt5-qtdeclarative-devel-5.15.2-10.el9.x86_64.rpm
92ada25419ab90dbc460e2873021104410e6c6f755bf2cb5b4e5eed8dd838bfe
qt5-qtdeclarative-examples-5.15.2-10.el9.x86_64.rpm
cc3c59ab2cddd8330a3653f5289f236e98b20c89af866711abfd54619befcbe9
RLBA-2022:2314
new packages: qt5-qtbase
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtbase-5.15.2-29.el9.i686.rpm
8a1ab27161448d0d87519cec7d4c5dc19df09e4f931baf259afc6b28a1980e3b
qt5-qtbase-5.15.2-29.el9.x86_64.rpm
9133c18df09f197f80bf9b2d52d58be01d8f62806c9a34c64dda85556bacfb4c
qt5-qtbase-common-5.15.2-29.el9.noarch.rpm
636591d4473bdf52c7edbef81f9316c8bfd4e44cb41344c8aae25bddfe635ad7
qt5-qtbase-devel-5.15.2-29.el9.i686.rpm
0ae20d00557e13ef1f8a5469f923127e0277fc143fe59ab16f9e9d73fa8e5539
qt5-qtbase-devel-5.15.2-29.el9.x86_64.rpm
286c6d8c831ef03b7a5fe4796f72d8a9ecb299b7f9d3c7ea5a95ea17610e8cef
qt5-qtbase-examples-5.15.2-29.el9.i686.rpm
eb370447e6359137723949dce42fff94859a97466557bedfd49b7ec84f266094
qt5-qtbase-examples-5.15.2-29.el9.x86_64.rpm
544dc730129b57a9969ba604e62dbd29a26d716c3902e40dc8d1a2d1d6795a67
qt5-qtbase-gui-5.15.2-29.el9.i686.rpm
759eb1433738df30202ed7a083c70f77bb58ec4f0bc96176f4e908c7a9b8153c
qt5-qtbase-gui-5.15.2-29.el9.x86_64.rpm
33dd5636a6c7f8f4a36e3c2becbf89be1dec249b8d1567165a04001fafa98160
qt5-qtbase-mysql-5.15.2-29.el9.i686.rpm
b27700d7b809ab0c8463c16c110570c6de0362fb0965ad85777a9594a1e3dfc8
qt5-qtbase-mysql-5.15.2-29.el9.x86_64.rpm
b41aa9545cc825fa514f13b8903e717d5c038963ee13cda1ae741d9be7acb536
qt5-qtbase-odbc-5.15.2-29.el9.i686.rpm
7f142f9b16422a7a46ada61790ebc2b00e4a5372b0be7399350628dc285ca7d9
qt5-qtbase-odbc-5.15.2-29.el9.x86_64.rpm
d00197a17fd02f99530c33fe8aea33fffca8bbcb3a78f6151192aaee44490270
qt5-qtbase-postgresql-5.15.2-29.el9.i686.rpm
5bd92a7ee14f69be4f879aa6d055c595388a1380e90089504cca1d3e427492ba
qt5-qtbase-postgresql-5.15.2-29.el9.x86_64.rpm
4f68d79fef27e0ac02ac498f9a8efb0ea769a6622c67b74356c895b5c3d2e5d6
qt5-qtbase-private-devel-5.15.2-29.el9.i686.rpm
226dc57202c71def3ad4bb42a113472eb6a116aa9a3c32ae3c68d6434521645f
qt5-qtbase-private-devel-5.15.2-29.el9.x86_64.rpm
750d722385995ff31b6accff750ff656891c11b22270a4f49e264494df849c55
RLBA-2022:2315
new packages: qt5-qtsensors
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtsensors.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtsensors-5.15.2-7.el9.i686.rpm
27306d01dcb47f78d59e8e10308d4ecb16804cd7cf8059985b468c46c5c9e920
qt5-qtsensors-5.15.2-7.el9.x86_64.rpm
0f10177821b11fe419e1a02d7984e98a5c1eee8253121e638fc38c970114d4eb
qt5-qtsensors-devel-5.15.2-7.el9.i686.rpm
486659c19a5f6cf9477be8fdc4cd611d1f53a54d9d23f6cfef066724b935b093
qt5-qtsensors-devel-5.15.2-7.el9.x86_64.rpm
d57d4b6816546d7becede728a3a878e79229a9d2453561d897e577f4c19fab4f
qt5-qtsensors-examples-5.15.2-7.el9.x86_64.rpm
b38f700eca85848c2579a390c3a51db7f6dec8e41413b109f1e3507ef10bb63b
RLBA-2022:2324
new packages: httpd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.51-7.el9_0.x86_64.rpm
88b708d822653e4f43b22ed868579f5c85ad4c3679f6ac3b23184163b834777b
httpd-devel-2.4.51-7.el9_0.x86_64.rpm
bdc7ab926d66e7291626eb0d6c04452ab02f35bb370bb22163f3eeeca289d912
httpd-filesystem-2.4.51-7.el9_0.noarch.rpm
c5649da117a9a7a508b46a0f1fbc23b8e84eabc28857678dc910b22afbaef248
httpd-manual-2.4.51-7.el9_0.noarch.rpm
d6b341f5d399a551e0acf01ac75a0d5166af39929da40eabf5187092e905216c
httpd-tools-2.4.51-7.el9_0.x86_64.rpm
be8ababde1bccaa52ac746e5ea7a206e749897c864004a054e2c5a0a25e787c9
mod_ldap-2.4.51-7.el9_0.x86_64.rpm
e5345f702e189c5c1644e18f8c093b0a3eb6d1033c3014f40ff49fcf5e6cfbc8
mod_lua-2.4.51-7.el9_0.x86_64.rpm
e779486d0e8134d769ab6f272fba39812c6e63285001c33356cdf8eb4e6b943e
mod_proxy_html-2.4.51-7.el9_0.x86_64.rpm
12df2ea51c1c8950b1ba4252ca6ae4328948d33ebb21db9defec859094b1d1fa
mod_session-2.4.51-7.el9_0.x86_64.rpm
74392699a01e4cb67d2ae1b0308fa76199a70160c1c736e9509facd8801dc66e
mod_ssl-2.4.51-7.el9_0.x86_64.rpm
0313c37b85071f8a31042b6a1c1fccc417934bbd936f18047144ce9d768ec4a4
RLBA-2022:2327
new packages: 389-ds-base
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.0.14-1.el9.x86_64.rpm
f844a066785b5a094caac6e520376fab8ccca5b2a4692279fb7573cfe1ef8ba9
389-ds-base-libs-2.0.14-1.el9.x86_64.rpm
77c3dd9c02dcdd048f444f13b940a0bcd0cbe8b119603a6e5a15048d796953ee
python3-lib389-2.0.14-1.el9.noarch.rpm
9dd706f2cee70049b428e649f0c819c8f02f53023b82bca5021e42c107184ee7
RLBA-2022:2330
new packages: gnome-software
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-software.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-software-41.4-1.el9.x86_64.rpm
3b35a3b8661e0280829a1c067ccd527efe53949943bb407153198730396137b1
RLBA-2022:2341
new packages: evince
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evince.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evince-40.4-4.el9.x86_64.rpm
3253e5e0176e964312346648c379f65f8f7acc89b4f7af114c3cdd96ee50eb05
evince-libs-40.4-4.el9.i686.rpm
c9f2035d47177ee6733814361f37d550bc1c6355f20a2486d356755f430bf660
evince-libs-40.4-4.el9.x86_64.rpm
a43bdfed677300a82f6fcabe776d9010efa4dbb52cce33a5d30f23188e7eb7d0
evince-nautilus-40.4-4.el9.x86_64.rpm
5df9207c5cc26d4fbec04a9f63a3bba37e590d9e854032d74dfde2cbac680fd3
evince-previewer-40.4-4.el9.x86_64.rpm
54be9fab82cc64f5113a04d2c0989b8df78fdd96adafc1e076c13616d5634b84
evince-thumbnailer-40.4-4.el9.x86_64.rpm
42b011ffd6e13ce78f756310eeed23acab8374dff48b9195a3725cdbccd2b0f5
RLBA-2022:2334
new packages: flatpak
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-1.12.5-2.el9_0.x86_64.rpm
51236c776c99fd34cb2122dc33caa4dc4855f4fe9191844b886371d5702eb3c9
flatpak-libs-1.12.5-2.el9_0.i686.rpm
0f29186ddaf52cb592f10cb62e0f574557b3357be390842b636554d6726ef417
flatpak-libs-1.12.5-2.el9_0.x86_64.rpm
5595e698fe25af3c4bf8cba1aa30111356e1508767b532e3634f1da206d36a75
flatpak-selinux-1.12.5-2.el9_0.noarch.rpm
4daa5e1b8b10247cf86a46ad9b698d2729cf1420d4a6f7502106efb7dc356fa5
flatpak-session-helper-1.12.5-2.el9_0.x86_64.rpm
62001fc4c00370240c08153fa20d6c5b5d42a60420b5169a49d56074a7893325
RLEA-2022:2339
new packages: ansible-collection-microsoft-sql
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-microsoft-sql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-collection-microsoft-sql-1.1.1-3.el9_0.noarch.rpm
0502fd6a34c292d602b014f5c9251519a148133a92ba4352a8cf1a424cbdc206
RLBA-2022:2340
new packages: gnome-shell-extensions
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell-extensions.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-classic-session-40.6-1.el9.noarch.rpm
ab70f6e3eb5a6be436d6e41ff2ca9237b0de0596911bb1421682bab4994bc79a
gnome-shell-extension-apps-menu-40.6-1.el9.noarch.rpm
a247a264760ef5c4f041e7d46833925b059fdc3c54ae05d972d21450e134153b
gnome-shell-extension-auto-move-windows-40.6-1.el9.noarch.rpm
53611f58ae3563652edc70c81dcf9f8a10258645ab37ff8d6ae77492f94b4ac2
gnome-shell-extension-classification-banner-40.6-1.el9.noarch.rpm
3b561f38c664ad21ba26c86f8b458d7918be18713409160e2c01d7201a7031eb
gnome-shell-extension-common-40.6-1.el9.noarch.rpm
67c3f416d7c38002837847af828f975ffe50f483223198d24984e0efac01220f
gnome-shell-extension-dash-to-dock-40.6-1.el9.noarch.rpm
3f787184f1aeea305c2acfdec82c429a7395ad355b163201f406edccc7c32b05
gnome-shell-extension-desktop-icons-40.6-1.el9.noarch.rpm
6ec397d88ebda79eb9470f8785d73b93f9940e5d8a5edeb7a41cb9291144f736
gnome-shell-extension-drive-menu-40.6-1.el9.noarch.rpm
6994f0a6cee9ccce82f441570672e6d2ca1a9b613d4ce6180bc2c3d6794f0cc9
gnome-shell-extension-gesture-inhibitor-40.6-1.el9.noarch.rpm
00d87e697b0bd629cd19235e0a3e7562451c4a51e51bc9b152fc82578ffd95bd
gnome-shell-extension-heads-up-display-40.6-1.el9.noarch.rpm
4283ca4378bcd8095dbc75a3a13485309f5aa9001c65d59a2431f0864b88a24f
gnome-shell-extension-launch-new-instance-40.6-1.el9.noarch.rpm
e1eb67ca5072e3500641ce2f0af953ccf8ee65fd208abfad5662158e77d75ce4
gnome-shell-extension-native-window-placement-40.6-1.el9.noarch.rpm
2900a6f7f53e0bdf27909ef60be2ab8040bf788c4c0bf44caab8dc98b7e35e48
gnome-shell-extension-panel-favorites-40.6-1.el9.noarch.rpm
d3589bdb74587d38990b4c8c4904d4bee420d844bfaf42a5e97d0f0bbdf9a66e
gnome-shell-extension-places-menu-40.6-1.el9.noarch.rpm
d84ff8048e007cdd82627b3acc660c3954b5db291e5187a17160acdec7bb40d4
gnome-shell-extension-screenshot-window-sizer-40.6-1.el9.noarch.rpm
2cac39b801dd152f82460b833fb89063b846d3983d69a2384874db1fc9303063
gnome-shell-extension-systemMonitor-40.6-1.el9.noarch.rpm
8e5c7cd73808bb53cb3abecdfa400744a07f3fa084ded3468bdc8432d2761a22
gnome-shell-extension-top-icons-40.6-1.el9.noarch.rpm
70738e0e4bb1d87cc8e67491a356e1a0c182320a29a479ae843f90e87dcc71da
gnome-shell-extension-updates-dialog-40.6-1.el9.noarch.rpm
4100eb3e53cb3f6302b21b35903e8e9b54bd906d087a2e0de8314c10fa0626dc
gnome-shell-extension-user-theme-40.6-1.el9.noarch.rpm
f3646120f2f12d9a4682d5323a6934b4917eddf1b88310153caa8bc4ba703bc6
gnome-shell-extension-window-list-40.6-1.el9.noarch.rpm
cefd758783c4e17123ae0c9330e49008430c310dc4c524da32c1d918d9607bc0
gnome-shell-extension-windowsNavigator-40.6-1.el9.noarch.rpm
e2039a461112f16fa45b2707b5b77ae7ebf39bc6e17501f523ed6f62be7467a3
gnome-shell-extension-workspace-indicator-40.6-1.el9.noarch.rpm
01b5835e989fc83578a5cb67b38f490a50545aaee0c7f00c6092382eeb9db491
RLEA-2022:2342
new packages: annobin
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
annobin-10.54-2.el9.x86_64.rpm
8abb16f3b864dafb136b6377ad0f2734af4c5657693f8ee5d5156d91be0a500d
annobin-annocheck-10.54-2.el9.i686.rpm
0cc30988fb23f20723188310a1769f77d5e3e1c5470975a347722cf831aee393
annobin-annocheck-10.54-2.el9.x86_64.rpm
fbbeee262ca7fe059a4177dc8786b31e7d7462d35098f720c9f1939847f75bf0
RLBA-2022:2343
new packages: mutter
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutter.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mutter-40.9-1.el9.i686.rpm
2b440dc3a530b1b84f8f3d96f56bf1fb73cb17fa4ca323cf157d99961776c784
mutter-40.9-1.el9.x86_64.rpm
cdaf22fc00ce75986205bfb5aaefbe62dde3b71069da1619e95f32fa66b688e9
mutter-40.9-10.el9_1.i686.rpm
4e3d16a73c4d923e5e9af5f5a8138cd682cfeb5ab527375cb3e3a323470ffac7
mutter-40.9-10.el9_1.x86_64.rpm
2d3b70879b9922cc48ca36a67b707aee6d8dcd283fffaf3c81104f9e9da621d7
RLBA-2022:2345
new packages: lorax
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lorax-34.9.14-1.el9.x86_64.rpm
16ccb2137484932029275b6a1904b101203b91006927cfc5bfdec57cb414657a
lorax-docs-34.9.14-1.el9.x86_64.rpm
53ec0f01397f07858bc805e5c3c9729c97e9ff5fa9e5f18fd31deeaf938bec3d
lorax-lmc-novirt-34.9.14-1.el9.x86_64.rpm
a4a1a47532999c2b7945c2a26aa2140de9a94f1d5933a6f3b9f00d9388221c57
lorax-lmc-virt-34.9.14-1.el9.x86_64.rpm
a119bb953a0df5f3f26912ee4c7cef25ef2ad82cde5840300a457d1b225e5ac8
lorax-templates-generic-34.9.14-1.el9.x86_64.rpm
54bd29305ced43c3083cbead5bf02e9aadb28a7334be206141b8fa1aa1f34ff6
RLBA-2022:2350
new packages: python-podman
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-podman-4.0.0-1.el9.noarch.rpm
58d6c7f5b932020d10f79f570fa175fb60782aec7c299f5a3506b44c0b13519a
RLBA-2022:2353
new packages: gnome-shell
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-shell-40.9-2.el9.x86_64.rpm
2628a0542288f306d08e9ac5eda179a1a06106a0d2ab5c212e6966579dece3d1
RLBA-2022:2359
new packages: containernetworking-plugins
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
containernetworking-plugins-1.0.1-3.el9.x86_64.rpm
1f7f7b7ca2f32633a83b9dfd8fdc3606db435ddcc14d63d7e976c7df17bbdf73
RLBA-2022:2360
new packages: checkpolicy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for checkpolicy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
checkpolicy-3.3-1.el9.x86_64.rpm
4c22eb9bfea6b9c9eaa9b4ab92b476259793e2a3b16e7d391fa6a5ce09a6e9e8
RLBA-2022:2361
new packages: container-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
container-tools-1-10.el9.noarch.rpm
63e3e95282fa1129756dd5df0bf2292c9bd25425b84b85c0adad09646a642573
RLBA-2022:2365
new packages: qt5-qtwayland
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtwayland-5.15.2-15.el9.i686.rpm
9604bef7ae23d668bbd64711703c8800bb4d55617f9771b7aff1668396c0645d
qt5-qtwayland-5.15.2-15.el9.x86_64.rpm
3e488f281759523716b3742e9e8baff3582888f70f4fd293b4927fbef739ef08
qt5-qtwayland-devel-5.15.2-15.el9.i686.rpm
d51244c89792ff4bb2b070137666de600160dca0114694909d4721d55c2188f3
qt5-qtwayland-devel-5.15.2-15.el9.x86_64.rpm
aa2241aaf623cd7b51c55ad69cc5dc6b2b27474ead80b5ac230fd6d1e36ef138
qt5-qtwayland-examples-5.15.2-15.el9.x86_64.rpm
d4a0151af286f62814132cf5c0060756b73cdf8a9ca84fe67e1cc787a32c9c20
RLBA-2022:2370
new packages: pcp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcp-5.3.5-8.el9.x86_64.rpm
71aaa31b961997d12d9e2d86942a448bb72cf32d591a6443fc645920ad377c6b
pcp-conf-5.3.5-8.el9.x86_64.rpm
e941dee3c25097469dc0dc4d98dd59cd93428f6fa5f35f619a468473051f50ce
pcp-devel-5.3.5-8.el9.i686.rpm
1b41f6fd79f31713f1a7f082cbd2371e2bc546830dbd3286a3162766d926cc8c
pcp-devel-5.3.5-8.el9.x86_64.rpm
97d3cc09276b4ae400d8de54227c538e5c5a7deaf8646d3ce0c729e7790cee69
pcp-doc-5.3.5-8.el9.noarch.rpm
a212e6f2264afde04393417cb6fca84df32c40993d70bda5f450e7c0c6620c54
pcp-export-pcp2elasticsearch-5.3.5-8.el9.x86_64.rpm
1221369a3071f1b1ea7448ca061add790b2c7353d4102b28a75027ca562774f4
pcp-export-pcp2graphite-5.3.5-8.el9.x86_64.rpm
918d58d3e2f4d3a3748959d206fc6ebbc689380170abb78fa53b4d8ad4d015d0
pcp-export-pcp2influxdb-5.3.5-8.el9.x86_64.rpm
265178a4aff5f2d80f1828e6f6867124c6b00bbdf708e105326c2a9142c87cf3
pcp-export-pcp2json-5.3.5-8.el9.x86_64.rpm
88f2c61cd7b09db90b756dd2d8fb796188340ddae23b2f9f8d7a5afdd6597fee
pcp-export-pcp2spark-5.3.5-8.el9.x86_64.rpm
45d553023ac3f2ee228045f21736c35d3e82cd721901877d039340f235a903da
pcp-export-pcp2xml-5.3.5-8.el9.x86_64.rpm
97923c1856c364e623eba83853d405133d01befebaa018848e7b5daac579437d
pcp-export-pcp2zabbix-5.3.5-8.el9.x86_64.rpm
bf1b6b475028bfa202995e8dedc080dcd43d0b3e3b27285e87d7b0552ce764f2
pcp-export-zabbix-agent-5.3.5-8.el9.x86_64.rpm
66a134d0f7bf0700f8c938bafeaa9b712d603a7f5e74c825d1bc1b4b00a96017
pcp-gui-5.3.5-8.el9.x86_64.rpm
325caafed2813390f067f0b899024318fb1594a38f2390b8e87ecffdf37e978a
pcp-import-collectl2pcp-5.3.5-8.el9.x86_64.rpm
339b5072b66f693b96df508fda7127a7a6e96658c406d3631de6a9a3938ee9fb
pcp-import-ganglia2pcp-5.3.5-8.el9.x86_64.rpm
b467fdbe57ee014bb31450b585c8e9946f6e9f83193e035d80021722719018e5
pcp-import-iostat2pcp-5.3.5-8.el9.x86_64.rpm
50538a72a28e9f09789d550dd673e7f3c26ccfe5c11017b922227093927b96cf
pcp-import-mrtg2pcp-5.3.5-8.el9.x86_64.rpm
8668713f32087c87cd0ed26294e0459ec0af5f5c02321e8fc1a980a80cf7b9ed
pcp-import-sar2pcp-5.3.5-8.el9.x86_64.rpm
637f90768db9d607bde523f19f978a691907be463231e0145ff78115457be982
pcp-libs-5.3.5-8.el9.i686.rpm
ed117298c162edbbde6ce206269af3d753e7a2c67619edb1018d842cee67a845
pcp-libs-5.3.5-8.el9.x86_64.rpm
591f6531b3661e14360166b657597b712dd837f584df01dabdaa87a69ce2e3e2
pcp-libs-devel-5.3.5-8.el9.i686.rpm
abc42e60811cf4703eb5aa148f9dba1796810e4ac0e292fdf6b286912798542b
pcp-libs-devel-5.3.5-8.el9.x86_64.rpm
0c3495df141c55465e2d27d498eca55575fa33dab10b72c8b6237463065440ca
pcp-pmda-activemq-5.3.5-8.el9.x86_64.rpm
0048f91934dbca3a27da427c3d424d95e4f8bc0bc73e1ef0ec4498ced9569d3c
pcp-pmda-apache-5.3.5-8.el9.x86_64.rpm
8934a40ec63afc8deef1b8130aa1df3e9785e43d959ce36ba11674c4323ea50b
pcp-pmda-bash-5.3.5-8.el9.x86_64.rpm
140cd6269dcbbd228e562da773fb1442b77128d8a144382d76639fe7359af0cd
pcp-pmda-bcc-5.3.5-8.el9.x86_64.rpm
8a44a2f3cb96b11cc96b7ba579f2da589f91ea32c9b403bbd638879b80b87c43
pcp-pmda-bind2-5.3.5-8.el9.x86_64.rpm
04a386c70a6443d0da9e89a204ee6f8db5dc2cdd4ad804fb7a4a14e12cdfc877
pcp-pmda-bonding-5.3.5-8.el9.x86_64.rpm
a4bd8811d80a0252daac13cc0c7d1a55a5a461cd8fe973072fc29b0c2aaf9423
pcp-pmda-bpf-5.3.5-8.el9.x86_64.rpm
162183f2ef50367f35a85c87de17e2a35d2cd384d7ae78679262be7e2d324ee8
pcp-pmda-bpftrace-5.3.5-8.el9.x86_64.rpm
ef69e14db6a6d580b9e40cf87496830ba5109810dd867a2b4b7b1657bd9280a9
pcp-pmda-cifs-5.3.5-8.el9.x86_64.rpm
cce19eb1cd2bc1c7769b14ddf04135299c4f2ae634618ddde4896d5a1759226f
pcp-pmda-cisco-5.3.5-8.el9.x86_64.rpm
e2e6419d45fa9847565400e938904110861e74815ec22e1c62f045d5bcbf15f4
pcp-pmda-dbping-5.3.5-8.el9.x86_64.rpm
82b743adedf98dcea6beb4176783e289221768faa5025289d6208af4433a307c
pcp-pmda-denki-5.3.5-8.el9.x86_64.rpm
2a39a634fa9c51b4d322bb74c8836440bb0d598b520e270a29c896326c129a40
pcp-pmda-dm-5.3.5-8.el9.x86_64.rpm
5b48eaf39952da4e128ce79c8a316ec497998e0b3d63dda1a56f16a0f73a190e
pcp-pmda-docker-5.3.5-8.el9.x86_64.rpm
9a7b7b017b5724c2bd274a90f546e91606649fb2982c8d41954808d5f5221fef
pcp-pmda-ds389-5.3.5-8.el9.x86_64.rpm
73cd3547ad8124528eb0490a6053320250b7ccca39f95bba254c8117b5037042
pcp-pmda-ds389log-5.3.5-8.el9.x86_64.rpm
4095c8a9902a402a66094c5d3b6a0ee34e0a5c1fc39b521ba5a2748daa69033b
pcp-pmda-elasticsearch-5.3.5-8.el9.x86_64.rpm
022e7d913ba31fd01b292d63d8a6e563a367dbcf427e3d6ac7d51a4ca6ff634a
pcp-pmda-gfs2-5.3.5-8.el9.x86_64.rpm
b1f4e7de007781c1954bd261ea98224ba40db5532876ed17105466fb6583ede3
pcp-pmda-gluster-5.3.5-8.el9.x86_64.rpm
fb6db7310fd1a654d0c665d2144d361007978c26a4ece81e4bdefaf9a9d55362
pcp-pmda-gpfs-5.3.5-8.el9.x86_64.rpm
71c3a2df100f4784a158191d3a5b33491db06485b13270708600b37a88428bb9
pcp-pmda-gpsd-5.3.5-8.el9.x86_64.rpm
5aa3c17e8d42971863a0bb8a3212b0f7c51443abb24b62bb8563c28bcffa368e
pcp-pmda-hacluster-5.3.5-8.el9.x86_64.rpm
1d5f076c36c444f0efc36effc01c9de963395a52710384f0bb6444469b40d5d6
pcp-pmda-haproxy-5.3.5-8.el9.x86_64.rpm
5c02c84d4e787e05e66905e5dfb923ce3c04ba8ff127023fc2a9a68aec5a29c6
pcp-pmda-infiniband-5.3.5-8.el9.x86_64.rpm
80ff83aa1118a4a3a47a4899d321d0ee192059decd0e5a40f513216fb4fbc9b9
pcp-pmda-json-5.3.5-8.el9.x86_64.rpm
4bbd3e76b0a2fbadf222c146aaf8e2bc3861dc70e2cf22c038c2daeaf3e4129d
pcp-pmda-libvirt-5.3.5-8.el9.x86_64.rpm
de44b821eb0e41a52687a4d2c7d4ce0dcf813350c59f222233882373197d64be
pcp-pmda-lio-5.3.5-8.el9.x86_64.rpm
03d4e4751945ef7da10178422d5754a135e0df21700baec8e13320d7b0f5cffc
pcp-pmda-lmsensors-5.3.5-8.el9.x86_64.rpm
356336f07d21f614316283a636a25c148127b157689509c2f10836ff767944c2
pcp-pmda-logger-5.3.5-8.el9.x86_64.rpm
fdae1fbcb276b2e3864e49281e1cc432bbc921c6b3234f278eafcea54357d3ec
pcp-pmda-lustre-5.3.5-8.el9.x86_64.rpm
0d83cd86169c144d3b818e672a10c4e30105dc28a33b0bcccef9ca31f06a9a42
pcp-pmda-lustrecomm-5.3.5-8.el9.x86_64.rpm
2b7446f2038049d1ab1543033fecb0e46b98b0e04dbf19b4ccc7256c27bf2bc4
pcp-pmda-mailq-5.3.5-8.el9.x86_64.rpm
6814685fce7bd7e2980143aace83ad191bb74440acf4b5c582dbbc8238c47c88
pcp-pmda-memcache-5.3.5-8.el9.x86_64.rpm
5b275bdda3485b16f8471257a2410e553ae6d27ed8bcec9f5b7c4ea506aa93a8
pcp-pmda-mic-5.3.5-8.el9.x86_64.rpm
3ebe9b6c4f7387a355730d115924de615f2eb6f432613b8010b4f263924349e8
pcp-pmda-mongodb-5.3.5-8.el9.x86_64.rpm
aa37d0312e5ba8bee37aa097c7ceb15a28a9a8d3dbbee8702ab86406cae75363
pcp-pmda-mounts-5.3.5-8.el9.x86_64.rpm
a91769db4b1bdadc733cdc638f18879ba58808fdd4b33704b819f2923ae7e555
pcp-pmda-mssql-5.3.5-8.el9.x86_64.rpm
dab43d9516e28cccca6729fae6c98ec64abc8ef8cc824d449a8e16d9ef184233
pcp-pmda-mysql-5.3.5-8.el9.x86_64.rpm
fba2c449dbdafebaf1cce89de2e978b2a3482b8f30acbbba13259878c53c4bf3
pcp-pmda-named-5.3.5-8.el9.x86_64.rpm
abc8f4e1a3628211ccc73849e78ce47464eb62e4778229bfea0416a378a22c15
pcp-pmda-netcheck-5.3.5-8.el9.x86_64.rpm
77ef3b5dc79b3765edf1967c07e74d485882182d482ac9862268e2526d1a7d77
pcp-pmda-netfilter-5.3.5-8.el9.x86_64.rpm
76e0d5552c1514fd543d4595e83bb4d777c342a0bd54505dec4e72535301c74c
pcp-pmda-news-5.3.5-8.el9.x86_64.rpm
88cf24913fe381a383929585eb5a3a01c4301527a476757f00698a7ad0516fcb
pcp-pmda-nfsclient-5.3.5-8.el9.x86_64.rpm
c613150feba4c2c97deba054a789dd40232b9e26a10df6281b5e0a449d9d15ca
pcp-pmda-nginx-5.3.5-8.el9.x86_64.rpm
aced51765187767272df8791a2ec3b855c24934d0049cbc0e7171159f5d361ee
pcp-pmda-nvidia-gpu-5.3.5-8.el9.x86_64.rpm
cc1f6039f245fa4d0174893a7d06095c22ab4f22d50866326e606709f9d6e0b7
pcp-pmda-openmetrics-5.3.5-8.el9.x86_64.rpm
e010d6121d5887337d2a9f83644c17235572ca351d325b25c98d79d894f8e71a
pcp-pmda-openvswitch-5.3.5-8.el9.x86_64.rpm
ad1042ff11f0623f2e9dac99ed26b0b6f1e1820744cef205ac34264ea703b307
pcp-pmda-oracle-5.3.5-8.el9.x86_64.rpm
7a35372e6106088d3a74b4b46a9784044942b5454575e4857a611be68e736a7c
pcp-pmda-pdns-5.3.5-8.el9.x86_64.rpm
5a561219c89e8a24e3b3728f6158347e25380ef62600e2d5d5c61ee501335b58
pcp-pmda-perfevent-5.3.5-8.el9.x86_64.rpm
eabee1eff50082325777649d73433df8816185257b6b53018bf389e0e532b53e
pcp-pmda-podman-5.3.5-8.el9.x86_64.rpm
3c31d023370c78603634d546343a1d9c5036dcb9ed0c07ff544fcd5a5f69f8f3
pcp-pmda-postfix-5.3.5-8.el9.x86_64.rpm
39d7a9b4fa39a022c6e20df3fea24b36490ae3db9a51b81ce8565f949deff472
pcp-pmda-postgresql-5.3.5-8.el9.x86_64.rpm
47c39468b1a2111440c40a60b8d1d07bf187cb0bff2fcef258806b22d8b6b648
pcp-pmda-rabbitmq-5.3.5-8.el9.x86_64.rpm
61be61ab6966b86529683cf8d5a41123cf3eb66a9e6a4aac6f05ee1c3be72750
pcp-pmda-redis-5.3.5-8.el9.x86_64.rpm
adda36fdbc6b243c568149aed86958a9d714caf43b4c4e0db238d3b2924b5478
pcp-pmda-roomtemp-5.3.5-8.el9.x86_64.rpm
8985de9c8e5e50e6c4885317442b1469714b495c55e9429d24f873fa835b44a3
pcp-pmda-rsyslog-5.3.5-8.el9.x86_64.rpm
acb67ee1fe5905ec8ae8435007d9dab4d0b45363a4dba839d63b56ac9f1f44c1
pcp-pmda-samba-5.3.5-8.el9.x86_64.rpm
196db63cdc94d8efca16dfe5224969d68319b3d096784cabd7a9e66982899be4
pcp-pmda-sendmail-5.3.5-8.el9.x86_64.rpm
689734270568e71d297b5c267ffb1771457d3197c105342a7408c6ef085666c4
pcp-pmda-shping-5.3.5-8.el9.x86_64.rpm
d1a1e505c8889f134b7cc7257d42f26bbfccc1befe5d6985d82a5c3995103a8a
pcp-pmda-slurm-5.3.5-8.el9.x86_64.rpm
09c38695ab279407c00bb6162f81d39a8cbd6ce1ad0214b60b9a7ef9adbc8934
pcp-pmda-smart-5.3.5-8.el9.x86_64.rpm
82ea32f8c1f68a41bb891059eabf05180d3f7461db5ce843f18dbe8fc2d644a0
pcp-pmda-snmp-5.3.5-8.el9.x86_64.rpm
39179000e61c7751640be5aa3c6600db80a61d8f0d32914e482301717684ebd6
pcp-pmda-sockets-5.3.5-8.el9.x86_64.rpm
d7cd6a9bfbb5ac2867b035df81dcf59c16bcabadc8d8a7e4df4d42b8bc524021
pcp-pmda-statsd-5.3.5-8.el9.x86_64.rpm
278fa47088bb283dd2e0cb2dbbdbd6e169fc324cd89433d3fbf49acc393ea929
pcp-pmda-summary-5.3.5-8.el9.x86_64.rpm
5e47b1ca5be9151cb72ab4b8a0a9a748e16c421d876314a868822cdb057a5654
pcp-pmda-systemd-5.3.5-8.el9.x86_64.rpm
f93481a5ef17025b7874f341b16a42534747b92dffa6b28c454e583fc26fe93b
pcp-pmda-trace-5.3.5-8.el9.x86_64.rpm
60fb405faa7c97fe9bd95620b2d0727f8dbd3077f197742cac6aefd9c0777cd2
pcp-pmda-unbound-5.3.5-8.el9.x86_64.rpm
6ffd6ea9a9618041fb51e97fc03a969dfb7d91a6383e7484e9e9d445e589d122
pcp-pmda-weblog-5.3.5-8.el9.x86_64.rpm
d4769c18e7974fd4c98ef198a29ccf86a4cadddfc137894ba5548b3603895752
pcp-pmda-zimbra-5.3.5-8.el9.x86_64.rpm
58f91051b2838ab81bb84dadc93f0963f40f35c1ed68eb204ae5d20daf585a5c
pcp-pmda-zswap-5.3.5-8.el9.x86_64.rpm
5e0b232a822cef761c2b27d41528cb8290e1d9a5f8d98a14b70cf918cdab5f6e
pcp-selinux-5.3.5-8.el9.x86_64.rpm
69e42302e2cfb27d771e4095e4cde344fa2db5f661689c417f69b9431853cd60
pcp-system-tools-5.3.5-8.el9.x86_64.rpm
d479e31e4d4d7aebf10e367d9381241a6c276890426b4493a922af3f038b7faf
pcp-testsuite-5.3.5-8.el9.i686.rpm
818eb43a39c748e72e43449555fd00f9a5774b393ee2c708012a3edc507bb5d9
pcp-testsuite-5.3.5-8.el9.x86_64.rpm
93e5dfaaeaf68d214684767b9cda1f891bd6a436c8e1cef4ddc22d0cdaf0f8da
pcp-zeroconf-5.3.5-8.el9.x86_64.rpm
d21c284c05fbe028f835578a2a2e975e2a6a02339ebfdc7cbd4c22c6b59f72b1
perl-PCP-LogImport-5.3.5-8.el9.x86_64.rpm
b1ecc1022261946bdbce1557b54787c9cfa258f30158ee7ccfd3afcc2350d393
perl-PCP-LogSummary-5.3.5-8.el9.x86_64.rpm
56be78692eb01636e8760e3a5b91c0ba98de4a2ed47d5c1eb65fe81448796bc5
perl-PCP-MMV-5.3.5-8.el9.x86_64.rpm
46024fc650854db319ec6a842dc8c2174383e9a477bd79cd11752d52c08b8933
perl-PCP-PMDA-5.3.5-8.el9.x86_64.rpm
14d55106ac67ba26b5a37743251be3d4524ad4802a95c4d86a69a73f8fe6990f
python3-pcp-5.3.5-8.el9.x86_64.rpm
dc6394dc138520dd3d042e72a8fad469c5e1458bbdeb72d7e53ae8a835868858
RLBA-2022:2371
new packages: freeradius
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeradius.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freeradius-3.0.21-26.el9.x86_64.rpm
c6c6774d4d8450143829dd92cc92ba7a6d85d603ef48f639e9a2e20073dfd378
freeradius-devel-3.0.21-26.el9.x86_64.rpm
6d9f6f40b41cafe1596a0f924cb7d57bb1048b693b03a2ab7852bc82a8a033f7
freeradius-doc-3.0.21-26.el9.x86_64.rpm
fe0c3cc0bbf14c2356469bbca948d1796439ae420e20d36125904a70a2847cdb
freeradius-krb5-3.0.21-26.el9.x86_64.rpm
c6690fa6438c088693c17afe6b504a61deaaaf9038aa9abf3a072f9b81fc98d2
freeradius-ldap-3.0.21-26.el9.x86_64.rpm
14eb7428542aa7a4cabfffd4cc737e6df51b2d9b94594edf0598aa7871200457
freeradius-utils-3.0.21-26.el9.x86_64.rpm
4b319c105fa3bac089ce593793b73a6f26e19878eeec271cd3430cc148086d6e
python3-freeradius-3.0.21-26.el9.x86_64.rpm
224a26e30455ab5b0ce0e723c1b3be9ed3ed60bcd818ff4410f7ae2405acf242
RLBA-2022:2374
new packages: power-profiles-daemon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for power-profiles-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
power-profiles-daemon-0.10.1-1.el9.x86_64.rpm
ff6bff6dbb64e10eb348a510c260f755f1a57cfe69122a5d29b5fc973ecfcb2b
RLBA-2022:2383
new packages: wayland-protocols
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wayland-protocols.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wayland-protocols-devel-1.23-1.el9.noarch.rpm
6eeb472af6eb4a83b644af315ce690300a22d4632cc8e49f4a3f9e0c2a047635
RLBA-2022:2385
new packages: libreoffice
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
autocorr-af-7.1.8.1-6.el9.noarch.rpm
ce6c8cfe56c662ff871191c0c476b4dfa6823ca3ac58bc3b904d977c30543316
autocorr-bg-7.1.8.1-6.el9.noarch.rpm
28fab974520eacf9d0130af30335078520fb51616cf313904eaca6e1211ff23b
autocorr-ca-7.1.8.1-6.el9.noarch.rpm
b889e9e02d5853027bd61b3f7e295bedc630368a331d0d55c061aedeae14488e
autocorr-cs-7.1.8.1-6.el9.noarch.rpm
1b725a63b3f5fa4260a951bd63e01c85e38075697b522e4a1563f5a6a8525358
autocorr-da-7.1.8.1-6.el9.noarch.rpm
aeaa8ce31a842666d12eda8a63f645d600e8652ca21f187c55ece831911d73e9
autocorr-de-7.1.8.1-6.el9.noarch.rpm
1ac5c3b48f94c8b97de1177a068586d0dab742786557b05aa790999be7a1708c
autocorr-dsb-7.1.8.1-6.el9.noarch.rpm
43b54401851942f774d923d607ee6b92ce40e00bdc1051998686d8f352682f57
autocorr-el-7.1.8.1-6.el9.noarch.rpm
900d00fded7e50386e958bb396b4be2e7c29ce78b383a4939718bbd80d9e9f62
autocorr-en-7.1.8.1-6.el9.noarch.rpm
b3c03d814f6e3edf030d439a1cd3980c7e53566b43a90c2df7256cfaf91c2611
autocorr-es-7.1.8.1-6.el9.noarch.rpm
f1b3fd91f1064175699d7e398ae4f21c172ac45515b443903bec44249f29fbfa
autocorr-fa-7.1.8.1-6.el9.noarch.rpm
0eb87f687c4e0585f2d482acbd714a487056db80ac59fa38311e8712ed012a11
autocorr-fi-7.1.8.1-6.el9.noarch.rpm
4504fc8d0eec2047273b5ebf412d560de62f969aab5c67121ad4dad14057e5ac
autocorr-fr-7.1.8.1-6.el9.noarch.rpm
7aab41753920e827cc4832f78cd7905f32b6a9cfe81c8fa89c4277d44e1a7f58
autocorr-ga-7.1.8.1-6.el9.noarch.rpm
b5077af0f4d902fdbd6a6008cc2eeaf5592692c7175cb6c9227fd128fca4925e
autocorr-hr-7.1.8.1-6.el9.noarch.rpm
52c8d2ad1cc9842297e1a93acb9b1066dd0402f1d099ea530af4b07e01971020
autocorr-hsb-7.1.8.1-6.el9.noarch.rpm
c07c724703f2cd035bf9a1b839fbcd0fec273b4f21b347b4e878abe1e1d706af
autocorr-hu-7.1.8.1-6.el9.noarch.rpm
d40741030523e38dff12d89a10fdc64a5132dbe0e1683047406bfa2e4bbd9b55
autocorr-is-7.1.8.1-6.el9.noarch.rpm
1ee2f74d722a494cad6d435aade3825268f70ee256d035cab287102e75b9ac5c
autocorr-it-7.1.8.1-6.el9.noarch.rpm
a15599e5f11db53fbc6ace60202b298c03ef6424363d7baa5681f6b047b9bc4a
autocorr-ja-7.1.8.1-6.el9.noarch.rpm
29547f61deff86c925ad72f843b67ca6d1eb040de9f73f3a210facb5c96f3e95
autocorr-ko-7.1.8.1-6.el9.noarch.rpm
e159b5ec70c8118e87045dda6645a5897dcd5735149d4d291b612cf3fafbd0d5
autocorr-lb-7.1.8.1-6.el9.noarch.rpm
524ce66158c00417e70ba19446da5cfa6d7e1892f29d80ac47da207e44a7c87c
autocorr-lt-7.1.8.1-6.el9.noarch.rpm
87bfe485c58614f76bcb8a20f7d286cf0afae4cc29827489ecde479f190a3d4d
autocorr-mn-7.1.8.1-6.el9.noarch.rpm
db036528d533236eb2aa3950411aa3131a9ca25bf5fa84a978a835789c44629f
autocorr-nl-7.1.8.1-6.el9.noarch.rpm
daca88d9841c620164f31c68fcd3ebe4c37687bb623b25ab8e6841140e43f87a
autocorr-pl-7.1.8.1-6.el9.noarch.rpm
1bfb188c4a25ff488cb548972a8e0053688172317bba5095865edfef3cab33e4
autocorr-pt-7.1.8.1-6.el9.noarch.rpm
bb1115db8698f28f6d38193b72577db144bf297f2da6175dfeb12f92c4034eb6
autocorr-ro-7.1.8.1-6.el9.noarch.rpm
7b50841787247cc293b4f00308e946484d9e59ad71a2fd27693c818c7b3c9a82
autocorr-ru-7.1.8.1-6.el9.noarch.rpm
9af6af92a8f32328d8447fe48de4e4d13bb303fa41b232f4caa3906b8d5128bd
autocorr-sk-7.1.8.1-6.el9.noarch.rpm
3f99a962dc8bc96871740e05d381d3d3dba1e20d3327a312f123627dd74f3b63
autocorr-sl-7.1.8.1-6.el9.noarch.rpm
c542950738c2c8daa577d76c6221f59ff0832afadd3144d4665721262d7e108a
autocorr-sr-7.1.8.1-6.el9.noarch.rpm
0e259d47e12c980e44e37c6650568dc6075fa542dbbe3f001373b7ba6ba66770
autocorr-sv-7.1.8.1-6.el9.noarch.rpm
d45ba6db0215cce8f1014c64d6beda6284a34c9bd23ebf5f9e90357afb8a8b75
autocorr-tr-7.1.8.1-6.el9.noarch.rpm
16bbdc62d5e1377c4572d6bb113223cad4300bda44c0e9abbb9b9a44d81437fb
autocorr-vi-7.1.8.1-6.el9.noarch.rpm
c4e88e37bbb1c11ad934ab4b0ab3173225f7ae74ca7cbbc9e985bc0b8af419d4
autocorr-vro-7.1.8.1-6.el9.noarch.rpm
5355d79794575a6d1b616f1281bb3586ab47a9299e54e26c16b950029f136fb6
autocorr-zh-7.1.8.1-6.el9.noarch.rpm
3ddf6101b213b342dadf290dda051310f37698a9519f6090043c0c796ecda969
libreoffice-base-7.1.8.1-6.el9.x86_64.rpm
0da41c1a40eb779f018b7403eba3ccb954207c8e4d93a4f9d4adb8dd3a3de5d6
libreoffice-calc-7.1.8.1-6.el9.x86_64.rpm
fba4229246b92703fa1d631ef453ad0d7debb6c93f46d35da440f06a0d5cf9b6
libreoffice-core-7.1.8.1-6.el9.x86_64.rpm
af7f7b067da3f4ccbb6244499d5b36c51bbca26e6983d65e9622d71a29b031d6
libreoffice-data-7.1.8.1-6.el9.noarch.rpm
1a1f79694f0f1a859a0c6a929c9bd8240a056304e55a2c6f4b7956f35e64092d
libreoffice-draw-7.1.8.1-6.el9.x86_64.rpm
b23061bb5995566e1eab89bd7bbc767944dfa363044c60a82acaeebeacbbe553
libreoffice-emailmerge-7.1.8.1-6.el9.x86_64.rpm
f5ef47f2a1c663dce8723feffa472854a2cb11132878e361ba71ad46e45cccec
libreoffice-filters-7.1.8.1-6.el9.x86_64.rpm
8f656b754daaf2d662ef611e8d8e3a5daac2297acaf7648d5fe70c1604cca9bb
libreoffice-gdb-debug-support-7.1.8.1-6.el9.x86_64.rpm
f84ce6f2818b4f8f74968aa2ce389ebb23f0e5fbab0c9454cfff6fd3c6057817
libreoffice-graphicfilter-7.1.8.1-6.el9.x86_64.rpm
63f1876528987a5b4fe3f0a4dacc679140a69e61f25d784af7e1bdaf810b65c5
libreoffice-gtk3-7.1.8.1-6.el9.x86_64.rpm
4c70ce747569e59c7796e8fed939433a22c72ea32ab386f99876a2fa59dfa71c
libreoffice-help-ar-7.1.8.1-6.el9.x86_64.rpm
1028a0ec1cb1f605bbff2a2ec9e85f8290c7a3189aa0f781bbb3c7bd2417ec2a
libreoffice-help-bg-7.1.8.1-6.el9.x86_64.rpm
b67177e0dd1b70b6556b61316bcae21fa271f8150983c305fbc8d16d49dc1f57
libreoffice-help-bn-7.1.8.1-6.el9.x86_64.rpm
efebb408a500f8f50302495e0803c49af6d1a131eb243ef1c56b30d0803972fd
libreoffice-help-ca-7.1.8.1-6.el9.x86_64.rpm
9df6fc7153eac07f85ee3aaee3a7b1505dc71fd881cd18ce2f23db6005217b10
libreoffice-help-cs-7.1.8.1-6.el9.x86_64.rpm
0fadcaa47b12fbf47523a8452fc68f715901515ac5f53a396419f0c9bf62cf7a
libreoffice-help-da-7.1.8.1-6.el9.x86_64.rpm
c91aa7e29f35f529feeeba57485c5bc4f6553505af42fa12fba1e8d296d6d989
libreoffice-help-de-7.1.8.1-6.el9.x86_64.rpm
d8ae64b86ed54f3c7bc2d1d29d3fc0dd16a775102b5797f66f4ba82db1555673
libreoffice-help-dz-7.1.8.1-6.el9.x86_64.rpm
f7f80b3ff6733a2bf9567c478eee7a99f4f699c78ee7e8a481f0447f064aaac8
libreoffice-help-el-7.1.8.1-6.el9.x86_64.rpm
766109b9f2842782fa63f77615235838ea7ced0c2e33ba9e6ae15bbd85aacd93
libreoffice-help-en-7.1.8.1-6.el9.x86_64.rpm
937547cd820f927251f854da2c05f8ee0e19ceafe8d3e4bdcae43a59e39451b2
libreoffice-help-eo-7.1.8.1-6.el9.x86_64.rpm
acfbccf72a2989e68095b91b13b313301246ffb6298cd50946af7f71ab48a9f6
libreoffice-help-es-7.1.8.1-6.el9.x86_64.rpm
3635ae61677ef853dfd2693899750bdddcef7674ffab37f7b8e8f93215fff11b
libreoffice-help-et-7.1.8.1-6.el9.x86_64.rpm
b6990dc560c0130a60fff495633118a97737d42388b177afcb2d30dbc78df940
libreoffice-help-eu-7.1.8.1-6.el9.x86_64.rpm
aeccbdf6fa75a9655304e895c6f9e2d6f3e3d98fb33af66515ba2c437fc4fbf3
libreoffice-help-fi-7.1.8.1-6.el9.x86_64.rpm
2c2851be7af1643c64b1bd6ce279e184af481d39c2d01b62df1d445aec60d4b5
libreoffice-help-fr-7.1.8.1-6.el9.x86_64.rpm
3d6939e9f991c1f2543c3373924bc5eb7463943e343f1695302518a1e4ed2618
libreoffice-help-gl-7.1.8.1-6.el9.x86_64.rpm
de77dff5bf97cf345a9a119b08d6cd98c291a8b30d324ed61b48c5dbb67e3e7b
libreoffice-help-gu-7.1.8.1-6.el9.x86_64.rpm
ec75792443e9823eda8c70068d0cdc47de23d340fa2894a967025a5ec9813e3f
libreoffice-help-he-7.1.8.1-6.el9.x86_64.rpm
6f337aeedafa57e236d3f75874fc01e43edf9aad20e8a531ce234f08c0da9538
libreoffice-help-hi-7.1.8.1-6.el9.x86_64.rpm
f5cc29aa6978c90517e1d6547c10ec644706409fb379dffb6a9a389497b2cb7f
libreoffice-help-hr-7.1.8.1-6.el9.x86_64.rpm
9c4f0c7fc43ae24c17460d51d9cb172e9f72188ef816ea1ca2b488f98cb364ff
libreoffice-help-hu-7.1.8.1-6.el9.x86_64.rpm
ddb359b2abaa08de94b4f0cd713f59c23416ae6fccf4c303183a9386dabf9dd7
libreoffice-help-id-7.1.8.1-6.el9.x86_64.rpm
b4dad685e2a70c5f11afb4d030cc18477ceed175ee332287750f7009331ac113
libreoffice-help-it-7.1.8.1-6.el9.x86_64.rpm
f4ea97101b45ec9739dcf46851ae45c8ea2d4539ba054bb94ab274c45a406f4e
libreoffice-help-ja-7.1.8.1-6.el9.x86_64.rpm
ddfca2cbe2d1535bd1398e7d1687a3f1f6c45920bb5dc7fdab21ca4d099e51ee
libreoffice-help-ko-7.1.8.1-6.el9.x86_64.rpm
eb08f4bb6a7d5e3a1dfeba47094afa7c993627fe76afa40d1f160eb24fb2446e
libreoffice-help-lt-7.1.8.1-6.el9.x86_64.rpm
e728dd68f22179fea0447fe383187851776aac62bf2c6a5f216f3ba7c33c2f19
libreoffice-help-lv-7.1.8.1-6.el9.x86_64.rpm
19912fe2ebd55c517ff4c825265593a33d5c0b032a408e1288ce0c5c1a60d2ca
libreoffice-help-nb-7.1.8.1-6.el9.x86_64.rpm
a7e491ae91343b31722938a7ffdd4053ce64a55df6ccf173a21863602fa0ccec
libreoffice-help-nl-7.1.8.1-6.el9.x86_64.rpm
96bbf0878dc0de73405f94528ea21a92a3d935f99553e0b9c1b8dc9edb359431
libreoffice-help-nn-7.1.8.1-6.el9.x86_64.rpm
6c9dcb8f415242013ba997306c5a702138095471bcf24294963956d04aaff671
libreoffice-help-pl-7.1.8.1-6.el9.x86_64.rpm
fe41abb248ba9c13cd6e223b9927566782d7492067fb58a65d9659bd3a931a71
libreoffice-help-pt-BR-7.1.8.1-6.el9.x86_64.rpm
190a04c015940d4b733ffdc6be381a854684c219ddd71d35dd5b34adfe46c500
libreoffice-help-pt-PT-7.1.8.1-6.el9.x86_64.rpm
4ec4cd694ebe836d8aba4f1a6b8a07ea7756f44b57a9a2bc32bc41de5920935c
libreoffice-help-ro-7.1.8.1-6.el9.x86_64.rpm
b0174d88eb87a58117e1543a2b9dbd7213d41c046d95fead5a8172c1cfd8406c
libreoffice-help-ru-7.1.8.1-6.el9.x86_64.rpm
f74e5ad0fcea1727d39c55bf902710c726ff268e90c8f712698d748d6bd90184
libreoffice-help-si-7.1.8.1-6.el9.x86_64.rpm
0ed3caeb7e2576ba0a46ee66f1d71a8b42cd2d24bdf4241c70b35f4636b41e9f
libreoffice-help-sk-7.1.8.1-6.el9.x86_64.rpm
b1103e02f23f845a2e57808b998e6c729bea2a0d5f8aaef02ef82d0a9b78d21b
libreoffice-help-sl-7.1.8.1-6.el9.x86_64.rpm
63befeaaba51dea23b9ca071caa37518c1b6ec0c7c0a4f09f3b28d3be9072cbc
libreoffice-help-sv-7.1.8.1-6.el9.x86_64.rpm
f31b9892e469990521795d144631c4d14a3d0a7a406a74ed7ef614b8427a2a15
libreoffice-help-ta-7.1.8.1-6.el9.x86_64.rpm
a1c1474c9c14493341704b507fed27364c56d50384ab849aac6f785fbd3b87b0
libreoffice-help-tr-7.1.8.1-6.el9.x86_64.rpm
230937ddaa0df35f777ed7b896a5e3db4f574c624b6b44dff7d2d8f8a050640f
libreoffice-help-uk-7.1.8.1-6.el9.x86_64.rpm
3253d9dc5993f28fc858a1666592ba2c588897699994796529fb15f97fc9e8d9
libreoffice-help-zh-Hans-7.1.8.1-6.el9.x86_64.rpm
6d23c670a74f03e9be56730f5045d7512364e0343322e8efe8f9cb2dd9e058a4
libreoffice-help-zh-Hant-7.1.8.1-6.el9.x86_64.rpm
2659f235e2e9a3e8b089627bbb02537d3122541e7803f3adaeac16c5d3fff641
libreoffice-impress-7.1.8.1-6.el9.x86_64.rpm
c112dcafd162e091b010df1fbd15f888f6c9eebb6458fed6cf26d74beb29ed66
libreofficekit-7.1.8.1-6.el9.x86_64.rpm
8774216ce8c3889496abada6708c411a2ec085563b8a49ce43e5cacef160838c
libreoffice-langpack-af-7.1.8.1-6.el9.x86_64.rpm
ebc1fbe0d26c9e6da4c7a70d2a5a57f275f3906abb0069af9aaf7d073679bb42
libreoffice-langpack-ar-7.1.8.1-6.el9.x86_64.rpm
b019e3835d1cfe05c324d5b96f8756756f9a9dbf87e05c72c1a78efb3076fe92
libreoffice-langpack-as-7.1.8.1-6.el9.x86_64.rpm
202375433b8e8f1a96748b2a16fb1c8139f025335ebc53202d844c35442d7cbe
libreoffice-langpack-bg-7.1.8.1-6.el9.x86_64.rpm
3e2898e0eee12437a5e39b74c63b4ae8ca9ed59bbb7987d5255d26da77b34e9f
libreoffice-langpack-bn-7.1.8.1-6.el9.x86_64.rpm
32385d92a1031f3767c07f901dd58f1df9f08512bb393648fc26de70e51d7626
libreoffice-langpack-br-7.1.8.1-6.el9.x86_64.rpm
95b4463a3c9aa4cbb7fe3100ae40ca6591a747d1dd11f94e455bdd3702fa2470
libreoffice-langpack-ca-7.1.8.1-6.el9.x86_64.rpm
f14114bacf794906f18be92ba7ae11b20d912da48b095ba56ea3b201c93fd919
libreoffice-langpack-cs-7.1.8.1-6.el9.x86_64.rpm
729418f64c3b3b39d40d50005998190b1631906cc633d7cff76d55b7560379c3
libreoffice-langpack-cy-7.1.8.1-6.el9.x86_64.rpm
9fdce2d9fb120f776627efdab552a5a43df377d9a75f6e78497c5f9811d5b4d6
libreoffice-langpack-da-7.1.8.1-6.el9.x86_64.rpm
1c54131cbb366eb12d32d5a4ca5ce4e3277539a3fa5b1936f861e82495ee667f
libreoffice-langpack-de-7.1.8.1-6.el9.x86_64.rpm
cee5f0855524fbf3d14a901ed95fef1dba61c2210b0301df0e2ff73e605e10da
libreoffice-langpack-dz-7.1.8.1-6.el9.x86_64.rpm
61df884923c78ddd55897800ec68841f4084f8b9f3ead0da82080f307add7867
libreoffice-langpack-el-7.1.8.1-6.el9.x86_64.rpm
defd44492179a0202b3d70a1d7f4a1d9bf1c369c97d0804efa260d499242d310
libreoffice-langpack-en-7.1.8.1-6.el9.x86_64.rpm
03a26283ed0a29793400d0f35cca7bd5aa8f04ebcee9237603264e91cd5a2e75
libreoffice-langpack-eo-7.1.8.1-6.el9.x86_64.rpm
8beeddd7718e362d6fec1b5a7cfaf13410efb8f7cd72468561bfab1c545690cb
libreoffice-langpack-es-7.1.8.1-6.el9.x86_64.rpm
9d4158249f4c1ecee33f3dc600aa92a5e39f86cc545730f5098cccb8129fe8c9
libreoffice-langpack-et-7.1.8.1-6.el9.x86_64.rpm
f7b8ab2054828835ea512e4d743a959ef2d3577259ebeedd0c505ae6d14051b4
libreoffice-langpack-eu-7.1.8.1-6.el9.x86_64.rpm
d7b92edb57d2bcc95cc33744004a8685dc81d0cfe3469f8cac1171413fd04f20
libreoffice-langpack-fa-7.1.8.1-6.el9.x86_64.rpm
bf7b98c45412206b2d16c2904d5e70c8b1948268613f4d5c5392145ca05a8de3
libreoffice-langpack-fi-7.1.8.1-6.el9.x86_64.rpm
7be022ba59d51cdfade93c023b061ae71478c2e725d1b0dd447fb98bcf3f0fbf
libreoffice-langpack-fr-7.1.8.1-6.el9.x86_64.rpm
a8166e32142c46b2873d3a7cec930d29946d75a5812556712b91a28b13404a49
libreoffice-langpack-fy-7.1.8.1-6.el9.x86_64.rpm
3016e83886cb427a6bf3b0247e8b5e3a3c3071ac68b0768763627e264f4ac26d
libreoffice-langpack-ga-7.1.8.1-6.el9.x86_64.rpm
9dd1385b8242e4aa76fcd1b48e33179287c4e4a65c1b0ed0d740732b40209257
libreoffice-langpack-gl-7.1.8.1-6.el9.x86_64.rpm
621ff9639298753c73ba998930272f29f56a98dd609c19f707eba47717e16c86
libreoffice-langpack-gu-7.1.8.1-6.el9.x86_64.rpm
d0f588cb933f9141816eff7415851382bb9a342fe85e2ce44361d8e780161bb1
libreoffice-langpack-he-7.1.8.1-6.el9.x86_64.rpm
2ddfe27dfa4b33712c59f696fd049506ede667ebb8609c629b55b79394e4587b
libreoffice-langpack-hi-7.1.8.1-6.el9.x86_64.rpm
fd87bb4ed66dfa4dc357ed4f9047dcd815d45ab0fdd261e4247b0e5fffaae6fd
libreoffice-langpack-hr-7.1.8.1-6.el9.x86_64.rpm
728bebe6072146bca66a0b5baa55c6c57820d49a6bad1e0799f9d6a193d91008
libreoffice-langpack-hu-7.1.8.1-6.el9.x86_64.rpm
e0aa64ab9e3159852635499d90f6867b31a682987d230e3b682ae0eab073f2be
libreoffice-langpack-id-7.1.8.1-6.el9.x86_64.rpm
69ceb0792a5fde73c20e49ed94f820995c8a0c500edf3c4c406a03307f7f2ca9
libreoffice-langpack-it-7.1.8.1-6.el9.x86_64.rpm
4d3bc174cebba382c67f028aa4e0413a30c111fe8f8dc7945bf7299456d393c2
libreoffice-langpack-ja-7.1.8.1-6.el9.x86_64.rpm
517a1f048e527a08fdc368826b87e742b69bd005621d46a4095a621627378425
libreoffice-langpack-kk-7.1.8.1-6.el9.x86_64.rpm
658ce5d0e584ec5aed9d30001bfd069cbd27dfc479afe17562753758e228dd6b
libreoffice-langpack-kn-7.1.8.1-6.el9.x86_64.rpm
60823c4a18d1d1d69258f7e272fd5ac1174cad14f055f82a2c159f79e2c01134
libreoffice-langpack-ko-7.1.8.1-6.el9.x86_64.rpm
5e7bde530f962ac16a3fad48e6d15b256ff02b8ab588b2cb84721977a4550b64
libreoffice-langpack-lt-7.1.8.1-6.el9.x86_64.rpm
54603f632a1353b02ae1789754791ebdbd5c09a864c35f21a917d4e4012bc6ba
libreoffice-langpack-lv-7.1.8.1-6.el9.x86_64.rpm
b2b2911611642c6188d46efa6f0bec339f971dfaae56c2ea93af01ae91037a14
libreoffice-langpack-mai-7.1.8.1-6.el9.x86_64.rpm
831f0aa8bfb7ddf17baa957dde7d59450f640fe72963f7c5ceee4017dba991f1
libreoffice-langpack-ml-7.1.8.1-6.el9.x86_64.rpm
9e354639d38be0a3186712c233d3bcfcc85d75c995287d153a9da3c1f20f55e3
libreoffice-langpack-mr-7.1.8.1-6.el9.x86_64.rpm
f5694a5da01b8e95b2ea5aba1948a576eac12d1979530bb359a1ba2dd29c1e47
libreoffice-langpack-nb-7.1.8.1-6.el9.x86_64.rpm
6bbe09596667bac286a29bf0f0e9bf2ea25d47a9599d427109bb2460dd1bd1ad
libreoffice-langpack-nl-7.1.8.1-6.el9.x86_64.rpm
f87135d91e9dd53a735f363a3ec0dfb652549a5668cda3a2fc5c5c8f57cd9e40
libreoffice-langpack-nn-7.1.8.1-6.el9.x86_64.rpm
7d3f3fc637273aaabd8199154c0f712384e32795869da6c2eb2ca2ca6c966a90
libreoffice-langpack-nr-7.1.8.1-6.el9.x86_64.rpm
910b44b0bd09f7bbb440cae89d9f6c6f13d124f74c834471cf6e736b0cdef0d6
libreoffice-langpack-nso-7.1.8.1-6.el9.x86_64.rpm
7fa50fa5e1dc803d7b0c3c76c479ab35cd2c58d309362435c6e8af9d6575daee
libreoffice-langpack-or-7.1.8.1-6.el9.x86_64.rpm
5f681411e2ced355ee339b30954729110f969b0c2ec90112ed32e2de9e824532
libreoffice-langpack-pa-7.1.8.1-6.el9.x86_64.rpm
33ae432e3be89e6e5ce7385620f022250aa8af178b9e756cbcb0abdc471337ae
libreoffice-langpack-pl-7.1.8.1-6.el9.x86_64.rpm
8717940c047560765ba7f7009c496681a5419b406e97b959146340a35241b2d0
libreoffice-langpack-pt-BR-7.1.8.1-6.el9.x86_64.rpm
b31c178eadc65f19d5ebd069db5d0839032f1c8ee28dba6ed9f243f59ab25c25
libreoffice-langpack-pt-PT-7.1.8.1-6.el9.x86_64.rpm
e5d36e19bfd75b9de8b3593a49888bca054cfd68beeab1f86537778281299bc8
libreoffice-langpack-ro-7.1.8.1-6.el9.x86_64.rpm
ef22427ad3d6bb4e0af7ebb30655e9da297fa4bc77077bd35101f8a2b6376e9f
libreoffice-langpack-ru-7.1.8.1-6.el9.x86_64.rpm
418835ff9387af5016fa1f3bf13fd2df3d910ebd1f7345232c9d4f1398556189
libreoffice-langpack-si-7.1.8.1-6.el9.x86_64.rpm
f568aaa270d63e11061b25773fbebd324fcb8fd541a1f375a8236e6d3896518b
libreoffice-langpack-sk-7.1.8.1-6.el9.x86_64.rpm
f12b3f395047f192ad772f0232eeb6d00ddbef50b9b3dca50c2aecefba81a1ad
libreoffice-langpack-sl-7.1.8.1-6.el9.x86_64.rpm
2025309f1cdfad8a18abc2cac28f8635e22657212f192de7f2d0db59c949bbdd
libreoffice-langpack-sr-7.1.8.1-6.el9.x86_64.rpm
9c1ac6c116f82c285ec6bae5829a464bef25fed108314712652858ddfad10e54
libreoffice-langpack-ss-7.1.8.1-6.el9.x86_64.rpm
46bae487acc7fa4d053a55c22ecf81e15e0412322bb2c1eceb702edd750f20c5
libreoffice-langpack-st-7.1.8.1-6.el9.x86_64.rpm
b5d5f1570b2ee8694a7da71bc0fd878705b6e16ebd187985ef50a9c08f3596b6
libreoffice-langpack-sv-7.1.8.1-6.el9.x86_64.rpm
c64ad5867474b05781ccfa239cb156fc15934f191604af7b8a099f9f3a914b3f
libreoffice-langpack-ta-7.1.8.1-6.el9.x86_64.rpm
6d59fbf9a549c40c5edbcb0f4472116ce46c9132f399fada0491043d9bfd119b
libreoffice-langpack-te-7.1.8.1-6.el9.x86_64.rpm
f796c6ef41a8197e2a6d9792cc49ad8e34b5764611610e673489d777ba57a901
libreoffice-langpack-th-7.1.8.1-6.el9.x86_64.rpm
1a80fb4ca85c0eed58376c1e7c820c3b05495e21d8a8d2d0c38a7fa19138ec9f
libreoffice-langpack-tn-7.1.8.1-6.el9.x86_64.rpm
aad4a031191ae5ebb907dbeb573376665d0e95dcac335da556e3f04e16e86d69
libreoffice-langpack-tr-7.1.8.1-6.el9.x86_64.rpm
a0c2bfed690bd0b99feb0cb7c527b263ce6dbfed58716e9de7f0e41fdcc213cb
libreoffice-langpack-ts-7.1.8.1-6.el9.x86_64.rpm
ec3c29d113a01ad9e64d28537f21804491b510e457ae4257d7368e8c41c96cfb
libreoffice-langpack-uk-7.1.8.1-6.el9.x86_64.rpm
74d78a3b51319ee61deb0277d35890c00246718336dd979a799f4ec401983c2b
libreoffice-langpack-ve-7.1.8.1-6.el9.x86_64.rpm
4029b8a1468f4c61d69b44a0581a418ca0aa0b6d11c07307e8e32f771f49ff9a
libreoffice-langpack-xh-7.1.8.1-6.el9.x86_64.rpm
cf31bd887082862b5b48bab07638ed3b2c14c68f2659d3583d325d5f785c9c92
libreoffice-langpack-zh-Hans-7.1.8.1-6.el9.x86_64.rpm
095c5693b5464726cc0165badf93e9d8ac5bfe8825f395a9c9c3dd743d26277b
libreoffice-langpack-zh-Hant-7.1.8.1-6.el9.x86_64.rpm
3df50dc76fb1e789456c80b9011a3c848fa1d4edf2de08e6f7b9d1856641a8c9
libreoffice-langpack-zu-7.1.8.1-6.el9.x86_64.rpm
986c1eeeb3a90a5c07841f8649ac9406fa1635a79cd7953b257e120c7fb8c3d0
libreoffice-math-7.1.8.1-6.el9.x86_64.rpm
ac357ba2009c63555fe3d82caad710d7f71e8269a9857f308160bc1491fd3b22
libreoffice-ogltrans-7.1.8.1-6.el9.x86_64.rpm
67f008f13f35ae372f776e90c201dad4a0cdede159e0dcf5abcbac0d8aec88df
libreoffice-opensymbol-fonts-7.1.8.1-6.el9.noarch.rpm
4621baa5df251ff762cff293ccd830490e41d5c7c42b8863503582c2758ec4c6
libreoffice-pdfimport-7.1.8.1-6.el9.x86_64.rpm
226ce4b0a80c3adb29a2eb68c36f5178e7e81703dc615bbea950e4b1918c3e7e
libreoffice-pyuno-7.1.8.1-6.el9.x86_64.rpm
efa105ea3b7b4e4570adfb4af7f78715ba63aa6d932a0a32246af4567ccd6e38
libreoffice-ure-7.1.8.1-6.el9.x86_64.rpm
cf9edd9a291f75913182093f7cc1cdeaae60bfc0c971310e0f9d4f2ae2eaf48d
libreoffice-ure-common-7.1.8.1-6.el9.noarch.rpm
934a491fcbca660493e4accf8c6701d9a4b196eb87b101525018caa5ff072403
libreoffice-wiki-publisher-7.1.8.1-6.el9.x86_64.rpm
0f3becdef37d9ea817e274b8e0415c78ee63a7a752d70fafe55d0a7a393f72e8
libreoffice-writer-7.1.8.1-6.el9.x86_64.rpm
ecb1bb1fa9db8017b93066d65f72954e34a405fae867547a0d2b78bb3991b8cd
libreoffice-x11-7.1.8.1-6.el9.x86_64.rpm
5d462af72341b4b1943cf4d858fa50b3b2b87016f7f1ca9fd784e1a1ad422f84
libreoffice-xsltfilter-7.1.8.1-6.el9.x86_64.rpm
c7ed3a9d064e2b1e3b2e706b692d929ee0ddfaa7a89bc79335cdf02385179361
RLBA-2022:2387
new packages: ipa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.9.8-7.el9_0.x86_64.rpm
064157f54e52bc8ed4e9801720cd513cb37d979717a2848b047565fd9ffff850
ipa-client-common-4.9.8-7.el9_0.noarch.rpm
4dfb5bf45769b36fce4f8e09669a3f9fbe6020f5008e380a1c3aee525306046f
ipa-client-epn-4.9.8-7.el9_0.x86_64.rpm
2a429a5fa390e4450b3e6101779815018ff886b300c8f837d39e9a4d1560ae7e
ipa-client-samba-4.9.8-7.el9_0.x86_64.rpm
e2a3e3a775dfefa55904cadbbdbd92c6cc70f2a2db7b29e6417fcae7a63872b5
ipa-common-4.9.8-7.el9_0.noarch.rpm
0f200ff4cbe1d621cbbf9b70f2c9da4c8d1369095a4c1e717644c64c6d2e2531
ipa-selinux-4.9.8-7.el9_0.noarch.rpm
cd02228d1b0728fb76abf6f2f7800c7df8b42ac476e59217f026e75e565d5002
ipa-server-4.9.8-7.el9_0.x86_64.rpm
a3477f5f99cce887553da1ec831b1ebd7332645e13b8618afc3a0c9c49f37fe4
ipa-server-common-4.9.8-7.el9_0.noarch.rpm
b005841bc779f796c5e6d519375ea60ba58d5392978b49f89acbff738f4dfde5
ipa-server-dns-4.9.8-7.el9_0.noarch.rpm
cc3224fba9c7f0b319098b84355689aef19a73dd289fb34947d0d6c13590046e
ipa-server-trust-ad-4.9.8-7.el9_0.x86_64.rpm
ee13df015e8682de76cd61967c23dba50805978c85611228f7c4013c2cc2b753
python3-ipaclient-4.9.8-7.el9_0.noarch.rpm
b46e176028ba3d702e64c82092c2305171872e4316b7e2660c7670dd25e7d0d0
python3-ipalib-4.9.8-7.el9_0.noarch.rpm
b41b0b1850de86cdac68235a153219a5d32e1a36a7dda4ed0cea771fa99c8001
python3-ipaserver-4.9.8-7.el9_0.noarch.rpm
34feb05f48d07c29ec499a0232aae944ce9695dd7494b7cdf4dc5c99c81dc935
RLBA-2022:2388
new packages: cockpit-machines
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-machines.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-machines-263-1.el9.noarch.rpm
76b43297cfd0629d8a98282b57746a45302cba637e83177e5be74fe6967cf428
RLBA-2022:2391
new packages: seabios
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for seabios.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
seabios-1.15.0-1.el9.x86_64.rpm
3afa7612eae7daac67b321362889b1b8c1b2308b763be640c5cd0f2c63b7d381
seabios-bin-1.15.0-1.el9.noarch.rpm
2ce29727622a19d9dc205ca34516329735cbc1da8a63a9c7ae2170018fdbad42
seavgabios-bin-1.15.0-1.el9.noarch.rpm
83b78fa1dcbbcb748029259d8031010101db668e361e7ff54afd8691b061bfd8
RLBA-2022:2399
new packages: usbguard
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usbguard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
usbguard-1.0.0-10.el9.i686.rpm
1f0fa01f60da577553ffe6d5fdee2d4bc0fa205ae5eff3e759ca7e9b241d69c3
usbguard-1.0.0-10.el9.x86_64.rpm
15bfa79dd1538135ebc610560d836800941815cdf58a55e9b95af7bf873ca9e4
usbguard-dbus-1.0.0-10.el9.x86_64.rpm
4831c1c59e610fa826bd6caf3a4e0e205d5e63cee216d58f53481863e87c8991
usbguard-notifier-1.0.0-10.el9.x86_64.rpm
58b4dc28bc8812c7d5a4e0ba4b4b00dcaf627cd3293dd87e5454fc5261e10014
usbguard-selinux-1.0.0-10.el9.noarch.rpm
5d5238c15440161baa1eb227002452b2b322f4737d276414213e9be4f02283b3
usbguard-tools-1.0.0-10.el9.x86_64.rpm
cb37ca4490486970fc584cde98c7aa803eaf6d4228fab11035c3a5f0193c67dd
usbguard-1.0.0-10.el9_1.2.i686.rpm
ed1d7851cb634fe120cc8fb62b664d797203278440c07cfd8e0bb50ff3b90a5b
usbguard-1.0.0-10.el9_1.2.x86_64.rpm
237bf57bcb21ec99e0f4f605a1f685c29e8fbd52be85215c8091175a2ca2b3af
usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm
821f7cc58d4632a98a7470a2f86ebfe04c447623af52700a88c28120b955f508
usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm
ff7701135023660d1eb0217503379c5f0bceee00374f4d30c8e847ba04881248
usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm
0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5
usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm
335ecd55f5170814776f7fdcc360afc5acf61947ed0607939d25f8f34c442ad2
RLBA-2022:2401
new packages: valgrind
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for valgrind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
valgrind-3.18.1-9.el9.i686.rpm
7c89d1582c6b93f288c16d7cf8963e1aea388393d27794186d738df27dd512a7
valgrind-3.18.1-9.el9.x86_64.rpm
08d4de919154c5706e411a6ea55657b300d8bae87c51f95bc053a4c2b9f8d8a7
valgrind-devel-3.18.1-9.el9.i686.rpm
178acb51ac7028a25d2318211fa54bb4507483719d0cd27d425151d65495d84d
valgrind-devel-3.18.1-9.el9.x86_64.rpm
b0d37f0dc8d0abfabcaadc9aee410d88c31c7be28ceb9783065050a283172980
RLBA-2022:2404
new packages: lynx
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lynx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lynx-2.8.9-18.el9.x86_64.rpm
fa7d74a14ea45cc329c8c2ecaf196a5eef9226bdd1349c18b961d21cba6c286a
RLBA-2022:2405
new packages: haproxy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for haproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
haproxy-2.4.7-2.el9_0.x86_64.rpm
e7ab9af75f4ed206188b1cfd50e3e15302b37de13c9c5d347460e9d58e260a4c
RLEA-2022:2408
new packages: nbdkit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nbdkit-1.28.5-1.el9.x86_64.rpm
9f339ddd58431e7901cb6464113858b20986eb8c83f0b4a5d9d13011b6f0a54a
nbdkit-bash-completion-1.28.5-1.el9.noarch.rpm
5827ea6a46fc10ff351c79e65ec71fb52c3eb20b5bdeb5874d5d10e7978b819f
nbdkit-basic-filters-1.28.5-1.el9.x86_64.rpm
c3c998d545f9c8a90d7ed8b6c872c11ef36cb7f8c2efdb3685173fd39b9a4c8a
nbdkit-basic-plugins-1.28.5-1.el9.x86_64.rpm
c42e0b8d06c126a3fde6a7091adf534cfce52be7bdc8cec4b077380114b4628c
nbdkit-curl-plugin-1.28.5-1.el9.x86_64.rpm
cfe2788c5734208fdd16384feffedd14c51ece3c21d0aff60863ef29fbdc9d69
nbdkit-gzip-filter-1.28.5-1.el9.x86_64.rpm
7523f5b6fcb1e286bf77ab4bc7a65ee1f665535170ca10aa8d536efaf3ebf88b
nbdkit-linuxdisk-plugin-1.28.5-1.el9.x86_64.rpm
eaadb711920cb05259566055d30c4bb4119da26776529da68f6c1615aa517254
nbdkit-nbd-plugin-1.28.5-1.el9.x86_64.rpm
ad141dc7e18a422b6ee3f3d1780f956d89d1b03c2c5b4aa6b34565b238edc65c
nbdkit-python-plugin-1.28.5-1.el9.x86_64.rpm
be2686898cda64357743a6982c9aca7e3a8cc158c4aaefc7ed16307a1a6a4308
nbdkit-server-1.28.5-1.el9.x86_64.rpm
8373724692ebd884a67d85f01501c76abfb57907ab35da7073571fa718abb359
nbdkit-ssh-plugin-1.28.5-1.el9.x86_64.rpm
ff087ce777fbf994e4d6797c444d0009ee2f485c45582bd3101e31e1e8e3189d
nbdkit-tar-filter-1.28.5-1.el9.x86_64.rpm
04c0cf48548ff11155fd5a06a487a8cc0cf95ec85c11fc097bcb2c7dbb93e8de
nbdkit-tmpdisk-plugin-1.28.5-1.el9.x86_64.rpm
716c451ed530450dcdf38cce95039d796a03732e7a05aa097d42774c58550a1b
nbdkit-vddk-plugin-1.28.5-1.el9.x86_64.rpm
64fb7d671d973fd11cbdddf7eecef664f250dcec53e592f410594e330575c1d4
nbdkit-xz-filter-1.28.5-1.el9.x86_64.rpm
b3122cb2eaea9ccf6c79cd96fffc6923fc69eef0b6184e95b61f217b48406af9
RLEA-2022:2409
new packages: libnbd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnbd-1.10.5-1.el9.i686.rpm
60af025b6a6588a55e5dfec8205b153346a304207d8b4c0f1aeca22f953656ee
libnbd-1.10.5-1.el9.x86_64.rpm
8f4f47ccc708b67fc28bb521e2262748e3ed1e449da1dfaeeff67fd3daf3e89f
libnbd-bash-completion-1.10.5-1.el9.noarch.rpm
c7fe4a5b092b93306e05c5011801a00874bfc8253a557b60d866fe0cbb6e9c3b
nbdfuse-1.10.5-1.el9.x86_64.rpm
9d889f7342d711b3747454e13a258f332520bbab4dad66330dc442553f7c8346
python3-libnbd-1.10.5-1.el9.x86_64.rpm
baa5cbf78d1e63f1e451d438f38b04d9f66d0ce55c662b6e831d47e9b3311eef
RLBA-2022:2414
new packages: xorg-x11-server
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-10.el9.x86_64.rpm
ff087d657b6fd11f330bf8d9f7235b9877ede80bcc96ef4c84e409dd1e768758
xorg-x11-server-Xdmx-1.20.11-10.el9.x86_64.rpm
55b93fa4d8728a42fc7e509fe2e672bfd54daae609e721b18f8dc90e2e50cddb
xorg-x11-server-Xephyr-1.20.11-10.el9.x86_64.rpm
b5bf597499a37ffc489131503af10875b34f6c528a37b8c5b3000179741b932a
xorg-x11-server-Xnest-1.20.11-10.el9.x86_64.rpm
43bf5701d115cd64851241588adc9aa3c673871430d205fe96a64c8b83e71db4
xorg-x11-server-Xorg-1.20.11-10.el9.x86_64.rpm
e3c4494c99488218402756592efe5b9e47a30e937bb6d75c00a989f321cde652
xorg-x11-server-Xvfb-1.20.11-10.el9.x86_64.rpm
9d622d4d0b4f4ae2f1d6747f6aca11069afe7d9f7436c5d12245a9ee3c54e36d
RLBA-2022:2417
new packages: mptcpd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mptcpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mptcpd-0.8-2.el9.i686.rpm
d5a8b337e3303bc2ec0859fc83363179ea137ea99a552b7370c8467b0cc1d4d3
mptcpd-0.8-2.el9.x86_64.rpm
118605ca362e9ab8d66f325e5a1129ff93ee52a46c13eade4f746da75ba6c920
RLBA-2022:2419
new packages: bpftrace
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bpftrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bpftrace-0.12.1-8.el9.x86_64.rpm
bb8221fc3b4adfa43bcece0af8e9da9415bfca2f5ad79fde5d08aa622522effa
RLBA-2022:2428
new packages: gdb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdb-10.2-9.el9.x86_64.rpm
e13c0f364fa4b20a6b00f17398137a979b09ca372e285c7231c90406546128b7
gdb-doc-10.2-9.el9.noarch.rpm
8b2e74ef52f17acb9c719005837cb5c5a82bd6441dc8b19e20ba0ad920ebf187
gdb-gdbserver-10.2-9.el9.x86_64.rpm
a961ed196ee3a8c9726b9d3db114cc1ab5f7f86f0ea5996d5828567913a69bfa
gdb-headless-10.2-9.el9.x86_64.rpm
ba2509591d3b70078e5ba6e86ebd162a170c2003e847dab8d4b7d217a6750dfe
gdb-minimal-10.2-9.el9.x86_64.rpm
f64d2805920615e14c0124b155fd27052166e28c178fdb2d18372289e2dbf141
RLBA-2022:2430
new packages: redis
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.6-1.el9.x86_64.rpm
b1c9f25e50779e9f8d2c8d0f1e2d70d3c5e76316b04512020016751420e8a5cf
redis-devel-6.2.6-1.el9.x86_64.rpm
27443313b7959f81ada2aaeb1cda961dda290d8ae75a6da02a83fbdcbb68be5c
redis-doc-6.2.6-1.el9.noarch.rpm
e83c5f22219443df4af5bc8de8fc9dc65c0f9d44d3d12564a54c0b45c5e8823c
RLBA-2022:2431
new packages: sevctl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sevctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sevctl-0.2.0-4.el9.x86_64.rpm
31912b8d80024104fddfd1daa036e64ae3699e3db2ef45c81de355d5f1f04315
RLBA-2022:2434
new packages: ansible-pcp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-pcp-2.2.2-2.el9.noarch.rpm
26304fd87a2c8e572a2a1eaaa218ccbd3dd9b717aa5a780cd6b82378e5cff81f
RLEA-2022:2435
new packages: libtpms
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtpms.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtpms-0.9.1-0.20211126git1ff6fe1f43.el9.i686.rpm
32e33f27cd1da423a7a0c36a0e7b937f150a50f530694e36ba2a0ec7d0648c90
libtpms-0.9.1-0.20211126git1ff6fe1f43.el9.x86_64.rpm
4e70709249f45b15d5806cfef879855bc5bb21a44bdcc814add65d3a0ef8e6b8
RLEA-2022:2436
new packages: swtpm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for swtpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
swtpm-0.7.0-1.20211109gitb79fd91.el9.x86_64.rpm
e3446191249d328900a2da418d68e6038496b7e82720cbe563677b4ec0e3f8e7
swtpm-libs-0.7.0-1.20211109gitb79fd91.el9.x86_64.rpm
e3d347a26824428fd9bc1bd8b7e1bcf5cd07a78f97a9293125ccac7e9f5de8c3
swtpm-tools-0.7.0-1.20211109gitb79fd91.el9.x86_64.rpm
971faee2e93abd38d824c59e62e20f03b61f64af87d03b63f12896551b7ece07
RLBA-2022:2437
new packages: ipa-healthcheck
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa-healthcheck.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-healthcheck-0.9-3.el9.noarch.rpm
e6531afd26f8654bdf69be1022e141d61f525138b4eec25ba968fcafbab04d43
ipa-healthcheck-core-0.9-3.el9.noarch.rpm
7a02988ca3ece3aec2cd1b421e21333895ce3aa45d900768ef32f3ba946c2f9a
RLBA-2022:2439
new packages: grafana-pcp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-3.2.0-2.el9_0.x86_64.rpm
0ea7f3d6245ffa12218cf12a7257185a82d7dc05fefc3648ba430eb92b993f75
RLBA-2022:2440
new packages: qatlib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qatlib-21.11.0-1.el9.x86_64.rpm
99c935aff377b74c1a6c8407137676dcb335676b4da9facb3bf9c39a2963da7c
RLBA-2022:2442
new packages: llvm-toolset
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for compiler-rt, lld, llvm, llvm-toolset, clang, libomp, python-lit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clang-13.0.1-1.el9.i686.rpm
a9aa4f3062a11267da9d9886007e24bce65d196340f7747db8132518139e1870
clang-13.0.1-1.el9.x86_64.rpm
321a6f8f3fbd5c54220fa3db846eb7c9d504252ff750b767d4f4707b5a4a582f
clang-analyzer-13.0.1-1.el9.noarch.rpm
5d5c36589d9ce32ccdc59c563f867ae09486c178dbc077a7fc367fe219a58417
clang-devel-13.0.1-1.el9.i686.rpm
3f5d40165d697b95ee431c58b73ba2ac6a2646d7dde59808af8ae1039d52cb21
clang-devel-13.0.1-1.el9.x86_64.rpm
d8fe3fc48863b1c258a95585acc92222e5c03c768804f6d31017e0cdcf628670
clang-libs-13.0.1-1.el9.i686.rpm
77d5ff82dccf89bb0efa47dfe920e1c6b039885b1e212026dc427a459df64197
clang-libs-13.0.1-1.el9.x86_64.rpm
6a0fe8c23cc9fd87da059c93419d270b9b3486343efd8a2ee8468502657be571
clang-resource-filesystem-13.0.1-1.el9.i686.rpm
830e21787599469909cb78864247a9156602410523453e8e8c9eb3671d347963
clang-resource-filesystem-13.0.1-1.el9.x86_64.rpm
04c8e69dbdb75319819c033209ecef645248eadce4ca4141c9c4806c16c0cafa
clang-tools-extra-13.0.1-1.el9.i686.rpm
210e042a7f7b0d772df47cbdfd89d493867bae780b00f27e9d7fb6c8abb7705c
clang-tools-extra-13.0.1-1.el9.x86_64.rpm
cbef86cc317f855db9de67e2d758237318ea9a1de0c17c1cac04a84690a3f0af
compiler-rt-13.0.1-1.el9.x86_64.rpm
6276d4bfeb7f7ed7bcb81f72849c096d7e7587b10e289663811631992aafd04e
git-clang-format-13.0.1-1.el9.x86_64.rpm
be27ed77d9382264a2890ee9138bd3f27e3708e113c373f36fc996c2a3164121
libomp-13.0.1-1.el9.x86_64.rpm
6c005c136a0c9b3d7feb61a8cbf10d56407ad83afc823378d773b9d8bb2952b8
libomp-devel-13.0.1-1.el9.i686.rpm
16bda9808820bf9325eeae636fa37004056915efb4f259ddb47feaf0d138d284
libomp-devel-13.0.1-1.el9.x86_64.rpm
a244250af8533a5229c55e34dbe48210b81d80f671f8ec693eb5b3ce5ec2eb32
libomp-test-13.0.1-1.el9.x86_64.rpm
f2e5e82446a7c2bbdb16988a6f661098d0d641f3d29b9df17ba9613da712330b
lld-13.0.1-1.el9.i686.rpm
b085f8e6960db7795de04f147063f4aa6c622fdd884943eb9e1954dd1e6a1a32
lld-13.0.1-1.el9.x86_64.rpm
2e9237a7908d756f1fd59e1a2309e591ce005eb29cadcdec3d679bdbafa60b5a
lld-devel-13.0.1-1.el9.i686.rpm
fc39aaac9d2706d6ac3f958161aad15c93b7cb31a65dc287500474a3e4fec443
lld-devel-13.0.1-1.el9.x86_64.rpm
520c49c5fd76f06e34ef4e248a17d27543c774a8a2ce87d871f8145f778d7d64
lld-libs-13.0.1-1.el9.i686.rpm
643c0d0d55b0343786f1c7fd6a7a9fad976b5c7431bbe3eaf0357603da69a694
lld-libs-13.0.1-1.el9.x86_64.rpm
2921a29e2f7bc4c4dfcd13d9e447570ee2e2c383ba8aeea0aefde8c753f68226
lld-test-13.0.1-1.el9.x86_64.rpm
48971201d29d92c05ab4b2b8ea1e516a6508179bee7cc6b24dd758f8affcfa8a
llvm-13.0.1-1.el9.i686.rpm
0b82202cdf1359d973c79a5cbdf7ff89ae4ee7fdcb40933b8d141bb624cfdf60
llvm-13.0.1-1.el9.x86_64.rpm
35b477b8090cf4cc69c2d139efdf897bdfbdb9f4fcc30e71f0a784716651a5cb
llvm-devel-13.0.1-1.el9.i686.rpm
863d92eccebd49ced9cc72f32d343553e90604bcd2ca974e29a8f8d1e31eed4a
llvm-devel-13.0.1-1.el9.x86_64.rpm
b4eac3b2988ee28df374321b2fff7c4b1e54767e546d075668738bddc2c1e930
llvm-doc-13.0.1-1.el9.noarch.rpm
b5a7c69c3080fb4c445f4dadc02b5a15fefa03ad7273c302eee0daa56edf5f56
llvm-googletest-13.0.1-1.el9.x86_64.rpm
1dfe43eea1e6629ae34dd44de5a84cd76b7058ca66c5c3fd80179116af2b6246
llvm-libs-13.0.1-1.el9.i686.rpm
1c00efccaf508b91725d4ea0248ae22ce727c496dfb8c4356e0908f754b414bc
llvm-libs-13.0.1-1.el9.x86_64.rpm
c7cd1112e69a6e93c111e23a786145d3e3ef1a08954001ed01d10ef024919fa3
llvm-static-13.0.1-1.el9.i686.rpm
9dd8ec2ce3e81a78f840e8dd8a6c49bd10736502cb8e3b688d2861d3dd81b5e7
llvm-static-13.0.1-1.el9.x86_64.rpm
85123e77cce258618f2a9b65c0804d4223793245d8ff416c9184dc3eacc5f75a
llvm-test-13.0.1-1.el9.i686.rpm
2de42ce4cea68bb97c7d6dad0db47670ccf96138255b2d4434568d0dc5e6dab1
llvm-test-13.0.1-1.el9.x86_64.rpm
2abd6858fcb09a7b5372c53942ffea3e2506dc559c40d452066bd82bf70d67bd
llvm-toolset-13.0.1-1.el9.x86_64.rpm
48429ffd1b074b7359cf38ba9a85e4616f84206fe90c9fdd4d755a8c71d31fbb
python3-clang-13.0.1-1.el9.x86_64.rpm
7dd13fe753c326d7131ce7baea21fd4964fecf53774100d333e881b03854d00e
python3-lit-13.0.1-1.el9.noarch.rpm
68567a9ff6601338e1904044611d5a26dcf4dc428c190cfdd0a91596377d19be
RLBA-2022:2448
new packages: fontconfig
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fontconfig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fontconfig-2.13.94-2.el9.i686.rpm
0f3f5a399f518bd107a5ef1b50a2c68b4046241f685feefdce40b4e867fe4e72
fontconfig-2.13.94-2.el9.x86_64.rpm
5654a435ea3af695337d57eb85ec5c043102dca5d240f2f0dd7a5a434a78376f
fontconfig-devel-2.13.94-2.el9.i686.rpm
ee8d1ed4c35df3c11f167e2dd5f9b2e182ea22107897cbf36428dac3b29dbd99
fontconfig-devel-2.13.94-2.el9.x86_64.rpm
3d8726efeb8f87a696a8e1c229b947f21aa77e1a061abe6976f747c729de5bd3
RLBA-2022:2451
new packages: clevis
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clevis-18-102.el9.x86_64.rpm
3eb7e23cf42c5bbae1e34dd0f89577d2b0c2b9109591e8389b124a5675240937
clevis-dracut-18-102.el9.x86_64.rpm
fd55104597dd35ee13235a9d801f538310e7cb4dc0346c6ffe784a5e577ef582
clevis-luks-18-102.el9.x86_64.rpm
0f61aefeebbeaf59d54578b777c153f400217c86e9c253c49651664b1dfc6c54
clevis-systemd-18-102.el9.x86_64.rpm
8a8efbc2ecf0dbc4f188daa7da9f853cf1f1dbf6f45bcd5015ad1ad71a68feb4
clevis-udisks2-18-102.el9.x86_64.rpm
c5863d8920c34bbd44c18316d38f60bbeeddd79a8ad457de89e18d2893fc657d
RLBA-2022:2454
new packages: golang
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
delve-1.7.3-1.el9.x86_64.rpm
f202dc653c36d5fdf64ff74d157f117d288df5803228298d23a420f25de5b054
RLBA-2022:2459
new packages: hyperv-daemons
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyperv-daemons-0-0.39.20190303git.el9.x86_64.rpm
df44648cf108def658e4d20cd7c73994829da8d654c6321c05654b743b701d2f
hyperv-daemons-license-0-0.39.20190303git.el9.noarch.rpm
950bab98545678f95b2ee398b1bbf9657674ee3fe9a2117c744ab4bca0dfddc1
hypervfcopyd-0-0.39.20190303git.el9.x86_64.rpm
8e721855a5c25e0a6fd510a833bf9019f8d35874b098682cda246c08887356f5
hypervkvpd-0-0.39.20190303git.el9.x86_64.rpm
d1db645a8251d6f6eb777cc2f974f82ceb255a8812a02a609a7ce4ff580ade93
hyperv-tools-0-0.39.20190303git.el9.noarch.rpm
6140f0dfe367b635c986b7bfec0e89a33b2ddeb0492f3d1864c1617ef13d5586
hypervvssd-0-0.39.20190303git.el9.x86_64.rpm
d7875a6ec1ed034a815357614e3d74dff76b9bf5eed125c7f51cb69456ee2b60
RLBA-2022:2461
new packages: guestfs-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for guestfs-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
guestfs-tools-1.46.1-6.el9.x86_64.rpm
56e9b3394563a250e7e1cceadf578dbb6b4a189bd96630523862a391349fa6cf
virt-win-reg-1.46.1-6.el9.noarch.rpm
a324a40c942eab1fe578ebc4f3f7dc0b0c196f8ccb0764c327582fd0e07d11bc
RLBA-2022:2469
new packages: redhat-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redhat-display-fonts-4.0.1-3.el9.noarch.rpm
0198394746c5525afc05985a3498309e12d956ce9ef9bf365c2ea459765b94e8
redhat-mono-fonts-4.0.1-3.el9.noarch.rpm
5a8055188f1a751b3a6f5bfd476cadcb89ce921bfb6e7568186e81b055df9944
redhat-text-fonts-4.0.1-3.el9.noarch.rpm
f496a4aac0e95a46ab995f263c9d467b87e28cfb0f82432bcd246a83556f10c4
RLBA-2022:2471
new packages: corosync
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for corosync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
corosynclib-3.1.5-3.el9.i686.rpm
cc89f457fcc4b12aa73f8bdd10b16ff98f8ef6a1542dd40444d9e6e0b545ed52
corosynclib-3.1.5-3.el9.x86_64.rpm
9d7ed8f9093bbb9e424a62964878704dad94a5f6e923411e310ac7f4a07e8a0a
RLBA-2022:2472
new packages: gjs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gjs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gjs-1.68.5-1.el9.i686.rpm
4ca883796facd23ed447a2c793e392619700fefabc0d7fabbde6f170ee571002
gjs-1.68.5-1.el9.x86_64.rpm
6650f702e7c8a160dd5a6a1fb3d736487a6fcd468b1f4498c32a6599d12c7840
RLBA-2022:2473
new packages: qatengine
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatengine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qatengine-0.6.10-1.el9.x86_64.rpm
69a257dfb16c2ab45aa58200b32e3f6aab44cd2d45c60cafc608d73be5aa196e
RLBA-2022:2475
new packages: smc-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
smc-tools-1.6.1-1.el9.i686.rpm
9abc5088ab86c49bf0b51a0aa67713830c62d77e163ff27799c6abf87ee5806b
smc-tools-1.6.1-1.el9.x86_64.rpm
f8c3b4d81e70955cbdbee1e6a4eef1b8f7fc82f8efcfb4a2c486d0de6e6d85cd
RLBA-2022:2478
new packages: certmonger
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for certmonger.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
certmonger-0.79.14-5.el9.x86_64.rpm
7c90bd2abf582d671002019418dc79027dc3bbd41835bcbe42433a0dbcfb3186
RLBA-2022:2479
new packages: crash
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-8.0.0-6.el9.x86_64.rpm
f3bb07903e3581e754d5b4dfca0587a1aa02f0f42d9ec267dcdb61037b5ae8c6
RLBA-2022:2483
new packages: tracker
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracker.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtracker-sparql-3.1.2-2.el9.i686.rpm
01f9b6d31b71e5ee49dcaa417c5d064677cb8b95614a9dcd23112b1a32fe1f04
libtracker-sparql-3.1.2-2.el9.x86_64.rpm
25d736820737acd2bb13d0225b7bfab998029c9b9d4880480808fb11c210af2d
tracker-3.1.2-2.el9.x86_64.rpm
845e97eb687ec2dde26aaaf3194f1f85d08053e0b7e921c61f5966b0d0bef5ec
RLBA-2022:2485
new packages: oscap-anaconda-addon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oscap-anaconda-addon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oscap-anaconda-addon-2.0.0-8.el9.noarch.rpm
d96d32f160022009b320557a214fc42eed59977dbd73e0d1e6c495529fcaf758
RLBA-2022:2487
new packages: tigervnc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.11.0-21.el9.x86_64.rpm
e98618acc92cb6cfa196bac843a20c94833f54015bb556074eb850b5e8ffa936
tigervnc-icons-1.11.0-21.el9.noarch.rpm
97da95f0a0f599c21c5b41c3b4550ddd809ff21e497cbc469d405d6d11fe5145
tigervnc-license-1.11.0-21.el9.noarch.rpm
7c78a77ef258979b2dbfac72318cad55dedcca3b13a803a372e20efff1e3f965
tigervnc-selinux-1.11.0-21.el9.noarch.rpm
8ab19ebb0a7a4c0011ba6972e4a7040f0aa7c4baae378c61e9447fb882b8acfb
tigervnc-server-1.11.0-21.el9.x86_64.rpm
28315bd30e1f00cda19815fda6e6b32f28195f10ed31a706b061b82d143c53a5
tigervnc-server-minimal-1.11.0-21.el9.x86_64.rpm
fe870c77e1396950176c6dcc9aaab95f21e2478b7d2a5a30520152da959b6d5e
tigervnc-server-module-1.11.0-21.el9.x86_64.rpm
6571a6db56b76f5a4081ddfc80058b4353a4758763709dc6758084410f030d23
RLBA-2022:2488
new packages: supermin
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for supermin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
supermin-5.2.1-7.el9.x86_64.rpm
741b3e47002640e79b01b14025d1c2dc5dc78c328c1db72cb53494294db51bfa
RLBA-2022:2489
new packages: cyrus-imapd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cyrus-imapd-3.4.1-6.el9.x86_64.rpm
49ac6145e28b385631a049afb61685c6786593eaa703400ecfaa3b0c20a0a123
cyrus-imapd-libs-3.4.1-6.el9.i686.rpm
86ff3f86e3dc2f9c86981853258da25e344a7bbec02d4fae7a878bf2d52c8411
cyrus-imapd-libs-3.4.1-6.el9.x86_64.rpm
6557a991dda2f0dff77a7fafe6527cb060ea34168c3f6ba03edadabb1dc23ef4
cyrus-imapd-utils-3.4.1-6.el9.x86_64.rpm
e401e69c05ad3d14af86f5cab211bafb432372b6507a072a190300a46e83bd8c
perl-Cyrus-3.4.1-6.el9.x86_64.rpm
a1a1a38cf34882462c2fc47bbaec405657fb9e553929d645108679e14095e6c4
RLBA-2022:2494
new packages: python-blivet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-blivet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
blivet-data-3.4.0-13.el9_0.noarch.rpm
c240179a9d18de08d4767703e1b71a721e92a242318fe864ebfd56b62b7b4aec
python3-blivet-3.4.0-13.el9_0.noarch.rpm
0ccb335fb4745624a9d2fbca11145584c92dcf411a60139530d1a10fe54ae13d
RLBA-2022:2497
new packages: ldns
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ldns-1.7.1-10.el9.i686.rpm
30e2554ab7b01a58527e6ec10e6acbed1202c39f038917fc3128aa03b363653d
ldns-1.7.1-10.el9.x86_64.rpm
0803c29f61bd5404f816b71207649f1d42014536563718c47e6c55719d7da3a3
RLBA-2022:2498
new packages: realtime-tests
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-tests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
realtime-tests-2.3-3.el9.x86_64.rpm
ff544a00fefb914644104cf78ee3931a183a6e8c5fe7a7fac718e2ce4a82da59
RLBA-2022:2501
new packages: bind-dyndb-ldap
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind-dyndb-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-dyndb-ldap-11.9-7.el9.x86_64.rpm
6273ca331bb38e654d5e31500685dba1cc42326ae1900cc5e4e94937e295d8fc
RLBA-2022:2503
new packages: libblockdev
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblockdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblockdev-2.25-11.el9.i686.rpm
2b551d8ecc92262133aff4ebe42dda0dea6af6ba50eaf79011b92f7ad48a00aa
libblockdev-2.25-11.el9.x86_64.rpm
42faab6d85c6b038f291b990cf7bec07da4880b25aa85c1f2bd6215df02ca98a
libblockdev-crypto-2.25-11.el9.i686.rpm
e670e854ca3aea3287e7f45dab7e930170c19ea3bd28437934a7310fcc2a45ef
libblockdev-crypto-2.25-11.el9.x86_64.rpm
6111fb907a1412702ac2106a8af845f33b64c019a21c74fbca7b7683c9f3abdc
libblockdev-dm-2.25-11.el9.i686.rpm
bd5f09c4dd0eb8afd755a94f9bf2972ba00ed8ef196105562a0be4e417c9d130
libblockdev-dm-2.25-11.el9.x86_64.rpm
e3420e6bfb65c756cc16923c5d09299bd76b2adead7c0ccfa9317a2d8d3de7b0
libblockdev-fs-2.25-11.el9.i686.rpm
2e20f7dc10a99509b1b4a1a682d86c5d8f746f997ba7965603fa765cc471e621
libblockdev-fs-2.25-11.el9.x86_64.rpm
3ccc27e3c270d8aa00215a9a7818216e791aafe162b90eba0b13e1656faccf13
libblockdev-kbd-2.25-11.el9.i686.rpm
63c0df2c2d0dff8187163b092d8adbcc3a3b9e693782668d31d3a0e0c64210a6
libblockdev-kbd-2.25-11.el9.x86_64.rpm
561c339b3a20b618118a1070c0476cb34df91b67bcf392e59ba9bc126547142f
libblockdev-loop-2.25-11.el9.i686.rpm
c431cbef7f4de840ee26215a0c7862fc624f95483b4a0db2b1f6c943f877777f
libblockdev-loop-2.25-11.el9.x86_64.rpm
a19049d15770aebee51ee2b7851bd8f90b9465ff71f1b1376bfea5b68a76b757
libblockdev-lvm-2.25-11.el9.i686.rpm
a309392127066b4c62127375bb3561087f3b1fc162a87bb20a0bad1bc1f421be
libblockdev-lvm-2.25-11.el9.x86_64.rpm
ae33a88fdb89c057a826943797e1602e7552e095b3cb0deb8613c76c1f99d718
libblockdev-lvm-dbus-2.25-11.el9.i686.rpm
4b928da1561707ede581ddb1af5616482b2506ff5993a46c52cb86cdd68a91a6
libblockdev-lvm-dbus-2.25-11.el9.x86_64.rpm
f418c864f2a8e0e4cc4aed5b7dd5386e5a5030c83e6a133973d805e6c69549aa
libblockdev-mdraid-2.25-11.el9.i686.rpm
f24447054f1c809590ea6e99ce83fb0b8048a4a204350bab2d6ebffec3cc636b
libblockdev-mdraid-2.25-11.el9.x86_64.rpm
d0f0ed42e515c8f79b4b10b46ee5343111fd0d5bfb61a70b0782cfbf444165c0
libblockdev-mpath-2.25-11.el9.i686.rpm
dc90a386eb132ad2e4c5643542baece380aad1e89a9808ca5a2f57e04ded27d7
libblockdev-mpath-2.25-11.el9.x86_64.rpm
a0056cfe8ff073edef7288d2303fecdebdd1c61341923fb4b5fd7227acfb7a08
libblockdev-nvdimm-2.25-11.el9.i686.rpm
0bf602e340ff01a2e81d3d1e43e85f7989bf4748e5d2344e48d48c4a656c1af2
libblockdev-nvdimm-2.25-11.el9.x86_64.rpm
337b990532a29784c353a4356da134b62e057220536d3616c6a38d943c2f3012
libblockdev-part-2.25-11.el9.i686.rpm
b888242f02fe3b01efdf0e4469ccd6ad0ee0ffdd31bf3a0dd9a64c069469d7b7
libblockdev-part-2.25-11.el9.x86_64.rpm
75434a7667f3b9820e8347ff2fbdf6299a0d6087166dba8961500f991ed05976
libblockdev-plugins-all-2.25-11.el9.x86_64.rpm
3b70d5a5d514edfaaa2ad7442b2c3c20770a78d7d5465aaca42a3d80cf725340
libblockdev-swap-2.25-11.el9.i686.rpm
44bf462ada1d29cd508a6589511984bc48bf60ae403da5d925e52547d195acc7
libblockdev-swap-2.25-11.el9.x86_64.rpm
f40ab383b611fb6c9fcd4cb901c240f831603d90a103358c83d0976f606c3814
libblockdev-tools-2.25-11.el9.x86_64.rpm
fc7149bc52f6f09a9fe5eba450167dcb92e55a69776aafd54773c54ffe77fd5f
libblockdev-utils-2.25-11.el9.i686.rpm
8098971c68dfbc05e11b5fc7429684ea99c815798fca2be1762116e61c34e1ec
libblockdev-utils-2.25-11.el9.x86_64.rpm
ccb07f76f06a76d8f50436cfc23863270d0520d53537ff7d0d4df9cd2cf640e2
python3-blockdev-2.25-11.el9.x86_64.rpm
a21a37fa6fb2c544ddc76b083660087e7468c0b1853702830e55fd0654bdbb2f
RLEA-2022:2505
new packages: rpm-ostree
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpm-ostree-2022.2-2.el9.x86_64.rpm
063038ac1e0554dc6f8a265ce1ffaed706e5da4308122369a1ed16a8ef483090
rpm-ostree-libs-2022.2-2.el9.i686.rpm
a64018b8615f35f6c2d47d441705ba82d45e5ddbf7f56848a62c86753a9dd8e3
rpm-ostree-libs-2022.2-2.el9.x86_64.rpm
4e937ce30eeb0ab84d987ffe5c30d3e8d6ddfc292a4e7f5d1f04228cd58b610d
RLEA-2022:2507
new packages: dpdk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dpdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dpdk-21.11-1.el9_0.x86_64.rpm
93db3afecd7ad4307af5dd85319849e902d57a872ec152f8fbaaf9145e9f6d9e
dpdk-doc-21.11-1.el9_0.noarch.rpm
1f2c143993d26b0cec3b6782d2b55193f8641977bbe934537f0ef4ae7ec3fd0f
dpdk-tools-21.11-1.el9_0.x86_64.rpm
b7d94034b13bd8377000490c9a562e937b129186a842f3024f3106b66604e18f
RLBA-2022:2515
new packages: virt-manager
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-manager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-install-3.2.0-14.el9.noarch.rpm
75c38a59eca492e0522496e3d36b5727573cfdcfcf805123dd51484685ca867f
virt-manager-3.2.0-14.el9.noarch.rpm
31c3cb7ee4b3131fbb5ca05b65ad759659c2a6133ec6ced23e1826f9e60d7bcc
virt-manager-common-3.2.0-14.el9.noarch.rpm
c7e89f6dc5914afca0534c3f80c995f4f37b46c61f37b2f4f57940d5267938d0
RLBA-2022:2523
new packages: cockpit-composer
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-composer-36-1.el9_0.noarch.rpm
d029c246364f8b4a504f34eda89f5c451eb89261431b6782215085c437f1b76c
RLBA-2022:2526
new packages: qt5-qtserialbus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtserialbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtserialbus-5.15.2-8.el9.i686.rpm
c35c3fe3f4718ed18e029243ddb45a5e9291ab525766a16b78b2a5265d68d8c5
qt5-qtserialbus-5.15.2-8.el9.x86_64.rpm
f3297b0052a6c8a64a55ceaf6182504035cdfc2a2ba61d3ef3eeea9b41c2d0e2
qt5-qtserialbus-devel-5.15.2-8.el9.i686.rpm
6185daa443baf08b3d983208e402484ea503aeab1f02dd2a2b219e2be471211b
qt5-qtserialbus-devel-5.15.2-8.el9.x86_64.rpm
bf1e7c6b7d74222ef5bb3b5ad5fb9e6c1fa7b12a00556d1ba3257265cf58100d
qt5-qtserialbus-examples-5.15.2-8.el9.x86_64.rpm
ac32368237cb546edda833fe5bcd7f73418493b8ad0c14db905ab978f8d76637
RLBA-2022:2527
new packages: qt5-qttools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-assistant-5.15.2-11.el9.x86_64.rpm
de3f795dddd66b6bcc24c494ba5d1cc4fd3a88375bea8bcb157f1a619b9b305e
qt5-designer-5.15.2-11.el9.x86_64.rpm
9e08ac0ccd55b431f6db90018f891c509d1123a0bfbad2860b42df962fccd9db
qt5-doctools-5.15.2-11.el9.x86_64.rpm
a21f5529afac405f454bd59056f96340be8745e0db66437aad08bfaba78d6192
qt5-linguist-5.15.2-11.el9.x86_64.rpm
83d6ef800f157c7cfc69b4dde9f982a2daf0615bd7fcecfaed971d11ba4541df
qt5-qdbusviewer-5.15.2-11.el9.x86_64.rpm
3f5e7b0be174d02a9a789482252f244664679a2be8d6b015fde956aecef164c5
qt5-qttools-5.15.2-11.el9.x86_64.rpm
1cd9e630af0c01b3226ed0b0ab0616cd231947b51da5dcd910c26413045b0bbe
qt5-qttools-common-5.15.2-11.el9.noarch.rpm
6c845125311b10007f4c66aeddbab364bc930ff87f15302cc396c52819c6c2f0
qt5-qttools-devel-5.15.2-11.el9.i686.rpm
06a2cf3d259344be8826b8b6efe9a6ee8a0c44dbd40d1e78f45a96d34ee849a1
qt5-qttools-devel-5.15.2-11.el9.x86_64.rpm
3dfa41b59571e6a474dca4456c41cf14594084c82acc7122292839222e288652
qt5-qttools-examples-5.15.2-11.el9.i686.rpm
82763623819dc091cdecfa2309feef329bd8d34c64833b0f926b4d43550a114f
qt5-qttools-examples-5.15.2-11.el9.x86_64.rpm
7a53a1f9c6e9e68aa37d0b922308621e6db85604a7c8931f98f47ad95818de92
qt5-qttools-libs-designer-5.15.2-11.el9.i686.rpm
e966bdce17159fca4dfc310a91315ce50b8e4c491dd2a3bf8dd487feafe26b7b
qt5-qttools-libs-designer-5.15.2-11.el9.x86_64.rpm
2be69a26a92a9d440742ab8135245c069046c11894f37127e52f24f7324fd7f1
qt5-qttools-libs-designercomponents-5.15.2-11.el9.i686.rpm
299c5d256026b4efaa74cb9c16b846f18b1040ba88660049ea4482725cb6b056
qt5-qttools-libs-designercomponents-5.15.2-11.el9.x86_64.rpm
f7597ae5983323994b84552756ad4723dd0c6e899046eb4bfb16f5e6e334edf5
qt5-qttools-libs-help-5.15.2-11.el9.i686.rpm
d317ff76da508f7e13e8cf612d9a9e277e41088243a5c8e58539ec80ae675ee1
qt5-qttools-libs-help-5.15.2-11.el9.x86_64.rpm
5cc6716643a775939e4e3bc50fdf390803c68892472ecf3fe6c8641a2dab17bf
RLBA-2022:2535
new packages: nautilus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nautilus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nautilus-40.2-7.el9_0.x86_64.rpm
22df9a3eed85563ad0ff215702a33f864a395bc866894c7756a001d831ac42ba
nautilus-extensions-40.2-7.el9_0.i686.rpm
be0f14fed044e390ab4eab7d361efcf33f779e36df859ee95b58510bc01ed333
nautilus-extensions-40.2-7.el9_0.x86_64.rpm
b4a9df03069ba3a8243bb84dcc8e41424e8641e355d0a21d1976850f3c3a83db
RLBA-2022:2538
new packages: alsa-lib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-lib-1.2.6.1-3.el9.i686.rpm
68c55cb132e6e72ff7fac79cd081bf06c0a03bc2e66cf7ede743a972792e02a6
alsa-lib-1.2.6.1-3.el9.x86_64.rpm
fe4abb8bd85807440be17e45bda52b62ed4eacc78f1d08c48e499788425e6845
alsa-lib-devel-1.2.6.1-3.el9.i686.rpm
fffd6ea738b077eae1a9328e05ffea51196c6266d11030a7c66457fe98f7114a
alsa-lib-devel-1.2.6.1-3.el9.x86_64.rpm
5104a42e9ba462fede89682167286697815770906c20d3493e1552700305a979
alsa-ucm-1.2.6.1-3.el9.noarch.rpm
8feedd4e68c468d46e6ae2070fdd0a834d2a6cd66f00e16dc5cbb2aa9d28b134
RLBA-2022:2541
new packages: nispor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nispor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nispor-1.2.3-1.el9.i686.rpm
28e89eae1316c92535940c2e7690d00057814e850c1d854e81a1f8eb698f5df5
nispor-1.2.3-1.el9.x86_64.rpm
8328174fc34cbfa5b06c3510988fd7098ab985319555688c9a6f877441e50e8f
python3-nispor-1.2.3-1.el9.noarch.rpm
7646fb16d9a9ae058bb75fd6ddb6dd48d8ef67961dde3cba7fa7222e09a3826d
RLBA-2022:2542
new packages: usbredir
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usbredir.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
usbredir-0.12.0-2.el9.i686.rpm
eb3851d1cdf83f5c05689421765ceaaa3a2b39a8ee648dd949170a179e8f27e7
usbredir-0.12.0-2.el9.x86_64.rpm
401cb6ebe40d2ce5de6ebeb1c36d7d72584e1b433e3aa5f1cdab5cb7f8c09863
RLBA-2022:2544
new packages: redhat-rpm-config
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-rpm-config.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redhat-rpm-config-194-1.el9.noarch.rpm
eeb729c6d59b314b65de0adbfd1992e270783501635b471885d9d805aba8e859
RLBA-2022:2548
new packages: stalld
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stalld-1.15-1.el9.x86_64.rpm
c54f9380b073f1623aa0930584d0fed7a04c84c9fb205089bb2d3f6c60bde255
RLBA-2022:2552
new packages: memstrack
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for memstrack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
memstrack-0.2.3-2.el9.x86_64.rpm
7abc18d65269a514de9ff2b00a41037d63441b2f429cf47a76329402a2014890
RLBA-2022:2553
new packages: libqb
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libqb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libqb-2.0.3-10.el9.i686.rpm
04dd996bc306903647735bcae889b274b1908ceb2be28446fedc1937c5eb5608
libqb-2.0.3-10.el9.x86_64.rpm
4ba23fad606a9a3e9a4d59cdccbfb5f6ced85c323edea5d53f519a5bcc6f2903
RLBA-2022:2557
new packages: esc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for esc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
esc-1.1.2-15.el9.x86_64.rpm
1ab3453d72472ed475a12aa4300356bf0392e9f8307a5ef121906143d8d59cc1
RLEA-2022:2559
new packages: alsa-sof-firmware
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-sof-firmware-1.9.3-2.el9.noarch.rpm
0d7acd2e6cb3eac1c8bcaaa0ab967d06cfd717f71f2e306a51a998ac923d4d53
RLBA-2022:2560
new packages: osinfo-db
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
osinfo-db-20211216-1.el9.noarch.rpm
2d8b5056f999119410dc8363b9780f4b1edb4787325abb1257dff4568287a3e8
RLBA-2022:2561
new packages: xorg-x11-server-Xwayland
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-21.1.3-2.el9.x86_64.rpm
74d92ec1bfcd341d877fbd8497f89217cece2000618cf995785419c2df5aa048
RLBA-2022:2565
new packages: augeas
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
augeas-1.13.0-1.el9.x86_64.rpm
3c9752777183f683dd34f5f81d790d8e40cb04e313641f7ab4a31df2d5b6502b
augeas-libs-1.13.0-1.el9.i686.rpm
2c37570f86ccf0ecf434c61dbe6c24accc7df178d06655e4cd55015b4ed15c39
augeas-libs-1.13.0-1.el9.x86_64.rpm
138ed9c3c3a2f92c1f3a9910b459e0b10116e37ff08348dc2a794a79ba20e969
RLEA-2022:2568
new packages: xdp-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxdp-1.2.3-1.el9.i686.rpm
34b4338c330afd0b3cb65bd69528a6f8dbb1fb29e1cd7c85a4e4d40ff1ed9c29
libxdp-1.2.3-1.el9.x86_64.rpm
de8313f3924b79863da3b4ff85842c20ddfafa9840f64dc399c30b2aed21bd46
xdp-tools-1.2.3-1.el9.x86_64.rpm
faec536489ff079bf278f7eb570c9d014815418984f6a6a819cfb75bced2815a
RLBA-2022:2574
new packages: mesa
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mesa-dri-drivers-21.3.4-2.el9.i686.rpm
84feec3d754c42ffed453ddf7c6ed36cf62cf8e934e82d691e3ae0623dfb03c1
mesa-dri-drivers-21.3.4-2.el9.x86_64.rpm
5fcfed11f50800b810ef10b77d4413f63c24d3583ce4a103d7fbc553bd91edd2
mesa-filesystem-21.3.4-2.el9.i686.rpm
1a4fe71e376451cc90dde24c8f8ea25f34cc389b8b9bde106fe2a999fc3012a5
mesa-filesystem-21.3.4-2.el9.x86_64.rpm
1cb79e50963326b8c3df4be31d93a99a398ffa486194e9871bfbff5d9687656a
mesa-libEGL-21.3.4-2.el9.i686.rpm
69d5f5554d621b30921a13618b0fe123aff0c586bd891a18829ae28f37f92890
mesa-libEGL-21.3.4-2.el9.x86_64.rpm
73c69ece723cc42267a367f45557530218f055c81cf524b308c00a2b0441de28
mesa-libEGL-devel-21.3.4-2.el9.i686.rpm
60a308d1457a87b3cada796d9d617f2b6fa9f67fca3241f819f5dc867ea3632b
mesa-libEGL-devel-21.3.4-2.el9.x86_64.rpm
9c6046ec6c4984970c241cb8d8102011acd258c68e7fef9ca5bacf0d1f2b2bd8
mesa-libgbm-21.3.4-2.el9.i686.rpm
a4fd1c718fc305227518724629757831273a88e6fe6c0fc435cb52c67b93f422
mesa-libgbm-21.3.4-2.el9.x86_64.rpm
4d6bcbd5aa89d8552345df009d5fbc4a6e564317c5ed7bf2c875ac67a32c40cc
mesa-libGL-21.3.4-2.el9.i686.rpm
2fb17e64f65c742a9625e0f5d23765499debbe3e1f1daea31220356caaa3c9f0
mesa-libGL-21.3.4-2.el9.x86_64.rpm
d28865556d5ecd2d1001e38fd6aa9db7a495c250346d34ddcefbcb74a96f0a9d
mesa-libglapi-21.3.4-2.el9.i686.rpm
97d8172eba5ee79892849e3ec050f541e35bb15e0d155392506b0d3ca16ee27b
mesa-libglapi-21.3.4-2.el9.x86_64.rpm
1eefe74e455b78cfcbc62e2f53864519415841cc0493a1da879d01443a6b83e3
mesa-libGL-devel-21.3.4-2.el9.i686.rpm
898da6a44235a9b9f03c00a5b16971d9ebc91641b7a56883d35c101cc81aaea0
mesa-libGL-devel-21.3.4-2.el9.x86_64.rpm
f098a74f01e060c2a358b938900594f719c6bd5f233b05c48c673344bee1df83
mesa-libxatracker-21.3.4-2.el9.i686.rpm
0d32802100ba29346e4dcf514ac3f414a7bead8d3ae69af7b4a60e7f7baf43b9
mesa-libxatracker-21.3.4-2.el9.x86_64.rpm
ad760c3484e3b072c794979af3e6fa20c7f1265ee731f4822b6246c33adb0861
mesa-vulkan-drivers-21.3.4-2.el9.i686.rpm
50b445a24d033388f94ffd539eab6a5520263e8720cc40a37010b52e34233fb7
mesa-vulkan-drivers-21.3.4-2.el9.x86_64.rpm
9bbf921af94271a13179cab4aa095a9cd2d905abd01accffc508ef20d2532b87
RLBA-2022:2577
new packages: stress-ng
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stress-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stress-ng-0.13.10-1.el9.x86_64.rpm
3c432b2c0af4477bc2098629cf0a0576b6fa756344aba8f9dc12ee6db47a2f83
RLBA-2022:2583
new packages: ignition
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ignition.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ignition-2.13.0-1.el9.x86_64.rpm
f37c57d59739a7ab9a4ecf570d16ae96a32654285f35360ccaec6736126136d7
RLBA-2022:2584
new packages: ansible-collection-redhat-Rocky Linux_mgmt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-redhat-rhel_mgmt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-collection-redhat-rhel_mgmt-1.0.0-2.el9.noarch.rpm
1bb72cf17539dded72900e2ab528da2ee6c0fb923c4a5a37470ea79529e977d2
RLBA-2022:2591
new packages: setroubleshoot
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setroubleshoot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setroubleshoot-3.3.28-3.el9_0.x86_64.rpm
f23bfc920a70c85832a8b32ddacbc6930690c38724864f5b68c855638d431e09
setroubleshoot-server-3.3.28-3.el9_0.x86_64.rpm
82d6acd48eb5645003212df8e558ec89af21fe12ec35684e292a1043d0ff0136
RLBA-2022:2592
new packages: perl-Net-SSLeay
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Net-SSLeay.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Net-SSLeay-1.92-1.el9.x86_64.rpm
2f4435b5c9df8182d5dd6248cd89c5fb89318ba94f6a377ee79af0dd256abdfc
RLBA-2022:2596
new packages: egl-wayland
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
egl-wayland-1.1.9-1.el9.i686.rpm
440a707648620cebed48c548df00473a3ca499b0c3f6c1a4ae38659195a1ab8f
egl-wayland-1.1.9-1.el9.x86_64.rpm
9a544041acfa7c6fa7a9885966285be125060f9ed042fe49651bf3882525f048
RLBA-2022:2598
new packages: postfix
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postfix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postfix-3.5.9-18.el9.x86_64.rpm
5ec9fad8d0b0315299db53dd9e5981a13915abb9b89eb6d2376e1ad5d2675407
postfix-cdb-3.5.9-18.el9.x86_64.rpm
ebd0c6cf4d4b622f67039e31c8c4d2f52c9c741a14de5ec6b48b3661dd5c52fa
postfix-ldap-3.5.9-18.el9.x86_64.rpm
f0acf2775bc045371b3a732565bec108eca1e1b18a1da99af0b4332bc8de34ee
postfix-mysql-3.5.9-18.el9.x86_64.rpm
64c5189857f82e88a5f522ee5ff435e323f8187b811f657f6ac9fafe16da33c9
postfix-pcre-3.5.9-18.el9.x86_64.rpm
4f1071f005345d7457a9ff79fe85be786b33266af8cf784e9715e84b2c6369bf
postfix-perl-scripts-3.5.9-18.el9.x86_64.rpm
1d32a0c8e0314dc9fd8f60848671d9f77b5c80adc1ccf73b450f51419a4588d5
postfix-pgsql-3.5.9-18.el9.x86_64.rpm
75752782be3574d3cfd5f461d20f149e2f6341a335e7d124c2a060e9170779af
postfix-sqlite-3.5.9-18.el9.x86_64.rpm
ab77ef1d3b16a9105c1871a7df4758d94dae125cd47a0354ea14092e1fe22445
RLBA-2022:2621
new packages: tftp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tftp-5.2-35.el9.x86_64.rpm
c0dcb00d07f8019b98a18a719104e4aa25ac3523181315f74adb81108b975276
tftp-server-5.2-35.el9.x86_64.rpm
9e8ab4b8ca4ced37ca542e07715185dc09b63b98397f0b4d04f45898bbf2a8d0
RLBA-2022:2602
new packages: qgnomeplatform
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qgnomeplatform.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qgnomeplatform-0.8.4-1.el9.i686.rpm
8b817ee12392c86440e39b44d6bedd581ef7bdcc9b9b4cc77774d8eb30eddd5d
qgnomeplatform-0.8.4-1.el9.x86_64.rpm
0d0e67cc2842e7d45b7f64022fc5015adfb157851339a0a443c1c14a8c234f14
RLBA-2022:2619
new packages: mutt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mutt-2.1.5-1.el9.x86_64.rpm
39a3c573e3f1c3d82fe843c08e324b43e30d6b8f456d6b2ae7c8bd3de5f2f6b8
RLBA-2022:2622
new packages: oddjob
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oddjob.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oddjob-0.34.7-5.el9.x86_64.rpm
48c4168eb48f6407a28fccffe5ecf4c2ec6bd9ed67279d08e82e550d8742d8ad
oddjob-mkhomedir-0.34.7-5.el9.x86_64.rpm
702691bb177dc90e65e44ee13e142b59313757b46de84914389f8facac403427
RLBA-2022:2630
new packages: unbound
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-unbound-1.13.1-13.el9_0.x86_64.rpm
6d2a6439a88f4120d24d8c76e66dabf87ab4f1eeba61ad057cc033f8c04408ee
unbound-1.13.1-13.el9_0.x86_64.rpm
3fc26b5a4504907846cc867a41d53ce7fc86be57403b58e1415c7694eabea5c1
unbound-libs-1.13.1-13.el9_0.i686.rpm
923c321919b1152b098b381cbfef76fa3e018828c6625f7329e6067fce5d73bb
unbound-libs-1.13.1-13.el9_0.x86_64.rpm
bf93c93b92bfe9dcbf7a2f6589dfbb6be6ddf464871127b4bac59bee5db16231
RLBA-2022:2633
new packages: xdg-desktop-portal
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-1.12.1-1.el9.x86_64.rpm
bbdf8a0586d19b8e64c4fc7c396b62071df6179c7f1eb1c72ade57c3c6140e4f
RLBA-2022:2634
new packages: xdg-desktop-portal-gtk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal-gtk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-gtk-1.12.0-1.el9.x86_64.rpm
5c517247f96cba729a872a6c7ec87947bbaa6dee1fda5d78c9c67d263375e4ea
RLBA-2022:2641
new packages: mod_wsgi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_wsgi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-mod_wsgi-4.7.1-9.el9.x86_64.rpm
f2fcdd4b7df3aeada2c5be32c19b2c79aaf3f1ca571c1d5f8823f041b55882d1
RLBA-2022:2645
new packages: insights-client
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for insights-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
insights-client-3.1.7-6.el9_0.noarch.rpm
e714f7ba36dcf3a66617da4df104b9aa866f3109eb866f6abafb093f23c0e4ca
RLBA-2022:2653
new packages: libva
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libva.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libva-2.11.0-4.el9.i686.rpm
8cdda606c8a2472cc18c2124713a7c17b244d10d56589fde1dd8fcc7aae617ae
libva-2.11.0-4.el9.x86_64.rpm
94b4532377b9f6eaaccbcdf9e85490e2f1399182de72cc68d025ce9946d1fae7
libva-devel-2.11.0-4.el9.i686.rpm
28d4bd364287344404b81a16022449fec125f244b0cdcb48c7aeb883ac573e87
libva-devel-2.11.0-4.el9.x86_64.rpm
26ea6b26d9be53b3005d6697d4684c363f9497e3ff92636c69a6cc097ba1d569
RLBA-2022:2656
new packages: dovecot
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dovecot-2.3.16-3.el9.x86_64.rpm
2c39b06a722d87d0262a19a7b5d72ec98bc4b0ab48cbe2960c765750693a8194
dovecot-mysql-2.3.16-3.el9.x86_64.rpm
820f838180757f9cc0b5f2adc64f176abb447de9d234679870686d72f134ee8a
dovecot-pgsql-2.3.16-3.el9.x86_64.rpm
a4d3d949a8430b9e49070439eb631c1b8c43575a7e36d2aeae1864058a499eaa
dovecot-pigeonhole-2.3.16-3.el9.x86_64.rpm
80b8e921a4ff9587540944b37cc6b1841262713093780f4a748f6a759212eccf
RLEA-2022:2665
new packages: libmypaint
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmypaint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmypaint-1.6.1-7.el9.i686.rpm
51cad28a7f1142e61ac6337f0bc6bc0dc0c8476939f2ca1bbdf1acc907f9632c
libmypaint-1.6.1-7.el9.x86_64.rpm
23c0f7144d499cbc64e419f15ac14cee29235dc1442229729baee9f275c623e1
RLBA-2022:2671
new packages: network-manager-applet
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
network-manager-applet-1.24.0-2.el9.x86_64.rpm
3349688bd0bf2e67a21fc1cdcacbafea60121491e05405ab51366a6e610820c0
nm-connection-editor-1.24.0-2.el9.x86_64.rpm
f60aede93f5db1d749f5382ec9d9ecddda5fbab4419a59a8744c50144de6f4ad
RLBA-2022:2672
new packages: varnish
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-2.el9.i686.rpm
5f61249518cca85e1848f0a73957bb62424b37d02193a68df9977c95cb122d72
varnish-6.6.2-2.el9.x86_64.rpm
c21c7a8a12d314a74ab5d6700cffb9baf51dc783a40afbf251cd5062c86c6d52
varnish-docs-6.6.2-2.el9.x86_64.rpm
3f22aa3c71466e1c8a0e1c56a88f3cb77d6051bc1908511a1ca07ca2c8c42f2b
varnish-6.6.2-2.el9_1.1.i686.rpm
c068a1f9d3a1c249487d18db2f18b2012bc8c6cd9b8ee37e136cdbf6469b5d9a
varnish-6.6.2-2.el9_1.1.x86_64.rpm
e59a3aff50bf54c2855693ea6a88f52aadd286ab784af4b9c19258dcdaef326d
varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm
1f4218dfac56d7056b83497444bf39bd2dd07bceade816145460324491df49da
RLBA-2022:2674
new packages: pykickstart
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pykickstart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pykickstart-3.32.5-1.el9.noarch.rpm
20d37d564f5a63e2deaa7735eba47249f52e9560b62b92c5ca7b9aabcd2beccd
python3-kickstart-3.32.5-1.el9.noarch.rpm
038133617d4bbc31ad6667cdd1276d65ef2ec6b86d1e7e0308d694774059bfbd
RLBA-2022:2677
new packages: motif
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for motif.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
motif-2.3.4-25.el9.i686.rpm
e730cbb22299ea8b2a69b524348bb5ff453e35a364da0791f48afa38e8046683
motif-2.3.4-25.el9.x86_64.rpm
2e4342237857e7ed8e223f55c634e62e3c2360b0e18410755a4796b1ec8750bb
motif-devel-2.3.4-25.el9.i686.rpm
b8d52d9cf34809c78530d8723828969a7de0cf1b5fecb5f9c3f2f5221bd1829d
motif-devel-2.3.4-25.el9.x86_64.rpm
b2f6cc3c61b4d09dd8fccfd6c5255dea58c1ee1b9bbb723b09dc0bedf152927a
RLBA-2022:2683
new packages: gnome-tour
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-tour.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-tour-40.1-1.el9.x86_64.rpm
06f94affc6d53fa83634c6690388bcb4c0af60341c9e8b1b7a61fa6ccc6b495b
RLBA-2022:2689
new packages: dnsmasq
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnsmasq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dnsmasq-2.85-3.el9.x86_64.rpm
9cd7f1bf95adb17d0981b56172040969babfe679da55e2078c82e24a911c5b68
dnsmasq-utils-2.85-3.el9.x86_64.rpm
7ec6533072bdf856b9badfbbf8047e4592bbee880c92347268cf12f4e5448db2
RLBA-2022:2691
new packages: rear
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rear-2.6-11.el9.x86_64.rpm
4e1c0b9922c743806075c151db4a8bc5fe0e9bbf9f68fdf2b3264f22d6208852
RLBA-2022:2692
new packages: rasdaemon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rasdaemon-0.6.7-5.el9_0.x86_64.rpm
f8b23bf7c7c2624090e96a2739569dbab5920c5c3e22cbd6166829afcb39caf8
RLEA-2022:2693
new packages: mozilla-filesystem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mozilla-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mozilla-filesystem-1.9-29.el9.x86_64.rpm
13a83690c79366d0be7f19950202584af1dcf9188b745aaa80839023a33618cb
RLBA-2022:2699
new packages: console-login-helper-messages
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for console-login-helper-messages.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
console-login-helper-messages-0.21.2-3.el9.noarch.rpm
8cc20a47e156e173ec29c1961ba706927405b2ae0a2e0ee2e988635e142e0d17
console-login-helper-messages-issuegen-0.21.2-3.el9.noarch.rpm
5e920565c8ddb65c92f3104d18a181dd6d4e4f59a956357db159148a19ed47a8
console-login-helper-messages-motdgen-0.21.2-3.el9.noarch.rpm
2ffdfd0a2c3221f3cdee6a0f225b5ed65087d2286ff4f7e2d6e2fac4525c888f
console-login-helper-messages-profile-0.21.2-3.el9.noarch.rpm
a9372e6b88b92ac1703350564644a9e1c07b2b80f32937361a75af7cb002a087
RLBA-2022:2700
new packages: rust-bootupd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bootupd-0.2.6-1.el9.x86_64.rpm
c711fe1a3725b4cf498e6eb70aae414ac11dc164d617dcd2971f3aed066dbcc1
RLBA-2022:2702
new packages: rust-afterburn
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
afterburn-5.2.0-2.el9_0.x86_64.rpm
3199a7a2992c5ee0129910f4a7c21a1adb8ef77a27a83e58d76d165622cb04d1
afterburn-dracut-5.2.0-2.el9_0.x86_64.rpm
95a5a48d567ac96fae5eac6620b6257241d74a2597a5b9773e046c5d3b852f5a
RLEA-2022:2703
new packages: mingw-qemu-ga-win
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qemu-ga-win-103.0.0-1.el9_0.noarch.rpm
924c3fcabc171a637960cabe083154fc9b2cb02a6a586c9391779bddc1a71adb
RLBA-2022:2704
new packages: gimp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-2.99.8-2.el9_0.1.x86_64.rpm
839f14b0950bb008a4c630ab49c639a294ec3a6b73cb9f4edf4988a0be82a42a
gimp-libs-2.99.8-2.el9_0.1.i686.rpm
ad7ddd7ff2363468f9db699fa8afe530c92b670793599601b3a63080213b6e56
gimp-libs-2.99.8-2.el9_0.1.x86_64.rpm
0be43df5794b7032c36f0ed4b4e1b4e98c2f773bfbca053ee00c111e2e81c0f3
RLBA-2022:2723
new packages: anthy-unicode
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anthy-unicode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anthy-unicode-1.0.0.20201109-7.el9.i686.rpm
63ebaafffbaddc07ee93c18b122903e0a9c1419dffb04e24e7bb6830f3d3453a
anthy-unicode-1.0.0.20201109-7.el9.x86_64.rpm
f02b92a00830c45624ced8ff53a7960aa46625d831b596603ebac8425e69006c
RLBA-2022:2744
new packages: babl
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for babl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
babl-0.1.86-3.el9.i686.rpm
a42a8eb1dd6685f8e3305c2c93d6fc341b481c649d09772613854c30521ba03d
babl-0.1.86-3.el9.x86_64.rpm
625371a5108ab431475637aa21d20f09752c86aa7c0a925b40584d7c225b2ea6
RLBA-2022:2746
new packages: bcel
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bcel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bcel-6.4.1-8.el9.noarch.rpm
2beeaa1796a81016404a30f1cea2bac39ecb3cd3cfc90f40c5e979c35435b9ce
RLBA-2022:2752
new packages: boost
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boost.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
boost-1.75.0-6.el9.i686.rpm
6e56f78751301d5d3e05a32fc04a87661dc441dc90c294ff6c56e086546e9c19
boost-1.75.0-6.el9.x86_64.rpm
c980fd99d6755fa033e45454fbe8111b00ac00fdc437eb4e071aa92a43fa3098
boost-atomic-1.75.0-6.el9.i686.rpm
942b1ad050d6b2c3ad373e291b28eaf182c32a97f955b67f323e049c3ad968d7
boost-atomic-1.75.0-6.el9.x86_64.rpm
4372ac3d5a355c212358b9345d90ddaad6896bac8cdb9234e934247031f740c4
boost-chrono-1.75.0-6.el9.i686.rpm
da77c3f2f8b21070e8cfa67fab344f2bbeda7deec6ade9248a0bcc202007a25d
boost-chrono-1.75.0-6.el9.x86_64.rpm
2c26ea8079bda4a745cbad97ee87b2882a03297d0b01266fc06494c3a4876a8a
boost-container-1.75.0-6.el9.i686.rpm
de90bc4c9e6b4a20149dc145757178ddc4e68d9f3f6795eb23ee8bbcbe4ab559
boost-container-1.75.0-6.el9.x86_64.rpm
bb7d7f527256fe4c8d93ae80d47d7a793309177e2eb3e52741e299c802bcef72
boost-context-1.75.0-6.el9.i686.rpm
1cadaf79589f8fc577dc0193451719f4699eb329382939dcf00e56d3ca78e7d7
boost-context-1.75.0-6.el9.x86_64.rpm
e0bcc5077175e2d7077c20866e9c8b065c08d1f55788c4c32de21a5e3262b6f5
boost-contract-1.75.0-6.el9.i686.rpm
88204396fd106b0d027a099a6830d329f95db73218ca7113fa3bf2b4518f1e4e
boost-contract-1.75.0-6.el9.x86_64.rpm
21b24563f15737dbb5497ca5e572de9c51483c90ae11963a5cd4b8ea0af68587
boost-coroutine-1.75.0-6.el9.i686.rpm
975606fe17d7d1584d0bc67e5468f250cdcba95b1f2ad5143544231ae77ca6ff
boost-coroutine-1.75.0-6.el9.x86_64.rpm
12012fe3b323dab4f683f503e08fca1193bee9cf5ad6fcc9924d5d028c6dae6d
boost-date-time-1.75.0-6.el9.i686.rpm
bf6159298bc1e8625a85dfc87f57ebcc2f49c7dd727b71bdf4bb0c098ecbc097
boost-date-time-1.75.0-6.el9.x86_64.rpm
18ddbc20be8652d959ce5d1f06d0c645b75c34c09bb8aba7a9b6bb32c2fd1bc1
boost-devel-1.75.0-6.el9.i686.rpm
adb2759b0ff9ef10745e8eebc89be48eeadf147e7dfe1936f2807c48b21594bc
boost-devel-1.75.0-6.el9.x86_64.rpm
b14adc76c98872dedcd96cfccad972a6fe5a9c5db334ee9267e2090063251715
boost-fiber-1.75.0-6.el9.i686.rpm
2ee59f3cc0c8440a63b2f9703716dfb9d45a653594487a429566b86badc59972
boost-fiber-1.75.0-6.el9.x86_64.rpm
b0878675b810a788a1c34c07d49c8bbe49b7c0d1d02f5288643d7c4305f3c491
boost-filesystem-1.75.0-6.el9.i686.rpm
bcdb37bdb6c84f9dec7e4b3a764630247bcfe6b9919449812cd2ca42cf8f0369
boost-filesystem-1.75.0-6.el9.x86_64.rpm
4fe4177f0f3f2bd3bf50c3161056823f57788ac9186ba50099df8019f9ebdf3a
boost-graph-1.75.0-6.el9.i686.rpm
a46c27a1d0192f07340664b6f611017293d99e165e9c2ea5fb783068e26442cc
boost-graph-1.75.0-6.el9.x86_64.rpm
7f28d3b2cc3f7c66e3a37111324bfb877ce42fcdd08ae0e87b0ef3c33d75496b
boost-iostreams-1.75.0-6.el9.i686.rpm
f401d094dce5a23b10b389145e4778c5a1f7bd5e58fc1dc5e7116ab7e6b0613e
boost-iostreams-1.75.0-6.el9.x86_64.rpm
8e9d08ce0594d78c8e6eefc6b6de258250273b5dcede7e199b8a9c7ac3fe0fb0
boost-json-1.75.0-6.el9.i686.rpm
ea92a58225f8279bf974034b2d285128097419ccc3d3e1436af8d1938f1b8e86
boost-json-1.75.0-6.el9.x86_64.rpm
d67e8476feef99fa5ee178784ed8418f411836f4ed9e8badbf3390a8f9ecaa79
boost-locale-1.75.0-6.el9.i686.rpm
0b14314f95172551cb4d81912e9f427a92f59696ebe10cc8b52b30c59cccd8f2
boost-locale-1.75.0-6.el9.x86_64.rpm
8f1f9467ddc9f49321e645acd6c31b4eb930bead9bd78420afa7352c61b90b8a
boost-log-1.75.0-6.el9.i686.rpm
51650e509a12487a63783fc895b060d9541b55a6b00f6c1d6474a22397639b98
boost-log-1.75.0-6.el9.x86_64.rpm
1212dd390ddaf727e2faeb3b145ab59db1ee57832310665b578daf42434784f7
boost-math-1.75.0-6.el9.i686.rpm
1e12e807ee744d5d329dc9061385271060484c23b361a91d557bf25b466fb6ab
boost-math-1.75.0-6.el9.x86_64.rpm
d336f6077834cade56425cc9f04909d8d82bcd0d77d74f47b38301fa121000e7
boost-nowide-1.75.0-6.el9.i686.rpm
b645d74a06a61958d679f691ca2eee91dde4cd6d24ce0429a111b64f7d96b9bb
boost-nowide-1.75.0-6.el9.x86_64.rpm
312db07b99e0ad39438e54e111005c478abdedb21ed564d1cc206164c43b27f1
boost-numpy3-1.75.0-6.el9.i686.rpm
3fae4b78690e67e1cf1c395dc9e72c7af67af710f77e5c5a5e610087f4d988e3
boost-numpy3-1.75.0-6.el9.x86_64.rpm
a832772d13a38a30ea84b1d7cfb57dc5ec33fb0dc6edcdca6c26a22c81fe0c75
boost-program-options-1.75.0-6.el9.i686.rpm
dfc5156b7f70d2a97f1078bf83909488e5d9e7d5a0103c55e2a5d58aa00cb16d
boost-program-options-1.75.0-6.el9.x86_64.rpm
df80db04ccfd08c74981997300540572feb9d79f0affa0b69db4f6a632c56c80
boost-python3-1.75.0-6.el9.i686.rpm
9f2258bb03cbf98b30500e0bcec29fb65f2692d6694d2e8827ba78f1e5f8130b
boost-python3-1.75.0-6.el9.x86_64.rpm
dbe9985e8e7433d20e7e57fc1a77d0c17501a98b7ee1c0e76a0667a89c42b7ee
boost-random-1.75.0-6.el9.i686.rpm
2089d93beb204560e84a0af7f43caeb3b65574089b4158f73fc621481c6229e0
boost-random-1.75.0-6.el9.x86_64.rpm
99aad0758f7f84eb8e009eba615ad162d5e7e7af1095fedeebb81cb5ebea117c
boost-regex-1.75.0-6.el9.i686.rpm
8c362939a95c67bfcac6e185718397a939d4aeaa1044ce2e9924ac6440680e2d
boost-regex-1.75.0-6.el9.x86_64.rpm
f58b5ae42ff2300ee3679819d77d65cacf838a25661e37e9768e769e7188ac18
boost-serialization-1.75.0-6.el9.i686.rpm
e3f5f34e5798b47da17db457e95e8103f011a0483db39146b09bd46fbb739c6b
boost-serialization-1.75.0-6.el9.x86_64.rpm
5adea712f121e760b4ec9e2ef335083adb2ef9d12331dc0b6a2283986d0fb903
boost-stacktrace-1.75.0-6.el9.i686.rpm
91463c0afbbaa34a3c088709b837279a5829bc14e1b2bb2a7352fdcbf0aa696e
boost-stacktrace-1.75.0-6.el9.x86_64.rpm
5ae12107e09f9633df90a93a993365ba0c34203f1d859e1b1445063584e5198a
boost-system-1.75.0-6.el9.i686.rpm
ec27cbc95ba8a046223aa76c221075fc10b6ef9e92863c37270e71d28777fddc
boost-system-1.75.0-6.el9.x86_64.rpm
032af5ac0b10bd82ac1333fa9f3d22757d8bb3979526e65c82049a084eddce66
boost-test-1.75.0-6.el9.i686.rpm
822d3add8a3d05d794b37a66112aa49712cfc9fa2cfde7c3e4f15c2c1f033226
boost-test-1.75.0-6.el9.x86_64.rpm
b0934c46c347f905ef9d26cd00febc3b91b1e2b680915d06fe144ccc1d8b494f
boost-thread-1.75.0-6.el9.i686.rpm
f2fe8c442bbed5e90a75c28dc166f6de8767b67453f958a4d8cb1a205c1f8b78
boost-thread-1.75.0-6.el9.x86_64.rpm
89a7082a9cff82d5c258e52f50147b3a4b420e4309973f64c7d8a3b776ae0ddf
boost-timer-1.75.0-6.el9.i686.rpm
0ec6f66a2afc4963c1e7b3503ff95efdab555f895125b4bc39936894e8822612
boost-timer-1.75.0-6.el9.x86_64.rpm
4950d0ac1601c6b6734048c892c66771bfb841b5cfe6beb9809d9f44858367e2
boost-type_erasure-1.75.0-6.el9.i686.rpm
08ccccd31d1f8414bde69a90dcfc50a83f0bc039205aeea2fd8320b5a0727012
boost-type_erasure-1.75.0-6.el9.x86_64.rpm
0d0a34110e0f172c1d127c23daa2f90520f092437d98f1a7e7dc7d5cb5112d2e
boost-wave-1.75.0-6.el9.i686.rpm
533371fc30083f17816410a252a180d32ccf37bbf2109f48fdd41a0a400e75a2
boost-wave-1.75.0-6.el9.x86_64.rpm
f4b0508f404566a66345dd49ea2cec48221aa23cf2b75e5ea55b502fb6c9701f
RLBA-2022:2781
new packages: cscope
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cscope.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cscope-15.9-12.el9.x86_64.rpm
51ad3702bee812e55ac45b81fadd1e556403da6909e3699214e5c3bb7a1a423b
RLBA-2022:2790
new packages: desktop-file-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for desktop-file-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
desktop-file-utils-0.26-5.el9.x86_64.rpm
2527ab023f1abd2db88be111c1c12ab6effd2ff13f8a0500afd8dd4ca9e68417
RLBA-2022:2813
new packages: flatpak-xdg-utils
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak-xdg-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-spawn-1.0.4-5.el9.x86_64.rpm
e8346e79f2804834a559ff287316d8f5981d2bbf6af0670943cbfe90cef9632e
flatpak-xdg-utils-1.0.4-5.el9.x86_64.rpm
0f99f80eb29a29a4e076dd67af43272727885a729304dabfd99e2cb812db1eda
RLBA-2022:2821
new packages: fribidi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fribidi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fribidi-1.0.10-6.el9.i686.rpm
470f9fb6538f895de18ac1b386a9c347202ef13187273e9ee723fc604d0dfdb8
fribidi-1.0.10-6.el9.x86_64.rpm
640aa214f7bd93f0ea9cab7799625b93063afdea7d31e5a273f7000079b11785
fribidi-devel-1.0.10-6.el9.i686.rpm
6da7294235ce8a2552eb86eeeb50500428bd2167f21c78eef825aab26bdf5e54
fribidi-devel-1.0.10-6.el9.x86_64.rpm
973e3989e7142e902cefc81d71f40ec76386056d2dc62dd3e2c99b9d99001fb3
fribidi-1.0.10-6.el9.2.i686.rpm
34e056cbd3e37b9cbd1da8430012d747b45d0eceaf9648f2cb507c6527a1539c
fribidi-1.0.10-6.el9.2.x86_64.rpm
da453272ba50af82b42370ab516b4de94977072a4069f657c84e5c357d572bc5
fribidi-devel-1.0.10-6.el9.2.i686.rpm
223dcd2aea91860af3b6e68ec99631a3bce23a1c4c752296e6dc2af0b3f16870
fribidi-devel-1.0.10-6.el9.2.x86_64.rpm
4a6b9992cc89bc774d8141080df63af1516eefcdfe6450ec85da36fd47e3e51f
RLBA-2022:2859
new packages: gnome-screenshot
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-screenshot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-screenshot-40.0-3.el9.x86_64.rpm
bf864fe21fb68bc41623afa5e2c3c642981e619b0ca3129960d77bcf2df8ece3
RLBA-2022:2860
new packages: gnome-system-monitor
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-system-monitor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-system-monitor-40.1-2.el9.x86_64.rpm
d322b6ab3bab57ff10b6a42cb70e7ce798599c148e9cb376bebadd92a3ce84bf
RLBA-2022:2862
new packages: gnome-tweaks
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-tweaks.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-tweaks-40.0-6.el9.noarch.rpm
6b77b7e1bb0b491b113ad40afd62501acab1c36b7dcab4a052a6585ad9ac73ed
RLBA-2022:2890
new packages: gvfs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gvfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gvfs-1.48.1-3.el9.x86_64.rpm
192e140c7aee453c738bc63706d6b0e84d9a615e85fd497e36369b01aeae9fbb
gvfs-client-1.48.1-3.el9.i686.rpm
25e10d00b57906af74bbf31aa938e3f0b19b5bc8cf556c414aa85fc2a5e9432e
gvfs-client-1.48.1-3.el9.x86_64.rpm
454f039e34f6b11dd077590e627c6b7a20fbbf3ca8f1f8e4d4b5edded0010dce
gvfs-devel-1.48.1-3.el9.i686.rpm
316d37055e6a44d78f27ecdda8c0cf204f4b4aed78db2540836e56e2e7df68a2
gvfs-devel-1.48.1-3.el9.x86_64.rpm
29476517d27f5dd9cee0337409284216bbe4c32fe3041d29cacbb1492cebbede
gvfs-fuse-1.48.1-3.el9.x86_64.rpm
04ec79ac674308f91aa1e57ce8c730daaed6e6b2a0f3b977b681487e0a650f5a
gvfs-goa-1.48.1-3.el9.x86_64.rpm
57c90cc0037990ea045b92311654b214e0b0d48b3b98dc99774da7934deb8ac6
gvfs-gphoto2-1.48.1-3.el9.x86_64.rpm
82aa2b5014970c41dc731880b2bbb49cf6be905efc44efbac81b925539ef8982
gvfs-mtp-1.48.1-3.el9.x86_64.rpm
124e42697ae0030f5524cbb6c308a80362b49f10e61d30c947922284aad92ee0
gvfs-smb-1.48.1-3.el9.x86_64.rpm
c7a7215a551100095c8a28291188301da80b3c8ea62fe83cf14f8f4c91f984aa
RLBA-2022:2871
new packages: google-noto-fonts
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-noto-fonts-common-20201206-3.el9.noarch.rpm
a8bfb90be7ea0f2612987cba93ff5852aad702a58294bfc625a1ef60504c64c8
google-noto-sans-armenian-fonts-20201206-3.el9.noarch.rpm
a1e9e24034a98e9389e29d2591e69543b47a52e44de70ce611112e9969a2c313
google-noto-sans-avestan-fonts-20201206-3.el9.noarch.rpm
e4be3b09dccada97318a64eb389f012000bd34b709e3bb411987f6ccf9d6809d
google-noto-sans-bengali-fonts-20201206-3.el9.noarch.rpm
0e953e28bb61285dbd891243d5f980a041f5f71aa1e46a18cf4531d4b4f702b3
google-noto-sans-bengali-ui-fonts-20201206-3.el9.noarch.rpm
5e743aae45dd1c43f41c1b43a8c37ddd12c02e41a53131b5f5821acc95d659d8
google-noto-sans-brahmi-fonts-20201206-3.el9.noarch.rpm
1bbca7fdac53c6b5dd939861b45acc50f7b8f6fb34f43dc4311dec232e422098
google-noto-sans-carian-fonts-20201206-3.el9.noarch.rpm
ae0817cd06e41eb6b182ba6f333e219318072cea66c5cecb9239c78837dedbc7
google-noto-sans-cherokee-fonts-20201206-3.el9.noarch.rpm
ce89d4d0e275de48af732082a3cb86c2c31d4a25f337b74310ba6d06c2965275
google-noto-sans-coptic-fonts-20201206-3.el9.noarch.rpm
915df0c4645a4a867a0d257ff79f3ecacd396465cfd1ef7854819ef79b28c5de
google-noto-sans-deseret-fonts-20201206-3.el9.noarch.rpm
0e0108d974f556c848033c27eec5c49cb426c4dc3e310642030fb26139c41466
google-noto-sans-devanagari-fonts-20201206-3.el9.noarch.rpm
7305c8e243de0bf2eb56b3a1385efb8464cc691dca0b21833841f614a00d5d38
google-noto-sans-devanagari-ui-fonts-20201206-3.el9.noarch.rpm
ec83d97316b4d9817a248a1219e172f3c9faf389e8f0e8eaaf8123dfa3e29660
google-noto-sans-egyptian-hieroglyphs-fonts-20201206-3.el9.noarch.rpm
c3e2763c9c403b0e79746efc4dc33ea57c27b1dec4acf0a7e6403a2cbe7b40fe
google-noto-sans-ethiopic-fonts-20201206-3.el9.noarch.rpm
546d7fe7463d0648d93468508ff21ccf24b7ae84345801a76f7d4fcfe744be07
google-noto-sans-fonts-20201206-3.el9.noarch.rpm
ae9f99e70fc15fb601ab08fff4297c8cd6455fa7645702115122a63289ded908
google-noto-sans-georgian-fonts-20201206-3.el9.noarch.rpm
a5a354ac019d2fdfee9d937fd68858f13bc4d6e69336942a7e5e0aab2c74db44
google-noto-sans-glagolitic-fonts-20201206-3.el9.noarch.rpm
df4914f52bdbf8728408894af9e17354ad342441f422b2f5c80f7349d9e1f88e
google-noto-sans-gujarati-fonts-20201206-3.el9.noarch.rpm
2fdcfebbd955cf0bfa65253ac364471e75f61276d384906247460df6d8eed1c0
google-noto-sans-gujarati-ui-fonts-20201206-3.el9.noarch.rpm
0e6b4e2eb28ac886eaf311fca7886115ad6c97e4810360664c8a5cc237d7d839
google-noto-sans-gurmukhi-fonts-20201206-3.el9.noarch.rpm
6ff96e2a6ba9c64b5784cf3cb973aba36f686551a46e7cc87ffb055475cd7bd0
google-noto-sans-hebrew-fonts-20201206-3.el9.noarch.rpm
48f2448c34b9b89ca6aebec68de557dcb0d8a66ecc26315a48549a8ac3d4234e
google-noto-sans-imperial-aramaic-fonts-20201206-3.el9.noarch.rpm
cb129b006c95141da79db043dbe8a94d9adb5370e50c6dd81657fe092011184f
google-noto-sans-kaithi-fonts-20201206-3.el9.noarch.rpm
1a49de7f49b147618e999c002c4ddb90de7c1a2d04f863b152736764876e6865
google-noto-sans-kannada-fonts-20201206-3.el9.noarch.rpm
d09f2cca441def1c7191f72f09641b11549dadc9b91790c38a27730ebaeb9a5c
google-noto-sans-kannada-ui-fonts-20201206-3.el9.noarch.rpm
9cb1090e24906794744b8fbd61085cbb15f4bad5402d107edfb66a7ee14c6e81
google-noto-sans-kayah-li-fonts-20201206-3.el9.noarch.rpm
d15e6ddb5dddfca706282a102d6a2c6f783845498c228074b79f6d48607a44cf
google-noto-sans-kharoshthi-fonts-20201206-3.el9.noarch.rpm
e6eec1c838bec1a16c8741c94561fac58196c1f5b8855bf6c822bb8cfb543743
google-noto-sans-khmer-fonts-20201206-3.el9.noarch.rpm
4e376d907081e1492838ecbd77dc7db6fc93fbfbeefb61be3426578c8d247680
google-noto-sans-khmer-ui-fonts-20201206-3.el9.noarch.rpm
39693e6301bbcb50bdf0205f3f012448c1108abca4621629865b58e55ee10278
google-noto-sans-lao-fonts-20201206-3.el9.noarch.rpm
6811b3f83f25db4b8b3b8b016b81e859baa03a21af9d87a6713a769b33f522d8
google-noto-sans-lao-ui-fonts-20201206-3.el9.noarch.rpm
d838265869cf8c907b1eaff6f0c84911220259b01e0f5801dafcfe5deddd68c4
google-noto-sans-lycian-fonts-20201206-3.el9.noarch.rpm
76f326ffea0bb5ca8789d08f9b4b47c70c5d627b18864fe6124a87a1b1fbc0c0
google-noto-sans-lydian-fonts-20201206-3.el9.noarch.rpm
db3d946ebb39d58c56642d7dd95431109e805adbb653edc8d648ffe309ece517
google-noto-sans-malayalam-fonts-20201206-3.el9.noarch.rpm
5ca53d6023225c51964a9ffdd91e82f1368b6e483a0a1e95dc7040bb5c707254
google-noto-sans-malayalam-ui-fonts-20201206-3.el9.noarch.rpm
5a7e8ca26caa958ff76b5e2c45b1aee17e14a227f99c111510dd3fdd2b40761a
google-noto-sans-mono-fonts-20201206-3.el9.noarch.rpm
59620b099a0c697039e30d078109305bfd693471f98f1277acda6e6bb3fa43d1
google-noto-sans-nko-fonts-20201206-3.el9.noarch.rpm
ea4de34806aaa6e42ae581ca812d69cb00b9f66eadd1debbc4ea824683ee2f2f
google-noto-sans-old-south-arabian-fonts-20201206-3.el9.noarch.rpm
54c9834c3ff8ab8ac7d6815f65786da0df1cf6e87a1fbcfef8c016a9f8fce7ca
google-noto-sans-old-turkic-fonts-20201206-3.el9.noarch.rpm
c1655e72c7bd03c7d5217c527c485cc3854a596df83f3859e08e0a1786b891a3
google-noto-sans-osmanya-fonts-20201206-3.el9.noarch.rpm
64de7cf019a1a3847c0d9b6c3e3405216848875e07c936efaa5a026c7556132e
google-noto-sans-phoenician-fonts-20201206-3.el9.noarch.rpm
1cc279f4df79d26b8bca443bfab6278cdf8c7e48f47232cb9d93650508742e59
google-noto-sans-shavian-fonts-20201206-3.el9.noarch.rpm
158a4b65483866ab052b0e9b2e0ec395f5f2f57d6e9d82513b511426392fba1b
google-noto-sans-sinhala-fonts-20201206-3.el9.noarch.rpm
dcf0b96e190fedb11c7562ad122e270ec5e20f549cb1f046477022db037eb172
google-noto-sans-sinhala-vf-fonts-20201206-3.el9.noarch.rpm
d16d66225be0e0d43bace67f09a282d9abe7ee73bbb4c7d645029ead12d15779
google-noto-sans-symbols-fonts-20201206-3.el9.noarch.rpm
3b41a01546208a27d619fa2d6d111e0c696f39a1af9ebffa1aee849b3a8b12d8
google-noto-sans-tamil-fonts-20201206-3.el9.noarch.rpm
00c802ecc667f1d3cff4c72fdd33fee15b4c730830eba3f6697046ef3e78b843
google-noto-sans-tamil-ui-fonts-20201206-3.el9.noarch.rpm
f03a2b22d6a059ad493706a65d198ccd68aaa6c8b4013236e526087cc2a21ef3
google-noto-sans-telugu-fonts-20201206-3.el9.noarch.rpm
4e04909028d4254b90effa51545bbd001e43a0246b0dbf0ec73eb194a96d7306
google-noto-sans-telugu-ui-fonts-20201206-3.el9.noarch.rpm
3f7fc630fdd79d6710d462307cb89e77ba4a6afde81eaa6499395d4f270c0e24
google-noto-sans-thaana-fonts-20201206-3.el9.noarch.rpm
70b6dbf450d75ac6b505b1b651c0ec77fd284a15f8038fbdae0c42b3ccd99848
google-noto-sans-thai-fonts-20201206-3.el9.noarch.rpm
0c42d390c523272b0794ff561db4b6502a10fa279827ffd1912118410f4ad3a1
google-noto-sans-thai-ui-fonts-20201206-3.el9.noarch.rpm
6ae75a4ffd514b0aa88e2c950644372e92b5ab042aa8979395d63427521f841c
google-noto-sans-ugaritic-fonts-20201206-3.el9.noarch.rpm
c77d845a91bba11e1c04a46064efb4cc3673564c39c8dd00c13131298f981246
google-noto-sans-vai-fonts-20201206-3.el9.noarch.rpm
c32d420f22fa1b0eaac7e1ec38d19db34591e91cb259f70a2aca8f1f2a193e4f
google-noto-serif-armenian-fonts-20201206-3.el9.noarch.rpm
455d5825330efcdde8a3ad3450b746b92bfab9b237747dc8fffb662ab7af906b
google-noto-serif-fonts-20201206-3.el9.noarch.rpm
8f79012f90202c5120c1a180a0ef598ed1a184ca56b60491f39b5ed93a606fd2
google-noto-serif-georgian-fonts-20201206-3.el9.noarch.rpm
20f968c426daa7ccf39b76482a79644e0941130d1d965b5f3c9563bdcce2efa7
google-noto-serif-gurmukhi-vf-fonts-20201206-3.el9.noarch.rpm
58c87658ae6c10c1c3db79715bebf6a2b813cb8ee7d3c2cb50cfd3f0454758c2
google-noto-serif-khmer-fonts-20201206-3.el9.noarch.rpm
ee107e896b0741e3b661e8d7ad192cb9f0340eee6e780d0472de66b2799e7d6a
google-noto-serif-lao-fonts-20201206-3.el9.noarch.rpm
24505c5f02d48d18f13933899386b9abbbcb4bb51a6024ad8509ee2705da1eff
google-noto-serif-sinhala-vf-fonts-20201206-3.el9.noarch.rpm
2889d33838eff3bffd3b586b4bafa72828aa8c94782d1f72b0b2168d1cdea59e
google-noto-serif-thai-fonts-20201206-3.el9.noarch.rpm
ada2ee6b36ce8e76f50eec3e3d655ddd0396b8ee77b7d8a65b3fcdd7a0463b12
RLBA-2022:2893
new packages: hexedit
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hexedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hexedit-1.5-3.el9.x86_64.rpm
153461e9e7effef245997da3c9b478ecd4c830c72d475f0ab2fc1bc8fbb8753f
RLBA-2022:2894
new packages: hicolor-icon-theme
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hicolor-icon-theme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hicolor-icon-theme-0.17-12.el9.noarch.rpm
44dd63517f5ccdae99824ba5a6581affa171b0c5905a24ecc9d2a1bae565717c
RLBA-2022:3061
new packages: i2c-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for i2c-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
i2c-tools-4.3-2.el9.x86_64.rpm
a77d8c2ee5ef198eab9633b7623b933d242d1595bcd9f8072ba00259ebd26f43
i2c-tools-perl-4.3-2.el9.x86_64.rpm
e4fb19a351f06e82cd2d87239f04dafbe641a9e68c095b346731481d8df5ff88
libi2c-4.3-2.el9.i686.rpm
22194db1d39ffcc744c42bf7000841480129b05679ce14e705d8911d6f7c1b3a
libi2c-4.3-2.el9.x86_64.rpm
7c4bb67c60b88415a46b5d82bd8fbcf095f337e2d892eca75e3ce7e581f564a2
RLBA-2022:3143
new packages: libXpm
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libXpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXpm-3.5.13-7.el9.i686.rpm
4c5e65d9a2fc116152d5b562341a414262b3be6c2e32ad2181f827c5451f4482
libXpm-3.5.13-7.el9.x86_64.rpm
33abcb614edad694ddc9987f0c661f5242c8b90360f570c28150890f7ee8d6b5
libXpm-devel-3.5.13-7.el9.i686.rpm
1f96881a468dd3d18c45ce61c7eede51f89c0e94391b927739d98e89382c13cf
libXpm-devel-3.5.13-7.el9.x86_64.rpm
06903294e37c22901528b1e007803796d1c86a76d6c2c21932e9cb45c6fb3d19
RLBA-2022:3175
new packages: libestr
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libestr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libestr-0.1.11-3.el9.i686.rpm
21e495939f2a55dfa747e06acec992dfcef6524da8752627c057d91c0a4ab9e6
libestr-0.1.11-3.el9.x86_64.rpm
42d961876d6f685c0e9ed814a721b20c2e6bba3c234d1ae5d7fb21816e6dfd4d
RLBA-2022:3256
new packages: libtiff
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.2.0-3.el9.i686.rpm
2fb4ee9aebba9dec5ef60b4e14f3df1eea9b8262910bede8e5a2455072699930
libtiff-4.2.0-3.el9.x86_64.rpm
1b175ad5a8ad418c470ad3176907fe43f4c3f0bae4aedb9bbdab970b1a721c2b
libtiff-devel-4.2.0-3.el9.i686.rpm
4758cd71cbb182981e4e8918518a3b098ec2992f4bef4ffa881bce31865d77b0
libtiff-devel-4.2.0-3.el9.x86_64.rpm
8a35d0950ca177c4096eef39e97b898fe73137c2f8ebcbd86e81f53bf37fec84
RLBA-2022:3271
new packages: libwpe
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwpe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwpe-1.10.0-3.el9.i686.rpm
a9d3d64199ce2053eba07641400fb76c6aa7fcfe3018228fa5290520eec57342
libwpe-1.10.0-3.el9.x86_64.rpm
ee16e7187536370bcf50ce7d0a21b10b087e1df842565b3039b1ddfec28f4bd6
RLBA-2022:3279
new packages: libyang
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libyang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libyang-2.0.7-1.el9.i686.rpm
c2d0341d8e902497898814cbb17d6073e75c17a250c9e7765e83c13056c6062e
libyang-2.0.7-1.el9.x86_64.rpm
faac667b188304db98c4ef0ee2c9c94627b3db102fd325a4de9ffa3126c77821
RLBA-2022:3283
new packages: linuxptp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
linuxptp-3.1.1-2.el9.x86_64.rpm
e0fd2d3dc314605adc38d6c6974e0cf6a1cb72b2c92f9a207c8a9e70614847a4
RLBA-2022:3317
new packages: memcached
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for memcached.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
memcached-1.6.9-6.el9.x86_64.rpm
23f5898c17e10852c959acee8fb9f8ef8115bed0dd8c4eda932086abee4411a7
memcached-selinux-1.6.9-6.el9.x86_64.rpm
f58dc3c11e410514bf1ae7c3bc9064b42c5934988933075f46c9259704760eff
RLBA-2022:3319
new packages: mesa-demos
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa-demos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glx-utils-8.4.0-12.20210504git0f9e7d9.el9.x86_64.rpm
c75a83da2fdd0ae2c4c575a5b2ecbc779a0f38136f78cfcca9e9bd83d1b962fc
mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.x86_64.rpm
2519e3f4a4e64d80573088f0e5d0afaee1aadd72d0740841428f752b3a3dce1c
glx-utils-8.4.0-12.20210504git0f9e7d9.el9.0.1.x86_64.rpm
4bca2a9207bf337a972d9da4cff424e84d9a5db33dbb3d43781ad7b6f040a779
mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.0.1.x86_64.rpm
a9a4fde82c80da96167bef4983924cf21bf84b46ef4a1770db55861b8a699c25
RLBA-2022:3323
new packages: mingw-crt
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-crt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw32-crt-9.0.0-2.el9.noarch.rpm
97bd1036be28d62d6c3cd9236815d0c50b82d33f24703f15d063220ede1b42cf
RLBA-2022:3324
new packages: mingw-filesystem
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw32-filesystem-119-2.el9.noarch.rpm
d7e89a72daf90367078951559ed0230f6d7b9a3a7586a6dbeee74e8564c6a5a6
mingw-filesystem-base-119-2.el9.noarch.rpm
c63a593e2be0c490cc63d37ba4a5918c66dddecb9dc7be4b503b8301c5a12671
RLBA-2022:3329
new packages: mod_auth_mellon
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_auth_mellon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_mellon-0.17.0-6.el9.x86_64.rpm
83acce59a0bc2b14e115a163b9e82d912c101c1eab83ea43e79483ee4ff46892
RLBA-2022:3339
new packages: mod_security_crs
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_security_crs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_security_crs-3.3.0-3.el9.noarch.rpm
13bb61fb300c7a67b7fbb50861489ea05add0363ea6025f0f8d38fd499f6a348
RLBA-2022:3392
new packages: openjpeg2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openjpeg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openjpeg2-2.4.0-6.el9.i686.rpm
84cc657ebf017e944950c3e3a99672dacb3e4cb900297c65ecc6ac7f8e1b6122
openjpeg2-2.4.0-6.el9.x86_64.rpm
a1ff83896899d34681e729b1cfee5f8d9c7f769f802f5b54bb9781f819957bb0
RLBA-2022:3631
new packages: pki-servlet-engine
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-servlet-engine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-servlet-4.0-api-9.0.43-4.el9.noarch.rpm
3f808c1b7dc192eb13958b4b7dad0d8b5833e978594c921232b2ed010d56b40f
pki-servlet-engine-9.0.43-4.el9.noarch.rpm
bc2350f08e4ca1f97fe8dfee27240e7f4fb9a4fac342ccc0425ff9c32009942d
RLBA-2022:3642
new packages: poppler
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
poppler-21.01.0-12.el9.i686.rpm
78db34ad6e3e9bd77e4fa0e19f77b0b6739b3e6ec109b3b6fd76a82415e12f6f
poppler-21.01.0-12.el9.x86_64.rpm
18fd7f5209755b145d523d305f900ca11a393c35b711da5902fc85db39bdfe5a
poppler-cpp-21.01.0-12.el9.i686.rpm
87569d100bcbb79f67e65939ba09592fc8d4c960395f1a338c14e449aa6e740d
poppler-cpp-21.01.0-12.el9.x86_64.rpm
52c26fb209ef63a62e8399641fce4f8f87f4662d1290a173120417c1f191726d
poppler-glib-21.01.0-12.el9.i686.rpm
3a85cc47fe4fb4e5c810a3860d34c7eabaa10e24f0cce8fea04bc292fdee738e
poppler-glib-21.01.0-12.el9.x86_64.rpm
06cf367d138624fc9f15d7803f9cda28e823aa7575f56971f01dc4b9b5677c39
poppler-utils-21.01.0-12.el9.x86_64.rpm
2be4571777d7925f19631c21d087639486260267a0d7bcaa500d49a44a5579ea
RLBA-2022:3645
new packages: postgresql-jdbc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postgresql-jdbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-jdbc-42.2.18-5.el9.noarch.rpm
e59b40159b9c5a040052f1cdccfc3abbc4491622c7fd656e0e5edf9d66ca8ae0
RLBA-2022:3654
new packages: pycairo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pycairo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-cairo-1.20.0-4.el9.x86_64.rpm
ec9f36ed6bd1b4e10ca6b9b6443fba966653e32f5ec53676feb65ca446904b98
RLBA-2022:3657
new packages: pyparted
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyparted.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyparted-3.11.7-4.el9.x86_64.rpm
e9d92042bad6f87a29b2cd535258b4482c0cfb0a3b97d0ac14b60e5d9a85416e
RLBA-2022:3704
new packages: python-rtslib
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rtslib-2.1.74-7.el9.noarch.rpm
9d18834ebe1fa96b2ea7ed1743518b42444cbd2ce551a7836c712875c8a468ee
target-restore-2.1.74-7.el9.noarch.rpm
b79cb278217979834774b9c793eaa46c14f0400639e5943d8636a4c5df1860d6
RLBA-2022:3715
new packages: qt5
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-5.15.2-9.el9.noarch.rpm
ef5b8996f7f22358e1c9af6747950422aa18bbbfc954a4063e5c95b67ef0b1a4
qt5-rpm-macros-5.15.2-9.el9.noarch.rpm
9e2a2ebbcd71777737a5e541178bbfa1513ab87b956e571ff7d37a668c6dc128
qt5-srpm-macros-5.15.2-9.el9.noarch.rpm
eb93bc9a5fc016105534145167bb98da641f0638ba21f867dc6a636ba8186695
RLBA-2022:3717
new packages: qt5-qt3d
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qt3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qt3d-5.15.2-9.el9.i686.rpm
d9382ea8abea96e5edfa2ebfd8c0267ee7d0e54482e93c33222c6127d80208b9
qt5-qt3d-5.15.2-9.el9.x86_64.rpm
4b3192c2df9c855e1cbf9d6c94c397a9e0ac1cefd5743714650cba0ac4e5fa60
qt5-qt3d-devel-5.15.2-9.el9.i686.rpm
8e358dd38cd8b54102a5c473f014af5491b60b8b251fab4dcf47d45809f23f19
qt5-qt3d-devel-5.15.2-9.el9.x86_64.rpm
583ae00c44b9ae48d8c35a32a99fd90a7418dba74576afd31dc79ff8f4669cd9
qt5-qt3d-examples-5.15.2-9.el9.x86_64.rpm
4d7009cff4b250e645eab00038402dd9f509982e6ac8d45fff0feb1de6bcee6e
RLBA-2022:3719
new packages: qt5-qtdoc
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtdoc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtdoc-5.15.2-5.el9.noarch.rpm
867375710867d29a4245b72f728ceb6422d18e99dc45a196561ccdd36a41715d
RLBA-2022:3723
new packages: qt5-qtmultimedia
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtmultimedia.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtmultimedia-5.15.2-7.el9.i686.rpm
23c9307f6bf94858aac03d600397e022bfb9f08293798d8f7db8667fb607d8eb
qt5-qtmultimedia-5.15.2-7.el9.x86_64.rpm
6900d7e34fd943deebc75c56738bd997d89f8ba1437655930d9febaf620b2feb
qt5-qtmultimedia-devel-5.15.2-7.el9.i686.rpm
3f922d23fc713ad55d6b8c02b42271cdce4fa246f886f86957a7eaf25ee188a5
qt5-qtmultimedia-devel-5.15.2-7.el9.x86_64.rpm
0f4aa9785a7c77e9201efe51e969d6460cd57dbdc14ab90c09a91d67d3aec898
qt5-qtmultimedia-examples-5.15.2-7.el9.x86_64.rpm
f8304e81c3f23258cc1671683892cfc14cfb62a9811fcacb65eeb98fd617699b
RLBA-2022:3724
new packages: qt5-qtquickcontrols
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtquickcontrols.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtquickcontrols-5.15.2-6.el9.i686.rpm
e32c44f03d89d23a843ec5dd6df80e7fda6c093b5ec37455dd07f838dbf7e6cb
qt5-qtquickcontrols-5.15.2-6.el9.x86_64.rpm
beb789c9a9e339114abaf68daccedfc153bb49cf5003b54c106f4e02fa3669ec
qt5-qtquickcontrols-examples-5.15.2-6.el9.x86_64.rpm
228b544d3ac41e6e8463c6c54e76d864934c52232c962426243d49d2c088fae2
RLBA-2022:3726
new packages: qt5-qtserialport
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtserialport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtserialport-5.15.2-6.el9.i686.rpm
f83d2493528d3b7d163b780fafb71b5d8c92f64ec5de5638a05919b940bab07e
qt5-qtserialport-5.15.2-6.el9.x86_64.rpm
0a4c77bee81debafe00b1b64cf1cdc0950b4817814c579a5d1220e7aa9f0ffb7
qt5-qtserialport-devel-5.15.2-6.el9.i686.rpm
d5a89f5a28853cf0b4b9291e5b23411265e3a11adf70903ebfd194952a25ea86
qt5-qtserialport-devel-5.15.2-6.el9.x86_64.rpm
6a72b72a007e5affe10b67516ad9c8ac473a6882d23a194246758bdf3faabb74
qt5-qtserialport-examples-5.15.2-6.el9.x86_64.rpm
b9f70a3149f3b48158aa5138e674602254b6b5179374e0a2cfae30d7ade88a40
RLBA-2022:3727
new packages: qt5-qttranslations
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttranslations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qttranslations-5.15.2-5.el9.noarch.rpm
2d5fe3f4e08553925accaecefce6cc0b6f2284e845c6fbbaa88fafa3afdf7a16
RLBA-2022:3728
new packages: qt5-qtwebchannel
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwebchannel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtwebchannel-5.15.2-6.el9.i686.rpm
d1c9a72472e558ca374b09870f128ad49cfff5a110cf7b35d2b7817ced105509
qt5-qtwebchannel-5.15.2-6.el9.x86_64.rpm
5d6c878724dfbc2ac968bad55c44578f5077d532f5724fa6941c5f1dcba91069
qt5-qtwebchannel-devel-5.15.2-6.el9.i686.rpm
6c19be00a10333346f57693eb06c4ed44ea795c98e08878c4f41990a4821e957
qt5-qtwebchannel-devel-5.15.2-6.el9.x86_64.rpm
4d511673a9e725a55bf58e427c1d06e897ae1fa02b9a0a3e48443b965546df0f
qt5-qtwebchannel-examples-5.15.2-6.el9.x86_64.rpm
2eb6ce8dc001c299aa873a97cb5210b7a71b7b7100bb694e49d1a8f677ce6d00
RLBA-2022:3729
new packages: qt5-qtwebsockets
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtwebsockets.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtwebsockets-5.15.2-6.el9.i686.rpm
c8b02528644dfcb17d116c83a1b85b878bc14157d423daed4732c47162ad13dc
qt5-qtwebsockets-5.15.2-6.el9.x86_64.rpm
3e096c45bf4086beb9cbe06bdc1f51596bf6b9ed690676e1fbebaf893db40219
qt5-qtwebsockets-devel-5.15.2-6.el9.i686.rpm
97584a21ea6e18e85dbf46d358a21927a7837ca38780ab77921a6aaf4c0ffb83
qt5-qtwebsockets-devel-5.15.2-6.el9.x86_64.rpm
9b040d44a722501190961c6fafd4253195a5567a43205e6fa07bfd8929bd3439
qt5-qtwebsockets-examples-5.15.2-6.el9.x86_64.rpm
4a6e3c53eb96600095f002048a90324c3c41d097a703817d24d7cfc672281371
RLBA-2022:3730
new packages: qt5-qtx11extras
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtx11extras.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtx11extras-5.15.2-6.el9.i686.rpm
2785902956e97ea300f0cd6bcb4bb04e46953d88ca0840ce4e15c3e5a2939dce
qt5-qtx11extras-5.15.2-6.el9.x86_64.rpm
3447fef1246ba6c3976a975f33f57ebafbde689a35f7f300d9a04bc1e51b3162
qt5-qtx11extras-devel-5.15.2-6.el9.i686.rpm
5d7d5487f1c9e494e20e665cb54f5325a4b2e3a4e163414cb4b4bcd337a37289
qt5-qtx11extras-devel-5.15.2-6.el9.x86_64.rpm
5077c028499401be4f5820a93d578b756f6692edc0a46559585cb47f125b11ea
RLBA-2022:3731
new packages: qt5-qtxmlpatterns
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtxmlpatterns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtxmlpatterns-5.15.2-7.el9.i686.rpm
e7072dd982005d92198e1dbc14b72df31ae13eab0c5b3c392683148307fda00b
qt5-qtxmlpatterns-5.15.2-7.el9.x86_64.rpm
b82f91df297ff754a89acd240623899f81ce0f0dc015ff5215a327efe7d8f959
qt5-qtxmlpatterns-devel-5.15.2-7.el9.i686.rpm
82e449ace654d3729cef2b5b938fd627b96c5254cd6b2d6dc5a49af49eb848d1
qt5-qtxmlpatterns-devel-5.15.2-7.el9.x86_64.rpm
bac0a0751e36e8213ccdfb091ee8f5226d65cb30bbd6bd3bc9df6d451aebbe88
qt5-qtxmlpatterns-examples-5.15.2-7.el9.x86_64.rpm
5211e35f2169c0bf43886488b35fe0772e264ee0006d3ab48955cc418f416b87
RLBA-2022:3778
new packages: sip
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyqt5-sip-4.19.24-6.el9.x86_64.rpm
73804c4490149ba2e6af3f93174936b600aa34a9d779cbfd94fc1e637d144077
python3-wx-siplib-4.19.24-6.el9.x86_64.rpm
175bd7d1fad5f528a97efdc77c6054a574076653a54f93cc11513dd222c620e1
RLBA-2022:3740
new packages: rig
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rig-1.0-4.el9.noarch.rpm
1d5f6db928a0b3560d7632a663efa9fed24b37b30f88af2bd9eb98a753720cec
RLBA-2022:3754
new packages: sane-backends
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sane-backends.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sane-backends-1.0.32-6.el9.x86_64.rpm
d2a41ce0293b48f4ac0a5acc8e8e27cc80a520df8465858a835418d2107c292a
sane-backends-daemon-1.0.32-6.el9.x86_64.rpm
4cef86a9559671816fc74ef804d51c274ec58a6f20c1d0f297148eccef0b7210
sane-backends-devel-1.0.32-6.el9.i686.rpm
18f9102cd4965e737b3aa1fe90e1276ef047c646ee483814301cd6a9fbe0338f
sane-backends-devel-1.0.32-6.el9.x86_64.rpm
accfe11d52e276229679eb0cad2bd27b482aca8288565bf9b1975b3e835f2528
sane-backends-doc-1.0.32-6.el9.noarch.rpm
27d411bd9527a941218ab02c5e886f083596eb49604dcda9898d3bbdf70115c1
sane-backends-drivers-cameras-1.0.32-6.el9.i686.rpm
fb7ea4d8135ecf2e38fed46a44bec5b666c201929fcf1fb27e52fa97d0f4e164
sane-backends-drivers-cameras-1.0.32-6.el9.x86_64.rpm
98de2a90d6d3279f4b8abbe00b03222f1b19a9effd357c288ea11c863e267385
sane-backends-drivers-scanners-1.0.32-6.el9.i686.rpm
45970cf88e71a5333099e5e17c89d520484bdb5e0459dfca21ae21640f4cea37
sane-backends-drivers-scanners-1.0.32-6.el9.x86_64.rpm
5c946834fc1d2fd666f11ce929af6e65c67f2aad9566c0f4411d81f8326221fd
sane-backends-libs-1.0.32-6.el9.i686.rpm
15eb0ecaed82a765498b9e0493c117b077062dded2f2a8a7c7bf0320b712fba4
sane-backends-libs-1.0.32-6.el9.x86_64.rpm
b46667562b5c95c81c4d756286b8029722d7a36ffb55c218631bfabd12be25f4
RLBA-2022:3762
new packages: sblim-wbemcli
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sblim-wbemcli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sblim-wbemcli-1.6.3-21.el9.x86_64.rpm
c4ecc62edbfed00eb36d0ef1b404eb8f024c6485f05a4b88585d0bce02073eb8
RLBA-2022:3796
new packages: stratis-cli
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratis-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stratis-cli-2.4.3-2.el9.noarch.rpm
3c38fc123d04f308e8eeb5dd713dd2749d732cfee60cc8e63fbb8fbfbc7970bd
RLBA-2022:3797
new packages: stratisd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratisd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stratisd-2.4.2-3.el9.x86_64.rpm
68db1ff86576f30a6c7608b733e186aaf758d304f2f4aadbac6e0b97470888cb
stratisd-dracut-2.4.2-3.el9.x86_64.rpm
b504a339d63411143ab6fc2d369730123a3dcfbd0242bcb5cadd62576cfbca72
RLBA-2022:3799
new packages: sushi
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sushi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sushi-3.38.1-1.el9.x86_64.rpm
2223d53b0dc581c0b76b8819c65b4f152af06fb66ddc8643f9668dec19802316
RLBA-2022:3814
new packages: tk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tk-8.6.10-8.el9.x86_64.rpm
26d970bb0bc59969ed5c4f96c95e942d9e04f63ad846bcc1ffae5d7a33f29360
tk-devel-8.6.10-8.el9.x86_64.rpm
6a53def3a77e73c99fcf8745c9e816df3ba21755a93af65a03c0493deaf42d88
RLBA-2022:3836
new packages: virt-p2v
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-p2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-p2v-1.42.0-6.el9.x86_64.rpm
69ddee1dfa86627d4486aeafc9033ee14bbfde77be41e863a2c9a2675a9ef5aa
RLBA-2022:3841
new packages: wavpack
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wavpack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wavpack-5.4.0-4.el9.i686.rpm
0c7590a9828d6db99e110ac0728764665b5cd6fff892b4b1274ecd7e1efb9be5
wavpack-5.4.0-4.el9.x86_64.rpm
f7f3dae7f2522fa67a0406dfeb90e2ed9019bf7abb44af9d4ff3ccd448f777ca
RLBA-2022:3844
new packages: waypipe
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for waypipe.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
waypipe-0.8.0-2.el9.x86_64.rpm
12c711bd2d5bffb805a7ebebe25ffdce917967f9ea73361122e4830d402b1c33
RLBA-2022:3847
new packages: whois
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for whois.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
whois-5.5.9-3.el9.x86_64.rpm
bbc101eb76bbad8f5842db57412073f382099c6c3a1e2b9e92f9c3befde753bf
whois-nls-5.5.9-3.el9.noarch.rpm
4c244a11ef584a6b09e0d0f73992e3cddfba94b5e0e154505e36d3391ac864e9
RLBA-2022:3848
new packages: wireguard-tools
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireguard-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wireguard-tools-1.0.20210424-3.el9.x86_64.rpm
2f31a6758368b85920c1c57236c60725536402a0e538a406d22e56072127f9ac
RLBA-2022:3850
new packages: wpebackend-fdo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wpebackend-fdo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wpebackend-fdo-1.10.0-2.el9.i686.rpm
56bbea271f817c31837f5a708d801a21ca07cfa5884e3e36d7fc56c34abe55f2
wpebackend-fdo-1.10.0-2.el9.x86_64.rpm
938ff9d6348e2a7bcd181fd9c3b73dd2e63edb6472f19e5cd7c3f9031d3ec968
RLBA-2022:3859
new packages: xdg-dbus-proxy
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-dbus-proxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-dbus-proxy-0.1.2-6.el9.x86_64.rpm
25f02ba273428798c990c8e3896385111c8c65ed4be52afbbee922bd2e0a9296
RLBA-2022:3887
new packages: zenity
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for zenity.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
zenity-3.32.0-7.el9.x86_64.rpm
01aa0dcf84b8da3e0c0c015cbaf20d1521f3386daa7d1899de75b70eb774f0de
RLBA-2022:3888
new packages: virtiofsd
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtiofsd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virtiofsd-1.1.0-4.el9_0.x86_64.rpm
d9670be88706d6e45479d301c2f0dcfd26a0fe80f2f20bfad8150ae082dae1fa
RLEA-2022:3889
new packages: libwmf
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwmf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwmf-0.2.12-9.el9.i686.rpm
f76341407b0e38a9d22d8720fc29ac63b907506ac4073822d0c67ef177c57090
libwmf-0.2.12-9.el9.x86_64.rpm
a542c20c4dce5bc60c8a0752b80e5f70d10c7f3185dbc469110405e5ee95a712
libwmf-lite-0.2.12-9.el9.i686.rpm
4ebb0bc080e9552f0783ad300a5ded14211e8545468c7c7b8af759c3672506e0
libwmf-lite-0.2.12-9.el9.x86_64.rpm
9e3a5e47d659066abe6709b1031c70aed4375abf59de34177bbfec52885b6326
RLEA-2022:3891
jigawatts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jigawatts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Jigawatts is a new package introduced in Rocky Linux 8.5 & 9.0 to facilitate the use of Checkpoint Restore In Userspace (CRIU) from Java.
rocky-linux-9-x86-64-appstream-rpms
jigawatts-1.21.0.0.0-3.el9_0.x86_64.rpm
0917fb310b48fef4eced1ce0f5ac2df28ba85a6c2602baeb048b61e5b673f925
jigawatts-javadoc-1.21.0.0.0-3.el9_0.x86_64.rpm
46ecf85caa7949dbdc8ea5eb2b5d05a3a5a962fab0b5d06c03ae6326ed805c4c
RLBA-2022:4577
cockpit-session-recording bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-session-recording.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
the cockpit-session-recording packages contain a web console module providing session recording configuration and playback. This module allows viewing and playback of journal-stored terminal session recordings generated by the tlog component.
Bug Fix(es) and Enhancement(s):
* Enabling session recording configuration does not work due to Rocky Linux9 SSSD files provider default (BZ#1075542)
rocky-linux-9-x86-64-appstream-rpms
cockpit-session-recording-11.1-1.el9_0.noarch.rpm
35e331f468c36666c7454ad976c6828330a470f80371454856ff181714d73db5
RLBA-2022:4578
tlog bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tlog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tlog is a terminal I/O recording program similar to "script", but used in
place of a user's shell, starting the recording and executing the real user's
shell afterwards. The recorded I/O can then be forwarded to a logging server
in JSON format.
Bug Fix(es) and Enhancement(s):
* tlog causing SSH to not reliably run commands (BZ#2077459)
rocky-linux-9-x86-64-appstream-rpms
tlog-12.1-1.el9_0.i686.rpm
8e43ce39374653b11f1eb5317f93ce7d55bc4c1b6e94bd57157d4c1f57731c6e
tlog-12.1-1.el9_0.x86_64.rpm
d0f110a7f95b5ee8fb78a272d9dd96ba1c0b72c59e08fb7baab1a30261f4fd65
RLSA-2022:4795
Important: rsyslog security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rsyslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format.
Security Fix(es):
* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
rsyslog-8.2102.0-101.el9_0.1.x86_64.rpm
cd3c5a024f28e5cd3b1287f06974c56b0bad054b5b9b46ab7e0b5c294425563e
rsyslog-crypto-8.2102.0-101.el9_0.1.x86_64.rpm
5af0812d0799c0e23b9ea2a35ed4935a9f38f59eb3133eeb11ae464e883365cb
rsyslog-doc-8.2102.0-101.el9_0.1.noarch.rpm
901e74c21a66e351856b5d89f44c37cb93b53a829190913b1903002c626b521c
rsyslog-elasticsearch-8.2102.0-101.el9_0.1.x86_64.rpm
763b78e2de86dff9c979ac1ff8c38805a65cbf83a78f523e08d173df6702243a
rsyslog-gnutls-8.2102.0-101.el9_0.1.x86_64.rpm
20dbf6aa53b2cda60a0386d5baf915bbd3fddfa0c5fa285396c4764f52886de7
rsyslog-gssapi-8.2102.0-101.el9_0.1.x86_64.rpm
74c93207c6df5a8ac75d42c550ddca57e640c9f5537c5f729c7a0755dbf46d6e
rsyslog-kafka-8.2102.0-101.el9_0.1.x86_64.rpm
3d0e8da77f3ccbaa5839c6cf09401150f9be3805de1edc95a9cdf618348f9c86
rsyslog-logrotate-8.2102.0-101.el9_0.1.x86_64.rpm
36f3315a2bf44d0c07e8cdedefbd5c3a983bdcdb29b8b541957230e246bb27a7
rsyslog-mmaudit-8.2102.0-101.el9_0.1.x86_64.rpm
438e1cf2c24e03cff46498eb042d87360957cd3b227c1beeed82347c46e80d77
rsyslog-mmfields-8.2102.0-101.el9_0.1.x86_64.rpm
496417386cb90892cf831081a2b0bc1117995b763c777c9febd979cf0e859433
rsyslog-mmjsonparse-8.2102.0-101.el9_0.1.x86_64.rpm
1aa748d2ec6777fd7eb37117a89f294f202108438382ded44aa7050cc059c564
rsyslog-mmkubernetes-8.2102.0-101.el9_0.1.x86_64.rpm
d2cd71e516bfa1c1dc076b9d8d8dd6bb5bd685102b710794f75fe2e0ec85925c
rsyslog-mmnormalize-8.2102.0-101.el9_0.1.x86_64.rpm
c3e488761681d3cdf404a4efef0f5bd1435eebc819734220ee27b523a5143eba
rsyslog-mmsnmptrapd-8.2102.0-101.el9_0.1.x86_64.rpm
aeea30571c815d3187e1a6e2d6c5c8800836b68a4b4c725a2080485404ff8443
rsyslog-mysql-8.2102.0-101.el9_0.1.x86_64.rpm
f879c8a85bb785347b3f7966661ce74d384e941bc9dd27d94ac08700e4305360
rsyslog-omamqp1-8.2102.0-101.el9_0.1.x86_64.rpm
5f5d04e3e10ce5bf384913e95a177db808496062d44e199511d6f095cc85d731
rsyslog-openssl-8.2102.0-101.el9_0.1.x86_64.rpm
b7f1ef0bd64adf0fc14670e3582b608d1828fca4fc32bcbde7fabfb3663d9673
rsyslog-pgsql-8.2102.0-101.el9_0.1.x86_64.rpm
2ff93ababd1408cb6bfd82f0df26cd363a0e8901becfcdb8287efd86c615d58a
rsyslog-relp-8.2102.0-101.el9_0.1.x86_64.rpm
b58c119284dfc8081c210b00d00df4cbc2e3fd46a60366589d0caadc4ca16eef
rsyslog-snmp-8.2102.0-101.el9_0.1.x86_64.rpm
dc7971e62b54235233138c4cb12d48ba853aed11bf811c93f989fe83c1e3edb8
rsyslog-udpspoof-8.2102.0-101.el9_0.1.x86_64.rpm
ca8b86ed47fe06fc03d76c1db88b076ce94083869328f98c683b885ef108b4b6
RLBA-2022:5213
gnome-control-center bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-control-center package contains configuration utilities for the GNOME desktop, which allow to configure accessibility options, desktop fonts, keyboard and mouse properties, sound setup, desktop theme and background, user interface properties, screen resolution, and other settings.
Bug Fix(es) and Enhancement(s):
* Update timezone map (BZ#2099773)
rocky-linux-9-x86-64-appstream-rpms
gnome-control-center-40.0-23.el9_0.1.x86_64.rpm
a642ba1c421bb42b2611de182f18129222eaa47938c13ae30f03a8549584f0e9
gnome-control-center-filesystem-40.0-23.el9_0.1.noarch.rpm
620f11fd9136f7413690aee2b0c3d957bbfde13fb9b2b383c26d78600d293e8d
RLBA-2022:5256
evolution-data-server bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The evolution-data-server packages provide a unified back end for applications, which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.
Bug Fix(es) and Enhancement(s):
* Backport patch for Google OAuth2 change since October 2022 (BZ#2081793)
rocky-linux-9-x86-64-appstream-rpms
evolution-data-server-3.40.4-3.el9_0.1.i686.rpm
55361c00ec450b047fc08f0a43a86e7340d66236babd81a3239346b0b7e09dda
evolution-data-server-3.40.4-3.el9_0.1.x86_64.rpm
908e80ea8685439fff9cc9bc750f0cbd085ba59e1a70a5b4606194a6d11b227d
evolution-data-server-devel-3.40.4-3.el9_0.1.i686.rpm
5e7ca044a64654412cb310e5e1e9ff90341f5238a864f26dec70b5ccddede3c2
evolution-data-server-devel-3.40.4-3.el9_0.1.x86_64.rpm
b3b61289e5392057b7e7fadaec17a3dbb3f648819fb1ba40776b5b71175fc31f
evolution-data-server-doc-3.40.4-3.el9_0.1.noarch.rpm
7341109627dcdf7b421cb5252695b0f95fac3e8ba678d1085bd4b0583270ad6c
evolution-data-server-langpacks-3.40.4-3.el9_0.1.noarch.rpm
8ae1af914ea4034ae8823e7f347fdb999c7f6e1f18f6d4d3ef9cc81cbadc1d0f
evolution-data-server-perl-3.40.4-3.el9_0.1.x86_64.rpm
3cb88357b78ce8aa0fdb5886fe6269d61512f85046bcd2ff21d2a9572f10c310
evolution-data-server-tests-3.40.4-3.el9_0.1.i686.rpm
7591bfcb5d46222bde499dca7f40a49b99ac7da8290957b0b403018e58aca2de
evolution-data-server-tests-3.40.4-3.el9_0.1.x86_64.rpm
c0216e4ae08b2c2965e504f893b3d093eba66591d02a7f56ee0dbe3caa1e229e
RLBA-2022:5259
systemtap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SystemTap is an instrumentation system for systems running the Linux kernel, which allows developers to write scripts to collect data on the operation of the system.
Bug Fix:
* [REG] systemtap: return probes doesn't work for symbols in kernel modules. Note that the issue persists on the 64-bit ARM architecture. It has been fixed on the remaining architectures. (BZ#2083727)
rocky-linux-9-x86-64-appstream-rpms
systemtap-4.6-13.el9_0.x86_64.rpm
fe36f5ce41be5b86b32a3b43628ef41dff30f0b86da47e10e12d6ac0edf58b2b
systemtap-client-4.6-13.el9_0.x86_64.rpm
9fd5015703b6a2f7a9cc67daa6a569f3976ab8259a2f3ac5443d8a16c197b56e
systemtap-devel-4.6-13.el9_0.i686.rpm
d6dd7f1f952e76f4871ced8b0e126dc7517fe7060c6fd7207281dfe2265c324a
systemtap-devel-4.6-13.el9_0.x86_64.rpm
9e8c353ea58d26d35f74ff0eee989fef251bd8817b99e6703b14144a08413d2c
systemtap-exporter-4.6-13.el9_0.x86_64.rpm
51b7054336ba0e3d1c4a2c1b938c714dd4a4e3baff36ccbbd520034c66ff1450
systemtap-initscript-4.6-13.el9_0.x86_64.rpm
72f61cff66738d843306221d9e120403854f14c22868133c1643828bbde4aa75
systemtap-runtime-4.6-13.el9_0.x86_64.rpm
6513d29b9c14d81cc3f490d31a3d0c18979fca33a753e8269f9f53ded36f8988
systemtap-runtime-java-4.6-13.el9_0.x86_64.rpm
5672ea610c5465296ea126cea6e9f0cb6eaf516d3c8dc84e0d055f49bf8ac6e0
systemtap-runtime-python3-4.6-13.el9_0.x86_64.rpm
b8e2f00ca1bbc774a8a361873bedabde952d2996aa48f574dc00db6414d1ab57
systemtap-runtime-virtguest-4.6-13.el9_0.x86_64.rpm
b50617982052f1a95ae85d7b86bb3284f1c1b53115b7ff900490911d4caf454f
systemtap-runtime-virthost-4.6-13.el9_0.x86_64.rpm
180d35c58ae92f44308bb6d20e88c5996af3a6072fab9791902cea41372ff48f
systemtap-sdt-devel-4.6-13.el9_0.i686.rpm
6b941d43d8ecb18d4641545b33d48e4f791fa25b840dc6303be9e5b2800ad81a
systemtap-sdt-devel-4.6-13.el9_0.x86_64.rpm
de4a57f712771c4850d70f8b7b44d3ea65169906a7898c6548ab5517a185eb3d
systemtap-server-4.6-13.el9_0.x86_64.rpm
7b6200453553bf3d8de5f1e7020920b03e617015c7671ee948a4423c979a54fd
RLBA-2022:5261
libvirt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fix(es) and Enhancement(s):
* Allow memory prealloc from multiple threads (BZ#2075628)
rocky-linux-9-x86-64-appstream-rpms
libvirt-8.0.0-8.1.el9.x86_64.rpm
98004c062e2b4b2ae8d5a4280973b89955b33e69732ec7ac89dab9af7a51cf39
libvirt-client-8.0.0-8.1.el9.x86_64.rpm
8b33305ee2c63116e3fbb3429a7777aae7a2f56c939f9e45ef1c48009c6afa64
libvirt-daemon-8.0.0-8.1.el9.x86_64.rpm
ee6edf505d780b9299675c4a7110625c1f6f9e26f15abbe847b7414d9c4d5c89
libvirt-daemon-config-network-8.0.0-8.1.el9.x86_64.rpm
a4621e3d5add23ae8c1ee961177caa39cb51ad47d7008f32e57915319fd54452
libvirt-daemon-config-nwfilter-8.0.0-8.1.el9.x86_64.rpm
afb576f2f5b439698c2d2c1fd7ed3b602d6d8857934c782dbd33d0fdeb826cbb
libvirt-daemon-driver-interface-8.0.0-8.1.el9.x86_64.rpm
9279266f77773df3feecb4e5409ff305695c71f49eb3ee43d6deea23160ceac7
libvirt-daemon-driver-network-8.0.0-8.1.el9.x86_64.rpm
93dfdf106c987f022a736efada04b7e54006e7a7ac5a75520432ec3f57084e12
libvirt-daemon-driver-nodedev-8.0.0-8.1.el9.x86_64.rpm
60729cdd8973d322380fa540e9d247715cfc92a89d46138df675bf107b2158a7
libvirt-daemon-driver-nwfilter-8.0.0-8.1.el9.x86_64.rpm
57413fb88038355175ece15ac2b4afd53b1e3876f73f93846e1e19f031297c52
libvirt-daemon-driver-qemu-8.0.0-8.1.el9.x86_64.rpm
5124d7bd712c77f06a4c7ae8a508d4a43f87696215f6889e96d1ebb5a0f483b9
libvirt-daemon-driver-secret-8.0.0-8.1.el9.x86_64.rpm
617fa31bf039448fe270073ad7782dab56f4c2cd8a708ea0646543a33e912e48
libvirt-daemon-driver-storage-8.0.0-8.1.el9.x86_64.rpm
3f584c7f098459f8a1ec709f3c8617615491b771ab707e1dd7e97605cd9d00d4
libvirt-daemon-driver-storage-core-8.0.0-8.1.el9.x86_64.rpm
241f060f99e6c7a457767798a5da77429917d39540fefcc548ac48f2ceb61334
libvirt-daemon-driver-storage-disk-8.0.0-8.1.el9.x86_64.rpm
1e50a39e9b113264c7de701b045f0af7c5e1032c3fe6734f4ad852e638974a97
libvirt-daemon-driver-storage-iscsi-8.0.0-8.1.el9.x86_64.rpm
bba804a615351d9343b9f03620bc7632bfc668c380c50b2d82aa284fd4cde402
libvirt-daemon-driver-storage-logical-8.0.0-8.1.el9.x86_64.rpm
552828c36ed3e7e2cb4b685477c2a7bb6d0abde8979470d9452aaf4606767f91
libvirt-daemon-driver-storage-mpath-8.0.0-8.1.el9.x86_64.rpm
1142f3a7eb75a06be1b283cd0949909485f07bdd3f8d85c7bb421902627a1375
libvirt-daemon-driver-storage-rbd-8.0.0-8.1.el9.x86_64.rpm
a3c9159681c7550a287801f75e57bff3b3881ff727560159e63cba4378e8f7df
libvirt-daemon-driver-storage-scsi-8.0.0-8.1.el9.x86_64.rpm
b89de3978f33d9e5fe255483e7d075e6d4b37cb39dfd29ec46311c694e6f9277
libvirt-daemon-kvm-8.0.0-8.1.el9.x86_64.rpm
0554077fbb57de8ff86763fe2a23e299d510269a3660eff0f3e096d2530d3f12
libvirt-libs-8.0.0-8.1.el9.x86_64.rpm
041a093d57b29d79186482f0e181abe533a581bb10336669177757c5bf00fb8c
libvirt-nss-8.0.0-8.1.el9.x86_64.rpm
e72a3d30bcf3caeeebd1db0d760941cac22c99ae16f840d0e61f674f5c14e289
RLBA-2022:5262
lldb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lldb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LLDB is a next generation, high-performance debugger. It is built as a set of reusable components which highly leverage existing libraries in the larger LLVM Project, such as the Clang expression parser and LLVM disassembler.
* ppc64le: lldb loses connection with lldbserver (BZ#2079140)
rocky-linux-9-x86-64-appstream-rpms
lldb-13.0.1-3.el9_0.i686.rpm
14eac078e98ba2f3f50f5c80b8b21f246b5b54a95cfde01549b9a2164fffc7e5
lldb-13.0.1-3.el9_0.x86_64.rpm
29bcb3a5c2733933c325e89af900324116433fd8d6c65feb0d4c1a67a058d679
lldb-devel-13.0.1-3.el9_0.i686.rpm
084314fed7e5a21507c3804e3c8dbc2588aac97d51d52f86fe8e0ae541c086bf
lldb-devel-13.0.1-3.el9_0.x86_64.rpm
9130646f47d02627f0a0fb4039778b52e2efa0816b81b8d8669024352567669a
python3-lldb-13.0.1-3.el9_0.x86_64.rpm
846ce14c346f5a5225e91360bc218deb16405dc060dcd9cefddabe33f7b1ff28
RLBA-2022:5278
gnome-initial-setup bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-initial-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-initial-setup packages provide the Initial Setup application for GNOME, which allows for quick configuration of the operating system after installation.
Bug Fix(es) and Enhancement(s):
* Update timezone map (BZ#2099793)
rocky-linux-9-x86-64-appstream-rpms
gnome-initial-setup-40.4-1.el9_0.1.x86_64.rpm
29c3cb1264328cf1fef573fefe971df4bb4478a4573ebf6a95f613f545ffe8da
RLBA-2022:5375
libtimezonemap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtimezonemap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtimezonemap packages contain a time zone map widget for the GTK+ toolkit. The widget displays a world map with a highlighted region representing the selected time zone, and the location can be changed by clicking the map.
Bug Fix(es) and Enhancement(s):
* Update timezone map (BZ#2100451)
rocky-linux-9-x86-64-appstream-rpms
libtimezonemap-0.4.5.1-11.el9_0.1.i686.rpm
f24147be72682d75f7d6989de2a5bf4e0ffb49cbc096becf87f3e8ac11b28819
libtimezonemap-0.4.5.1-11.el9_0.1.x86_64.rpm
2b678931f5a40d97267cbd3d0d65ebf7c784ae84767903d058449d8b5c05d3b2
RLSA-2022:5716
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for
Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: OAuth account takeover (CVE-2022-31107)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-7.5.11-5.el9_0.x86_64.rpm
bed43fc28c1e3b5adb9cedd98fcfb5d497a2fef5a3a0ffd7c4e17fcc2991b48a
RLSA-2022:5799
Important: go-toolset and golang security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang, go-toolset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Clean up dist-git patches (BZ#2109174)
* Update Go to version 1.17.12 (BZ#2109183)
rocky-linux-9-x86-64-appstream-rpms
golang-1.17.12-1.el9_0.x86_64.rpm
de949845f936a45e13a53266f8e73ed761e7a995151a978d7c862b9f4d9f4115
golang-bin-1.17.12-1.el9_0.x86_64.rpm
7d8c78b0d43c040fe6628cb54044104b437cd3cf2ab2be983fca1c17b1554a05
golang-docs-1.17.12-1.el9_0.noarch.rpm
c5edbe53296c7b6aca91bafe3c35b2a6b87d88a75090a67c41f3c2448d165dfa
golang-misc-1.17.12-1.el9_0.noarch.rpm
ec766f14dd7085757646cc6a34c3603b3d04cc704f26ed225013f89c8e7a0c07
golang-race-1.17.12-1.el9_0.x86_64.rpm
86e6d2b2e191933032fe454c576a4182bee5313dd5948f47c9a8f3c81d035dfd
golang-src-1.17.12-1.el9_0.noarch.rpm
6768e808193c1df29b6c884def38a8ff6bcc8d524d5d34b339aa01fe034a334d
golang-tests-1.17.12-1.el9_0.noarch.rpm
0a8261818dc8a9424ad10a50c9b7d4d92a4d2ffa96271fd316d5061845c3bf95
go-toolset-1.17.12-1.el9_0.x86_64.rpm
e90e9179029077ec3201ad075fd3be19930ef4103d3fbaa283c205118ec2606f
RLSA-2022:5904
Important: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
php-8.0.13-2.el9_0.x86_64.rpm
b05b8dcae3dc8c3b94dd980d2ad8823a87d0633eccc70232d7ee12711bc7cf40
php-bcmath-8.0.13-2.el9_0.x86_64.rpm
42a0dde161fb5d072b0d066ab565082b15c6ce2ff3e416bfa250dec16b3beda8
php-cli-8.0.13-2.el9_0.x86_64.rpm
1321c2f68a1a719eb692744d96055b7866dc7416916ac486323e0e30043bb9ec
php-common-8.0.13-2.el9_0.x86_64.rpm
b08319f99eefbf0abbf26c5333ade446e250400224eac6730f5047664453f74b
php-dba-8.0.13-2.el9_0.x86_64.rpm
53cf4366b176a4b2145d094070de76c4ec30ca3c5d583629076ae55631edf585
php-dbg-8.0.13-2.el9_0.x86_64.rpm
f3136ab5fe91692cc983755189f8ff264ac31d25642bdaec95ffc5f11925cd6f
php-devel-8.0.13-2.el9_0.x86_64.rpm
71ae98ec6c20cf039ffedc4d0711f0a98f95c82434cf0e24c30750061e20f30c
php-embedded-8.0.13-2.el9_0.x86_64.rpm
c19345bb33b2c5dc3505061bc8f90c74eb175b4173fc07d4581ef7b98a75551c
php-enchant-8.0.13-2.el9_0.x86_64.rpm
632078f70a46a5f1bdcaaf8e2cb9135778749d1f91767549fe2bc5e5411281dd
php-ffi-8.0.13-2.el9_0.x86_64.rpm
a1cb316621500ecad7e7c8ce937f77cbdf88e0a5d99da4b45e6053b390df6639
php-fpm-8.0.13-2.el9_0.x86_64.rpm
6abf5ff4a650cf921cc4949a0fa95689dbff3f446255b335552d0541886fc4df
php-gd-8.0.13-2.el9_0.x86_64.rpm
60dabcdc680ac563a9ed88ac9f04279ff8bfeae143c8d5ad8b12db0b375844c1
php-gmp-8.0.13-2.el9_0.x86_64.rpm
608b0aa6d410ab0aea87b766b66e00e5d59a1e16ee07c2939bc5fc8ce015d2c9
php-intl-8.0.13-2.el9_0.x86_64.rpm
e4b9f1c0134155e96f8db86db3ffa0352876c9e4e38b8eeac9fbc3b4ae31e6b7
php-ldap-8.0.13-2.el9_0.x86_64.rpm
41cafe63bff52244ab50a973922d9957e6ae5a3f7a6296b13d1d22b5b0b20d0f
php-mbstring-8.0.13-2.el9_0.x86_64.rpm
5d07f220631e9d0f26eaa3084b263bc507f8d275cde3ba8a991aed16216610cd
php-mysqlnd-8.0.13-2.el9_0.x86_64.rpm
aaf855748b1128bb4da49956957249a6b99084e1bfd2715cef32e5af146172ef
php-odbc-8.0.13-2.el9_0.x86_64.rpm
4519ab5932dccbfaab953b2d24130b758b3c01f3d2e6b20c8a095faadc6a1446
php-opcache-8.0.13-2.el9_0.x86_64.rpm
43a7e045aad17369dae98ae0ee666b8e4c92361af39780e5bdbbba80f66a9668
php-pdo-8.0.13-2.el9_0.x86_64.rpm
1ac00f52c70d31f4c97a45fa9d5a0a9a31e8e00def24b286abac1ea42f912ad2
php-pgsql-8.0.13-2.el9_0.x86_64.rpm
d8e8dc693e7563d6d93646b3c73747fa39f08c3a976e0eb7cef6352c4a37f969
php-process-8.0.13-2.el9_0.x86_64.rpm
f756a1a35803f2c183a5bcf881a2f61751d34498159091072e8a689de134ebe3
php-snmp-8.0.13-2.el9_0.x86_64.rpm
c46e4bf45da150938cc45d0144a5486e5c74316f495912668749ccfa7452be3c
php-soap-8.0.13-2.el9_0.x86_64.rpm
2ba7ff76ffd84ab4a473cf5382bd437ecd4ec8c0566816333cf0d8f9ab159f7b
php-xml-8.0.13-2.el9_0.x86_64.rpm
5aa6b5fadb43a0abb753fe2cff590598d722def51c78a4b5eb5166d508a265b4
RLBA-2022:5946
rhc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
rhc is a client tool and daemon that connects the system to Rocky Enterprise Software Foundation hosted
services enabling system and subscription management.
Bug Fix(es) and Enhancement(s):
* Cannot install packages with package-manager worker. (BZ#2083361)
rocky-linux-9-x86-64-appstream-rpms
rhc-0.2.1-8.el9_0.x86_64.rpm
593d626a752e6b74849815e2ba5a8bc260e309a2764dbf16ba4f086b479d826d
RLBA-2022:5947
virtio-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtio-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers.
Bug Fix(es) and enhancement(s):
* virtio-win RPM for Rocky Linux-9.0.z (BZ#2082607)
rocky-linux-9-x86-64-appstream-rpms
virtio-win-1.9.28-0.el9_0.noarch.rpm
e551782527c8123c63ea60a0a08693fbfffd0dceaa1026dfe2669e57249d61fb
RLBA-2022:5949
fapolicyd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system.
Bug Fix(es) and Enhancement(s):
* Faulty handling of static applications (BZ#2097734)
rocky-linux-9-x86-64-appstream-rpms
fapolicyd-1.1-103.el9_0.1.x86_64.rpm
178ca47fb8efb9038744cf777276cda6c8aba100391001f0c339d4e5c82dccf3
fapolicyd-dnf-plugin-1.1-103.el9_0.1.noarch.rpm
e262f3d189014f2a7fca9f8c1cb4f69f363ebd67dee9891dbe98621cbbbd47ab
fapolicyd-selinux-1.1-103.el9_0.1.noarch.rpm
2424d02dc33c2d04fa1da7ecaf4263e0ed3354738c3fef925b8fc195a6defdaa
RLBA-2022:5950
Rocky Linux-system-roles bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Rocky Linux-system-roles package includes a collection of Ansible roles and modules that provide a stable and consistent configuration interface for managing multiple versions of Rocky Linux.
Bug Fix(es) and Enhancement(s):
* storage role raid_level "striped" is not supported (BZ#2098223)
* storage role cannot set mount_options for volumes (BZ#2098224)
rocky-linux-9-x86-64-appstream-rpms
rhel-system-roles-1.16.2-1.el9_0.3.noarch.rpm
cb32503e5bdc9b3248b5bc1cb2a6be4afe2e2398eeca3c50f7d8247ff826a98b
RLBA-2022:5951
podman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Bug Fix(es) and Enhancement(s):
* podman implements and/or uses the deprecated SHA-1 algorithm by default (BZ#2069279)
* Regular rebuild for 9.0.0.2 (QR) - podman (BZ#2111620)
rocky-linux-9-x86-64-appstream-rpms
podman-4.1.1-1.el9_0.x86_64.rpm
35ff8b02c2bf95f493cdebb64759d75ac9b7fca7adca48d10103f36d40149e65
podman-catatonit-4.1.1-1.el9_0.x86_64.rpm
10e0dd9a34d190cb3df586306d8e2de8bef40436a219df8e6aac2b351bc58005
podman-docker-4.1.1-1.el9_0.noarch.rpm
18a96274fc27dcc07f9c296b3065c71861976de1678ef86830cc00cab0d16fc0
podman-gvproxy-4.1.1-1.el9_0.x86_64.rpm
74b6516e1dd9e0c9eef5dc0ee03fa46a2817d80553a792b9d55b45980e177dc9
podman-plugins-4.1.1-1.el9_0.x86_64.rpm
6ab744728aafb476a5c645ddf9dbec1887163fe689004f8ba1b204c6ac659665
podman-remote-4.1.1-1.el9_0.x86_64.rpm
97074a18f266afc51538f5be0036b1443cc71c4ad40d217aa54841bd21eb95af
podman-tests-4.1.1-1.el9_0.x86_64.rpm
6a2f966c7a62d3eb400ba2923d32a27de4daa9dbfa22d678ea5406524fd2a849
RLBA-2022:5952
crun bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The crun packages contain a runtime for running Open Container Initiative (OCI) containers.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - crun (BZ#2111621)
rocky-linux-9-x86-64-appstream-rpms
crun-1.4.5-2.el9_0.x86_64.rpm
9bf534ce38fe7bcf2d57a7f8b1dc4f9d2944f1c4f47be64dc688b3bf0df2fed8
RLBA-2022:5953
containers-common bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - containers-common (BZ#2111737)
rocky-linux-9-x86-64-appstream-rpms
aardvark-dns-1.0.1-36.el9_0.x86_64.rpm
16eaca5d5dc6d118e2c19e36a7e7929b60b996a3234d7fd9ace7b9db3c698830
containers-common-1-36.el9_0.x86_64.rpm
e1ce83fbbaf5d2f528aee4878270f46bb8afc50460f671c5fbb6bfe95852686f
netavark-1.0.1-36.el9_0.x86_64.rpm
a5cae22c83b55097b05b661210ac1319ef9fa5300e633e459caa52a0e9af0c08
RLBA-2022:5955
conmon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conmon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The conmon packages provide Open Container Initiative (OCI) container runtime monitor.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - conmon (BZ#2111624)
rocky-linux-9-x86-64-appstream-rpms
conmon-2.1.2-2.el9_0.x86_64.rpm
702443c7438dcd81926c3a03e47bbe806e4846c0cbd0d2828d34b27c38fe487f
RLBA-2022:5956
container-selinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-selinux package provides SELinux policies for container runtimes.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - container-selinux (BZ#2111625)
rocky-linux-9-x86-64-appstream-rpms
container-selinux-2.188.0-1.el9_0.noarch.rpm
96d3a993976aa93f0093efd167a9dc6b58c020c4e0877b67543693dfb9f1bee8
RLBA-2022:5957
buildah bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides command line tool for creating Open Container Initiative (OCI) Images.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - buildah (BZ#2111601)
rocky-linux-9-x86-64-appstream-rpms
buildah-1.26.2-1.el9_0.x86_64.rpm
b7dc8d502041ce859a17b900358f53dd17980e0150cd2f72e09b771ddef0ee00
buildah-tests-1.26.2-1.el9_0.x86_64.rpm
ee6c7dd50858872c10830ade26c1f8652583399fcdf4733e4dbffbcd7de5eed6
RLBA-2022:5958
skopeo bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo packages provide command line utility for inspecting images and repositories directly on Docker registries without the need to pull them.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - skopeo (BZ#2111623)
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.8.0-4.el9_0.x86_64.rpm
ff9cb6e770993c9b43480465f8bb486518cbf228731e47522f3d8ba37f1be02a
skopeo-tests-1.8.0-4.el9_0.x86_64.rpm
e436caf4290fc6d68c1a0a14a4475b6914ee2987f001428736e09d420f6f1074
RLBA-2022:5959
oci-seccomp-bpf-hook bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for oci-seccomp-bpf-hook.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The oci-seccomp-bpf-hook packages provide a library for applications looking to use the Container Pod concept popularized by Kubernetes.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - oci-seccomp-bpf-hook (BZ#2111626)
rocky-linux-9-x86-64-appstream-rpms
oci-seccomp-bpf-hook-1.2.5-2.el9_0.x86_64.rpm
723cc9e671ba7376b66b617349183e44dd6af73add86132714dc2ad8c1fcd0a1
RLBA-2022:5964
nmstate bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host
networking settings in a declarative manner and aimed to satisfy enterprise
needs to manage host networking through a northbound declarative API and multi
provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* Support OVS rx_queue in Nmstate (BZ#2100471)
rocky-linux-9-x86-64-appstream-rpms
nmstate-2.0.0-5.el9_0.x86_64.rpm
de1a54ab6cab55e9f1a1110a9151e5fbf8691a29967bcdc2f71be1debbf22680
nmstate-libs-2.0.0-5.el9_0.i686.rpm
80758b4edfa7bb94c361b1887c17b356c97fdefa2ca58a3be15f43fc62c07f6b
nmstate-libs-2.0.0-5.el9_0.x86_64.rpm
33f4f382d6e810a14f412bc5ba1e63dc873b28d7e4842b5b9fb741d174d010af
nmstate-plugin-ovsdb-2.0.0-5.el9_0.noarch.rpm
f86047eba7932bc0f7c890aebac01443ab88937fe462d5f1a8765e8c8f93a738
python3-libnmstate-2.0.0-5.el9_0.noarch.rpm
c8ec97e21fc5e73bc93963c177a955414b33e53dd8727a5c7e49f0d9e849b8cd
RLBA-2022:5960
runc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Bug Fix(es) and Enhancement(s):
* Regular rebuild for 9.0.0.2 (QR) - runc (BZ#2111622)
rocky-linux-9-x86-64-appstream-rpms
runc-1.1.3-2.el9_0.x86_64.rpm
652547c45184447ad29fcce7495764de8e68e1fadd2080342b578aa5531a3a68
RLBA-2022:5965
edk2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual
Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Bug Fix(es) and Enhancement(s):
* Add Rocky Linux 8.5, 8,6 and 9.x machine types to firmware descriptor files 50-edk2-ovmf-{amdsev,cc}.json (BZ#2109988)
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20220126gitbb1bba3d77-3.el9_0.1.noarch.rpm
af5b9043dcd31aa7ac3a4fa92ab67afc86647c95de3f958fe249ef9edc55393e
edk2-ovmf-20220126gitbb1bba3d77-3.el9_0.1.noarch.rpm
16db6e9ce1a016b0092ab91faa739c430c5847f3dc50a99548a7a0a218971607
RLBA-2022:5966
alsa-plugins bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The alsa-plugins packages contain alsa library extensions for the Advanced Linux Sound Architecture (ALSA).
Bug Fix(es) and Enhancement(s):
* Add alsa-plugins-pulseaudio to Appstream (BZ#2112090)
rocky-linux-9-x86-64-appstream-rpms
alsa-plugins-arcamav-1.2.2-8.el9_0.i686.rpm
ccda1efaa0420b6008ef634d7caf9d5dd0c49f3a894753492e7bb3610b46fb59
alsa-plugins-arcamav-1.2.2-8.el9_0.x86_64.rpm
454f5224880980b8a0bf3a8ed8c498ba7a735fc821cbf9c9a32fefd78580f1a8
alsa-plugins-maemo-1.2.2-8.el9_0.i686.rpm
2110bedea68f352b1d2457d32acc4086de4bf1072fdbabfb0bd4db9b41c6bd45
alsa-plugins-maemo-1.2.2-8.el9_0.x86_64.rpm
c3756c252860a3d381f4beb9db6c48376f32d0df3f0b383f4887349593d48b3b
alsa-plugins-oss-1.2.2-8.el9_0.i686.rpm
2332961a6006332da74cfd64870cdcad8cc3a356b077e077bb5810dd71683230
alsa-plugins-oss-1.2.2-8.el9_0.x86_64.rpm
3ff360ff6f3e17f1c24461953b1068465921dee5f50a0c49d15f8ef8ee245d22
alsa-plugins-samplerate-1.2.2-8.el9_0.i686.rpm
1f33c5b051cceaf11fef37b1d7c965a0cb58299b77b368895d8e01e176a43433
alsa-plugins-samplerate-1.2.2-8.el9_0.x86_64.rpm
f7ee360416054d788fd4b9ec8f3cda1b925dcec8c1bae198d0e93f1bb9d4a296
alsa-plugins-speex-1.2.2-8.el9_0.i686.rpm
e25d1801bd7865c8e90f61dd7e0061895a7e1dee40404d6232eea097e2dfe6b3
alsa-plugins-speex-1.2.2-8.el9_0.x86_64.rpm
38d677d43b2950d8e73b1d7134b4b2bfc7703337af4911738938bcf76da77b7b
alsa-plugins-upmix-1.2.2-8.el9_0.i686.rpm
535b3c8e389515fbc239d64f1b37e6205dd23db46539dec8a20121ea58a1b2ee
alsa-plugins-upmix-1.2.2-8.el9_0.x86_64.rpm
a07b145da0f3aa94163a4c78c5f0adc4a89c05fd1748fc99c63c9a99de64bfbc
alsa-plugins-usbstream-1.2.2-8.el9_0.i686.rpm
584ddd374e26c5132b22dc89cf28ffcbde25adb1c157125a440f7e5007aa7c63
alsa-plugins-usbstream-1.2.2-8.el9_0.x86_64.rpm
14611265e462e34526532b953eca427c506e6a2797cd417f58996307046a44ff
alsa-plugins-vdownmix-1.2.2-8.el9_0.i686.rpm
28cfca75031e6f1c2ec20f197346b1612cabbbbef35ff21998f3bb7303e1dea5
alsa-plugins-vdownmix-1.2.2-8.el9_0.x86_64.rpm
5307779a4a185fe871e454f1483ab446ccdd6408e7893058d72bdf9bcfdd2b86
RLBA-2022:6004
qpdf bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qpdf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
QPDF is a command-line program and a library that does structural, content-preserving transformations on PDF files.
Bug Fix(es) and Enhancement(s):
* FIPS breaks pdftopdf and bannertopdf. (BZ#2106940)
rocky-linux-9-x86-64-appstream-rpms
qpdf-libs-10.3.1-4.el9_0.1.i686.rpm
272a784dd72f5eb8cdae831031c57b825d8204bd3e0d48d7da6e84d194966397
qpdf-libs-10.3.1-4.el9_0.1.x86_64.rpm
e8859c50f3a854095adb85a4f5a1d48f26a26eda22551aa73e5dcec49a039092
RLBA-2022:6070
vulkan bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The vulkan packages contain the reference ICD loader and validation layers for
Vulkan, a graphics and compute API for cross-platform access to modern GPUs.
Bug Fix(es) and Enhancement(s):
* Rebase vulkan-loader for 9.1 (BZ#2070308)
* Rebase vulkan-headers for 9.1 (BZ#2070309)
* Rebase vulkan-tools for 9.1 (BZ#2070310)
* Rebase spirv-tools for 9.1 (BZ#2070311)
* Rebase spirv-headers for 9.1 (BZ#2070312)
* Rebase vulkan-validation-layers for 9.1 (BZ#2070313)
* Rebase glslang for 9.1 (BZ#2070314)
* Rebase shaderc for 9.1 (BZ#2070315)
rocky-linux-9-x86-64-appstream-rpms
glslang-11.9.0-2.el9_0.x86_64.rpm
c8dbccc607a27a387e608a02b99c5abf05ab5e6f1ff24ac0d667fba7f8b60510
glslc-2022.2-1.el9_0.x86_64.rpm
a6798010b73847c8ceb4f3d15126146aa6affe6547db6490eb517cd1f8c04a0f
libshaderc-2022.2-1.el9_0.i686.rpm
16797c0755e1d93243695d42e1ce7c20f7b9c01c1356c94e383888297bd636c9
libshaderc-2022.2-1.el9_0.x86_64.rpm
9689c3e7dd99fc5cfe8f3fe8cee2ed638914a118e5708315686bd3b9206022dd
spirv-tools-2022.2-2.el9_0.x86_64.rpm
6478564b9511ebac66c35bf147dcc569eb4ae5158ab93d88526692b76fa62c50
spirv-tools-libs-2022.2-2.el9_0.i686.rpm
367df804739336229b392330627d1fde218fef969e7858b307974d5e6292a68a
spirv-tools-libs-2022.2-2.el9_0.x86_64.rpm
2d04b2afc5e659f6efb6fd00cdc38c5eba4ce6ffbd6cd63cb2dc3913bd5c8e25
vulkan-headers-1.3.216.0-1.el9_0.noarch.rpm
8eafab57b219f294b411742436ccaff622b6093713ed719f71a5e5817031a2e9
vulkan-loader-1.3.216.0-1.el9_0.i686.rpm
e436daa9d614a268e545cdf2f54d6c5483ad12f4c43549b5ecb4227f205d0b6e
vulkan-loader-1.3.216.0-1.el9_0.x86_64.rpm
6453bc72ad99907388d7488970d8de6cc9167fde33e745895ffa8caed3af9d3b
vulkan-loader-devel-1.3.216.0-1.el9_0.i686.rpm
d63fba1a0416f9da918a3c3639a0a19e99a59f65b7ea629c19f118ed5d8441e1
vulkan-loader-devel-1.3.216.0-1.el9_0.x86_64.rpm
5264d8556294f1cc5ff759df81d71a5e50930d4e266f72432632133e7532c2f8
vulkan-tools-1.3.216.0-1.el9_0.x86_64.rpm
94e5475a8056e5b6a82132b864ed489acd2a208786d4b11f2d24ef02b4664d32
vulkan-validation-layers-1.3.216.0-1.el9_0.x86_64.rpm
50add2e56f3ba889c33fb9546989ff3b00ea814abfc26fa78ce8bc48c42ebb12
RLBA-2022:6130
gnome-kiosk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-kiosk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Kiosk provides a desktop environment suitable for fixed purpose or single application deployments like wall displays and point-of-sale systems.
This update provides a new subpackage, gnome-kiosk-script-session, to aid in deployment of kiosk sessions using gnome-kiosk (#2119427).
rocky-linux-9-x86-64-appstream-rpms
gnome-kiosk-40.0-4.el9_0.1.x86_64.rpm
78d5e5cf20ed651e34938c1ce2327878521fa64e77179ed835a5b5bddb880297
gnome-kiosk-40.0-4.el9_0.1.0.1.x86_64.rpm
3b5fe97407268d86c0090601c0f86ce2e2ca4a6b8268fa0985430145e1e13948
gnome-kiosk-script-session-40.0-4.el9_0.1.0.1.noarch.rpm
2ed3016d9661c036a75165d23a3d4164041fb59fa2e6ed9f43e7a85b789a4ee1
gnome-kiosk-search-appliance-40.0-4.el9_0.1.0.1.noarch.rpm
ba70cb9a4ebad087da5bb73caec55285a90b1aa39c012192e11f06e8b915ab28
RLSA-2022:6358
Important: open-vm-tools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.
Security Fix(es):
* open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm
14e870f20c2163ba1fc314a3ce818378e2330409dca36831cf16dc2d69721ff1
open-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm
4950860a38fee70512c079aac8dde7d1a56eba6ce0f38f17d183864e251c8761
open-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm
964296337de92413cbb489b72929346acadf4f8e6b82a51cfa82577148af750f
open-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm
255dd0ab249f1a1056c37b161248982d60ce8cb518a68bed0b4d50e390994111
RLBA-2022:6584
gnome-settings-daemon bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings.
Bug Fix(es) and Enhancement(s):
* System registration via GUI with activation keys fails with "Unknown arguments: dict_keys(['enable_content'])" (BZ#2113960)
rocky-linux-9-x86-64-appstream-rpms
gnome-settings-daemon-40.0.1-7.el9_0.x86_64.rpm
aeda0508fe0e3fd5a7ade34794d30b6cc6a303eb8de402ec6e89fd561cee275e
RLBA-2022:6587
qemu-kvm bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux
on a variety of architectures. The qemu-kvm packages provide the user-space
component for running virtual machines that use KVM.
Bug Fix(es):
* PXE boot crash qemu when using multiqueue vDPA [Rocky Linux-9.0.0.z] (BZ#2095795)
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-6.2.0-11.el9_0.5.x86_64.rpm
93383b2331d7d32c4c45d4fb870ec4c2fb27aef9328f9982a085359819798e62
qemu-img-6.2.0-11.el9_0.5.x86_64.rpm
2a8e2f2caf06d45741d5e98c5b9220f5b62bf4bd1918248fe227f00f66ad8808
qemu-kvm-6.2.0-11.el9_0.5.x86_64.rpm
1ef6f75677e436d9329e30c535a26d8410db39475cb23565fb499c409df64f0e
qemu-kvm-audio-pa-6.2.0-11.el9_0.5.x86_64.rpm
58b93849fc630484d86c2b6160488b856a7e9c989d1b912a54fc521ccc1f0ac7
qemu-kvm-block-curl-6.2.0-11.el9_0.5.x86_64.rpm
3d2dc6eaf791fb0045b7b2b7fecd8712a5628ba811c644074c0359c419dea5ae
qemu-kvm-block-rbd-6.2.0-11.el9_0.5.x86_64.rpm
d977e1f4752af7bc5c1f39a3989fc3b52e774d8c6c566e5eeee89db941c8cbd6
qemu-kvm-common-6.2.0-11.el9_0.5.x86_64.rpm
14a837db353157c996737cd619032c466b159e9d6e84be858d171de9f69f8ecc
qemu-kvm-core-6.2.0-11.el9_0.5.x86_64.rpm
920383963a526d27380cc655c064740e0fc1296e6e414625b457d2cf3e0c0a22
qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.5.x86_64.rpm
578e2b3f23ee17c56f9bd8ef2ac82069e052daedb5999c02020ddc08cb4c9ca5
qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.5.x86_64.rpm
83948fe3930c1fd014efc6a70049ad458bc9e63aeb37afb0ded3eddec4aa5647
qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.5.x86_64.rpm
8e98b8f8bd22dd61e1306fe6522afec9ebc3f2a89321e126caef22195d64c685
qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.5.x86_64.rpm
6f1676ec9fa11cadf16e024cc8b376a6e81f2375b4c5402b864051e1732d274f
qemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.5.x86_64.rpm
0036b818100164a114c63c7542afd630226bf2dce36de548870ee5c32978bedc
qemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.5.x86_64.rpm
8e9ad994a1eff2f1091f6a44083d3c63e01b09606b3f570e8072ddbd5ece64b3
qemu-kvm-device-usb-host-6.2.0-11.el9_0.5.x86_64.rpm
76f8f21e2be7d2488b25be02848aa901e26f52af51152d5a0ca4e5458dd80799
qemu-kvm-device-usb-redirect-6.2.0-11.el9_0.5.x86_64.rpm
b795e9986ae9260b1594bd3e43a8abb64d26eb7f732058e4d7b7c57c31303d52
qemu-kvm-docs-6.2.0-11.el9_0.5.x86_64.rpm
59125cb22cb75e0438b2798453d81f7b1bfdb8f2bf10e7f09fbfaee21e074847
qemu-kvm-tools-6.2.0-11.el9_0.5.x86_64.rpm
b3186b5560ba388af9c0a5e64c19b9adfa99347d05912c6ae6af32ef783a9980
qemu-kvm-ui-egl-headless-6.2.0-11.el9_0.5.x86_64.rpm
c24f8cefc331806e19a257351cdcf3cc806da74305a31fc1a55443a871149107
qemu-kvm-ui-opengl-6.2.0-11.el9_0.5.x86_64.rpm
a2c3965b155eb9187e3de84399c12a76e1da2327690cc52f952e71dcf68ec0b5
qemu-pr-helper-6.2.0-11.el9_0.5.x86_64.rpm
24d34b8b0699bb97e63b942c1927459aa888ae37e5ef60c74752fe24869d5409
RLBA-2022:6589
cloud-init bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix(es) and Enhancement(s):
* cloud-config will change /etc/locale.conf back to en_US.UTF-8 on Rocky Linux-guest-image-9.0 (BZ#2096196)
rocky-linux-9-x86-64-appstream-rpms
cloud-init-21.1-19.el9_0.4.noarch.rpm
f035c37a384bfd3e18f2fec0d9525abf2ea4d79fe322cf02bd2a05b7ed155f1b
RLSA-2022:6595
Moderate: nodejs and nodejs-nodemon security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.16.0), nodejs-nodemon (2.0.19). (BZ#2124230, BZ#2124233)
Security Fix(es):
* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)
* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace (CVE-2022-29244)
* nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212)
* nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213)
* nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214)
* nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215)
* got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: Rebase to the latest Nodejs 16 release [Rocky Linux-9] (BZ#2121019)
* nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2124299)
rocky-linux-9-x86-64-appstream-rpms
nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm
baae7248b9111a1bd6870c8c17318226d48283fe5b2cd0102c46d830785e3dc0
RLBA-2022:6593
conntrack-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conntrack-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use.
Bug Fix(es) and Enhancement(s):
* conntrackd returns "[ERROR] unknown layer 3 protocol" (BZ#2127125)
rocky-linux-9-x86-64-appstream-rpms
conntrack-tools-1.4.5-10.el9_0.1.x86_64.rpm
dc8538ac8a282ea0df3c6ad324daaa077aed5e462e2423e464150d2ddfcf3835
RLSA-2022:6634
Moderate: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7).
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el9_0.i686.rpm
872b916490cc40108fd646d386af4c2a2a65df975babd39b69ad13b1ec4bc3c0
webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm
e196bbdf8a915a6b6d5b348fdeeb7a597035df53cca8541e6b1e4d6da17f5813
webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm
f15a6f3822973260c1975eff5865e284b7aecc1aa2de852f4ef510bfa2a2b523
webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm
ab748c506ccdedf9666698214f327e6d52006444d4e384bf6ffc8f567ac1dde6
webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm
dd6da27e90d7d78e50c7398e68f3994404f215c4827a3d77ea4c0e8d351d3200
webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm
9c260995745c498ce2fc385a03fae62f2e4e37c31678cc143a503fe3a206fbf2
webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm
4de3e869e81cddee604debd719935b340695560e4fd3bff21881ee98ed5fc632
webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm
4f4a8b5bdfe76b2e9dae8776c316c370601a984175cc6f698e3da5ca9d1af02b
webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm
d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360
webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm
f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795
webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm
ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439
webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm
b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496
webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm
43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3
webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm
543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm
671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm
29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca
RLSA-2022:6763
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-1.el9_0.1.x86_64.rpm
2d26d4d035be28042465c476bc28833033ffb34c2e5ae9ad6c695995816e87b1
bind-chroot-9.16.23-1.el9_0.1.x86_64.rpm
74cd4a2085d301225fa285f45ea7a14a3a8dcba1c0cd23a27f74f6b34adc4843
bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm
be6b79a1404d7949e534caa844871fa6c78f6b9149f1193a478c02e37e02bb91
bind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm
1e901b5474c96d3c5949f866bc87d5af5b9cbd6c03598dee38c9a0bc438df16e
bind-libs-9.16.23-1.el9_0.1.x86_64.rpm
1b0fb7295537b47953c09d7d2dbf1ce26d6aed622c21318e6e513bcedc970146
bind-license-9.16.23-1.el9_0.1.noarch.rpm
acbe4a59bfc223de0f9135924140f253713be5432ad8b885412dc1b4ae67cd39
bind-utils-9.16.23-1.el9_0.1.x86_64.rpm
8e24bf54cda11c22bbce58d299c6da28853abfc182edeca3406cd78e2213e703
python3-bind-9.16.23-1.el9_0.1.noarch.rpm
932f0052d8d1176dae602955dfdf8464fd11ce03c650309ddc6b6d3a78388bbe
RLSA-2022:6839
Important: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.2-1.el9_0.2.x86_64.rpm
784ed4400d815935cfb84b9c09442ac6304b2ded5b240e726b6a95a3b8d96a96
RLSA-2022:6913
Moderate: .NET 6.0 security and bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10.
Security Fix(es):
* dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm
0745ac5a604765033c10528e9331a92804e823cd13e1458c22dbe365fdc89974
aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm
107485dc5f876aa30882ce388e7969a5b6753741e062444ddf557eae4ad183a2
dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm
b77e5e0af328d3e96e666e900215c1d38439b24f639baee1054e995d17a88f48
dotnet-host-6.0.10-1.el9_0.x86_64.rpm
5d9d9579ea8910ddef699322d27044930e71ad8b5bb91ceae70bfbe6207bf538
dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm
5685658913ea505987c2da26d474ffa3dcaf3af56289eb4bc496c7e09d7c0df7
dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm
872bbdea053a3d2f3e764e7056f4f6cf2f14ad068e45e1ef47b2bc7523932253
dotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpm
f3c5d2fb50c4b452e11efd7dc3c4ce0fabe8715ff2d13796a83e03ec569ec2d2
dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm
f5312bcb2659439826f8bd82278f0d0bc2efb433f8b87ed4418bc3810381d3c0
dotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm
c585d34fed556b39355bd1bd3b1326b69898a5d2bce57d81df90672d8fb39190
netstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm
d17c751115d5daaf74f95c001180295dae1943343ce1ef80cd72323915ff6cac
RLSA-2022:6963
Important: nodejs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.17.1).
Security Fix(es):
* nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255)
* nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
nodejs-16.17.1-1.el9_0.x86_64.rpm
2278e79f3aadaa28931de78db9e890ac82553acc8ba380433a5a6fa131036cd6
nodejs-docs-16.17.1-1.el9_0.noarch.rpm
adcce25d4697191527b4c4908e1617343f61e6d9a3998699f9e7ef52b71ded55
nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm
b61a8d920ae8f4ef3e8769fc5506a519100cfc743ebe1fa9b5c2076d7247033b
nodejs-libs-16.17.1-1.el9_0.i686.rpm
19cbad9719b729bdaa4d2df0c96a70996cb55ccbc88de8f9e56b1d82eac12650
nodejs-libs-16.17.1-1.el9_0.x86_64.rpm
bb526a53a4b5e3fa1a3452af1faf4f21d892074e594b61f4e5862d99281d0c9c
npm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm
54356bd5e3d79f3f2d8835808baedf471ef4440027871c1e63e941af02578daa
RLSA-2022:7007
Moderate: java-1.8.0-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm
abada409bd9bf98cbd218078a91ed9ad327d93a8455913ce1f7c4e4b19e9d740
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm
fe446cc4177b5fddbbff5acebd761c85362300a0049e0c03fc75e0b89e659a17
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm
8930b34d8ec3292a1c77070c163a885c7dee35fc9de97d3b4227783d0687a02c
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm
82c4767f34d650089e3529a6bbe1415f170ce05364cb8d3a64a62115ea7af99b
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm
04320449a5be8ac2a7584ff1ccd7fcab82707df2abef3a664819152670d9549e
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm
5e35c84d89f3e291c02fef7ad562135b30e4f94e421d40f285c6898b74c8469b
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm
d35cc3a8ea603db0ad18aa0e6cf25bf62cd34221df120bd0de12f92e9356b771
RLSA-2022:6999
Moderate: java-17-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-9] (BZ#2132934)
rocky-linux-9-x86-64-appstream-rpms
java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm
46acc4abfad0f661fa4d8027d9e7a19fdfa2f505886a355ef6bd0f88c5c174fc
java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm
bbb695a9d23499bb43bc329daf4896647c2393f9a729c10cf586eb336ae6ffd1
java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm
fa7125878fe5bc61c502dd4e8b1cdc7b09f4f29be1d6812f911ce6cbb03463c3
java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm
ff00e96f980f7d4baf9d5f1a7da903852422f9af55fb60bf5298e571fcfcdabb
java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm
7eb53a717f2c7506cceb468ecb3f0b935051aac0b2d6ce2c3dd137af76274dad
java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm
8980f7b36ff8f91233c6aac845d44afd797b3930875083e43a046eb9a47c371b
java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm
65b9548ecde39e55707cdc0af9a7da4e64b3cf4117be0251df0c11163117b926
java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm
51d02ef14be0e37f9bd3919d0a2e65dcdb95a934ac5de4fe6c30024945c31ab2
java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm
9d3c5dc1331c348d415834bb32888412482a5bd3056c111ca675cff8104fec42
RLSA-2022:7013
Moderate: java-11-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-9] (BZ#2131865)
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm
893816e958bccf06147219a0b371d7701115eaa5ef2364d5b83ea195da0ef942
java-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpm
21746432ed09d1f36b0b9f73fd15ee9d9e0f5c92c5a041fbbfce701d6ca5365f
java-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpm
18c10cc300fef70ecd579c4d3ad01dc2ad38f4339ec399a5e6b925d0374f9223
java-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpm
7322c3ca6c8c48920cf99e788ba6a68cedd2c711d8eb8ecdbfdcf8d7979eaab5
java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpm
d0972417ffe7d14ab87ceddde1e8d8f43bf9cfad5035bc42866642339f494c6f
java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpm
d446e7f03ba2742157d30d53e563347b710f441162dbfe85ad39c4576a14602b
java-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpm
f89c9553c55791d48f49968a6eef07dc5a98d03888cc96535c27e9b63006065b
java-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpm
c976c8b472d40cd92e2d5f1c97d718ddbd14d971ba5e9a7b57073ffbc51f7ead
java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpm
94caf27f12c22e2d48e68cf354c652f3290d82cc93c01f66f433beec546b4969
RLBA-2022:7327
ansible-freeipa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-freeipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management.
Bug Fix(es) and Enhancement(s):
* Creating a POSIX trust agreement using 'range_type: ipa-ad-trust-posix' in ansible playbook is not honoring 'range_type' (BZ#2132968)
* [ansible-freeipa] Installers: configure sid generation in server/replica installer (BZ#2132971)
* [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132977)
* ansible-freeipa Replica Install Setup DNS fails (BZ#2132991)
* ipaconfig does not support SID and netbios attributes. (BZ#2132997)
rocky-linux-9-x86-64-appstream-rpms
ansible-freeipa-1.6.3-2.el9_0.noarch.rpm
e56602ce3d3535d54dc1901bc4ca49ff5479c22101ab2a8790a849d1f27fe423
ansible-freeipa-tests-1.6.3-2.el9_0.noarch.rpm
e22bc6c31205fb1a3ff9999ead5cc89a0ba1c3abd8dc0644bcb581846320a1f9
RLBA-2022:7328
virt-who bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-who.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate.
Bug Fix(es) and Enhancement(s):
* virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2127044)
rocky-linux-9-x86-64-appstream-rpms
virt-who-1.31.22-2.el9_0.noarch.rpm
ce10f96abec24b76307cdca5012a57725d103a8637b024426f1a036122ba8197
RLBA-2022:7333
rhc-worker-playbook bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhc-worker-playbook.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rhc-worker-playbook is a Python-based worker for Rocky Enterprise Software Foundation connect, used to launch Ansible playbooks via Ansible Runner.
Bug Fix(es) and Enhancement(s):
* rhc-worker-playbook throws "DeadlineExceeded" errors and fails to send playbook execution status back to the cloud (BZ#2137008)
rocky-linux-9-x86-64-appstream-rpms
rhc-worker-playbook-0.1.8-2.el9_0.x86_64.rpm
c7a0dbf833a461a76e223c8da4ac8cb438c76d3ee01aaaa064fe0367ce875619
RLSA-2022:8054
Moderate: webkit2gtk3 security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el9_0.i686.rpm
872b916490cc40108fd646d386af4c2a2a65df975babd39b69ad13b1ec4bc3c0
webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm
e196bbdf8a915a6b6d5b348fdeeb7a597035df53cca8541e6b1e4d6da17f5813
webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm
f15a6f3822973260c1975eff5865e284b7aecc1aa2de852f4ef510bfa2a2b523
webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm
ab748c506ccdedf9666698214f327e6d52006444d4e384bf6ffc8f567ac1dde6
webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm
dd6da27e90d7d78e50c7398e68f3994404f215c4827a3d77ea4c0e8d351d3200
webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm
9c260995745c498ce2fc385a03fae62f2e4e37c31678cc143a503fe3a206fbf2
webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm
4de3e869e81cddee604debd719935b340695560e4fd3bff21881ee98ed5fc632
webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm
4f4a8b5bdfe76b2e9dae8776c316c370601a984175cc6f698e3da5ca9d1af02b
webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm
d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360
webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm
f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795
webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm
ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439
webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm
b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496
webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm
43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3
webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm
543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm
671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm
29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca
RLBA-2022:7092
java-1.8.0-openjdk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 9.1 GA. The original builds for Rocky Linux 9.1 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 9.0.
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm
abada409bd9bf98cbd218078a91ed9ad327d93a8455913ce1f7c4e4b19e9d740
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm
fe446cc4177b5fddbbff5acebd761c85362300a0049e0c03fc75e0b89e659a17
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm
8930b34d8ec3292a1c77070c163a885c7dee35fc9de97d3b4227783d0687a02c
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm
82c4767f34d650089e3529a6bbe1415f170ce05364cb8d3a64a62115ea7af99b
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm
04320449a5be8ac2a7584ff1ccd7fcab82707df2abef3a664819152670d9549e
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm
5e35c84d89f3e291c02fef7ad562135b30e4f94e421d40f285c6898b74c8469b
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm
d35cc3a8ea603db0ad18aa0e6cf25bf62cd34221df120bd0de12f92e9356b771
RLBA-2022:4030
new packages: libreport
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreport.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libreport-2.15.2-6.el9.rocky.0.2.i686.rpm
c38686e3614b77ed2922ae4fca255249e8af48e219a756c1715064dc7ca9b5d9
libreport-2.15.2-6.el9.rocky.0.2.x86_64.rpm
022488dbe01df2f8d818b9a856bf245a2e6a6f334b53edd16c6211db69a50ca9
libreport-anaconda-2.15.2-6.el9.rocky.0.2.x86_64.rpm
690c68b193d87653fc8af880cfbe9137a8ba1773e3300db8879ebaf9b259ebf6
libreport-cli-2.15.2-6.el9.rocky.0.2.x86_64.rpm
8bfa81ef801e4cbfb1f019b2ea2351428af897c7b4f5d69a6831f757520d4911
libreport-gtk-2.15.2-6.el9.rocky.0.2.i686.rpm
6d091d1edf3c38036bc967ec69a3d8fe432e118f6d16d8befedafb70a07d0b8d
libreport-gtk-2.15.2-6.el9.rocky.0.2.x86_64.rpm
0eb7dc3ae9c2fde8716247315f7903eeb4fa8af0b658eb23a340c9df0421ed4e
libreport-plugin-bugzilla-2.15.2-6.el9.rocky.0.2.x86_64.rpm
37eea7b13a977bdbef9a903abe53892c0aa882d4dafe55d06208711a8ccd8337
libreport-plugin-reportuploader-2.15.2-6.el9.rocky.0.2.x86_64.rpm
2cb6d5a3a3719d6b8e8dd58ae4f991e56304e778f9d921ea1fef76e7cdc7bc7f
libreport-web-2.15.2-6.el9.rocky.0.2.i686.rpm
88f3d650ed1881a24edb2313b929940f660e92ec91b63cf682bb50fd98fbfa6d
libreport-web-2.15.2-6.el9.rocky.0.2.x86_64.rpm
afec7d83f71054ff5e2df4c9d51d1305e4f110afa5965335b0c871aea358fa75
python3-libreport-2.15.2-6.el9.rocky.0.2.x86_64.rpm
605271935faca31cbab931dcd876d8ea33c222d3dedfd0a6ccd8894d871313f0
RLBA-2022:4067
new packages: fuse3
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fuse3-3.10.2-5.el9.0.1.x86_64.rpm
3a71de05e60717315f24b150c0f6110a34e781771d49e4dd28495c5e72ad01ce
fuse3-devel-3.10.2-5.el9.0.1.i686.rpm
75b39dc6f49580c98027542016b56b56103dc825297ed6a05dfb35c26de42d32
fuse3-devel-3.10.2-5.el9.0.1.x86_64.rpm
e4ab36efc623607abb7ee5457daecf8666e85ef8c3c0b8d2261e4bbc5b5d1e45
fuse3-libs-3.10.2-5.el9.0.1.i686.rpm
c794e0bd6042e9f70a44c2ba068c0974f7553be73309f5ea49fa9258f063343e
fuse3-libs-3.10.2-5.el9.0.1.x86_64.rpm
695ab0f604f02ed2b9a8bd0245cf0a9ea80f8d1bb01f6b88bd17498662d10c30
RLBA-2022:4203
new packages: lua
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lua-5.4.2-4.el9_0.3.x86_64.rpm
9b9247dd77c68e135da37e03d53c011f8d879f369a45bb7cbd275a51c6f97824
RLBA-2022:8272
glibc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-40.el9_1.1.i686.rpm
809dcfd1bb41816d5633c66b90ac759cbb40cdb33cff1c52bb1b114b0956e55c
glibc-devel-2.34-40.el9_1.1.x86_64.rpm
7e7b8ccf16deb632f4d20b56b0a6eda9704c6255b2c04386b9d4e65ad378fe7a
glibc-doc-2.34-40.el9_1.1.noarch.rpm
1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab
glibc-headers-2.34-40.el9_1.1.x86_64.rpm
c4edb39982fbcd3975b254a378b452ea1d73b94f8db90b01027c749c749a9e17
glibc-locale-source-2.34-40.el9_1.1.x86_64.rpm
045c95d9ff47011ee0225aea5115ddbe42fea8c3bc129b9c0d3cb2fea1a7a7e3
glibc-utils-2.34-40.el9_1.1.x86_64.rpm
be083837ee6d4762cde490f3b9cce8421f1f0d2d3d79611e7ec8df1a540d0d7a
RLBA-2022:8290
expat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.4.9-1.el9_1.1.i686.rpm
d56de768135c8173e1a48fd540d0d95c0e6f222c8ace97b3065c3bca57c2f615
expat-devel-2.4.9-1.el9_1.1.x86_64.rpm
442a1d6ce6f18fe5e24d2816d8781dd54885432cf72a77f0ab3945a68117049b
RLSA-2022:8299
Low: curl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for curl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: bad local IPv6 connection reuse (CVE-2022-27775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcurl-devel-7.76.1-19.el9_1.1.i686.rpm
7ad05dc436af09c7642094ec4ad4eb00e84f3473b51d0bba0f55dbd7d76d1d33
libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm
aec15566a0f096caa322970eb819aceae4520f8feac9ed3ec46a649bc6d7ed00
RLBA-2022:8325
sssd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sssd-idp-2.7.3-4.el9_1.3.x86_64.rpm
eccbe135e9df9e1c11bb358bf5acec78bb2b12d26be98a1e013a3170e3efce1d
RLBA-2022:8327
systemd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
systemd-devel-250-12.el9_1.1.i686.rpm
921151c64773074869b8df7f17977e220c78b208d5b2148198755ec8cfd9f3fd
systemd-devel-250-12.el9_1.1.x86_64.rpm
9561845b251615a5715cf19ae5ac180cf2f72cfd4b93e6472db40a1663802123
systemd-journal-remote-250-12.el9_1.1.x86_64.rpm
f3d437b037773dcea88ddf212091b9a55471acb33169138759be996306050b81
RLSA-2022:8353
Moderate: python3.9 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
The following packages have been upgraded to a later upstream version: python3.9 (3.9.14). (BZ#2128249)
Security Fix(es):
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.14-1.el9_1.1.i686.rpm
48fd68110090a368bf2f23454cd5fb4227ddd7e312101d3415b2868257198b9d
python3-devel-3.9.14-1.el9_1.1.x86_64.rpm
beabc37d468844e408deb670ef0497adc44d7a14060b9f41beb213445fbfcdff
python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm
b952c1061c4c06a74066ee00a44b763a940fffc7f5a7b373d45363581345b5de
python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm
6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279
RLSA-2023:0334
Important: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Intel 9.2: Important iavf bug fixes (BZ#2127884)
* vfio zero page mappings fail after 2M instances (BZ#2128514)
* nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359)
* ice: Driver Update to 5.19 (BZ#2132070)
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588)
* drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619)
* updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914)
* DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213)
* No signal showed in the VGA monitor when installing Rocky Linux9 in the legacy bios mode (BZ#2140153)
* Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168)
* ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976)
* fatal error: error in backend: Branch target out of insn range (BZ#2144902)
* AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217)
* Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910)
* Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605)
* DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407)
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
d7078b07a7d3258bce301881d95cd531ff4bf1738589e0a8eea3c2d613ccd242
kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
67aa047e3741025beed60b1174d9b45adff970ee7a205d258536d1618223c768
kernel-devel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
6e452933e721e2eb77ae23d9f06c570b204bccd4b84e2cd3ee217550e57c5486
kernel-devel-matched-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
8e5998e8aa9b0dedbaf2bc9ecb5901e31b225ed4865a32958f1c596176467cde
kernel-doc-5.14.0-162.12.1.el9_1.0.2.noarch.rpm
a30caac1765a17513658b6ae7859056fef19c282f1e637deba66186dbf46279d
kernel-headers-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
716500404c0b33b144109d2f2a970799ed5b1df3bedc8047d4c80ff291c64ba6
perf-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm
08e73b8611cb057252192d7d645427449a8014b78ec0368105fdb8c7b4fff82d
RLBA-2022:2329
new packages: gnome-control-center
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-session.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-session-40.1.1-6.el9.rocky.1.x86_64.rpm
8dccf0f721843777180534415dd263fc13928f7e5f0fce7cbdaf65d86ee38538
gnome-session-wayland-session-40.1.1-6.el9.rocky.1.x86_64.rpm
0028de11fb85de213dc99a86161d8ed3751323842f056b2801df93a8c576d01d
gnome-session-xsession-40.1.1-6.el9.rocky.1.x86_64.rpm
7d15bf23ab26edd27fce86270f23558415238305d1b97d9b4b96989b1a378fc4
RLBA-2022:2402
new packages: ibus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-1.5.25-2.el9.rocky.0.1.x86_64.rpm
c477e9eb2a472e503bc451c92f80f350d870d5246d8e2eea0d8ed8230d85eeb6
ibus-gtk2-1.5.25-2.el9.rocky.0.1.i686.rpm
562473b4b79b840e4c3e38100822f1bf0cda1d6f0fa70b6835481e756f0d6575
ibus-gtk2-1.5.25-2.el9.rocky.0.1.x86_64.rpm
135672c41ba069be017a4f1bbf084302973f19c205f438085e5f528e49878fb9
ibus-gtk3-1.5.25-2.el9.rocky.0.1.x86_64.rpm
ca4e328bbc820b7e7dd0aef7f09fc3abff550c63e6b200dab27dfca22f27af3b
ibus-libs-1.5.25-2.el9.rocky.0.1.i686.rpm
1906bb921e345ee20e87b8cf8bf81f50b9d9823b7efab6a3001183ef9aa8eca8
ibus-libs-1.5.25-2.el9.rocky.0.1.x86_64.rpm
8ff44621304d495b9159ca2528cf919079db1180352ed7adc7a068e9ae32b078
ibus-setup-1.5.25-2.el9.rocky.0.1.noarch.rpm
e6a45e6240188ac1099f5568ae3f32aaea6f6913d58666208bb93c48b714f42f
ibus-wayland-1.5.25-2.el9.rocky.0.1.x86_64.rpm
c4f36e5bf45cde39822d5e9a4a153ff4e248412e8bc01547537f22344b71f3b6
RLBA-2022:2421
new packages: net-snmp
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-7.el9_0.1.x86_64.rpm
45c7fdf8bf7ac6873f0836dd4b5b9359ad1426f8e0b7c2dc50db7b4b24c5e77c
net-snmp-agent-libs-5.9.1-7.el9_0.1.i686.rpm
34386bc8151023ac08fed088cae847fbcdf6c225b30a0be60ecc837cd66ff27d
net-snmp-agent-libs-5.9.1-7.el9_0.1.x86_64.rpm
5c34051105cfeadcc20cd1b0ee7a657ad7964a91a7d4d6e4bb023aacce2a7173
net-snmp-devel-5.9.1-7.el9_0.1.i686.rpm
e9b29003e4aa7b52ebf51da7323935394bd2d3c96ac4d1bc8109e59ae0eefe4a
net-snmp-devel-5.9.1-7.el9_0.1.x86_64.rpm
68cbf14158d98027adc73958b26b40b5e19d4e11d077c8822baf6a0f5c984462
net-snmp-libs-5.9.1-7.el9_0.1.i686.rpm
112c41409b7cfd1bd61ed78e827fe263dd12b507c97126b6be17478ddd96a32b
net-snmp-libs-5.9.1-7.el9_0.1.x86_64.rpm
30715b3db6c7797ede2f3014db8a4b367d64ff5176173d6fd752b2dae9351d0c
net-snmp-perl-5.9.1-7.el9_0.1.x86_64.rpm
da1af97bfa7c44f028e4b574657a69d62143d9fecc996c76911ff79bf7d98b99
net-snmp-utils-5.9.1-7.el9_0.1.x86_64.rpm
63c6fec11b84ca7b9bc0dc713db458663a9f44fd91f6b12dfe4581fc4fc66d1a
python3-net-snmp-5.9.1-7.el9_0.1.x86_64.rpm
0f91007d6139d5d60efabc69cfa31f1b78b9f5188ec70235502c5609524ac0b5
RLBA-2022:2555
new packages: anaconda-user-help
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda-user-help.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anaconda-user-help-9.0.0-1.el9.rocky.0.2.noarch.rpm
951fd0ff610db3ed38639c69e73a74d9d84ddc30e44ad9a2447a6dc3beb894ef
RLBA-2022:2854
new packages: gnome-kiosk
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-kiosk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-kiosk-40.0-4.el9_0.1.0.1.x86_64.rpm
3b5fe97407268d86c0090601c0f86ce2e2ca4a6b8268fa0985430145e1e13948
RLBA-2022:2856
new packages: gnome-menus
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-menus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-menus-3.36.0-8.el9.0.1.i686.rpm
7989199ccaed9e11a494bdcdcaa38d0706125f316f12aa7373594d8551722f7d
gnome-menus-3.36.0-8.el9.0.1.x86_64.rpm
6b88244d31330181f3a10b06acbac9a32d12d37d31cfdad2baaa8ce3bba38063
RLBA-2022:3565
new packages: perl-Sys-MemInfo
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Sys-MemInfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Sys-MemInfo-0.99-18.el9.0.1.x86_64.rpm
81c5b24e72d8dfb697055cc2147b97d187b6e4275c2dae71f414a5f3b3f0fe0f
RLBA-2022:3621
new packages: perl-threads-shared
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-threads-shared.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-threads-shared-1.61-460.el9.0.1.x86_64.rpm
e574c136c044d3b1d6cc2fbd28d281fe71b1de81d2c563dd83c35acedfcb81cf
RLBA-2022:7975
pesign bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pesign.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pesign-115-4.el9.rocky.2.x86_64.rpm
f58a827f01ec2de0fdaef956a6ec4a2434028f22b26e4c963f2df1898e0e754e
RLBA-2022:7977
anaconda bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anaconda-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
99b32e80363e1b4fbe9b91e29cee253f0fe2ba256565937f8c4f501089316d5a
anaconda-core-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
615e02d7e64b2d55e3dc1a5fa5cca598cfba5ddf27bf730ae803df518a653aea
anaconda-dracut-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
e47b708e1074dfb5aa25922b88596c2d1e123664022f5047631bb4bb99b0daaf
anaconda-gui-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
2b7eb7f19a8b9c91e843b2c3c4f53da68b4456d704aa1a7b15eff7fab29f78bc
anaconda-install-env-deps-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
9cb5df84d09c1ea4df72e679bb259c829fb36b25b2ed13fe1a10bbf565857354
anaconda-install-img-deps-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
25b52d9354bd0eb8a2f09d769dbd8d5b6647dcea6024d95809c57ef3624ebe8b
anaconda-tui-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
1583115806140f78358772f3b3a5c19f3b288febb8229745de7a1daca3467b49
anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.i686.rpm
7bece75c388f61a9562bad90c37c6aad6b06d4446cfb8c7c39ff4a1f14237acf
anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm
86435a5f2c484770637d2f6ce92f11001b2be5d681a069f3392536ed1e5f25c7
RLBA-2022:7981
fence-agents bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm
5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a
fence-agents-compute-4.10.0-30.el9_1.1.x86_64.rpm
987cdfdcb4cf9924bb79f8450816d0d9d9c64a16e68b9ee9216aa28b2e504140
fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm
e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381
fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm
5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e
fence-agents-kubevirt-4.10.0-30.el9_1.1.x86_64.rpm
81f39692a3915637682b3c922fab5f48cf18c63836b45a075a16d72196cf9871
fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm
8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8
fence-virt-4.10.0-30.el9_1.1.x86_64.rpm
ad8079229d80d22fa0b8a61057b51407ad042735f9265cbee09e8c01d2b02744
fence-virtd-4.10.0-30.el9_1.1.x86_64.rpm
d38c221fad37130c267cb2e09f09e54c7a1661d8f391298aa667b988f94416f7
fence-virtd-cpg-4.10.0-30.el9_1.1.x86_64.rpm
7311bd308b7fce7626e1f1efceb4a2ebe51142076cf4d47af3b383af25d612a8
fence-virtd-libvirt-4.10.0-30.el9_1.1.x86_64.rpm
7c7a047976567520da46e488d7770e91a655a19440cc4afce78756c6125c7571
fence-virtd-multicast-4.10.0-30.el9_1.1.x86_64.rpm
cb792c9a484d9d15cf5973d6a91e80650cb25bd23d2769ed7eb8852605304c6d
fence-virtd-serial-4.10.0-30.el9_1.1.x86_64.rpm
d4c34e220f40da921730f096c90d89a975509b4d566b16599c7bee32dbc69aa2
fence-virtd-tcp-4.10.0-30.el9_1.1.x86_64.rpm
641685476e28e6708dc334ca1aaf3a92ad48ce39ce395796d44e85e77b7bf30a
RLSA-2022:8003
Low: libvirt security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313)
Security Fix(es):
* libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvirt-8.5.0-7.3.el9_1.x86_64.rpm
c708779a396e230d2c5b07e0bfe51cd01f49ccbd4c83869d8073d60d6370dd64
libvirt-client-8.5.0-7.3.el9_1.x86_64.rpm
7e78e4b314f9391dae14046061f56a0877ba5d2fa8fc6c80e50ef539c8cb8643
libvirt-daemon-8.5.0-7.3.el9_1.x86_64.rpm
48b52a90c97c6b7ad233f63d5e89b6e755018153285734c21f78660409585d1a
libvirt-daemon-config-network-8.5.0-7.3.el9_1.x86_64.rpm
ea06d4aa7466a860568cd37e88f867968d093a0323d9f4d47a57c2bbeb18c91e
libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm
420ff2d0519c7e21815e4beb165018e69bbdc52f3bf3c93b961e9873a55eecae
libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.x86_64.rpm
7e3a7d4ecf369c032a337355427483db927474305d71c1815f888aa28197a218
libvirt-daemon-driver-network-8.5.0-7.3.el9_1.x86_64.rpm
3ed76de2a5b5b77ace56a63991e4b9f57579d0419976dadd00cece896e6be893
libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.x86_64.rpm
ca05c2a76e07f5ff4647ce9db4ad488a0d4f02a7047be7d15618e969a6a1961b
libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm
792d48eae60612d2edef25f085c8d1508d110d575b40c3c4a1631ca7177d4b1e
libvirt-daemon-driver-qemu-8.5.0-7.3.el9_1.x86_64.rpm
b0f28d516b0edc48b0b922dfafa3eb67df028ef014c04e355f31e80aba6005da
libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.x86_64.rpm
de5bb1b4844f9ff342ccc76b99404624c2d77209c7c4de29253080dcc85c6ef5
libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.x86_64.rpm
11d28b80a7e3f9d171f9d48637e61241c66003ae24366dbe34328c0595e37b7c
libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.x86_64.rpm
37d0168e2a00cf5e6928bb0a5bfda4b762fc83455f8d60dd9ee459a0cfc95167
libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.x86_64.rpm
24e8e44a9eae16af22f0a4612baaba359e4df0efa8197bba24b03ce0ad2072bd
libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.x86_64.rpm
4019867e2bdd85da3b6fd73d8649fa476875224fae7f21d06c84af2778797e5d
libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.x86_64.rpm
ac268085630e07135f22f6d3224469f1b1fed919758eb843017c3356e41e153a
libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.x86_64.rpm
43a2dd82596de9414d0e7ada2acaaa89d864a20c5b42623b322ec4b86b0890ec
libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.x86_64.rpm
eb0ac684f2d54aa112510c00b04ba8fca6043aabc83f5b6d3052b5659e701037
libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.x86_64.rpm
92c62e1ff027648c615425c0b1969373bba89fdc99e4c6a95d84be5e1a806c15
libvirt-daemon-kvm-8.5.0-7.3.el9_1.x86_64.rpm
baaf46cf94b070312b786a26aa1f21c16d1e17e7a6a7bf6217b7a0cad0cb3bf5
libvirt-libs-8.5.0-7.3.el9_1.x86_64.rpm
676aee21a6ccef29385ddeb6118c7e29c2ca4250acf8ea9af15905ad3ea44e0b
libvirt-nss-8.5.0-7.3.el9_1.x86_64.rpm
d829f341c6a3e196c3b05e1cee3af14c96f9fd387883a4d76f5afc45af0ccae4
RLBA-2022:8019
lorax-templates-Rocky Linux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax-templates-rhel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lorax-templates-rhel-9.0-35.el9.rocky.0.1.noarch.rpm
21755032c1358c5b4158aab1b33f69170abc3e2cef712750649bebc9a1a340c6
RLEA-2022:8056
cloud-init bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cloud-init-22.1-5.el9.0.1.noarch.rpm
48a72ce9513d28c13d9f123b03a052bd85bcdf4649719d633fa289156fcccf9d
RLSA-2022:8098
Moderate: toolbox security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for toolbox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
toolbox-0.0.99.3-5.el9.rocky.0.1.x86_64.rpm
bd913e084c6d6803a2dfd59172bbf60202a95cac6b24c656a0d27aa702a71491
toolbox-tests-0.0.99.3-5.el9.rocky.0.1.x86_64.rpm
1b612a312b05fd540aabfcc82aa8a4d1e2b8d45c753951e35d2b431a42342d97
RLEA-2022:8115
WALinuxAgent bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
WALinuxAgent-2.7.0.6-6.el9.rocky.0.noarch.rpm
501a4f5489c03ed59a40579cf6cdeed009f96611fe28bf503287e28a0236c52c
WALinuxAgent-udev-2.7.0.6-6.el9.rocky.0.noarch.rpm
c4660dbbb81bfc4c3451bb7e69545ca5ee0d9cc25ec35ad6e1ac44686c211d8d
RLBA-2022:8131
scap-security-guide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scap-security-guide-0.1.63-5.el9.rocky.1.5.noarch.rpm
d25e55b0936f63aa3bc9bc9de03bda04af5646550fc368e573e58f67b389fbc5
scap-security-guide-doc-0.1.63-5.el9.rocky.1.5.noarch.rpm
6fc56d2b8816c953f3d5fda8398da171e882a39cbb263282c8fb1f4d06d0bc64
RLBA-2022:8216
openscap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openscap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openscap-1.3.6-4.el9.rocky.0.2.i686.rpm
5b38ad0c1ff384d6cd88d8597cb68f120509d566b60c2f66b4741a5750f7362f
openscap-1.3.6-4.el9.rocky.0.2.x86_64.rpm
ab8c555b76148d7ffd349fa2a4e120a5866946d20326392c4f1bfa6902b524c5
openscap-devel-1.3.6-4.el9.rocky.0.2.i686.rpm
c5a1ead630c70e6ccf4831bc5b402e5c57436a4f0824e532918973e243418520
openscap-devel-1.3.6-4.el9.rocky.0.2.x86_64.rpm
54b869926c61b27d71b208aac30563e8b90b31f3eb7e9eafbf7d10fbf470ffc9
openscap-engine-sce-1.3.6-4.el9.rocky.0.2.i686.rpm
69bc52a237757caca71d2808980312efb0ee32451745fa82cd590a026e1137c9
openscap-engine-sce-1.3.6-4.el9.rocky.0.2.x86_64.rpm
50aaf2509d7de254b068ba1c3b01d572fbce6d4c8dcc3e4c72a832a6bd9d41a8
openscap-python3-1.3.6-4.el9.rocky.0.2.x86_64.rpm
aab5072ea1f18ac6447421310a9f9eed71cfa58c6749f8702bb6a3a07afd6ccb
openscap-scanner-1.3.6-4.el9.rocky.0.2.x86_64.rpm
f6e22578df21082a4a88811ce3cafafddb22b1261a1dca68648b9d2a93f59a55
openscap-utils-1.3.6-4.el9.rocky.0.2.x86_64.rpm
3afca1f33b0eff5470c8f41a132f4e20ccbe9c30ef39c9450fdebe4dbb946b14
RLBA-2022:8225
hyperv-daemons bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyperv-daemons-0-0.40.20190303git.el9_1.1.x86_64.rpm
9ad347656af733f0c9d08193e6de68afe2f1c24128adff9fe1cfc78b21a25721
hyperv-daemons-license-0-0.40.20190303git.el9_1.1.noarch.rpm
fa9059871f00dc113015c27e01e5388e9a52d1b097cd94109f4d4a4bbc886694
hypervfcopyd-0-0.40.20190303git.el9_1.1.x86_64.rpm
617d5a94fef2e4b902531feddeed690e976e40c53b42044290243a3dbfda1ca2
hypervkvpd-0-0.40.20190303git.el9_1.1.x86_64.rpm
8a55232a6b273932785b24fecb7d71713c578450117e564480c98318e426d17a
hyperv-tools-0-0.40.20190303git.el9_1.1.noarch.rpm
0140116450ab5a94be5e1d93e8a9fd4694bc666bf0a2ac5c3c1f43eac4fd85c9
hypervvssd-0-0.40.20190303git.el9_1.1.x86_64.rpm
3efd684f075bee685a748ab5aee1f363a971517d20dc2d4135cde72c0b07cefe
RLBA-2022:8236
fapolicyd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fapolicyd-1.1.3-102.el9_1.7.x86_64.rpm
cd924613bfa40361bd6fc83f191d0731e67b05452dfa0a8df8e70e889d5c8640
fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm
2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d
RLBA-2022:8438
osbuild-composer bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osbuild-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients.
Bug Fix(es) and Enhancement(s):
* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 9.0 (BZ#2136533)
rocky-linux-9-x86-64-appstream-rpms
osbuild-composer-62.1-3.el9_1.rocky.0.1.x86_64.rpm
5fd3dd03308ff4fdc0425624faf133682b8ae2fcb10253d14e75624cebc71bf1
osbuild-composer-core-62.1-3.el9_1.rocky.0.1.x86_64.rpm
97adf1242eed105452bdb0cec262c4b582211965251fdd616768163093d7edea
osbuild-composer-dnf-json-62.1-3.el9_1.rocky.0.1.x86_64.rpm
c7914c05891ea381cc5fb9cac010bbd7cbe735d82c37dd41d9250176f388400d
osbuild-composer-worker-62.1-3.el9_1.rocky.0.1.x86_64.rpm
ee80f68d07cb1eb06425f3fceffaa9d8e8449b51bedb85e5a30d9da21f016aee
RLSA-2022:8444
Moderate: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: exception handling and impedance match in tornado_requests (CVE-2022-3500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
keylime-tenant-6.5.1-1.el9_1.4.x86_64.rpm
74d2ff21c54cd23d1f2756838008f2640b69a17b4de8070de7c282b47eeaeb43
keylime-6.5.1-1.el9_1.4.x86_64.rpm
4ebeccd3fa45154859133692dd6e8e7f2ae6b60b4451f3294956928ab32b336c
keylime-base-6.5.1-1.el9_1.4.x86_64.rpm
44389a08b4c3b149c3432bd37888893de9bc2c3261069d71a0e873224add559d
keylime-registrar-6.5.1-1.el9_1.4.x86_64.rpm
bc7a81d8e8e9e3547550806883103a9cbc1d95f78b84494c940912a65bbdc91f
keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm
2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac
keylime-verifier-6.5.1-1.el9_1.4.x86_64.rpm
22b126056912799186d289c10e59d6c86b3a802b7fa697722a19fac6a166fb16
python3-keylime-6.5.1-1.el9_1.4.x86_64.rpm
a289908636025492c0a33826cb1057d77c797d8e52dc02d0779f3e844055d470
RLBA-2024:9287
postgresql:16 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm
44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba
pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm
b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8
postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm
6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259
RLSA-2023:0608
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.7.1.
Security Fix(es):
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.7.1-2.el9_1.x86_64.rpm
9a19eb5d598812f59d555f6c0588407309c085cf931767ee8eff0a9d2a21a6b4
RLSA-2023:0611
Important: git security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: gitattributes parsing integer overflow (CVE-2022-23521)
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-2.31.1-3.el9_1.x86_64.rpm
1fd348be808204fc0ec966cb3f802924f7f28a240b13346b0920fd9226cf8d25
git-all-2.31.1-3.el9_1.noarch.rpm
f6c54c0220a9bd68de0e305812df87264fd521bb08820715cf9dc1071291f511
git-core-2.31.1-3.el9_1.x86_64.rpm
7fd603310562ee6c65ee45d73d7797fd1b886cfa0a64d3365bf8a0265cbec2c2
git-core-doc-2.31.1-3.el9_1.noarch.rpm
45f316d495138f8be8ffe7388e1c19f8c21796c460a85e639e75678c106ce58c
git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm
81046539f39daedada507d66e7d7cf6ca1511a199a40601f510b8f69bb61299d
git-daemon-2.31.1-3.el9_1.x86_64.rpm
fe8b6288f08ef1128956ace1230730b2bfaf09a95aca7ec6f093882e9a63acfa
git-email-2.31.1-3.el9_1.noarch.rpm
70d637c668eb2f9e960961aae8245a6bde1d4d0f46698d9327f807cfc1c34546
git-gui-2.31.1-3.el9_1.noarch.rpm
a2cf17eeca58483f8543fabbe00d271789e3b4f10c1319900c95da45924af047
git-instaweb-2.31.1-3.el9_1.noarch.rpm
cf3ec0c9c039068358e74dddfc4d2fbfb53352f58a1045df21a51753a8ddf8ec
gitk-2.31.1-3.el9_1.noarch.rpm
2de11da7c71d9d9ba0c74776e512ebb9019a637d0d1c1bc849e6615ca0cc597c
git-subtree-2.31.1-3.el9_1.x86_64.rpm
79483d59a6386ea967a8bf104c6882a71a4165fd8a08ea8bdefe7cb8fbd53da1
git-svn-2.31.1-3.el9_1.noarch.rpm
cfb06cf9a2ea4ffc9626bee74546252fa10d2c7cdf31e71c6e7c1dd456cd5950
gitweb-2.31.1-3.el9_1.noarch.rpm
730d688af3395f1aaaddc4df6c48afbffa83d9edc6ce4198a2642560e8ffcfb5
perl-Git-2.31.1-3.el9_1.noarch.rpm
fe65cd3944f1c22159235b304df53845d209bec44b2c7932055152898179d500
perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm
55754fdb2a22c8039445f3c63291adfd309e2a3746f20309d20926dc75f10c82
RLBA-2023:0669
selinux-policy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* SELinux prevents smbstatus (executed by Insights) from creating /var/lib/samba/lock/msg.lock directory. (BZ#2136760)
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-34.1.43-1.el9_1.1.noarch.rpm
ec275286c991f4b745e1d772d063292a5a43bdabcfe832eb41116cf9e83a8626
RLBA-2023:0781
.NET 7.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3.
Bug Fix(es) and Enhancement(s):
* 2166776 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-9.1.0.z]
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.3-1.el9_1.x86_64.rpm
8d74085987d0ca148e5d3efabe9c5c594884ba3e4849af8010e5a6b76163efcb
aspnetcore-targeting-pack-7.0-7.0.3-1.el9_1.x86_64.rpm
82198a380750546bf594dc1e7c414763328c57352174a7af1cb93c4875aff801
dotnet-apphost-pack-7.0-7.0.3-1.el9_1.x86_64.rpm
0fa38121471632bb00f5bd89c3c2a5bfa03fc86d4b825ac70117380788f042fb
dotnet-host-7.0.3-1.el9_1.x86_64.rpm
935c287837d4a432fda9bf5ec46f1ff7d0757bcfd8ce6ce4497bd770aef8018b
dotnet-hostfxr-7.0-7.0.3-1.el9_1.x86_64.rpm
292c97ab6ec6cbfba273d424c7bbbfb9f17d0bca0431d4c8da0bc208ceb1e2b3
dotnet-runtime-7.0-7.0.3-1.el9_1.x86_64.rpm
ff594ff0f646a30a2df056db825a7faf4e3f237d7721d5cd72aa28fd06089301
dotnet-sdk-7.0-7.0.103-1.el9_1.x86_64.rpm
bbb42bd873f8bbcc947d4efc529e76ef711ea6f75b0f4e69d2b7b5498663d611
dotnet-targeting-pack-7.0-7.0.3-1.el9_1.x86_64.rpm
1367f3d48df2baa2cb540e141e45ec875183aa7714cb88b972ec8b7f85b8c80f
dotnet-templates-7.0-7.0.103-1.el9_1.x86_64.rpm
0d1eda4deee9f044bdd596d447bfd741b41860b2d7cc0e3b5e9fd75577708afa
netstandard-targeting-pack-2.1-7.0.103-1.el9_1.x86_64.rpm
8a4b18610827db7e9bd67baa84e5715f5eee76c244405c951af3076539413533
RLBA-2023:0782
.NET 6.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address bugs are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14.
Bug Fix(es) and Enhancements :
* 2166770 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-9.1.0.z]
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.14-1.el9_1.x86_64.rpm
6d3550fac0f794bcd60b016851ffc020d2e2383cc36980248354bbed4b97e27e
aspnetcore-targeting-pack-6.0-6.0.14-1.el9_1.x86_64.rpm
e10002387a96cd906d844d65278ef886fa3c03312e4748a0e27719d8dd4058d5
dotnet-apphost-pack-6.0-6.0.14-1.el9_1.x86_64.rpm
3e8d84d3e1447ec293fb85ff3a651c1d074576e73db9062d41b3dc398bb0d5e2
dotnet-hostfxr-6.0-6.0.14-1.el9_1.x86_64.rpm
4327a8ccea25d032b12caaff4e53796a6e0d1b64f80c625364665061b1e4a788
dotnet-runtime-6.0-6.0.14-1.el9_1.x86_64.rpm
4654059f94716cd2bb67e4dac40c86e8028e764bdd6feb77bfa159d04397d32e
dotnet-sdk-6.0-6.0.114-1.el9_1.x86_64.rpm
baf52245bfc68db77c75c68991ba63ddd0921bce8c1b838f5279518d0117187c
dotnet-targeting-pack-6.0-6.0.14-1.el9_1.x86_64.rpm
c0a0af82f1fa6f12e0bc9e13aaaba055c36cc70b7e6f6df8b589df8c65d7405e
dotnet-templates-6.0-6.0.114-1.el9_1.x86_64.rpm
f6a52d8ad8eb0ed59bb55d57adf8aa97571f3cf54bcc11dbc94198b9f54bb2da
RLSA-2023:0810
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.8.0 ESR.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-102.8.0-2.el9_1.x86_64.rpm
be6f9252b2b58f1d6db0aa56a75a6858027604a69c62688ecd2052a603fc2076
firefox-x11-102.8.0-2.el9_1.x86_64.rpm
c3dfb1d07ef389a4d9c1523e8ec02a840217d46d7b3f32bf21e31d7a813c1361
RLSA-2023:0824
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.8.0.
Security Fix(es):
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767)
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728)
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730)
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735)
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737)
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739)
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743)
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744)
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746)
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729)
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732)
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616)
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.8.0-2.el9_1.x86_64.rpm
ee0236a731da14a7dfc78bd0b7554283e35908f0459b67b5464507f24c226bae
RLSA-2023:0903
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm
0ba47951b812a1b238f8644bd539de823aeff91f869f75c5a279f1dbe36676d9
webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm
f00132e4938cfef7ac2dc522d80a44444d6a02a090693b4dfaf57e7c1a8dc4fd
webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm
d6aa5b7b626bd571abe15f9d6f4860b724883069e1af9c59133310f952021638
webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm
f9bca967a8fc2772b1803e12bd69dd1f956a1da3ab713d3290eac80188a2439a
webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm
0daf588685caf28e8aa9c929107b19e01a69e5b3e558d2979692e36444d02c44
webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm
fa1a001c089a5fc19521593bf134d6c9b26a65bd5a840407f08adbcd483fc71d
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm
dc78f39eca36f81e1f003a4de9f92fa06c4547153be3d7630b31404fcda2afce
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm
36ddde218826001fb8bc8d30abf64280f0219574378da5b46de5d411ccb91e1e
RLBA-2023:0973
scap-security-guide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2169441)
* Rebase SSG to the latest upstream version in Rocky Linux 9.2 (BZ#2169443)
* [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2169445)
rocky-linux-9-x86-64-appstream-rpms
scap-security-guide-0.1.66-1.el9_1.rocky.0.1.noarch.rpm
0192f846a671af536e035e8f528a8c6e73f15499b9b9f31cd771725a2908bbc3
scap-security-guide-doc-0.1.66-1.el9_1.rocky.0.1.noarch.rpm
0dfbfa1c875e964115e043502af0a65eead70d1e1028e10a0dd8d32367ef134f
RLSA-2023:1068
Moderate: libjpeg-turbo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libjpeg-turbo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c (CVE-2021-46822)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libjpeg-turbo-2.0.90-6.el9_1.i686.rpm
76394adb6682caefc4ac48ba6ec5308c1583d8c93e64993e248f0b6d3061e25b
libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm
c68c08fb07237db183473d39d98173881b89e595cb75345f92488e99280c95e4
libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm
14179002231a67b6280f275c0894fbd36101981641c8b6c02bae849eaa270541
libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm
969335187349c8981fb76cceb807a5d3fd4cdc93e79177796f120bf95ac8b119
libjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm
e7980527a6778d1dabd71de991d7fe27acb72f4a5c26ea17d2f9e91fe2b3eebd
RLSA-2023:1067
Important: pesign security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pesign.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The pesign packages provide the pesign utility for signing UEFI binaries as well as other associated tools.
Security Fix(es):
* pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pesign-115-6.el9_1.rocky.2.x86_64.rpm
2879481369fc2706539a86c005a3cbd9f01307657e56584aa3b6b661a92f723d
RLBA-2023:1244
.NET 7.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-9.1.0.z] (BZ#2175027)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.4-1.el9_1.x86_64.rpm
884dc4c45a6b3f6dd727007ac5286130a45d7742755cee88577c3e47dd1af41c
aspnetcore-targeting-pack-7.0-7.0.4-1.el9_1.x86_64.rpm
655a5ac2173b2ea716e5cf046abc81c1b4d7effea9409d882397a972269d6d2d
dotnet-apphost-pack-7.0-7.0.4-1.el9_1.x86_64.rpm
53b4f12386aa8238ada6e3930ad64e715c5da2f217c3a32549b3545717e0f238
dotnet-host-7.0.4-1.el9_1.x86_64.rpm
e2a2108c282f8f165efff8fe0a757d732f789a493b2ff99f77ef8e9bbd9c65af
dotnet-hostfxr-7.0-7.0.4-1.el9_1.x86_64.rpm
d1f203efe2857577be6c90da1604e69da70141656b53e997d6aa2868af819b32
dotnet-runtime-7.0-7.0.4-1.el9_1.x86_64.rpm
fc3f2f4c7a90cdcfc08809f96b537629e86c9c7ad336fece6427eb9027bb11e5
dotnet-sdk-7.0-7.0.104-1.el9_1.x86_64.rpm
298e415b0171c015ed3ac610b47f365a42b0cadf55798b3c4e4cbcef6d9b6f87
dotnet-targeting-pack-7.0-7.0.4-1.el9_1.x86_64.rpm
9383641bbee8d533ed259ba96e3ab85b341069c24a5cd7aa95142b23669bac19
dotnet-templates-7.0-7.0.104-1.el9_1.x86_64.rpm
da78f1b77136613f1a2e139834e1991bb1a324bd1f35b7798fa0319deba2c638
netstandard-targeting-pack-2.1-7.0.104-1.el9_1.x86_64.rpm
0036392fe67c142d59737a20590dd4d374b4423acd163034749b0404c7147612
RLBA-2023:1246
.NET 6.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.115 and Runtime 6.0.15 [rhel-9.1.0.z] (BZ#2174986)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.15-1.el9_1.x86_64.rpm
3347349797afd3b3c1b87e5d9a109158cd94f66c9c0df364e75e4e1d2961d471
aspnetcore-targeting-pack-6.0-6.0.15-1.el9_1.x86_64.rpm
9f12b7b2fb812b17c805fbb79ea3fa27ac1837b7e4c6e86432e30c8e8fa7c60d
dotnet-apphost-pack-6.0-6.0.15-1.el9_1.x86_64.rpm
f9d269693d9ffd0b673739f296b717fbe51ba037e2651e57e13d35f3590b7fc6
dotnet-hostfxr-6.0-6.0.15-1.el9_1.x86_64.rpm
392ae47ac3a96f62db4dc3b08159c04f88ab234b916dd8c4aba57ef4908b17ce
dotnet-runtime-6.0-6.0.15-1.el9_1.x86_64.rpm
842311ab2deacf80c5c7a9e9f7c5b176b7dac648dadd68f80fbb5f6a9d55b923
dotnet-sdk-6.0-6.0.115-1.el9_1.x86_64.rpm
d353ac37d20a8dea9995baad8117cc570fc572611d5fcfafaded915d1a6e7b9d
dotnet-targeting-pack-6.0-6.0.15-1.el9_1.x86_64.rpm
d881f4fd2c081412d551914b94ce84441e973dbccf53b1a13f6cfee949f08365
dotnet-templates-6.0-6.0.115-1.el9_1.x86_64.rpm
8d6613cf3daca5e8eb38c841e568274366810998baef612bb98ad3209eafdd9b
RLSA-2023:1407
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.9.0.
Security Fix(es):
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.9.0-1.el9_1.x86_64.rpm
1f3fd730d156e1782c4881dc6ebf771c8c27ce06069b6afd2d664e9f1f192ec2
RLSA-2023:1368
Important: nss security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Security Fix(es):
* nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767)
Bug Fix(es):
* In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434)
* Need to update FIPS review comments into NSS Rocky Linux-9. (BZ#2177875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
nspr-4.34.0-17.el9_1.i686.rpm
3e9cbba181ad2f7851caf1546c40c1e90da92ff5753a515b9a36ed9c50271116
nspr-4.34.0-17.el9_1.x86_64.rpm
de99df7d4caff58c4a5288adec6cb39e344ff7599777243dedd7944bb7678179
nspr-devel-4.34.0-17.el9_1.i686.rpm
5259f678aca5e60a1522f3361a0dd04d0433ce972091c53bf9b469cb4a2edcb5
nspr-devel-4.34.0-17.el9_1.x86_64.rpm
1d8231b3421fe93c06c1bed961436931428ee04e155c2d8d5b93cb52986bb026
nss-3.79.0-17.el9_1.i686.rpm
fd7eeb200eeb7d906c53faf440a79dd5f73fa40b8845586d39302b13364ce640
nss-3.79.0-17.el9_1.x86_64.rpm
7b71cb9e5bb118de415b45986dd1d7fee4ded9e05653147112e3c349668dc543
nss-devel-3.79.0-17.el9_1.i686.rpm
4e3f1de7a8664b38f3bdc009918a6111e17b27eee998818d554fbae98fdced2b
nss-devel-3.79.0-17.el9_1.x86_64.rpm
22585267843d5a07a194725198d1c4d04759326b7e54f1d3ec78aafdfae35830
nss-softokn-3.79.0-17.el9_1.i686.rpm
768f66fe3edeaebab823395b374ec926b3c91830364835c888c3ac6a98ac0fe5
nss-softokn-3.79.0-17.el9_1.x86_64.rpm
472379214f891f44b0111bfd7ce68824eb70796a4743711ec9a50bee68d3d94d
nss-softokn-devel-3.79.0-17.el9_1.i686.rpm
80fef195b0643b7bbf8abbac3f3df61e7a25705c99ab13c7fcc8308d47d4d3e6
nss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm
3f423695fa16882d7101e75f0b686aafdf34135dd7134d1778ed8fbdeb44f19a
nss-softokn-freebl-3.79.0-17.el9_1.i686.rpm
189f7dde4c240821e354cc63ddbcf63dd2ca349e92c6a2428d03676e2cbbb58e
nss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm
d58d9ec4eb8a0bb425263efb128678ad7af4161d346815c4b40fe729aa4fe423
nss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm
1706c6b5afecc85da98350a9b5804cc56db41ef0fe358fd4243465dd40f0cb5f
nss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm
a53071f1e5757630c72111fd81ef098ee6e441b6672daf758232cc3c25c74713
nss-sysinit-3.79.0-17.el9_1.x86_64.rpm
c4801d54126d031e7a12f4f39b6b328fafccc30809e2a590b4ffdebba88567ae
nss-tools-3.79.0-17.el9_1.x86_64.rpm
c39002379894982a792562e20a3b3625710137eca8216d4df16ca56cfa611102
nss-util-3.79.0-17.el9_1.i686.rpm
d09fddb012a23d2b60e0be3e248fa32cfcaa9914455ab5962910d6df965d350b
nss-util-3.79.0-17.el9_1.x86_64.rpm
ce543f74dba29482790816ca43ff1d308e89d08a9246b89c76bc88e19fd19769
nss-util-devel-3.79.0-17.el9_1.i686.rpm
75681e8cf6222147dd5caa834ed9a0384010609fbaa5e6f8e700686a866e7a0b
nss-util-devel-3.79.0-17.el9_1.x86_64.rpm
b8f2ffecbdf0243d731845b6f9542cf155a457ce69efce04d171d79e724d1b93
RLSA-2023:0946
Important: openssl security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
* openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216)
* openssl: NULL dereference validating DSA public key (CVE-2023-0217)
* openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000)
* In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003)
* stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008)
* In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010)
* In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012)
* In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015)
* In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017)
* In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019)
* In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170)
* Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010)
* OpenSSL FIPS checksum code needs update (BZ#2158412)
rocky-linux-9-x86-64-appstream-rpms
openssl-devel-3.0.1-47.el9_1.i686.rpm
17bc0d5769df372510d9c14c3e2e99a81d242d8416cd359b707adc0774747a5f
openssl-devel-3.0.1-47.el9_1.x86_64.rpm
aeeff49fd81a7185b664c2001a1462ecefc6f077afe2892fda7ef2b205ae4191
openssl-perl-3.0.1-47.el9_1.x86_64.rpm
9af60eb73db63e790f746b7a8d29ee7c52ab0cf9b834df07c2a4477b2d8451bd
RLBA-2023:0947
ipset bug fix and enhancement advisory
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set.
Bug Fix(es) and Enhancement(s):
* systemctl restart ipset extremely slow restoring large saved set (BZ#2043008)
rocky-linux-9-x86-64-appstream-rpms
ipset-service-7.11-7.el9_1.noarch.rpm
c6b353b8305a632f943cc583d6eccc8a5200ef9b9172927565f006e5d44058db
RLBA-2023:0949
iptables bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es) and Enhancement(s):
* ebtables among-src partially broken (BZ#2136584)
rocky-linux-9-x86-64-appstream-rpms
iptables-devel-1.8.8-6.el9_1.i686.rpm
852130b8e23c4644f99de82940934707a266be64dad156180db64f78b5113f23
iptables-devel-1.8.8-6.el9_1.x86_64.rpm
1b4fb2d1cb2166532be03e9283298f7e415f8f3c03e7eb15646f379fd68c0ef6
iptables-nft-services-1.8.8-6.el9_1.noarch.rpm
1d6b000608ee5c08e9433e434fe818c6bd7414ab775418e7a195af00e5701a11
RLSA-2023:0953
Moderate: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.14-1.el9_1.2.i686.rpm
c42490b4eaf04c0d16244809e1619c42398010db85ee97c7eaf9671c48b2b915
python3-devel-3.9.14-1.el9_1.2.x86_64.rpm
1b8a7b2b64858b877d163d6c6c0f3383eb2c82bfb75526024e3a7074fa03bdb5
python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm
0caf2ccd01c94547498dec8683053ff68adc4145a78347e891bd21f942c2c624
python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpm
8c1295c94bea9fedb13b7154d2ff121c6ae51dc0e767221593129ca3ffc3a304
RLSA-2023:0954
Moderate: systemd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)
* systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
systemd-devel-250-12.el9_1.3.i686.rpm
1df2fcec62f2c59d6164ed5013923427267b0ce180b38ab417a7c18a64137ee2
systemd-devel-250-12.el9_1.3.x86_64.rpm
d61c188a279c79e01344d02373b750f4a14b283f5fe0e75fb69c77411859fff5
systemd-journal-remote-250-12.el9_1.3.x86_64.rpm
79f375287305a3a536a7b0b34f16627c021f1723fc1abdac247e074196d83946
RLSA-2023:0957
Moderate: lua security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: use after free allows Sandbox Escape (CVE-2021-44964)
* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
lua-5.4.4-2.el9_1.x86_64.rpm
08ea59847e48d1e94c58d3f8be4eab60be02f66883429fdb79c711a5f3f0faff
RLSA-2023:0958
Moderate: vim security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: no check if the return value of XChangeGC() is NULL (CVE-2022-47024)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
vim-common-8.2.2637-20.el9_1.x86_64.rpm
ecb9078bca6357278341911895ba4dbe2565807d9eda9be3cd7d822751e48917
vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm
dbfee7a023eb444a484cbf31805bb52eb2ad1d4ea3a5a891cd8ef78dc2672a11
vim-X11-8.2.2637-20.el9_1.x86_64.rpm
720fb5f4e53bdc791360f2e7260aa223d69abe462fd7d60bd804aa6c6017cbcb
RLBA-2023:0960
selinux-policy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* selinux-policy AVC denials during ipa trust-add (BZ#2168961)
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-34.1.43-1.el9_1.2.noarch.rpm
e1c40431b1dd691ce3e287db8da0359adbbbf311cda207fae8a358f51d9cdac8
RLBA-2023:0964
libvirt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fixes:
* libvirt doesn't catch mdevs created thru sysfs (BZ#2141364)
* libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083)
* qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410)
Enhancement:
* Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094)
rocky-linux-9-x86-64-appstream-rpms
libvirt-8.5.0-7.4.el9_1.x86_64.rpm
57a3167b3cba57e16e0143fcbca907b123d3b20b4c23b5075b18543792ee85c3
libvirt-client-8.5.0-7.4.el9_1.x86_64.rpm
3220cacbb995fb62c90b0a73de1c823c7b9eb6a643bd89ee2eb5f878b4b81f14
libvirt-daemon-8.5.0-7.4.el9_1.x86_64.rpm
e96432441a860d4e978865352a881bb54d790a58c4a7538b06bae73e3a549a6b
libvirt-daemon-config-network-8.5.0-7.4.el9_1.x86_64.rpm
20bb239425b9962aceafc9c4dd6a96c75bee4a9b0db2752ed32a4d9d163bb20d
libvirt-daemon-config-nwfilter-8.5.0-7.4.el9_1.x86_64.rpm
87bec2fe43f1f842288ba9dcb3e6840bafbbc5aead3f766b7e0f928ae0c7cfb6
libvirt-daemon-driver-interface-8.5.0-7.4.el9_1.x86_64.rpm
380273e78bd4408ec37f7360b06aecb2c911011dfd54194abc481a8261ae853c
libvirt-daemon-driver-network-8.5.0-7.4.el9_1.x86_64.rpm
6980bcb2f8ab6f01bde49dab89f0f1919d16a73a33040c0f584d1db9c04fb317
libvirt-daemon-driver-nodedev-8.5.0-7.4.el9_1.x86_64.rpm
cf5e2b276124ec165a6189df87c1ab74fefb417768e0d0897d4935a21e8808f1
libvirt-daemon-driver-nwfilter-8.5.0-7.4.el9_1.x86_64.rpm
ed2eb26159abc683f58df74c365a67be78998b18f5e842a5506e5b38b8fe575a
libvirt-daemon-driver-qemu-8.5.0-7.4.el9_1.x86_64.rpm
35f6218a1a1b3b2713d2ade31c119ea016f0e1dd0e278eeb6532fa5acafea738
libvirt-daemon-driver-secret-8.5.0-7.4.el9_1.x86_64.rpm
4bea5b106c1d9b2e1e5709c6e42d1637b9b395a63de055a407c17cacb98144ad
libvirt-daemon-driver-storage-8.5.0-7.4.el9_1.x86_64.rpm
8b0c96d055e5193138b87f57a1e9485d4ff9072d992f8f9e5ef5201942eee911
libvirt-daemon-driver-storage-core-8.5.0-7.4.el9_1.x86_64.rpm
5b6daa4a7d930663981fcc5680f29c409e6b4940d6a9ee71fbc63536abbf3297
libvirt-daemon-driver-storage-disk-8.5.0-7.4.el9_1.x86_64.rpm
55b7f1616b2e42eb6ecfdf8e8e2b9ca637269b4a84e2ad7ed6e957adaac4f42e
libvirt-daemon-driver-storage-iscsi-8.5.0-7.4.el9_1.x86_64.rpm
12a1858f54c45044aaf106d31906ed99d95aa5e1eb3025bebfa22e0975f0aa5b
libvirt-daemon-driver-storage-logical-8.5.0-7.4.el9_1.x86_64.rpm
a740964d7ab2cdfdb0a5d50d1a9de9cc42298727066f0258b1c7f1560a0c8fde
libvirt-daemon-driver-storage-mpath-8.5.0-7.4.el9_1.x86_64.rpm
1c7a4077827efcad0e5001788a8f9dff6621aa84352f381416b69452b4978f2d
libvirt-daemon-driver-storage-rbd-8.5.0-7.4.el9_1.x86_64.rpm
a84dec6f2988295b9333b14012beb50ba8bf113a30627b78d51d963f816e1896
libvirt-daemon-driver-storage-scsi-8.5.0-7.4.el9_1.x86_64.rpm
0c706fa0b5a287bb7a561f633f0b508e082b3110d94d3757da6087404dcb3ada
libvirt-daemon-kvm-8.5.0-7.4.el9_1.x86_64.rpm
be6bb2de5cecee95649c6ca0048d9186629444145c8d836510b791a42dcf18b1
libvirt-libs-8.5.0-7.4.el9_1.x86_64.rpm
dfae7c46013b26d1a09431c781b2b9aebfb68f1995865fbdff0e12cbfad4ac0f
libvirt-nss-8.5.0-7.4.el9_1.x86_64.rpm
d559b9698a318c831d66b881a3af4dabd2975c0b0d1a539c0fdee4bd0ee5709e
RLBA-2023:0962
cloud-init bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug fixes:
* Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153183)
* systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' (BZ#2165942)
rocky-linux-9-x86-64-appstream-rpms
cloud-init-22.1-7.el9_1.0.1.noarch.rpm
1108613c461841b1268e21cd769ed37d771c9185588399e0d550447cbc35fba6
RLSA-2023:0965
Moderate: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667)
Security Fix(es):
* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
* php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629)
* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
* php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631)
* php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
php-8.0.27-1.el9_1.x86_64.rpm
6e936eee74340e5a2ef68ff7dcc084d25575f3be5b9e8b5da01a0fc973043c7c
php-bcmath-8.0.27-1.el9_1.x86_64.rpm
ab39a03f649a9de6ff338ae78c9bbffec3651f0826f6a1d8fc9ea8fba0cbd2f2
php-cli-8.0.27-1.el9_1.x86_64.rpm
c1f75ef714cbbe0a99b674ae251b8f62f53604cd494ff27e701ccf000410adcd
php-common-8.0.27-1.el9_1.x86_64.rpm
470dd54da09171a89720667bb6f0093ff71c18de31505952d95193645bae5d20
php-dba-8.0.27-1.el9_1.x86_64.rpm
552df425057f413fcc56503bd09645df2e29a0c79ed182009703e523415fa542
php-dbg-8.0.27-1.el9_1.x86_64.rpm
3bfd5ebd7d87c3ddcdbf83b1b03553e4a0939ab940231656e3342e62d5e5a38f
php-devel-8.0.27-1.el9_1.x86_64.rpm
eff522c315d36b6ca261703e53b734abc0ccd43a5a3adae9453468cd9516defe
php-embedded-8.0.27-1.el9_1.x86_64.rpm
aea94e12b69410a12a4b65fefe8813fe1047adb9ccb5c9cfc07b3d709fa5fdbf
php-enchant-8.0.27-1.el9_1.x86_64.rpm
f18ae2a95314760ee773d89b392ce9c674d26951d1662df5b7a4b374d03490d5
php-ffi-8.0.27-1.el9_1.x86_64.rpm
59616f998f32268cf0d55afc1c031b8552a820027935e08157e6efbaf8c1bc0b
php-fpm-8.0.27-1.el9_1.x86_64.rpm
cb413faf20308620ef17dbd247e8fec107f882c461505c0514fa9758cdd0a7e2
php-gd-8.0.27-1.el9_1.x86_64.rpm
c6d9808434fb1566dc684f18ece56020732611f2d92aed186fe4ae82eaa61481
php-gmp-8.0.27-1.el9_1.x86_64.rpm
deba46e9d780608626fa328093eda3970bd637b9e6713a8ebb646a81ee38b456
php-intl-8.0.27-1.el9_1.x86_64.rpm
03708d625478cb954ee5583da8745c333682773bc00337414cdee2dbf054654e
php-ldap-8.0.27-1.el9_1.x86_64.rpm
b9781557ac23fc73645c2193b563564718e1b0a70d9140061551125ea59741e9
php-mbstring-8.0.27-1.el9_1.x86_64.rpm
1f0861a211a8ea03969d9b967a3d1734eeae37680a364f3f2c2e556482d22d63
php-mysqlnd-8.0.27-1.el9_1.x86_64.rpm
10e5b013f0166dfa6cf64a89da9093e247b5d303899adedcb5f146576c7af21e
php-odbc-8.0.27-1.el9_1.x86_64.rpm
41ff36835b0709066711b9e7a4596027c4231bf330df0564db42529c27e6365b
php-opcache-8.0.27-1.el9_1.x86_64.rpm
6916caceaa2919b7a3858390beb8377ca0ee40f4b37a284a134fb97b8bedd0ee
php-pdo-8.0.27-1.el9_1.x86_64.rpm
42e7826396f1a8ec2e1fb18cf5cfe0b991870e747d80c90b2a107c8b820ba78d
php-pgsql-8.0.27-1.el9_1.x86_64.rpm
fd7cadc0491362b8141920538a9782cf588984693d56f2831e89e64054533f44
php-process-8.0.27-1.el9_1.x86_64.rpm
0d7d7a1308e21ef4704b22e436fcc01d720c3a0740c09e2ef0192995dd8d2c44
php-snmp-8.0.27-1.el9_1.x86_64.rpm
0613c9fa7d3caea73d293543c1c515b86f6216012368275977da6aafdf94a5dd
php-soap-8.0.27-1.el9_1.x86_64.rpm
467c032468810f9a9815a17371b48b7654a912893d6149d73e60da5850a67b5e
php-xml-8.0.27-1.el9_1.x86_64.rpm
5f3af1b9950f82465fda05ea6f20aec71c9a53122ea57cc77ee74bcc6f0ea97b
RLBA-2023:0968
containers-common bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* Update shortnames.conf. (BZ#2158512)
rocky-linux-9-x86-64-appstream-rpms
containers-common-1-49.el9_1.x86_64.rpm
8795db0690ba77f4e97782fc178b53581f82ba0a989b41834a03d99bc809a3b2
RLBA-2023:0967
udica bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udica.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The udica package provides a tool for generation SELinux policies for containers. With udica, you can create a tailored security policy for better control of how a container accesses host system resources, such as storage, devices, and network. This enables you to harden your container deployments against security violations and it also simplifies achieving and maintaining regulatory compliance.
Bug Fix(es) and Enhancement(s):
* Bump release to preserve upgrade path. (BZ#2164991)
rocky-linux-9-x86-64-appstream-rpms
udica-0.2.6-30.el9_1.noarch.rpm
2133a41838dab65ad8db2f8933766eb8953f07c03e479fb5dbb4f413d6eec1f8
RLSA-2023:0970
Moderate: httpd security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760)
* httpd: mod_proxy: HTTP response splitting (CVE-2022-37436)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975)
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.53-7.el9_1.1.x86_64.rpm
be77545283eaa94ee8f4b8677e7cd540bbe40a45f3cd3e3367b1173db3ebbda7
httpd-core-2.4.53-7.el9_1.1.x86_64.rpm
ff4803f8b9c698e90413034d7e16d78439ba15f346c676caad2d2241be632c42
httpd-devel-2.4.53-7.el9_1.1.x86_64.rpm
f62954406eadb85cad7b882e8e0d8deb27556c204adf9957b34e9da0519d3c4a
httpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm
d95490f97281d675b284a5d9e5620b2e4469f188176ad6a9fafcfabd049fa169
httpd-manual-2.4.53-7.el9_1.1.noarch.rpm
6c42f3d57a0a3480478753f17c63e90523e2b232eac7132379fc6ca9d55cb466
httpd-tools-2.4.53-7.el9_1.1.x86_64.rpm
e2fa756359c33ce3350e46bcdf3bf5cebc69c2d674ed07520e918dae9176fab6
mod_ldap-2.4.53-7.el9_1.1.x86_64.rpm
90d24163651f5a8ca7e59c0456455bc05590bb6d629abe5d6444f0199ddf4fb9
mod_lua-2.4.53-7.el9_1.1.x86_64.rpm
2957b20949445ccc2844bf9bfcec2ae2f7f45f4fed4bb40e0a1893296516aeb1
mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm
264a4340280a1b041a67b8bf6b9bba42f03d95c08f7e7aec9195b3fc24b303ec
mod_session-2.4.53-7.el9_1.1.x86_64.rpm
74fe0e842d0f724837798401405740ee7bd63ff1b443bb166ab9d33ac44e7e9e
mod_ssl-2.4.53-7.el9_1.1.x86_64.rpm
d4cccb00b014dec5b48c791c30f782340fed7edd3fa3b0c9c8f2fcd15c15a8b9
RLBA-2023:0972
WALinuxAgent bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Windows Azure Linux Agent supports provisioning and running Linux virtual
machines in the Microsoft Windows Azure cloud.
Bug fix:
* /dev/disk/azure/ is created as symlink to sr0 or sda and not as a directory (BZ#2168913)
rocky-linux-9-x86-64-appstream-rpms
WALinuxAgent-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm
5af51818d1c38b70b1dc2994e9ca7a8bd6a72bc1a413afa8667982513a41d727
WALinuxAgent-udev-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm
8ae764d4370c2d8c4f42b3087561ebc2fc77e19623aead53884b774e846ebfc7
RLSA-2023:1337
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.9.0 ESR.
Security Fix(es):
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751)
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176)
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752)
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162)
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-102.9.0-3.el9_1.x86_64.rpm
5dbd79fe888aaadcc13d1700b2a91d7df197145776c8125680d29dcaa3c9a82b
firefox-x11-102.9.0-3.el9_1.x86_64.rpm
571c301f6130899c57adfbb891dc0a800a9e24cdd9aaa62add6e1364bacfcb1d
RLSA-2023:1670
Important: httpd and mod_http2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd, mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.53-7.el9_1.5.x86_64.rpm
183ebb744b109133015141c33750d7881ef29c2c90b4a37193b0fe08bd0066d3
httpd-core-2.4.53-7.el9_1.5.x86_64.rpm
2157d121431693b2092c522e836d0fe7f39a6f3f78f5233706fc9ff9268556b5
httpd-devel-2.4.53-7.el9_1.5.x86_64.rpm
0b1b747dff809e5e15cf9bd7535773e8eb7f470d2ce72d9e741549e690d97603
httpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm
434ef5817087d04dc9c4ad74f4cd8c000da031bce2248c29302f7278c02cc29f
httpd-manual-2.4.53-7.el9_1.5.noarch.rpm
2ebeac5aed899c14b49856ff8a9ef34391dca4cfe9465215a44bdd131b570afe
httpd-tools-2.4.53-7.el9_1.5.x86_64.rpm
c170cd77505c1070843712be0cb62831e9c9b479967689b5fd55baa5f0d0ba7a
mod_http2-1.15.19-3.el9_1.5.x86_64.rpm
945dbbfae5bf5291fb6c7132eb6c34d09f09e90ef935915a5804b97de5ce34c5
mod_ldap-2.4.53-7.el9_1.5.x86_64.rpm
c69b735f0fe584050d143c4a71e24dcd760e8460ae2f44e6bbd86a958bf6acf7
mod_lua-2.4.53-7.el9_1.5.x86_64.rpm
696e5e1a81a907eb850bd89399984e07f3ca5b4a78b6a193581e0962db481792
mod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm
b3ae614753b0ca018178a7c0609cbe1b759e61e9c72158bccf4403215d1b519a
mod_session-2.4.53-7.el9_1.5.x86_64.rpm
4697ccc2b35556ad9516e63bc9424c472427f683751554ae9a1d11d22a6ed9b2
mod_ssl-2.4.53-7.el9_1.5.x86_64.rpm
944adb6abad6c2367d7ee30896186e9656084d99f1c55ab43a9acca76e675566
RLBA-2023:1756
.NET 7.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es):
* Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.1.0.z] (BZ#2183592)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.5-1.el9_1.x86_64.rpm
7be96285ff00ac0b571fe978e2c59120232c420867f5f46d03dfc00855aa90ea
aspnetcore-targeting-pack-7.0-7.0.5-1.el9_1.x86_64.rpm
1d142f98871151b134807309a953b4295847757e7b3ffe5f4a95d7d2bf2213b2
dotnet-apphost-pack-7.0-7.0.5-1.el9_1.x86_64.rpm
aaf2ed50fdbf6aaf5a695fcf43d14c9cf86195927a49bdf5287f6cd02ecf76a3
dotnet-host-7.0.5-1.el9_1.x86_64.rpm
463f8236639a2815118b81b9ed25325862aa7cb30e92a134795be352efe3dd4a
dotnet-hostfxr-7.0-7.0.5-1.el9_1.x86_64.rpm
ba8c98b2a7068c7800bae9e864b9627741bf30937807bff653cc7a0f26e6c53a
dotnet-runtime-7.0-7.0.5-1.el9_1.x86_64.rpm
1429180f71ee4f027ec77a6f42cc66b4d6624e5a07d481e6c1e70ad1819ba61c
dotnet-sdk-7.0-7.0.105-1.el9_1.x86_64.rpm
7d8a1bafeb2d7c410fe71e51af9ba0190df33a88886f26ecd638b66341b72b4a
dotnet-targeting-pack-7.0-7.0.5-1.el9_1.x86_64.rpm
779ed5f89d63a4834a4517cbd4e58856acb577328a7bfcfaa75102121b40aaca
dotnet-templates-7.0-7.0.105-1.el9_1.x86_64.rpm
f7b6cfaf0fb748be8e6a890aea472e47d7d2cf7e30c80cf0c36949d12985d095
netstandard-targeting-pack-2.1-7.0.105-1.el9_1.x86_64.rpm
c5000d6b44dfb59cfc8dcd99d1dfd1e77458f6963ee41b0f1b4367318d8b78bb
RLBA-2023:1758
.NET 6.0 bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es):
* Update .NET 6.0 to SDK 6.0.116 and Runtime 6.0.16 [rhel-9.1.0.z] (BZ#2183583)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.16-1.el9_1.x86_64.rpm
d43ee9d3cd4deea5ce74fc19a28b8f3382ed5203e903a79b0e6cd17748c12f60
aspnetcore-targeting-pack-6.0-6.0.16-1.el9_1.x86_64.rpm
8f5fa49f9f580bafefc67e8160faf4aeebcda6e1aea6ef5389015a9c2490bb41
dotnet-apphost-pack-6.0-6.0.16-1.el9_1.x86_64.rpm
cb523fafdaaf016dd135300071cb864d0d3aead770296857f9454870cee21f66
dotnet-hostfxr-6.0-6.0.16-1.el9_1.x86_64.rpm
31169c86ba49746c6344503e36f042fdc5d4fb86b761ff147d2a248fb2260fa8
dotnet-runtime-6.0-6.0.16-1.el9_1.x86_64.rpm
161734b887337c8a13ee91d5ed2eef26c327ce5db695f3fcda38e5e5a373c2f8
dotnet-sdk-6.0-6.0.116-1.el9_1.x86_64.rpm
e2fe5b22e7a1c785988e291bdea89b633e1340aa03583f5029a8621793622365
dotnet-targeting-pack-6.0-6.0.16-1.el9_1.x86_64.rpm
ff9c3d55e4c80d13f630d17afc0cd06dc81ef29f22773b2a9c3c4f5f71b2e2ed
dotnet-templates-6.0-6.0.116-1.el9_1.x86_64.rpm
c7eeedf70bf6fb2555c7ad1e975eb47d102d992c5069044f490578fd0a4b5d9a
RLSA-2023:1879
Important: java-17-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186804)
* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186811)
* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186807)
rocky-linux-9-x86-64-appstream-rpms
java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm
4e87fe43167588c98b34ea536987099840c4afa9bb7077a8d3cb99cb89a25a4f
java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm
a843368e5c5dfb12fa63f6559769a54edb61b04e2b85b5771ee15d6baa522729
java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm
13bec13c7ad1598288168c612882315062220673325ab479fd56b264d6e4315c
java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm
f52eeb243c1c52f9aea6f87dd634494a86fd30ea57d04df9a1f5ad25ca2ee341
java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm
5f5f49eaed774a85ae7b6c12084b47526ba5926be203cad8b82ce744e3d7a9cb
java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm
0646059998f75171de747fea74108c5bfd231d0a0d773e108d3a7ef459c3341f
java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm
124cabe6e47e757074c59ca70889b2bc90ff5de15ec9f090cdd5d8f700d87352
java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm
9dc6fea58049b1ff69cbcd98df0bb433d7e6bf9550c549ccc61850862b73a802
java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm
12478dc71ae3d2aeec06e3285ab89e1a1f760a5d0cbcf0e2ba7aaa1c9e8c4c37
RLSA-2023:1880
Important: java-11-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpm
07b1788ec367da3590ca1e8f28a189e4b6093d6de92ba1eeb5abcb19373bb82b
java-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpm
a15eaf5b078c9c5b2c057d23c1b02b8e19095d7c462bf971ac55fb47b9fc1bdc
java-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpm
9da3667e598d2052e5358f586434f13befc70d7c39d8b6a16adfa6d3ee3cbc60
java-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpm
04af1b29209a0854035ee6dc3ef61dd99486e2d14d4685361bbee65f2e537046
java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpm
e27228183316b84a1ba807a6c2200ef5d29b0e8884755d6d39edb1e3533cc044
java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpm
bf8ad95245b853cd621bfc69e9d80eb1c2525ba753642cddba45835de3d8a3cb
java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpm
eab1430c33d3a2d156da285fa61e31ff94fb871cab987757054c86ec2d2844d1
java-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpm
70df124380575bb1eb58aafeb2bf1be84ceef96f957899001f42153455be738d
java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpm
8fed70a0919abad76e2f623dcbdbcc843988fc2bcbaa2e501030b78646b40d7e
RLSA-2023:1909
Important: java-1.8.0-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024)
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm
e5d71065577dde54cb390075336e02cd3e50b7c23dff9e1f470418d2c8187d2e
java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm
ea5f08818b4dbab7562497daa8f7105e608dcf73ba580d51ba57ecdd1fe52d7b
java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm
5744f9bb42afd85ed795d49ab0e44d707b7bd8bcbff597dd0cc366759ebe25c3
java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm
6fb95376dc06f8727f601a99b3a911e3358ee490376ea654e1b039dabceb47d1
java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm
e7aafc93beb0b0aa72525a52420286d5caa7c1729dfc23747641f1aa1008f061
java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm
e8ed0f2151577dac7f6666ac58778d9ae76dc81a7a286d72df5607b03fd6bb52
java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm
a71a8ea5be7a44355557d9dcc767b61e0cedeced41925dde267f0975e0265495
RLSA-2023:1809
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.10.0.
Security Fix(es):
* Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547)
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2023-28427)
* Mozilla: Fullscreen notification obscured (CVE-2023-29533)
* Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535)
* Mozilla: Invalid free from JavaScript code (CVE-2023-29536)
* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550)
* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945)
* Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479)
* Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539)
* Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541)
* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548)
* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp (BZ#2186102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.10.0-2.el9_1.x86_64.rpm
add6a1ab8f47c33aef7d09e7f9368d33fa2874722635b0332f5a6d808347f9d2
RLSA-2023:1918
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.36.7-1.el9_1.3.i686.rpm
5c342f110e58012aecd1c636547e731f4d4b91fe0dbfeee2a53a02cb4b3590e2
webkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm
2083a9bcd1a5391202e744dfb9cfcb8cb7a693a9e4c9e9eb7a43347a68abffdd
webkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm
af3568c9576b799b32244d2714c77434b77c61938db1ff73ab53accd04b6ad3a
webkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm
1b5141cf0645582e06fac4123989824b2c211663fdb55891e7d451d227c4ca0a
webkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm
150eab2166f75bfce4acb05e2f1db4485f3fe99974568e76ef24496a113e4bcb
webkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm
53c439a0fe85632e6302704d0fdf7b76655ea182650cb6ce47ca1c74dff3c26d
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm
5a7e0a3f0a8f0ffcb8dadf600dfdcbfe3bc60aafae5ba4588102389ceecdf9be
webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpm
aa52f2e3fd8e11981662df5946792f94ab16398b6e738a11c9e180f853e85268
RLBA-2023:1779
nss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the
cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* RFC5054 groups are occasionally allowed in FIPS mode (BZ#2180924)
rocky-linux-9-x86-64-appstream-rpms
nspr-4.34.0-18.el9_1.i686.rpm
32dc03324a78b17641a4d0bf308522a8c3d9fbc5ccdd8a8eebc16ce8059d5a63
nspr-4.34.0-18.el9_1.x86_64.rpm
54bf7721b9211bae17a39abf00fd2f277fa17832dea3373efecc02a07693e35b
nspr-devel-4.34.0-18.el9_1.i686.rpm
a8c12537ceaccefa83770bde083654cce939af08e968d09bb05e9add2a7eb27c
nspr-devel-4.34.0-18.el9_1.x86_64.rpm
6cbff63fd99df9ebe43198faec44a91f55be5e72b702633f0d2938d162a786a5
nss-3.79.0-18.el9_1.i686.rpm
b6f9249336d8725838d54557f50b4604f83c49c97282d95f6db6ecc406e56058
nss-3.79.0-18.el9_1.x86_64.rpm
861d1df85972ff033d3c80e51df0786a16bb7eb065597793e932c28ba9d06922
nss-devel-3.79.0-18.el9_1.i686.rpm
e23a708d2dd5d4d83349a12b43933ec6847bbab51abea7fb032a3e49fe9ee723
nss-devel-3.79.0-18.el9_1.x86_64.rpm
24c17017d11d109ffa1a6942cef0d41d91da768121c38955671466601cfa98e0
nss-softokn-3.79.0-18.el9_1.i686.rpm
aeb5f8a4b90b4cc3196d010de8a9a952d8c808d72e942c67a7e5446a80bf38b7
nss-softokn-3.79.0-18.el9_1.x86_64.rpm
eb0e6ceca59abd45058c4c6e1cc11234b2197e4883f48ea323bb0bb85268f6ba
nss-softokn-devel-3.79.0-18.el9_1.i686.rpm
159ecbfbdaf52315d3cc01ef63806e1cb519c5837c4c1b37f79ae63e16b6b722
nss-softokn-devel-3.79.0-18.el9_1.x86_64.rpm
0712fe035d3c8cc1e275b65976f6fc1f17f53c188d083755113a9a5cd2fc96f9
nss-softokn-freebl-3.79.0-18.el9_1.i686.rpm
3ebc9e1800b9fdfd3d41b14ce6dfac4ae52c084be508657a9dffba3de11214b3
nss-softokn-freebl-3.79.0-18.el9_1.x86_64.rpm
292ff920e8f0f826f0b688727c684193035d0c3d99d3c4ecb066c08b60bf1cd1
nss-softokn-freebl-devel-3.79.0-18.el9_1.i686.rpm
2cf9fb4f8fa799acebd87add27ece6aadd32d729ae30c7b8d587bdd15e1950db
nss-softokn-freebl-devel-3.79.0-18.el9_1.x86_64.rpm
561089fe686a08d14d342dc549e669c3e09c1e7ac765cf49e32022dc4a1a3374
nss-sysinit-3.79.0-18.el9_1.x86_64.rpm
4ba942b7afb60392543a7980509d46830015dc4cc51d17160dc567c149160801
nss-tools-3.79.0-18.el9_1.x86_64.rpm
d6dd87880a0d8f89e20b36c8897ebed0b031e953533793741569816375e62969
nss-util-3.79.0-18.el9_1.i686.rpm
ae42405c92567f6168628ba0bbed18e82267ac1ef12cf5de4e51f18efbaf708b
nss-util-3.79.0-18.el9_1.x86_64.rpm
a593cb870784733e2e614122b36eb1c72fbfa0e8cd7a94cf692ea522d18bdb14
nss-util-devel-3.79.0-18.el9_1.i686.rpm
32c315dc1a24c468af32469b96ab1b78ed9cfac84b61f36d14ae750bb8772297
nss-util-devel-3.79.0-18.el9_1.x86_64.rpm
0f12d730f6e75ad3406108f69a9256d6c2c32e6fbd45eeed56c1ac1def69be7d
RLSA-2023:2074
Important: emacs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: command injection vulnerability in org-mode (CVE-2023-28617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-27.2-6.el9_1.1.x86_64.rpm
6ce822afa9ffd07b47b9e06d18b68f3a79f36ae80990ea900bfb1152acfa8697
emacs-common-27.2-6.el9_1.1.x86_64.rpm
aeefc75141b367025bce09b94626d203b5dfde34fbafb0d0473a541379caf2f4
emacs-filesystem-27.2-6.el9_1.1.noarch.rpm
948154bc7cb631093e374e98bfa15d767aa94b301e41697a097e8c4ec77f78ee
emacs-lucid-27.2-6.el9_1.1.x86_64.rpm
a1b498eacae205bf012e2a71ab74d4738df389ce32c5fec7a63efd9461bffc43
emacs-nox-27.2-6.el9_1.1.x86_64.rpm
f19ce6bb52309c07d74ee87364be221387aa685811122717383578c6b397ab67
RLSA-2023:2078
Important: libwebp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libwebp-1.2.0-6.el9_1.0.1.i686.rpm
30a3caf13a4f74a70361f3e91cde738b04228c83c93424995b8b8f86ed32716e
libwebp-1.2.0-6.el9_1.0.1.x86_64.rpm
6ec56e54fd04fa7ead4e4138b12ad8e7e61aeb7cf00dbb16a2eccb456e8980cd
libwebp-devel-1.2.0-6.el9_1.0.1.i686.rpm
5a51591cdaf4c29ca60d82312e047296c50833650e8a9f11973273d1cb37a9b0
libwebp-devel-1.2.0-6.el9_1.0.1.x86_64.rpm
985fa5c4eb7835e0e0fbf772ec3740ebb9f7408cb910e81b4c4c4552895673aa
RLBA-2023:2480
libsepol bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsepol-devel-3.5-1.el9.i686.rpm
f9ab384c1398ed2b4b19323860e5c1cc01d72ee55acf5476feea500a2633ccb8
libsepol-devel-3.5-1.el9.x86_64.rpm
95adc4102e6f723ee4ffc98dd800cf96ce36d5aa65a9dcb05295368ec41a18eb
libsepol-utils-3.5-1.el9.x86_64.rpm
87dd56404ad9bd0da000769df96d863d14560e55d2079f9be6dcc1676cdf89d3
RLBA-2023:2495
dnf-plugins-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dnf-plugin-modulesync-4.3.0-5.el9_2.noarch.rpm
3fd73dbfc5e2c7105bd0641d4ae0004521cc9006e9491e9f74714537154072f7
RLBA-2023:2514
sssd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sssd-idp-2.8.2-2.el9.x86_64.rpm
316b60f3bdd036694de3a0f2ea3b2afe956b3043d2d4c2e7f4f06237611038d7
RLBA-2023:2522
gnutls bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnutls-c++-3.7.6-20.el9_2.i686.rpm
c6acf7b5d13150d3a4b4a8efc9cc147866a444986d794011225bc80eee364207
gnutls-c++-3.7.6-20.el9_2.x86_64.rpm
d841d90b0f2dd159e5b713bd6ac5ba231b51f8197de99592b9240ad0f0e26d8d
gnutls-dane-3.7.6-20.el9_2.i686.rpm
4633e19ec7bcab63d49f3dafcaed7c92c9634309ebe7db59043d09f4dbd1c280
gnutls-dane-3.7.6-20.el9_2.x86_64.rpm
f9f5a889f61529b908f5b6435dd8a475db2074fbe8e62ae5fd0f22bec4567b48
gnutls-devel-3.7.6-20.el9_2.i686.rpm
903238a033bb7394cf7bb41c01b85922675c7f61836db44ca64a0aedbd958a16
gnutls-devel-3.7.6-20.el9_2.x86_64.rpm
2c571de05c31ca87814628c613e75029fc13fa3d3d53b3d222cc86c05f3b9ee7
gnutls-utils-3.7.6-20.el9_2.x86_64.rpm
62839cf565b209b58df56130b8116008cfcb3d728b12121d71faaf8d5fc1f298
RLBA-2023:2558
libselinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libselinux-devel-3.5-1.el9.i686.rpm
c3e4abc755fe6820500ccc1902fa934683eaae7f85216db7f9b37e27bec17b49
libselinux-devel-3.5-1.el9.x86_64.rpm
845392300eaea3fd7380494764d97a12be77fa17842ebeaad8eff83c2f98bb8d
libselinux-ruby-3.5-1.el9.x86_64.rpm
642c6ab8d17417fd7217b2acb6b921742861d366fcc0d49069baffa1cbae835a
python3-libselinux-3.5-1.el9.x86_64.rpm
b6771999c7f2e696e99ed26a0afffaf90053516789200a987eff014d47cee91d
RLBA-2023:2564
sudo bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sudo-python-plugin-1.9.5p2-9.el9.x86_64.rpm
d6f58b9924913d1d2a849c1e459cd4514162d3a981cece1861e721eaca48d80f
RLBA-2023:2580
setools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setools-4.4.1-1.el9.x86_64.rpm
e988ecf8de30e6b6991a597c61e8ac7871f4c5975c864ff0a09d75cd98001f65
setools-console-analyses-4.4.1-1.el9.x86_64.rpm
ed18df75cc4f173cf78effc9d5ff6dcaf89ffb4397d10a223cc9ce681d8abe21
setools-gui-4.4.1-1.el9.x86_64.rpm
3665323f74947f92df1eac33ad5dcaa62354711a5fb204e3f925415579a7c233
RLBA-2023:2586
ipset bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipset-service-7.11-8.el9.noarch.rpm
0deae91c87bd6dbbeb32e3c99d50671e940034daf74c4d29f369b5344d73461b
RLBA-2022:2502
new packages: bind
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-11.el9.x86_64.rpm
a8d1296d08517d516e670123500ed9c4c8a2107b223c863308b56e6ed379e191
bind-chroot-9.16.23-11.el9.x86_64.rpm
e6ef7ef18d69f5974d9cf33bc5b819dc11c528d6c7e3ef4d9c8a599648dce99c
bind-dnssec-doc-9.16.23-11.el9.noarch.rpm
a5f226a1a4a2c9c3f51e41f04d0d66781e389aca7694b69ae5bdc2286e6b3f0f
bind-dnssec-utils-9.16.23-11.el9.x86_64.rpm
a9ba37f7fede188be363ecda1321107f933e713bfde057f2f8a8475db7f09d3c
bind-libs-9.16.23-11.el9.x86_64.rpm
591e9117f9c44a5069315ab1bdaeabf97b74944894395782727ec0d5141d2bce
bind-license-9.16.23-11.el9.noarch.rpm
fc991dde107e33d0627e78b03fe21fc928e4acbf2321e7a895f273f8f9bc18f3
bind-utils-9.16.23-11.el9.x86_64.rpm
287585889b2403ae676416563165ba0f2304ca267f3f80db8c2abc3768f92345
python3-bind-9.16.23-11.el9.noarch.rpm
e688f8107e5e1dda75532d0499479704716333b226dd895b49f3dfbe6bb34509
RLBA-2023:2223
anaconda bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anaconda-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
54c9d7f9fe1b481e76221bd21386f2829c50aa4a6c60af4be9a14a8451435b1e
anaconda-core-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
dbeacba732218426047f6c6cc076b307afa0331c4a2b5cb72eb34890b060f4a2
anaconda-dracut-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
8144d8e56e0b7bc781d68fe28c905985bc4514cdd0422bcbc6c4a93ca02bc14d
anaconda-gui-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
d634642ab61b3e4ab1f7ee7235e55bcb4e327819172978925d37c9fbd73f2174
anaconda-install-env-deps-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
8e4d14f4601e5e1bb2708eb72b8a8b0028cb7150915c9d4a33c5807e95783216
anaconda-install-img-deps-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
8797d8750a8696ffb6d7ad2231e4554bedbbfe6673286564e0ce8ecbf2b04954
anaconda-tui-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
e36166e60626a5a3fd573b9b1c7e42ec08ace4b50e70dd7cf5c0c923e807c632
anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.i686.rpm
4ec773b37f06b8a5087f7bc56b4b207c53b0a0f5cc8776b48fcc1f964f85098e
anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm
91d72a13fbd49e27c007b923b75c8e1adc90f47e662fc43dac64f2ebc1857954
RLBA-2023:2388
python3.11-wheel bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.11-wheel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-wheel-0.38.4-3.el9.noarch.rpm
bf1517b971f93cf8961d83da4cd7a90331ba0d532b5e9973cbea7712a19903be
RLBA-2023:2243
python-simpleline bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-simpleline.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-simpleline-1.8.3-1.el9.noarch.rpm
22635604f9ffca3523c145ccdf34874415518d41da078aabd40510b37f00e51f
RLBA-2023:2279
plymouth bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plymouth.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
plymouth-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
60dbaddf05cbfa0ea7454339f4e11c6ede27efa758db231d0cf7917416bf8d99
plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.i686.rpm
cf76cdc500d5622c265524c60363c798315cc24547325e4ec21ec81184fce148
plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
b31c29de013473c4dc49683554d2de8fe7e9e6d676f8a469490edfc00954fcbd
plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.i686.rpm
a1794ab4c94d933a24a2d7e6954d5ea36592b5914a33f2d4765b32bd4983fcf9
plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
1d1fcf50e92d223ea3cbb8a7ef58d681213a6dd607a21b5d5c52d0fc2c71f0ad
plymouth-plugin-fade-throbber-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
9a1694bf6496a7b7f140b1d7fdf903bb5223eb9f4817b763e40b3a06b416fa5d
plymouth-plugin-label-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
0e89c1a4bebd7705113beff5625823d29260567c973d651e43d0b783ab3360f3
plymouth-plugin-script-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
1e57f496e07feee5f77bd781029fcec5a2681682b458474be17a3f759a9890c0
plymouth-plugin-space-flares-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
62b6d1b69d4338134acb1ebcd27f265528fa76298c941073de454f19361295ed
plymouth-plugin-two-step-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
87d20a83b210dd1eebfefa22871eaec804397edd393184fb928b8460678df1f5
plymouth-scripts-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
62c529b96b0a2f1a0581a9c71cab7f1b18a6cac41634e82abecfae432dc4c89e
plymouth-system-theme-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
8664eda6ab102023f8b02c4bf9162e47ec66580b7dee997943038598f5a9619e
plymouth-theme-charge-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
ce653d1f6ac5c514034a05dafc89d5683b724a15ebf63ff60b7c2540134c620c
plymouth-theme-fade-in-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
f9364fae1c106304fb0004744aa0a0e4777240764a66528d1236d8a00882c119
plymouth-theme-script-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
687b1df162135ccda37f9176984eb70dba956c86bdb8d4311d058933ba18230d
plymouth-theme-solar-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
94cf695347a057e071205c5f6f7d849698797b44b8b8dd58721915ec7c126ad8
plymouth-theme-spinfinity-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
0b00b3806c17881ad627144a066b12fbc22fbd92c1d3d8f0198cddc6ef09ab6a
plymouth-theme-spinner-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm
4391e018054cd5a4811ae8fc188a810cdd4c64f531c8d4a141b80a00c8d67768
RLBA-2023:2301
libosinfo bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libosinfo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libosinfo-1.10.0-1.el9.i686.rpm
66348f2e468fec8187c69f64963120ac79813d180d9e97b4688f72027be931c1
libosinfo-1.10.0-1.el9.x86_64.rpm
97e51c58fc9cb62d715781d2067567563e398733ec62ab5b2d7ef60e386d67d0
RLBA-2023:2352
nmap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nmap-7.91-12.el9.x86_64.rpm
cd1cdb3c688544b13929ab38db8553ad587d8831ac1a28550d937750bfed5049
nmap-ncat-7.91-12.el9.x86_64.rpm
348a404c3c9a8cdb742c64f928ed3b7136cc306dfc93c5e2df689b31eea082d2
RLBA-2023:2372
perl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-5.32.1-480.el9.x86_64.rpm
94a5d236293420446362349755f170b5b53febb4950d2efbc99fccc9335f793e
perl-Attribute-Handlers-1.01-480.el9.noarch.rpm
d1f4a9c2d5f81921a9ffe0b13b7034e90af712362513b86888291ea806b61f76
perl-AutoLoader-5.74-480.el9.noarch.rpm
7347b9759e1c2a384111e48c02a6353bbcf9667e8e0133e2148594350b32a340
perl-AutoSplit-5.74-480.el9.noarch.rpm
7f6b6224eb1c384402fdc319838891a9d9245ba9431ec79b21f7b13215653b8a
perl-autouse-1.11-480.el9.noarch.rpm
efc1be61589a9c0d48c8934bbfb869d5e5dd2039bde7cec6f5a350e5ec9d33d9
perl-B-1.80-480.el9.x86_64.rpm
99faed8b5d89f73650d47848919af1c6a6b799942ddfbd5472f0fe65bc1285b9
perl-base-2.27-480.el9.noarch.rpm
3b53f8a351745d9bf4de41c0f0d0ef43bd194e2bc7c6972e7d6d8172c2340bf0
perl-Benchmark-1.23-480.el9.noarch.rpm
de810ce6c52ead3159ebf243a798475596c7a023802997765179df57255113b4
perl-blib-1.07-480.el9.noarch.rpm
ddb7e5ed5541955149aee9cf3cb057c5053b375fe7b6e98f32f8c7b8a63b3908
perl-Class-Struct-0.66-480.el9.noarch.rpm
c8a3bff8d7e21f49abea233942748f9ae7ec658d3cdb49820af3a76f85733883
perl-Config-Extensions-0.03-480.el9.noarch.rpm
2d5e95a24dd1322458c4c5f07fd431ea82ff8285fc0bbdd78f5b71eeb76fd100
perl-DBM_Filter-0.06-480.el9.noarch.rpm
c4af9a314ce43e1bbb106cab69fe02fdc16fdb9f2f6e9bdc802406184f6dc0d8
perl-debugger-1.56-480.el9.noarch.rpm
49f4de633bb3467b162b02295bc516abaaeabe82cb424dde1f3a1ae1fa19b7a4
perl-deprecate-0.04-480.el9.noarch.rpm
8ba53da836073c2cc8e3bacd5b5a19b37ab59517c3cd8631d848b82e125f3578
perl-devel-5.32.1-480.el9.i686.rpm
041d9cecbad5e31cadd15eacca9dc5781c6b3bb62ff83d19b5d8cd9fc3148329
perl-devel-5.32.1-480.el9.x86_64.rpm
7324e2180003d31f54b440b08fdc696254cd95c931bf74789a46b4b6a50b37de
perl-Devel-Peek-1.28-480.el9.x86_64.rpm
0ccb88be268732e148307f52693b5f873e9828d1b1308def53fdcba5e42ab49f
perl-Devel-SelfStubber-1.06-480.el9.noarch.rpm
66b416b0ce956f65660b841127d003ddfeaf996ec6cee1cf93d42de1b74d8144
perl-diagnostics-1.37-480.el9.noarch.rpm
c57f1156d07d3621ee67535c0dde41e163a6efa8957f62d078463f4065ce69a8
perl-DirHandle-1.05-480.el9.noarch.rpm
cfb9547d1e62831d3d3c88b5433ba100482c55f3989f106c634e6ac87ba8ae12
perl-doc-5.32.1-480.el9.noarch.rpm
b6c4a329edf55fcb6bd099d649ea6ddc62087cdcc36894faa17a1b0bdac1e30b
perl-Dumpvalue-2.27-480.el9.noarch.rpm
1dc13897ca380a1a320c71b6aea94420cf1f9d5e36a8ecfc31a99fe6a5964147
perl-DynaLoader-1.47-480.el9.x86_64.rpm
1d6ee829a9e2e595aff4a219bbf59f8749bff522fbc36fcafbcf78f0a1ec6a02
perl-encoding-warnings-0.13-480.el9.noarch.rpm
e36ab1bc106b2e074ca40f63eee52ff2858e2afdce8d043f5f1a0d669759b3f0
perl-English-1.11-480.el9.noarch.rpm
2362f0eb50c750cf5797565ce9d4be5cbbfa2d26908e5d58d3a17b66295d72ca
perl-Errno-1.30-480.el9.x86_64.rpm
700022aa75d2d106fdee3df39f20557293ded1a952ae95a13bbddab6791319c9
perl-ExtUtils-Constant-0.25-480.el9.noarch.rpm
2e009264bf2f2514b133d43ff7f61773d767c485b22d05edd165300a82afb8f8
perl-ExtUtils-Embed-1.35-480.el9.noarch.rpm
5cde3cdbd81515a40fb3f1f0da4466d179b6ffef498d6cc42eb5244fef0b0ab1
perl-ExtUtils-Miniperl-1.09-480.el9.noarch.rpm
83039ae58b9530150eee8b631aedafb8d29513b5e991d57ccd9467b5060bd15d
perl-Fcntl-1.13-480.el9.x86_64.rpm
bae8250bbcd49755f1eaf1207175e99dfee0da5468f678f12ec6171b256147a0
perl-fields-2.27-480.el9.noarch.rpm
76cac5d12ac373bea045887fa3ffeec90753595b0a3e33a82096de9a91b80c27
perl-File-Basename-2.85-480.el9.noarch.rpm
c12cd8a1f9cdb36167ec18052570c262d638f7beae75a9baa1a11000a4363d6d
perl-FileCache-1.10-480.el9.noarch.rpm
714db3471f7ef030379f128ed30ee69bddb551aab2ef42dad651953e0ed9a404
perl-File-Compare-1.100.600-480.el9.noarch.rpm
9a357dd4eb0aef091a7060c94e917660569f60316e33c134615aa33b100a882e
perl-File-Copy-2.34-480.el9.noarch.rpm
6bc5e35791b393071048c82f95096e4ea9c73c981f5613bb1cf48a13a67dcf04
perl-File-DosGlob-1.12-480.el9.x86_64.rpm
68d932cb5b96380b0ac5b4e4ef127a113b1a8fc298fe92518261b8f9f366d0d5
perl-File-Find-1.37-480.el9.noarch.rpm
ac1befaf722fa0f28eeac1b7f0a65ec3a25df05e3c649a38127104c6c865c6cf
perl-FileHandle-2.03-480.el9.noarch.rpm
bfbe39be10d6956483eca796999057bdc5b1350590984f26268c9d4587521400
perl-File-stat-1.09-480.el9.noarch.rpm
19ab7ad87b1e2b552bdafdca83bb3dc7b94aa03da510349c3de9856393546050
perl-filetest-1.03-480.el9.noarch.rpm
45bc8a4e2124248b83295143d4c1deada0ef5fecd9cf6445631ceb6ddb3014e9
perl-FindBin-1.51-480.el9.noarch.rpm
5cd48fc587dc0881f727b4d2fe1d81baf069332896330a4937688340c9980719
perl-GDBM_File-1.18-480.el9.x86_64.rpm
da0b9036d895c3286ed4859ab4b41c922dd7b4432864cf652fa163aa86291ae2
perl-Getopt-Std-1.12-480.el9.noarch.rpm
2a38cf27519b015671e635b22f87b9dd57f7b1144575de404e94edf1faf90356
perl-Hash-Util-0.23-480.el9.x86_64.rpm
55d6e171c1eafb2f10c1f84d90677227376a8db733b1641adc550c38bf70dcde
perl-Hash-Util-FieldHash-1.20-480.el9.x86_64.rpm
65a0370c439ff3c896279b90a4a3df4ca56db29280490c5b40c905ce4b743144
perl-I18N-Collate-1.02-480.el9.noarch.rpm
d9925a9c1638b4a2f88db3a848a93151770e3f3d69d6df6df405cceebec0be86
perl-I18N-Langinfo-0.19-480.el9.x86_64.rpm
52c0093b2fec90a165921f58fa1ff729bcc9471833d801bfd90465ba0852580a
perl-I18N-LangTags-0.44-480.el9.noarch.rpm
994759ee44724e33d06a843246ba901d3e73246683a2fe174403315e838ebf85
perl-if-0.60.800-480.el9.noarch.rpm
6ba860cd8b6b5868409c588a3590d7ccc74320cada5697965c580fbba911474c
perl-interpreter-5.32.1-480.el9.x86_64.rpm
48be4441392b922d8e4b210709c89125580fd29c0939b87121343b6d92570e35
perl-IO-1.43-480.el9.x86_64.rpm
d152d311217849d6b2935e8ced8bb088233fb2ee66d536124ef76ac245eb4577
perl-IPC-Open3-1.21-480.el9.noarch.rpm
3a17a9eeeda5c65b615e2f9b589437e3afb150ce2efd253be48018d28075095c
perl-less-0.03-480.el9.noarch.rpm
269725c12a49e4059547ac130326ae181f30f0dc5b1881a5f2b9c3e8f50ebd55
perl-lib-0.65-480.el9.x86_64.rpm
698231b31fac26e9dc45a5f562be19e1ba65af3da44ae896638e0d9e526f8817
perl-libnetcfg-5.32.1-480.el9.noarch.rpm
04d62cffeeadd167a0954f59b007545cffee2d289e002eabb5d718ac10b57007
perl-libs-5.32.1-480.el9.i686.rpm
22fe6d75ad5bef03f8c21f2454302ab59f393fd2d24d33752e8346226a44ebb4
perl-libs-5.32.1-480.el9.x86_64.rpm
f4005cd076b4775f6c53001ee16cf9bc845a9591d1eed8b2446e5af96a22a7a3
perl-locale-1.09-480.el9.noarch.rpm
03e50df7e763237c3b748bc2fcd5a936ceb8006eaecdc1165dce2e6caf543a53
perl-Locale-Maketext-Simple-0.21-480.el9.noarch.rpm
30fe47a550a53f8daaa34a84048ee69258253d14945e1f602afb5fbe679d6f95
perl-macros-5.32.1-480.el9.noarch.rpm
0dab660a3812292c63b707790a66095fbcea7b9d3d5fbd0ce283e6b99899b311
perl-Math-Complex-1.59-480.el9.noarch.rpm
a6b7733f8e9d56a23440cb475b9a38d2794ce1c0713ffba51ded261d1d28fbec
perl-Memoize-1.03-480.el9.noarch.rpm
5bc240f7b37d6b3f64c6001d5512d2f0ac15b341d68cad001e6c5622a0132fb5
perl-meta-notation-5.32.1-480.el9.noarch.rpm
70778f015f2c9ca8401c3cf9de1308bda3775bc5ee6635450d186f90472f719d
perl-Module-Loaded-0.08-480.el9.noarch.rpm
2bb8172777e705adae838cf965ed6d84d2896c3baab11c6273d95f49eebc6235
perl-mro-1.23-480.el9.x86_64.rpm
0eca17afcc5d58777af3e5f47e5470782589281c1de499ce54ef7a0fb4fe15df
perl-NDBM_File-1.15-480.el9.x86_64.rpm
8c647acb7333df3c4d9e0ba02f2db231dcc0d38a875372bc859adbd283b366d0
perl-Net-1.02-480.el9.noarch.rpm
b3ef3a983682cecfc5fb5e89b1097cee5db138e4698c7996e16eff11c33c5389
perl-NEXT-0.67-480.el9.noarch.rpm
577634a9d6f9a93b855a6b2b686b92fe984b88d24de89c9997d537b0fc7395d9
perl-ODBM_File-1.16-480.el9.x86_64.rpm
bfe7784b17ac72818aa768b4767656c7b7a5d9a7a5465d59874caef27157aedb
perl-Opcode-1.48-480.el9.x86_64.rpm
47cb0310d5d7e950e6d3b44a3107402c5c2c81b7a210eb1b3e270a704526e93f
perl-open-1.12-480.el9.noarch.rpm
36474f1abf3287f04125fcb1a0eb3860142065743d5809dd18da4cc2e388469f
perl-overload-1.31-480.el9.noarch.rpm
86e81019a9d34e5b442c644d646867a3486f03588dcb0909b7741b2d7be45504
perl-overloading-0.02-480.el9.noarch.rpm
1533cfd300c111eab1eb788403ac1990dda59f72b29843794fb39f7d63c1e5b8
perl-ph-5.32.1-480.el9.x86_64.rpm
51c726f911259c0273e2736755b8c54db1b0577b605e744f1c8bb5d2954cf5cf
perl-Pod-Functions-1.13-480.el9.noarch.rpm
650cb07e6ab665545b996c570034b99dc6493c594e732c0a77ba7f56294aab84
perl-Pod-Html-1.25-480.el9.noarch.rpm
34feafe912987f3687cfeddab3a36cbaa63d41872a809dbf3a2014b7638a14b0
perl-POSIX-1.94-480.el9.x86_64.rpm
f6636b41662d8fb5658a12a1e5e4bc4819f6b4dabd20cc19124532e0f48ec813
perl-Safe-2.41-480.el9.noarch.rpm
37ab81439bbcd02ba3668ee5b05addc74163112b97af268363d3856e5c3af2d1
perl-Search-Dict-1.07-480.el9.noarch.rpm
fe604f03dc4b678f1ebc3041e6dea92bd2cab31fe73be961b4c52526c304ecb3
perl-SelectSaver-1.02-480.el9.noarch.rpm
76330165d2749c19db9c50204f24c0e676b58ec59eed8171b2a99509d2ec3733
perl-SelfLoader-1.26-480.el9.noarch.rpm
897df9a3b29558541e34aef84cf33b9e8a1839dd9474dc29d53343ad4b580834
perl-sigtrap-1.09-480.el9.noarch.rpm
7ca83ca840589fbb713ef26f6440ef1a2fff1d95dae4c06d62b0c9e8bf544f55
perl-sort-2.04-480.el9.noarch.rpm
2fc28ba6de294a466d75af54df9390092cf8112a8c27734dd64d94b45b819c1f
perl-subs-1.03-480.el9.noarch.rpm
aa0b2cd1144aee6b2909a5bbaad3cdc52581f53ace67228168f9652c3257bc05
perl-Symbol-1.08-480.el9.noarch.rpm
1474d70a0119a9dfc0ecdba989ae0449a1f2175b236f24cdaff55eca0602b955
perl-Sys-Hostname-1.23-480.el9.x86_64.rpm
8f051a17381e4304803d21d743e19611a1f4476b190b3ad941eb2ba33331bd3c
perl-Term-Complete-1.403-480.el9.noarch.rpm
90e82576af4e7c7cf9eabb5ecfca6323131404b918822c7d774fd0a6778de364
perl-Term-ReadLine-1.17-480.el9.noarch.rpm
9fcc7beffb95adc50d1e4b9ec52f10d34828450a7858b11a81791a1008739303
perl-Test-1.31-480.el9.noarch.rpm
92bf645d7c09a0083bcf162db4fdc97470958d41d0d4db12fae2b89325553ac0
perl-Text-Abbrev-1.02-480.el9.noarch.rpm
5a18b8dbf9e189bbc8aadaf6444ded909e0b97f771eefee8e283a08c0d01d374
perl-Thread-3.05-480.el9.noarch.rpm
57ee527cfa6d0317f5ab553e50762b31df032891e6c5971880b5db09fdc30020
perl-Thread-Semaphore-2.13-480.el9.noarch.rpm
774433a8ba97eca77787d1f7292c669dafebde90646a5bdbcf7f7231f704d4e9
perl-Tie-4.6-480.el9.noarch.rpm
61361c44ea1a84fe370915342f777ea94343eac073847c5e00988e3040387f02
perl-Tie-File-1.06-480.el9.noarch.rpm
bada1de8ef1a1d1a104f6a7bb401fca6fb4fd2c71d8d37c019227d5df68f3884
perl-Tie-Memoize-1.1-480.el9.noarch.rpm
8c6b6caae23015662428c588244d95914176ade8d53a67512ccfd0a87b5fda36
perl-Time-1.03-480.el9.noarch.rpm
a7e63bea9f76ce41cb4d67eca3ebe54530013aa8f98a65a255fbb4cc3d3b9fe6
perl-Time-Piece-1.3401-480.el9.x86_64.rpm
1699a12a17765347ac90fbebc002a93993368fe44cbaa6036074c4d4b563d0aa
perl-Unicode-UCD-0.75-480.el9.noarch.rpm
776cc367d35603c62d44d8b3d70d34358c3315a0fafffa9a5ae20b350c75c643
perl-User-pwent-1.03-480.el9.noarch.rpm
e3e51d13355900c4bfe483fd125fe769ecadb0ac717edddfaa09b90e86e3fb13
perl-utils-5.32.1-480.el9.noarch.rpm
d261c14a4610551a868464d3416bbf3cf6b2616495382cda1c8693a79d80b67b
perl-vars-1.05-480.el9.noarch.rpm
6a89349944d7969aa8ca1ac6f87384cc74ab605ccaf4379455804ff5e901cf69
perl-vmsish-1.04-480.el9.noarch.rpm
885e0a4817490c030b470515c1aef8490175a013eec37c11ef5e2ac110bcdadc
RLBA-2023:2160
capstone bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for capstone.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
capstone-4.0.2-10.el9.i686.rpm
8529abc8e2f8715b4c9219dfceb4a6454e7fa11a49f1cfa216a2a043160cde68
capstone-4.0.2-10.el9.x86_64.rpm
64bf1e7b9165e88d94499fd96d101e7a97007f5a4131d4c4860fcbc2464a2f9c
RLBA-2023:2186
augeas bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
augeas-1.13.0-3.el9.x86_64.rpm
878347c8f91aee2180839b458d957aff6378cfe6195c36fe286faaf27594d1a8
augeas-libs-1.13.0-3.el9.i686.rpm
64ebcddda882555442ef01802adc0678ec75cc1aee11d672b4ecfd81851681de
augeas-libs-1.13.0-3.el9.x86_64.rpm
65de9c1aadae07e7f8b62436062b34a711583711f5f37b992bdc7d51eb79ae37
RLBA-2023:2390
varnish bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-3.el9.i686.rpm
751573ca6f0f38d546a3a5af1737a75fa0596ef36193c8db83ccc6db2074e2c1
varnish-6.6.2-3.el9.x86_64.rpm
99ea5fe35727445b627888597eaa461c8dbd67f56aafee27659a661d582987ab
varnish-docs-6.6.2-3.el9.x86_64.rpm
b69dff9c003b879416d8165a4d0985c7e28929991f67cff3f032508c440ae3d3
RLBA-2023:2402
maven bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for plexus-interpolation, httpcomponents-core, maven-wagon, maven, google-guice, jsoup, jansi, apache-commons-io, apache-commons-lang3, maven-shared-utils, plexus-utils, plexus-classworlds, jakarta-annotations, httpcomponents-client, apache-commons-codec, plexus-cipher, atinject, javapackages-tools, maven-resolver, plexus-containers, jsr-305, cdi-api, apache-commons-cli, slf4j, guava, plexus-sec-dispatcher, sisu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
apache-commons-cli-1.4-17.el9.noarch.rpm
0256cd4929509de69b612a2a198b286106f234ff9bccc20fc9536e896019b297
apache-commons-codec-1.15-7.el9.noarch.rpm
c8d353deaaab985d4e54a5ea6fcf91eead1dfecf27fa3c315fc449e846afe7e4
apache-commons-io-2.8.0-8.el9.noarch.rpm
0ff32544fd571e05db2fa7d66490f8f72545a22f6c6ecac04bcca3c01e348f46
apache-commons-lang3-3.12.0-6.el9.noarch.rpm
c85e547c1de396d0bcccb97ad289a21ab3f82ae794c0df65f234f681cb06cb8b
atinject-1.0.3-6.el9.noarch.rpm
28fdd8eef912fb2cdb8f6be65271904d3242e89092280352a85d9290aadd0035
cdi-api-2.0.2-6.el9.noarch.rpm
18165f017a3a4eff6831b6eb9d031bde1f35e6dc4a4b744c8024999e1bebece9
google-guice-4.2.3-9.el9.noarch.rpm
148074c471a1bc938eeada2dae6f84642971fcc9fe1e55b8b25f7b180f2cb0a3
guava-30.1-6.el9.noarch.rpm
faf48d962bcd88e632899ddfcd99f0430136c2fa0f6fe9bd3f9f88182683a830
httpcomponents-client-4.5.13-3.el9.noarch.rpm
71fd80f9de11e828a1471a40140c90133f81e062ce74ec2fc12803fab297707e
httpcomponents-core-4.4.13-7.el9.noarch.rpm
5c7fa4374d88b03ac66ccc9b8e8e28c824637390e47ee1bb43f66d0c7a2fc7c6
jakarta-annotations-1.3.5-13.el9.noarch.rpm
441505298839dec09e5866d37fd02c70935990102e9970ad583db159492eae7f
javapackages-filesystem-6.0.0-4.el9.noarch.rpm
a1a1fae59af48ce72d029f342bf2021d2c84f5c3b13f95e5118952134cbd32c7
javapackages-tools-6.0.0-4.el9.noarch.rpm
6bce582734079cb02963b39d547736b6546c7125906459abd591c01a76971b32
jcl-over-slf4j-1.7.30-13.el9.noarch.rpm
8ab3b83a0fede6d0a6c7bfd8139f62c33f668e976eec42affc83e81d13dac966
jsoup-1.13.1-10.el9.noarch.rpm
c8bd1377015450ae65bd8b875ef87e0b29a026347cdcbc7621d54415e89c0f81
jsr-305-3.0.2-6.el9.noarch.rpm
1546f4a64091b52e4c521a862813ad28700d141e50a30302c34147c3889e9905
maven-3.6.3-15.el9.noarch.rpm
ab7dd6668c353233ff479c2e7276f14a59913208ef012d76f4bd045748a97e24
maven-lib-3.6.3-15.el9.noarch.rpm
61f07bd619548b4378e96b3095014e592979b6f1b7a0fd8598ec102d43429d31
maven-openjdk11-3.6.3-15.el9.noarch.rpm
44f618c6eb344a66cbd768127f9c0fff14363379569737b8ffcc79821248cd9c
maven-openjdk17-3.6.3-15.el9.noarch.rpm
b3ac1f6d7c43cc2264ff82da6ac227322bcda819cdfc4d0547fb7a4d841b35e8
maven-openjdk8-3.6.3-15.el9.noarch.rpm
39b19c699df73b947f89903e032c34f7472c9ca59a4d81d7e2c8ee170d1fa7da
maven-resolver-1.6.1-10.el9.noarch.rpm
dfd77cf0c0ff35b49c5ea6a8a408ff59d83f8e4e135d9194f5db890c2300af44
maven-shared-utils-3.3.4-3.el9.noarch.rpm
24a55717a2fc384bcf1e692c88a3c1efd2dcc0eb56fd360637a17641f3095273
maven-wagon-3.4.2-7.el9.noarch.rpm
71f7ecc1e7e182d65d7f3e2dc0842c1f5f554c8aff8e9129ecd5bdac63b55f9a
plexus-cipher-1.7-27.el9.noarch.rpm
4d006a3e01f59db51154475df079fb6e0709c78ace9f80e0f93a0fa9399d8380
plexus-classworlds-2.6.0-11.el9.noarch.rpm
d96083367fea8b1d9815b5b17cdb08ca8d726f4f0c5477e1e2ad04ce902abf16
plexus-containers-component-annotations-2.1.0-10.el9.noarch.rpm
fd965bbec2f095b6cb953767a123a37e6de79064d20c652b68604649d47b3622
plexus-interpolation-1.26-11.el9.noarch.rpm
94d70b0d15c62b94f8fb5e16f4ee97a39576312800161d90cc7f47eadc0a3985
plexus-sec-dispatcher-1.4-37.el9.noarch.rpm
77895175d3d631b568859f15a9b048f0de7942af0204622ed14c1b26f20b2014
plexus-utils-3.3.0-10.el9.noarch.rpm
9662f2350e069e100f6930d8941e2cee21155ed7c6ae354135e26dc8cfdb3674
sisu-0.3.4-10.el9.noarch.rpm
5b6197bbcaa82c35da6445a83bc50896a9bc0a84619362a6c30ef40487ed9291
slf4j-1.7.30-13.el9.noarch.rpm
d6612b852596eb13dffec2111f299481742f302a0df2d5b177f4c1a791b810db
slf4j-jdk14-1.7.30-13.el9.noarch.rpm
3634c3d5b2b9b91f4bb1c781b50eafc9e9f7a3b4f5b0cdb177b9bb5d0658e67b
jansi-2.3.3-6.el9.x86_64.rpm
a78de66c7209680061436c34b5a7135b02f9eb343d583f73625b25ff2444cf30
RLBA-2023:2430
python3.11-psycopg2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.11-psycopg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-psycopg2-2.9.3-1.el9.x86_64.rpm
ee69663b503b756ba7e73c26750fd3a5ae365bcb42fe5f171344c0b401d89ad9
RLBA-2023:2635
.NET 7.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.2.0.z] (BZ#2183591)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.5-2.el9_2.x86_64.rpm
ff1c2ed8baddce700a04e5aea4608c698ed231bcf73e690331cb7805bf6419a8
aspnetcore-targeting-pack-7.0-7.0.5-2.el9_2.x86_64.rpm
1660272c4be02801af8ccd5e482dc89fd00942b8d55354ece7e49bf105a2b6e6
dotnet-apphost-pack-7.0-7.0.5-2.el9_2.x86_64.rpm
64177ee30383313ea4ca14f1b651303e6e2b5ed444d8dcefb4073eab9d958873
dotnet-host-7.0.5-2.el9_2.x86_64.rpm
09f13802f53f392da1cbea34456dea2db4a5b86130387b2ca86a4371ba5a86ff
dotnet-hostfxr-7.0-7.0.5-2.el9_2.x86_64.rpm
ba147b5b08a201f1488b3cda4a994182ecff09d10fa53085dcb486a14974617d
dotnet-runtime-7.0-7.0.5-2.el9_2.x86_64.rpm
cc046fb06747c4941f8f6b97b8708c676d7b05c6e5cb5352c3ceac2a75fbdb26
dotnet-sdk-7.0-7.0.105-2.el9_2.x86_64.rpm
ad32e9f6eb2ba9b2e80b484d649a91c4c1e6d60e12abc61584569aa4b6051502
dotnet-targeting-pack-7.0-7.0.5-2.el9_2.x86_64.rpm
6085d01ea41a9f5fc06b403562109d68c264a6606fd8181704236b11aaeff009
dotnet-templates-7.0-7.0.105-2.el9_2.x86_64.rpm
380fb51156678e89fead07a639bbdf7b62eb8e61c57c223ab26bb92d17898c51
netstandard-targeting-pack-2.1-7.0.105-2.el9_2.x86_64.rpm
e0be21428a7f4224db6068d129cdae949d828bc55e4ad520a5247eb9d4b1b9f7
RLBA-2023:2639
java-17-openjdk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Bug Fix(es):
* All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189326)
* In FIPS mode, the list of cryptographic services and algorithms available is
limited to those that are FIPS compliant. It was found that this filtering was
too strict and was also excluding service attributes. These attributes are now
made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186803)
* Previously, the XML signature provider was unable to operate in FIPS mode.
Following recent enhancements to FIPS mode support, the XML signature provider
can now be supported. It is now enabled in FIPS mode. (RHBZ#2186810)
* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11
tokens. It was found that some PKCS#11 tokens may not be initialised fully
before use, leading to an exception being thrown by the provider. With this
release, this exception is now expected and handled by the FIPS support code.
(RHBZ#2186806)
rocky-linux-9-x86-64-appstream-rpms
java-17-openjdk-17.0.7.0.7-3.el9.x86_64.rpm
ae9eb82d6013ac02868240492456bb8c2649642f76d960df50e31170c52c5605
java-17-openjdk-demo-17.0.7.0.7-3.el9.x86_64.rpm
e80cbf1cb30586e7bed4f7623bd25bbd4235c09b10e88c6f8e8e305b138ecfcb
java-17-openjdk-devel-17.0.7.0.7-3.el9.x86_64.rpm
539ca2f0e08d59f12828b2bbcaa15d6adef1eac8e1d79801522a61c0e355f284
java-17-openjdk-headless-17.0.7.0.7-3.el9.x86_64.rpm
39d1796524c2ab82904a80fe705c6acfb6f463831a01e4ced84770eb1e0d4011
java-17-openjdk-javadoc-17.0.7.0.7-3.el9.x86_64.rpm
6ab2611e087d598662947987f9917b2c282ffe2badcc014ea4c546ba7c75013f
java-17-openjdk-javadoc-zip-17.0.7.0.7-3.el9.x86_64.rpm
bfc9bcc7a2d9327bd70effb25c0f6c3ef3f2c28772ac4ffb19d3e30587f41761
java-17-openjdk-jmods-17.0.7.0.7-3.el9.x86_64.rpm
15c8e0b859274cfa5edc8d4e7d24eafce275bdc1ebeb3c6c7ac27c812232bbdb
java-17-openjdk-src-17.0.7.0.7-3.el9.x86_64.rpm
24d4b6ef66823fd011c2e8c414b0cd4f8e1d56ec22300f322e74d093a6223724
java-17-openjdk-static-libs-17.0.7.0.7-3.el9.x86_64.rpm
61172b99cecdc1d96b74e2ed7562c4bdaf0699cc57115e57dd460294dcafd362
RLBA-2023:2640
java-11-openjdk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Bug Fix(es):
* All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189325)
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.19.0.7-4.el9.x86_64.rpm
3b81cb31ca7b60aefcf86732fc72afe9be5208426c7551b448f3e045b94e3a4b
java-11-openjdk-demo-11.0.19.0.7-4.el9.x86_64.rpm
4cbb607d0ea430db7591919fd1288882d20be9a2e213860d69a6f62856165b32
java-11-openjdk-devel-11.0.19.0.7-4.el9.x86_64.rpm
13c6c72e0e108623a1a2e7920e7beacc6980fe40a6bafc4e94421e80f7bcace9
java-11-openjdk-headless-11.0.19.0.7-4.el9.x86_64.rpm
a7cd5f37cc56598250b142d0ff58519ea79c1fb02c785f121fedac532f95b085
java-11-openjdk-javadoc-11.0.19.0.7-4.el9.x86_64.rpm
7e3d770d856b05185c528e94d64597bfcddebc1b8e631c3d008fe0cb3926e3d1
java-11-openjdk-javadoc-zip-11.0.19.0.7-4.el9.x86_64.rpm
785f76e26ffab484f84c39dd9788e332f5db9c574880bf12cb4a1a438774faf1
java-11-openjdk-jmods-11.0.19.0.7-4.el9.x86_64.rpm
b0b50ac57bd38d225dcf84cc25c248fbba96b901a0c3c6f4c5723113fa5e586a
java-11-openjdk-src-11.0.19.0.7-4.el9.x86_64.rpm
ea7a3257e9455a016b1e7f2da0503e4e7cce740807d9d63422634664f169796e
java-11-openjdk-static-libs-11.0.19.0.7-4.el9.x86_64.rpm
fec4252ba2b5149c91b317f662019c59a429fcf1c795ab79c51811cf1cf33d4c
RLBA-2023:2643
util-linux bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program.
Bug Fix(es):
* Backport hint about systemd daemon-reload (BZ#2180441)
rocky-linux-9-x86-64-appstream-rpms
libblkid-devel-2.37.4-11.el9_2.i686.rpm
f6af8044ebe46df5d7a08b41edc4cbe34bfe37e49cdb87e1d0ca7fce805a80a7
libblkid-devel-2.37.4-11.el9_2.x86_64.rpm
26d008f911df4a06a37516c6d02be87335b22eb45418efb5a89f7a333f592e7a
libmount-devel-2.37.4-11.el9_2.i686.rpm
fdf9fee96aa26f9f8ad5e83be70c8b1b5ce00cc14c997d584df60d7b8369394b
libmount-devel-2.37.4-11.el9_2.x86_64.rpm
dbefcf0be87637b25a19f447b1685cadcba2f4ac2c15fa178c010756afba055e
libuuid-devel-2.37.4-11.el9_2.i686.rpm
8e33dc534ad224cbfbd1fbe7d8ef092f807a9695ac7444debc1540e6045215e8
libuuid-devel-2.37.4-11.el9_2.x86_64.rpm
96054824a7a93ce9a6ffe3bacf20f301d947d8ea270e556c662186404c3a965d
python3-libmount-2.37.4-11.el9_2.x86_64.rpm
4862f817cc9b180f346fe67bcb57431bbe3874c70f606a773994743f0c151918
uuidd-2.37.4-11.el9_2.x86_64.rpm
67497fb5eced621e99237f202dad9768bd7950b6722726d8f11f488db52825ff
RLBA-2023:2174
libvirt-python bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libvirt-9.0.0-1.el9.x86_64.rpm
263200cd884b50b6777ccecae3ebfb4af21fd7e93facf7e0fed6b674b3a4fd2d
RLBA-2023:2232
gnome-software bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-software.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-software-41.5-2.el9.x86_64.rpm
cfb7719701c1a2709dc41062f0274a6496c0158565c115bd66cf0f7fbf0613dc
RLBA-2023:2332
gnome-session bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-session.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-session-40.1.1-7.el9.rocky.1.x86_64.rpm
3440d0bd76789bc611a2f928118d12b95e9cf8112737128ebbec361bece3918f
gnome-session-wayland-session-40.1.1-7.el9.rocky.1.x86_64.rpm
d85cd9a2b4f1e1cd5cf3c07b8ee70812272b6126874f1acecee40ce59aaf3657
gnome-session-xsession-40.1.1-7.el9.rocky.1.x86_64.rpm
51b7122ecb77badd7cbae1443ec04d4b15859a1308c82019b8e382c1862c6844
RLBA-2023:2348
swtpm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for swtpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
swtpm-0.8.0-1.el9.x86_64.rpm
5eb01dd8584a5049fe99ca0bae3a344c2ac1209bd16ae5e6c7affbcb6d54ea1c
swtpm-libs-0.8.0-1.el9.x86_64.rpm
10e022aec0504ea5429d99e5f33baea9f278c1ee43bd4dd012a5cbeb4a5f0e48
swtpm-tools-0.8.0-1.el9.x86_64.rpm
e0e25c30526267a12c61655d6437ce906bc25c1ab2dd3ba22bb856fad5dd961c
RLBA-2023:2427
python3.11-numpy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.11-numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-numpy-1.23.5-1.el9.x86_64.rpm
152062112a7873942b65072a46bb4cc782806eb083b02c6ad9d66781d02e372d
python3.11-numpy-f2py-1.23.5-1.el9.x86_64.rpm
1c9d6aaedd2e9a23fe8599a2e89df2eae1be741069ab2a2f05a9a05e5b87f611
RLEA-2023:2439
tomcat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.62-11.el9.noarch.rpm
df8ceaa641e4a4c1c20427f6653c7a46d25b6fe857b91236ae541a734bf15183
tomcat-admin-webapps-9.0.62-11.el9.noarch.rpm
35f3a73db547a12da372dd45739d99125e7bdfe66057868b02115499960deccd
tomcat-docs-webapp-9.0.62-11.el9.noarch.rpm
5aa02026c680a2425aef89bb159de769e635fbe1b313fc0b3871347730d9ddaf
tomcat-el-3.0-api-9.0.62-11.el9.noarch.rpm
8920ed1d8510665b40f6cb100062afbdde10ca7dd75867bb9565ebd7466b2efd
tomcat-jsp-2.3-api-9.0.62-11.el9.noarch.rpm
bc18baa41267f1be7a56480832c133da8bd4d5ded1eb7997ebaa502d0a8b4375
tomcat-lib-9.0.62-11.el9.noarch.rpm
26cbf617902b9a5ee92ed4b223fe88091aa441adda30b0a2887b8b498c4619fb
tomcat-servlet-4.0-api-9.0.62-11.el9.noarch.rpm
6e85705c742bcd7f5b61d7219bc5f2b1f813d4d0f6c6aa1b32fbba7e34d1b68a
tomcat-webapps-9.0.62-11.el9.noarch.rpm
5d6287b0a8534434381d7ef959676a64ee793c56102d53d85d7a5822187f5920
RLBA-2023:2622
pipewire bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PipeWire is a multimedia server for Linux and other Unix-like operating systems.
Bug Fix(es) and Enhancement(s):
* Audio sound can't output unless switch device manually on Orchid Bay MLK. (BZ#2180869)
rocky-linux-9-x86-64-appstream-rpms
pipewire-0.3.47-3.el9_2.i686.rpm
f0e145c1ddd11bbecf9c53299502968bdfcfe3177b9d7c98b139580bf1b8cb1e
pipewire-0.3.47-3.el9_2.x86_64.rpm
deb3fb0d3b1a6e6927ef70efe5f1c7d5b4f56e885659bd84490f6b3ab2ba8112
pipewire-alsa-0.3.47-3.el9_2.i686.rpm
e26d6a1ac900790aca8c0a2269eda0cfa8c76af48cb96ecb51598736648305e1
pipewire-alsa-0.3.47-3.el9_2.x86_64.rpm
c8101bf20b093c8f791f696f3ee3a282ee4885f9c0ec5162a5e53df255b4bf55
pipewire-devel-0.3.47-3.el9_2.i686.rpm
ffe02e45e62bd8cacf89c2d7ebd639c06bf62e472757132c0a5ebc3748796d41
pipewire-devel-0.3.47-3.el9_2.x86_64.rpm
3add690c6e66b7679c8a5de993b5d56929f6cc71e12e222144718603cdb2d0e2
pipewire-gstreamer-0.3.47-3.el9_2.i686.rpm
838e6d64bf2fa01ded1641e959e58f8cf31bbf7630c7ea13fd8e3ab38f2ab6ef
pipewire-gstreamer-0.3.47-3.el9_2.x86_64.rpm
3256144b1bb3e2c07f3df7eee2104d7a21596097514a04e99718a4ded25b3cbc
pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.i686.rpm
e960af264c197d697c6e3e6d57d8297c69065fac7d04ca2ac11e0e5778878f5e
pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.x86_64.rpm
bf8779782a4c8c61c10b4f8693f6183a83b0a1e5cda967190ca99dd64aee0d67
pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.i686.rpm
f89a1b86113af7c7e2dfbdf170d2c3995ee0fd7ff2e5c34a642cf783b4c19425
pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.x86_64.rpm
cab1562091604d1145f9d857dfdd297a9543fb6721a3a79bb5615a270cec79eb
pipewire-libs-0.3.47-3.el9_2.i686.rpm
bb8211b84ae1cc6e12d509a5dfc6a45b819f53fb3f19c07a963817ed43c08026
pipewire-libs-0.3.47-3.el9_2.x86_64.rpm
59a9e208e3739d2b1cab08ba2071f8ec6f9162c21e2ac5e9f754e5f15ad61c4d
pipewire-pulseaudio-0.3.47-3.el9_2.x86_64.rpm
f4eec78c14c28f6e9a8ea50c68d56d0df6a75289f1dd9984b0ce0baacc3b41ca
pipewire-utils-0.3.47-3.el9_2.x86_64.rpm
5d5b48df2378c4590cca81591a0413945e1ed2c017c57407dc7fdf8b526ce906
RLBA-2023:2630
crun bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The crun packages contain a runtime for running Open Container Initiative (OCI) containers.
Bug Fix(es) and Enhancement(s):
* Could not find symbol `criu_set_lsm_mount_context` in `libcriu.so`. (BZ#2184222)
rocky-linux-9-x86-64-appstream-rpms
crun-1.8.4-1.el9_2.x86_64.rpm
1f67eff45da5f7a0712fc9cda18dd25dbeca41349ff8043a56c6918e6480b7f1
RLBA-2023:2631
fuse-overlayfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program.
Bug Fix(es):
* Rootless podman with additionalimagestore does not work on Rocky Linux8.6 (BZ#2185133)
rocky-linux-9-x86-64-appstream-rpms
fuse-overlayfs-1.11-1.el9_2.x86_64.rpm
7fdfa1b0c40f09c00502997d47788d75233a882ebb8bc96f509a507bdaedc6c0
RLBA-2023:2636
netavark bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Netavark is a rust based network stack for containers.
Bug Fix(es) and Enhancement(s):
* The --dns-add command is not functioning - netavark. (BZ#2188566)
rocky-linux-9-x86-64-appstream-rpms
netavark-1.5.0-3.el9_2.x86_64.rpm
ba50fd3e86220df6f228978a2ea03f9372e13b50f5f6b9b6ca4975ab695bd6ed
RLSA-2023:2655
Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nodejs, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20).
Security Fix(es):
* c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
* http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
* Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
* Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)
* Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
* Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
nodejs-docs-16.19.1-1.el9_2.noarch.rpm
3f03aea4f319170206cf7312fb3edc0d20e95e7c196ff2a9638b04d4cdfdabda
nodejs-nodemon-2.0.20-3.el9_2.noarch.rpm
c31ae00cb453cf07ab8e679c615fd412c87d8faab3b24a1f162824a6310dc4a5
nodejs-16.19.1-1.el9_2.x86_64.rpm
d8e13a42016b0781b34e399c82b13809912968b98a5acea57ccb5b32b0441d90
nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm
212c18f45e0ab01a82c15fc4df739eb095519182b10efcf468ed98397d83ccf2
nodejs-libs-16.19.1-1.el9_2.i686.rpm
8bde566a861d88c8eefb820fb6ce9e31d7fe5939306026d4c21721535f48e3b0
nodejs-libs-16.19.1-1.el9_2.x86_64.rpm
dd864feb184b7b6fa3393b554a18f6627f463a23e285f208ca6c47aa67b116ec
npm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpm
f4e210497e2cc86395dc1c042489cb8279854b459b1fa355b6b204c2e6e7c584
RLBA-2023:3144
httpd bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* mod_rewrite regression with CVE-2023-25690 (BZ#2190324)
rocky-linux-9-x86-64-appstream-rpms
httpd-filesystem-2.4.53-11.el9_2.5.noarch.rpm
4c7a90692ff9f0e2fdc3536f7538aed28d0ea09ff95d34bc2c15ff16e2610d26
httpd-manual-2.4.53-11.el9_2.5.noarch.rpm
ee0f420fc411e6ab15e10d6b62a98e3d3bffedc30fc0dcd05cd0d27635a0c14b
httpd-2.4.53-11.el9_2.5.x86_64.rpm
590f46f669fab5f5e24e4c62f82818c9262627380b350ba028c7ffc27e621a13
httpd-core-2.4.53-11.el9_2.5.x86_64.rpm
9c19882d69d86b1a2de3951efd5793627605592237d8f7512671f37a1ebe4245
httpd-devel-2.4.53-11.el9_2.5.x86_64.rpm
ee00ee8ec9a4af5cc342c152a1dae286618b9f0a3bb4bfc2962f9abb3cf05f3c
httpd-tools-2.4.53-11.el9_2.5.x86_64.rpm
fc30292d98b046de28f8bf9dc2f0f2fca5656451c9ff54d360a1289e323797b4
mod_ldap-2.4.53-11.el9_2.5.x86_64.rpm
2aefd89e88d3034d08a7ae1c40a2e93773856a7f8355b29827cbbd366f18b9f4
mod_lua-2.4.53-11.el9_2.5.x86_64.rpm
ccfdea219d19d747a47c2ee6860c2d12355159595f89e0f4d53117f687428e86
mod_proxy_html-2.4.53-11.el9_2.5.x86_64.rpm
92af0a2f73e83d6f98ae8ac0f4a2947c10957877ba72a3500bad6179e1169c81
mod_session-2.4.53-11.el9_2.5.x86_64.rpm
b24489af91fa5b4228c7ec9885da97cde7d3006fcb4d565c1d68975eca610776
mod_ssl-2.4.53-11.el9_2.5.x86_64.rpm
23e85be6a80567686a66db6a7f16f7333d1c13717d525bce16867d892c5637ea
RLBA-2023:2578
file bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-file-magic-5.39-12.el9.noarch.rpm
a5bd2fde9fa423a2fc00c2d1d458fd6ba8851acda5e72018a55bb1968ac76358
RLSA-2023:3559
Important: c-ares security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for c-ares.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
c-ares-devel-1.17.1-5.el9_2.1.i686.rpm
4f76050b95dcfc6563e6451612787a8e5a797e1ae8ad8ca9b1f98becc3fbc044
c-ares-devel-1.17.1-5.el9_2.1.x86_64.rpm
80f651c56639c3c05acb548249f75365e54e865eaacba2c9e51488ddbd2322bc
RLSA-2023:3432
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.38.5-1.el9_2.2.i686.rpm
68ceb1e81999ef058956e6706910d470287df33c9f413e007789986451e46e4b
webkit2gtk3-2.38.5-1.el9_2.2.x86_64.rpm
4e9d993b96023fab0384b89dafbc97a06cf56f3d49f90677fa2d9dbe338cb9dd
webkit2gtk3-devel-2.38.5-1.el9_2.2.i686.rpm
4ea140a97ef2c965e4b3ee73de2ff050d58efd84e0c993912ebd078232c67dd1
webkit2gtk3-devel-2.38.5-1.el9_2.2.x86_64.rpm
33f7aadbc437651978d4962357618e8e4ea69735f77cbe1a7630a69187303d6d
webkit2gtk3-jsc-2.38.5-1.el9_2.2.i686.rpm
35b2db998e9a597a98ab4dde3bb05fb83e9aa12bf9cf6d38ccedd2d8469e0c98
webkit2gtk3-jsc-2.38.5-1.el9_2.2.x86_64.rpm
6a670d5353eea8fe70c7f2b6cc5e04dd54451f468e4d43a4d68ca4c9e456d40b
webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.i686.rpm
45adad3805b8690983fcf4a1724eb50f5fb051f40cd6780c93a1ad13e277190f
webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.x86_64.rpm
4c50fce181b5d69b80de6f75dcf89dec553b25e0b64a658c0bdfcd16d3176cc0
RLSA-2023:3661
Important: texlive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for texlive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems.
Security Fix(es):
* texlive: arbitrary code execution allows document complied with older version (CVE-2023-32700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
texlive-20200406-26.el9_2.x86_64.rpm
60108a6ab4a63d03ddace1808cd11e1272cdbc0de1ed2bf41c0c3a356d54687c
texlive-adjustbox-20200406-26.el9_2.noarch.rpm
6d4f02f9ee8d19fbfbd4e71b7bfba0e54f88bab9077472c74dce8e57feac98ea
texlive-ae-20200406-26.el9_2.noarch.rpm
0e5f2275eb4cc96f4ba92969e92fdde555f437c003701fef49173650cfc0f223
texlive-algorithms-20200406-26.el9_2.noarch.rpm
58d95ea8f47d9b5d77f340eaff98a773197562dae8e3b4a943e6492aa62c4e6b
texlive-alphalph-20200406-26.el9_2.noarch.rpm
86acc890e9ab1f17aa2908f3c8289ec1654edbdc653623e89e6584a31c5f856a
texlive-amscls-20200406-26.el9_2.noarch.rpm
43c7e33aebb1f4057e5b4dcc54941bb9a1118d3a7ca0fe86f6872e1e6b90ff6b
texlive-amsfonts-20200406-26.el9_2.noarch.rpm
d91416f97810defce446a42d40b06ef8882b7162bd6891b1436e75e7acdc6212
texlive-amsmath-20200406-26.el9_2.noarch.rpm
585b075056e6b0f10d3c6fd1e1a08f5e2433079361b07d94c297555099de9b3b
texlive-anyfontsize-20200406-26.el9_2.noarch.rpm
3dd0f72667faf6f73dcb115cb4a7d804d318135ee3b6e501922795a1bd68ff67
texlive-anysize-20200406-26.el9_2.noarch.rpm
64d885c080bdbe7fbf6275cd49a2a2eeaba1fe146999ad7fd7c1385f8d3d0f13
texlive-appendix-20200406-26.el9_2.noarch.rpm
2c065f84fe328ff12a180b0410ad8c9d8f647784d212e956c49de5b149f0e73d
texlive-arabxetex-20200406-26.el9_2.noarch.rpm
0ea391ee3095436be0f01a28c00ddc2c6dc3b5c22dd96e20d90f2729b5ac6eb5
texlive-arphic-20200406-26.el9_2.noarch.rpm
122bb21c0ca2af17f202d188d99f6f694224d6884b9fc131ceffc0ca63060456
texlive-atbegshi-20200406-26.el9_2.noarch.rpm
ec46918c4dfe0a42953cb17a542b59625a1db04faea90b7fdd05a223e1d82711
texlive-attachfile-20200406-26.el9_2.noarch.rpm
a9a79bf6e5a3c5d904ba90a2b86d41269b0503a6670225824463ccde5dacbe37
texlive-attachfile2-20200406-26.el9_2.noarch.rpm
58339c347ee3cf355954a21c76847784ee140ba3abab64be7933cc6963d7f6b0
texlive-atveryend-20200406-26.el9_2.noarch.rpm
86c65cb63a2d1f4094e646f16ec03698e40247c6c8c94d15a8fb7829f3416712
texlive-auxhook-20200406-26.el9_2.noarch.rpm
297ca2612e03dd4e90927ddbfd61cf8591555ffab8b4f1929d7949e4727957bf
texlive-avantgar-20200406-26.el9_2.noarch.rpm
9baa4f50affbdb31c1e71627935a79735540a80abcb8bb7806de12307f49fd53
texlive-awesomebox-20200406-26.el9_2.noarch.rpm
7feef124ad5b974fdf900334d6cbcafc2726611cc00ef4cfc40c56d8c83dab3a
texlive-babel-20200406-26.el9_2.noarch.rpm
d1b5794ce58678d526382767ebd1c4e874d817916386d3888d0068f59405df93
texlive-babelbib-20200406-26.el9_2.noarch.rpm
2a4ebf895368ebaa60ffcc3989aa7577e7d42cf041418f7a728213581b39202c
texlive-babel-english-20200406-26.el9_2.noarch.rpm
0c4dcd45da12bdf6f5f500d203128e14020f6b036ae9cf19b944fd752a79610a
texlive-base-20200406-26.el9_2.noarch.rpm
5f048b57fd669b9aa75d8b91aded83298b2f945831a0d16ac9aff6f3117af22a
texlive-beamer-20200406-26.el9_2.noarch.rpm
689a20f496dcc12706dfce35613f21aac28ef55d6983247678e0eee9fd9fae0c
texlive-bera-20200406-26.el9_2.noarch.rpm
26a05f194de9b4d6daa04d9542514bae797304a384519e652665e931ad7bbba4
texlive-beton-20200406-26.el9_2.noarch.rpm
5951e1eb7fc4e15bb458f9fa7e5cf009f11750b6bb2ebcb30b65e52fb2f79607
texlive-bibtex-20200406-26.el9_2.x86_64.rpm
1b4621b7884600b46bc028bfab0ffd81d12b8f0fc28b01193e0509a7400b85bd
texlive-bibtopic-20200406-26.el9_2.noarch.rpm
c419a993a7bd5dda2805cf0a647a7919ec29ab71a668a0e7d4887f129c3649f2
texlive-bidi-20200406-26.el9_2.noarch.rpm
984f0ff5695c2a64313f499e55566157e41c6d18c936527d1e642e2d2632d2ef
texlive-bigfoot-20200406-26.el9_2.noarch.rpm
5fd89c231f05c92e91271f74d361d0baaf3104373981ad5a63af617941b0c823
texlive-bigintcalc-20200406-26.el9_2.noarch.rpm
91dca903a80452df1f087853d3fbac079f1a0b7cfbca03e49b342562d3e604ee
texlive-bitset-20200406-26.el9_2.noarch.rpm
b12312d898718b19c4bbd96cba6312441499a9df4e03510854ef9d68250fc472
texlive-bookman-20200406-26.el9_2.noarch.rpm
c43afc998ac7768ca6eaec35932ea89301fb3b80783db401c0c7938df88c167d
texlive-bookmark-20200406-26.el9_2.noarch.rpm
01927654cbe2bd665681fb4fd15a283545988736c7fd272e24e1cca38853782c
texlive-booktabs-20200406-26.el9_2.noarch.rpm
a541ba77ad923dee9da9d83cc868f99a9062c4d6ed8b23849722c62eb67e2910
texlive-breakurl-20200406-26.el9_2.noarch.rpm
4b185811dfd594dd61e55664535e1f10299ae5f86b82205ba66a1f3a47faa3eb
texlive-breqn-20200406-26.el9_2.noarch.rpm
02c3b5863a15c49fb66ecd7f2a9d37754d551904c4bcef5f70f5769925fb455c
texlive-caption-20200406-26.el9_2.noarch.rpm
486a4fb1e0ff2442e1ba305d7af61be1c28921f20eadcd1536dd7e228130ba6f
texlive-capt-of-20200406-26.el9_2.noarch.rpm
6b5088c002cadaca4256d380371e7c2e4d0c2a5b3e3719911cb9dcd0c5b2b4a1
texlive-carlisle-20200406-26.el9_2.noarch.rpm
c020d9e9acd8f4a62cd2849931858cae9d72cac95254a8576cce505a5dd755d5
texlive-catchfile-20200406-26.el9_2.noarch.rpm
1636188835bae616c23ad36ebd1305771be390d9d1485363784ebfe8c1dfea3e
texlive-changebar-20200406-26.el9_2.noarch.rpm
416ac6a9cbbf7fe09a0a1f78397ff50d0c458bc179fb804c9c61639686d692ef
texlive-changepage-20200406-26.el9_2.noarch.rpm
65ff875334600c0c36f450ee6eb2b29681e7264cf9cc9fc785a9f138bada832b
texlive-charter-20200406-26.el9_2.noarch.rpm
11f85ff46de7e9995031fb5ed3a17f1df87b22dc3e08fb2570337fbeeb01402f
texlive-chngcntr-20200406-26.el9_2.noarch.rpm
a7f9b5e0ac7f4081cb26967f2e3a421f3ba0f6982c59d974706d104056aa7323
texlive-cite-20200406-26.el9_2.noarch.rpm
8743d0cdf8c1ed63733d4145d0e2fa84db80a4337a007e6190c0d2acc4f595a0
texlive-cjk-20200406-26.el9_2.noarch.rpm
3d579c2589b206bd14d3ec24de1f4dd7c39c9d1a5953801b93e8bc1dcc55a4f0
texlive-classpack-20200406-26.el9_2.noarch.rpm
8465513baa88586d52cb61267f5f794d445b8ecb71ee2ef093166f4b71207a6f
texlive-cm-20200406-26.el9_2.noarch.rpm
c017b06c1ecb8f1204c2b577424fa669535faa5bf3a5e5642d91f60885d67fdb
texlive-cmap-20200406-26.el9_2.noarch.rpm
0526e22e9f6060ea2517c60529d7853450279157f106edc6026ed51d22f5c75e
texlive-cmextra-20200406-26.el9_2.noarch.rpm
6e0655ec2603445e6ecc838b5e100ba98caf8593161b7bb3dc56a50254d18c2f
texlive-cm-lgc-20200406-26.el9_2.noarch.rpm
af57311edb6998e0fff98986ca525594e813f582bb4ffae194dc90cc2e968dbc
texlive-cm-super-20200406-26.el9_2.noarch.rpm
c580d7d62dd83fe9f6021ac3bf61496a539f3143fcddf6251afce6b08f00dfa9
texlive-cns-20200406-26.el9_2.noarch.rpm
d7794e0143d9e8b18173b811240b47438eb13b10fa6a67e2bfb1f012d7096a10
texlive-collectbox-20200406-26.el9_2.noarch.rpm
559e84fce146e274f6f0cc15ff7d3ec71701402ffeb9e1ebf04eecaa6a34a2cc
texlive-collection-basic-20200406-26.el9_2.noarch.rpm
b0a3633bd87d1ce814586fea80c58d9fa6c5c9d3ae2087d6bb52a5d1f13df2be
texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm
19a4831cacb8accacebfec5877a0c6b0b0e8b6fa518b02c180dad75db5e93062
texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpm
38e2788ebdfdb4d485a12f7b50cdf2adebc2fd7eefcae75399453448c4a7c4ce
texlive-collection-latex-20200406-26.el9_2.noarch.rpm
b3254e8c64e81688630c1946bca2451ce5573fd3eaa7f0bac61e7bcd224a12f1
texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm
bfc8fbf8a8650eb46780ac89bc568cd9d0c080f2e37343a979d235b804247441
texlive-collection-xetex-20200406-26.el9_2.noarch.rpm
0148dfb10bac9b417442e67702471cb84946ec32e8873d9ceaddf33b3e24e0c5
texlive-colorprofiles-20200406-26.el9_2.noarch.rpm
d251d7c85e5334ef84518f1c76297af996e8c96d67f1762d12612b356e95eeab
texlive-colortbl-20200406-26.el9_2.noarch.rpm
001fb501f175f0090cb11df0f62fbb46c8af46d3f5061d4c984ef8bfbfc4aac7
texlive-context-20200406-26.el9_2.noarch.rpm
c788bc1926d8f4b451239dbc65794074ca728b0aa446deeb6f1ccca5800854de
texlive-courier-20200406-26.el9_2.noarch.rpm
f745a451606d384782292fc35531e1f6a02978be472e101f08731296b467c39e
texlive-crop-20200406-26.el9_2.noarch.rpm
ce32588f7075f45782c91dd91e11767ac33ab1be06c141d43b62452179ea6acb
texlive-csquotes-20200406-26.el9_2.noarch.rpm
2ddf4b6c6a58e48248529013db3cf15e71b4ba48b35cf95aa2f6091039197545
texlive-ctable-20200406-26.el9_2.noarch.rpm
da2ab9bee9ed86dc8e58d731966847165b20cafdc60f9c156309bc2d1297dec1
texlive-ctablestack-20200406-26.el9_2.noarch.rpm
6c2c480b946e69fbe77739c45765c7c8d7e2d0f69a19920913d53b5d937e190b
texlive-currfile-20200406-26.el9_2.noarch.rpm
afaf2a9336cc2ce05fffdcfd86ae2b595becf83c16157253a79d73e3653f2d5a
texlive-datetime-20200406-26.el9_2.noarch.rpm
05820370e807ecb69f084fbcfd4a8fae7f45f852e21e325f74bc4f1d980b8510
texlive-dehyph-20200406-26.el9_2.noarch.rpm
97170d0e1c6140553b0d43fec54024356a70950ddab7cb0dce01ebf427746f2d
texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpm
36d8d5e11a9d8a4c9e38ed80418c4221ef7d2b6b46a4eccaa9a9766e304e2059
texlive-dvipng-20200406-26.el9_2.x86_64.rpm
aa8a9c9b659a720a2088e2d3c506eb3ea3ea316395f1b35d67531802232fafb9
texlive-dvips-20200406-26.el9_2.x86_64.rpm
d52ca8286874a72f1ba5ba49788dda9138f5de64d5f54367d5dbe9ef2bd5d160
texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm
46d1465cd21640fce6fb3e0605abe3310884115833d5d1a60e95d99ead7280e9
texlive-ec-20200406-26.el9_2.noarch.rpm
006c1b278002e33d84adb1a6a968c52c350c2337136414151a3a8da214d25bf8
texlive-eepic-20200406-26.el9_2.noarch.rpm
56c9d6d1acb33bce0f44ecfa8722bd916083dd4ba49faa4f479ab743e9128429
texlive-enctex-20200406-26.el9_2.noarch.rpm
fd84731dd5f3d6d44debb9a582d03dc74ba3d74b3a0810e1184bfaf491041b6e
texlive-enumitem-20200406-26.el9_2.noarch.rpm
7d1e058d3158a372d3040d39f303225d43e4fc316548d08268bbf3d84a5d02e6
texlive-environ-20200406-26.el9_2.noarch.rpm
4b761db594fcbb6665498f1a7e5b8ecf5a9e336387a9e974002067362a80e4cd
texlive-epsf-20200406-26.el9_2.noarch.rpm
8a87af6c5905f9b7bae196b8d3ac036cfd08c6f592539a4813013e691809150b
texlive-epstopdf-20200406-26.el9_2.noarch.rpm
a577e117fa7940b564aca15d6cf0ee9e8960504d4996078ddb20b57935fbd65e
texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm
449d699aaac1f384824e7b65cd60bc0e05efd59404ceb658821fcdf802e109c9
texlive-eqparbox-20200406-26.el9_2.noarch.rpm
fadd75e159f5860449893cd400f912f20a4faed31d5ec48aa1ed13b40bfdb8a2
texlive-eso-pic-20200406-26.el9_2.noarch.rpm
24a80022cc910d3644dd0dc1f9998908e6b0f3c228ec7f90735033bc64c58d28
texlive-etex-20200406-26.el9_2.noarch.rpm
c51e11c43e5d252bb39a1de0b35e9b67d3bc4b16dd6b5d1c0f8f813f451b7f70
texlive-etexcmds-20200406-26.el9_2.noarch.rpm
7e51748ccf98e2308207104fa2f7041c760ba0966b5c22b47730da495703961e
texlive-etex-pkg-20200406-26.el9_2.noarch.rpm
8fb36d83f36ba0e1e5ed8bec1245f58f88e1a9a5bd00b6e5011a50ada82dc49e
texlive-etoc-20200406-26.el9_2.noarch.rpm
ea5076e5da4c816f4e92c72474b12711e307252e130e82742d3fd51b7ffc2b92
texlive-etoolbox-20200406-26.el9_2.noarch.rpm
da771c9966a1e1a9c6adeed4a60cc86312fb0935cc4d14896bbb30c339385c19
texlive-euenc-20200406-26.el9_2.noarch.rpm
970ade54d56e602192f747fa0db08c6cb215a2245bb9cfc6e729a908ed937f81
texlive-euler-20200406-26.el9_2.noarch.rpm
169724ff1218db73a181a8d407925b13aa4417f0c3be3be582a4bf1038c79355
texlive-euro-20200406-26.el9_2.noarch.rpm
f21baac3bdb1947741938f9709d288a2b718a63e35c6739e919c2cb573d04956
texlive-eurosym-20200406-26.el9_2.noarch.rpm
9ec53d8fb247e24f4784ee8d8ed5a7acbc9398b267fa0a50892155c27fb768a0
texlive-extsizes-20200406-26.el9_2.noarch.rpm
5e69eaf5aa10de9d2c5299b0b36f2cba5153daaa31361a54b44084930e17643a
texlive-fancybox-20200406-26.el9_2.noarch.rpm
7b4ad804d51a36c51deb03b28565da93019eacd2cfdbee9b66fbcfa3f98ea8c0
texlive-fancyhdr-20200406-26.el9_2.noarch.rpm
39d6e75f3ac9d17d57be25af3c531c1c660b1a49aca36aa6b9092fccc0696511
texlive-fancyref-20200406-26.el9_2.noarch.rpm
44f966adf527e29e6a98f0341a86b3fb0eb1a76e607ae89f11aa49cd7f13eedb
texlive-fancyvrb-20200406-26.el9_2.noarch.rpm
fc2e0ffde8c569faef018c9dda7aad27c033464beecb927ddd6b89ec9a4fa501
texlive-filecontents-20200406-26.el9_2.noarch.rpm
dc1e85161bab85c3f8fc1100c8622d9843da47f6e49d88c564e5317a4753fd07
texlive-filehook-20200406-26.el9_2.noarch.rpm
d2277530dbf008d8d8fc5949f98bbd8a152e814b99754740113740d17e662709
texlive-finstrut-20200406-26.el9_2.noarch.rpm
54fcb36f9792ef435d4a38e44fa8d2e3227d5493c27a5f9397cb51cc579d8347
texlive-fix2col-20200406-26.el9_2.noarch.rpm
39e020cdec8e391d454c65598d80408977def538f5a6c217622bea4eac39981c
texlive-fixlatvian-20200406-26.el9_2.noarch.rpm
bf93d3ecde4f1064a31be3ba966beb2364ecad64555d48406f0415aec519eb64
texlive-float-20200406-26.el9_2.noarch.rpm
fdf4d00b413dbb017e8a14e3e733991248aad1a850d9755b180e5494c6e42b65
texlive-fmtcount-20200406-26.el9_2.noarch.rpm
82f5bc6d726f535d614b10e0c2689905bb3c76da83b477dc3333f1f61e3a6518
texlive-fncychap-20200406-26.el9_2.noarch.rpm
d20a2f19d727da4f89ae2a0c92c136ce6cd45839948e7ea95fa12893084a20f3
texlive-fontawesome-20200406-26.el9_2.noarch.rpm
fb9cb62ad2c9b516e5fcc23126a6c2337be8ecaffd3872c2f8ada0ed2d3ef0d8
texlive-fontbook-20200406-26.el9_2.noarch.rpm
180807f4b5546d4e0d1093ed43fc47c70d3dbd240adfb3a45ea1620d316707fc
texlive-fontspec-20200406-26.el9_2.noarch.rpm
a000a185eea80b6b8cc2ce1c7e3e25a8f6c65967d72dce7749cbafaae0dba330
texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpm
6a5a93041a688cb572a3cb2dc30bebb01552031ec6b97f304012995316b6c6fe
texlive-fontware-20200406-26.el9_2.x86_64.rpm
45864095c13affbb5fa5eecc14ccea85a2db5470f003a373c0eff8a3d2d3aa81
texlive-fontwrap-20200406-26.el9_2.noarch.rpm
302006f0760750bbdacbf72ba9feb8fde8925c90ee58513a81cc00df19c70884
texlive-footmisc-20200406-26.el9_2.noarch.rpm
5b2384fe196f8941c2ff7c3d655897acedeed0257ca5647e06698f12c1973d7b
texlive-footnotehyper-20200406-26.el9_2.noarch.rpm
53df63708e1c0e0b019c88f1ce0ed1a1acdab4b0368134a712a72f22e4310dad
texlive-fp-20200406-26.el9_2.noarch.rpm
b473ea6fc993bcdd49977df19659cfcda1308e2092c4a2fef4fa463d2de5e2d4
texlive-fpl-20200406-26.el9_2.noarch.rpm
cd84781d505476cb55487d7c963476a506ea760d096ee984a9fb8bd55ba31357
texlive-framed-20200406-26.el9_2.noarch.rpm
8228491088a87e477cd3b99af64afe460cfa6babb23e4c3acd0e6e01cd2a0478
texlive-garuda-c90-20200406-26.el9_2.noarch.rpm
595d387978c6a6c33f6d023f3d1571320bc02be9f4c40c407ef3484e6b0f6e0a
texlive-geometry-20200406-26.el9_2.noarch.rpm
dc85e33d0da9c3211e9b9f5a686199c83995023ada0e74fd469a2e2acb55deb9
texlive-gettitlestring-20200406-26.el9_2.noarch.rpm
d26c39599b40d40ea775f4ef8efa957b39a6a8319560599198988975ec7ad96b
texlive-glyphlist-20200406-26.el9_2.noarch.rpm
43191b6dd19b34f7d5f7fae6f63e4750435f8241c15f975e64ac37f5369c5210
texlive-graphics-20200406-26.el9_2.noarch.rpm
4b2d970026c0350d420362e2592aefb0e98fe918509360ebbbbdd64dcc8a7336
texlive-graphics-cfg-20200406-26.el9_2.noarch.rpm
0788edf7816bb05038caa7c01a7f129fb5d693e74014d3b9c3cc804cf52f6ae9
texlive-graphics-def-20200406-26.el9_2.noarch.rpm
0e8a7fa6acd8b8f8b44229c222bee5c70900b237ed74fc3c678b7742a43cd2d6
texlive-grfext-20200406-26.el9_2.noarch.rpm
22b329af01b39b6f528f52cbc724d76b13d28cfc7ba105f4d2dccf40e7a22207
texlive-grffile-20200406-26.el9_2.noarch.rpm
395af471bee15a0b7440eb7bb9954d47fcc83f6229bd8e22b66e2d75f967c41c
texlive-gsftopk-20200406-26.el9_2.x86_64.rpm
3e8103d5ce22dde159ef1586d99524f705fc8168fc9590435f6f2bf6ecf6a7e5
texlive-hanging-20200406-26.el9_2.noarch.rpm
8e9f0c856317a3c533e5ab14472051582c0a6674cea9ebb25e1d3d8425181ec9
texlive-helvetic-20200406-26.el9_2.noarch.rpm
f9475695df951548035b403b62dc3e97dd7ec508e6ab9a0a8fd630283220e8a5
texlive-hobsub-20200406-26.el9_2.noarch.rpm
dd335e5fc44c1182d8d778de4022d8fb74b63d8cfdc088b7101e7aa0bfd120ca
texlive-hologo-20200406-26.el9_2.noarch.rpm
4b9ca6ea1bbdf640c44daacb8723267cdd9607f80bc1eaeab886300e2a43e4d0
texlive-hycolor-20200406-26.el9_2.noarch.rpm
344a577e449dc44138ea56777489b1ec6c8dcb85a113841f8248d27a38a86a49
texlive-hyperref-20200406-26.el9_2.noarch.rpm
6411e9a2560c03bef2afef2a854d22353f91d22542dd5a5304788de260511a24
texlive-hyphenat-20200406-26.el9_2.noarch.rpm
05f3caba181ea2dc3b6617b36be70d7ed357c8f878a7c89e8584258e6e8b8f28
texlive-hyphen-base-20200406-26.el9_2.noarch.rpm
3f95e2f4bae719ea2268aaf9e9da393453bcb41c1856bcbcccf0ad5a1d4f3647
texlive-hyphenex-20200406-26.el9_2.noarch.rpm
fccb9a6f270e87b22d65d4a65234c499e0bd410337526b92c15d6f5b6421c987
texlive-hyph-utf8-20200406-26.el9_2.noarch.rpm
bc82c07ef99b434205a830ceae31d2cfa648845f8df8ca5804aea9a26b28cfbe
texlive-ifmtarg-20200406-26.el9_2.noarch.rpm
50c285893196d6fec1d07a1dc0151c79b17eb16f382f6707e7dcd0f8040d8656
texlive-ifoddpage-20200406-26.el9_2.noarch.rpm
eda3505030f0d98ea65f9642e73cf5c038d1761f032ec1e96e7f920895bd01ce
texlive-ifplatform-20200406-26.el9_2.noarch.rpm
64d52e620b7d3f452ac107b7d5b95b57a5a13d6b6506455911774a1f718081f6
texlive-iftex-20200406-26.el9_2.noarch.rpm
19428a52ae650e90a905ee27eafaee3d9cbe672ec517c534f11055d8cd581f1f
texlive-import-20200406-26.el9_2.noarch.rpm
31ba34b06a34a79b56bd6f83327bf0f1b072d9b29db5b995c21c27f73bc8e2b6
texlive-index-20200406-26.el9_2.noarch.rpm
29a6ec63378929256c8bf32875cc4126fb434d7a4c383393a05c5d9c23d2f3f6
texlive-infwarerr-20200406-26.el9_2.noarch.rpm
edc04140e1f05f0091376bdfd98f4a7caa093b8010fd1a309badf20e038e7374
texlive-intcalc-20200406-26.el9_2.noarch.rpm
e6c35901e74bbea7399368a77e1a5a1469aa3e152504df0442dbd87c2269857a
texlive-jadetex-20200406-26.el9_2.noarch.rpm
4d487dfba9f233897e579e9f2a332780bd5e34f17fa23aad5e4484e926c83d39
texlive-jknapltx-20200406-26.el9_2.noarch.rpm
2afdc954af0157965d5589d42e1f35ee4bc6c392ee4f4059ff1dee26b2e090db
texlive-kastrup-20200406-26.el9_2.noarch.rpm
ab88740de273e415fc889cbef65614481e49187bbb7b1a1a69d87faea75950fe
texlive-kerkis-20200406-26.el9_2.noarch.rpm
6094f28a2c9d51c9e3e733dd5c22c039ef2b002d281044403517b206bf03efef
texlive-knuth-lib-20200406-26.el9_2.noarch.rpm
9196f2910bdf84136153e7420007fcd2392940f168960dfeca859e98230b9a07
texlive-knuth-local-20200406-26.el9_2.noarch.rpm
36d671b60b5038659caac08cb4463d439e0424d8848fe1fe62f3647a2022cf35
texlive-koma-script-20200406-26.el9_2.noarch.rpm
fc543d1a003b9921960e929f7310f9e790242c01b988405450afc05aaeb36a15
texlive-kpathsea-20200406-26.el9_2.x86_64.rpm
ac1518d30ff82cb577d4008822b324f52940b2ba463404b028e4b455bfcd5b36
texlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm
6ecae951c220bea9499cc15377478814865b3d1b887d34415bccbd8ff8be1379
texlive-kvoptions-20200406-26.el9_2.noarch.rpm
79032a80c89a6e5de97499d5e7c128dfeb0ea4ce4bc95fee4b8b62d4da8b6a49
texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm
5c50da1090e58df6d52792dfe0057335ffd45491cc76321a3bdeb62c1cd51c5a
texlive-l3backend-20200406-26.el9_2.noarch.rpm
56ca49747c7d7ebd6db81a42d1fb079030b61c023b7af72189efa5014d209bba
texlive-l3experimental-20200406-26.el9_2.noarch.rpm
e65ba88c88670f3adde6f8b27c1742559d86e6ff47b2b9de151b1fbeb8bc1b8c
texlive-l3kernel-20200406-26.el9_2.noarch.rpm
3a2447f545b36fa4bf6fc737265033872b9bb63ebfcd8620af8c29a7a38389e5
texlive-l3packages-20200406-26.el9_2.noarch.rpm
2d6e6e88fcf798596a8faac323cba21c375ff7e83d91505acf0fbfc992a01357
texlive-lastpage-20200406-26.el9_2.noarch.rpm
4ad3a44cec321e75765137519c6005c402c1270eecbb038bce24600368744b41
texlive-latex-20200406-26.el9_2.noarch.rpm
b063633b4ed6f62eaeefb80660f41d111c0b7bce9f328980a38175b172735832
texlive-latex2man-20200406-26.el9_2.noarch.rpm
ab52803148219e2ebe3dd03387f26ced77ab13c3c78da35c582b457bcca491fe
texlive-latexbug-20200406-26.el9_2.noarch.rpm
b984cbcbf1779fa2785e53f8d77644317f5d88d860c8c44bba0ee8534339bce1
texlive-latexconfig-20200406-26.el9_2.noarch.rpm
37fc6fe968d7b3674d52f9efe0a3814403b501b72d19ea8a0c4dc2bffa1dbc0a
texlive-latex-fonts-20200406-26.el9_2.noarch.rpm
d73aeb000f00a12a2873fa917e5f479d1477f3d4544f1f19e95e379869a7ab91
texlive-letltxmacro-20200406-26.el9_2.noarch.rpm
6f1c6453364c99d3b5d7d81f8458fb31434c9fd0a27bf6236e3ac5cd0dddbf57
texlive-lettrine-20200406-26.el9_2.noarch.rpm
854f53ca99f410da37727d6a783b13823d2e8a62abebc21111378cd87ade1f04
texlive-lib-20200406-26.el9_2.i686.rpm
4cd3eb36f712f10970013d32b63af9bbc29cf1b512f5c94b60f5a0a64fba57f7
texlive-lib-20200406-26.el9_2.x86_64.rpm
2dbe2fd7b8c5c7169a9708d66a1cdc619a1392e99ec296a178e90d54acbfd0f3
texlive-linegoal-20200406-26.el9_2.noarch.rpm
0779ff9546cbd8ddcbad1d0ac44e71fb77b4989a1f78b3e945327069b9a933d1
texlive-lineno-20200406-26.el9_2.noarch.rpm
5a7b93c21e7848aad3c06cbfeb1e15dc098b1ae544025ab69a089e6c1f34e697
texlive-listings-20200406-26.el9_2.noarch.rpm
3f6482b511e8409e9914a35fab52b7700c7bc25d9f329e54643b78c6cf333df4
texlive-listofitems-20200406-26.el9_2.noarch.rpm
7c20bdc3abe55e71c92c45908ad48654b32c02f504476dc0cc87a9d7b7732652
texlive-lm-20200406-26.el9_2.noarch.rpm
5f1e615d2a2e70a909308389a21b657a5cd61053164a2a2f73b8d82c432096e4
texlive-lm-math-20200406-26.el9_2.noarch.rpm
6a883f1400cf5eae2066676a20b1781e00ccbc5243963c8ccb8a8257b5d7d771
texlive-ltabptch-20200406-26.el9_2.noarch.rpm
2819acf95e6368c625560ffb7f97592640306d2566d615b46b7949866a39ca30
texlive-ltxcmds-20200406-26.el9_2.noarch.rpm
16775e164a5eef183f4ee82e0be53b82c17172efa3a7b44f57d16a232a3a64ab
texlive-ltxmisc-20200406-26.el9_2.noarch.rpm
bfaab03ee83d20a4b819c62495f2fbb077c484b0f87b8335bb4da2e4b5b89923
texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpm
15bb43efa3fe476ab2fe84f2749b960b1120a6ef127ff99d8210dbeb2c3922b5
texlive-luahbtex-20200406-26.el9_2.x86_64.rpm
1eaf3795aa903f226d89ae31eb1672ce2c4ec7d883d84c0668c591de59915007
texlive-lualatex-math-20200406-26.el9_2.noarch.rpm
255dd994a2743ac8c42b7dcde7ca0d9c47191532e17b99be41679584e7823942
texlive-lualibs-20200406-26.el9_2.noarch.rpm
50b504f163d7343698605c54d0e1bf65697184aebd778edabe7665129050cb57
texlive-luaotfload-20200406-26.el9_2.noarch.rpm
aa25b422b53f1f109f366e6247f559b42a825b7adcd75c08706c82d4560e63b0
texlive-luatex-20200406-26.el9_2.x86_64.rpm
c050d76c24403b70229278dac6a5f3c4f3f689fec06b4eb562eeea007d3da318
texlive-luatex85-20200406-26.el9_2.noarch.rpm
c8c75b5ea789033a257f5c843eabd01d408a22fb02161251c7d17b0e2efc872c
texlive-luatexbase-20200406-26.el9_2.noarch.rpm
c550ea4e29f7ba1cd10ea2040fe0104ec3aa33bc4707e5f52867dcf03de5a8a3
texlive-lwarp-20200406-26.el9_2.noarch.rpm
fbe5dad8cc727014a5acbe5dd63c196e7d78d0f5fe46d539101bc214cef5d01a
texlive-makecmds-20200406-26.el9_2.noarch.rpm
c75a2b6ffdf01ef89539ace251096d44bd6f6232fd69b5ccf3388ecf5c5cad16
texlive-makeindex-20200406-26.el9_2.x86_64.rpm
4d2ecf65c06865881f964c7876cf1d79d18ba1122c7dd65d53d283acf1bf0aa8
texlive-manfnt-font-20200406-26.el9_2.noarch.rpm
556e5b51385a5eca059b43ee4c13dc75e12439a136ebac8355db8c3c2ea19c60
texlive-marginnote-20200406-26.el9_2.noarch.rpm
e24e011577aa1015470915775b2549dde648d3571c455153f2b9ffe2c2bc596a
texlive-marvosym-20200406-26.el9_2.noarch.rpm
a695a6f40ebbceeb2792fc0cad1334353c9737de3c64d123f42f68c6e7946032
texlive-mathpazo-20200406-26.el9_2.noarch.rpm
645670122881a3bf1e1616fa7cabeaae83b6b91f42367a3280df855736f65baa
texlive-mathspec-20200406-26.el9_2.noarch.rpm
4c73c2c468960936a3e29db015274a7123d9b35617bb702766b102efcae141c5
texlive-mathtools-20200406-26.el9_2.noarch.rpm
e5b6346dc7c4333b6379d124448364dd486ca500b15a219ca31e614cdc7b125d
texlive-mdwtools-20200406-26.el9_2.noarch.rpm
b3f48feed5ad30419fcb3810fba00e98a9ae6613181d2b46c9737460ee9613e0
texlive-memoir-20200406-26.el9_2.noarch.rpm
62624cccb871c4c640c9c4e32a14dd26f8e37dae0f6a37fc9a4ff7575509f92d
texlive-metafont-20200406-26.el9_2.x86_64.rpm
3b59036a1a375596de1309c01a92452bcbb6466f8e37d085f20d6747b5eb6919
texlive-metalogo-20200406-26.el9_2.noarch.rpm
72b6c5e380ab6b2d5600b471ba1f3c412855cc21cbd096d27556c6325738dfd1
texlive-metapost-20200406-26.el9_2.x86_64.rpm
d9e0016ceed20174bd3598bc3b9c9613dd40147d7fdc4203ce7e71e7ffcbb0d4
texlive-mflogo-20200406-26.el9_2.noarch.rpm
b5b683d354b1d9a0153fdba2bf15cf5b5096434b49c06f4536b45768438a853a
texlive-mflogo-font-20200406-26.el9_2.noarch.rpm
49261d9ddf3cb4506164f61c94a20885a3c6bcb121b342d5ea8df8f646abe55b
texlive-mfnfss-20200406-26.el9_2.noarch.rpm
9e45dee63a5da8d4c21a5988006a3fa3b0b494a510b3a088e89d6a949b8cd01f
texlive-mfware-20200406-26.el9_2.x86_64.rpm
f09099a375fc351169f11d6d606c484516a9f0d34be8a2bff86371d960479824
texlive-microtype-20200406-26.el9_2.noarch.rpm
391e607dfd24928550002fa516286a530d8e5e0e3d9feaf6f8e4366bbdeb0c10
texlive-minitoc-20200406-26.el9_2.noarch.rpm
17befdd8e57c27f684f035594a29737dec49b3ac7007c486fd8c34a4f05b6b98
texlive-mnsymbol-20200406-26.el9_2.noarch.rpm
505a2be01ecb725b0afe35c96d5c793f7c2b42f241a347be96065e188bbc2b91
texlive-modes-20200406-26.el9_2.noarch.rpm
24f06702e5055418852b4f50e2f048e240198f6d504e16b3d16ec27278f62a66
texlive-mparhack-20200406-26.el9_2.noarch.rpm
f010dcb30c89dad5aff80679384d935553780f712f311f9f754b46fe2a53a6e9
texlive-mptopdf-20200406-26.el9_2.noarch.rpm
7ff2ad0a95c1edb354e96724d405eb637aae48c330a957b4a43ab17b8612149c
texlive-ms-20200406-26.el9_2.noarch.rpm
ec592f65006dedbfc348b060206142c84f1bca5280e66d47ceac0b191662e6ee
texlive-multido-20200406-26.el9_2.noarch.rpm
7d64c4530a810f17b3fa859e5f3ead0790c2ba917f6901560d8866e841b33e94
texlive-multirow-20200406-26.el9_2.noarch.rpm
c48207b6144ae3ce30a0d57b2353ec22c55859c9d677563bc42dedd0fafe44d2
texlive-natbib-20200406-26.el9_2.noarch.rpm
64bd14a79cb843546c7151d83186a4bdf5569450dcfb93d935a9862bcbe7a27b
texlive-ncctools-20200406-26.el9_2.noarch.rpm
5505cf68ea4f457309614d0952b7505376b98e6378484fb214086a92844dd371
texlive-ncntrsbk-20200406-26.el9_2.noarch.rpm
60c68e0cb14721a39ae665528282ba815f4cc188034eaaa03052bfb4b0143a89
texlive-needspace-20200406-26.el9_2.noarch.rpm
acec4ed16a1d35811dd27faa02df4cb921909df6d7cc727947962c691217c3ab
texlive-newfloat-20200406-26.el9_2.noarch.rpm
02c67032cbb8d5110fb9abf6306f517ac1dea940288d6adc7f6b9c2dd11170f3
texlive-newunicodechar-20200406-26.el9_2.noarch.rpm
f90779d3c92e14f0a646088647447da9af582ce3244dfa251ea574e6675075a9
texlive-norasi-c90-20200406-26.el9_2.noarch.rpm
ea342c9053b669b5c2b3c34427f661a283d31099055ae117d0c5f9e12c75b92e
texlive-notoccite-20200406-26.el9_2.noarch.rpm
111eee59d052578d65ae454012e387f8275c39e61692298d95a805422723578a
texlive-ntgclass-20200406-26.el9_2.noarch.rpm
4cfdebdd0626e49672077607ab5509edd6cfe7f0d8dafcd73330f1d225490e51
texlive-oberdiek-20200406-26.el9_2.noarch.rpm
01cfd047d1b5100f1d94bac430ae496ab958c054c2f9ec202a6cc07d6b6b1c2e
texlive-obsolete-20200406-26.el9_2.noarch.rpm
3c064b3872f380f56068bde7245ebbe452c61054b2efe33ffad9a3c85a20d43b
texlive-overpic-20200406-26.el9_2.noarch.rpm
207f7b054a3a3a79f85249fba452330b55d399956a34894fc538f501042cde19
texlive-palatino-20200406-26.el9_2.noarch.rpm
00972655f9010f893365bbd3591422b81fca37473c8c337e1978292004712cd1
texlive-paralist-20200406-26.el9_2.noarch.rpm
4c362fab0d771a5f8cf8e4a019ad60290b12bc1cfcfdb448ac67479142a6ff85
texlive-parallel-20200406-26.el9_2.noarch.rpm
1c828a2af36ab7b26a99b7ec5882f9949cb7415abe803bef00f75a6fd8417118
texlive-parskip-20200406-26.el9_2.noarch.rpm
0406b8a7309faf590ad6dbfbac13e15e0dce933ee45960180b7c988b31122fb5
texlive-passivetex-20200406-26.el9_2.noarch.rpm
d37faafd0f88721e02567ee2c15e9a1bfe780607f26c9553fe662d60a38bb3bb
texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm
c33d1ffd3c9e3ebe809bf86d69a80d29a0584d1700af4440913b7317915f5981
texlive-pdfescape-20200406-26.el9_2.noarch.rpm
097ba346bc9027d3a938cc139af59b2725f03b9fb53f6eeb5fd0495edc472fb5
texlive-pdflscape-20200406-26.el9_2.noarch.rpm
e2f19ce57aee871a43907bbfc139604e8f65a01f0838cd123ab56c6153d789a0
texlive-pdfpages-20200406-26.el9_2.noarch.rpm
c22b0aa7fd6f21f178d836ed7e14f486551ea41246456bec8fa3fd34cbda79be
texlive-pdftex-20200406-26.el9_2.x86_64.rpm
e1606a19d16c883efdd94ed43e9f82951524f27428321a8c7bde0270bd0deac2
texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm
883852cacebd0d3ccc9ce249ee8388b8f44fcfcae5ccb7ad31b2e72528c724fb
texlive-pgf-20200406-26.el9_2.noarch.rpm
b5e59619ee2e8769774761b7932c395035dc6ab3fe5b73c0943ad5b212fbb340
texlive-philokalia-20200406-26.el9_2.noarch.rpm
73462ccbd4310c665aad526b8f574d4e847632680d6c84ec9cf7c064af26b6d4
texlive-placeins-20200406-26.el9_2.noarch.rpm
d204ce581902435988f899d7169fa45a2c637ede85b2a4c5180f415074c7e530
texlive-plain-20200406-26.el9_2.noarch.rpm
923df8da1c940cd640c25237336896409cc5672dd1544e43ec197c47a9aaa8c6
texlive-polyglossia-20200406-26.el9_2.noarch.rpm
a7bc5ec7eeb3718df403409ce7f2a508300b0cbc7936764fbbb5c33d62d3046b
texlive-powerdot-20200406-26.el9_2.noarch.rpm
4cc00c57ae89048b59b62ec98104071bda7e8b8b15c2baf15a951a35ce5f6133
texlive-pst-3d-20200406-26.el9_2.noarch.rpm
9310330cbb7037b193f84bda71737dd6c4b210c3dcdbe7dd46381bc1dd5956f7
texlive-preprint-20200406-26.el9_2.noarch.rpm
1028eaddaa14d2c5d6e95644613990fa598b4d121ddac805554f1356f7769a35
texlive-psfrag-20200406-26.el9_2.noarch.rpm
45ae355bc8bbedf4483651b0171a9b80bdee05a933c17ce55e1f7f8e60e898eb
texlive-pslatex-20200406-26.el9_2.noarch.rpm
40b2dc0796e86c3ef6012eea3cde8ccd735c782713ac1764583016d74ff809ab
texlive-psnfss-20200406-26.el9_2.noarch.rpm
919f97a9507bb7657eedc137efd779f9ad213538625d125a8e8b3d0a37223182
texlive-pspicture-20200406-26.el9_2.noarch.rpm
8602188413d9cf032acc5d77b3599f50ddc52cc31e25c371f4e34fa2553ea591
texlive-pst-arrow-20200406-26.el9_2.noarch.rpm
4df90976ba94dcdd8839b05fa72726b732b8171aaea5759d3c2246828bb176ba
texlive-pst-blur-20200406-26.el9_2.noarch.rpm
ce8d8b5cb065c5412627b1c76faf47b5d03a786b1daa0a6f56b019c495f3fc91
texlive-pst-coil-20200406-26.el9_2.noarch.rpm
1e964b457cc2020a57c52a3b5776a0626017af4cfc65a65ad123c8e758b7b912
texlive-pst-eps-20200406-26.el9_2.noarch.rpm
ecc8e735e324bf60d0320513c4d7b4a29916e4a2eed314ca2c2e5ad5fbd7bd41
texlive-pst-fill-20200406-26.el9_2.noarch.rpm
ebc2b65731ed93449573007263bfa59cae9fc844ba8ac3c757796968be2e69f7
texlive-pst-grad-20200406-26.el9_2.noarch.rpm
b2485ed626587c0727c84131d1e350019298c103db6ffa849e19a8651f9543d7
texlive-pst-math-20200406-26.el9_2.noarch.rpm
bbd29a4a4bc55b534f158d29c976c08f6df3868c430a6b61cc9b907bb83f4a08
texlive-pst-node-20200406-26.el9_2.noarch.rpm
f98ae6ddab4ef518482c2bb798f25140612955cc6a87df998d3b85eec4c818fe
texlive-pst-plot-20200406-26.el9_2.noarch.rpm
ef7d6866faf457dda9b5d7e3874fe42fd7ca45e6a894dd1365ca60598869051f
texlive-pstricks-20200406-26.el9_2.noarch.rpm
ad2b495d83833b37b17581b18747f446e7afbd1b5ea9ea9fe1df92cce1f0a340
texlive-pstricks-add-20200406-26.el9_2.noarch.rpm
c7184f253259b6ba54f02a52c5588c21c12ed22162c8ada53c8e147589ab178f
texlive-pst-slpe-20200406-26.el9_2.noarch.rpm
0eb007824550dc469117766c9ebb7a78b44e5341668f40d66b19e1be4b669c1a
texlive-pst-text-20200406-26.el9_2.noarch.rpm
9b5a510eacd68ed138b8bb42b58c9d4e6c91ba4fceb6f47fb98c17088900a572
texlive-pst-tools-20200406-26.el9_2.noarch.rpm
19d6f75405b4993c9c30d0f6c1efb171ee91bbf6d64e4c5b7d8a334ecc58b709
texlive-pst-tree-20200406-26.el9_2.noarch.rpm
ef3a56a686188fd2aa2f3ed1f88733890c7292209e41cdbed61c3b8be63d8ae7
texlive-ptext-20200406-26.el9_2.noarch.rpm
e9c686c31ca4c70196bd591a9ecfd7d02e66795a4c064e15be63bc9f9e20e8eb
texlive-pxfonts-20200406-26.el9_2.noarch.rpm
a52b73dbbbf1e7ca6bf5f8faa1e88ee7525d2474195d7dc044a6d74370f5d349
texlive-qstest-20200406-26.el9_2.noarch.rpm
e60584a6240a1c8ec120a3b5547583d44e501183bcaab5d681b7a64fdfed664a
texlive-ragged2e-20200406-26.el9_2.noarch.rpm
4e6f37584d3b1c0890b8b534bd898cc3abfdf30197c0ad1a4dd5cf76e75f7506
texlive-rcs-20200406-26.el9_2.noarch.rpm
480a2c2281bb800891c33eb420c3801933190acd3d38018ac041aef38ca4e313
texlive-realscripts-20200406-26.el9_2.noarch.rpm
ffc104da2f7ef3c479000b6b0e57b9a501fcc6910f2e8c098c4e21194b46b152
texlive-refcount-20200406-26.el9_2.noarch.rpm
e15f1e4b513fdda1564f22c74ab611653a6c6635476106b04e2d9c7067ea2983
texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm
1e5165aea9579efc91ab6787f2bedee20136056cac5bc82c06acb6ce0fd123ed
texlive-rsfs-20200406-26.el9_2.noarch.rpm
cc5cd9dc0a2d8682f728f6edc7e79d2b3fc749397eb7353d20ea23061b590090
texlive-sansmath-20200406-26.el9_2.noarch.rpm
2e216d9ffd08b4e6ab6a10e4f3a4ae1654e1f8d94f8ee88c1fb9f85a7d801c04
texlive-sansmathaccent-20200406-26.el9_2.noarch.rpm
81a0618954ec131f5f3f2d06e54a3aceedfeb13e0665ab273e623f9528389e70
texlive-sauerj-20200406-26.el9_2.noarch.rpm
5c917b3166fa6fe1e41ea73deaf1c6a821ee4aa7d7940dbbec66060433844501
texlive-scheme-basic-20200406-26.el9_2.noarch.rpm
ede136fe8ca00362364234c82393df3c750818f7c6fa5a8f79a77f6d4dc6c1b2
texlive-section-20200406-26.el9_2.noarch.rpm
03348837342b83e3f2e026706b96d6bc051afdc65380ce2538af115d3c1d8d85
texlive-sectsty-20200406-26.el9_2.noarch.rpm
0d0fc4c628cffae1d57e45a3e107f2fa2c16762c7cb84cd9881daa354bc78669
texlive-seminar-20200406-26.el9_2.noarch.rpm
f37b05a79cdf47a78a8ef55791833350d4e3dc56a0ce9c213afaa92fe36154e3
texlive-sepnum-20200406-26.el9_2.noarch.rpm
caa9405985cd6a2871fe7def3b2ab10867a355eb7bcc71bab12da7b5de081143
texlive-setspace-20200406-26.el9_2.noarch.rpm
e4ec78b22399c46760194eeaeed18ce28ef471ad13ed0679a0abcc54d4add1d2
texlive-showexpl-20200406-26.el9_2.noarch.rpm
3bd7d71e74fd6aa26f0706e2d9c80309ea85349a72eac08be211c9e44fc4fc48
texlive-soul-20200406-26.el9_2.noarch.rpm
d6be885683614eaca3fb48324b8c1dc8e1e8004db2cf11ffb31b0e3a7bc30f20
texlive-stackengine-20200406-26.el9_2.noarch.rpm
f9d5ff13e93303f1c4a33ffcae7aab4b7c019359fef0b5f8975cf58ae721776c
texlive-stmaryrd-20200406-26.el9_2.noarch.rpm
df568a3c2f17bfab7804e0580c0befde99662d095db59fa70bf76cf3c2bfb8c5
texlive-stringenc-20200406-26.el9_2.noarch.rpm
d414ca79ea2b5c09f29112180e6bf9e137f56be49a98eac8793222947ba7d0b9
texlive-subfig-20200406-26.el9_2.noarch.rpm
51c955014b29b3e8b75e9701033d3132ef14cd4944d6feee43de6320284e9081
texlive-subfigure-20200406-26.el9_2.noarch.rpm
a845cf97cc04ee425eadf772eb0fa3364b88f6f8272dfc264fe76b44527cd67d
texlive-svn-prov-20200406-26.el9_2.noarch.rpm
485e27454610fd51ec6dcdb32e2ea4d6cad7398893d10e268ae51ee9fc36912e
texlive-symbol-20200406-26.el9_2.noarch.rpm
3fea8fb7b06074d5def096ef91b1d1d7e066c1189153cf851be2a08e3f3f10fb
texlive-t2-20200406-26.el9_2.noarch.rpm
d5c17ef9428a3f055274bed676a7eb6bc7cb29720957fd7ac52415d2ac5bb753
texlive-tabu-20200406-26.el9_2.noarch.rpm
2153b613048039cd6718f1180f8184b9dc4b7f31bdcf9eb6c51ab982008faf4b
texlive-tabulary-20200406-26.el9_2.noarch.rpm
be5a4b56c2a43b619bf09385be4674464399f85d9cc34bd813398dc301784f91
texlive-tex-20200406-26.el9_2.x86_64.rpm
5afbd69fb792054b4f59dc2415d8260ff9b40699a7d1be703bd01d558d2d2800
texlive-tex4ht-20200406-26.el9_2.x86_64.rpm
0d9939dd9ff97ef577a2ecc81e0c38531bcc0ba28433b1160eba28d1b7068326
texlive-tex-gyre-20200406-26.el9_2.noarch.rpm
8855140140dfa0a9657ff8c96f23a1c77826d6f1e2ad93af72cb1f546a2c9766
texlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm
ce497108ff7f2ebd3458922d35d9363f6cb7d6a66c6e23933312a983cb0bcc0b
texlive-tex-ini-files-20200406-26.el9_2.noarch.rpm
387deb6ff47caa792bae8238a7c8111d18c0de3525c4bbf80ccf2222134b5a63
texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm
ff14b7f06ab7993aacf8ea2ee6cb7b7a83aee72f1b4346f9b172d6d5411df6e6
texlive-texlive-docindex-20200406-26.el9_2.noarch.rpm
500415a75e39cae5e6f1f1eb9d3c142e7aa2c21c39e0cf0dccffcd473e00030d
texlive-texlive-en-20200406-26.el9_2.noarch.rpm
70357e73a25ad39bd0435edebb1f29c5e0e437d7e8c0203ed7edc0f3725cd9a8
texlive-texlive.infra-20200406-26.el9_2.noarch.rpm
eb2ee9b8ac0a323934ea25a19bd17a6198642d64a9a30180eddefeaec60d3b48
texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm
998b8b4556fafd23d20ed0cb6f284236da346de0a4fbdc60a77d1a13afc34ece
texlive-texlive-scripts-20200406-26.el9_2.noarch.rpm
747e286024c89c06665cb175b9630c19b3decaaccd62122c564cb65bc7607fe2
texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpm
800e05259e19c25b3921810b6ad3982290aef4b4cbc0178dde70120ce1d7ce1d
texlive-textcase-20200406-26.el9_2.noarch.rpm
f0ecc8a93ea55ad33fd6ebbc7e395425430758f465fc1987c99269744a1435bb
texlive-textpos-20200406-26.el9_2.noarch.rpm
055d44969981b56d95e461b9f6674de4084b7028a1bec84d0d75de5df3ebdd72
texlive-threeparttable-20200406-26.el9_2.noarch.rpm
7e438bc123b5049181cc650db0e3ba6a0360eded92cef30689c1635284c54972
texlive-thumbpdf-20200406-26.el9_2.noarch.rpm
429c2cf247d681e77de5e8cf8c981793016d018ba5cf1bc8cfe030b3e5015a21
texlive-times-20200406-26.el9_2.noarch.rpm
c74914c85802f971e569cceb30185dadbc07b88a772e26e41eeb5256e17ea915
texlive-tipa-20200406-26.el9_2.noarch.rpm
2bd8aeb4d1262f43ab0c624ec4b32166abeb5eedb02d804bb9f12b51acb2b070
texlive-titlesec-20200406-26.el9_2.noarch.rpm
351a2b8f0a5123b7ae152a3b0de5fbd4e076568a9dd6fe35d47f4512d93c6c08
texlive-titling-20200406-26.el9_2.noarch.rpm
2e297e33d720dee2e920b8a00bcbd5c0613638917c3b367944f2bbe39a32db4d
texlive-tocloft-20200406-26.el9_2.noarch.rpm
df3e6b2f7ccd65a291412460603f59b6f3ed2f225b1f15e4301f66777ac3631b
texlive-tools-20200406-26.el9_2.noarch.rpm
33aa90f8db04c800f57c3e63d3d5ee4fe9ef0c8be6297dbcef6a67837ee268ca
texlive-translator-20200406-26.el9_2.noarch.rpm
1ee0ea37acac5767c03d86fae7290965c61c11627f0207713ee1012e43947007
texlive-trimspaces-20200406-26.el9_2.noarch.rpm
f57e7c3234f0995728d24b969f2843bfefa316bb429b9cac0d0dbeb5425e2769
texlive-txfonts-20200406-26.el9_2.noarch.rpm
0872e0a788ddd216c157ee54e7504b3b256f3e9facb6837ce1e456e952ae1631
texlive-type1cm-20200406-26.el9_2.noarch.rpm
3d902a971f7f7f50fdf3ec1e7969570462ea9f201c3878fee9aa10fca1a36859
texlive-typehtml-20200406-26.el9_2.noarch.rpm
ecf60e540159e528dd5098b5902e554c32589e90f88b532c62ff19906dd7586c
texlive-ucharcat-20200406-26.el9_2.noarch.rpm
d6eedbe8dcaa524d14f78a2b8bcb9e29ce1faac07aa247b2671fbf8c1a93fabb
texlive-ucharclasses-20200406-26.el9_2.noarch.rpm
9e1a532deb2488048cbc37029357280511147bfc19ffa9bb6d4a248d6eca6f1d
texlive-ucs-20200406-26.el9_2.noarch.rpm
49caca966ed2e6b67b13d33431a6fa20743ea5a99b8bea95865bc1ca66f75e90
texlive-uhc-20200406-26.el9_2.noarch.rpm
c20064eed30375a3faa72d71b7d00739acea66199db9ea1f961f6de0b3636cdc
texlive-ulem-20200406-26.el9_2.noarch.rpm
0c63998654e44cc09eba5c9554b6b608621e31f1d7be93160eee4b898621ee2b
texlive-underscore-20200406-26.el9_2.noarch.rpm
cb40c140ece4d8594ed54445cda1d235fde08a3913d4afb7c02f5d1097957dc3
texlive-unicode-data-20200406-26.el9_2.noarch.rpm
d00187613d949b72e6216abe62305b6d2941e3cd116f9172d7b5d0fde96ebfb6
texlive-unicode-math-20200406-26.el9_2.noarch.rpm
8c1bed59d556e6c86fdaa53fd664025070dd42910f23a52d1dfe67b6c6c6727c
texlive-uniquecounter-20200406-26.el9_2.noarch.rpm
508ad1d6dcf8714bfd5213e5acb6bb94c8b563138550b8d194947ada8fc10e36
texlive-unisugar-20200406-26.el9_2.noarch.rpm
e8ca282eedac5e8d3dd0e3340a91815d3ade6c53f9d263af3d5cf0e0b463e487
texlive-updmap-map-20200406-26.el9_2.noarch.rpm
5fad6e40d4c63dfcd0af95fa90c64b64d9eaf2a0ca60cd81cf35cac7e9f7a2a0
texlive-upquote-20200406-26.el9_2.noarch.rpm
bc452f128bddd5e2df1029487d9d09f59d0ed49afe700e2cd333dcd4e216919b
texlive-url-20200406-26.el9_2.noarch.rpm
33497019a706702a6b2d02015b2e582aecb7ade1f31ca5634820c1a88af36caf
texlive-utopia-20200406-26.el9_2.noarch.rpm
6625c4e76b3d12f23effceb20c3e49d3d58364ea1a1d197e57c14b144315cbf0
texlive-varwidth-20200406-26.el9_2.noarch.rpm
57aca925fb1b47244bf69e3fbaf9ed3a3bd18bef40d3578bd41e51f69777e399
texlive-wadalab-20200406-26.el9_2.noarch.rpm
1fa5e69baf3dc9c7692180fcaac9965ba4c8c39bafd4107aa8605a18f4e7ffa6
texlive-was-20200406-26.el9_2.noarch.rpm
fc2749002d953eeca306e8d35d98d0eb1ecf399bd2c8502daa2f0b12db77782c
texlive-wasy-20200406-26.el9_2.noarch.rpm
2973fb004de30e6feb825b2b9aa32fc7aeed0ac8e4eda2aa5903bc28ecb1b5b9
texlive-wasysym-20200406-26.el9_2.noarch.rpm
5616c31dbf873308aa6bba9905bd041037d28d67b00d8b6d2ce71041c213054f
texlive-wasy-type1-20200406-26.el9_2.noarch.rpm
15aeb7d75c47ecc58ccd79d6e68ae7d31a6e609ae7c783c1e3a5a9d3f32b3549
texlive-wrapfig-20200406-26.el9_2.noarch.rpm
08623204bf9e3884661f0a054d74ad25b176fbfca3aed86ccf0d759586e6f0dc
texlive-xcolor-20200406-26.el9_2.noarch.rpm
fa5b4aa161603fb74552cf8abb34818dbe8406a8ec95a573327cfb3aec5c8f7c
texlive-xdvi-20200406-26.el9_2.x86_64.rpm
71a58eef758fb16b74dd5e5a014a1b90a955e423bb3dd6fd504d8328a5eb34ee
texlive-xecjk-20200406-26.el9_2.noarch.rpm
97a53f2a4528066ce6a59b15d44c099d4e80e42e0470f90066d5fef70587310a
texlive-xecolor-20200406-26.el9_2.noarch.rpm
0a28e96f5726e0ed6564c798495790bfad7408b4de4df39020e3e27784c8bd97
texlive-xecyr-20200406-26.el9_2.noarch.rpm
0c715eee13c9322ffd8c1b01b8d469bd4abacd4a4ae6b020942927dc8ccf8618
texlive-xeindex-20200406-26.el9_2.noarch.rpm
40b83f135c66909761b1444db8772744698a78d29a7d3e5405d45e96ee14647a
texlive-xepersian-20200406-26.el9_2.noarch.rpm
7f5de39d6a965a1cd777989d19c841c615581e08ac2ac4ea28329290520d187e
texlive-xesearch-20200406-26.el9_2.noarch.rpm
765cd9681936a516d971f9f7f8742c7cb202a5db7f53df76177a5ce318263c89
texlive-xetex-20200406-26.el9_2.x86_64.rpm
5b1cde1a2991fec95cc3bcb27686d604c2ca3e27c6e8bc59d9c1840854e3af6e
texlive-xetexconfig-20200406-26.el9_2.noarch.rpm
7564779233c89db70092a225715f58c14f13d20a65ee1232a2e5b20df95e7e98
texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm
85788f5bf110c69a49350ed62aa8b33686841f4d4f1c24640f3b837eaab3a4f6
texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm
1b2c310869ac6ab28b9cdb91a84b0cef1ce76221565834eb7ffbc9a52c594cb6
texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpm
694719b79406420094c4a7b44526fcc0b77a89d39c761c62bc5ad2f919b80015
texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm
538a8250f2607d1cb4fbb235a77c58317ec110027b660179b51495d76790501b
texlive-xifthen-20200406-26.el9_2.noarch.rpm
0ba2ee16151f459c2bfe8b84692ae444ae48c3105eea02d73c1d768bd347ec14
texlive-xkeyval-20200406-26.el9_2.noarch.rpm
6b41cba9d7d40ad8cb2ddfa0392d0ecbd1f6cc9c9fa12218e93b2c15c2618c13
texlive-xltxtra-20200406-26.el9_2.noarch.rpm
5ef1db7a00104b724947a1c3e2bfe7ad465b156543c912a9c229351b4b1294c9
texlive-xmltex-20200406-26.el9_2.noarch.rpm
5ada743716865fcf9bbaecbb6487e4a6c91f45aad8ee926b03cdbde48b62023c
texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm
40ae4f2459893173e7b7c41e367ca242f43a3c76257174ce05bcae56991ce737
texlive-xstring-20200406-26.el9_2.noarch.rpm
871c5b92e95f78de4a01b3031097b55e74bbde9e1bb0bb411b78b0443f87a143
texlive-xtab-20200406-26.el9_2.noarch.rpm
d13ee62293e06a02cea5574f30393a2c4ecd14bf84cfe9cf6a183433adbc8356
texlive-xunicode-20200406-26.el9_2.noarch.rpm
6b715ea0ebed5240acb14e1ff52b5e21c0a7e4aa3bb9897505826b440c996967
texlive-zapfchan-20200406-26.el9_2.noarch.rpm
e3cc769e55dbb178db61a7b17af417d63614c4f504e13605967edf717cef5eef
texlive-zapfding-20200406-26.el9_2.noarch.rpm
f09bbaf2e10cb50fd98d76eaa38a44b000b613f2b987410c9a012533918e1f20
texlive-zref-20200406-26.el9_2.noarch.rpm
fe83c13a357e42b5361cefd8933b65ff43a39edf148d2aa50f9f3c2a56582a13
RLEA-2024:9453
nodejs:20 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* Crash when running Node.js application on ubi 9 (JIRA:Rocky Linux-58721)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2024:10787
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID (CVE-2024-10978)
* postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code (CVE-2024-10979)
* postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes (CVE-2024-10976)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm
b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
RLSA-2024:10788
Important: postgresql:16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID (CVE-2024-10978)
* postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code (CVE-2024-10979)
* postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes (CVE-2024-10976)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm
44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba
pg_repack-1.5.1-1.module+el9.6.0+32421+7c015469.x86_64.rpm
9c7871759688428d1a5595c09ea668b57d143a59f80717028131195b2d811b0c
postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm
6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259
RLEA-2024:11235
nodejs:22 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-9] nodejs:22/nodejs: Rebase Node.js 22 to LTS version [rhel-9.5.z] (JIRA:Rocky Linux-67327)
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:1443
Important: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* undici: Undici Uses Insufficiently Random Values (CVE-2025-22150)
* nodejs: Node.js Worker Thread Exposure via Diagnostics Channel (CVE-2025-23083)
* nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap (CVE-2025-23085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:1446
Moderate: nodejs:18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* undici: Undici Uses Insufficiently Random Values (CVE-2025-22150)
* nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap (CVE-2025-23085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:1613
Important: nodejs:22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* undici: Undici Uses Insufficiently Random Values (CVE-2025-22150)
* nodejs: Node.js Worker Thread Exposure via Diagnostics Channel (CVE-2025-23083)
* nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap (CVE-2025-23085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:1743
Important: postgresql:16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm
44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba
pg_repack-1.5.1-1.module+el9.6.0+32421+7c015469.x86_64.rpm
9c7871759688428d1a5595c09ea668b57d143a59f80717028131195b2d811b0c
postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm
6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259
RLSA-2025:1741
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm
b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
RLSA-2025:7426
Moderate: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* c-ares: c-ares has a use-after-free in read_answers() (CVE-2025-31498)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:7433
Important: nodejs:22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* c-ares: c-ares has a use-after-free in read_answers() (CVE-2025-31498)
* SQLite: integer overflow in SQLite (CVE-2025-3277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:8468
Important: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, module.nodejs-packaging, nodejs, nodejs-nodemon, module.nodejs, nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-20.19.2-1.module+el9.6.0+32143+ae966e5b.x86_64.rpm
215b5c308a209a8b2539fbaf5dddb2e2a7d1cb6397b33e8909c43cd701fa5ccb
nodejs-devel-20.19.2-1.module+el9.6.0+32143+ae966e5b.x86_64.rpm
961c1eb6439e9dd2b0f13cc88723986b074724bac186d03614656f74dda6924b
nodejs-docs-20.19.2-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
52da7e7239bea77e8c0951f05b3a564bbbafcd2ec99e1c976beb1bcb12f18c62
nodejs-full-i18n-20.19.2-1.module+el9.6.0+32143+ae966e5b.x86_64.rpm
328464d5bc3076c68b69bc4fa0a62ec3301b7d7b90d2d334143f3852e349a131
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
npm-10.8.2-1.20.19.2.1.module+el9.6.0+32143+ae966e5b.x86_64.rpm
f766a0571694f2fdc65bee67d662b85b59ea64dc0eb26afcab5d10b47c41ba36
RLSA-2025:8467
Important: nodejs:22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:11802
Important: nodejs:22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm
787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab
nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm
4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff
nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm
6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f
nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm
d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181
nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad
nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm
d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab
nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm
18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808
RLSA-2025:14416
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182)
* thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179)
* thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180)
* thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.14.0-2.el9_6.x86_64.rpm
a00cb800c70ab64b15000c3a6cd128d93681ffd96716a56845c12ed22a41745c
firefox-x11-128.14.0-2.el9_6.x86_64.rpm
f0e47c92c03886250234b16b6f29e0d6b18a3a6683cef9fa9b8ba8d4ce767a5d
RLSA-2025:14827
Important: postgresql:16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, module.postgresql, postgres-decoderbufs, postgresql, module.pgvector, pg_repack, pgvector, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715)
* postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm
44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba
pg_repack-1.5.1-1.module+el9.6.0+32421+7c015469.x86_64.rpm
9c7871759688428d1a5595c09ea668b57d143a59f80717028131195b2d811b0c
pgvector-0.6.2-2.module+el9.6.0+32421+7c015469.x86_64.rpm
5afce869157e22defd5621fdac042a86d099faea11dbd23704218e2342f53247
postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm
6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259
postgresql-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
ecbc350ef3bd072b8e6da4c81c3f70d0c9c96a7e303a5fff9bd5aed6b627b922
postgresql-contrib-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
cab6ad04f5f5b7049bfa9e4537d7c5fd0530ac7390916063e31ba174b2fd56f7
postgresql-docs-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
f92cfcb433c9c128055d1b47581793b8896436d032a7dd72384c227351eae7f8
postgresql-plperl-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
efcb0ef045230105066c0a92e7cc635f9105353bb7a3fe33db256c5aab9af9ff
postgresql-plpython3-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
2f28994ea7ba885045fbb615f8e9a3338d467e3cf76c29f6eda1b3cb9987f992
postgresql-pltcl-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
729f9964a9b24fa32a73771a41882ee5ef3ff9bcf10a87a04f67827c3d1bfca6
postgresql-private-devel-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
4182daa15e8bbe8f1f77342d64667f2ae64a2419343b6d55365f00c1f3c7f19c
postgresql-private-libs-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
b250913e162dc556e12789da5c0d8533fca6eda2d29a9a37d657fc86211f6f51
postgresql-server-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
3208974c0672ba6402a4fdc373c1867487533822f0c29eb09d5afe8a8e31d2a0
postgresql-server-devel-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
592497af8fec129b741bcef1c8095e2aa4dad071fb6ccde40f5d7b7ee8e55d26
postgresql-static-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
3a9f59ca2b46c8278f88e456221b59521e93006523bd2e88c06cc7d2efd7c2e8
postgresql-test-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
026e61cebef8c440d347d9fb16950cc2176d48406013f87a4bf170696ce18c1a
postgresql-test-rpm-macros-16.10-1.module+el9.6.0+32421+7c015469.noarch.rpm
4ada8834c4c16c97050d8df55fc77ee721f57437361c5e3f95387dde7b299fa1
postgresql-upgrade-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
e4e9e7247245caec00687d42b6a4185bb90439e23d4113f4f9329ba680e96693
postgresql-upgrade-devel-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm
d354bfdaa625726a9ffe6f9b73c3cc3c085c4213ed2aa3c767214655825eb0bd
RLBA-2023:3731
krb5 bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of
your network by eliminating the insecure practice of sending passwords over the
network in unencrypted form. It allows clients and servers to authenticate to
each other with the help of a trusted third party, the Kerberos key
distribution center (KDC).
Bug Fix(es):
* PKINIT module initialization fails if a well-known MODP group cannot be
loaded (BZ#2209715)
* PKINIT: CMS SHA-1 signature verification cannot be allowed in FIPS mode
(BZ#2209717)
* Make ticket signature optional during PAC verification (BZ#2211388)
rocky-linux-9-x86-64-appstream-rpms
krb5-devel-1.20.1-9.el9_2.i686.rpm
423d2b587d56ac0301d527189b012696b7aa99dd02fa8e8de358a47e69723fd3
krb5-devel-1.20.1-9.el9_2.x86_64.rpm
ebf85e5d850e4d02a13aa028e709983d65829a80422d24d950844127f6db5188
RLSA-2023:3147
Important: apr-util security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for apr-util.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Portable Runtime (APR) is a portability library used by the
Apache HTTP Server and other projects. apr-util is a library which provides
additional utility interfaces for APR; including support for XML parsing,
LDAP, database interfaces, URI parsing, and more.
Security Fix(es):
* apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
apr-util-1.6.1-20.el9_2.1.i686.rpm
025e1c288aa9d2bdd95c3af0a8d8bf29df0b3c47fca1dce2d89282ae2935a99e
apr-util-1.6.1-20.el9_2.1.x86_64.rpm
a2e36b65ea809a0f3109a1f1e48e418651d72efd3806489ce6c1f01c9ee11617
apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm
96bfba7a875ae5522e5c3b670a40912bf7cbfdd8cdaf3eef179109037622d19f
apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm
08cb535b0e2e733faf60c121deefd92786c667ac011e30f3439d1adbb8855405
apr-util-devel-1.6.1-20.el9_2.1.i686.rpm
144f7b405e34575bd7fb52ab53e71eb04011f384228e81621389402f6ec08d30
apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm
e40e92ae468c02d09c2cfc4586b3cb291270d5e11032fa13d3bdfa6c0e7ec5de
apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm
e1616d1c4c1aecc2bd015fec9dee520713a10a836dddb78224d8c9c7f9ea096a
apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm
9f06de3b2f3c15222ce8922a59d6d8281408bfb543905a50debb290673331d3f
apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm
f5533d062878ee491627552a0b1e48d32cd4a1e3ca2ce8482dcd8d55d3b9f1d9
apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm
267b4fd421b0796dc864fefcefc25dcab74e8773cfc90d97e1e0c31e292a7af7
apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm
4425dc475f32ed789c59f313c72258d620231b33a42461865badb1d2b6199151
apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm
a55c136788b18d94f6daa8340d5d83a6812fbcc3f0653fb4e8c6bd676789b3a8
RLSA-2023:3587
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.12.0.
Security Fix(es):
* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414)
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.12.0-1.el9_2.x86_64.rpm
38d3108be48db5b0b72539815eeac50fa19abaab3c9adf8106c5678ba43880b1
RLBA-2023:3712
linuxptp bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linuxptp packages provide Precision Time Protocol (PTP) implementation for
Linux according to IEEE standard 1588 for Linux. The dual design goals are to
provide a robust implementation of the standard and to use the most relevant
and modern Application Programming Interfaces (API) offered by the Linux
kernel.
Bug Fix(es):
* ptp4l not able to recover from errors on netlink socket (BZ#2208210)
* Don't re-arm fault clearing timer on unrelated netlink events (BZ#2208265)
rocky-linux-9-x86-64-appstream-rpms
linuxptp-3.1.1-6.el9_2.2.x86_64.rpm
b31c54177ca11c225210e4583f4f50ef621e990d2434c32fbf39904eb4278f35
RLBA-2023:3721
ansible-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es) and Enhancement(s):
* ansible-test: Fix vendoring support
rocky-linux-9-x86-64-appstream-rpms
ansible-core-2.14.2-5.el9_2.x86_64.rpm
408bb6eaec63e1ccb940c0fb35efdf5e767d1c14d9035c7453934a504c8d8923
ansible-test-2.14.2-5.el9_2.x86_64.rpm
b875f745b9f28d3b064f8cd17d5081ce6669ac3de49e1fbac004d758ba1a671b
RLSA-2023:3923
Critical: go-toolset and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for go-toolset, golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402)
* golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404)
* golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405)
* golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.19.10-1.el9_2.x86_64.rpm
b18c663f7c932e10004181efc2790aef320b1227213b13c46ee6b7ac7ff3bcf3
golang-bin-1.19.10-1.el9_2.x86_64.rpm
2f3b0ac988259da21fc4a4343ac01d9e842bfb5ab03659396f3ea150113a2c6e
golang-docs-1.19.10-1.el9_2.noarch.rpm
f13da42269450bbd760e96548ecf979395c5a235dda03801a21a4ef595f68977
golang-misc-1.19.10-1.el9_2.noarch.rpm
1b553ecb1d2cf30dfcf5252933ef1dced2234408cff090c186b4e1d98f7a4166
golang-race-1.19.10-1.el9_2.x86_64.rpm
ddd8825766d02b8f0330f0acf89d607b1de9c53d797a1d5583dae6d9e90cae04
golang-src-1.19.10-1.el9_2.noarch.rpm
6017b1aa6dc6661868e6bf2c443af54982dfc73f9078b4fdbab5a3bb52998195
golang-tests-1.19.10-1.el9_2.noarch.rpm
4c918bd80d40bf8ddb1c12d4f5809faa346292daed691511808692710ebaafc8
go-toolset-1.19.10-1.el9_2.x86_64.rpm
69c95eb5a1d3ed7f2d87dd40233e3fb3a9cc2b1d635f1293b836240f237f205b
RLSA-2023:3948
Low: open-vm-tools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.
Security Fix(es):
* open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-12.1.5-1.el9_2.1.x86_64.rpm
ec2f977d437b3b3f1b86bdbb8e817f6481cbef390ae24dfd7df79d6bb7da5730
open-vm-tools-desktop-12.1.5-1.el9_2.1.x86_64.rpm
c6e12901888737aacb747e4cc5422c2c3607faa37cfe19751283c39b6ac69fe9
open-vm-tools-salt-minion-12.1.5-1.el9_2.1.x86_64.rpm
3457b2540bb62345612aee9e112563b30e9ae70cb22aa9a8ff8bcc98f9d477c6
open-vm-tools-sdmp-12.1.5-1.el9_2.1.x86_64.rpm
e7fbe86d51f3e67e42a59a8c58f7c1232f95bbd72b92085cd2db06f416ae5f40
open-vm-tools-test-12.1.5-1.el9_2.1.x86_64.rpm
2c4ccd88ed04b84056bd87d74fbeb9c20c5b09e2b248358bea59df919ad1cf9a
RLSA-2023:4030
Critical: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: account takeover possible when using Azure AD OAuth (CVE-2023-3128)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-9.0.9-3.el9_2.x86_64.rpm
198cc24bc72bbc55e6ebdfdfb464c74ee584a58f7f8dadbc580245844db21621
RLSA-2023:4099
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-11.el9_2.1.x86_64.rpm
00192b7f42a86854bc750189cb1a8cc64294d7d7abdd0408eb7bcacca4853d3f
bind-chroot-9.16.23-11.el9_2.1.x86_64.rpm
6332182bf6202c8ac4fc513aa4a636590cc78af610e75d34bc2f1b1da221751f
bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm
619e25a841f104d76eeed2139a438e3d47302318eb143d73428a3b025201ae00
bind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm
6f4daef396587960ce972f1bc27b4e0cdf18768a94b26769cac28cadf965d358
bind-libs-9.16.23-11.el9_2.1.x86_64.rpm
9e410cedf417d88f0cdc1b953d63a412499c75d04a9e9205b4ba21b6925ef03f
bind-license-9.16.23-11.el9_2.1.noarch.rpm
1cdb4051deaed39ff89e96a2e9a8235af331cf28fc8c77ec2f41cc88eda98530
bind-utils-9.16.23-11.el9_2.1.x86_64.rpm
73a44b80541b9c9c6f0929cb8d155e96703aaa04d29426d16e13459fd303c613
python3-bind-9.16.23-11.el9_2.1.noarch.rpm
9c850d2bb211ab45477a3a18ee59931f011b1993d22c9831e2bb0e33888a774f
RLSA-2023:4178
Moderate: java-1.8.0-openjdk security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-9] (BZ#2220662)
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm
e72a5c6769e621d5e095a55540a275399d6858831955c9a3bcfc3087361c0fe5
java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm
74026380889f60033d36c9758402ab4172456f5791a52fc0dd41a2f1cbdc1209
java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm
c6716a507cbb614c018c1b6493884d4f4808838ab3ec26b12662aabc29c2f753
java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm
8c334b8b4e0a910546ef0ccd281ece82ea8ae3e2e622c3d4370de1a05afee4d9
java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm
b5e39c366b1d4539a4b44607cc756218c8ca7ac87b0801a15743a1a1269db091
java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm
0b6ccc2f05590f4b3ad0c39b80740421dc94f07dfdcc6e265e4b9cd1e8bccb7d
java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm
6db056f7fa19681dd06852a93f9d5720c5f31cf886681a97a66571cdb6f038c3
RLBA-2023:4374
java-11-openjdk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* The recent OpenJDK 11.0.20 security update accidentally removed a runtime dependency on the tzdata-java package. Installations of the package on systems that did not already have tzdata-java installed were left with missing timezone data. This mistake is rectified in this build. (RHBZ#2224428)
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.20.0.8-3.el9.x86_64.rpm
35ceef7cc9f3c8e3059cb547c2c42ae25fc05297fb7b22297b347651d19c8413
java-11-openjdk-demo-11.0.20.0.8-3.el9.x86_64.rpm
f3aa9dee6aaef3d82791f7be3ebcacbf1b3fe30c1d9bff3740e796b54dc868ee
java-11-openjdk-devel-11.0.20.0.8-3.el9.x86_64.rpm
ffb78cda1474cdacae155883b75092b8e68b6c00b37edec7086dd4f8c77263d3
java-11-openjdk-headless-11.0.20.0.8-3.el9.x86_64.rpm
d286296da8b8c8aa5befa707af931a264f551a1fb191748b57318af0e37ce331
java-11-openjdk-javadoc-11.0.20.0.8-3.el9.x86_64.rpm
c6826fadd7b415a310410f8e8a37999b8c756e32aac595173b439f03b25be26d
java-11-openjdk-javadoc-zip-11.0.20.0.8-3.el9.x86_64.rpm
6abf017d2a373a138fdabb4822a0fb6649b057807f90caed2904167dc0127ce6
java-11-openjdk-jmods-11.0.20.0.8-3.el9.x86_64.rpm
9fbacbd1d6070c757a88a18d6ed655dc0b4be7cb562920a9cdb8a7035e608861
java-11-openjdk-src-11.0.20.0.8-3.el9.x86_64.rpm
adacf4c3012c7d5e80e3d1c4e49067b3dcf6efbd8590c5deecc0cb2d084797d9
java-11-openjdk-static-libs-11.0.20.0.8-3.el9.x86_64.rpm
aedb8d0a43dc07178fd023aaddaae73c8738965ace056499592d1da68afb7227
RLBA-2023:4375
ostree bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es):
* backport https://github.com/ostreedev/ostree/pull/2874/commits/de6fddc6adee09a93901243dc7074090828a1912 (BZ#2224105)
rocky-linux-9-x86-64-appstream-rpms
ostree-2023.1-6.el9_2.i686.rpm
747e2be3560f4ecd9b49ed63940d92997e4a4b207c67119375e302e6158f8f1c
ostree-2023.1-6.el9_2.x86_64.rpm
0f30b965cf6a892b71215353c0a7162a5a09ed024e3b3774a36676852423ef58
ostree-grub2-2023.1-6.el9_2.x86_64.rpm
2be3823f8a3953ab05c7a2770a7bd8b4a280cdc48e2acf553bbd5adee97c0ee6
ostree-libs-2023.1-6.el9_2.i686.rpm
41d3ec4ae2fe02b392db626fb56725099c54cd2d77c56e03ff10e5b2cbe95494
ostree-libs-2023.1-6.el9_2.x86_64.rpm
85805e28384fcb598c577e934eebe212927c39e8597a0eb3adf6c58a922ddffe
RLSA-2023:4201
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm
dc34bf349a6ee0a95bbf0263698e34acd29b1ac72465ae3e7acb032adcc299b2
webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm
b025681bd3f30e209a8d3ca4f9a716a68818ee4fb527f466ab43298e46908a6b
webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm
0bd2d728e1b34637162dbd9d4683acf52d3b74c8533750635c564929c62253cc
webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm
056420f51e49ce46ad081147e555de80f800394a700f0ff641554b7de966e5e7
webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm
a186b6cf0cbff1d01888edf490b1b0583ae72f1e4317bd5d27fb258fd5a0bf8b
webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm
2395030cfa42488d7c4c64a702499fbc9363f985027c3eb0f223c8aae6d63499
webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm
ae54f67d81b22ebdaac3a5ee0feb4d97999fb8ea7dce97d636f8037477aa37a0
webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm
6ae004f1ea10a2e6a42e8f224d0c8785d50d4f6cd180aa979668b4a374eec955
RLSA-2025:14862
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, module.postgresql, postgres-decoderbufs, postgresql, pg_repack, module.pg_repack.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715)
* postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7
pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm
b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8
postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm
878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd
postgresql-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
4d315962aa5b49e19f83d5f438c243bec7b6dfb486e5b7d3be692c9ccbfc77b8
postgresql-contrib-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
87305ad2b6abeb88c10fb610509ed50bb411f0a4bbaddf61704f68e3119c4e73
postgresql-docs-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
68814668bec5e30b27f7596988b6256119d1621f6acd6f0963befc7c533db0e4
postgresql-plperl-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
90db611e7e38ad765ad520d6f6a0dfdc3cce8336e5378c7e1a00ceb37f8fcaff
postgresql-plpython3-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
e73492a81b9b8b75062290e41ffc73c14e91fb0823c600d52dda398276cf5680
postgresql-pltcl-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
f57e4b4945da9a2b8cf8ec149fff9c3e14fb70954ee1a2b870c7bc93f3cdc06b
postgresql-private-devel-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
e70afd15e4dc173988aea53ea2f23522f40f9daa430b4ce528306b02d967352d
postgresql-private-libs-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
4671fbd04a5c152a3bf700cba85583413dca4996bb4766a92abe11734b30ee46
postgresql-server-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
235b5977b28b4a00ba5d49ee4411e0f9368bc723970142b9b1c290c6e3dcf428
postgresql-server-devel-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
979eae07d2082df0a74d6b5fa4d43af9179c74c53a3cc27ec5c69737c7f29066
postgresql-static-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
5a18b96893661b5e44f79093425196eab09f1e6610faacef3e22c9c57e442575
postgresql-test-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
f924ee1050c7bda063cfd0096fca89932fc3220ffe35d976b64de179aec5af9e
postgresql-test-rpm-macros-15.14-1.module+el9.6.0+32420+37c3e639.noarch.rpm
d13023d84387e2a9c60e1a83a46165600a07b9806c6dd6a17c1691bda8b6cd07
postgresql-upgrade-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
0e6b2c11078ed96106972767fffdd8369dce31ce956725e52cc8ecee8852bbe2
postgresql-upgrade-devel-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm
9f0fe833bab71f316451cb657f7fcb7383ab76e8ec87f5493c8b58bbcbabc677
RLBA-2023:4370
pcp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for
acquisition, archiving, and analysis of system-level performance
measurements. Its light-weight distributed architecture makes it
particularly well-suited to centralized analysis of complex systems.
Bug Fix(es) and Enhancement(s):
* pcp hacluster pmda doesn't report dc status properly (BZ#2222858)
rocky-linux-9-x86-64-appstream-rpms
pcp-6.0.1-5.el9_2.x86_64.rpm
efc73172098610075af75af9c7a64cdd7fd0ad98c61b1c36a733c3fd776a5242
pcp-conf-6.0.1-5.el9_2.x86_64.rpm
c034795910bfbe9e57a29d32488ae38d9c4ba1ff808d8fca06e14181a2d9c113
pcp-devel-6.0.1-5.el9_2.i686.rpm
a4fa415f87fede4ba8aeb2255c6ca6f6fa87e1bc9fb973f0fa359d144a4cb923
pcp-devel-6.0.1-5.el9_2.x86_64.rpm
429d5805ec0107beaf8ec1d5a043093732aeee4a95afb78b41ec970471fdf0d7
pcp-doc-6.0.1-5.el9_2.noarch.rpm
1ac71cadba70e99cdc664394b81705857c28cf8dc04d171a0c3264d61c00498e
pcp-export-pcp2elasticsearch-6.0.1-5.el9_2.x86_64.rpm
410f2e27221985865ca93d8f893fcb856e15a59f61ac1bfacd42c9a3b268d0ec
pcp-export-pcp2graphite-6.0.1-5.el9_2.x86_64.rpm
cdaebb6489a6dfd2ad0a1939d0e49515ec5e0c7b8d2cdc2b0898cc8e06298546
pcp-export-pcp2influxdb-6.0.1-5.el9_2.x86_64.rpm
ffc86bc9a3bfd462f11582ad3adb7859fa72bb308d41696a19b2abc8fe2b2d23
pcp-export-pcp2json-6.0.1-5.el9_2.x86_64.rpm
5d02bd570f01b578882336781c9fbb4ae6aeeefb1f7ceea3166de673153fcd52
pcp-export-pcp2spark-6.0.1-5.el9_2.x86_64.rpm
55d46ff7be399da6e17358003eb2cad8323bcdf839298c67f2514443f4367d7b
pcp-export-pcp2xml-6.0.1-5.el9_2.x86_64.rpm
6735e6771d70b61f784e4bbc9fe9bcd83f186b012fe889fd6203c215c9db2af8
pcp-export-pcp2zabbix-6.0.1-5.el9_2.x86_64.rpm
36705211351fee38316f01237f3d1bf402323316261cfb4674d9553a238e91db
pcp-export-zabbix-agent-6.0.1-5.el9_2.x86_64.rpm
dc269b2319ff947dda67dbcfc66c80d3891ad1fa0a0c11150402bd73db0bc770
pcp-gui-6.0.1-5.el9_2.x86_64.rpm
802dd59a32521cb8c897ea32dc75cd6289a8af98bb06126239f5cf8a6d9ab33f
pcp-import-collectl2pcp-6.0.1-5.el9_2.x86_64.rpm
5a1df0483e2a45a4e0f9d8eb9c33c7b9a4d8277de2541b71f2e563e82dbd5dd0
pcp-import-ganglia2pcp-6.0.1-5.el9_2.x86_64.rpm
ada8ccab9fb57d3a0e2f1002520d4300bbee02b2471dbcace8b064b6902505f9
pcp-import-iostat2pcp-6.0.1-5.el9_2.x86_64.rpm
6410b617304ef03edc9207a24673eb754d723b28dd50c2666507a44780a9494c
pcp-import-mrtg2pcp-6.0.1-5.el9_2.x86_64.rpm
46dca1fe9c12ea5f2be21285fb8d4bda79a05c6c7a2736c984eb1890fe71ed38
pcp-import-sar2pcp-6.0.1-5.el9_2.x86_64.rpm
b9b756b96853be83d91f550437f5f431b465c19252e5d19a30427811c6ebb7e8
pcp-libs-6.0.1-5.el9_2.i686.rpm
ad55db9acfdf30612e601a70e0d98697aaf496ca90521f90817fb431a675900c
pcp-libs-6.0.1-5.el9_2.x86_64.rpm
de2e2535f4d187190e66661d244140ee9a783b4910a04967b109a169495c221d
pcp-libs-devel-6.0.1-5.el9_2.i686.rpm
46614f08f65f15de6484bef4278ea80d03d5aaf9299852b905c6498b8c978b24
pcp-libs-devel-6.0.1-5.el9_2.x86_64.rpm
68ac27f709e9be4a4c278eed0892e89a3e2680711e1dfeebb11135328afa9099
pcp-pmda-activemq-6.0.1-5.el9_2.x86_64.rpm
d34fa54152c4f7e770bfb56eeaad0852dce7f7a83bc40eeb31d8f15dbe0aa729
pcp-pmda-apache-6.0.1-5.el9_2.x86_64.rpm
a2db26a17543b50927a58dbc3aec2c249557b13bdcf252021c660ce867313bc0
pcp-pmda-bash-6.0.1-5.el9_2.x86_64.rpm
ba7f0b20909697b78ecf8d0383322b8ae9ae02208d97931975b73ebd826c8528
pcp-pmda-bcc-6.0.1-5.el9_2.x86_64.rpm
b494ee73dff57b01c423d730c67c948d275e89e07c01484f09cf4779fa779f4a
pcp-pmda-bind2-6.0.1-5.el9_2.x86_64.rpm
6592e079e51206fe25f8b1d8df78e78cb17f56664eb45d89a08949652ce8c050
pcp-pmda-bonding-6.0.1-5.el9_2.x86_64.rpm
23d25afbf7fe2fb8fc68ea338722d0706d5a9840022eb3f0841a72fcf3b82d28
pcp-pmda-bpf-6.0.1-5.el9_2.x86_64.rpm
610481ff5c9af95058266cafee643cfb9ffb3f890eda8d009e81bf7b7b1901e9
pcp-pmda-bpftrace-6.0.1-5.el9_2.x86_64.rpm
467294d6bcd9df700fbdb383c9bd2b4c2e12fb50adb6fa1058a99853c19cfe50
pcp-pmda-cifs-6.0.1-5.el9_2.x86_64.rpm
0c7602c592a457080e4179a9a0fb09cc6e850de0021412c5fccf8fc46af5684b
pcp-pmda-cisco-6.0.1-5.el9_2.x86_64.rpm
0d4b79bdf5353f9f7d2df40965b6ff1640875183a75eb3c95ece25dacb53a8c4
pcp-pmda-dbping-6.0.1-5.el9_2.x86_64.rpm
b8233efc9bc2e54d362bcd7d0e489f8c42dc469e00a81de0dfd598ecc005e20d
pcp-pmda-denki-6.0.1-5.el9_2.x86_64.rpm
038ce31e64ad26f5036eb1804548e43920d6c3a55b9a6a61b43a9db6961f12c9
pcp-pmda-dm-6.0.1-5.el9_2.x86_64.rpm
7f4ff77b4094d9a0b95f8d76b23be7b2807d2d195eae246a084ae42fe42dde50
pcp-pmda-docker-6.0.1-5.el9_2.x86_64.rpm
d2a4dbd4dd90bb121dfc10b3c427a84f2b7cd75f60fe3756f47efc3f984b7ec0
pcp-pmda-ds389-6.0.1-5.el9_2.x86_64.rpm
9a2a6592b639a5d9596455c0c7a100a8a9a8ca5b107e21b5af3e1b77dd1abbc8
pcp-pmda-ds389log-6.0.1-5.el9_2.x86_64.rpm
b6d5747c9da77bc6240232218f3778fa2cb3de23591ea7525cfa3011ef3a10c5
pcp-pmda-elasticsearch-6.0.1-5.el9_2.x86_64.rpm
a83bb386328859735517797e483b1a6f1a217f96bdc6d30605783fb914b799d3
pcp-pmda-gfs2-6.0.1-5.el9_2.x86_64.rpm
3a1466cd147060e5812ec989c8cdb0a3cd52a6dc3903342698611013ba7de389
pcp-pmda-gluster-6.0.1-5.el9_2.x86_64.rpm
b194c8edacf9e6dc1922eca81d122b050184d821cb200fd3893191bec261f5ff
pcp-pmda-gpfs-6.0.1-5.el9_2.x86_64.rpm
b31d96e0e429820ec816be7e67b4faee92612096807bb729b82904a88462d242
pcp-pmda-gpsd-6.0.1-5.el9_2.x86_64.rpm
67913261b31acd722ea411e2351b4d471ef5de8c68d8f7ba485bd655c50c3fdc
pcp-pmda-hacluster-6.0.1-5.el9_2.x86_64.rpm
aabefaf20b6e88a1b1889c0814dc44a1d1ca0e59b79fc7dbc44566148e6d4187
pcp-pmda-haproxy-6.0.1-5.el9_2.x86_64.rpm
27d943aca00f5737ea55ac208794fa40b522a7c75ccf5e8a44ae2d362cb85e32
pcp-pmda-infiniband-6.0.1-5.el9_2.x86_64.rpm
5eab55c138dc1bc1e97e09bb21eda75515d729ed60e724456aea6b2b98213177
pcp-pmda-json-6.0.1-5.el9_2.x86_64.rpm
dabe200b343131c474663c7dd865a0ffa7e0700c3651d831047720b54bc3b607
pcp-pmda-libvirt-6.0.1-5.el9_2.x86_64.rpm
6b2ac5ba8ce94330224ecef9c01ef30533281f48a160a19c9ff5aaa8a9c97966
pcp-pmda-lio-6.0.1-5.el9_2.x86_64.rpm
6f2ff540d8ad870ab2d701f671ddbe37118d4186ec41e2c16b3732f5061624ce
pcp-pmda-lmsensors-6.0.1-5.el9_2.x86_64.rpm
9d0c54eecd48381f89609c3656abbf7c5a13db47703d8e8ebdd6057868c8bc3b
pcp-pmda-logger-6.0.1-5.el9_2.x86_64.rpm
a2601b79f2b71577016f1172568d74aca179a0a3f56f5103c7b4f4d001518025
pcp-pmda-lustre-6.0.1-5.el9_2.x86_64.rpm
6337b28b138b653fda835e16bc57ea1dd71ac267e622adf4e8f4193664409c7b
pcp-pmda-lustrecomm-6.0.1-5.el9_2.x86_64.rpm
dccf972542442753eb11d9361fd0d3ff384538a56934e219c4ed1bffa5f102e5
pcp-pmda-mailq-6.0.1-5.el9_2.x86_64.rpm
8e40be49b9dd9ff9ac0cd973fdbfe25de22ac8faec52b61fef958d85305cca38
pcp-pmda-memcache-6.0.1-5.el9_2.x86_64.rpm
71471e52916ed1e1e0a59c5dca3dab26c5cf1b70f0acf66c8c795214655642ef
pcp-pmda-mic-6.0.1-5.el9_2.x86_64.rpm
f5d227aed2585548cb1ebf3273709f9abc949fd74407a0fa4ef0c618afb730a0
pcp-pmda-mongodb-6.0.1-5.el9_2.x86_64.rpm
60cdcfbb4661d2e8ec36bedd63c32a82f49ab97a2459fcba1b3dc3824c43f3c8
pcp-pmda-mounts-6.0.1-5.el9_2.x86_64.rpm
0ee4fc926777b3940f1aced582215499ec69abca1e5b58ce9c401bef89eebba1
pcp-pmda-mssql-6.0.1-5.el9_2.x86_64.rpm
0347666dcd615081e41e2255a4ff6b2a3cb9b4a9aa5c44fc768fc32daebb1688
pcp-pmda-mysql-6.0.1-5.el9_2.x86_64.rpm
2129a629a188fbd77f292c62ab5ddc9e6f1e6d12a2c8505a5a8502bde4039f36
pcp-pmda-named-6.0.1-5.el9_2.x86_64.rpm
ce33623c553be10bb772bbb6e35ee4a9e519e2e05822fe7b0726e742f32fef4d
pcp-pmda-netcheck-6.0.1-5.el9_2.x86_64.rpm
8e5b555312a13a0bfda314aa31beeb0c32c7bcc4b5af94dfeb86ac0f8c49cf56
pcp-pmda-netfilter-6.0.1-5.el9_2.x86_64.rpm
f3eb4c10ec9e5ba6077936ce5d91724699f0627c48438caafcfe9c4cc7478468
pcp-pmda-news-6.0.1-5.el9_2.x86_64.rpm
e54ab7bd5e6fe555decd686f21c6098b2d704bcec52d2774a275a363168699a7
pcp-pmda-nfsclient-6.0.1-5.el9_2.x86_64.rpm
d73bc32dabeb13cd64adc0d8dad49f888c3b32cff68657279c35e39fa7e3de81
pcp-pmda-nginx-6.0.1-5.el9_2.x86_64.rpm
5101ed720a5ceb748b89d7abecc28f4a244666eba8309ce303f8fa31e667c6ec
pcp-pmda-nvidia-gpu-6.0.1-5.el9_2.x86_64.rpm
fbcd9d569850f258939d7712ac84e3091387ad26a679cbb0d1292324919c7b08
pcp-pmda-openmetrics-6.0.1-5.el9_2.x86_64.rpm
8eb310c049b76fa5700a4b9ade86723c89b5ca09e44614fb01a5f594f0823e5b
pcp-pmda-openvswitch-6.0.1-5.el9_2.x86_64.rpm
a90ea120d174537d3795f415616027bffbd2c011bc537db20da79f00412eeefa
pcp-pmda-oracle-6.0.1-5.el9_2.x86_64.rpm
a3fee86c66fa1392bd340d6ae6346058dc51578b9abb016605631000cad3a10b
pcp-pmda-pdns-6.0.1-5.el9_2.x86_64.rpm
3d27489f3be689b46016cfce8a63922b1d2e5cde5de823ace5a72b7cc68bd0a8
pcp-pmda-perfevent-6.0.1-5.el9_2.x86_64.rpm
72c64979f429d48e871555fcc887bbe9c7e9a8b7dd55822485be028b6e48662e
pcp-pmda-podman-6.0.1-5.el9_2.x86_64.rpm
1fa39d896eebf75d0f56cad66204868694a7308d77a4d32f344c749ef39bf6de
pcp-pmda-postfix-6.0.1-5.el9_2.x86_64.rpm
48d81f2ae128c311e0fc5a9770c4226fbe4c8714680ba74c6b77db0e67233b33
pcp-pmda-postgresql-6.0.1-5.el9_2.x86_64.rpm
6dbab8cda5cc308388ccd56cd5403b170b4af698db133b79c05e0af2f3c3d007
pcp-pmda-rabbitmq-6.0.1-5.el9_2.x86_64.rpm
397bc80635bd87e21b1ea94bc6cea95791f390e0f2022af3188b3ce615ca350e
pcp-pmda-redis-6.0.1-5.el9_2.x86_64.rpm
d16dd727a4ce3667dc3890910c494983e41888c86db5ac6a1fa5e926b4f24863
pcp-pmda-roomtemp-6.0.1-5.el9_2.x86_64.rpm
52c7d92aa3776eb927afa318cedb357fee8d99aad002e35d8b0b2afd75de824b
pcp-pmda-rsyslog-6.0.1-5.el9_2.x86_64.rpm
648578b1810c0fb9e1ef282ab0400fcf36ffc18ce0813683ef589181e4c26cfd
pcp-pmda-samba-6.0.1-5.el9_2.x86_64.rpm
aab8fa5d5ac72b10886d53649c7c4276b952d27031e53d51c8ffef490aa7203c
pcp-pmda-sendmail-6.0.1-5.el9_2.x86_64.rpm
84fe4252b49e4a66f73ffec4ad4e266ddaf0161687108c90b35959565eefafa1
pcp-pmda-shping-6.0.1-5.el9_2.x86_64.rpm
88def4c33b9a69180a1e30835bbc1e1deef1301dd5fa462c8a25b3ecc2ef786b
pcp-pmda-slurm-6.0.1-5.el9_2.x86_64.rpm
d7486ba815184c3a36b90dc0d7f7e1cbacfea6313db4d74a0edfcfd037cb7450
pcp-pmda-smart-6.0.1-5.el9_2.x86_64.rpm
3bdc25fa80c2469d11e0ce0af2632988a1f09fd38841c2c9d864cac682e60cc1
pcp-pmda-snmp-6.0.1-5.el9_2.x86_64.rpm
f48be492161af69cb262f590ccf3d805ed0aca746502709e55de746280a248e6
pcp-pmda-sockets-6.0.1-5.el9_2.x86_64.rpm
420619fccba79fe4eb93779a3ed8c1f946fc4b322f4d4510a6fe451e4f2b51e9
pcp-pmda-statsd-6.0.1-5.el9_2.x86_64.rpm
5c89643e8d62e218b163fb68a6a395a153fdda8cf3213b7a39b6a7cff4fb3658
pcp-pmda-summary-6.0.1-5.el9_2.x86_64.rpm
2f3148ee069f87707f1c5257e307a5789baec9fbf105d75103a2d19bc0799416
pcp-pmda-systemd-6.0.1-5.el9_2.x86_64.rpm
c27b03466c8a534d78641432bb94ffec9306c8e1ed582d49376672bdd0e4cd04
pcp-pmda-trace-6.0.1-5.el9_2.x86_64.rpm
1333aeeb8101e41ddb26922435a2b6f136cdc5789e72b5809a005d2148a34e22
pcp-pmda-unbound-6.0.1-5.el9_2.x86_64.rpm
44310839328a144ffb1cd7c66b3dd510607bff22e3262de1905a17b3d060c81d
pcp-pmda-weblog-6.0.1-5.el9_2.x86_64.rpm
d419b9161e3752520a3e25cac4286642e808ca4a6382dde04e586cc6cce53b7b
pcp-pmda-zimbra-6.0.1-5.el9_2.x86_64.rpm
872cbe9689fce80f1d7adfb98be053708625cd91222d8eeb0e07c91c9f17f498
pcp-pmda-zswap-6.0.1-5.el9_2.x86_64.rpm
a1ecab777a30d23432d38ba3a4432f8b62fdabeb4ad37a1fa7a501ce7c1c347f
pcp-selinux-6.0.1-5.el9_2.x86_64.rpm
bf7224ba117d31fca6a0fa38b1b68f8ef1ce716d075ad353c549754a1f947c48
pcp-system-tools-6.0.1-5.el9_2.x86_64.rpm
6b70ee032d3d0855e41f35713ea872077de4bc84e6f6d329d4fa4ce5783124fe
pcp-testsuite-6.0.1-5.el9_2.i686.rpm
ba9cc512829000ae1357009343f5758a0cb13581460652abed98f095de67b9e1
pcp-testsuite-6.0.1-5.el9_2.x86_64.rpm
23023a08fe8848fff89ffacdaedd075c0b64a8c143a55fb5dd98e3a3bb17c537
pcp-zeroconf-6.0.1-5.el9_2.x86_64.rpm
c3f4bbe552f31395e85cf57f3c67b74353ea5298f498bbdb6e44242778b0d5cc
perl-PCP-LogImport-6.0.1-5.el9_2.x86_64.rpm
9449f72d93e44f6d0d9b436f1d83398b8e7c0b5668ef3f9eeb60f839879c4b91
perl-PCP-LogSummary-6.0.1-5.el9_2.x86_64.rpm
34da646b9e70709d5bf1e808807b168f9add2509513413a47b4cc8db36ca5a20
perl-PCP-MMV-6.0.1-5.el9_2.x86_64.rpm
f37854c61720ad5c6d613c687eb89375485bb7639456d2bd39d119a162cf53f6
perl-PCP-PMDA-6.0.1-5.el9_2.x86_64.rpm
7a507bfdf44509470c9816771382ae5c0f7c56b3b8f0be2e46ff472c5756a32f
python3-pcp-6.0.1-5.el9_2.x86_64.rpm
083101b59a7bcdfee4425c03e322ea53f3ab0a1145223dc34d8e37050e6bff9c
RLSA-2023:4462
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.14.0 ESR.
Security Fix(es):
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-102.14.0-1.el9_2.x86_64.rpm
0064dfc397c76c3480e31e48ceeaef75a4c43255e0f5783507b7938b96fd2ae0
firefox-x11-102.14.0-1.el9_2.x86_64.rpm
d78d8fd2b1f4ed6de359b72b361f34669b97bd46d6089c2ebcd517abf9879492
RLSA-2025:14878
Important: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715)
* postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.22-1.el9_6.x86_64.rpm
f8c2b5c47eac3aa25c3c344d4919997b386ea3c48d33db4de260c4f4fe7a66b9
postgresql-contrib-13.22-1.el9_6.x86_64.rpm
beb538ffa1ebd97e636f72be07397c9293bd34c33354c790f4008d19690c4383
postgresql-plperl-13.22-1.el9_6.x86_64.rpm
9457d3c9e2125185a11db80202f5323026b0560e705d344332884beb629715df
postgresql-plpython3-13.22-1.el9_6.x86_64.rpm
57a32e006b064864fa6c8d3bbf53f0ff3ddd34c6cc975ff5a72be99b9d7fa7eb
postgresql-pltcl-13.22-1.el9_6.x86_64.rpm
5e5bb3001f05db7fdac1121ee668c591a992f0afc652a72d7211c33d440291fe
postgresql-private-libs-13.22-1.el9_6.x86_64.rpm
008bb2f25a360d4f44e30076fe71883fd6603fbc686c57181fa53fc53aa310bb
postgresql-server-13.22-1.el9_6.x86_64.rpm
052e56fed09d1d1834eea851120cd443e50319aab693ae891c58c3682974802e
postgresql-upgrade-13.22-1.el9_6.x86_64.rpm
430ed6db1584335bcb360872c4caa4c5f24c3f6b8275ec3a4aa4a0e6c5d98c06
RLSA-2023:4499
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 102.14.0.
Security Fix(es):
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045)
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046)
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047)
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048)
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049)
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050)
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056)
* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057)
* thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417)
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.14.0-1.el9_2.x86_64.rpm
3d9c1e8839f2818aeaa5c4fea6e5e948845fa3d93bbccb55bbe67801d99488a0
RLEA-2023:4366
alsa-sof-firmware enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The alsa-sof-firmware package contains the firmware binaries for the Sound Open Firmware project.
Enhancement(s):
* [Dell 9.3 FEAT] - New MB with AMP Codec Change on Maya Bay (BZ#2218951)
rocky-linux-9-x86-64-appstream-rpms
alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm
42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117
RLBA-2023:4365
cloud-init bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix:
* The system did not generate SSH host keys and lost SSH connection after cloud-init removed them with the previous update to the cloud-init package. (BZ#2217065)
rocky-linux-9-x86-64-appstream-rpms
cloud-init-22.1-10.el9_2.0.2.noarch.rpm
ceb7cd0bf27e1b4a8bec4a619227dfec7ca158288b9c623066d1c62b3454ad1f
RLEA-2023:4372
WALinuxAgent bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Windows Azure Linux Agent supports provisioning and running Linux virtual
machines in the Microsoft Windows Azure cloud.
The WALinuxAgent package has been rebuilt to include the new subpackage WALinuxAgent-cvm. (BZ#2222947)
rocky-linux-9-x86-64-appstream-rpms
WALinuxAgent-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm
4109c3f9f6167c0a910ad05d7d2b00fd7a36936a512a7b6b98b4a68d0a0156d5
WALinuxAgent-udev-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm
80b4e9bca7804e88cf29197abb27e6f802a9c0e3404a9270c7b18793578a5d5f
RLBA-2023:4592
nodejs bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
Bug Fix(es):
* nodejs: Coredump during --force-fips (BZ#2227919)
rocky-linux-9-x86-64-appstream-rpms
nodejs-16.20.1-2.el9_2.x86_64.rpm
e42a9b9650cca99275ac97cd40b96a8e55e577f68a1142f93c1ab3615700ccdf
nodejs-docs-16.20.1-2.el9_2.noarch.rpm
db6aa3445e6355e7533e98d9bf0588ecd409427c907b4edf9f04ace0bc6edead
nodejs-full-i18n-16.20.1-2.el9_2.x86_64.rpm
7f00bb635b1f5ff8eacd87fac0520d254382fd9334c6d35961ef7467354d976c
nodejs-libs-16.20.1-2.el9_2.i686.rpm
38dbeb9ed25f5afe765828ad568c3d3842a359ea1aaa58483c975efca49bcd76
nodejs-libs-16.20.1-2.el9_2.x86_64.rpm
f02193bcd47c79f60a0453ea5bf5d50b494ff6c5a6ed5250233d4895f8a689a0
npm-8.19.4-1.16.20.1.2.el9_2.x86_64.rpm
d2b0f36dd69add0b05c91c9720fc1483e2a3495dc627001f396ef58626fbfd9a
RLSA-2023:4634
Important: rust security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries.
Security Fix(es):
* rust-cargo: cargo does not respect the umask when extracting dependencies (CVE-2023-38497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cargo-1.66.1-2.el9_2.x86_64.rpm
81a1fd466eb40011c219accce4194a8cd0070c0fc759eff2e29f0aa5f188b23a
clippy-1.66.1-2.el9_2.x86_64.rpm
b60c9b4e12b9f4a00a933ca4906959e8fafc8b51d62c84b77e602fcbb0d8233c
rust-1.66.1-2.el9_2.x86_64.rpm
63c1e59419adcee2eb7c88538312e2b966a38519040b6d885084c533a03a7c90
rust-analysis-1.66.1-2.el9_2.x86_64.rpm
2f5f936e87947b8cea32837c46446e98b4bc52dd40e5bacd14a2c358eb7dd05b
rust-analyzer-1.66.1-2.el9_2.x86_64.rpm
8ce8841ede82f5cb4b46d7173917d91e539eced3cbe504243903ef5c4552ff0f
rust-debugger-common-1.66.1-2.el9_2.noarch.rpm
6509fe6d48ec51e2f647c5ce6da22a347ebde6df8de7b3352bf2f2e5340d4fbd
rust-doc-1.66.1-2.el9_2.x86_64.rpm
7b77cb493c34269ee82f8cdded77b613e0f55abad51d29382d51b6a6bf730703
rustfmt-1.66.1-2.el9_2.x86_64.rpm
726744afacd945ce2e6d3e8d34fc1aaf97c723fcc49c2a7e664bb60a459f5aba
rust-gdb-1.66.1-2.el9_2.noarch.rpm
23b3e744c1150a6ffa575a9b79fb24d9d4a05a82b2007bf5c6c6dfb4dd310af2
rust-lldb-1.66.1-2.el9_2.noarch.rpm
2a244b546ffbec93c0a373c97b198fea95d260e3c22d530b5e18a8807d03d1c6
rust-src-1.66.1-2.el9_2.noarch.rpm
7ded2d934d158a2ede2af4b4672eac3c740d5288330521a209491feb75701507
rust-std-static-1.66.1-2.el9_2.i686.rpm
9f004f22a39ad07f5f74736ceca255ecd5f82fa6ef45bf36b24ad8e96899920a
rust-std-static-1.66.1-2.el9_2.x86_64.rpm
21952294f0ba4eb300cabfbc0657d6c22720d523cccef4d5ff073420d45c8a66
rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm
cda250ea5f74bd9b242df3f712fcdacd2d85598a4fd0b4d3a60523622e053740
rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm
cbe5aa0ca5cdc1739bc546ccbdbe9dc9c824e65b1bcfbeb41c9a086762e03997
rust-toolset-1.66.1-2.el9_2.x86_64.rpm
c64c1ca156b02432568fcdba6894e11fa364f76c5e0f381847021312b5c94fac
RLSA-2023:4569
Moderate: dbus security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm
2682ef845404706c4f4cce5ff12039dd755f6ddb58d0c9a6917d7d767f2234ef
dbus-devel-1.12.20-7.el9_2.1.i686.rpm
dd448e55477ec686434d4fe234dff899239ddf945780bbd139128d9cb3e7b2fa
dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm
dad9a295748e339f36433f54d0bd55cbce4a6a54f2de09d45033ce19a84e2d27
dbus-x11-1.12.20-7.el9_2.1.x86_64.rpm
42d3c4ec7042bf5208a9b3276b73848ecd2315c50636123ac0161655a7170c92
RLSA-2023:4571
Important: iperf3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: memory allocation hazard and crash (CVE-2023-38403)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
iperf3-3.9-10.el9_2.i686.rpm
7f075299078b153968b736a2f961ff4d0321f7aed476bb447ff5601f1f14df2e
iperf3-3.9-10.el9_2.x86_64.rpm
0965fd9b63ddb36610b465cfe6b95f4fbee658811cdbb04c9f4e7dc9db34bf7c
RLBA-2023:4596
thunderbird bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Bug Fix:
* TLS broken for POP3 and SMTP connections. (BZ#2230038)
rocky-linux-9-x86-64-appstream-rpms
thunderbird-102.14.0-2.el9_2.x86_64.rpm
23c0f4952a70cb7171c8546aa118b57d5dba6b75f29718263748bd425c9753e3
RLSA-2023:3595
Important: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.16-1.el9_2.1.i686.rpm
81634c4262a4944830a25a6b06c0d586d119e45b4193587fce50c44d60a28c5c
python3-devel-3.9.16-1.el9_2.1.x86_64.rpm
c91735cbd56db64b4d5cb27defe81a6fe2b8da7db777e59a3ebc3aa7a9faf4e1
python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpm
ac677835c540fa0a96279d254749bd3b3ee84dab7bee51e4d6826019221ca7f5
python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm
aa57dbab5adaa4444d9287ae233ffc0a90edb3a41d9cddcfeedd649910eb7b30
RLBA-2023:3730
avahi bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS
specifications for Zero Configuration Networking. It facilitates service
discovery on a local network. Avahi and Avahi-aware applications allow you to
plug your computer into a network and, with no configuration, view other people
to chat with, view printers to print with, and find shared files on other
computers.
Bug Fix(es):
* [Rocky Linux-9] Avahi-tools package built but not shipped. (BZ#2204487)
rocky-linux-9-x86-64-appstream-rpms
avahi-glib-0.8-12.el9_2.1.i686.rpm
a42712c3176a297bc30ac7b397e6954a644898b378eebe5617fbfbef8b1356c5
avahi-glib-0.8-12.el9_2.1.x86_64.rpm
8a133d5c385e147023b5c385d0621d9264da4fa24f83cea9b02a31e48c63cc49
RLBA-2023:3732
selinux-policy bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es):
* Missing type transition for cloud-init to create /root/.gnupg with correct
label (BZ#2203797)
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-38.1.11-2.el9_2.3.noarch.rpm
9e86f62c40e241267b1d9026cfad65170b8147f3c38dbf2a3cef4afb308c05fd
RLSA-2023:3423
Important: cups-filters security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-filters-1.28.7-11.el9_2.1.x86_64.rpm
015ef7ca12e9a9fed0072ebdd50379f3ab19aa28d85b8db96b6ec79d7d66dd1a
cups-filters-libs-1.28.7-11.el9_2.1.i686.rpm
b1c315d2aee7866fa926d3bc7f0a10cffac55716ddd2347fc73800d8fc64d699
cups-filters-libs-1.28.7-11.el9_2.1.x86_64.rpm
b5d57ea1e0a737820ce27a926e2decdbc1e50ed7592af954b940ab4cd24a98c7
RLSA-2023:3711
Moderate: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281)
* libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795)
* libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796)
* libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797)
* libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798)
* libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799)
* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800)
* libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801)
* libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802)
* libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803)
* libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.4.0-8.el9_2.i686.rpm
2c3e6b252e4b58e4dc0cabeb8be81de1cbd82d74df373222ccca8e6402721f3c
libtiff-4.4.0-8.el9_2.x86_64.rpm
b72293f66532108a05f92261731658359c97103fed7a0c65a0605613c8df8d07
libtiff-devel-4.4.0-8.el9_2.i686.rpm
8464c176b0ad99eeb97ac9ee487fcb055a5bfadacad56b8f103e09cb7344c07a
libtiff-devel-4.4.0-8.el9_2.x86_64.rpm
7a2af83f48faeeff8f7050f7f3c99a97af72505a9f98563da28c3d68bb7fee5d
RLSA-2023:3585
Important: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.2-2.el9_2.1.x86_64.rpm
bb5004b65e6ed8fc8c5d14f21309fe38aaf78ccb13936f22f4faf8e5ec1d1249
python3.11-devel-3.11.2-2.el9_2.1.i686.rpm
0ace6acc95186337091f4ab632b9dfa8cc60ec2b7364157a87f06679fab89e4a
python3.11-devel-3.11.2-2.el9_2.1.x86_64.rpm
0ed5c7724577b7fd9d5b5c9950c65161ee35ad748836b8a83c696d05811cdadd
python3.11-libs-3.11.2-2.el9_2.1.i686.rpm
883760c8131df37fd968f52cc969c106c0a37db905e35e888fd6000ccc505e56
python3.11-libs-3.11.2-2.el9_2.1.x86_64.rpm
57656d41c3cbe800787be9d0f53f5006d75a0fc7bd055ed15b7490ae0597c9cd
python3.11-tkinter-3.11.2-2.el9_2.1.x86_64.rpm
0a74181c20b442214a032b9d5f633d2abaf1bf1a214a24310dd9f3a210b32fc7
RLSA-2023:3715
Moderate: libvirt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Security Fix(es):
* libvirt: Memory leak in virPCIVirtualFunctionList cleanup (CVE-2023-2700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libvirt-9.0.0-10.2.el9_2.x86_64.rpm
a8a77b731f8d1b064814830e827d3b202365b3a9313a8a52ee7afadb71988e32
libvirt-client-9.0.0-10.2.el9_2.x86_64.rpm
b91541ed580e9b276af05f804603cebaee385b1e1a5f92185d9b08cd0f2572a3
libvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpm
d6456c7427ef1f55d8a848dbca911c57a45081b8de681ae88bb293e0707ad1eb
libvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm
74921043c4b765c8147f358a5b4e39a3dfe9e8b90d4913c73e0ca1e2a24ac2a1
libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm
3be08a0bb256e830db8f6cb6d651f1884cc59ff076197e50586655839d40fc3b
libvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpm
4877035c9bc64347ae4aab73506326febd45b7e015b9ad03851176d7fefdd2f5
libvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpm
a1b9decad4b8192a06d90d4ef84831df2f8d5ea74a3e06e70beb7c16e950f012
libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm
834d2167a390a0b6c1fec5726823a56d18b7b1a1d8dabc96335870db1c22ae3c
libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm
71519438408501cfc73706084f5839673d9e3f96ab8d7efbb5677c6191491ecd
libvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm
80d4f346434b9574c15c809adc52cd7a1895e510546cb4d89e7ae6dbd35df310
libvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpm
f70e594708c22c9066bbd2b6533136b78e1ae31dbda21feb21e67f7422283342
libvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm
8a7984d868b512a320a90f0de38f939ce73f24859e7a882a7ab1fc1d072da638
libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm
24864e01713548226d7f67f54b16c0a0717b7a6eac81ed7d4a60634fc6e5c71f
libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpm
0668fbe4b77ac970bfba8f63cc5f79f557d835df25f13dcc9f2f457b58c23a21
libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpm
5b96e19eeded9f5a3df4cdea3dd9b0f749cbdb1bb4f9944443ee669e8068b4fd
libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm
d8aee17c72e2ec4546797935d09e9fcf2e34e84e10fc13d84c1c60504b925213
libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpm
d6d1921cd347bf4a19b4d5fa102c91b867a2f0c3c982096cb6303b1c8df7544c
libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpm
3706ab8e224f54cbf042958a73082aad07e90cf902773af49aa81db8028b4718
libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpm
4a5e65092e7bea0333538dc3539df2b80fd93db3317a043ce8819a7642fea52c
libvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpm
15f73cd7d9ecf9d906e796e6764f53cd8b38c5c663543e8b4fc163541435c972
libvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm
de961cfc3263cb757231188d5eb3fea9ca40596ad48a84d7dee3bb4f79e6f501
libvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm
f15ca5831dc5b43272ce70bbca281d9f241d67b26e1c4c147a9c41eacdcaa252
RLSA-2023:3714
Moderate: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: schema_element defeats protective search_path changes (CVE-2023-2454)
* postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.11-1.el9_2.x86_64.rpm
2c335535b43ac494c65174295c5800c3092409ba18aae46c8010147db20ca72c
postgresql-contrib-13.11-1.el9_2.x86_64.rpm
1b01df0e4a0a2baf991f632283bd4550b8e01f7fb3235a6cde6b29b2e17aec2b
postgresql-plperl-13.11-1.el9_2.x86_64.rpm
12f73bebbdbeeaac867033b60d0818c6de3d570ba0afedb0431fbb5f7f0f7900
postgresql-plpython3-13.11-1.el9_2.x86_64.rpm
bba6d017fe1fc66e29b2cfad4d5e4ee7645850707f8a67d0201d9c7fc11aa5cc
postgresql-pltcl-13.11-1.el9_2.x86_64.rpm
1389ac60eec38264397e072c6416dee8c5a4ecf01514dc6be50d8f4e33daf81f
postgresql-private-libs-13.11-1.el9_2.x86_64.rpm
2dfa6507ec488ce782a939e85bf715f44150bc52ade99637f4d87ea71936d866
postgresql-server-13.11-1.el9_2.x86_64.rpm
ad4bbfbb1bdc6bcdb3737715cf7dcdcd189d76c31de0f911f7c055f2801cfb10
postgresql-upgrade-13.11-1.el9_2.x86_64.rpm
af2c51af7127d188e565e1d2081e72e0f8df2bb09344287c19e47bd0bf61e5e4
RLBA-2023:3720
criu bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for criu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The criu packages provide the Checkpoint/Restore in User Space (CRIU) function, which provides the possibility to checkpoint and restore processes or groups of processes. This in turn allows improved fault tolerance or high availability (HA) of a system by restoring a failed process to its state in an earlier point in time.
Bug Fix(es) and Enhancement(s):
* Containers migration "podman container checkpoint" doesn't work on Sapphire Rapids CPU. (BZ#2203235)
rocky-linux-9-x86-64-appstream-rpms
crit-3.17-5.el9_2.x86_64.rpm
28d2c9cbe1e57c919b77608d96f65084c7483610f542869aaa30e216f1584500
criu-3.17-5.el9_2.x86_64.rpm
4d8f96c132b3879ac0c1842247269aaf5738bf16ff7131ea0f7e4222fc5b6dc6
criu-libs-3.17-5.el9_2.x86_64.rpm
97e155ce0cc795306d175f97a607af91a054255577a4bd80aa20041f85205312
python3-criu-3.17-5.el9_2.x86_64.rpm
b3caeb4ecef91cbdf75b34cf9153e36b26b800f5a089962841253d6c283cbebe
RLBA-2023:3710
virtio-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtio-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virtio-win package provides paravirtualized network drivers for most
Microsoft Windows operating systems. Paravirtualized drivers are
virtualization-aware drivers used by fully virtualized guests running on Red
Hat Enterprise Linux. Fully virtualized guests using the paravirtualized
drivers gain significantly better I/O performance than fully virtualized guests
running without the drivers.
Bug Fix(es):
* [virtio-win][NetKVM] The minimum(32) of RxCapacity in 'defaultConfiguration'
does not equal the minimum(16) in inf (BZ#2203205)
* [virtio-win][fwcfg] Fwcfg - Windows update reports errors (BZ#2203207)
* [virtio-win][virtiofs][nfs] overwrite confirmation during copy > 5K file to
the shared directory -nfs mounted (BZ#2203209)
* [virtiofs][virtio-win] Give some hint when start virtiofs service with device
is disabled detached (BZ#2211912)
Enhancement(s):
* [RFE][virtio-win][virtio-fs] Add host UID and GID parameters (BZ#2203228)
* [virtio-win] Add WinFsp code to virtio-win source RPM (BZ#2208395)
rocky-linux-9-x86-64-appstream-rpms
virtio-win-1.9.34-0.el9_2.noarch.rpm
e9cbb63909176930d6932eff316b6152c7ad8f57838cc235b8a4cb083222119f
RLBA-2023:3717
passt bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for passt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
passt implements a translation layer between a Layer-2 network interface and
native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't
require any capabilities or privileges, and it can be used as a simple
replacement for Slirp. pasta (same binary as passt, different command) offers
equivalent functionality, for network namespaces: traffic is forwarded using a
tap interface inside the namespace, without the need to create further
interfaces on the host, hence not requiring any capabilities or privileges.
Bug Fix(es):
* With passt-selinux installed, installation of selinux-policy-devel reports
harmless, but confusing syntax errors (BZ#2190510)
* Reinstalling passt-selinux package leads to temporarily disabled policy
(BZ#2190511)
rocky-linux-9-x86-64-appstream-rpms
passt-0^20230222.g4ddbcb9-4.el9_2.x86_64.rpm
8a9db681596c8f5b341a58caee000a746a75edefd399e534de7d349ecf6b6174
passt-selinux-0^20230222.g4ddbcb9-4.el9_2.noarch.rpm
c542f3f907b9aa6d40ad11ded502d8d94ba0b0e8872b0bc0414e571f880c27ed
RLEA-2023:4865
new package: gpsd-minimal
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gpsd-minimal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gpsd package provides a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location, course, and velocity of the sensor available to be queried on TCP port 2947 of the host computer.
This enhancement update add the gpsd-minimal package to Rocky Linux 9. (BZ#2228096)
rocky-linux-9-x86-64-appstream-rpms
gpsd-minimal-3.25-1.el9_2.3.x86_64.rpm
56ef72391b9cff267c64992a11c928f45f3ecdd158ef1858b8791c22721e61ea
gpsd-minimal-clients-3.25-1.el9_2.3.x86_64.rpm
3010805c5ba0a5752f2fe9fcac2b79c43d73c2284e6d9d32eeedca6065efdce9
RLSA-2023:4838
Important: cups security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm
7cda2a4598214fbe6c70fe5dd6cc2a36dae24088903770e58444102d1f6d1a1a
cups-2.3.3op2-16.el9_2.1.x86_64.rpm
531724a8ae36160e584d3fcdb03b73b0287c58aaa886aed0188f8c78e345fc21
cups-client-2.3.3op2-16.el9_2.1.x86_64.rpm
f74c34e6986b8ebbd010341e14af3a725631894ad1b5e5d28288630acc2644a1
cups-devel-2.3.3op2-16.el9_2.1.i686.rpm
fda77eac7a6ff6df06a6cca01324da7c63bb4dc5f3060944ce1f8816cf59e687
cups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm
6e4f54aeeb62a0eb0c597fe1a7e147aac519b6598de47249e82d39ea9ff635b6
cups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm
f3c1294c63934c7e217144bae2b4b3610384e114ece1f461c9d354f721f770de
cups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm
90228174babe7346e41a851809c8cb1dabf7ddd8938a5d5df18acf9a76d271ca
cups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm
f13113593a1204619e01056f72efa3fbd02d643222c24ecdb2e67a824df55d57
RLBA-2023:5075
sip6 bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip6.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SIP is a collection of tools that makes it very easy to create Python bindings
for C and C++ libraries.
Bug Fix(es):
* sip6-6.6.2-1.el9 introduces a regression bug when using sub-classed C++ exceptions (BZ#2225605)
rocky-linux-9-x86-64-appstream-rpms
sip6-6.6.2-1.el9_2.1.x86_64.rpm
cc6cdfbb5a4d821edd105d53ebb71bed180dca6dd388e6133750204005e322e8
RLBA-2023:5298
fido-device-onboard bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fido-device-onboard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fido-device-onboard package provides a rust implementation of the FIDO Device Onboard Specification.
Bug Fix(es) and Enhancement(s):
* Update FDO to the latest release (BZ#2224364)
* Libvirt FDO installation Failed to instantiate TCTI (BZ#2231069)
* fdo-aio can't get started (BZ#2233734)
rocky-linux-9-x86-64-appstream-rpms
fdo-admin-cli-0.4.12-4.el9_2.x86_64.rpm
c9fcbc32b5ec0180408e71ee2c933b556bcef3f60e086baaed812b925afe6061
fdo-client-0.4.12-4.el9_2.x86_64.rpm
9aaf8db2c15f2c65ebc60a301ee744eba7d418fa5033c4819647eb4a79ce89c3
fdo-init-0.4.12-4.el9_2.x86_64.rpm
5b0095e29385f3038759b743c76c94114620f0da1c19ddc373940da63461af64
fdo-manufacturing-server-0.4.12-4.el9_2.x86_64.rpm
8476e07978ee2fa573960f01f1dd74406a84f41e4f9b9aedc4ef048c0807e37e
fdo-owner-cli-0.4.12-4.el9_2.x86_64.rpm
99f72538a125a66b51b119ae84dc7b87fb25b0cf8a6ff126d2cbd47609454970
fdo-owner-onboarding-server-0.4.12-4.el9_2.x86_64.rpm
25cee59e2a40457fd7ab526444228e34ddd92bc77934882b95673d00b6870ed8
fdo-rendezvous-server-0.4.12-4.el9_2.x86_64.rpm
b27b8df882874b8a6079325e13c3dda1cf7b4b6bbc1338ad098dc4acf952d0b0
RLSA-2023:5313
Important: open-vm-tools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.
Security Fix(es):
* open-vm-tools: SAML token signature bypass (CVE-2023-20900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-12.1.5-1.el9_2.3.x86_64.rpm
8b0e2c92c3d412bdcacb82820d6cca832cdbf677228706d955aa76d2cc0028ef
open-vm-tools-desktop-12.1.5-1.el9_2.3.x86_64.rpm
829f763816665daaa9191f7e4d1d49be43d678f991b9ac811293d39ea2983990
open-vm-tools-salt-minion-12.1.5-1.el9_2.3.x86_64.rpm
c1a3079f293a9975a802ce8b251527d0684bfcff1fe66cb46cef04ccc20a853d
open-vm-tools-sdmp-12.1.5-1.el9_2.3.x86_64.rpm
f66254d5b386682e855dbd70a41038e109f52ba30f95e0ee7432a9a074e8e75d
open-vm-tools-test-12.1.5-1.el9_2.3.x86_64.rpm
6e53446556360cc7d1a2487e76d0e416ad0491aecbcc572d3c561c92a25b8324
RLBA-2023:5088
389-ds-base bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
Bug Fix(es):
* Paged search impacts performance. (BZ#2231841)
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.2.4-5.el9_2.x86_64.rpm
cb7b3ef3d2fa74fbbcbb0fa1266d47db7003530140e7ba717e183dd291dacd3d
389-ds-base-libs-2.2.4-5.el9_2.x86_64.rpm
955f13209762844a699d09706f26016915c324e736509009bd163cfb42c5d26a
python3-lib389-2.2.4-5.el9_2.noarch.rpm
945dff6c303300458854a513cd69fc7e83d16cd7fa5eb720312bd71d75d4a53c
RLSA-2023:5214
Important: libwebp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.
Security Fix(es):
* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libwebp-1.2.0-7.el9_2.x86_64.rpm
2e6565c2ff97f2fbc2633e6bdfcf8e877b17567142e6851743419632d437cb15
libwebp-1.2.0-7.el9_2.i686.rpm
aa103fb08f6af44316ea09febb058e68cda3e8fce292f04553e167a3c7651fc8
libwebp-devel-1.2.0-7.el9_2.i686.rpm
e01b01c776fc949a649c7a981e9f404acd2fc33216f3cd266d9602b28b7621e8
libwebp-devel-1.2.0-7.el9_2.x86_64.rpm
6fd011aba4d88178a9bb1864a6c3a4b905a1456033051a1d862c784702362dd3
RLSA-2025:14983
Moderate: mod_http2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_http2-2.0.26-4.el9_6.1.x86_64.rpm
d22323f44476dad45389a06e3ee8a907d691385e07c513f64e44bd97cbdfc7b9
RLSA-2025:16046
Moderate: mysql:8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mecab-ipadic, module.rapidjson, mecab, module.mecab, module.mysql, mysql, rapidjson, module.mecab-ipadic.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
* mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
* mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
* mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
* mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
* mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
* mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
* mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
* mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
* mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
* mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__mysql
mysql-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
7c36b6f2ead48bd52b1c004bb15840bef0739b9f7426d2ad964136b09d56f264
mysql-common-8.4.6-1.module+el9.7.0+40027+0df0d4e0.noarch.rpm
ff73ed8e7d10291e4aef5c0886c5f5bbf3f9caab7850d766392e2d915d071735
mysql-devel-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
4f1cd3442f8c8b4bc63e687711fe1bc50afc0ef4440a9e874a5c9cdaaa8a228e
mysql-errmsg-8.4.6-1.module+el9.7.0+40027+0df0d4e0.noarch.rpm
0467ee97c83781ecd099390f45b16b34b1659983792ca90508cd1ca75847b455
mysql-libs-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
23dc973983af44527f3b544c83e0c7529280838e052c5e5f842a11fa9554c42b
mysql-server-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
590e89562a3b2d47519e1a1a19fa7fe217d055229046430b4afd1cefcf4f76d7
mysql-test-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
26c69942e843dd25b17601ffca1b1a37fdf743198cddeed3161900197f001965
mysql-test-data-8.4.6-1.module+el9.7.0+40027+0df0d4e0.noarch.rpm
9eb1198951ee7b8f9cd0d175c7473f330218627bc1856b05dab0fd86c55607c3
mecab-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm
355af28fc740c2f9bd77e40daf39253b621b83defb0e47516246e5e2222ca44b
mecab-devel-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm
97981caf9383f3546c68e18c5465ddc1b65a194bdf0bcf2d725e276a058b71e5
mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
7366b9dd824100c2130f78e43d9ef9b799f61934961736e3e1456abef4a3bf09
mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
3f2d04c54ece7fe5e19ac3bb076b4614722e37c476b38c80b3a6f1924325d9f9
rapidjson-devel-1.1.0-19.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
6401561c10fdd4e51de5661b88bac12d5a9e20e2f738f90c429c73eb3c4fdf32
rapidjson-doc-1.1.0-19.module+el9.7.0+40027+0df0d4e0.noarch.rpm
558fcd49446a50ffea6aa4b19088b8320790c540f80e469ff9a170af7e1f2a34
RLSA-2023:5924
Important: varnish security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-3.el9_2.1.i686.rpm
7233021549a34421e686c1b2041001f2e66a76d323c434200548f0fc136bafda
varnish-6.6.2-3.el9_2.1.x86_64.rpm
457a433b4426ed3bb128133a55c73525fac2d9381a33aa6dab6f00cd1a6582b7
varnish-docs-6.6.2-3.el9_2.1.x86_64.rpm
e3d545fffa2b3a9bf7293f0714473a4707c30edd31240321f044c3cf856f0578
RLSA-2023:5765
Important: nodejs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
A Rocky Enterprise Software Foundation Security Bulletin which addresses further details about this flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
nodejs-16.20.2-3.el9_2.x86_64.rpm
ced322c092ff463d444f77af4bd48ab75a8607decaeea9e15e42300c70af7c0f
nodejs-docs-16.20.2-3.el9_2.noarch.rpm
6519a5202ef9875196bc6d369af54179965d66ab6eb35bfc757cc6c99da2a0f7
nodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm
6eec823fdd34632fcd9ac6572915be04be4c833e212987c9d9872103fbf23d7a
nodejs-libs-16.20.2-3.el9_2.i686.rpm
2c48b577714f68bb6a9b7ecdea021c2f80c8a20546c7df9c1112e37f99fe7c9b
nodejs-libs-16.20.2-3.el9_2.x86_64.rpm
694650198c13598b8b37fd7167585b6a83817ab0141642530478d5e6a4de8b95
npm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm
1216b64a82539aa829391769be7245a4b51360bf27bcdbe68c2b5905b6082ed1
RLSA-2025:15007
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.9-1.el9_6.2.x86_64.rpm
ad79012ad1da97954908c14a2517b84adb93c06e1fe955eeb450ccaefac333ac
python3.12-devel-3.12.9-1.el9_6.2.i686.rpm
23525e0c3ace9847f43ee0838804a2e6cfcdfffb46dc781b454d5f38ba6e7c8e
python3.12-devel-3.12.9-1.el9_6.2.x86_64.rpm
ca7c2a9fcb4a4157ff981662ff73db504bf9ce2de916752648e8c245175cadae
python3.12-libs-3.12.9-1.el9_6.2.i686.rpm
c53790bbc9f00ac4981339ff07ab664e437f6e34e794c3ce636555d804b93dbb
python3.12-libs-3.12.9-1.el9_6.2.x86_64.rpm
72a8789c36aa99ded1879147305c85cfe96dc282c02999df73d17e335f9d9e05
python3.12-tkinter-3.12.9-1.el9_6.2.x86_64.rpm
62afe3fd3bb3c5ee6d002d18073c8186523a73604e37c289aff46736ef2a82e9
RLSA-2023:6120
Moderate: nginx:1.22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nginx, nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
75c275d990f8b94673a639173c737ef4ddfa631f17ba633f06362a584d2e62e9
nginx-all-modules-1.22.1-3.module+el9.2.0+15280+45c505d6.1.noarch.rpm
c65080a4654ddda5a779f24c5f11293e9695de7f56ff6ff5881faf513485bb79
nginx-core-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
36ebeeda10a6e15d28ede515bfbc6cc95db0b2d873215f760bd492a7f1489569
nginx-filesystem-1.22.1-3.module+el9.2.0+15280+45c505d6.1.noarch.rpm
44fde61969cd1dc7e1faaca0ff91eeaebae7a702955ff128965dc937ad48c85a
nginx-mod-devel-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
75de918eaac360658b0a21e9c6696cf8979df6de1a7e584fabee87dee008176d
nginx-mod-http-image-filter-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
c9ee4273d64ab462d56f3793c5f4b500fddf9e24beb6368d71cf02243bf57acc
nginx-mod-http-perl-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
1254685241f1233c6a74bf04c909fd4168fa4cff325642768a91e5d54ca8859e
nginx-mod-http-xslt-filter-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
793100ed583ca3b0d55a7deca9fe5155fa7bd23de329e43ee06945ae906c9bf6
nginx-mod-mail-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
b96c8a7dbce7f763914981d73c1f0a111f180ed79b7c8d203bb6480b494f598f
nginx-mod-stream-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm
ff22f2dc7090e3dc97fc39afc00ba274b0fc691f89d90bca47d50dc43759ad1b
RLSA-2023:6266
Critical: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* SQUID-2023:3 squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847)
* SQUID-2023:1 squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846)
* SQUID-2023:5 squid: denial of Service in FTP (CVE-2023-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-5.el9_2.1.x86_64.rpm
00ec04dfd1657bac0e911783a26b8210d140c5d1bfbe455ffa3f076896377f24
RLBA-2023:6412
alsa-sof-firmware bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm
42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117
RLBA-2023:6536
net-snmp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-11.el9_2.x86_64.rpm
b6edc3804049080df6d087f0bd453af4a7c2c8d4b83a3f24b22e8d224ae4a30f
net-snmp-agent-libs-5.9.1-11.el9_2.i686.rpm
6f1f9205b2ecc1eb595ed55cfa5434a8e2243b38f289a7215d6859338273628f
net-snmp-agent-libs-5.9.1-11.el9_2.x86_64.rpm
f7aa2cb858fbb65de89a4921f50b281c9230c466c246edf241acb6ada62b7e6a
net-snmp-devel-5.9.1-11.el9_2.i686.rpm
d15e205f970491ddfe874c82b727f2642edbb27c1078d5a92a978c90eeaaf505
net-snmp-devel-5.9.1-11.el9_2.x86_64.rpm
c683d10535307d6c2198dd7d3e0849dda282babd6fc19d5ff1055159cc0d18d4
net-snmp-libs-5.9.1-11.el9_2.i686.rpm
8bf90a3594c43ab7ba9968f9cf5ea468c9fcfdff171c1ddd8a1288b16d176290
net-snmp-libs-5.9.1-11.el9_2.x86_64.rpm
c204dcbaca9bb5f87edf637cc4003fd122b9a5ac7b047d0f63619b6c83ad9d3c
net-snmp-perl-5.9.1-11.el9_2.x86_64.rpm
db5d84b120c02f82675a8082dce9b9306ee207ca6a66328cb7526a80f6843fc8
net-snmp-utils-5.9.1-11.el9_2.x86_64.rpm
8c895d0081ebc31a42be374d5318b1adf1a2de5fbcee600c1f35017d1db5427f
python3-net-snmp-5.9.1-11.el9_2.x86_64.rpm
c72f48985c2ff0563775b1031f2e79d8ff9362b78bb6b60486a60bf62cf13210
RLBA-2023:6552
scap-security-guide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scap-security-guide-0.1.69-2.el9_2.rocky.0.1.noarch.rpm
4cd3d4080048693c8c5692900785d5e9a9c6322edc941b06dfd85c12d8ea1374
scap-security-guide-doc-0.1.69-2.el9_2.rocky.0.1.noarch.rpm
6f437e6c8514a35a8b6e138c1c28a79900fda10ced1001c26ca0b1877409d37c
RLSA-2026:6923
Important: nginx:1.24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nginx, nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)
* NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654)
* NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)
* NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
2ead91879a97e7313476e065e332f55b4f568948be8668495b711f12d802e7d3
nginx-all-modules-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm
4bfbd54a55ccfd6122590d6622f17a4b20d755fe672451bd07fdbbaa1eb141d8
nginx-core-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
35c6aefd449cbc497e82203ecf4340eced4acb8e0311c3a51789a946cac93af6
nginx-filesystem-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm
91e78a263a9a39bb2cdb77cf05eb463ada7a1704c875f1abf39f3d46f2c54770
nginx-mod-devel-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
90782c83e70099d51f328b436b2697b1d7c15d454f1032dbf7676908e288c594
nginx-mod-http-image-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
347756de538c5c34ccb8d4a5b2650b86c680c11060174ff8c8897c02da0ced6f
nginx-mod-http-perl-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
3d3528c490fa82a1840d8c05603972715550f6e9349ab5bf4d329b7e56d7b89b
nginx-mod-http-xslt-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
39ed4fc5eef4c94fcf030fbc910783c06c9c1c99f5f3275b41e88aa0d4411dca
nginx-mod-mail-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
5c42710e27529ea5533f1e367ab04f325499f6e8b4268d2c5f18c491347f9cc5
nginx-mod-stream-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
6fac18b9f06d8855aad7371c3b47b86f0205149462b67dc3d8cb8170ea7167b3
RLSA-2025:15010
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.11-2.el9_6.2.x86_64.rpm
430a76720c4b569198eddf3f416d9970cca108cd1eeac2803771749f6a4c014b
python3.11-devel-3.11.11-2.el9_6.2.i686.rpm
5140a31d2c806f07466c0d7220b560b8c66001ff62dca8adea45786fe8821f1a
python3.11-devel-3.11.11-2.el9_6.2.x86_64.rpm
af85d3075823c96698067f9f3de2a8a932880f01cb88904415074fc33f34d32f
python3.11-libs-3.11.11-2.el9_6.2.i686.rpm
4812f1d423cb9fced65a31359bb4df66bfa7921373a95bd81c10ab56e6069164
python3.11-libs-3.11.11-2.el9_6.2.x86_64.rpm
8b2621fdac868bf29001848b2cf85658687ba5bdb5b5782bccd0604231d5ea44
python3.11-tkinter-3.11.11-2.el9_6.2.x86_64.rpm
c7d4a31d8dee783f26e0dc54e9e76d3e130fbc9f4b9ed692534d4991cea26273
RLSA-2025:15023
Moderate: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252)
* httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048)
* httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.62-4.el9_6.4.x86_64.rpm
2c5849062a04a3ba0d601f0ad04042ed7a809ef4072f22e854f51240b6d96375
httpd-core-2.4.62-4.el9_6.4.x86_64.rpm
8ad7355caf30e2f78048fdfc7c83834a40b6546cb955b749ba455bbf206554cd
httpd-devel-2.4.62-4.el9_6.4.x86_64.rpm
95efb101a916e053c90a516de64494df425da187a7cde40c23e0b8629eac7c0d
httpd-filesystem-2.4.62-4.el9_6.4.noarch.rpm
b23106e51f644e8e76d1c6355b9c62454909a59c45686da4abc9193c9da60425
httpd-manual-2.4.62-4.el9_6.4.noarch.rpm
a4125b78553b9e50a7709a872a0f5af27651c5c2b194a15f44e66e3a926b2379
httpd-tools-2.4.62-4.el9_6.4.x86_64.rpm
21acc6f8d8298efec1daedb5d3c9ed4bccb38db7e15e25107274e85c6b3313b8
mod_ldap-2.4.62-4.el9_6.4.x86_64.rpm
e46d27d3d865f247b3a58f937d0cf00e66afd4a9e55872fa79d8127703cd68ad
mod_lua-2.4.62-4.el9_6.4.x86_64.rpm
ca21e192b9d436ec4b4b77efc1314dbb165d575e46125db7d94e9bd64a9fc61e
mod_proxy_html-2.4.62-4.el9_6.4.x86_64.rpm
74e0175a510857c3df76f50ce3f40001dd69e18b759533ae23538fea8c6d8e61
mod_session-2.4.62-4.el9_6.4.x86_64.rpm
f00b5bcd150b1b440ce5f0d33fdc6b6d5759a662f2b4b8ae7d7e5ba767d55dcd
mod_ssl-2.4.62-4.el9_6.4.x86_64.rpm
c5f7bdb262012e89fa979895fe837600f2a10e9ffab98815a135a238f3ad8f47
RLSA-2025:15018
Important: udisks2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for udisks2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libudisks2-2.9.4-11.el9_6.1.i686.rpm
0447a15f0539281347e3c24b614242a8cfe2f5eb097cb928b06f1f9f84f310ea
libudisks2-2.9.4-11.el9_6.1.x86_64.rpm
51bef46e0b76aec0813beedee3b4b0c0bb95d49bf9d31cb6a584079994f878d1
udisks2-2.9.4-11.el9_6.1.x86_64.rpm
3ce269dc48aa64436110d56fd0be1be2a1c7a0417930306ac1682e0fd179cc7d
udisks2-iscsi-2.9.4-11.el9_6.1.x86_64.rpm
bdecaf74f159884785615d59b1d8245e7f767f6820958ab86832672acb83a4bf
udisks2-lsm-2.9.4-11.el9_6.1.x86_64.rpm
ec32b34e6a68bc385724e34a4be073deafe344a1a0063fa4e2bbdfa89f6f3d2d
udisks2-lvm2-2.9.4-11.el9_6.1.x86_64.rpm
449514711c88c45de15931e120f5cf59d056b9b354d392a5053fda5cb05898dd
RLSA-2024:1818
Moderate: java-1.8.0-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.412.b08-2.el8.x86_64.rpm
cdfc0ad20656f71dffb322efce1b227a7ce619ec6cdc62237533bf9792363ff7
java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8.x86_64.rpm
0e801f51e388a5bd6321dcc5f249d505460f3b1b812196041351cce09bb495f2
java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el8.x86_64.rpm
348acbfeb7ba2d5ad5f968e26af7fc24e9c1b9402930256f41579e43dae25cf1
java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el8.x86_64.rpm
782e5cba63ff1fbc6daf4be612f922692bf4db0f87d3d9e6e19266982ce42a83
java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el8.x86_64.rpm
c83652f7eee7b65bb3ec10ab7c5b00a205cf09c8e6b2522a9c42c6bac0e438ba
java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el8.noarch.rpm
eaf1f90cb72e07a468fa57053e6b3b0e4e4d200eda8673370f7e24bc0acd9d28
java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el8.noarch.rpm
74b073d5c8d7f8122e3d5aa07eb178c2fa2552c8bb59085676520bc6b8c74581
java-1.8.0-openjdk-src-1.8.0.412.b08-2.el8.x86_64.rpm
7b5a496e52977224d6b9b85fccbb66fa92bae70e01855f6ffa1d1a432477d9db
java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm
04c3bd756ca8c6c5e8c5d121fbac3fadfeb62209682ef253fdacb4430e63f6fe
java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm
8cda4469b372c76da0932a9d0f092d1b846368878aaede237c460bde21a32289
java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm
d912010173461b29d8efbd64f6d55fca4af3ec4817cf239054f38aecac368eb1
java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm
1855ef52d2e8f68508b4ccfe458d44c0578be566b3446d8bb8aae54f68bdc434
java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm
d85f668f7812cd642f9816c9390f9bdcd44942b097957c2b6252ca1dec519279
java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm
df6abdbb98c05b41936348d87f018ef61940f446cf5f1c9c91e4e924accdddfd
java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm
ae95d1546ed41b0636e5923a5819259b33592870d69a264e40439183b6bd4294
RLSA-2024:1828
Moderate: java-21-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-21-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-21-openjdk-21.0.3.0.9-1.el8.x86_64.rpm
86299a5f185d7d326193f7bf08a6a85a7f398cc50b3cbf3fafdd07ab318e69c6
java-21-openjdk-demo-21.0.3.0.9-1.el8.x86_64.rpm
53ca3b2c3bdafa4e5faa6eaf21761f8e406b2772bd4967e4a075833eda6f57af
java-21-openjdk-devel-21.0.3.0.9-1.el8.x86_64.rpm
e842a7459e0ef075733a53dae81cffccec0351701fb4e590d71e02df707348cb
java-21-openjdk-headless-21.0.3.0.9-1.el8.x86_64.rpm
1bf3c3382a09d8bde5513e43c09b12390cf35b5b8568f012cf8c2f764d9015d1
java-21-openjdk-javadoc-21.0.3.0.9-1.el8.x86_64.rpm
7c65bafd67d4154d0c5a9c733823cb106795ea072f90f3ced9555b5e5f093149
java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el8.x86_64.rpm
61544f06cab93caf776cb02600b73e28b86e4c47c83bb1f53b5efda95029d0c1
java-21-openjdk-jmods-21.0.3.0.9-1.el8.x86_64.rpm
397de99d61a3de6c826ff71b5e7f28193a8b9281b46cfa7652bc05803a82682e
java-21-openjdk-src-21.0.3.0.9-1.el8.x86_64.rpm
38f6cf6b4b7b39ae7d285d9a6fed6f1f093fe17b827d1c5a40938b81a1b709ae
java-21-openjdk-static-libs-21.0.3.0.9-1.el8.x86_64.rpm
8139711c595986599a3ba03b7a717f3206191daa823658e04d46cf996092855f
java-21-openjdk-21.0.3.0.9-1.el9.x86_64.rpm
3e23ce536bd1824c4defdc09aad82b37f883c25dbf9a9fec6e67052c5c52399e
java-21-openjdk-demo-21.0.3.0.9-1.el9.x86_64.rpm
89c9ca98661f6a7cacf7f9f78a59caddd74affbfbfe5ee9e5b772c97004ab71a
java-21-openjdk-devel-21.0.3.0.9-1.el9.x86_64.rpm
26386e2829715739156d101ac2495c7bcc2b9d88f636fbabb494f364a7dede7c
java-21-openjdk-headless-21.0.3.0.9-1.el9.x86_64.rpm
70b51b6a7cd8bba111465ba9328aeee15f3297e168147b37221640871bb9c5fe
java-21-openjdk-javadoc-21.0.3.0.9-1.el9.x86_64.rpm
ab7a6396c3ad381f371090a4152b18a5b457701e6fabc23f756e32795a235893
java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.x86_64.rpm
f8733dfaca359c0a16d1da5d285c18e64beb1b2996cc82833ee37a3512c7e8ef
java-21-openjdk-jmods-21.0.3.0.9-1.el9.x86_64.rpm
1288c4c52121c4959f0c6294e2b78d6602d662a4e4f5e4189f43ee9ec76e68b0
java-21-openjdk-src-21.0.3.0.9-1.el9.x86_64.rpm
02b0777997debf47248f7e356df771d7f72e1dc485963ddd86a1eb0ab57adf44
java-21-openjdk-static-libs-21.0.3.0.9-1.el9.x86_64.rpm
240147219f0a746fa2a62f6115553cfa9ca7b51a8a5c44b9ad6f1d02b9d2ea7a
RLSA-2024:1822
Moderate: java-11-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)
* OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)
* OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)
* OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
* OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.23.0.9-3.el8.x86_64.rpm
f33e4f6371ec37e621fbc8d943f419198e8a87f4f67240cff36bb5020ca75b97
java-11-openjdk-demo-11.0.23.0.9-3.el8.x86_64.rpm
a5ebb35f56e508df070c1c86ae9e005048921a546b99359bf1163370f6a6047c
java-11-openjdk-devel-11.0.23.0.9-3.el8.x86_64.rpm
b9613d7ad2ce4fd1f55a8e10a8640cb49f4def9b488dd50a762b70aa0f354dcd
java-11-openjdk-headless-11.0.23.0.9-3.el8.x86_64.rpm
d09f0cc7823f24ff9d8b2b89bd1c29e1c50b816d64b8df1ed9cf8a855103680a
java-11-openjdk-javadoc-11.0.23.0.9-3.el8.x86_64.rpm
f4f1081faa8c4490b411109f9f25de3eab2e14bf0a17182ebf55a05ace71a612
java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el8.x86_64.rpm
efa58a38125cf810c4c9a588c7f1ed0226e1a9e9c70ebde7a681260202bf27fb
java-11-openjdk-jmods-11.0.23.0.9-3.el8.x86_64.rpm
ed0d5880f4c26c8b3347f342c3629af23a67e21ee061564b2ef3deb811c93d4e
java-11-openjdk-src-11.0.23.0.9-3.el8.x86_64.rpm
016955775051b0af23ccd483e316b9b791f95622ab11cc784801a3e9c7b19e50
java-11-openjdk-static-libs-11.0.23.0.9-3.el8.x86_64.rpm
90ac886534d52ef309cc70b1bdf6dfeb95b9831bd0b94495b994b26f09144b63
java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm
a8bee5a8b6e0935a55721b02c6787ba3129352adf813ace86396069e8442ab8b
java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm
35d3c8c1f64ecfb257ff90be8d3160fd307d522c4005a94e6194195c0c363b22
java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm
83512f4c7823e0fb7cf1cfa1dc7386faf739541dc4f9bdb08ef8fcd36ccf220c
java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm
4becbe62a7cb1c09a0c8476f850135aa1972af8143ade34981d7b1dc42702eae
java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm
436404efaa47f005a0f00b632b9d510546614723b2e9002b4adee284652ec99c
java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm
471dc2fc606c7d5ee1b033d86d887e45545e22239e41896d614fad0b8e562f35
java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm
f5e6d8b770382620d6087e4bb77ba40dc571813acdaaf01bd9aca10aee47fa81
java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm
126877f791bd1b035188e7a8b0b219e1146d0b38612eb03ddfd3b9676d0b5fca
java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm
3104fe342fc99a27056d781f9026c41f4d4e0f773975b41051a2c39ab85a1d66
RLSA-2025:15019
Moderate: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.21-2.el9_6.2.i686.rpm
8588c7df6acc678b3e06811fb3a23f27a8c22b82cd822e68e5e1bc94b49860ed
python3-devel-3.9.21-2.el9_6.2.x86_64.rpm
400a9f784684c91cfb2a3bb5261e63e6fe6ec4980a8a16b2d9a5052ab184c570
python3-tkinter-3.9.21-2.el9_6.2.x86_64.rpm
69bd1b5bea72e249a511ea28141019c3175e1da66c16973b4bc972d1887f1a9b
python-unversioned-command-3.9.21-2.el9_6.2.noarch.rpm
03be55458e8b7c6426fab849e681b0a6994c6163a6c5e2126cb56229642fd998
RLSA-2024:2758
Moderate: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240)
* CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743)
Bug Fix(es):
* ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009)
* mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235)
* [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673)
* system hangs completely - NMI not possible (JIRA:Rocky Linux-30678)
* ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110)
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm
9b5b7012f7779a771f60f403a2a23d4e2bfe2a1183bc18362c650a3a15bc4f3a
kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm
efecfb852fcefe18069273cc671f18d8226e7e2e260d62164e6bb9e3d593338c
kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm
576d205326a864027dc2810fae40777861a64944f6102c0bdea7d89f527dfb2a
kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm
70605c8e540df200c306832facc6ccebc9651aab266c1438393c5fc700dc7845
kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm
f035f49ab6e5cf0139e6fcc4208d8434dfb34ec0677ccdd3d62bd5ea873c6a2b
kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm
bcd7bed269b0fddf53304a153658552b5c15d17edde61e37ff760f9d4dbf2dff
perf-5.14.0-427.16.1.el9_4.x86_64.rpm
5483769fecd0c1bb52552c5c783d6ae3d149a9915402e17d615a67e77997ea95
rtla-5.14.0-427.16.1.el9_4.x86_64.rpm
8a06d9a7398e409d83f742a79fbb3eafc41a5d4862f6ba00e86ed2fffb0b5c23
rv-5.14.0-427.16.1.el9_4.x86_64.rpm
9f3fee42df3cb74c085f0e6fa529de1118a7e661010fe2636a89f2f1fe8c75e3
RLBA-2023:6611
lua bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lua.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lua-5.4.4-4.el9.x86_64.rpm
84a2d73f003fe6fd69dffb84fe66dbd44495bf2b565c8a85ab71e1a013875472
RLBA-2023:6684
dbus bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dbus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dbus-daemon-1.12.20-8.el9.x86_64.rpm
789f3c6e76a03f06b661f1feca2d24adc586411b83c0efd91ce83d003b671619
dbus-devel-1.12.20-8.el9.i686.rpm
9a2a1a09f2e05711d5096d851b7df9b4f5114bf870caa58b2b34e8801ae00d02
dbus-devel-1.12.20-8.el9.x86_64.rpm
5c616199864626b03feda48135bb6887f20a871a97ce8edeeeddfce43f941fb0
dbus-x11-1.12.20-8.el9.x86_64.rpm
71c739ee4a535b97b40de621b758a88be78a71ef21b1cbcb9fa96d711753e51f
RLBA-2024:2397
cockpit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-packagekit-311.1-1.el9.noarch.rpm
83c1a42d6cfc3d2728cda5fdb9d7ecaa865df2d34ef87c61cfa6498b22252dcd
cockpit-pcp-311.1-1.el9.x86_64.rpm
b1d59b72484f46bcaf2f95174dee1d44f6ae9d0d31735e2bf9375d6abcbdb5ab
cockpit-storaged-311.1-1.el9.noarch.rpm
4d9be377e995f5c117c3d47ab518dcd5c9ac70b811371b571d13549649e1de47
RLBA-2024:2402
selinux-policy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-38.1.35-2.el9_4.0.1.noarch.rpm
d0ac8b03238a61fb728f82021746c0fc9c80c6cb62679090555ad8c346c38a6c
RLBA-2024:2403
gcc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cpp-11.4.1-3.el9.x86_64.rpm
298cbccf8768fae253209641cdea3bce81b652f78c7c1178b1f907ce1f146246
gcc-11.4.1-3.el9.x86_64.rpm
44ff2c768848a786c1a737005e503c14fa047319ec19dd3d4e10af603cb3d8cb
gcc-c++-11.4.1-3.el9.x86_64.rpm
cc84b7f4df78e85cf055adc5d4c56a98524e58c5263b934c5caaf2d5a9807446
gcc-gfortran-11.4.1-3.el9.x86_64.rpm
dbee18a4d3d12f717bfff4df208e4932e5bcc77ba3574f693278d1ba96397c66
gcc-offload-nvptx-11.4.1-3.el9.x86_64.rpm
320172a4c7a22a09f46f5ac4cd3c6b89e823ab1803ddee7d24eee013bc3d6b2b
gcc-plugin-annobin-11.4.1-3.el9.x86_64.rpm
a116385451e828a33ec377da8a265436c6c941ab1487cb579528445dd02ee638
libasan-11.4.1-3.el9.i686.rpm
a3604e623848b721f89e31c9295764b357e4fcc301452214d06c4f91706b067d
libasan-11.4.1-3.el9.x86_64.rpm
c72fddd916c15f948c5f9a7ac5192f498f43b9bf8553b5347812734aaaa92896
libgccjit-11.4.1-3.el9.i686.rpm
76ed9df8df17a157c171e8078168cfb812d45290c2ae0c89fccd566137838d7f
libgccjit-11.4.1-3.el9.x86_64.rpm
f81ea6fa882c7d7309d5965d263b6cb8159501d3bebdf657752b347e4213ed1e
libgccjit-devel-11.4.1-3.el9.i686.rpm
76c91bfcce6d836c65a687455742d47978f9f6395b28086e30b63319b1f5cd1b
libgccjit-devel-11.4.1-3.el9.x86_64.rpm
03ba9e92a1542d9f8503036da559e70c0990ab5182247d9461708b34be54ed6c
libgomp-offload-nvptx-11.4.1-3.el9.x86_64.rpm
773f34667e021eabc24a85cf1befc44a13630827237b98dd0732325a39dd8654
libitm-11.4.1-3.el9.i686.rpm
ad8160d8ef1ae66758373bcf501efc1da4495bdebac12c65ac5e0b3abe12be8b
libitm-11.4.1-3.el9.x86_64.rpm
ab319a06959d29801519e9d3c159f5be00fadf9297d24db27710ab32620c660e
libitm-devel-11.4.1-3.el9.i686.rpm
5bff22d7cb10b953ef48f66ccfedae4402f87734379d8a51f80727356afc2930
libitm-devel-11.4.1-3.el9.x86_64.rpm
e53817b57f720b6d33b9b7726ccde737d20ef54d98520215f772af88a05989bb
liblsan-11.4.1-3.el9.x86_64.rpm
bd3e48bf281cdbb13460052762839db3a5da5a33d034d4f2ce2fcc046852a74e
libquadmath-devel-11.4.1-3.el9.i686.rpm
05d297634f1136ce0e052e96cbb5f629c93ede26bf15768f8c6d30b45826724f
libquadmath-devel-11.4.1-3.el9.x86_64.rpm
7fdbf636758fd4a5961092c3715c2c321632d49a06c5f40b19876735697c0960
libstdc++-devel-11.4.1-3.el9.i686.rpm
afe2fcca9a5e6fd8a1ce48e7ef600a088f85ada5745dcf5c2d76b2dfa6bbd92b
libstdc++-devel-11.4.1-3.el9.x86_64.rpm
8cdf0dbc08b88670e85087cf6c577e2b1e8cce4a4ad56053f4475955a4ee681c
libstdc++-docs-11.4.1-3.el9.x86_64.rpm
002c032ecb174b98babcaf22c4537899b3ccc3f168866829b52229f0734b03a7
libtsan-11.4.1-3.el9.x86_64.rpm
b58c83417e42dbe90b33026b8687f4691cbdc31714a2e92cafb060245c41d274
libubsan-11.4.1-3.el9.i686.rpm
1421821662d0e331b7a96097d00103970a8e07e6fad853bcd4e320e58151e01c
libubsan-11.4.1-3.el9.x86_64.rpm
ba9dbf19955f2f3664cc0562aa6b9a606bcdb8a9cf6f4427bef91cdb8f40a1f1
RLBA-2024:2411
e2fsprogs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for e2fsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
e2fsprogs-devel-1.46.5-5.el9.i686.rpm
0187446cc4eb6bb3561534fcc87df748af101af7c842737249b294ef916013e2
e2fsprogs-devel-1.46.5-5.el9.x86_64.rpm
ee8f8dadfaed78631142761287e91b2368419edfaa1cf8deccf57047ebff1f4b
libcom_err-devel-1.46.5-5.el9.i686.rpm
14bd56419ae4accd1697ba56961aedf3993bf2431553a7cebdc88b9ec9ced5d0
libcom_err-devel-1.46.5-5.el9.x86_64.rpm
fd52e043dd3c1c50de3c38c52b9ed407fa50fcebaa68f410bcf43742c495e83b
RLEA-2024:2424
libnvme bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnvme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libnvme-1.6-1.el9.x86_64.rpm
e4f3e844d9e977455d24daf58da0633b0f044805702cb3d7f6cf4bc68f139b66
RLBA-2024:2428
glib2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glib2-devel-2.68.4-14.el9.i686.rpm
c55094b15804237fafa83aecc36f8f718a9300dc7ebda626fcc39ec8efb14b12
glib2-devel-2.68.4-14.el9.x86_64.rpm
17c38749b910b54187c222e5db88f3cae3427d577c020caeb95bdd3142d6a48c
glib2-doc-2.68.4-14.el9.noarch.rpm
7feea8b72925736dc5f8f1a5ba3e251372af10ce1587c3582c3926c1bf8b7275
glib2-tests-2.68.4-14.el9.x86_64.rpm
3801190b855a519ee9cadd17b9a2640d1aa2e49622ea159ea94efe819069a12a
RLBA-2024:2429
rdma-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rdma-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibacm-48.0-1.el9.i686.rpm
63d954da1e64c0df0259cb4791a1b8375bd54f0f20515f61bd16d70b3186d78e
infiniband-diags-48.0-1.el9.i686.rpm
b16269c09c271de3b79d63e26bb8cd25bd8ac5d121779a1d3963660b34c64955
infiniband-diags-48.0-1.el9.x86_64.rpm
0149cc535ac9f7e486181210d42229389706349fc7de8eab2bfd05ebd5a57a12
python3-pyverbs-48.0-1.el9.x86_64.rpm
cca587ecede6121412d30bb6ff5e23706180616ba983cb5c9f0cf60f004f6e37
rdma-core-devel-48.0-1.el9.i686.rpm
835decf10fef36adf99380ef0d3530498e4f37be6037b72bb76f3735717463ee
rdma-core-devel-48.0-1.el9.x86_64.rpm
048c876d7719634fecae62d7a36399cc7b69751e3b0ee5b5c1d6cda4c99e9a4d
RLBA-2024:2427
elfutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
elfutils-debuginfod-0.190-2.el9.x86_64.rpm
e7d2586c9d72aa384fad234895d6bc18c8fa365002256847618beea363c723b7
elfutils-debuginfod-client-devel-0.190-2.el9.i686.rpm
d0c4b5ea4dbd177dbed773cd52523ace99f8322bd9cb9a71e21b8758399310d3
elfutils-debuginfod-client-devel-0.190-2.el9.x86_64.rpm
6ce71c022318fe3ba2974cf768ae522fa20fe4a662e6a8a0731ac2cd13d3e3be
elfutils-devel-0.190-2.el9.i686.rpm
e6563f871a80d2eeb5fbc04a3465c9be31645e41f67d98cb3fae1afce4492cba
elfutils-devel-0.190-2.el9.x86_64.rpm
8677c3d96d39598ad4f17e67a95183cd7b8fedba42d5f65feee257cfb483a809
elfutils-libelf-devel-0.190-2.el9.i686.rpm
aaed9969768ba945ce7bb0ebe88cce9f0c862882c825275fed9d8e8ccd23469f
elfutils-libelf-devel-0.190-2.el9.x86_64.rpm
cfd03142fa4907668d0295760235ef74ad8b9c5cd88a4be58278c9f10fe75a29
RLBA-2024:2439
libsemanage bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libsemanage-3.6-1.el9.x86_64.rpm
1d8cb078b1bb1af095eb65709e0b23fc022ec6ac0035aa13e35387856b59209c
RLBA-2024:2440
libsepol bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsepol.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libsepol-devel-3.6-1.el9.i686.rpm
48b6e2b8e7646480dab106f2a7a10ad32ea7b672ecf7d5d9328562931616f4b9
libsepol-devel-3.6-1.el9.x86_64.rpm
ff527e80a3ffc2ca8fad962653da008ef0fb7b702afa2738deab1b4372dd3815
libsepol-utils-3.6-1.el9.x86_64.rpm
3c5d988deaaa1085d982761663b710be948b2fedaeb6019ec14dd39f84a9d20b
RLBA-2024:2452
acl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for acl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libacl-devel-2.3.1-4.el9.i686.rpm
6886d15092afdfa2eb87e85db61dad3da04c64cad9f52e023bb215d66478d5fb
libacl-devel-2.3.1-4.el9.x86_64.rpm
4abe90d1bda0b88a0e9a639a57820ad6ad048c30f3cf55dd2c609262880c5637
RLSA-2024:2463
Moderate: systemd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
systemd-devel-252-32.el9_4.i686.rpm
40f8714499adb8fb06e8c36410fb17f1552358a7fdaab95f2bd0b8c8f974176d
systemd-devel-252-32.el9_4.x86_64.rpm
91e80d328f4020b39d0942dd6f39650040ea6228416c86c6c08ec2e27a549896
systemd-journal-remote-252-32.el9_4.x86_64.rpm
0c73a04132b9d3d63e98e471c84875242fcf7ca504d3886bc5850b690b6ee07a
RLBA-2024:2464
xfsprogs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xfsprogs-devel-6.3.0-1.el9.i686.rpm
ad524b979526977c1c20c9dca74d44de3f95de7aa0d2db21a972caa111a55acf
xfsprogs-devel-6.3.0-1.el9.x86_64.rpm
80dd1917b602975f9172afc44eb286501a27bd8e37c88b73e028543536b4575e
xfsprogs-xfs_scrub-6.3.0-1.el9.x86_64.rpm
c863e0efccf3b33e0bcea5108bff362dc12f9f1a21892ed26f5df6b8a0300a72
RLBA-2024:2494
firewalld bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firewalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
firewall-applet-1.3.4-1.el9.noarch.rpm
6bb702cc5d75e37d1057ece6383cd2c850cfbe2da1a8769fc6bca4ec1bfa5d5d
firewall-config-1.3.4-1.el9.noarch.rpm
ce71f1987c6b3ebf2bf867c0c50fc799e0f021a387878fb188d5b52d0540481f
RLBA-2024:2496
iptables bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iptables-devel-1.8.10-2.el9.i686.rpm
f9491c2b95683c3dd268f45f319a91e22be5317ea97ccd75eb0d665fea96a7ec
iptables-devel-1.8.10-2.el9.x86_64.rpm
96fb37209b049ccebbdf14a36fffa7f5f67a757c4a4e49c361e8937e55fc271e
iptables-nft-services-1.8.10-2.el9.noarch.rpm
fcc2ec478dc3b803e81290be3f6ea665dcd7f529d7e63a7a21f38cb255584435
RLBA-2024:2497
lvm2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lvm2-dbusd-2.03.23-2.el9.noarch.rpm
0b2cc3f57c2419929177efe6b42a565c54e76c2abf405e805d28201873518ca7
lvm2-lockd-2.03.23-2.el9.x86_64.rpm
9bad2f64771f9bd486f16bb4266721e57b0ac15e1582ee775dfd3e6bed4ca7e7
RLSA-2024:2512
Low: file security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for file.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats.
Security Fix(es):
* file: stack-based buffer over-read in file_copystr in funcs.c (CVE-2022-48554)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-file-magic-5.39-16.el9.noarch.rpm
215cf022e30326cfe1a5c9967fddd18a2226ddf7d7c2fb40b1e90d8f615efde8
RLBA-2024:2518
expat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.5.0-2.el9_4.i686.rpm
56c587f7f61a02f7e6aa4287ab2bb501446f32958a09b044cffd1a4bda6fceda
expat-devel-2.5.0-2.el9_4.x86_64.rpm
ac2835b64426a47aef2eddbd0f55b3e0b6ec238b60cfff2d1a325b238ee79ecc
RLSA-2024:2570
Moderate: gnutls security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
* gnutls: potential crash during chain building/verification (CVE-2024-28835)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gnutls-c++-3.8.3-4.el9_4.i686.rpm
38972e0001b05bbeb2d24b78b2ffcce680c5a16a28fa51ab76c807067908576a
gnutls-c++-3.8.3-4.el9_4.x86_64.rpm
d6956dfacd00ca5f8dfd681e0d183f0c0ab66d328545183b42b7281687c1b9ff
gnutls-dane-3.8.3-4.el9_4.i686.rpm
1162aa1121563f5a25c6b940e105690f341eb7122b5e50333e58bcf92e8617a5
gnutls-dane-3.8.3-4.el9_4.x86_64.rpm
b2ac545db9452572798225510df814d3790acc99fc7174d0eb68d9c59d79e437
gnutls-devel-3.8.3-4.el9_4.i686.rpm
588d88835fdac778514efc1a5e2b31d414224e1170cbe4b5e66d2983e97d6c3d
gnutls-devel-3.8.3-4.el9_4.x86_64.rpm
615c3aa1a2e05120c9dbcc6f9f1468d3e7a606f13374a95cd16a6b8956054d82
gnutls-utils-3.8.3-4.el9_4.x86_64.rpm
6d0cfb6d8ae5472e1ec2a8a265b5059c4bd7b9e98f6b02ef0e1352777b14d706
RLSA-2024:2571
Moderate: sssd security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)
Bug Fix(es):
* socket leak (JIRA:Rocky Linux-22340)
* Passkey cannot fall back to password (JIRA:Rocky Linux-28161)
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:Rocky Linux-27209)
rocky-linux-9-x86-64-appstream-rpms
sssd-idp-2.9.4-6.el9_4.x86_64.rpm
5c0feafe14d240ce0e632aef0456d25c4b9fff06ffec70b893074aef24bc8cd7
RLSA-2024:2679
Moderate: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: use-after-free in XMLReader (CVE-2024-25062)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-6.el9_4.i686.rpm
1eca5890eaa14c34da208f4b9e520945d78ea8eb2059e8bd902be66d3e2c47ab
libxml2-devel-2.9.13-6.el9_4.x86_64.rpm
0a2bf7f9d1dae671d4d30e81fad0aef9891c4d4d53a2619fd98cd6394b397cd5
RLBA-2023:6326
libstoragemgmt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libstoragemgmt-1.9.7-2.el9.i686.rpm
8805e23dae5e94fef215f2284795fe92b837509fe5c1ad85e65071907c1f5038
libstoragemgmt-1.9.7-2.el9.x86_64.rpm
e45695642aefccbd47448251350ad9e52c4a26e5fa7079475336f84b46a933df
libstoragemgmt-arcconf-plugin-1.9.7-2.el9.noarch.rpm
f7ed4701fa76d9e000ef842281589abe3c9edff5a9e2fb3e3d9f320f304ce8ab
libstoragemgmt-hpsa-plugin-1.9.7-2.el9.noarch.rpm
dcc94143a6578ebd3cd5bd1f19914be088c2ac1d41f61ff1cb76b75b41a310ed
libstoragemgmt-local-plugin-1.9.7-2.el9.noarch.rpm
0680f88fe5eb1d1752d104e0bb296d7c5c3df092b9aaed82d15d6031d6f1cc99
libstoragemgmt-megaraid-plugin-1.9.7-2.el9.noarch.rpm
e5a19d43c9933cd7ec24639163bf57b56c2e7c5ed0cfa2a278a7391cba33c825
libstoragemgmt-nfs-plugin-1.9.7-2.el9.x86_64.rpm
dd6c3cff6a8b3309f194b3de2e7bfaf8919f74e4daea911e4d696c7c11002d88
libstoragemgmt-smis-plugin-1.9.7-2.el9.noarch.rpm
a31abbd78835c0784323432e50a852c9123afcccb2ec15483ca531a3fbfeb072
libstoragemgmt-targetd-plugin-1.9.7-2.el9.noarch.rpm
a0e48390a638586f2e653065536f867ea9b2ba199b536f2d59e3271c8f25d54c
libstoragemgmt-udev-1.9.7-2.el9.x86_64.rpm
89eeb19c0887ca1bdb75cf3da6badeb680cbf43ded07f8a85c1f81392ee6a277
python3-libstoragemgmt-1.9.7-2.el9.i686.rpm
55257a9c62cb711287c3f7ee13940f14fa546c625302a76f6e041d8aff0b4d06
python3-libstoragemgmt-1.9.7-2.el9.x86_64.rpm
a2b8bb126e65cd44d4bf23f102de96373d2085e2035cb9d12deb4f7a5108056c
RLBA-2023:6381
libwebp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwebp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libwebp-1.2.0-8.el9.i686.rpm
fb5f4bbab3ce289b4d6fa2342c41826d9da4c44f0b9f0e3da1b0ee499422bd63
libwebp-1.2.0-8.el9.x86_64.rpm
2546a9c3b973cf0f33c23f9d0801d76eff889ff690338340bfd5f5c8fc11c6cd
libwebp-devel-1.2.0-8.el9.i686.rpm
0dc17b2cadc6c573bf09cbebbe052ae62f424de400eef4088674e44fb982c574
libwebp-devel-1.2.0-8.el9.x86_64.rpm
18f3a779ccb3e69d1a08cc2aaffffbc1c5982996df56dbc78b445ead194bdf69
RLEA-2023:6416
libblkio bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblkio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblkio-1.3.0-1.el9.i686.rpm
9f0d84987e77ecc1b4220bc82c156c4fac1214f9bc5c89d3629b634a590bf2a6
libblkio-1.3.0-1.el9.x86_64.rpm
409639d9cb0a17dc362d8c62a109dde5c4dac60ec8ff8551d94a3ea87319129b
RLSA-2023:6518
Moderate: flatpak security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
The following packages have been upgraded to a later upstream version: flatpak (1.12.8). (BZ#2221792)
Security Fix(es):
* flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console (CVE-2023-28100)
* flatpak: Metadata with ANSI control codes can cause misleading terminal output (CVE-2023-28101)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-1.12.8-1.el9.x86_64.rpm
480f7919802a060c42446eacf5b02bc4b793e29b8c306317b25287c835ff510e
flatpak-libs-1.12.8-1.el9.i686.rpm
9a12d94219b28d85dfcf0bcbd874fedbdaab5a25076d37a62c910bf7cc603f22
flatpak-libs-1.12.8-1.el9.x86_64.rpm
8d0e99f0580fade5e6eb7a5806f59b42c8e8cd407eb97c1b1860f4da696285c6
flatpak-selinux-1.12.8-1.el9.noarch.rpm
afaeeef88d4c5849a3ccc533a7ffd2ab98c392dbb88e4abb370b9e76ddbfe5e8
flatpak-session-helper-1.12.8-1.el9.x86_64.rpm
180ce4c11e02442957453159f17b0ed960a61d57678b6e4e0ba48315278955ce
RLBA-2023:6537
librelp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librelp-1.10.0-5.el9.i686.rpm
dabddcb362be000147aab4e214ee63a8060af485a9608503a1587e45a38d135b
librelp-1.10.0-5.el9.x86_64.rpm
1d51bb81626315669ab07610bec760d4d0e1c469da28b49a5242681185993287
RLSA-2023:6551
Moderate: yajl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for yajl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator.
Security Fix(es):
* yajl: Memory leak in yajl_tree_parse function (CVE-2023-33460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
yajl-2.1.0-22.el9.i686.rpm
86745e09d48757f2394c83aef0f0659f1a9286fb9e6597b9377968334de7912a
yajl-2.1.0-22.el9.x86_64.rpm
01f37c41e967b2c966ce4fec0de572168de96be5887ae2abd9b83b623e01e1f4
RLSA-2024:0951
Important: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.14-1.el9_3.x86_64.rpm
ef3a92748f4cb8ceb9c609b77e1c47f7d357786bfbd7be78ced97babbe06a52a
postgresql-contrib-13.14-1.el9_3.x86_64.rpm
2c296c76d9ac1238fc95ea0a5d6d138f183f726e8e098e36984a1f10e42a3bac
postgresql-plperl-13.14-1.el9_3.x86_64.rpm
07d929406b1079b272d7503ef685dcadd4b7ae77a5e321f766c3e6539c165115
postgresql-plpython3-13.14-1.el9_3.x86_64.rpm
e2934532f1475c9bfe78895eb9d8bb76258a4960d857d70493d358583748dda9
postgresql-pltcl-13.14-1.el9_3.x86_64.rpm
a121308825ed44009495411b9ce0e3597e5d017a46a5066768de9e6afd35dd17
postgresql-private-libs-13.14-1.el9_3.x86_64.rpm
084616fbd615fad54b1bf6b3092329fbe3830673f6eb11f1a011f17a828254fd
postgresql-server-13.14-1.el9_3.x86_64.rpm
932e69f7c683d4d7ebaa1e4735e025229513c3b1f29f3632f98f69bf4d451ead
postgresql-upgrade-13.14-1.el9_3.x86_64.rpm
8ff487b9c98e630140d01e75ff7e542d2fb1f9007aa75e63cd92ef4f3c280cb1
RLSA-2024:1691
Important: varnish security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-4.el9_3.1.i686.rpm
686f39e23a6338230bad0d0a86bd354fcc67d47f32a31458bc6f8d907aa37780
varnish-6.6.2-4.el9_3.1.x86_64.rpm
0c412829f752f79f0d621f0fea8567d9afc6a5a4d40d3d298080bda6a3b97234
varnish-docs-6.6.2-4.el9_3.1.x86_64.rpm
18762b709a7af6125177f3a2bb26741471c5106b7bc452063c45c6b1303201f7
RLBA-2024:1736
.NET 7.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-9.3.0.z] (Rocky Linux-31202)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.18-1.el9_3.x86_64.rpm
1d5a70ba4bf52fc51773782c79650dde9042e62b5f3cc39ed7d246f60db1db1f
aspnetcore-targeting-pack-7.0-7.0.18-1.el9_3.x86_64.rpm
fca3f282779e37c5bb618b948e70e4b07c390c6eabc4d71a58df7613055d5f32
dotnet-apphost-pack-7.0-7.0.18-1.el9_3.x86_64.rpm
ec97277a460804965aa6f7a7594787ddfc6048e8b465c08f173b33607097a77a
dotnet-hostfxr-7.0-7.0.18-1.el9_3.x86_64.rpm
131920e7ff4e122d1e79376f2fa817a3b7a2569259c79908383c1721249b5bc1
dotnet-runtime-7.0-7.0.18-1.el9_3.x86_64.rpm
a1dffa34165645e6e47ed12ff5e06fe7e83a474c02501055bef54f367ed774c5
dotnet-sdk-7.0-7.0.118-1.el9_3.x86_64.rpm
af79f766f5f22a7f3b8bb34ba0cca8c4ef2906c9e061006ecac00bb91adc622a
dotnet-targeting-pack-7.0-7.0.18-1.el9_3.x86_64.rpm
7a56553a2f344b735d4f4999d08b164f6cd3fcbc71f93fa0aa62799a16a3f231
dotnet-templates-7.0-7.0.118-1.el9_3.x86_64.rpm
2d72f9097d9cffc37e03a68e89b120479d18eb9ea098a2e3e021671d6509eaf3
RLSA-2024:1750
Important: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* A vulnerability was found in Unbound due to incorrect default permissions,
allowing any process outside the unbound group to modify the unbound runtime
configuration. The default combination of the "control-use-cert: no" option with
either explicit or implicit use of an IP address in the "control-interface"
option could allow improper access. If a process can connect over localhost to
port 8953, it can alter the configuration of unbound.service. This flaw allows
an unprivileged local process to manipulate a running instance, potentially
altering forwarders, allowing them to track all queries forwarded by the local
resolver, and, in some cases, disrupting resolving altogether.
To mitigate the vulnerability, a new file
"/etc/unbound/conf.d/remote-control.conf" has been added and included in the
main unbound configuration file, "unbound.conf". The file contains two
directives that should limit access to unbound.conf:
control-interface: "/run/unbound/control"
control-use-cert: "yes"
For details about these directives, run "man unbound.conf".
Updating to the version of unbound provided by this advisory should, in most
cases, address the vulnerability. To verify that your configuration is not
vulnerable, use the "unbound-control status | grep control" command. If the
output contains "control(ssl)" or "control(namedpipe)", your configuration is
not vulnerable. If the command output returns only "control", the configuration
is vulnerable because it does not enforce access only to the unbound group
members. To fix your configuration, add the line "include:
/etc/unbound/conf.d/remote-control.conf" to the end of the file
"/etc/unbound/unbound.conf". If you use a custom
"/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this
file. (CVE-2024-1488)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-unbound-1.16.2-3.el9_3.5.x86_64.rpm
779a676b0c3f4e86a7e9012134f6d06ea556ce5405764b5a3052726e07ca11b0
unbound-1.16.2-3.el9_3.5.x86_64.rpm
741e1b5b59468d4fb26e1e7a1097bc1f66eaea18564799b8e50b9223d4d0fcfa
unbound-libs-1.16.2-3.el9_3.5.i686.rpm
3a04e0cc8e55df00b2ed31fffb3e545407a151ba89bd24d0474143a84d6e06db
unbound-libs-1.16.2-3.el9_3.5.x86_64.rpm
1e87341a97cc10cf26d45c6e766061f51ccdd2dc65ce149821de5152948850dc
RLBA-2024:2152
poppler bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
poppler-21.01.0-19.el9.i686.rpm
69ae8b81a8323bbc93b442108276719d21d788ec782e98c0de5bf784ea4d4715
poppler-21.01.0-19.el9.x86_64.rpm
b1d2349e296261b031808815925632cfb0e6cad3e8a3515537c06db005a5693d
poppler-cpp-21.01.0-19.el9.i686.rpm
4d40458b9bf34803156c493050380412ab4be9614dabcd805fe42d6d26dda044
poppler-cpp-21.01.0-19.el9.x86_64.rpm
5b9551656aa5339d9cb958cdc8a4d9855eb948028cd3a23f7d3b5621e5d686e7
poppler-glib-21.01.0-19.el9.i686.rpm
7ba399b2b5562b3a8239cc25169589bd6dd19d21430e8b3042876109c6903031
poppler-glib-21.01.0-19.el9.x86_64.rpm
1dd2f238b654e281a2248dc462aa8de18d1134451d84ca1bd650d5e0a08fbc40
poppler-qt5-21.01.0-19.el9.i686.rpm
7dfcd8d5b574da2340804ae14134bdd0b5ab5f86f483aecb025a98f074fd4a09
poppler-qt5-21.01.0-19.el9.x86_64.rpm
6b380d09a4412f33e8197cddb913c3f042fb5ab538eeda1fb9761df17eea9bfe
poppler-utils-21.01.0-19.el9.x86_64.rpm
c0522813e70013e254b713512f69cd5aa54eb5830739c76c6123914e07f5e190
RLBA-2024:2166
xdp-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libxdp-1.4.2-1.el9.i686.rpm
7c2db5e1d6568e9a6952ccff0ac88668a3b30d5f5d175fd8422d05c5e1638290
libxdp-1.4.2-1.el9.x86_64.rpm
6258c83e49e570e6bf768a861b5ddc7a25e7de02270549cd0e3f8b8370d847ce
xdp-tools-1.4.2-1.el9.x86_64.rpm
b4e2a304c87931610b3c8a6a0a81cd72a4d95118a80b39cb9023abe1753bcd16
RLBA-2024:2200
virt-v2v bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-v2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-v2v-2.4.0-2.el9.x86_64.rpm
5616c5baa93b0b19b80d84a813e8973578df9f8d3ad7e9ea7d4281215560c8b1
virt-v2v-bash-completion-2.4.0-2.el9.noarch.rpm
a3ca56a8b66cc26fae9432fb53d735e7b6285751419fed180c642445166032ab
RLSA-2025:15011
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm
5035405750e88496d570b1e473833c924912ab5953e20a8f7f4b451b79599b23
kernel-debug-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm
26bb6cf123869849acd79c6a17a64a3a41f689f0882660816709d426f5e9ea99
kernel-devel-5.14.0-570.39.1.el9_6.x86_64.rpm
c13b722bae7022bd9ff0f5882247d1f8dba4ad3da9c769ffdddf25d7d4f8f262
kernel-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm
bb16b0bdef3c5c956d3d3b26ee092ac7ad5052f9a39869db35d0bd5c7046e2b1
kernel-doc-5.14.0-570.39.1.el9_6.noarch.rpm
8fa74d4797e2556ec070436f565738c60349f59ffdbea2446fd8a14360107dfe
perf-5.14.0-570.39.1.el9_6.x86_64.rpm
b424886fbb79dc8bcca7c836a7e22f0de99b4c09b3cfdf4a96a569b18f889c5c
python3-perf-5.14.0-570.39.1.el9_6.x86_64.rpm
f86cc8dbb7f59ec43d568fec263c9af0d68fcb803b834fc6eb162de28093caea
rtla-5.14.0-570.39.1.el9_6.x86_64.rpm
1feace139086da3d8dc2851adc4655d2f2e8e80fed7fe5dbf256b07a65809b75
rv-5.14.0-570.39.1.el9_6.x86_64.rpm
562ab49e96f50e2e68bdc6e01e763f699135c64509f47b748ad9a19186a959e8
RLBA-2024:2196
ibus bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-hangul.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-hangul-1.5.4-9.el9.x86_64.rpm
23f5a2f547e4d4f7aeed18396f28d6c6ea697cd2037aac640fbf57cd7ea909ac
RLBA-2024:2235
ostree bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ostree-2024.4-3.el9_4.i686.rpm
5888e3f4e887378d1288a4d310ff403b5d1dfa64f1f3002243ed9c10f1b7f513
ostree-2024.4-3.el9_4.x86_64.rpm
81bb522fcfb4e7e5804785d4eb2b34dc0fa8a11ca86b84865cb947be2f8e9e06
ostree-grub2-2024.4-3.el9_4.x86_64.rpm
8dab825e0d672726eb18e7a237ae3be1f6aa15ba847fc5f2607cde9087a7f680
ostree-libs-2024.4-3.el9_4.i686.rpm
5ff642599b10f2db6d8596595f316a758e02f09733cacd6cdc7a83c6ed2e82e1
ostree-libs-2024.4-3.el9_4.x86_64.rpm
c363677100f62b72d042d8c1bfa3056c4645778de96ed859e5dfc9712549c09c
RLBA-2024:2256
criu bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for criu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crit-3.19-1.el9.x86_64.rpm
3e385bc32296cbb7a420b30a2292a43c7f149671f9ef151a48d76c9a2d8a4132
criu-3.19-1.el9.x86_64.rpm
a1e64388669acc439304a309a7c7ebc7824c049d07680114a5dcb0fca8a8413d
criu-libs-3.19-1.el9.x86_64.rpm
98f9ea659eaca393facb1aebb84ff817a35921f6547767a901def4f94ebc0586
python3-criu-3.19-1.el9.x86_64.rpm
0859e177a3933c19dceecf895e9802df825fa87dc163076879fe74e3d66882ca
RLSA-2024:2264
Important: edk2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)
* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)
* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)
* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)
* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)
* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)
* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)
* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20231122-6.el9.noarch.rpm
0a445bdca139371c3ad501c3f35ea2a64e58a9b6b18c734c70e441b838408b8a
edk2-ovmf-20231122-6.el9.noarch.rpm
4c5983e3bd7aa795f76f6b36fbcb0c3b01e79b5829de3dc2cdf289e3b58d51d3
RLBA-2024:2263
mesa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mesa-dri-drivers-23.3.3-1.el9.i686.rpm
70551ab8120da29f2e7932c51b80006af2bfb2f1477cf8d0e01d0e884382b2f2
mesa-dri-drivers-23.3.3-1.el9.x86_64.rpm
ee41fcb7775fa5e0027f2c65f239010fee488cd0cf55f38df13823e12c455357
mesa-filesystem-23.3.3-1.el9.i686.rpm
2db45781f595ff0d537c52e9d4b8d8184de1766765a5e86524636afc338dafe9
mesa-filesystem-23.3.3-1.el9.x86_64.rpm
a3d22d1ca9712e8ff03e09d16c5f523f5b36226b65e82c32513e01b6426c6b58
mesa-libEGL-23.3.3-1.el9.i686.rpm
e4c1a103e79f13f80ffc233836b390c78455308d7f32498da51490e21cbf1242
mesa-libEGL-23.3.3-1.el9.x86_64.rpm
950674058ea01ebdc7af8b8be751a515da094a7486b75ff164cd10f656e76a95
mesa-libEGL-devel-23.3.3-1.el9.i686.rpm
fd2ded4f7afd4bba1e3fd3fe2d6ef3145512c6c6467ea590c2470dbc039d4327
mesa-libEGL-devel-23.3.3-1.el9.x86_64.rpm
dbcd26d625da67b640ef95698170bc0db253d2f0ff5ecea444587a5ca0b9fc7a
mesa-libgbm-23.3.3-1.el9.i686.rpm
d53b4ca964653fc4008e78314c3a8cf8359bf564cb591d62747eaebdd8252a59
mesa-libgbm-23.3.3-1.el9.x86_64.rpm
8a4751848270baf338bb5c78e06e0450c376e8771d917c10b7d12af6028fe29b
mesa-libgbm-devel-23.3.3-1.el9.i686.rpm
5833f5d7b579a65be535e6be3b9559e101664ea5f81a6dbb12c687d6f2f9191e
mesa-libgbm-devel-23.3.3-1.el9.x86_64.rpm
4c66b8ce5088481c1ec1c1ae64e8bff042e6331fb5b48e7893d1d389d0907825
mesa-libGL-23.3.3-1.el9.i686.rpm
1fd6d400349a2bcd05b98220d477eef973e930c2a540d8aa34260c6f96e0484f
mesa-libGL-23.3.3-1.el9.x86_64.rpm
bb290ee83674d5690164a12ba481914a1ae06fdbeb23a14015e32c1b270be537
mesa-libglapi-23.3.3-1.el9.i686.rpm
b7ddf0ddb03b3f556253800a5516ea24e7c5e3c0075ec5f500999aa96bc15585
mesa-libglapi-23.3.3-1.el9.x86_64.rpm
220e3a0c0893e2f38425e9618ed4195bd56cd381f9f5e3eee684c3b6b0a3c9a5
mesa-libGL-devel-23.3.3-1.el9.i686.rpm
6cf43b6c30555d388edf9b66bccdb111e6df5aa145d333c2e6635432460f4843
mesa-libGL-devel-23.3.3-1.el9.x86_64.rpm
f375fa51771ebdf838828e2744c2ed2364fdc2e9386b3e1cde5c5322bdd91ad9
mesa-libxatracker-23.3.3-1.el9.i686.rpm
687b332be509e70a4abb5f5b97300ab9515e154f4a7480ff9a96974ef3dbffb8
mesa-libxatracker-23.3.3-1.el9.x86_64.rpm
2258f5866aa200063cc099ccdf08f3b64c385afbc80251889518850b445f2312
mesa-vulkan-drivers-23.3.3-1.el9.i686.rpm
b8dfc1f8dd76dd7cf83bed567235a13d169b73aa183df70a0f42d3de712f3299
mesa-vulkan-drivers-23.3.3-1.el9.x86_64.rpm
012a0e87e5659f4aa3ebfa58e3b8462d039fbd9a62d945aa4d4a0684e3f738cd
RLBA-2024:2268
anaconda bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anaconda-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
a01134c2eee632f1356dc45482fc44739f2a5ddab051dfd9b42598a2d8840708
anaconda-core-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
f9ce79cd4a6d6ef74d6bae8887da4ed1f65b13ca87c2473883114a542c22b98b
anaconda-dracut-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
7497dc08812bd2e851ddc0edb43aff0d94a792710dd16a4c07c01e592f74e036
anaconda-gui-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
7a377708ec099150ffed020fadae6e1b33ed5505bae831d397addb69e06156f0
anaconda-install-env-deps-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
956775975f3a7a158f25efb052e10c696c932a85f9ac44e7a9ac52b539e1fa61
anaconda-install-img-deps-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
7950aa6db669165289c77f5692354b1961f1a24c38471b4358fca8514849acb8
anaconda-tui-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
12e512b6ac828ee35ffe532c494dd943c8631e69b1f5d21e255a746d6f1d3895
anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.i686.rpm
79922676230af124538bfc73d70a7417af049ba9f6333543e9656a798c1af2fb
anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm
241d097f68b31e410e8f252f39ef8b091c201d3447638b0c62ebfcd07a2c5463
RLEA-2024:2269
nbdkit enhancement and bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nbdkit-1.36.2-1.el9.0.1.x86_64.rpm
8efe4eb9fdcfd71bbdd640194bf827d4339e9e18aa8671b83814ba7367f583cf
nbdkit-bash-completion-1.36.2-1.el9.0.1.noarch.rpm
3e3a167c8a926a782f993f47a247e85aa2f0d72b7272305873a4fd00a1112890
nbdkit-basic-filters-1.36.2-1.el9.0.1.x86_64.rpm
fbf3e07693738f4b3721e8f904beb9d2718d5425c6d6bde679332dafb433b850
nbdkit-basic-plugins-1.36.2-1.el9.0.1.x86_64.rpm
bfff09c2ea33919cae617fbd9b9574ac69b51e0a0765624ba16c72270cc12eb5
nbdkit-curl-plugin-1.36.2-1.el9.0.1.x86_64.rpm
6c83c81aa25bca04e634288f465f931e49931d9e3619115fc37295bb4704bc77
nbdkit-gzip-filter-1.36.2-1.el9.0.1.x86_64.rpm
955252174e441cfffc6f9632049f24113c7d41185ded54323fe687d3a174e079
nbdkit-linuxdisk-plugin-1.36.2-1.el9.0.1.x86_64.rpm
6ce576759c79a409deefd2b8b34a560dacf00f77bd98317f992d732f00141f66
nbdkit-nbd-plugin-1.36.2-1.el9.0.1.x86_64.rpm
1aa12859a5aa2034c990a9e33bf4ddd929a04d0da54b5d1acd2b503def69006b
nbdkit-python-plugin-1.36.2-1.el9.0.1.x86_64.rpm
d54191ce6de49440fb1fe19776c34993cfa824e4354f1130c9f672ef3b569140
nbdkit-server-1.36.2-1.el9.0.1.x86_64.rpm
19511c3ef573c7a9f991192c0caa73f0c01dd4675be9fcfedee6bf3652a66ca1
nbdkit-ssh-plugin-1.36.2-1.el9.0.1.x86_64.rpm
1cca7ad14e7e6b3f5140bff14f5ac88b1da853af64c267bbefdea78a50619a7f
nbdkit-tar-filter-1.36.2-1.el9.0.1.x86_64.rpm
d7e8c3fa580fff3c7769e4269500f05fb5e67ec45906c8cee8639d09f20775af
nbdkit-tmpdisk-plugin-1.36.2-1.el9.0.1.x86_64.rpm
63278db7e4ebc24d8c670cbc9186c2215cefa26e263f46dba41c7f661371e749
nbdkit-vddk-plugin-1.36.2-1.el9.0.1.x86_64.rpm
9348ed528f21b5c3491d6e23d77fc92b05324958126e8438e82754fdbc0fd596
nbdkit-xz-filter-1.36.2-1.el9.0.1.x86_64.rpm
751ef5a0fe56bea3a5250c8a4f6b93f370e85e3352f3856805bcdf008a45ce1f
RLBA-2024:2305
graphviz bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for graphviz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
graphviz-2.44.0-26.el9.i686.rpm
c1f3c0fa460a3d65b0132ed3ec565446cd1c79cc72a0b7b59240682b09c58f8b
graphviz-2.44.0-26.el9.x86_64.rpm
31a674d1d3f543f7bd6d6da6694e3d267dbd1b04ca5e739ba0bdab6bc0411d97
graphviz-doc-2.44.0-26.el9.x86_64.rpm
fb3fe805038b2814ac3cd2e615572435b8f61962df818070c8239c60d728d7bc
graphviz-gd-2.44.0-26.el9.x86_64.rpm
9bae60111ba4eddb371becb3f0b072830f1d435ccf11d0de37e4257f26374c33
graphviz-python3-2.44.0-26.el9.x86_64.rpm
dd7b46b10807ae826f02c9d347dfae2f7f721ac7dda9a21bf24d3a13b0fd7401
graphviz-ruby-2.44.0-26.el9.x86_64.rpm
4e21e7893761f113044c77b8e2cbee7445d2ef1e80605dd0fb5fb2aa031abd38
RLSA-2024:2287
Moderate: gstreamer1-plugins-bad-free security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474)
* gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475)
* gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476)
* gstreamer-plugins-bad-free: buffer overflow vulnerability (CVE-2023-50186)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-bad-free-1.22.1-4.el9.i686.rpm
3b909543e9f75c0576f7b20e19fb13bb75b9b0eda730de0f6bbbc133bc56694f
gstreamer1-plugins-bad-free-1.22.1-4.el9.x86_64.rpm
3a4be8dde26179e64a28bbdbd7b0cb51a5e9db72aa4d8768577871dc19d54fdf
RLSA-2024:2295
Moderate: libjpeg-turbo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libjpeg-turbo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c (CVE-2021-29390)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libjpeg-turbo-2.0.90-7.el9.i686.rpm
831d5ca6678ebb931978ccf295c9ffb5a687251f3254f84ecc15d1023692ebb3
libjpeg-turbo-2.0.90-7.el9.x86_64.rpm
fa94c3ec7cc34480d79e592b373eeb54ece8a68e7b925fe2de187db274ca0cbc
libjpeg-turbo-devel-2.0.90-7.el9.i686.rpm
1ddcc7067159eb5dfb2efc746f61fd76c4796dd1f2b4da4946c818190f939987
libjpeg-turbo-devel-2.0.90-7.el9.x86_64.rpm
f966f03fa1eac090b08cba4b36f870631be6e04f5e05e5dd312c58a4be1a2360
libjpeg-turbo-utils-2.0.90-7.el9.x86_64.rpm
35bbb0413cf6457d3d6c556596808ff6a6f747f92369af5a674d19fe299aff1e
RLBA-2024:2327
PackageKit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for PackageKit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
PackageKit-1.2.6-1.el9.x86_64.rpm
e921da4bd750ba0e5c5dbf5569d805b2ff46c97e28703d7e254e9ab979e1f2b7
PackageKit-command-not-found-1.2.6-1.el9.x86_64.rpm
a21839e4c9fc9bc242da74188046aa901ea3324db288580629509ede38b9df60
PackageKit-glib-1.2.6-1.el9.i686.rpm
d387e143bd6ade53904b6c09ae02b9c17992e12c2945dabc7de24d4cc8801e44
PackageKit-glib-1.2.6-1.el9.x86_64.rpm
157e526759c77fcaf80d28e299bf65f2ce7d74cdd0dc551d0240cb5305c5b9d0
PackageKit-gstreamer-plugin-1.2.6-1.el9.x86_64.rpm
e8b8d386d22c126c28d4ab1d674f678faf6de47e98534ea5a4ee1076d559e59b
PackageKit-gtk3-module-1.2.6-1.el9.x86_64.rpm
88febda059947723449072f7a3b10116f840e7698e7662fef9d3589796c9b987
RLBA-2024:2371
dovecot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dovecot-2.3.16-11.el9.x86_64.rpm
b9ee3ee52898fd90e6a763e8089ea5f57ce6cd622f71d362534864d56ded822c
dovecot-mysql-2.3.16-11.el9.x86_64.rpm
21bc6de0fa1e27918d7da9568e94acc78007aecf14c069ddb8fe096053560c60
dovecot-pgsql-2.3.16-11.el9.x86_64.rpm
d750cf689170a04267e987bb5dc2abf579eade21d7e61e890cf4a1941449de28
dovecot-pigeonhole-2.3.16-11.el9.x86_64.rpm
6ce671e38fa7851af6af17ec1a9a5f7c9b50e8f117ef7d9a3ce4f4360744f783
RLBA-2024:2383
freeipmi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeipmi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freeipmi-1.6.14-2.el9.i686.rpm
57cfdac9ad635b81796f6b89d01670af881f50fdb9dc0a2dcb5304300b8b1dd3
freeipmi-1.6.14-2.el9.x86_64.rpm
c101b6450bc64ea9fec4311b208160a4815171ae15b02488046923ab4d6d4ff3
freeipmi-bmc-watchdog-1.6.14-2.el9.x86_64.rpm
49663005b1cb9eb0461c22379795ccf189989ffef0667f83ad6e0c14512cd40a
freeipmi-ipmidetectd-1.6.14-2.el9.x86_64.rpm
b464b8c31d7611d816eabeacd9867ea0c6cfa10587d339f7ddcfb9f99e413a0c
freeipmi-ipmiseld-1.6.14-2.el9.x86_64.rpm
2fced69e71e87e35ea2c1fed2d0357e510dbf4c0755370c1f92cb8e2b11d4674
RLEA-2024:2546
389-ds-base enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
Enhancement
* [RFE] allows plugins to log multi-factor authentication notification (JIRA:Rocky Linux-30588)
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.4.5-6.el9_4.x86_64.rpm
01d20c8f6cf05a2a3af4ae9fa3c673c2905b31b94255bfb1770de6bb48dcc3d4
389-ds-base-libs-2.4.5-6.el9_4.x86_64.rpm
c86d09ee97ccd6e6da389aaa1e9d1c599deeaaa5bedf0e365e11f2401ffe07d3
python3-lib389-2.4.5-6.el9_4.noarch.rpm
189ee6d2588cda76ccae2b209590f1c800d421c68974ad2e7b24db101a251aa9
RLSA-2024:2551
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind-dyndb-ldap, bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
* bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516)
* bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679)
* bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517)
* bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
Bug Fix(es):
* bind-dyndb-ldap: rebuilt to adapt ABI changes in bind
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-18.el9_4.1.x86_64.rpm
ff5356f634bd4693b674cb91b3ea54dbe293f920dd141b37ff311c90da0bf73c
bind-chroot-9.16.23-18.el9_4.1.x86_64.rpm
e7c7e3cdd5d09d0cd8ace6c0bb8bed0bf194f14df984c529f29fa8ebf0311abb
bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm
327b2e07d775badbe551eedd8600184d08a85faaaa26a6e6dfd40f267f0d7a6d
bind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpm
57777a5c12156b59facd216d9cb7bfa2a1f52b737446b2e6cfcf2333d86a60e1
bind-dyndb-ldap-11.9-9.el9_4.x86_64.rpm
97ce51116c0af3106d55bc8e84927acd0c5e2c808805105a4f8fccfffbca372c
bind-libs-9.16.23-18.el9_4.1.x86_64.rpm
2010fad6e6f94c7ec4b0c98d5d3467a71b1a37160237da86f65dc96e0049ce3c
bind-license-9.16.23-18.el9_4.1.noarch.rpm
95fbd7bdfe547e58cf2a1bcbe1e122cb0de6e3fd82009a2daf0baf5a10e4ba41
bind-utils-9.16.23-18.el9_4.1.x86_64.rpm
80e30b094df3dc3ac74b4c47aa3b80275d56013d879a287cdc4b2adb05c6137d
python3-bind-9.16.23-18.el9_4.1.noarch.rpm
8c5c77d619fa4721dc5d996b281cd864b9cb654ae22a2793e9186382b90a5315
RLBA-2024:2554
.NET 8.0 bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 8 to RC2 (JIRA:Rocky Linux-13785)
* Update .NET 8 to 8.0.0 GA (JIRA:Rocky Linux-15860)
* Update .NET 8.0 to SDK 8.0.101 and Runtime 8.0.1 (JIRA:Rocky Linux-19803)
* RFE: add -dbg packages to ship complete symbol files (JIRA:Rocky Linux-23070)
* Update .NET 8.0 to SDK 8.0.102 and Runtime 8.0.2 (JIRA:Rocky Linux-23804)
* Don't set a locale when running msbuild Exec on Unix (JIRA:Rocky Linux-23936)
* Update .NET 8.0 to SDK 8.0.103 and Runtime 8.0.3 [rhel-9] (JIRA:Rocky Linux-27553)
* Follow-up for Rocky Linux-22734: CheckCertificateRevocationList flag for SHA1 CAs [rhel-9.4.0.z] (JIRA:Rocky Linux-28344)
* Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-9.4.0.z] (JIRA:Rocky Linux-31208)
* Update .NET 8 to RC1 (JIRA:Rocky Linux-4073)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.4-2.el9_4.x86_64.rpm
68247549e343d71f173105da93f02a322365b7a752ded567bd1f6b5f92e37cdd
aspnetcore-runtime-dbg-8.0-8.0.4-2.el9_4.x86_64.rpm
466033e45416c4527dea15454d87e412ec159b358d2ee29de76f295129e2cad1
aspnetcore-targeting-pack-8.0-8.0.4-2.el9_4.x86_64.rpm
fcfe21fb4553e152b047e30c28433ae0a116235ca603d2ea441d3bebb71a38f2
dotnet-apphost-pack-8.0-8.0.4-2.el9_4.x86_64.rpm
2ca1684999ff0058d12cdfaead4ebfb1299737c2b3e10e8c4dae463d1347504b
dotnet-host-8.0.4-2.el9_4.x86_64.rpm
36afb34730c2955f5a131c8233ad384cde0a8f3bc94360de11b8c8d3dbdd0ddc
dotnet-hostfxr-8.0-8.0.4-2.el9_4.x86_64.rpm
34aae2c4897d3efbc5bb60a057a389c5cade14a42bfc061545644ac2763f4329
dotnet-runtime-8.0-8.0.4-2.el9_4.x86_64.rpm
8ed6977fa5c824a27b8db2ad4ed29b6caf6d7d49167611dc8a01adc205fcc72a
dotnet-runtime-dbg-8.0-8.0.4-2.el9_4.x86_64.rpm
ea2f146ff29925dab6c872ec0e689d582948171f42ec23fce320690d8e020e1e
dotnet-sdk-8.0-8.0.104-2.el9_4.x86_64.rpm
d6375955edc464c888fa3b46ab210ea793f664ba63308f8c7df8ac9e1839bb87
dotnet-sdk-dbg-8.0-8.0.104-2.el9_4.x86_64.rpm
890a4689882f9f3e08b30f1cc9b27b150e169231a66e789f04c7191abf356f47
dotnet-targeting-pack-8.0-8.0.4-2.el9_4.x86_64.rpm
cd026a47586ef76850ba43ba9b79177bc302eb25ddc0902b35488a22ff9a1fa3
dotnet-templates-8.0-8.0.104-2.el9_4.x86_64.rpm
6aa81c31e6cac852c0a38810e3902db5dee1ba3e1a0a2061519e9a219a73e276
netstandard-targeting-pack-2.1-8.0.104-2.el9_4.x86_64.rpm
ade49c2384930739bdb73e12c7d4b1d0bb3ba2edb6358dfaf6dad2a1c48be4d5
RLBA-2024:2552
.NET 6.0 bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23 (JIRA:Rocky Linux-11675)
* Update .NET 6.0 to SDK 6.0.124 and Runtime 6.0.24 (JIRA:Rocky Linux-14451)
* Update .NET 6.0 to SDK 6.0.125 and Runtime 6.0.25 (JIRA:Rocky Linux-15349)
* Update .NET 6.0 to SDK 6.0.126 and Runtime 6.0.26 (JIRA:Rocky Linux-19801)
* Update .NET 6.0 to SDK 6.0.122 and Runtime 6.0.22 (JIRA:Rocky Linux-1995)
* Update .NET 6.0 to SDK 6.0.127 and Runtime 6.0.27 (JIRA:Rocky Linux-23785)
* Update .NET 6.0 to SDK 6.0.128 and Runtime 6.0.28 [rhel-9] (JIRA:Rocky Linux-27541)
* Update .NET 6.0 to SDK 6.0.129 and Runtime 6.0.29 [rhel-9.4.0.z] (JIRA:Rocky Linux-31198)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.29-2.el9_4.x86_64.rpm
17b228de59b8c94d8cb61d0eb2a16af231b9d423a9d8f3f817bbf1a6337dd679
aspnetcore-targeting-pack-6.0-6.0.29-2.el9_4.x86_64.rpm
d96cc4608d3d116655183f76b5c08f03183b804294f084aa7f8c42c20c542e58
dotnet-apphost-pack-6.0-6.0.29-2.el9_4.x86_64.rpm
823ac89826b19fc4ff04181dd9db9fbcbb7601de8e73a113da689dd744bd90f5
dotnet-hostfxr-6.0-6.0.29-2.el9_4.x86_64.rpm
8cdf34440a40f985f08ea7b3d6729f18564424ce1a21c6746f0739401e3d0621
dotnet-runtime-6.0-6.0.29-2.el9_4.x86_64.rpm
8cb366c17c492b796207df8fc3ab00dbfe29ba67e89f189082404df817a2212a
dotnet-sdk-6.0-6.0.129-2.el9_4.x86_64.rpm
d8213ff06c9eccd32e31fba3ad25b3c666218d36e64ebe736397104ef6c85226
dotnet-targeting-pack-6.0-6.0.29-2.el9_4.x86_64.rpm
082e82734c331b7b941c08d8cb85509ae411f5511fd846b05dc132edbcb9613c
dotnet-templates-6.0-6.0.129-2.el9_4.x86_64.rpm
2226817e8fe6514b06ab59306a6366830cc452ff84a96496ed7a47d6f618d877
RLBA-2024:2556
nmstate bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es):
* Support checkpoint on rollback when using global DNS of NetworkManager (JIRA:Rocky Linux-31190)
* Include driver information in systemd network link file created by
`nmstatectl persist-nic-names` (JIRA:Rocky Linux-32330)
rocky-linux-9-x86-64-appstream-rpms
nmstate-2.2.27-2.el9_4.x86_64.rpm
6e80e3a32be70a97cbf32851413c63b014795609bf860459f191a2c8699df68f
nmstate-libs-2.2.27-2.el9_4.i686.rpm
af121d597d105f1faa8ff7bee8358330ab8e69c6afd38317c23847ceee00f2ba
nmstate-libs-2.2.27-2.el9_4.x86_64.rpm
84aa3b9b00d4d3439b67b4454b67c76606123de1633e1bdbf20f1cf0fd6d9dcd
python3-libnmstate-2.2.27-2.el9_4.x86_64.rpm
75902b35b54912e82b9b8b94998c7779cc49a45b3423e0bffebc57724bc276f6
RLBA-2024:2558
ipa bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Bug Fix(es):
* Enforce OTP for ldap bind (in some scenarios) (JIRA:Rocky Linux-23377)
* Unable to re-add broken AD trust - NT_STATUS_INVALID_PARAMETER (JIRA:Rocky Linux-29745)
* Backport latest test fixes in ipa (JIRA: Rocky Linux-30905)
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.11.0-10.el9_4.x86_64.rpm
2b1ec80adada5a3bef696e1ba376093f2dad187c976aca5c193c30956711394b
ipa-client-common-4.11.0-10.el9_4.noarch.rpm
25445b81e0565d116c83e7afddcfcdddccd3811cc91078c7a488f6830d6acfd6
ipa-client-epn-4.11.0-10.el9_4.x86_64.rpm
24c62c9037e6996b9a6ae702ae49ad390f88062cae08ebf7aa2fa150b88a7a3e
ipa-client-samba-4.11.0-10.el9_4.x86_64.rpm
4c6b98103b2c2462c73cd436321e6683026b39bb979a180b5d457c89e3a52f34
ipa-common-4.11.0-10.el9_4.noarch.rpm
452254b526e22d696f8dbb2099454e104265e443087d9afcb1a09a975e8e91c8
ipa-selinux-4.11.0-10.el9_4.noarch.rpm
ab510d78193d25a80dfffb8c59bed7175db9158e0da47c68a9ec192adf977ebf
ipa-server-4.11.0-10.el9_4.x86_64.rpm
942e676508ae99c4ff78859ccc1bc079b87a6f36d77730c02be961dac9660284
ipa-server-common-4.11.0-10.el9_4.noarch.rpm
187f9e8edc4db8c3ce605bfb848f9cf29932bf67a8fcd728a6b0d41df82703b9
ipa-server-dns-4.11.0-10.el9_4.noarch.rpm
6aa42fa1a7a59a2e16e6b522e8009b0bc481cc9581491a60532d1ce66bff9331
ipa-server-trust-ad-4.11.0-10.el9_4.x86_64.rpm
21c46669d2b1b55d4b419e027f9b3c20c121e3a9f60c6e2d7dcc85a18663b8fd
python3-ipaclient-4.11.0-10.el9_4.noarch.rpm
b2fa9e5b95c4243a3fcca3da4f1eb66015cd9dcc986c54f51f71e326ba0ae43a
python3-ipalib-4.11.0-10.el9_4.noarch.rpm
a0a4644338e142be85f05d926b4d3004fd4f5f02da4c41c4e29e88a974d914f4
python3-ipaserver-4.11.0-10.el9_4.noarch.rpm
0e8240b50fa26ebd5ec78067ebf5fad0f73f7dcbd799410d996c8f0f1360e870
RLBA-2024:2561
gnome-shell, gnome-menus, and gnome-shell-extensions bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-menus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Shell acts as a compositing manager for the desktop, and displays both
application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts.
GNOME Shell extensions allow for modifying the default GNOME Shell interface and its parts, such as window management and application launching.
Bug Fix(es):
* Qt5 custom window icons are not displayed in Activities overview or window list (JIRA:Rocky Linux-29659)
* [RFE] Group GNOME Settings, Tweaks, Extensions in the same categories J
(JIRA:Rocky Linux-32792)
* [RFE] Prevent workspaces from collapsing when more than six are present (JIRA:Rocky Linux-31885)
rocky-linux-9-x86-64-appstream-rpms
gnome-menus-3.36.0-9.el9_4.i686.rpm
bafcea2a63881ca54c0d0131dc19dca356d8dcd442c8d59d095088ac90a75f6a
gnome-menus-3.36.0-9.el9_4.x86_64.rpm
2946865956bf836fca25e34ca9a6fb51c140ab0ddbe1248137d979e849c23bdd
RLSA-2024:2560
Moderate: libvirt security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Security Fixes:
* libvirt: off-by-one error in udevListInterfacesByStatus() (CVE-2024-1441)
* libvirt: negative g_new0 length can lead to unbounded memory allocation (CVE-2024-2494)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes:
* libvirt: off-by-one error in udevListInterfacesByStatus() [rhel-9] (JIRA:Rocky Linux-25081)
* libvirt: negative g_new0 length can lead to unbounded memory allocation [rhel-9] (JIRA:Rocky Linux-29515)
rocky-linux-9-x86-64-appstream-rpms
libvirt-10.0.0-6.2.el9_4.x86_64.rpm
24682bd3c590ec592ac88f5bf4e9fa5aaa227fddea73447cca9417a952d2e358
libvirt-client-10.0.0-6.2.el9_4.x86_64.rpm
8e50fc70dd9f48c8a89bea6d9f931fcbafbb9a7f6112caad2b5ab83979fa7b07
libvirt-client-qemu-10.0.0-6.2.el9_4.x86_64.rpm
deda1aeb0f1724e372ccb1f8d4581377dbd276263e973337f600985bb5f6956e
libvirt-daemon-10.0.0-6.2.el9_4.x86_64.rpm
7ef581303c48f746f3a23841a6ad9ddfbeb23b7679f97b26c7ea4a8eeb624aee
libvirt-daemon-common-10.0.0-6.2.el9_4.x86_64.rpm
9e9a63a26d44d4269bc7063c221353b6b35ad052c09cdebf8a21bed35c62e0d0
libvirt-daemon-config-network-10.0.0-6.2.el9_4.x86_64.rpm
6cff19719fa1da685cc3af7061a01b54b59f1ddba696fc5e21332ec1692ca5b6
libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.x86_64.rpm
1211b36e98c51755f692b343796957b44bdda48d65a7849f9be74e3553fd708a
libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.x86_64.rpm
5c4ca04366599229d88526fbdd8309df71d89dd230e66db7d7bb67231e949662
libvirt-daemon-driver-network-10.0.0-6.2.el9_4.x86_64.rpm
ff040fff8f47005caa117ef3460d4cf8a75f398694f1bbe1c17336b40a5e90bf
libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.x86_64.rpm
14cfed91f58b30813654257bc6f70b1aa2d7ebbad33e6474fb3188f0429854dd
libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.x86_64.rpm
1d0dd317d07342074687a683b01075ed86f942896c40d01486d2dd8cf01e2ba3
libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.x86_64.rpm
1100759f762df7cb4552f5068757d483aab1ee6ee8a99e23e35bcfbf1d63ae03
libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.x86_64.rpm
a3dc4d127f3cfaa524dece51ab41408ed856b60063f147a52f61da4bb33330dc
libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.x86_64.rpm
eab63e60eaf661012827edc9b2a0c61d31a047289c939350833224515700fb79
libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.x86_64.rpm
d9e97b6c7751b967873be75a103096b736447900f40634314409f66c6fc58892
libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.x86_64.rpm
8726b7dd22ed77086cd77d4dae410788ae3ce23ae11f19e1ed83fa357994ebf7
libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.x86_64.rpm
35bfcd1d2a0b1fa36c1603d35fe455f73d18f4023457b250d00218f718920469
libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.x86_64.rpm
8041b91626c17f4b7fdb79707bc2ab4aff2227ad45a84dfffcdd785f4d58e2d4
libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.x86_64.rpm
0e6136fc5051512cdde299892c648d937197a31027aa158e3d16c01b54f2abf3
libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.x86_64.rpm
abeb2247b757fbe997a969e463b974938bea9af6c444e15c29891db34ec6fce7
libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.x86_64.rpm
bb9ec1fbb59d0766d0979a4928de4d80b706ac505a44fc62f2f2d1387536660e
libvirt-daemon-kvm-10.0.0-6.2.el9_4.x86_64.rpm
d380f0a9675f44ff0bc87c0d572d7884f8127e859bf74e7915836f12332ba59a
libvirt-daemon-lock-10.0.0-6.2.el9_4.x86_64.rpm
513b842c42d9eeeea58aba1da9b655260c4124430fb8f22b9e10433b86cb4796
libvirt-daemon-log-10.0.0-6.2.el9_4.x86_64.rpm
8c07dc1f28058f2c858ee94abcd40c285ffac32aee418f111ff1cf29e508f6f3
libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.x86_64.rpm
96442b82f8fb45f98c06c1217511df1f3c723c48ea9bf900d7f5a917038b5177
libvirt-daemon-proxy-10.0.0-6.2.el9_4.x86_64.rpm
b300346986c61bbc23db11ce11cedeea41fb0e6106824bbf877a9b9709415fed
libvirt-libs-10.0.0-6.2.el9_4.x86_64.rpm
2825fb4b0de31926f9b3e28cd7fafd8311e17a792946890148935b36664cdeec
libvirt-nss-10.0.0-6.2.el9_4.x86_64.rpm
f34c46c3c5272841bac7b25e293a1764419ee94acf422087860618effe511411
RLBA-2023:6386
clevis bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clevis-18-112.el9.x86_64.rpm
cd5c910ce2197de9c9eff81a6a724d97b015be3c171348275f1163be3bc8ade9
clevis-dracut-18-112.el9.x86_64.rpm
3a478838dec635284bda920cf96b257f9af567fa567bb8dc82d0775f89b169d2
clevis-luks-18-112.el9.x86_64.rpm
bb8f24292570e92fe28edeb74c7154c8469b5e126a8732413945addc435b4f40
clevis-systemd-18-112.el9.x86_64.rpm
bc29b699e8605bd21acd3a64c71fdf5f620111382aa9d94cf618141126f2f152
clevis-udisks2-18-112.el9.x86_64.rpm
1bd5159168ca4b962131126491bd7c2bfee9a06e1d3c41f607100b46c5db5543
RLBA-2023:6393
python-into-dbus-python bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-into-dbus-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-into-dbus-python-0.8.2-1.el9.noarch.rpm
c03ec819385af455e16dae173980766c1c3d9339d91caacab86c1494162e7519
RLBA-2023:6439
gcc-toolset-13 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-13.0-2.el9.x86_64.rpm
4bbaac816b4a4735c71ff1481d6505b24c0ccd1faecbf03440be75d9393ba124
gcc-toolset-13-runtime-13.0-2.el9.x86_64.rpm
3013e8e455a6592f03de4e6ad307a6c424d4dfb0bcedc7d34016412a0c56c872
RLBA-2023:6509
libcanberra bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libcanberra.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcanberra-0.30-27.el9.i686.rpm
4e2d51050e4db63f9e84b1b0f8e799aafd7ab2313b62e3c4e496e817813c863c
libcanberra-0.30-27.el9.x86_64.rpm
8aaf22d266c8a35420e78ce34099de8d326ac6c3ca57e96cf47792564132e76a
libcanberra-devel-0.30-27.el9.i686.rpm
e80fe45f382a40ed647bb7d7b3338bbc6a8e5301c12c68e9de9a6fe22d935bf4
libcanberra-devel-0.30-27.el9.x86_64.rpm
15963dfee97969f034e662bd51fe9284fc2d26ed4c8f6d64ed358ff29c984809
libcanberra-gtk2-0.30-27.el9.i686.rpm
f6a59ca5d262325afd42112faed97736f06faf489a64c7c918a0fa9c22fbf9d4
libcanberra-gtk2-0.30-27.el9.x86_64.rpm
b090278aca96bd282fd4f582441240a97e95aa7b1ac73be668725b8002b92919
libcanberra-gtk3-0.30-27.el9.i686.rpm
d8ce788bda5dff30fe3f8d51762094649ab5786f64a82d5fde55d6d32bd6f524
libcanberra-gtk3-0.30-27.el9.x86_64.rpm
a66c2e98e5cc4057416998aab54ffa4e163d3c9659c22556868c65721ebfa306
RLSA-2023:6539
Moderate: perl-CPAN security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for perl-CPAN.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The CPAN module is a tool to query, download and build perl modules from CPAN sites.
Security Fix(es):
* perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS (CVE-2023-31484)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-CPAN-2.29-3.el9.noarch.rpm
32a57e85561085a1d806deb5bf09136d04f5359ddf93a199528458cdd36858a6
RLSA-2023:7712
Important: tracker-miners security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tracker-miners.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tracker is a powerful desktop-neutral first class object database, tag/metadata database and search tool. This package contains various miners and metadata extractors for tracker.
Security Fix(es):
* tracker-miners: sandbox escape (CVE-2023-5557)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tracker-miners-3.1.2-4.el9_3.x86_64.rpm
0411d95e8c060d48de8b43b029d7be5ced601113e6647bd2d9cd7d089cfb9b1a
RLSA-2024:1139
Low: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
keylime-7.3.0-13.el9_3.x86_64.rpm
42c14697ef33763b278e9850b8ea2dc9b4affbed3cff9adf402543cbd2061b82
keylime-base-7.3.0-13.el9_3.x86_64.rpm
b5da47d8af8c84fb6c8d7ad9d5f3e92333ddcaf29afe0e75a1bf2213de4edccc
keylime-registrar-7.3.0-13.el9_3.x86_64.rpm
5c0dad0347f2a52f6b98f6770d78ab8c012e96a6b85a7bf15835dd6980f01f89
keylime-selinux-7.3.0-13.el9_3.noarch.rpm
57b1e41bdbd0e16b92c9b0f3757175bb57dab1d970cac3c683e19deded286166
keylime-tenant-7.3.0-13.el9_3.x86_64.rpm
601203778673c0de3b44af00a03c5f42af38d52dd125742578029578607189db
keylime-verifier-7.3.0-13.el9_3.x86_64.rpm
743138b708f866bb0f427c907b6e96b47dbe99a3ab6725483efa3934377e249d
python3-keylime-7.3.0-13.el9_3.x86_64.rpm
ea2650d29050d0fd1f13dd7ff8efc171816ddda337f79e1b282685a0aa2d871e
RLSA-2024:1436
Important: postgresql-jdbc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql-jdbc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database.
Security Fix(es):
* PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE (CVE-2024-1597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-jdbc-42.2.28-1.el9_3.noarch.rpm
a97cd36e3e785f022e217545ffe49816bd51f07e1f3f920e3b59f262f98c5195
RLSA-2024:1502
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
grafana-pcp is an open source Grafana plugin for PCP.
Security Fix(es):
* grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-2.el9_3.x86_64.rpm
982033ce0dd9ab3c0fb45cd612c689b67251c3775804652fe5599d01f6bf6fc7
RLSA-2025:15099
Important: pam security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* linux-pam: Linux-pam directory Traversal (CVE-2025-6020)
* linux-pam: Incomplete fix for CVE-2025-6020 (CVE-2025-8941)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pam-devel-1.5.1-26.el9_6.i686.rpm
9b252982471cc7bc5beda80927619d10d8f96d8c3f9cf719baf4e0b955060b44
pam-devel-1.5.1-26.el9_6.x86_64.rpm
a698cbae7824e23ea0d2ced2b64ce687fff5589e506499546f32a59da236b382
pam-docs-1.5.1-26.el9_6.x86_64.rpm
94418fded6d6671efbc69951d6fbf6f1f61b613b32d005ca5baad781ef8fbe86
RLBA-2024:2058
nss bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es):
* valid signatures shorter than maximum length are rejected [rhel-9.3.0.z] (JIRA:Rocky Linux-32160)
rocky-linux-9-x86-64-appstream-rpms
nspr-4.35.0-7.el9_4.i686.rpm
488873001440c569629ad050ea08a7f3d341fffd3d199bb35bb8415e3239bde8
nspr-4.35.0-7.el9_4.x86_64.rpm
bac72510acd9d28a658797730a4e075f2e86de2b70c5f54eb99ddb193794881b
nspr-devel-4.35.0-7.el9_4.i686.rpm
8d693e2f556b7e93a15de69f3807139966711bd64163dfc6619b01725958611c
nspr-devel-4.35.0-7.el9_4.x86_64.rpm
1e8420a7a937982bc1d8a2a476e0358a929b16442bb07051c2ea1e22bff9c1e6
nss-3.90.0-7.el9_4.i686.rpm
e99299a267a84809c659f93a44f92350d1472ccc43cfe8c69b196fd61279cdd4
nss-3.90.0-7.el9_4.x86_64.rpm
85de577728d21b47e726baae6ab01f0d19de52b5a2db8c9e228dafcd4c3c6ee5
nss-devel-3.90.0-7.el9_4.i686.rpm
217475a68a4fbca8ce8af92593bff9878ea15f21cd4073a83a84811fa08d066f
nss-devel-3.90.0-7.el9_4.x86_64.rpm
43cc3cd6d47a1bb5761939540ee21be0f767553e0429573d4952349661bcca62
nss-softokn-3.90.0-7.el9_4.i686.rpm
f1705aee9ec3a0fb53631789f760b19215c734e79ad7269e04dbe08cae402f6c
nss-softokn-3.90.0-7.el9_4.x86_64.rpm
5645929dee8519e877425ee52709391e526a8732c0dfc31f347d83c2bb91b28f
nss-softokn-devel-3.90.0-7.el9_4.i686.rpm
59774a654458da28ac6639ad9710e6313f1aab7632e34ed18d68fe429b13065d
nss-softokn-devel-3.90.0-7.el9_4.x86_64.rpm
389d4a4a9aeaeba7c3eb455117a0b22b34b3c0cce42aa30f4d2d4713162f35f9
nss-softokn-freebl-3.90.0-7.el9_4.i686.rpm
9c25f09d16e33b9d93b103d9662195b62b75df6f1748510b0537935e980a26b1
nss-softokn-freebl-3.90.0-7.el9_4.x86_64.rpm
406777813ebfdf93acfbb4acabe98a247f00b329337b191ca036c5367bac3b0a
nss-softokn-freebl-devel-3.90.0-7.el9_4.i686.rpm
30ae6a07505120f8788ad9d30ebdcc73ec4c941e5dd398357ddbb5e4146faf11
nss-softokn-freebl-devel-3.90.0-7.el9_4.x86_64.rpm
bff7640a5d35d90d4d56682872e72cf0d35157c141862704b56aa520f6c97930
nss-sysinit-3.90.0-7.el9_4.x86_64.rpm
825e160077ef15081bb87dc28f5efe7a8b29a579be3406f60d60e40c04428eab
nss-tools-3.90.0-7.el9_4.x86_64.rpm
e5ea98329ce0fe6782014eb622fdfa8c09ea5cbc4749aed2c2c04337e91ffe16
nss-util-3.90.0-7.el9_4.i686.rpm
48b74a1590bd8d4c05f20072dd8d863eb168918393f803d1f38de401c1544f0b
nss-util-3.90.0-7.el9_4.x86_64.rpm
e2fe12e79cd81b05c87c3c589ab71fe39e3d6b073e3ba50360c0111efb8ba0ec
nss-util-devel-3.90.0-7.el9_4.i686.rpm
f93988f229bc8b5899490357bedb6484044a692f98ae2e210f9864ef7fa5f9c9
nss-util-devel-3.90.0-7.el9_4.x86_64.rpm
32b931be252c026b3892b276ee8ba0a38c07a41f30ef14bb2db84c6ff549ab72
RLSA-2025:15608
Important: python3.12-cryptography security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override (CVE-2024-26130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-cryptography-41.0.7-2.el9_6.1.x86_64.rpm
1745dcf7b0f08dfd245e81cfb30a3047c9d2bd5c59351a4afa2ab767529e6af2
RLSA-2024:1940
Low: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.10.0.
Security Fix(es):
* Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-115.10.0-2.el9_3.x86_64.rpm
c472debc16f3129fc5bd0269674052ca56688c27f9958449d8a5ba2b4765642b
RLSA-2025:15661
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097)
* kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
* kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm
263f7eaa1d7df363f758812328d7bc665d898e2116f8f130c64e5a1cba6eac24
kernel-debug-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm
ff854c952b867f64cc8f13be5b5c415792a35da6b982de52ca2c87b0c54076eb
kernel-devel-5.14.0-570.42.2.el9_6.x86_64.rpm
a2cbcd56e375c5426aeaafb86ee7022d3838f22d246568992d91ea0393e7c56f
kernel-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm
b9925ff1c671f7aac83856355b1b776a192da8cc1db50307c8546a193a5bba1f
perf-5.14.0-570.42.2.el9_6.x86_64.rpm
01ad4a8d99d37c4de6c9275bb085e6136f7157ba5cd89c6fdb972ef49e8ee2a1
python3-perf-5.14.0-570.42.2.el9_6.x86_64.rpm
ddf126230c7916950bb255fd8215fd0506dfffdf01c0ed5369035b40ab09d55e
rtla-5.14.0-570.42.2.el9_6.x86_64.rpm
e249e64e83491a47f0e18c8bca192668e8d064801cbb40c456a751dee9c5195e
rv-5.14.0-570.42.2.el9_6.x86_64.rpm
01eeff3e454af36427c9e7d83533d717931bdccbf41a219722ab914bfc4a2cb7
RLSA-2024:1908
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.10.0 ESR.
Security Fix(es):
* GetBoundName in the JIT returned the wrong object (CVE-2024-3852)
* Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854)
* Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857)
* Permission prompt input delay could expire when not in focus (CVE-2024-2609)
* Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859)
* Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861)
* Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-115.10.0-1.el9_3.x86_64.rpm
b0cb77b4c408cd1fc3329faa92daa264b69b3c411a842c802bc98334c58075de
firefox-x11-115.10.0-1.el9_3.x86_64.rpm
d2fa8ddecfefdaa9ffee1fdf3095ac43e14d567aa0fe9190ebd5fa331c7f5bbb
RLBA-2024:2087
container-selinux bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The container-selinux package provides SELinux policies for container runtimes.
Bug Fix(es):
* container_init_t does not possess ptrace process context (JIRA:Rocky Linux-28925)
rocky-linux-9-x86-64-appstream-rpms
container-selinux-2.229.0-1.el9.noarch.rpm
23fcdc1a28ba41e39c0e86c95de99fdf055e29b89c9470f215d43e3b7aac86a1
RLBA-2024:2124
crun bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crun-1.14.3-1.el9.x86_64.rpm
ecd5b6920a01bb91750e93345e50933f007bbe6a79460679fd7e1217e7a663e0
RLSA-2024:2135
Moderate: qemu-kvm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019)
* QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255)
* QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088)
* QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683)
* QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-8.2.0-11.el9_4.x86_64.rpm
e4dc18ff42db1045a8546e0408eef79a6bb9c8f7883e42fe0df66a1b4e99d344
qemu-img-8.2.0-11.el9_4.x86_64.rpm
a59485d9bb1d91db6adae2b12bcf1e61509d252e0cd54c2d24865d6942753476
qemu-kvm-8.2.0-11.el9_4.x86_64.rpm
a575b25366c4792b905f9be6a00bf659592be6bdf5020a1e0c929130f3243e0a
qemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm
8a53ef8ad8bfb49c5c5fe86fbd2afca67ecbd9dacae8f390a31f0d29efbeffcd
qemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpm
0306c0985da977432371ba36d84dc81e90c0486c5a486b9262a5534b7ce5484c
qemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpm
5b5135158b5d413b8605fa9d5670d5d7d1559067c5680d1c6e24fe6668394fc2
qemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpm
9f29cda87f94aecd3a4373ea6e253319b5236e39ddb7b357b9586115f8ab3ef2
qemu-kvm-common-8.2.0-11.el9_4.x86_64.rpm
583b6783e6da3370bf949d0d029cf5c2616747ebb346e52d8c1cbab07899698b
qemu-kvm-core-8.2.0-11.el9_4.x86_64.rpm
d1e50b8f614e218ae0224c5478256c696b2dd7a207a620d96798f2e4165b9942
qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm
7e66b489d170a88cf39abb588421ab53fb673176a3fce84c3fefc03e1fc1e2c1
qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpm
3750ad7813b7500fedebcfc19a2df8faa2c5e2337470ddac992d1e045bd46d55
qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpm
f5e41cf525b801a8727a5732435eaa02db6ff98da4ed34d7d87a2fab8c07fb7c
qemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm
dbf5ca64ac195bc9eeed55783f49ba9564dcd6bdbe4665fcabcd909fc2e5983e
qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpm
8661f7808d105e3cd65e0a7be7766f1846f0e589a87fe0b42ea9e4b6e658decf
qemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpm
f36749ba070619a7889ff57a7957d25dc00e3816360c8dc0407c9a0da42e7d34
qemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpm
65679a6ead56003d88dcdd0ba67f35e37192ae732097049898eabeb63a489b03
qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpm
1a06ba68a27ed21324a671967df9cae61d8c03b03626e9b36e14cfef6b109bc3
qemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpm
4def2825ea394653b252fdf7a206b4cc347d94a0ebdf49e454f05b55af9ea2f3
qemu-pr-helper-8.2.0-11.el9_4.x86_64.rpm
c955410a50930069d51291a17b11e0d125087f8475b183c65b41cf03c15d7210
RLBA-2024:2140
netavark bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
netavark-1.10.3-1.el9.x86_64.rpm
3930b7b71f2714b01f80f03c8c8193cbe7fc8241a8a6a70fe59d9409fd875642
RLBA-2024:2150
python-virt-firmware bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-virt-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-virt-firmware-24.2-1.el9.noarch.rpm
7289c515d4b9d5ff4310d3393da999961f672ad405eb739a077e8a9e26c82ebd
uki-direct-24.2-1.el9.noarch.rpm
02a2b3a5c2ab365b89df826f49b77c431d8612ec2f46f15338bd74aa8b98556d
RLBA-2024:2155
python-drgn bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-drgn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
drgn-0.0.24-2.el9.x86_64.rpm
e9098de326fb4bb31f5507ea8755985bc486d3dabbbe37687bc59bef0368839b
RLBA-2024:2168
libva bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libva.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libva-2.20.0-1.el9.i686.rpm
5119c02902a717ab17197436503f20164a622c088adc5356630b515534da4384
libva-2.20.0-1.el9.x86_64.rpm
a2014d21610d80b058a9273014b178be75097fe3a289bde8fbdf85b312187179
libva-devel-2.20.0-1.el9.i686.rpm
8f99f2a0bedb273947ae4e30b5e760c753892e9e0ef6ed2c58c696e6d3a40367
libva-devel-2.20.0-1.el9.x86_64.rpm
8acc7fce3826ff25a7c38adead37c7de899a17c95e4e886fa61aa8dafdd463e9
RLBA-2024:2189
systemtap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
systemtap-5.0-4.el9.x86_64.rpm
e1d976d2fdf38cd9026e70ced91497cfe3b36e84fabc5b23a6ea8050bccf089e
systemtap-client-5.0-4.el9.x86_64.rpm
a510df8e414922f023cc6e87fade7dd7a365f76ca9a9a31a27ec42974e9b0f58
systemtap-devel-5.0-4.el9.i686.rpm
639cf682a932ef3134681d9a9789b5f60975dbecf8fd7934003aafe8b7e12480
systemtap-devel-5.0-4.el9.x86_64.rpm
035e13552d7377f9148c49ed373e725ab7886f651695e0e757359ecaa8eae8b1
systemtap-exporter-5.0-4.el9.x86_64.rpm
35ed3505793e0783ba068e44b8606a556d9d972fc66f675d3c24a7aaee27fc67
systemtap-initscript-5.0-4.el9.x86_64.rpm
8c281ad469c9dd3dcffd5ba019f2d93632b499f5ef0c7db888cf8126d82e7b88
systemtap-runtime-5.0-4.el9.x86_64.rpm
956ed46a0bf0361f8d05db1c791acd777daeb919600ca559dac161fe4d96b7ae
systemtap-runtime-java-5.0-4.el9.x86_64.rpm
1fe0ad7a4c2cd90478910e55d042de0143d3fd3d6eb360fac85c62bb1bf757f4
systemtap-runtime-python3-5.0-4.el9.x86_64.rpm
e77e4ddc6451f146c3f0efa74c21947a9358d1c61ce4910f3f99e9592139e3be
systemtap-runtime-virtguest-5.0-4.el9.x86_64.rpm
4a4699a4f3c2d4c5067bfb08f5f5cef5c0de1eacecc72827c6965be0e83e8ff0
systemtap-runtime-virthost-5.0-4.el9.x86_64.rpm
7fb89e1f9a6ad7f283bf45ed7d07cc679f0e872ee7f6ed06f75eac06f9f9bcc3
systemtap-sdt-devel-5.0-4.el9.i686.rpm
82f7db579a88973c8085b54b82c5136d86ae7bae45abec22fc979f93ad5cafde
systemtap-sdt-devel-5.0-4.el9.x86_64.rpm
039f0303924727ed2daeda9b49ad94aee9a6d249b32555d06303dbadde77991b
systemtap-server-5.0-4.el9.x86_64.rpm
ea7ee884657511f3bb06ba7c6c93cec3f2b23799eef31e845feb1b7ad9af2cba
RLBA-2024:2194
lorax bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lorax-34.9.25-1.el9.x86_64.rpm
b7e7b9690f84d43390b2ece6edbea6593968167be9e2d74c5f0bc75298ff9e62
lorax-docs-34.9.25-1.el9.x86_64.rpm
5648279159c5c2acc11eaa41c9a15049a2b03c94e466eccff35d46962ec3d342
lorax-lmc-novirt-34.9.25-1.el9.x86_64.rpm
1e80c13b3b6935e921fbbd69c33532edd5f9844c072f404304ca37527e05924d
lorax-lmc-virt-34.9.25-1.el9.x86_64.rpm
49a9baabcde364871ecd77f0aea76e6acf962b684bdbaf06f8bd18a149ae7f23
lorax-templates-generic-34.9.25-1.el9.x86_64.rpm
2665b0d5ba4a4182f18d10d77fa96f39930bb8a27271a2ad2207e018a69ed4e8
RLBA-2024:2195
checkpolicy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for checkpolicy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
checkpolicy-3.6-1.el9.x86_64.rpm
79477f5854e481a8f5da7f040585833de443558d65d1945d2db96e82cfd29fc2
RLBA-2024:2192
mstflint bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mstflint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mstflint-4.25.0-1.el9.x86_64.rpm
4d27e49c0a97fe90faa63b021b2061f4d8bd06d59b17fcc11cca6363fd8404ec
RLBA-2024:2224
cmake bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cmake.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cmake-3.26.5-2.el9.x86_64.rpm
ba07770c6a3b01bf5b38cf3840a4b7e421f0707a8209a704791001624dd6230a
cmake-data-3.26.5-2.el9.noarch.rpm
0891cd72c726424f908ad44a60f30905af559b9a54c9a89c158970fba2f22278
cmake-doc-3.26.5-2.el9.noarch.rpm
62372082180fd51232c7236289e70da07d2f54fdd18a981a1f0fa1de6eb8611a
cmake-filesystem-3.26.5-2.el9.i686.rpm
9fa2f9ff5fa71cdfa03a34248a7b18288d91293b59be2df8eebad65e19e2abf1
cmake-filesystem-3.26.5-2.el9.x86_64.rpm
7685f02b8265fda0ad7cc3f5f939f35fa373c8326b6fb285636a0a309ccbea7b
cmake-gui-3.26.5-2.el9.x86_64.rpm
5258abad357e5fc560b69ca97ca19da35dfe0c75e9cfc573afd01ca5c90825c3
cmake-rpm-macros-3.26.5-2.el9.noarch.rpm
b0733f65960914c27083e9eaeb3bd7ab30eda6ac62419573362300fcb7ad2500
RLEA-2024:2221
gcc-toolset-13-annobin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-annobin-annocheck-12.32-2.el9.x86_64.rpm
b2119bdd933b9d0eb5880209e7622cd42add0301f26970770e8d4d7353c63dc0
gcc-toolset-13-annobin-docs-12.32-2.el9.noarch.rpm
3e518b37b2c7bc956973266cf35ba42c010207a1b5aafbddc2ad70b3c25a19ad
gcc-toolset-13-annobin-plugin-gcc-12.32-2.el9.x86_64.rpm
4057364ea5e6c91645dc618da1a44615f4993e23fc2d8dd80e0bc627ce1ff34a
RLBA-2024:2220
ipa-healthcheck bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa-healthcheck.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-healthcheck-0.16-3.el9.noarch.rpm
f9f342d92518b6473ceed9322542feceac762abd8575a1a301ad71ae74967f00
ipa-healthcheck-core-0.16-3.el9.noarch.rpm
0a04ad57dfda6d0a7193a6a730e310fa4f96211e33bb125d747b3b34adad4f6c
RLBA-2024:2227
rhel-system-roles bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rhel-system-roles-1.23.0-2.21.el9.noarch.rpm
6b94e2bc5347199adc46239fb4f406922209efdb7849231fb5a6ed37eded7f6d
RLBA-2024:2240
git bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
git-2.43.0-1.el9.x86_64.rpm
82047539b88e6d2a28111f0f0c7c1c98878358ff237259cc95437071ff8837df
git-all-2.43.0-1.el9.noarch.rpm
6264b4bc6a668794aad97a12f08d779362b07837ba7c295d8d249f65e2585ddb
git-core-2.43.0-1.el9.x86_64.rpm
426f2f968935392ebc5bd58dbf3bed8aeae970dd53853a5cae8efed44d5af850
git-core-doc-2.43.0-1.el9.noarch.rpm
11cf184fd9c6688e2527aec0ec02bdb9a43299dd622ed94ccb692ee7ee0ef4f0
git-credential-libsecret-2.43.0-1.el9.x86_64.rpm
fb67c4b3a74d18473885ab94e8a603eabd129470d8f35c7f134da0fd1ba86ffa
git-daemon-2.43.0-1.el9.x86_64.rpm
3f18dcb59117f915321553ebebb38ddd9fc513433923bbcba06eceb27c37306b
git-email-2.43.0-1.el9.noarch.rpm
4469ab8fa2b21ba709c59403db2fe454b8c087f27556c7e4fdc6edf755ea6c13
git-gui-2.43.0-1.el9.noarch.rpm
c16a96386551279568ac2c635f67531657219d15d5a17a37f1c81eb7f1bd2cd5
git-instaweb-2.43.0-1.el9.noarch.rpm
3a830fe0c6b179d0c8405ff2f91a395ddbefd8a8aaf9e2a755e9861da28f1992
gitk-2.43.0-1.el9.noarch.rpm
702a75a03b0244841eea17cf1738cc46143958d6b50f2ee419c1d734b248ef03
git-subtree-2.43.0-1.el9.x86_64.rpm
20752fbcd8a66c811c750a4a333cea38af12a71de50e9abe139faa8fb71e9b26
git-svn-2.43.0-1.el9.noarch.rpm
e294967b42e02f2978b07ee85dc0ddf9d1fb81c3c687f3d15b53f8aca792f927
gitweb-2.43.0-1.el9.noarch.rpm
75e1d568039679493d68d6418f1a9194c8c6e88acc06f550a76a16c4e8d1ed59
perl-Git-2.43.0-1.el9.noarch.rpm
8f6b026ced005bff7287f283fabbd051424d06457cf51ccdabb7b41ccc3d97a4
perl-Git-SVN-2.43.0-1.el9.noarch.rpm
76a9f34a9cf7b44e127bc04320f4667804bdae5097904bfb13f705f0fe171c90
RLBA-2024:2251
resteasy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for resteasy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-resteasy-client-3.0.26-19.el9.noarch.rpm
049591647ac2b508ee051042ff5075efa33ea5218eb46986e31d7d1fb1b7d09b
pki-resteasy-core-3.0.26-19.el9.noarch.rpm
33d8f3eb91874c11dbbff9329811009b2242375bd3fb694856a6df7988bb5fc0
pki-resteasy-jackson2-provider-3.0.26-19.el9.noarch.rpm
ca163d7c77cd13b13aa2e3a56941d12dacedf8a29a127e118417ba833bcf1bfd
pki-resteasy-servlet-initializer-3.0.26-19.el9.noarch.rpm
dab9c5e990dcf685fb73067f4db0e001f235f36293f3c7da887274920dac0a39
RLBA-2024:2248
gtk4 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk4.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk4-4.12.3-2.el9.i686.rpm
9d17f5bb1d23794cc9cb8f16958128d753f1dfb07221daf18fc19a97500766fe
gtk4-4.12.3-2.el9.x86_64.rpm
346234a863d3f4161192266c4234c260f0e486b9d47b22c2104a24bb545601b8
gtk4-devel-4.12.3-2.el9.i686.rpm
76606ea83ed1fc0559ca605556675392d0bd709dd3e46dac3f3f8b7c333281ac
gtk4-devel-4.12.3-2.el9.x86_64.rpm
e78120420d5d42352b4c5d7ba6d0f9d8d6be464979a0dac8550f01082bfc32c4
RLBA-2024:2249
debugedit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for debugedit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
debugedit-5.0-5.el9.x86_64.rpm
68f6898f82bdbc760d63ba94fd732e6eba7e9f830c17a63ddb1daf7ef66d4aa3
RLBA-2024:2250
pki-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-pki-acme-11.5.0-1.el9.noarch.rpm
a003500fcea4d6ecd42f11d187b2798e8f405c2c25946642bef395dc1bf8cf13
idm-pki-base-11.5.0-1.el9.noarch.rpm
32f22a1326b1b36b6e562ded29d7212bdca19c58763bc22d22ae84c61c73ede9
idm-pki-ca-11.5.0-1.el9.noarch.rpm
2353075e0b25922fa9d63ecb833358a97058b9277e1000e0f1f7a4642a40bda0
idm-pki-est-11.5.0-1.el9.noarch.rpm
83134bb398c38cf98ee77ffada8961b20bb67e7275678ba92d59986a279d4054
idm-pki-java-11.5.0-1.el9.noarch.rpm
179d8521150ae769194f3c24dd95f1dde5cbdd10a15bcc08790666a093bbb5ee
idm-pki-kra-11.5.0-1.el9.noarch.rpm
a6010777eac229e33cb0e35ea134001b64268fc6d3a7a855a6bc1a7aa35d621b
idm-pki-server-11.5.0-1.el9.noarch.rpm
899cd816d3123cd15a36ddf345669d88f01c104baffd373786de58a9e66a6c3a
idm-pki-tools-11.5.0-1.el9.x86_64.rpm
17354e85a678beac1f7dd28f440db40f1130f551ab1a3fd9f50ea73a4f0d793c
python3-idm-pki-11.5.0-1.el9.noarch.rpm
49ab99c6b596b5393d39fecb1f322adc4423e6b24b5719e4573293260926b8ff
RLBA-2024:2265
NetworkManager-libreswan bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-libreswan-1.2.18-2.el9.0.1.x86_64.rpm
e8dcf0b2276c1ff2b83d5e7f4074bab0525e4c4b1f5e813166dbbd50cc5c32b8
NetworkManager-libreswan-gnome-1.2.18-2.el9.0.1.x86_64.rpm
b0289fa65b10285dbad854b39f32db98de5562e330e637b27f3cd107f9093c68
RLBA-2024:2271
conmon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conmon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
conmon-2.1.10-1.el9.x86_64.rpm
391c45ff77cf158131d76e88be05ef9751baaacf0b44e3ff97444fd9688d9940
RLBA-2024:2267
passt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for passt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
passt-0^20231204.gb86afe3-1.el9.x86_64.rpm
301c1eff80a20e2f9fcf5684c1a9d0026335b419cf9e0b959374d8ea4b974351
passt-selinux-0^20231204.gb86afe3-1.el9.noarch.rpm
2d09c644801dbaa4454086546ac7e3b95833bbe5034b285d3232fb41a80c2013
RLBA-2024:2281
virtio-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtio-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virtio-win-1.9.38-0.el9_4.noarch.rpm
761a7ff242e6278a206a38af0c56e3eb08ce696f5183545ba43bdd58d86e9444
RLSA-2024:2278
Moderate: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.57-8.el9.x86_64.rpm
47249e8b9931ce64829761a7f1ad02fef0af9b838b4ed3185cffee13ffe5ef1a
httpd-core-2.4.57-8.el9.x86_64.rpm
28ca7e85f34005fbdbeb8e683008aa351cc932eea3f8fcac893415240bb8cc2f
httpd-devel-2.4.57-8.el9.x86_64.rpm
063801a4b727db25053215e7abb72d6fab79293730e7df0b57b0612bc65381f9
httpd-filesystem-2.4.57-8.el9.noarch.rpm
a6954de6f5771746b49faaeca1a3856cf8cbd4cde336e25fbdfee5d8af47adc8
httpd-manual-2.4.57-8.el9.noarch.rpm
0f3a9604599a1ab41e26bba6af81625b98ee2604b72fc6b7de7c684626def9fe
httpd-tools-2.4.57-8.el9.x86_64.rpm
35f81828a42e0e53aeb1d7516d7b041a958cc25a12b54a40142ba4ed81c8caa7
mod_ldap-2.4.57-8.el9.x86_64.rpm
f1a0c1896048a18c1cfd20078f6db8dae2d307594b0f6a43feb18bc12536f7ad
mod_lua-2.4.57-8.el9.x86_64.rpm
3238f1f065de01959add1322018d152cac7f3aca914c68d566bcf881d5bf6802
mod_proxy_html-2.4.57-8.el9.x86_64.rpm
89799c4a426f372db5215fe572d380c1ddb40001db341702abd723fff6309c4f
mod_session-2.4.57-8.el9.x86_64.rpm
78d29186f06a51d2da3e026c6269587cc1847e03798573abf9cd513f6bc316cb
mod_ssl-2.4.57-8.el9.x86_64.rpm
30ed46404c44402cca3fc893657c826e31f6c9f8695fd6bc48229e545944ebfc
RLBA-2024:2284
pipewire bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pipewire.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pipewire-1.0.1-1.el9.i686.rpm
a2a9dc4529315daf00570585b510b032b870125b462894f0a20d6c67d55b897b
pipewire-1.0.1-1.el9.x86_64.rpm
e9cb9ca8d23a09e15963f7c02e7899a63ad1a2bde0b15b0c0d0e6aafc3f97a9f
pipewire-alsa-1.0.1-1.el9.i686.rpm
3daae36d688d4e4e0ff0185fb28e29945907f0c0f23f95d0d1028ae2e64c3cca
pipewire-alsa-1.0.1-1.el9.x86_64.rpm
af56603a4c3601a6762365fbf3b461f66bc1e9f28afcc7a7111e75e77fbc1b22
pipewire-devel-1.0.1-1.el9.i686.rpm
7a3de72a09e96aea9b5a26e2b2ef8961afca06e9f99aec01231b2eef6cf48828
pipewire-devel-1.0.1-1.el9.x86_64.rpm
abcc4ac67914514464331101c84a18bc03846a26948e03a15bc31946e0d2f23f
pipewire-gstreamer-1.0.1-1.el9.i686.rpm
168746a7009ffb4a63c7f099ce096f978b42a4f3cb67562c831507d59899af7b
pipewire-gstreamer-1.0.1-1.el9.x86_64.rpm
7366d6d5be108ea4988c033ca2929bf07188bcc6cd83b048fd15b586443c5cf7
pipewire-jack-audio-connection-kit-1.0.1-1.el9.i686.rpm
cb4623ee3555e35b0b5db0dc9046d46289b73e5a9cb88fc0049abcf5f4568a8b
pipewire-jack-audio-connection-kit-1.0.1-1.el9.x86_64.rpm
ecbc4b29eae3d7542890c7f6f5d50c8ce63f081571d69ff6d2fbc92aa6f21424
pipewire-jack-audio-connection-kit-devel-1.0.1-1.el9.i686.rpm
a021974ccb72b432e0cb9ab8b6d0282c4745378b36e29f8ff03b1f8fbb29551c
pipewire-jack-audio-connection-kit-devel-1.0.1-1.el9.x86_64.rpm
3bc848ff07d3ff9a4a1fbbc7c191d02a97c917231eec17a5ece25df1556aaf3a
pipewire-jack-audio-connection-kit-libs-1.0.1-1.el9.i686.rpm
20cf1069fa5a11381a8089dd7fccdd403cc20aa6e09baae01701ed8cd59ce84d
pipewire-jack-audio-connection-kit-libs-1.0.1-1.el9.x86_64.rpm
c9114c3bf386afa9586983980af3f9b0fdfad9728bf858e85c51e6e6acca63c1
pipewire-libs-1.0.1-1.el9.i686.rpm
38ef3a34b102fc89638e116bdc06b4a280cd89e384fc94b06c482f2409e5875e
pipewire-libs-1.0.1-1.el9.x86_64.rpm
fb799685b89502a91ae07345900eaf582bc1b4e0a314724383711a448d81dbec
pipewire-module-x11-1.0.1-1.el9.x86_64.rpm
e1f42e830c5efa8205975e4bb7c86e7da1e3c96b903946f14cd3c57e42495529
pipewire-pulseaudio-1.0.1-1.el9.x86_64.rpm
4622ed4cdfce03a3cb942aa1f9d5f6cb45aa66a4c9c6873678cf54d2f0c8d85f
pipewire-utils-1.0.1-1.el9.x86_64.rpm
210405632604fc422130e376df06618c13c982a12509d55f3860912c99215587
RLBA-2024:2283
rear bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rear-2.6-24.el9.x86_64.rpm
d735832fce28f2098f97dc2e34ec5a05007c6a5447a870304162056a4dc9187b
RLBA-2024:2291
boom-boot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
boom-boot-1.6.0-2.el9.noarch.rpm
e73ec96e5d76b93cf0885b9dbc61699fc8b7ecdf75820f2bca5dc3fa290c00fa
boom-boot-conf-1.6.0-2.el9.noarch.rpm
1429315550655a70db2a373d112cbabb25139dd6846a4b78775d8afd947479dc
python3-boom-1.6.0-2.el9.noarch.rpm
8aba695c6682e7460ce0b18ad9bc2ef0ecc9f7ffcea61f382d74d1e5b6b76666
RLSA-2024:2302
Moderate: gstreamer1-plugins-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.
Security Fix(es):
* gstreamer-plugins-base: heap overwrite in subtitle parsing (CVE-2023-37328)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm
99a46557e593871452defd764667b95d9b99d32b181b001d4490b90b7eabb630
gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm
624ad80a70d26242b95f2856fbc93a4aae0803ee1e22d782639fed6f5be102e0
gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm
219951a3e647657822208d08f5cce68e0365193f2e5f77f78dc1943056780703
gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm
af8a6b6d642654ac3a04df92bd695762112eff941f20626e9ed95348098a16e6
gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm
6c1741c4cbdfab62008c3366d01ba2866a7cf3c32a7ce4fae03d419d39be2c18
RLBA-2024:2306
tomcat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.62-39.el9.noarch.rpm
fc35da66f8fb2c300398d62efe850f2c6b9b4e56125cadb0929fd6ece99fffc5
tomcat-admin-webapps-9.0.62-39.el9.noarch.rpm
7474e0395b579ba93a49bd7803ce04eed2392058b689dc6f92eba6dfd123bbad
tomcat-docs-webapp-9.0.62-39.el9.noarch.rpm
6f61f06bf3d3961ab8ec7dacd936f71499e1d63eae6b1cb9129501371e48c8a3
tomcat-el-3.0-api-9.0.62-39.el9.noarch.rpm
e7d2c9064855fbfef013ea8ee6dc220f2fc16792b3e0f52aa5cb852119a135aa
tomcat-jsp-2.3-api-9.0.62-39.el9.noarch.rpm
9e382c3942d6994c2352d0a69e0ace5a830fec7cc12f46f4e85beb3262b5c385
tomcat-lib-9.0.62-39.el9.noarch.rpm
76bc1a62d9272fb3581be15f61c22ebd352865c9d2d637d3f2b1c67888d5b0dc
tomcat-servlet-4.0-api-9.0.62-39.el9.noarch.rpm
b1e8cb4bc321aa1c9f588dc3f129dd1bbf8eae89a335fa990229da82c68d886f
tomcat-webapps-9.0.62-39.el9.noarch.rpm
b0c91faa2a879e50e85bc8d0b7be95d40a14b37a4a8a81761549c608be90708d
RLBA-2024:2312
python3.12-lxml bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-lxml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-lxml-4.9.3-2.el9.x86_64.rpm
cf9119305173378f3614be1da24d6444dd4d646f9d6cb44d64b9dc218631c763
RLBA-2024:2314
python3.12-cffi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-cffi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-cffi-1.16.0-2.el9.x86_64.rpm
e73ae03307079cc9fa9dc61b7353382f41d937a79cff4855744cc2d8d5ece8b8
RLBA-2024:2311
python3.12-mod_wsgi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-mod_wsgi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-mod_wsgi-4.9.4-2.el9.x86_64.rpm
63b72bf977d8925ccd3c671f32e76a89e6a7efa71009729df551b20b26a4e088
RLBA-2024:2325
python3.12-pycparser bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-pycparser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-pycparser-2.20-2.el9.noarch.rpm
9f389ebe3db0f0e73044b8f7be99d3bf74b14e0ea2b9a194d747468a864cbce9
RLBA-2024:2326
autoconf bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for autoconf-latest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
autoconf271-2.71-8.el9.noarch.rpm
bdf580e92896fdffd985af615c90f927ef21e51dad75c2971bf5b4c6a0e5f52c
autoconf-latest-2.71-8.el9.noarch.rpm
0c53fbc8973aaa6779e784a39c1ea82cd3e01ea8e552c6075c9c9e873084134a
RLBA-2024:2329
mingw-qemu-ga-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw-qemu-ga-win-107.0.1-1.el9.noarch.rpm
8c300ee1743ef5ce5d24cf7c0d5e94cc2ab57ea916a1a00b72f3e10384ef373c
RLSA-2024:2337
Moderate: python3.11-cryptography security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.
Security Fix(es):
* python-cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-cryptography-37.0.2-6.el9.x86_64.rpm
a01713ce78376c67697be7db182e4f36b733fc67af543e43f4c9b8bc25031cb6
RLBA-2024:2335
wireguard-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireguard-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wireguard-tools-1.0.20210914-3.el9.x86_64.rpm
9b2010e03fc76de4f3c630236aabe25c95f9d8d09fa77087bd5111912a3f3048
RLBA-2024:2338
virtiofsd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtiofsd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virtiofsd-1.10.1-1.el9.x86_64.rpm
9a821845325fb5482070bb132f88c64bbceaa18734b631f6e4bedb6f47f6f41c
RLEA-2024:2351
rust-afterburn bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
afterburn-5.5.1-2.el9.x86_64.rpm
b80275800eb3fb6c5142dc57b6216a02a16bad32b9e41e4f5295899a900f11a9
afterburn-dracut-5.5.1-2.el9.x86_64.rpm
007514eb74487dd5a84761739564cede0b0cddd095b67bbe39fcf71bbf731184
RLBA-2024:2354
certmonger bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for certmonger.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
certmonger-0.79.17-2.el9.x86_64.rpm
016d89830e0d220c1ffffc2c004a95d45e49444637953e52edf0e65ecb1e0fae
RLBA-2024:2352
libfprint bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfprint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libfprint-1.94.6-1.el9.i686.rpm
075251b588e71a1e334cbe9cd6afb6b0f5f72a34b9ac3900432b4b543ccff3ce
libfprint-1.94.6-1.el9.x86_64.rpm
7f79a434cfc40ce01bae3ab11f6885e0d95425160f07f8732ed3f66bc8b1855b
RLBA-2024:2362
squid bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-12.el9_4.x86_64.rpm
c55c41498482cc686f1220dfa7cd3d956750228b97816ccf5fe06be823c8e197
RLBA-2024:2361
cyrus-imapd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cyrus-imapd-3.4.1-11.el9.x86_64.rpm
62602c0e629f554f36537a143af2cec6390871573aa9e45fe9d92ee7e9cdbeae
cyrus-imapd-libs-3.4.1-11.el9.i686.rpm
9fe4977abae9776ee0afaa0f1d0f5aa70eda7ab3365124d90537131aca264212
cyrus-imapd-libs-3.4.1-11.el9.x86_64.rpm
6d13b2610c0df2e686fefcb3f50cca727f4c406f630496dc2ddc2200440cdf08
cyrus-imapd-utils-3.4.1-11.el9.x86_64.rpm
e26155bb0a882e7a2e438c9cdb4c3d292c5251d42e49ea410807d66001d42353
perl-Cyrus-3.4.1-11.el9.x86_64.rpm
538265a8a751c829459a1b490f844a4f19588d14482e1812437e407e5d7fef87
RLBA-2024:2359
cockpit-session-recording bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-session-recording.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-session-recording-16-1.el9.noarch.rpm
10931a009aafe5af63220916026abf1ecca34bd31bea5a234db9bd14afd97559
RLBA-2024:2367
tftp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tftp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tftp-5.2-38.el9.x86_64.rpm
a84488cc0e9a174e4ffad97fe52d98e897438ea2927d0951fd96d7f5aa4ae01a
tftp-server-5.2-38.el9.x86_64.rpm
c75514ea4b434cca4d9da3e299054809467d867f62e16aca5dfc0ccd1be488ee
RLSA-2024:2366
Moderate: freeglut security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for freeglut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
freeglut is a completely open source alternative to the OpenGL Utility Toolkit (GLUT) library with an OSI approved free software license.
Security Fix(es):
* freeglut: memory leak via glutAddSubMenu() function (CVE-2024-24258)
* freeglut: memory leak via glutAddMenuEntry() function (CVE-2024-24259)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freeglut-3.2.1-10.el9.i686.rpm
74c47d07a5ca209ea2be085216ffb5e7104b759047313eade4b01cef043695ca
freeglut-3.2.1-10.el9.x86_64.rpm
7d27717e88edcb760d8c38a2e9230cf932f8cccbdd49916661b7fee649584058
freeglut-devel-3.2.1-10.el9.i686.rpm
5a6fdb49ef1777bec686325d12713887a586a99d50bb2aa8e8094bf63249448d
freeglut-devel-3.2.1-10.el9.x86_64.rpm
8e3c747e36e8b9e504e4bc152a67429156946a670293e4f9f1127827fe94438b
RLBA-2024:2370
synce4l bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for synce4l.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
synce4l-1.0.0-1.el9.x86_64.rpm
552ed778b51a5f1c4078dcdc21bba91db9fa1e0fa3f13126796883396196f48f
RLBA-2024:2372
sgpio bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sgpio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sgpio-1.2.0.10-31.el9.x86_64.rpm
2c9b2dc5b631cd20393d1de8bd525273b0c6307025e73f8005fd2e801ce7fc92
RLBA-2024:2381
rust-bootupd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bootupd-0.2.18-1.el9.x86_64.rpm
aa8423808dbafce09b3fff863106b45a1382c119983f496469834b1a8369b8d2
RLBA-2024:2388
fuse-overlayfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fuse-overlayfs-1.13-1.el9.x86_64.rpm
42edb4465d7bef9283de5bf783665f7036de514d5851a8759440c4141f273e0b
RLBA-2024:2390
ibus-anthy update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus-anthy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ibus-anthy packages contain the Anthy engine for the IBus platform. This provides Japanese input method from the Anthy library.
Bug fix:
* Previously, users were unable to switch the input method engines from ibus-anthy by using the Super-space key if the input mode was the default Hiragana. This problem has now been fixed. (Rocky Linux-24804)
rocky-linux-9-x86-64-appstream-rpms
ibus-anthy-1.5.13-4.el9.i686.rpm
68dc9ca190bdbbef0e856f5a7ad2847b1731ba5a0b997ea4a8e925dcceb46758
ibus-anthy-1.5.13-4.el9.x86_64.rpm
efd7e8ac7ba7280887a34154cf8f4dbb2dba6308e7e28c1d5e602558d223de79
ibus-anthy-python-1.5.13-4.el9.noarch.rpm
aa7c1c507a88c15972bb29f44e9a149f5833ef2be2c1982cbab44faaee328039
RLBA-2024:2547
sushi bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sushi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Sushi is a quick file previewer for Nautilus, the GNOME desktop file manager. Its capabilities include previewing documents, PDFs, some text files, sound and video files (using GStreamer).
Bug Fix(es):
* sushi will break if WebKitGTK is uninstalled (JIRA:Rocky Linux-28362)
rocky-linux-9-x86-64-appstream-rpms
sushi-3.38.1-2.el9_4.1.x86_64.rpm
2ef072e9fccfb8050eab51dd365d9eb39c9370b21462c726e96d5c4dbf506a09
RLSA-2024:2548
Moderate: podman security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fixes:
* podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* podman: buildah: full container escape at build time (CVE-2024-1753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes:
* liveness probe not called by podman when using httpGet (JIRA:Rocky Linux-28633)
* Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:Rocky Linux-28629)
* [v4.9] Backport two docker CLI compatibility fixes (JIRA:Rocky Linux-28636)
* Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:Rocky Linux-14922)
* Need to backport podman fix for SIGSEGV in Rocky Linux 9.3/8.9 for UBI based containers (JIRA:Rocky Linux-26843)
rocky-linux-9-x86-64-appstream-rpms
podman-4.9.4-3.el9_4.x86_64.rpm
83dda3781bcf6fb15d0ffc81fa2e5ba3224fcfed61afd40f0123c6d36c5c7b79
podman-docker-4.9.4-3.el9_4.noarch.rpm
b923e8837bc7f916eecfc1e426ed28442d9d9167126668c301c837e0a1a9be50
podman-plugins-4.9.4-3.el9_4.x86_64.rpm
ae700303ac9fd359f631a4e9f28caedb46a8b51c9335fe64528d2c39cfed4cc1
podman-remote-4.9.4-3.el9_4.x86_64.rpm
e5513af566e2334ee02a5e98a6d5270ba5ef6d1d7e259e3c4fd096726e85c79c
podman-tests-4.9.4-3.el9_4.x86_64.rpm
66463c8fcce0d880a1de9367bb16eaae13082ae9fa40c785817891a93a00b9ca
RLSA-2024:2550
Moderate: buildah bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Bug Fix(es):
* TRIAGE CVE-2024-24786 buildah: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] Rocky Linux9.4 0Day (JIRA:Rocky Linux-28230)
rocky-linux-9-x86-64-appstream-rpms
buildah-1.33.7-1.el9_4.x86_64.rpm
05749800baff333de4aa4ed733c05ef60cbd247157ecdc22aa7a1b96af0ac9f6
buildah-tests-1.33.7-1.el9_4.x86_64.rpm
7d5b120399c1701146ce958e4d75a0a523fd0dd5e5c0a60bc4e559ead70c50c5
RLSA-2024:2549
Moderate: skopeo security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
Bug Fix(es):
* TRIAGE CVE-2024-24786 skopeo: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] - Rocky Linux 9.4 0day (JIRA:Rocky Linux-28235)
* skopeo: jose-go: improper handling of highly compressed data [rhel-9] (JIRA:Rocky Linux-28736)
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.14.3-2.el9_4.x86_64.rpm
871acd34f5da528059aee2904ce025346920665c969a9d0b054d36ce6d75eccd
skopeo-tests-1.14.3-2.el9_4.x86_64.rpm
bb9a8e42487189e4a1551867d4b16223bc25bdb7b327b7a1998bfe6795e8ca1e
RLBA-2024:2555
gcc-toolset-12-gcc bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10.
Bug Fix(es):
* [Rocky Linux9] Backport PR libstdc++/113960 (JIRA:Rocky Linux-30832)
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-gcc-12.2.1-7.6.el9_4.x86_64.rpm
9f2c6b488abb038d625125a710260e73592e117a084225558e1f1de349ad5d9a
gcc-toolset-12-gcc-c++-12.2.1-7.6.el9_4.x86_64.rpm
36c15b067c418f064f4165e275cfd1df796534a1346f1c853b5dae87f221a504
gcc-toolset-12-gcc-gfortran-12.2.1-7.6.el9_4.x86_64.rpm
364778466faaa84d7a5e811644ce9be9ccef700b460b05f756f3d38f0a05c45f
gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el9_4.x86_64.rpm
cadc2a0330ba24bb919d047e6ae22563fcce0de4d85766380c8d58dd444ca501
gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.i686.rpm
da16430386dea715d8f1b8e598adde0545eed1ec0175db8047fe4a28e32669e3
gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.x86_64.rpm
c2b108e979c559433cb8b379480848550f44310c25b08501e9f8eac377b6e1c3
gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.i686.rpm
613804da7cbff3561156f039471fe6e3a329845f56b49a47c4d05f463d87642c
gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.x86_64.rpm
dfd010fb221946ca42eab83d3b9c5d77657d34c8b67378798dd7bb62190f1da5
gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.i686.rpm
298b45a22ece729671b64d7a6b1382220bb5e044fbfcfdb0ae224786d2418f13
gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.x86_64.rpm
37b37f3b89ae430bbe1a7dc8932876aa742f7ba5f875ad16449b80386faeee78
gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.i686.rpm
43a9fe2e0ad7f2922bba5a5da202461dd0acf369a0b397e0c399febb7c8e62da
gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.x86_64.rpm
7d0211424125687b8755155cd6b96147dd9d78ababc80466bba438d1a47b1b35
gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.i686.rpm
714253be93b950d852cb09c4c6b6ab9a4bdefb16a762a711d77d13f8d4b69a65
gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.x86_64.rpm
02ac0170723b508ed472745fea2c9d48a8cd7445c1f8cbd987e94ff64d3dfed0
gcc-toolset-12-libgccjit-docs-12.2.1-7.6.el9_4.x86_64.rpm
4dc581fee056211cf68cb6844baa13e9b36bc2160884ca12225dd65600ab2643
gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.i686.rpm
82bde850523ac60da6196e158513c6c7700ab63974e8e70a01fd1d4a4b84d426
gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.x86_64.rpm
304d9bac53dfe3fe48213e5f919016d3884671c77106898295e4dfab502d4bcc
gcc-toolset-12-liblsan-devel-12.2.1-7.6.el9_4.x86_64.rpm
6be32b0a39a2dbb3b3fe443eec881db1171f2f77e8062cbf3e6daf42bd0735c8
gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.i686.rpm
a18d09dc6c55cc17c733047da08aeb72e0225760241eebd066bc2545a9e279cc
gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.x86_64.rpm
e0817048a87f97bec36c2c9e97a52559047bfc51afd9f3069baf4111a38a89df
gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.i686.rpm
28eecb68f8ef7c62f7bf6ae1d659198800ee9569166083c4c506209a205d9aa3
gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.x86_64.rpm
84b0a4ee292d414543037846b4b0c7cb500d03fe840f07a71d6f3a8154bbab76
gcc-toolset-12-libstdc++-docs-12.2.1-7.6.el9_4.x86_64.rpm
e5303e338d2c6d26175a56ac827e360959a63787163c44d39f17d8e37be2c488
gcc-toolset-12-libtsan-devel-12.2.1-7.6.el9_4.x86_64.rpm
ff4f7b39a6c0ec414b7e040100e3f81cc424a57d5dfe986cac6dff694b8198a5
gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.i686.rpm
6134994a009795f02d01309443f63bc821fc3fd83a8c7b6869e9f8fdb6e3bd94
gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.x86_64.rpm
4e56c3968e3dd518ed02a55a55485d76e906e0c11b419db372a18e590b8f488f
gcc-toolset-12-offload-nvptx-12.2.1-7.6.el9_4.x86_64.rpm
3a53e4194612954e04572f55abd6d5d30311305cfbc4bc798afff60f95e8536a
libasan8-12.2.1-7.6.el9_4.i686.rpm
854509184fd9788ed5e6e623d6dad04eaacc10bfe9cb1f740ff20ee82fa875d6
libasan8-12.2.1-7.6.el9_4.x86_64.rpm
d4cfa8881e0847c4448dca785dafab05e24bb8734ce2b0184e8629e11d1effb9
libtsan2-12.2.1-7.6.el9_4.x86_64.rpm
9a9ecba0f67aab62f83d2b37efb0c7a38a5cc84f49b46c665c135c58b1ab46b7
RLBA-2024:2563
nss bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es):
* valid signatures shorter than maximum length are rejected [rhel-9.4.z] (JIRA:Rocky Linux-32161)
rocky-linux-9-x86-64-appstream-rpms
nspr-4.35.0-7.el9_4.i686.rpm
488873001440c569629ad050ea08a7f3d341fffd3d199bb35bb8415e3239bde8
nspr-4.35.0-7.el9_4.x86_64.rpm
bac72510acd9d28a658797730a4e075f2e86de2b70c5f54eb99ddb193794881b
nspr-devel-4.35.0-7.el9_4.i686.rpm
8d693e2f556b7e93a15de69f3807139966711bd64163dfc6619b01725958611c
nspr-devel-4.35.0-7.el9_4.x86_64.rpm
1e8420a7a937982bc1d8a2a476e0358a929b16442bb07051c2ea1e22bff9c1e6
nss-3.90.0-7.el9_4.i686.rpm
e99299a267a84809c659f93a44f92350d1472ccc43cfe8c69b196fd61279cdd4
nss-3.90.0-7.el9_4.x86_64.rpm
85de577728d21b47e726baae6ab01f0d19de52b5a2db8c9e228dafcd4c3c6ee5
nss-devel-3.90.0-7.el9_4.i686.rpm
217475a68a4fbca8ce8af92593bff9878ea15f21cd4073a83a84811fa08d066f
nss-devel-3.90.0-7.el9_4.x86_64.rpm
43cc3cd6d47a1bb5761939540ee21be0f767553e0429573d4952349661bcca62
nss-softokn-3.90.0-7.el9_4.i686.rpm
f1705aee9ec3a0fb53631789f760b19215c734e79ad7269e04dbe08cae402f6c
nss-softokn-3.90.0-7.el9_4.x86_64.rpm
5645929dee8519e877425ee52709391e526a8732c0dfc31f347d83c2bb91b28f
nss-softokn-devel-3.90.0-7.el9_4.i686.rpm
59774a654458da28ac6639ad9710e6313f1aab7632e34ed18d68fe429b13065d
nss-softokn-devel-3.90.0-7.el9_4.x86_64.rpm
389d4a4a9aeaeba7c3eb455117a0b22b34b3c0cce42aa30f4d2d4713162f35f9
nss-softokn-freebl-3.90.0-7.el9_4.i686.rpm
9c25f09d16e33b9d93b103d9662195b62b75df6f1748510b0537935e980a26b1
nss-softokn-freebl-3.90.0-7.el9_4.x86_64.rpm
406777813ebfdf93acfbb4acabe98a247f00b329337b191ca036c5367bac3b0a
nss-softokn-freebl-devel-3.90.0-7.el9_4.i686.rpm
30ae6a07505120f8788ad9d30ebdcc73ec4c941e5dd398357ddbb5e4146faf11
nss-softokn-freebl-devel-3.90.0-7.el9_4.x86_64.rpm
bff7640a5d35d90d4d56682872e72cf0d35157c141862704b56aa520f6c97930
nss-sysinit-3.90.0-7.el9_4.x86_64.rpm
825e160077ef15081bb87dc28f5efe7a8b29a579be3406f60d60e40c04428eab
nss-tools-3.90.0-7.el9_4.x86_64.rpm
e5ea98329ce0fe6782014eb622fdfa8c09ea5cbc4749aed2c2c04337e91ffe16
nss-util-3.90.0-7.el9_4.i686.rpm
48b74a1590bd8d4c05f20072dd8d863eb168918393f803d1f38de401c1544f0b
nss-util-3.90.0-7.el9_4.x86_64.rpm
e2fe12e79cd81b05c87c3c589ab71fe39e3d6b073e3ba50360c0111efb8ba0ec
nss-util-devel-3.90.0-7.el9_4.i686.rpm
f93988f229bc8b5899490357bedb6484044a692f98ae2e210f9864ef7fa5f9c9
nss-util-devel-3.90.0-7.el9_4.x86_64.rpm
32b931be252c026b3892b276ee8ba0a38c07a41f30ef14bb2db84c6ff549ab72
RLBA-2024:2553
bootc bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bootc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bootable container system
Bug Fix(es):
* Update bootc to 0.1.9 (JIRA:Rocky Linux-30879)
rocky-linux-9-x86-64-appstream-rpms
bootc-0.1.9-3.el9_4.x86_64.rpm
8533b58441c913bb8553e324a84c8e29585ac3dc473fe7ec765732decebf6082
RLBA-2024:2557
containers-common bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The containers-common package contains common configuration files and
documentation for container tools ecosystem, such as Podman, Buildah and Skopeo.
Bug Fix(es) and Enhancement(s):
* Update containers-common in 9.4 0day (JIRA:Rocky Linux-33394)
rocky-linux-9-x86-64-appstream-rpms
containers-common-1-91.el9_4.x86_64.rpm
eff1ddc99c483dd29413211b68cccc739a89cd48ec9d00edaaf4f81109ca9b99
RLSA-2024:2559
Moderate: python-jwcrypto security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-jwcrypto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards.
Security Fix(es):
* python-jwcrypto: malicious JWE token can cause denial of service (CVE-2024-28102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jwcrypto-0.8-5.el9_4.noarch.rpm
844dc0be5135fbfbfc8cbcb3caf9ce32004a4e0fe21027488bf6228a6c233701
RLSA-2024:2562
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.21.9-2.el9_4.x86_64.rpm
a19c070fe42d179715bedd1a5197be88cffc5b671e89180247a63397f8000214
golang-bin-1.21.9-2.el9_4.x86_64.rpm
c3f3320e40ac1922fc60bde63ab166aa859f7e02ab8d3050dc8508aafa9931ac
golang-docs-1.21.9-2.el9_4.noarch.rpm
718d0316eca0de8a185a556dad03012571f2d47436d869ecdba2476e4445e1ff
golang-misc-1.21.9-2.el9_4.noarch.rpm
b7882278474d687f205b3baeb6573632ca32ba57433c0b52fc0ef4888054aa99
golang-src-1.21.9-2.el9_4.noarch.rpm
375661970bb5076d90abec7d1ef8b7dce01091bbf9e3f8e0d756edd482f12d95
golang-tests-1.21.9-2.el9_4.noarch.rpm
037fdf82dde931093600dce75a1515140edf6c12f30520ff2ad1a15312c4eb2b
go-toolset-1.21.9-2.el9_4.x86_64.rpm
b8f79327f17b24597bc7310b6435790d2391ce948aa2fc236c932c02648fd940
RLBA-2024:2567
aardvark-dns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The aardvark-dns package is and authoritative DNS server for A/AAAA container
records.
Bug Fix(es) and Enhancement(s):
* Update aardvark-dns to 1.10.0 for 9.4 0day (JIRA:Rocky Linux-33099)
rocky-linux-9-x86-64-appstream-rpms
aardvark-dns-1.10.0-3.el9_4.x86_64.rpm
bb58e7560f283292893c4f8705a75198f4cb532c16637286064a43e4750c0a12
RLSA-2024:2565
Moderate: libreswan security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).
Security Fix(es):
* libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libreswan-4.12-2.el9_4.x86_64.rpm
b42fea1432a4d5382233cfd82eb10d06d85c62c2680be69a47a937590874ee7e
RLSA-2024:2564
Moderate: mod_http2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* mod_http2: httpd: CONTINUATION frames DoS (CVE-2024-27316)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_http2-2.0.26-2.el9_4.x86_64.rpm
1413a4e111a921f4d0b632da9c00e38fe96a59e2cf3065cabd95759bd92e976b
RLSA-2024:2566
Important: pcp security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.
Security Fix(es):
* pcp: exposure of the redis server backend allows remote command execution via pmproxy (CVE-2024-3019)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pcp-6.2.0-2.el9_4.x86_64.rpm
fa44c07005ec324159056ed889ef90984647ff4135d08053ee4f99a318f312fc
pcp-conf-6.2.0-2.el9_4.x86_64.rpm
5948d567e38935059ba9b70703e6a46726a2f8e7a5564f9387a12b580c3f5c0f
pcp-devel-6.2.0-2.el9_4.i686.rpm
dded1bf57323409ec60cc6c5fb393315098012792c41c07e999e1268361618f6
pcp-devel-6.2.0-2.el9_4.x86_64.rpm
e62c5578cc69340f65827e9476ad2a2a0f8efe6557e13404f82398ee473f6fb3
pcp-doc-6.2.0-2.el9_4.noarch.rpm
9904aa28f0a12feac60148243c0130f406a88bbcf9b04ffbb871b98b6bfd2e79
pcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm
bcf2f80c4b5bc65f4786d82a2453ca6603a920e7c14bda47d1d9834dd4c6534f
pcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm
d75da034087628f17203484436a916a340d38dad324ba62c2fb69f463980fe69
pcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm
d5f32b1abdbcbd9efd9543aa564f78cd8d590fb923f4447d08a2a4da3b56358f
pcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm
60aa1bca05545d9082edd902e4cdb152db8c54b840df19d0df3dc98ff86c2e4c
pcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm
522e1c231a524d08a1c8aefbb98b95ac6f25fe9b0c8ae14e1598914ea1c9203c
pcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm
66aa4e733ae4be3d8711b0cccd3cddac859b102820ce09afba51eac4bf5ad523
pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm
7864479d459340b76c90812b3887e10ae95f3bc4f115a17b3cabc3d7ef9de4f1
pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpm
a647417d2c22e69116e4b0952cd4553b766e55649bbc9d83234583d3ed100d55
pcp-geolocate-6.2.0-2.el9_4.x86_64.rpm
b345a444491f6849279fcca5f2b2b609add1c34d505d5b0057e3df8620d0dd3b
pcp-gui-6.2.0-2.el9_4.x86_64.rpm
004f4064fb624a7f0eeb58b74972eee22e6d12c79b76dcf9a26738cebdb03aee
pcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpm
f2389224a90e6af5ea0eb021649f6cc7455e094b81b12de46622dde1c2f9f0a3
pcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm
da8564dd1390d0fb8068f15cc50c340a46613f3fdf4f901dc6e039d21c5d8961
pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpm
d84172248850213f41358b88160fc3751f34f215bf2a9db590feab93b4641816
pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm
588a24d7b2374aabeee44217a6fd188f9646dc1ed5965db2b088725eb472ad19
pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm
ec7f56586e2728b00c8e261e2bb52da13ab75a3c96081804be2251f22a133bd3
pcp-libs-6.2.0-2.el9_4.i686.rpm
48cbb79b130eb5c7c0f046c7313a92ba668588e8d3edb1bfc35a04dcef145c9a
pcp-libs-6.2.0-2.el9_4.x86_64.rpm
55d503ff4a012ce229ee6b45780c95824bea60cfb5d2f9d3b788cba57908ac36
pcp-libs-devel-6.2.0-2.el9_4.i686.rpm
e5247dc61d1cf538e0f5262a12a75c08306adefdbd1827e95c264ffb7303809f
pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm
084cf6ac20c310c8ee16a021dbced7969e3ec40476acab4a5c9b4091fe0942d9
pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm
ab405d81c52749418c66a7cecee98712df19eacbbbaf3e3d4d95cc58c1ea24e8
pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm
f69608de1d216a94eb89259dbf041fa6421d591dc1740d07566cb5ffed3e2c9b
pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm
2a23436c3908ccae2d11499325a4668b3f82c14e372ff2aec5774c042ef4e57b
pcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm
06adde62361f8c5320a51ae9ff68c191cca3b195193bcd50670c66e837a87954
pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm
8e6904674ac61d53c9e6d79f09df53a6b84d6cdcfbb1af668e9a058cb97a79e5
pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm
fa941b1dc97fded31e57eca4951688105fac9eca8d1fddd02a144b0cdb81f36f
pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm
3868252de1e00f757e46ebcebdb985a44f5f520f1c9223322326e3eefc13b448
pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpm
1c426dcbe13cad16aaf6aae4b67ae56d2d670af08a0573acad88bf888f931b37
pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm
b55fb322f5a8489201119506c5d852d306933d84d5907e6d29a56434799d47c6
pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm
d14cc1a180de33c2051c4013e33ae72e352354901e6b079343e612cf4096cb8a
pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm
43abe10a5ed2e4bc43d41c7c166b0a05999f9b1f7895fc4a3463347ce56f6a5a
pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm
09f7f66b54f6602ce5e674127a408be9e4e7d186eb79eeabb846c99717d23a15
pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm
df24c289977983947271d1fc36afd011007b428ab24c18ec59d1ed7872982aad
pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpm
b9fe0b9d274160586639b86bfa25a8bc4a0f5e85bcdf1b9ecbd045c3e11720a3
pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm
3c7acc9762ea82f5b03e1d69e45604a334997b8dec48c41a6d13495c7a2e34ed
pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm
0d18ef04429219c559d4838fb928c17e231242e1d7dea975f3e1db9d30f79ee2
pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm
e725bb41748e39b0b5759d4f215e195f4f4f1c04ee242605610f014c932705d7
pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm
ac81f72003a60e6b69c8e7e2dfece1276ac2cf5509603295bf86b181baeeb388
pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm
515dd10c8db179401bc915664e4a188ca8cf024969a12f042363ff82395a97ca
pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpm
40c43563e8be95c1fa90ecfb961667c587848fd23fe217e75a2568d3ccac3df8
pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpm
77d920db9d884ae336259e1bda575748caa3b310f09e8adfb99193f61013e5c5
pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm
3d04c09fe2ba97bc1829304193f023433602d3cb4971d7a5f48446c9f7736c5d
pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm
c5c24d867accde6c689d14045bb1633c01cc4456a7799ec1a99f0226cddb776d
pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm
5296cf993faa004b4f84da71f9b036fe749c0af69d71c7462402f20dce540f93
pcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm
073fdcd61d19e581f726d91ad56f9cf0af7fe9272961c18ba925302aa78ea078
pcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm
70bf049517481408068d9911a32eff856fcafa43e00d950e1248ab9106642b17
pcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm
9df2a74e54fcc42a7e7d618c4605fb44dbfd45129456c70edafb157693b9ae86
pcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm
ac13d7fe83e7aace6b5a17479a4315583945a84d5e109f3c257a6c171cf439f8
pcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm
6815ab8280350cf4707e45c9e0170ea0aa914570fe9e478181587e8f1d6cf150
pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm
78940fa3ee09678bafe3a91b745802a638a580aae08ed6222bceb709c9b32436
pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpm
362cdc6b90e3a85c80d35b506df550f44de6060a2deef039fc031199d6abad5d
pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm
5528eb056d78b9e3a8b02798fca14483204e8e5f5275e5940ce5ab8b7cd4daeb
pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm
9c963674ed5df44982ebd7119832f9bc221c9da2bc2f333ec112c4936820064b
pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm
9061cf3540230bb78682c5ea5d12c486e9bbc90d1a68e5a499ab47f016478c03
pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm
e01a4cfc3e52718b025a8250b2f84e4b4a287b1db6860e82d9aa402ca5633577
pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm
33d336ad9f5cb40e46458cecf1c4a8856424ebdea944c75fc32c17a7fed841f2
pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm
bc59ea1ad3896eecc9a38503cc99fa721d6626dc6a7d59d5e4015175bbdd5e97
pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm
c93e85e9a85d0c149bc654a9764018df52de44eb5aba37c5dfbfdfdd319bf362
pcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm
df215afc73de88407c960e0f32d1dc83d7e3bb016d8782c78d1c9460fbaf2546
pcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm
15c35855f72d4864d239c0e2f26ce217fe1d172058ba5dd6c926e3d89811da36
pcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm
146c1c85fb0628c43797743fa29739a296dcdbfe2771a30d7e003556e489cced
pcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm
7e46b539c63eb6f4f6e29e9f9029f40214d443d0664499f4f525f11115223aa2
pcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm
34655b0a8418dddb518cc718149d9a2eaaab8c1842c4dfb9a86d5fdcf11b47b6
pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpm
30e9d05476c7e2802689a27e346a05c69a9c4b8bd92ecb8be09897020827bf0e
pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpm
66dc374f119f1b3d3b6250c8c1aadbe76d9da5eb9e5e1db7a0dcc9c32af9c21d
pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpm
84f9b6940413e7e32018b4682446906fb1b4f5f7114080b8f0922b10fef83cea
pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm
82b5327a67ed0f2facd4f8177bbb8ed77240b912acb66c0f6bd881d7477b6da9
pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm
b5af9e21efd29380f19597dd9ffada0e3d85386d2d8c6eeab0ce20b043b3d31d
pcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm
163da278aff79d292cb3be2b4f100cc1c42e2ad02bba65c52b43fb5e736d8ca2
pcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpm
97d7ba3a820c986a422797da081d068afb38ca920e97ec57be8364fc122b9272
pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm
345a05dd34abb769512be8e9487dfc598c0b979c7cd8d6949590510fdf717425
pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm
2a8e4f48216a18f8eaf2ee86286bc5ee7a91f62deb12a99072fb2559d4693ee9
pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm
06eb437ff1ed26e9ef1a0fe267c37999db95222c3447f92f0b42a71217f56872
pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm
a7b9f59607c84ab77ba2c38b1c2d93e4a64b24449f7382354a82ec6a7b8a1a26
pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm
435afc7a90544b15b474e1936891274384c25894e4fb779231dc0413acba540a
pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm
b1d7556eb5b52691b2d78df1c3d48ce144ae0eb55818425c1bab529bf69d0e5b
pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm
c6e5d3cb5155116b2309aab1860f69cd245e52815f30a329066a04ffa77488b2
pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm
cecdb6729832b5e8827b5cc479d4f5454ca2960d7ffede54e6e572995662d1aa
pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm
827a977fe13b90d308faed5c8559ceff0cabd0d6e3919ecaf7fe142a4fc1dcc7
pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpm
01b8fce4627e2022994518b034baf45181db02779e840a71f91069a3c4cf7171
pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm
58c63cca622097aec0266afb1199f2e1a6851fa75825e4fd1c311964d8dadb3f
pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpm
94f0d05e8be8207d431135b304a82b68fc30f685952d1ce591f9c3c9a16b5da1
pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm
b58ebac5e7a16d3a1dfe7eaa91ca1c59dec96643f17be2f1396c4800b40af970
pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm
3c7d13b69db15a71ac4f0c60013e536ad780daf25f7477d5cb81ff8e9bbcc0ce
pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm
d7b519b4fa83f7b54ecad45876dd00a78eaa5415a100b7a1e44741e57bd7cf22
pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpm
37bb607a31e569f9d44524293c52b2f1a6450d953f85aad55d47fc81c392d263
pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm
8d6333d419f39aaa91e0e1ed02c06688fdeb0c549c3f17bd923dd1d95f832e13
pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm
5809c2dbc7efa7c3f12ae8aa0dbfdd71801686a5d84dc2e14d5f16f63fa2a35c
pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm
23a93287a2a034dadad100ed2385ea6b5cc883a1054c91eeea11c5dac9bef83d
pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm
29b99b7d8ccf3d685adf5d60be0d59f30a770a4de8b7a9be4a24b9a81b267be9
pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm
f30d8399f79f58b7aa317088a3f5e5f043801f9d32fbaa1876e882c461241955
pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm
f9d1fe3b8d7e08ce5dbd2d4cf319e9995556e4fab3d0a9dcb298f395bd3278f0
pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm
c037ac8044a5f2248ae03ab1193eadfb29a926cc82c253728ebff86894ff4a84
pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpm
54570dd9a2e826a1e230d62c08fae583cec4286b2a7e40f94090496595a7be0a
pcp-selinux-6.2.0-2.el9_4.x86_64.rpm
c31732adc527bfa41b2b8c8cc503cc06ba301d1c7a937d4d139b7600201244f6
pcp-system-tools-6.2.0-2.el9_4.x86_64.rpm
1588c060dc26d8ac252843ac9674d69bc7dc42208d07c1c36c7fe1d43a61aa73
pcp-testsuite-6.2.0-2.el9_4.i686.rpm
30c2a1bc9f682d3fbb25cabdb6dcc7b334ca309f4622a575653506eaa3162405
pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm
e85f9f95870c66745fd7420e7fac49ec2ee5ed49924155448c02d9e504983a7b
pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm
56811f9031d1f97b11311bb1ef53f838a4bb67a82424227a1e216bcb1a3c0d2c
perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm
6e9074da6b62995a03860a62caae68fd25f5e13d190745e22b2ffa25d7e949c4
perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm
eca0ec18445f7dcdc7561877269563f48f2ed7fc8c837bfc8c17b59baf580289
perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm
d5c40fef2cef125a86e83a02237ed77a2df7043ae0104f5c06a94a3dc1ac678c
perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm
61d98112309495836db49b49858f8ccbdadc8b66e1356bc82fdee492a510257c
python3-pcp-6.2.0-2.el9_4.x86_64.rpm
eda19fc392dc0739479343a1d5f2333450853bfc54bc8779ddcfaa9b03769798
RLSA-2024:2568
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* grafana: vulnerable to authorization bypass (CVE-2024-1313)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-9.2.10-16.el9_4.x86_64.rpm
0d359286f86415f70e39564acdcce57a59fa2ad6db03659465702aa0fc805c1a
grafana-selinux-9.2.10-16.el9_4.x86_64.rpm
30d1d434e0728fc4f454e655eced40aed1c1d72dac8834621eabbdc8756b9468
RLSA-2024:2569
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
grafana-pcp is an open source Grafana plugin for PCP.
Security Fix(es):
* grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-2.el9_3.x86_64.rpm
982033ce0dd9ab3c0fb45cd612c689b67251c3775804652fe5599d01f6bf6fc7
RLSA-2024:2616
Important: tigervnc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.13.1-8.el9_4.3.x86_64.rpm
4a42a6d384b74851f7f97aec4f99a63d5da39d488d01e5901f984fa400b4a690
tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm
23da0f5abe9fe31adb2483bb5a4ab9ae2a374f49e07f5607f81c8bfe34302d7c
tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm
c1e45b115039fd364994e37063f9243d99e62464a1b72952d19c668ae8560052
tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm
c672e105567f8253b2e6cb299a70b1242fa8144820032512cbec8523f636290c
tigervnc-server-1.13.1-8.el9_4.3.x86_64.rpm
a1e7d1be87d4a7242da86ca36dbe196649a037956c71d0e7ffe286926313de13
tigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpm
dbd080f0847c5957a71a682a50cfaed447c296f7e5b27ce76e49c1ae4428ceda
tigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm
09811f39cb86771a4933d09cb2644a4805e5a478b2a524eabbd3408278dae051
RLSA-2024:2724
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
* golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.4.1-2.el9_4.x86_64.rpm
3a6b6243c4e6dd743d7d96c3f0d83de92bf34f437433b5354a183e746a651ca6
RLSA-2023:7711
Moderate: apr security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for apr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.
Security Fix(es):
* apr: integer overflow/wraparound in apr_encode (CVE-2022-24963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
apr-devel-1.7.0-12.el9_3.i686.rpm
c939f32e12ea315cd2cbd841c280a4bcd67d4ff3d068cb10abf61e8b5ea4c909
apr-devel-1.7.0-12.el9_3.x86_64.rpm
5e2d28fbed04de9f9f94976472b89e639b205c8939877c97a5195745dc7fa35e
apr-1.7.0-12.el9_3.i686.rpm
deda142bdd430e67a5dcff481377ec370f621efea6ba46093f2af16699e831b8
apr-1.7.0-12.el9_3.x86_64.rpm
e7ce248c44636a9b4bf9198ee46a03c242c28a4162a1dd95591f462fe707f738
RLBA-2024:3624
scap-security-guide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 9, Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scap-security-guide-0.1.73-1.el8_10.rocky.1.1.noarch.rpm
c8eef99c5996627e3a404153bc2f73a4836341709dce142050bd4474ba27af57
scap-security-guide-doc-0.1.73-1.el8_10.rocky.1.1.noarch.rpm
9fbaacc8aa3af879614aae1023d9c26bd59f7db3bb634e32bef9b02ef58bd5d2
RLSA-2024:3619
Moderate: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm
628af278ae6ba45e16a38d2e7afa1333eba3ae86ed54d81d054fd42d152c3acf
kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm
059e2f8de6c421fc96c2c6725a0b9f033de07036fb9cd5ebdcaf8eddc2a1fcd0
kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm
d0b6c8a572195063442b48af90a3301a6e3ae6c3a54036199c38c53d643ee251
kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm
23120b0e425a57351cc60b66c97e06d8657b5ea013e00f8cefaef61630c8a783
kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm
d99616b2822ff0b4626083b178efe574cc9d92e89e18ff6c7d455da5470577a0
kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm
8901960c1df3b20fa6c83d7c1a679ce2a7d1c9e5a1b7ef332657d20341bfb350
perf-5.14.0-427.20.1.el9_4.x86_64.rpm
6ad18582e54fa4ac74abf9e3a7113580d49e81e08c56af604942f27af19af64f
rtla-5.14.0-427.20.1.el9_4.x86_64.rpm
7cf8d34dee4145bfe90a2bd01e43afea9d8fcdc3770293ea1b604152fe4a1ea4
rv-5.14.0-427.20.1.el9_4.x86_64.rpm
3e7ec6fefc32ab0e7ec3116d1162ca0a971cefa7ee91cc981b6dfc666121b348
RLSA-2024:3339
Important: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv conversion to ISO-2022-CN-EXT
(CVE-2024-2961)
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)
* glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-100.el9_4.2.i686.rpm
409dc1fc84309846212381084afe162c9a9c06c45a920a877112b605724d57a1
glibc-devel-2.34-100.el9_4.2.x86_64.rpm
4cb2e4d2d97619e5a651fe4e5af4e79c405c72b4183ec218e4a9fa2c73713fc4
glibc-doc-2.34-100.el9_4.2.noarch.rpm
fcc55cfb3aba7f9cf7e49f55eaaa357883cf9d18d38c6411e33a2298e0675fd1
glibc-headers-2.34-100.el9_4.2.x86_64.rpm
492cb1100131cfc054bdbac8706138f9965775ebd032983c56b1254ccc3b3286
glibc-locale-source-2.34-100.el9_4.2.x86_64.rpm
569a1cec8cdc2ae5ef9a736b27336fe299eb378195e77e2f3d57b44b5b357c6c
glibc-utils-2.34-100.el9_4.2.x86_64.rpm
6b74fb6b0cb7960573912c5adff83f7befa0d058d62f10eee09baeec5be285fa
RLBA-2024:2841
.NET 6.0 bugfix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.130 and Runtime 6.0.30 [rhel-9.4.z] (Rocky Linux-35310)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.30-1.el9_4.x86_64.rpm
9d263debe3ae2bf3dd3ff392ba3b413692a5d56d625cc50d94e8ef3067b728f2
aspnetcore-targeting-pack-6.0-6.0.30-1.el9_4.x86_64.rpm
aae18477209542abc73de671d7e4b08440f0e764d3f387f71866891d91bec70b
dotnet-apphost-pack-6.0-6.0.30-1.el9_4.x86_64.rpm
198b644f7cbb0ecfe948ecc287edcf7aef28781d99687f9c9f255ce61655121c
dotnet-hostfxr-6.0-6.0.30-1.el9_4.x86_64.rpm
123786137ee02939c449cd590da9683c4c0afa782a34687ce4ded60d204395bc
dotnet-runtime-6.0-6.0.30-1.el9_4.x86_64.rpm
91aa61241dbebc4f8dcc597aa18c68c20ef18a8326af8562db198373a08ad98a
dotnet-sdk-6.0-6.0.130-1.el9_4.x86_64.rpm
a645cfcd850689b62ef831a9145ae6439953dba25be870c790e5f49b58aa9574
dotnet-targeting-pack-6.0-6.0.30-1.el9_4.x86_64.rpm
4282be3d6b4f38385148926cd42930c158cf653153c17dd7dd143d6938667754
dotnet-templates-6.0-6.0.130-1.el9_4.x86_64.rpm
6838d7377587875f0b58f8da4f51ce900142c5514bc144d50866a2317177abb2
RLSA-2024:2842
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5.
Security Fix(es):
* dotnet: stack buffer overrun in Double Parse (CVE-2024-30045)
* dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm
0b4cbcef947f1c549f610ba00a84c6b699be7fd4d42c5e96571013328e2ce34d
aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm
61adab599088b9981715014cb5ecf842a00116ddfaf3b1b600a68c16ce749384
aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm
02ca27a2b4c83af45bca015b67c813b64cec78feca1af9234e2dea32cc1287c0
dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpm
eb9ddafed26d23e64fed6758857685c6f3cb1c31490a74854ecbfd1fa79b6902
dotnet-host-8.0.5-1.el9_4.x86_64.rpm
d91e77d16eb31b7522b7e91119783b7acbfc479597fab39739d1cf24a22a6f45
dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm
58ca03d985a3dfab567e687967dca51276074d61355b0f3ed5bbcde5944b9944
dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm
abccd9482ab83340860cfef73462e8a255c00289e09b6200e4afdb64eab8ff8f
dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm
938318430146ef5ab9f8181c994ecae3cf6a1f0a0eabeffe71896217ab906aad
dotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpm
4cdc64099d465e5970fe8e8a1e94a45def7dac1be1e3c1e8f2c96b9b24d5a0bb
dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm
20a43f38dc30d1006539862366bf41a8156439ca961a16bc22f3d5aa93d3cd72
dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm
e5506fd2ed51f1913eb135e06b7b9fd42560937f46cb95f3a9a2119c28701c31
dotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm
0c6f122e952b116c84cddf8826319317a1632a2ce629196bd1703e0eb099ea07
netstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm
c3a8f14afbb7d230b904571b5eb067ec8b40d9a8421d76d90daa4b42eceb3518
RLSA-2024:2843
Important: .NET 7.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet7.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.119 and .NET Runtime 7.0.19.
Security Fix(es):
* dotnet: stack buffer overrun in Double Parse (CVE-2024-30045)
* dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm
086f97e3080a68397e71e7f9f5cc38ff862e2e434f1e20e785a171425ba4dcc4
aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm
63d1a08acf0f539aa0b917e42a7b4d6982f9db5861ebc169e03e1f8d77c6c1bf
dotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpm
30fbc00ce08ff40cb452b6f2293e4a1ff029fd22390f0f545cb46128780258bc
dotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm
9c18bee32b17d63ebae4605f3740b3120e6c466871e30d894ba655f4489981d8
dotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm
af5aa93410564d4ccc9e355c56b038dc7ba3bcdedf92721c851b096721788474
dotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpm
7a2b0ae1fdd19418bd37ef72123c252efaaf2299f734aa92ea4115fccb7676ad
dotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm
5631bda1d3ec364b6cffedf55d16c06e44d53f5330835ffab4c596a85a571f37
dotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpm
2a3c9775e361aa107e6f81f2aa5d593d1db9dfa6fc6cff12981f7d152ee62942
RLSA-2024:3754
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698)
* freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.11.0-15.el9_4.x86_64.rpm
88ccaf2b6ba2c05b67c7afdce2b4dc4e5258363dee817d955c91434229c65665
ipa-client-common-4.11.0-15.el9_4.noarch.rpm
c88d3f06a90408afbb5e9e3eb91c1557259b57006e4cb71614813a9320abdcc4
ipa-client-epn-4.11.0-15.el9_4.x86_64.rpm
8e1bacc213c0ed5b2c86613d9c17cd0ac6af5e0b5c06b7a13d99df654420eb5f
ipa-client-samba-4.11.0-15.el9_4.x86_64.rpm
362ce0c986fedc969c04ebc7f55725b570e92192f196926807bfc716aa7301f6
ipa-common-4.11.0-15.el9_4.noarch.rpm
da96d24e6a713a7771f04f8d22d2ab89f63f5c5bfd5a8a414c6a04dad1d6aaf4
ipa-selinux-4.11.0-15.el9_4.noarch.rpm
ad28ef184a62cb1060d588a7ede08d45f79aefb0f7e4d4991780c12724214d1f
ipa-server-4.11.0-15.el9_4.x86_64.rpm
d5b0930e6d6b3d672f6486ce6a41045d7247b59ddf4bf4656bacfa9f51a69e81
ipa-server-common-4.11.0-15.el9_4.noarch.rpm
30ff94b5ed3e5cd07263da992a4930edae271f767571ab1da275cc940b3f1759
ipa-server-dns-4.11.0-15.el9_4.noarch.rpm
a8e89a0540046c71954aa4cb5509c6b9cca7f0b5d5a71cea9b65b10ee0763913
ipa-server-trust-ad-4.11.0-15.el9_4.x86_64.rpm
ad60d1590d07822c52e12545a6ad56d8b05e80d003e830e521d4b43a9041edb8
python3-ipaclient-4.11.0-15.el9_4.noarch.rpm
927f631377585e090059faa9925728c52d5c88bae3d8c30ad6fbef062bf0d52b
python3-ipalib-4.11.0-15.el9_4.noarch.rpm
8b0578eea34d0828f2fc862cd42e15662059b312fceced5f2ad9a7737a30012f
python3-ipaserver-4.11.0-15.el9_4.noarch.rpm
3817250edf5fd5e1c7d1d62e87b0d26061159d5ce7e8f2873b25a80128724bc4
RLBA-2024:3832
libvirt bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Bug Fix(es):
* live-migration with NBD TLS fails with "Certificate does not match the hostname " [rhel-9.4.z] (JIRA:Rocky Linux-33781)
rocky-linux-9-x86-64-appstream-rpms
libvirt-daemon-10.0.0-6.3.el9_4.x86_64.rpm
a80767047cd5a12b5e8ed1d68548a7aca133878f52fa377bab52b79f51ec1881
libvirt-10.0.0-6.3.el9_4.x86_64.rpm
e02fba627778caa7f66a2ab0c4f4c1a30b3b83efec669feece99b8742a33ac61
libvirt-client-10.0.0-6.3.el9_4.x86_64.rpm
0f75c5ea5c588cf4b43960ea76bfc8e3cca29cec85f08c2d60d30591dbbb255c
libvirt-client-qemu-10.0.0-6.3.el9_4.x86_64.rpm
42a30627839702958f0efe309223e6ea47c6f0e2eee66d115be2fb61e81e747f
libvirt-daemon-common-10.0.0-6.3.el9_4.x86_64.rpm
cfb0156fcf13daa439d57caf3189695ba609496cf5dca32d9e3330aaf55a6bf2
libvirt-daemon-config-network-10.0.0-6.3.el9_4.x86_64.rpm
97c835e1fda1b0abdc31a1527f0bd02dc0ee4f1ec6f4c5369e19b106ef238319
libvirt-daemon-config-nwfilter-10.0.0-6.3.el9_4.x86_64.rpm
965d40f59838ed2d7cb37a80bdb5523dd6dddd29bb40f1be28b307612413ab96
libvirt-daemon-driver-interface-10.0.0-6.3.el9_4.x86_64.rpm
cce747693af00605ff319c382e20c1d1e8f1dfb0b48b840ed80c55f036405d00
libvirt-daemon-driver-network-10.0.0-6.3.el9_4.x86_64.rpm
c1ea16bda8f6533fc85f9522d19febdbf8e3527c74b47e988b7a4f1cdc086300
libvirt-daemon-driver-nodedev-10.0.0-6.3.el9_4.x86_64.rpm
7e01922b7d41c655d48498d7dd0592baa1f3a6a0ad3a3ec88d54685c9c046eed
libvirt-daemon-driver-nwfilter-10.0.0-6.3.el9_4.x86_64.rpm
fa5d99a6cdfc62b735aaa983e5364e5ccebb801599d80d2d2663fb1330556b9e
libvirt-daemon-driver-qemu-10.0.0-6.3.el9_4.x86_64.rpm
c8b5b97938e83484c064ae3d309be160e220da3bc179acfab314f587c277c5db
libvirt-daemon-driver-secret-10.0.0-6.3.el9_4.x86_64.rpm
1ae55f0c6dfc0840d2dffa1d88bb0de0837e777c2814660d0526aa3a95282788
libvirt-daemon-driver-storage-10.0.0-6.3.el9_4.x86_64.rpm
5dd40bae105f0dbaab5482b6353b5161905077fda909ca9fb5a4816b59787762
libvirt-daemon-driver-storage-core-10.0.0-6.3.el9_4.x86_64.rpm
3ca81560da7a53dea27392133f26dcb780d16e33240be430b424a4a7baeddf8d
libvirt-daemon-driver-storage-disk-10.0.0-6.3.el9_4.x86_64.rpm
b9ea42b938447b2cbb5b53dedf857d5f5fa28434649e2c09774b7f57eba125e4
libvirt-daemon-driver-storage-iscsi-10.0.0-6.3.el9_4.x86_64.rpm
fb69db0f68b6263e6c910b55dbdcfaa9356d24822949a623b4241d3cdece890e
libvirt-daemon-driver-storage-logical-10.0.0-6.3.el9_4.x86_64.rpm
cf744fc627fd8a29d7e39e810bc32f03b3b3157e911d34beaaa12779f2fc294e
libvirt-daemon-driver-storage-mpath-10.0.0-6.3.el9_4.x86_64.rpm
98963c910f4e797d1e8f20b77f7129fefa881de51ff0c723229c798532d98bd4
libvirt-daemon-driver-storage-rbd-10.0.0-6.3.el9_4.x86_64.rpm
db5adf2e9286b828ffbb6b9399b00dca10cace8eb4d4940397577b28d9bfb330
libvirt-daemon-driver-storage-scsi-10.0.0-6.3.el9_4.x86_64.rpm
df44a279eb8dc5c37d4717bdfcde6c23c59d56971014e07c99fb1e78e901609f
libvirt-daemon-kvm-10.0.0-6.3.el9_4.x86_64.rpm
f7a5a81f6667b2603765d63921a49d0a8952e5715bfe53a680fc592d4875519e
libvirt-daemon-lock-10.0.0-6.3.el9_4.x86_64.rpm
d45e38c335859f9ba7985fe177915ebd5f0608621852317b70713c43aca0eed4
libvirt-daemon-log-10.0.0-6.3.el9_4.x86_64.rpm
28f34157c563d6477b15b6f644e450dca0c7ada145384ad1c47eb54b7565a544
libvirt-daemon-plugin-lockd-10.0.0-6.3.el9_4.x86_64.rpm
1cf083a2206e96ddd6b043286f179d35aa2eb2e64018394ada1fb9e587ede3e1
libvirt-daemon-proxy-10.0.0-6.3.el9_4.x86_64.rpm
52c86057ae80883ee565e03c9216aa9d5a31b67f942a36f492a1b4a3f8690284
libvirt-libs-10.0.0-6.3.el9_4.x86_64.rpm
f7fea0921b28774543d6e90422b6fce2c90da05ff7b0efb9deaa1b6afebb8a6c
libvirt-nss-10.0.0-6.3.el9_4.x86_64.rpm
9407c56164734c15989fcd434bac81889e3663591a3700063a942bfdc330b7e4
RLBA-2024:3828
libappstream-glib bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libappstream-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libappstream-glib package provides GObjects and helper methods for easy manipulation of AppStream metadata. It also provides a simple DOM (Document Object Model) implementation that simplifies editing nodes and converting to and from the standardized XML representation.
Bug Fix(es):
* flatpak / appstream compat issues [rhel-9.4.z] (JIRA:Rocky Linux-34564)
rocky-linux-9-x86-64-appstream-rpms
libappstream-glib-0.7.18-5.el9_4.i686.rpm
82affb4d025712a8fa3a8ecd7c6af8c2d544c5b40be92dbd17a367259c8b8bc9
libappstream-glib-0.7.18-5.el9_4.x86_64.rpm
b0f2a36b7271c2c10a2baf46368b465ba86cf38a44a7cd009334926de8a7d58e
RLSA-2024:3835
Important: libreoffice security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185)
* libreoffice: Insufficient macro permission validation leading to macro execution (CVE-2023-6186)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
autocorr-af-7.1.8.1-12.el9_3.noarch.rpm
94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737
autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm
163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce
autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm
1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea
autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm
ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be
autocorr-da-7.1.8.1-12.el9_3.noarch.rpm
e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49
autocorr-de-7.1.8.1-12.el9_3.noarch.rpm
63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457
autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm
07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55
autocorr-el-7.1.8.1-12.el9_3.noarch.rpm
fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382
autocorr-en-7.1.8.1-12.el9_3.noarch.rpm
5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997
autocorr-es-7.1.8.1-12.el9_3.noarch.rpm
75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe
autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm
ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5
autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm
179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f
autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm
9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c
autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm
fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404
autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm
9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c
autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm
2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d
autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm
cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83
autocorr-is-7.1.8.1-12.el9_3.noarch.rpm
ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357
autocorr-it-7.1.8.1-12.el9_3.noarch.rpm
8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b
autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm
3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493
autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm
62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363
autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm
a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1
autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm
cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5
autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm
ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861
autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm
9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b
autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm
91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35
autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm
467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586
autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm
b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38
autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm
66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd
autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm
4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2
autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm
55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882
autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm
e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7
autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm
ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331
autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm
fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227
autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm
937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489
autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm
3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034
autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm
9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726
libreoffice-7.1.8.1-12.el9_3.x86_64.rpm
3b007614e5eaa178ae3b2fb7b4e5d52affdcc8ce7b32334af031b4541372c451
libreoffice-base-7.1.8.1-12.el9_3.x86_64.rpm
7a2e37f8b579edf2a0cc268a881d9f3db1e1bab92b2961980529c857f1dc2b4c
libreoffice-calc-7.1.8.1-12.el9_3.x86_64.rpm
c1a39798dc0e7b7e20854fbff8ccdae8f8c05524f7235678764b29bbef28d314
libreoffice-core-7.1.8.1-12.el9_3.x86_64.rpm
defe4837af0860a50f550d583b1baae14a54c40372d80c7edfb2901cbbcb0850
libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm
b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4
libreoffice-draw-7.1.8.1-12.el9_3.x86_64.rpm
6d480226de9426ea7e0a145c03d06b19d5b2c557ebb836d9512f0b00b2c7ef53
libreoffice-emailmerge-7.1.8.1-12.el9_3.x86_64.rpm
67e4b5a25152e114e114b9c5d4bb8f959d1c15582c881a3df01f1e2444e74bd7
libreoffice-filters-7.1.8.1-12.el9_3.x86_64.rpm
872d04fbb4a5291a7e84a15912239f1c0d29f428433e7d6dac741de827d7e42b
libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.x86_64.rpm
a0f2ab7cf11da3d14c26cd17196c363e8a5251dca195eb15c8e44467e0516dfb
libreoffice-graphicfilter-7.1.8.1-12.el9_3.x86_64.rpm
b719c941297184f1d4b53ac750fba44d09265c4385b21081fd3b0863aeb51805
libreoffice-gtk3-7.1.8.1-12.el9_3.x86_64.rpm
6ef64505946594c77cfb2a58f82f4aecfe5468fb8d76c81dd493701e1ec2ef01
libreoffice-help-ar-7.1.8.1-12.el9_3.x86_64.rpm
edae8ed15813ce9cdb66a8bbc57b97dfb5433153b128e3a35f578ef9a18ee35e
libreoffice-help-bg-7.1.8.1-12.el9_3.x86_64.rpm
ff411704fefa4fd8ce9637160818aa24b8ec0d27483cf217db3d83281880e44e
libreoffice-help-bn-7.1.8.1-12.el9_3.x86_64.rpm
6c9e0ffdf0270aa16b08ae8d050a9bfc9fa923c47f05f8434f42bbaea4edab83
libreoffice-help-ca-7.1.8.1-12.el9_3.x86_64.rpm
6ac84f94f2fb91ad96ee1c44ac13bd8eaa30009b313032906fb466c787d2b723
libreoffice-help-cs-7.1.8.1-12.el9_3.x86_64.rpm
203491ae107d006a937324dfdc32962b9457d202a0b8b9d8197bb0f4eebe7391
libreoffice-help-da-7.1.8.1-12.el9_3.x86_64.rpm
581ee6b92391fe5c13b0fc88d8b11788a115dc67d3a7673573af348cd4c644d4
libreoffice-help-de-7.1.8.1-12.el9_3.x86_64.rpm
87288636830760d45187c312e9182f3c745a27ebccbb671faa5addc174a14516
libreoffice-help-dz-7.1.8.1-12.el9_3.x86_64.rpm
c058c80cb044c44d8d81938b8b94d9d9c8a5dd11847706f6c6c89701d5be58be
libreoffice-help-el-7.1.8.1-12.el9_3.x86_64.rpm
605c512db8f88336560af12f84062384009fd62110ebfdea14fd7e202d14dfbe
libreoffice-help-en-7.1.8.1-12.el9_3.x86_64.rpm
55e335a10351e10cd45a071b74bf7ad354f09522dd01c2b458bfcd225e174b0a
libreoffice-help-eo-7.1.8.1-12.el9_3.x86_64.rpm
729bb79cd7ec0f2cf71b9e28f3498efc558b8b8535d6607bfaabe053b791ccd7
libreoffice-help-es-7.1.8.1-12.el9_3.x86_64.rpm
149a86d49f456841d28e15c713c5c07c1e6d1e227167efee781f332220a9cdfe
libreoffice-help-et-7.1.8.1-12.el9_3.x86_64.rpm
2efc8d79069a924acbbf0e70bb6e84c545a6207a5ed1f56b48b93898bb22bc3c
libreoffice-help-eu-7.1.8.1-12.el9_3.x86_64.rpm
1929b55d48ae4aab894376481d658c186dad56274f4b7709e410d77cc7daa1ab
libreoffice-help-fi-7.1.8.1-12.el9_3.x86_64.rpm
e6949de4baccefcf1efce15b0bda4ee58ae8d897fb1e225e9a1989ebe9fec204
libreoffice-help-fr-7.1.8.1-12.el9_3.x86_64.rpm
71152131cbe8f194752c89479502fd2611a1bb3228844aa14214c832d1884c19
libreoffice-help-gl-7.1.8.1-12.el9_3.x86_64.rpm
907533153ae0e562798dd75c3e07a973deb1e43377dc9f04ccd120cc1827ccf7
libreoffice-help-gu-7.1.8.1-12.el9_3.x86_64.rpm
14abdcc657c431de56204ba02719b570f289369cb824115657855bad9c4607b7
libreoffice-help-he-7.1.8.1-12.el9_3.x86_64.rpm
77c45ceb9e369e656bbe4cd1c93c4dd895e4ad485d21d0c9c90b2c168546edb4
libreoffice-help-hi-7.1.8.1-12.el9_3.x86_64.rpm
120a49cabcbf1c05cf251b14e62b5b52877141fe97107e7919a0476b1b626d4a
libreoffice-help-hr-7.1.8.1-12.el9_3.x86_64.rpm
6934cb6025cdf13855a8fcfbe8704a4ca9d11b03bcb36bcafa380f89f4d98da5
libreoffice-help-hu-7.1.8.1-12.el9_3.x86_64.rpm
9d48ad8562bc5127dbec7f029115f9f50dad01392c448ad2fabaecb13cb06de0
libreoffice-help-id-7.1.8.1-12.el9_3.x86_64.rpm
705dcd1856ffeba4483ae40d8685c64db721d61b2fe4ccb78e5eeb65cd801fec
libreoffice-help-it-7.1.8.1-12.el9_3.x86_64.rpm
24af6d4bf1523fb9745c184f57abc17571c134242dc17f883d033fa74138c10b
libreoffice-help-ja-7.1.8.1-12.el9_3.x86_64.rpm
8982bced28eb643c7f82e50a07dfa4716ddd25d6b1b2e1a4974022d3ed758e54
libreoffice-help-ko-7.1.8.1-12.el9_3.x86_64.rpm
7398c811ceee906274ed8ed4ba655236db15c22dcd0b043da39013224d79e221
libreoffice-help-lt-7.1.8.1-12.el9_3.x86_64.rpm
26d0b27d3dddeadb15da7c57084bbf7b48c9d54a459ae9749cc60a8be4914806
libreoffice-help-lv-7.1.8.1-12.el9_3.x86_64.rpm
986c8e4a98ffa2501ae6a37138eb4a26c58a28241a171db5bd17763865dbe507
libreoffice-help-nb-7.1.8.1-12.el9_3.x86_64.rpm
61457b58ebe8e41fbbae2519a7cf29c7d87246ffbd72ae2ecfc849381b0f5eb8
libreoffice-help-nl-7.1.8.1-12.el9_3.x86_64.rpm
00967e74c4984057a4e22eae84bcfc15a066853a387b6a982e9f4de0dde01506
libreoffice-help-nn-7.1.8.1-12.el9_3.x86_64.rpm
e544721d1f38c85ac6aba372e589ee465bbad9067b074db63d7cc5815aa59ad7
libreoffice-help-pl-7.1.8.1-12.el9_3.x86_64.rpm
e4d45852241f749224307e98236b63f08532ba04b12244df7b2567bcf9d93610
libreoffice-help-pt-BR-7.1.8.1-12.el9_3.x86_64.rpm
bb9528834fa613f23d08d1e82777960097037d2d995545a3fb2ce11ab2fe2638
libreoffice-help-pt-PT-7.1.8.1-12.el9_3.x86_64.rpm
452d167270c52c99a8c25640c2d8ead4a9b0b2a8f1c1d83e293cc8a17210a9df
libreoffice-help-ro-7.1.8.1-12.el9_3.x86_64.rpm
ea828a38d0e5c9fc0b4ae7116628c64a4a8353d9d48ee11dcb9c1ed326e76baf
libreoffice-help-ru-7.1.8.1-12.el9_3.x86_64.rpm
31657a2f599f1e7286b7cc4bb2eafd6125245f1d6aea83b5ab15c6d741294739
libreoffice-help-si-7.1.8.1-12.el9_3.x86_64.rpm
892aee24ff33c275c10fd728eecf7ac932de0aa589fcfb47e842a9374cba923f
libreoffice-help-sk-7.1.8.1-12.el9_3.x86_64.rpm
2c3eca7560b89b470d82f353ee27ed82a19219c19620367d8ed28bc818e25215
libreoffice-help-sl-7.1.8.1-12.el9_3.x86_64.rpm
c7c37588be0e709c04dc8c8a301172f3df8c3c8809f9264f54329f9fb1ca3181
libreoffice-help-sv-7.1.8.1-12.el9_3.x86_64.rpm
eff99b7115f8d9e13251d2375a2a07a605628729e749d0109c42b2b22332942f
libreoffice-help-ta-7.1.8.1-12.el9_3.x86_64.rpm
2cf6165514f7e7fbc17ed4fe85f2b9a3de40c4e844ba7f85e70ffebff92bcdfd
libreoffice-help-tr-7.1.8.1-12.el9_3.x86_64.rpm
5ffc530e9dd2e8500a9a6a3947f039de3518b150278007589a87a52d308c9ece
libreoffice-help-uk-7.1.8.1-12.el9_3.x86_64.rpm
cbcd6bfa60cafb5b4f5b578b8af71eecbdfb5891102e8146632a3eb9599ce03a
libreoffice-help-zh-Hans-7.1.8.1-12.el9_3.x86_64.rpm
a6f5f71d104150101542d65856c74fd2995c84c83e3830dcd76ce722fdbfdc45
libreoffice-help-zh-Hant-7.1.8.1-12.el9_3.x86_64.rpm
d04131a391c93176bca70447e21f2c8c2010499764e4f97426d25495e552387d
libreoffice-impress-7.1.8.1-12.el9_3.x86_64.rpm
2bc5920832366c0d025ed7410c86661547e7e14d19c07c85b14e27f2509e622d
libreofficekit-7.1.8.1-12.el9_3.x86_64.rpm
fb628c10f9b5e589c243078c3cb0b4b2ce95eed26c31dd7f2405e3eaa8497999
libreoffice-langpack-af-7.1.8.1-12.el9_3.x86_64.rpm
dd6903527bad534824952550c3645692f8f7cf1be84e54c1aad982ce27123d60
libreoffice-langpack-ar-7.1.8.1-12.el9_3.x86_64.rpm
648d5e7ebc93e0401fac229a1670173c32e0e81c85cd9c1b4ad580ca15f522cc
libreoffice-langpack-as-7.1.8.1-12.el9_3.x86_64.rpm
14572dcb3e9ba281b42e26df5a4dd50f69e995ad36b82ff4881fbe287d2de760
libreoffice-langpack-bg-7.1.8.1-12.el9_3.x86_64.rpm
ec806b8c1fb72b136595908f40ca61b2239eace212514bb19dc84b3a860c02d4
libreoffice-langpack-bn-7.1.8.1-12.el9_3.x86_64.rpm
f1a83fe5390e44010178d2ee5c561142a208793b21915bf8b3190f3af6e0fb06
libreoffice-langpack-br-7.1.8.1-12.el9_3.x86_64.rpm
dfb03536f3cd50fb0d570df177e1ddac218913be607cb89d46e50a385b7cc87a
libreoffice-langpack-ca-7.1.8.1-12.el9_3.x86_64.rpm
5ab04ead959db79ba526a67335819ee99938707923bab238a215108d6cace824
libreoffice-langpack-cs-7.1.8.1-12.el9_3.x86_64.rpm
d9a5488e721ebb79110e8eaf5bdf6701b4f24d7c109d447bacd59b014dcce4e5
libreoffice-langpack-cy-7.1.8.1-12.el9_3.x86_64.rpm
4ba0f191c99b28abf523fdea8aab0e9956fd0ecb35752ec61d7b09bcffa9a84b
libreoffice-langpack-da-7.1.8.1-12.el9_3.x86_64.rpm
846cfc9439d2f759a1716d16b799d6dd66954587f6a0d9c885d974f34a548be0
libreoffice-langpack-de-7.1.8.1-12.el9_3.x86_64.rpm
315b66d0dedfc99362ef096b861131b9f040084697468f6839ab0685aa0a35f6
libreoffice-langpack-dz-7.1.8.1-12.el9_3.x86_64.rpm
1e769329b00284a8245a319b1f2c4bc0b91374f374def911cd7191694f44db58
libreoffice-langpack-el-7.1.8.1-12.el9_3.x86_64.rpm
31162f0ba952df5b471c35adf729364c4b2db46d8662aa86e98458126e145628
libreoffice-langpack-en-7.1.8.1-12.el9_3.x86_64.rpm
75d5b44166445959a9ad4fafbf16d7d95f30f49cd83de48fb1489dd68cbcee77
libreoffice-langpack-eo-7.1.8.1-12.el9_3.x86_64.rpm
2cdd452acf0e97a7e5fc83bd4a8f7f5dfcc1e71e0ead6695ccf9c8cce9157402
libreoffice-langpack-es-7.1.8.1-12.el9_3.x86_64.rpm
4cbe590e4a7a475d2d21b1367bbb4ea1916cad174052e1936368642f31b72be2
libreoffice-langpack-et-7.1.8.1-12.el9_3.x86_64.rpm
da7abdc97fcebc3a4a34741903ca8c397c1149cab390ee5b35b7af3d0faf9eb7
libreoffice-langpack-eu-7.1.8.1-12.el9_3.x86_64.rpm
e8570e8430c17c2e3cadb2abe02c7b7eb2a3478cec8cb26d409ae411b1e86b4c
libreoffice-langpack-fa-7.1.8.1-12.el9_3.x86_64.rpm
02704ccf3ab7a5b28cb2dfe422742ad0cfb0d8d18b839d3f172b0f06054e2afb
libreoffice-langpack-fi-7.1.8.1-12.el9_3.x86_64.rpm
196c3db1b862f7b5f6171a1d105b5232c075f1f9ed623019036eaada06a7f13b
libreoffice-langpack-fr-7.1.8.1-12.el9_3.x86_64.rpm
f92ae0215723d0121922417fb50fd0d11d341f81879f4ffa9add8aaf8ec5af80
libreoffice-langpack-fy-7.1.8.1-12.el9_3.x86_64.rpm
7b42d16e9fc31050d25410bcdf713e0f31d8b5606bb387b8be0114e06101d6a0
libreoffice-langpack-ga-7.1.8.1-12.el9_3.x86_64.rpm
005dfa9de5794badb471c6e34f5f7c5aaca9da04679b7a25923117552de83298
libreoffice-langpack-gl-7.1.8.1-12.el9_3.x86_64.rpm
c436cf1f51b67d7d4997a07c31fbfc6a6da29d870f78dc84921276b3ff2590b4
libreoffice-langpack-gu-7.1.8.1-12.el9_3.x86_64.rpm
f1c4542711028aa490ed4109c50768cbca13600704f9dbdb7f7c8a21febbf962
libreoffice-langpack-he-7.1.8.1-12.el9_3.x86_64.rpm
c1a94538c22b46021b9d287aedad9a73870aabe21ff0004a70a320358997e625
libreoffice-langpack-hi-7.1.8.1-12.el9_3.x86_64.rpm
759e0e55f7105462015735d1a7873e435c64d2208ebc73c73e642dc271a0020a
libreoffice-langpack-hr-7.1.8.1-12.el9_3.x86_64.rpm
cbe336330e236d51ddbfb3853fea61d75b41bf7d2232ae32934116bc55fc0792
libreoffice-langpack-hu-7.1.8.1-12.el9_3.x86_64.rpm
cb6253e301cd16faeddec6f0aa53d1346f5dad15f9e62ff649b4f27c1c3899a5
libreoffice-langpack-id-7.1.8.1-12.el9_3.x86_64.rpm
09f9ed7e02b94fac3cfe3bc43df7cf1e7b4205a5ae89dc864ec2249a811a55fe
libreoffice-langpack-it-7.1.8.1-12.el9_3.x86_64.rpm
20dfce56504e83a91661bf04eff946b470b573c0c250f60d54e7c28709086737
libreoffice-langpack-ja-7.1.8.1-12.el9_3.x86_64.rpm
0ff735a141830ad0dc60062fbdbe182307988791c90b664f7bce15fdda1fc517
libreoffice-langpack-kk-7.1.8.1-12.el9_3.x86_64.rpm
e1a10941dbcd8f04535cf5c6cbc6fbb6f94ddf0d3bb3b2ba0e1d930bd3530aa8
libreoffice-langpack-kn-7.1.8.1-12.el9_3.x86_64.rpm
2cca31cf47ecd15ad2a7a69dfe66a10de5a378b5f6bfca81c7a7689092452951
libreoffice-langpack-ko-7.1.8.1-12.el9_3.x86_64.rpm
6c9e30f870549bca436ec3529b9885e89c2ad27072572dd257bb507674af05e9
libreoffice-langpack-lt-7.1.8.1-12.el9_3.x86_64.rpm
f6debf4263ee90e562069aea0fb0046e010cb66a6a1d943896bae4a3a16310e1
libreoffice-langpack-lv-7.1.8.1-12.el9_3.x86_64.rpm
e1a1b5a6eedf988f8e46fed9e8df5f6b756e49b92227af60cd2871a6fac2860a
libreoffice-langpack-mai-7.1.8.1-12.el9_3.x86_64.rpm
cade1ab94c2f7931f0d1bf91a35bcddec0c34b20a333335f4c8188b03b672f6c
libreoffice-langpack-ml-7.1.8.1-12.el9_3.x86_64.rpm
0a893756bd9595926c491eacf653940676e35ddaf5259c52571f06ff5bbb221f
libreoffice-langpack-mr-7.1.8.1-12.el9_3.x86_64.rpm
c7853c306be5d9962c5d9a7f18fa47e8514f07b6b8f697d7d36eb21e4cbd8be6
libreoffice-langpack-nb-7.1.8.1-12.el9_3.x86_64.rpm
8909fdac1b19337ce04cfbc6a2ca8934fe35c1159de7bfe6fb6a49dc8e8500e4
libreoffice-langpack-nl-7.1.8.1-12.el9_3.x86_64.rpm
231cc18b1fe8e285bac2a6df7117d0878b5f20f07f5571c34aa408ba6cbdb5ff
libreoffice-langpack-nn-7.1.8.1-12.el9_3.x86_64.rpm
a1eaadad92b435047fc20640c2edd5b94cb768b031928a3ba24cc75e6ce4af12
libreoffice-langpack-nr-7.1.8.1-12.el9_3.x86_64.rpm
f6f8de0a1e1bb6ba11b7614d9c18251a48a79188771000646542097fa4a9cde4
libreoffice-langpack-nso-7.1.8.1-12.el9_3.x86_64.rpm
23eafa8eaba79c5f4a6a8acc444892b998dd2f75a2f4d5be001ab3a651455910
libreoffice-langpack-or-7.1.8.1-12.el9_3.x86_64.rpm
5bbb9b4f6ce7dde5a942a94011d103cc075ca3426a1582261411f049f674bb6d
libreoffice-langpack-pa-7.1.8.1-12.el9_3.x86_64.rpm
57e0b2ce0155b5620d85d7bcfd633418744f61ebbb468ae377ebc3ff6ae1b270
libreoffice-langpack-pl-7.1.8.1-12.el9_3.x86_64.rpm
4d6cc29b8fa5c1853085d4735575dd3c62e5cc8a2e50a50dc2e4a88ec28188f8
libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.x86_64.rpm
5b4d4ee16c5e66cc6b98e356ea7105c5a0c08aa1dd1bebdb2898d4ce439edbc5
libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.x86_64.rpm
1b629f66b03552eeeb6a500b46dfecfae76119229c166567ee115c931588ea99
libreoffice-langpack-ro-7.1.8.1-12.el9_3.x86_64.rpm
d7af8d5f680d9f502e4ec6ffc75b0a14dc5c1ad377c3679ac455f6c25f6d0355
libreoffice-langpack-ru-7.1.8.1-12.el9_3.x86_64.rpm
8086870fb525f10500696170bc206039c38d6744774b7af4868ec480959a1bf8
libreoffice-langpack-si-7.1.8.1-12.el9_3.x86_64.rpm
7e897171407e7478e36a86ee8ada32ad5a0e0507c23d82f8eee39403a2856fd1
libreoffice-langpack-sk-7.1.8.1-12.el9_3.x86_64.rpm
0adc158e16e36e60c5fc66c8518296bc68e8311bc1686f589567dfd55035d0c3
libreoffice-langpack-sl-7.1.8.1-12.el9_3.x86_64.rpm
b99372c73e8bef38b212af800ccba4a22f8efed7bef91a67b7135c17b76bb1e7
libreoffice-langpack-sr-7.1.8.1-12.el9_3.x86_64.rpm
c0f212297d79bd172437f73b1f1dfa434aca9d51608b3cfef4c34267086890fd
libreoffice-langpack-ss-7.1.8.1-12.el9_3.x86_64.rpm
3332e42f61d80e273d01e9d3cb92f4fca22b5e21afbdc859f9f33c5e0dce3502
libreoffice-langpack-st-7.1.8.1-12.el9_3.x86_64.rpm
030a7d055dae13c3a864cd508367cb27271eca8a7448a3c76a2dedefa3cdea56
libreoffice-langpack-sv-7.1.8.1-12.el9_3.x86_64.rpm
9fc84dcdfab03a640098e930b2c120db8bf37257d9fc35b786ac29d0f977c797
libreoffice-langpack-ta-7.1.8.1-12.el9_3.x86_64.rpm
0fa9a579b7d22488df8f878f691b3914e4294c15d68038db2348c80aecc4cb34
libreoffice-langpack-te-7.1.8.1-12.el9_3.x86_64.rpm
d49397b7bb1159ab891a04429fe1468aff45b82a7330e9acbf60fbec1c1cfb6b
libreoffice-langpack-th-7.1.8.1-12.el9_3.x86_64.rpm
65e01a398a458afd6745d577d93ccb7d63cf04283c6075866ae24385909460c6
libreoffice-langpack-tn-7.1.8.1-12.el9_3.x86_64.rpm
62759c725760988d9badbcf8a1b967ff8eb8bf9b5fbeac86160d4fb95869d488
libreoffice-langpack-tr-7.1.8.1-12.el9_3.x86_64.rpm
6103bff2a92ea2ec7078068295535cf1f3c326bfaaa382f2adb1cd11924ab824
libreoffice-langpack-ts-7.1.8.1-12.el9_3.x86_64.rpm
7156148d5ada6371f0516ed49f0cbe28b176dcf593aa799f707becdd2461e08f
libreoffice-langpack-uk-7.1.8.1-12.el9_3.x86_64.rpm
78f3a777a2c9b488516ca67f58a61a685c927fdb0a36ca57ea368c366b020b2f
libreoffice-langpack-ve-7.1.8.1-12.el9_3.x86_64.rpm
ee0708bec78003b4b38abeb5bdb7aae014376f04487d541124c103ffbe7180d4
libreoffice-langpack-xh-7.1.8.1-12.el9_3.x86_64.rpm
c1ee759578fd5c06a2129d33697feff8bdbf9b8fb320dc06a1ac83f02fb9ca6a
libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.x86_64.rpm
8e0b913da560599adeb90382895aef66e108953d57cf819db4820e60d3bffa35
libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.x86_64.rpm
29a22765289af180eb801eb293454de8fa7b67c46fc76e733d5de8a609659d46
libreoffice-langpack-zu-7.1.8.1-12.el9_3.x86_64.rpm
55d60bbddbb80680ea3927c2a710dca3520c105f8e1f2e1f2d6064d3fcd80ee3
libreoffice-math-7.1.8.1-12.el9_3.x86_64.rpm
267df3773c76b5ce5f5d225d659320c94043189473bd4ba394dc8d198a16aab4
libreoffice-ogltrans-7.1.8.1-12.el9_3.x86_64.rpm
eb2f5d842ed71c65cf0fd37000b5a27c846fbcfb1d9b7540714aa8722c0a8d68
libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm
ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb
libreoffice-pdfimport-7.1.8.1-12.el9_3.x86_64.rpm
678037a00bdc2615f4137c5830326802e6dfb96670ea2cc68faca6c5fff40a09
libreoffice-pyuno-7.1.8.1-12.el9_3.x86_64.rpm
332225a144e36b99b9819e6cf056fea3e25bfbfd29d231d65b110513c98817c2
libreoffice-ure-7.1.8.1-12.el9_3.x86_64.rpm
9d0275c9cf7a9b7500f3a405035517050f78eda7dd06e2f52adbfe86926f5a47
libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm
4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e
libreoffice-wiki-publisher-7.1.8.1-12.el9_3.x86_64.rpm
34258e9883016657df63da8e0c1ca0dbfbc0edfe0294c552e834e2960376edfc
libreoffice-writer-7.1.8.1-12.el9_3.x86_64.rpm
30215083d14d035af679fe90544046ea209143f6ea9d1966a9f96682a45003e7
libreoffice-x11-7.1.8.1-12.el9_3.x86_64.rpm
73e149835749d2cb85a7a24934cd902a9e870b1aacc29e8dc4260fc63ef03fbc
libreoffice-xsltfilter-7.1.8.1-12.el9_3.x86_64.rpm
34094baed579d9b763243c49b110fe20fbc4e08f2053c6dc940c778cc7fc438d
RLSA-2024:3837
Important: 389-ds-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base
packages include the Lightweight Directory Access Protocol (LDAP) server and
command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657)
* 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.4.5-8.el9_4.x86_64.rpm
b8756f05830f380a313e3d6198721803cb11cda009f2f7dc8a877dad005705cf
389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm
da228036f4e3ac4c0caf048dadbcab01e2f2f8b8f85df9ad256952aa1c2d7a81
python3-lib389-2.4.5-8.el9_4.noarch.rpm
27d33a2d083349a174462ec9dbd80cea7888b4bb05ae832ba2e68564415fc113
RLBA-2024:3839
ostree bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es):
* [9.4.z] Update ostree to 2024.6 (JIRA:Rocky Linux-36770)
rocky-linux-9-x86-64-appstream-rpms
ostree-2024.6-1.el9_4.i686.rpm
6629df6cf0d37bcf958d0a8d7d1e8788cc412784418ca699c40a1265aa60bd94
ostree-2024.6-1.el9_4.x86_64.rpm
6b06ed7e922091d161692df8ff681289aabd106adbf006bcaafe9ee623a66da0
ostree-grub2-2024.6-1.el9_4.x86_64.rpm
6eb38ee30f1e37584f0a3182d721f4c0e329a13fa23dfb9b8da538dee985590c
ostree-libs-2024.6-1.el9_4.i686.rpm
a97ae2035c1880127b8282ec6284448897f8981cd6ad2750a5f6baebd864d01c
ostree-libs-2024.6-1.el9_4.x86_64.rpm
52496f99f011314cf21e5543ce8f43a1f34d1594a8d7127c998d17bde64fb835
RLBA-2024:3821
socat bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for socat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets.
Bug Fix(es):
* socat: Fix peername segfaults in rhel 9.2 EUs/TUS [rhel-9.4.z] (JIRA:Rocky Linux-32914)
rocky-linux-9-x86-64-appstream-rpms
socat-1.7.4.1-5.el9_4.2.x86_64.rpm
1e10b565cfd9babf425bd1dd43cebfade3218b7b14fa18fcb7dcfa39996b08de
RLSA-2024:2888
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.11.0.
Security Fix(es):
* firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)
* firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)
* firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)
* firefox: Cross-origin responses could be distinguished between script and
non-script content-types (CVE-2024-4769)
* firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)
* firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and
Thunderbird 115.11 (CVE-2024-4777)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-115.11.0-1.el9_4.x86_64.rpm
ddd2d85b5e10080fb2d35273ec7e6561093609cef605cce7b54ff848cf7382ff
RLSA-2024:2910
Important: nodejs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: CONTINUATION frames DoS (CVE-2024-27983)
* nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)
* nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)
* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)
* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
nodejs-16.20.2-8.el9_4.x86_64.rpm
ba4435a0a301b3388b63ed65f33614083a096496d1639aafe430601995bc86d3
nodejs-docs-16.20.2-8.el9_4.noarch.rpm
09a2e8c6e0929017820d939fa8c48fdea93a67d78060a5cb8da61b72c4c06df7
nodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpm
5de7fc167a4336eb263f665b9b0758459213c95f6ee82417484ef92a96333307
nodejs-libs-16.20.2-8.el9_4.i686.rpm
489ea0dcd26257d575d9711347f2cb3a7acebeda23cd3d739597bff888363c9e
nodejs-libs-16.20.2-8.el9_4.x86_64.rpm
2427bf82b879735c9c42ac58ee45fbaf4a18e2aebd84943726bdecaa32978a30
npm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm
65f31e4308c217c1fc832ac5a77f0580514bcbc3dc42039eab756d73bb777ef1
RLSA-2024:3307
Important: tomcat security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)
* Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672)
Bug Fix(es) and Enhancement(s):
* Rebase tomcat to version 9.0.87 (JIRA:Rocky Linux-34815)
* Amend tomcat's changelog so that fixed CVEs are mentioned explicitly (JIRA:Rocky Linux-35328)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-1.el9_4.1.noarch.rpm
6486789bfcd216dbb9ebdbd11c28bf8d9458d90e8687aeed1235609a8da810a0
tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm
1277125340b2842599677ece2535b2fb701affd6bf0c4a3f7e6dcf879ab7faeb
tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm
5ce465ed19e7ce0b812c9aea3dcf8fc7b0a82292b0b1ac6e629bd824b028fed5
tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm
b31abda8887f5894fae36a62c1e7b18a6da44be8bfdf789da4d8c99c01e1b5e1
tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm
b64ccb24a1da24c847f3cc1dd0cc66a2ec7ee73014e8f0010e287c6d8ac5b4c8
tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm
68f1dd7964f37139dc3c4a996aaddc3fce54c1d587908638e92ce05b4497e4e7
tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm
312fdf6582a67bc6834d115199fbcb524b1559fc114a9691d4a7cb5e4a326429
tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm
cf07d722e87a9c544a5c9197e64818851479efabb085a268033b58296734333f
RLSA-2025:15700
Important: cups security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
(CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-2.3.3op2-33.el9_6.1.x86_64.rpm
02c72acb313ce5fff773ab3b19042a42b3f56004e347f4c8e406299ccea000f6
cups-client-2.3.3op2-33.el9_6.1.x86_64.rpm
d0d73251aa30000866227b265c71218df6a7c90c65d54758011148365c504dd3
cups-devel-2.3.3op2-33.el9_6.1.i686.rpm
253551848dcb5ab0206f56692d70c77ed70b29c682dd2f87bc69506b165369e2
cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm
95c47135f442873b43d691c6602754ac78045fbdd69ab84cc5847842b916e511
cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm
5e8a80f892d7d9d90dd1e704de71f5174bc2972b3f858b6f085a791e852079c4
cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm
7870265e380826c8b56443580015e55b93e82fc9a2189d9241f8bf5cacd0a2e2
cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpm
09ab45ad90633975ddba630660e22211b85a66b9d9eb0a432ce6b9da89eb5a27
cups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpm
989754b505c71927647ba70912514fd8daa11eee0ba810c9b5dff73691906134
RLSA-2025:15887
Moderate: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.127.0-2.el9_6.x86_64.rpm
cca51d06c8ae0dccaa67c0546659aacb29915821eaff018f8e5b80e5593c2aed
RLSA-2025:15900
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: Podman kube play command may overwrite host files (CVE-2025-9566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.4.0-13.el9_6.x86_64.rpm
d94fed2b255a77f5f3f94c88e598fd44b8ab9df19f809fbefc477184ad8ca9c7
podman-docker-5.4.0-13.el9_6.noarch.rpm
66448fa4b091f4769a597fe67ed0f525c8d009ac8a2d4aabf6b0e464077f93d9
podman-plugins-5.4.0-13.el9_6.x86_64.rpm
c7b6e5c6fea3eefcc598915007f3a2385c18900363aacdf6ead8d1d7fead170b
podman-remote-5.4.0-13.el9_6.x86_64.rpm
be4872257fd8e16b7bc3b1371b9ef6958c777baf8d637fc9dee5838352f65093
podman-tests-5.4.0-13.el9_6.x86_64.rpm
0a751a6acb31f3d9cd9f1adb4dac0066918e6fe75594cbb899c65247a65268f1
RLSA-2025:16086
Moderate: mysql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
* mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
* mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
* mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
* mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
* mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
* mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
* mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
* mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
* mysql: Replication unspecified vulnerability (CPU Jul 2025) (CVE-2025-53023)
* mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
* mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mysql-8.0.43-1.el9_6.x86_64.rpm
e002af06da4db3aa703799331daa54c9eaa3aa4073fa3b021bdfe2ab2dd82fd1
mysql-common-8.0.43-1.el9_6.x86_64.rpm
610fa74705912a3f6f9f4863977dbde64f4af34e5100e4f1e70ac0507cc2ffb4
mysql-errmsg-8.0.43-1.el9_6.x86_64.rpm
57f2a6bbf757ab40dccfcb24497570235929a7515279622ad911269d167e2bc0
mysql-server-8.0.43-1.el9_6.x86_64.rpm
d34eb3941d4dba2fd36760f7f6a097fb9d5881ece5fccd6cf6e773af3b97f81b
RLSA-2025:16108
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527)
* firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532)
* firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528)
* firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537)
* firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536)
* firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.3.0-1.el9_6.x86_64.rpm
85eb13dcd8d34c3cdb4505827b98bc8f7093e379bfe303d8dacb4ec2099372f1
firefox-x11-140.3.0-1.el9_6.x86_64.rpm
5d3763723dcc0fcc2d6c4869143af25cc177d8378e1cabd7fb7851212e5b65bb
RLSA-2025:16116
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gnutls-c++-3.8.3-6.el9_6.2.i686.rpm
bd15d431f239626cca530608ae08193f43066f2ef674a1fd2a5f67a95d5bd6a6
gnutls-c++-3.8.3-6.el9_6.2.x86_64.rpm
58224090b198941d915fb9476f3c1fb45a6545603ee6244845d825b1d05e12dc
gnutls-dane-3.8.3-6.el9_6.2.i686.rpm
0ba13721b25926414d7098f5835eb94a44b54df825f75e7b2eff0128975b2d7d
gnutls-dane-3.8.3-6.el9_6.2.x86_64.rpm
609151b097449dfd3da8fe254731f887ddd30d81636a6aa78c208ab1707ef0ac
gnutls-devel-3.8.3-6.el9_6.2.i686.rpm
e10261d8158721ad5c7a8f48c34eb5924b20cac42c28b38a2c107c790d63a655
gnutls-devel-3.8.3-6.el9_6.2.x86_64.rpm
7ec3d3def423a0bb8df31bbeabe6edb921277f096d8a9075907f34162a0daa26
gnutls-utils-3.8.3-6.el9_6.2.x86_64.rpm
526692613d58edd662978f078f8e519ccaf5ab40bab17e3028a7846ccb0c98dc
RLSA-2025:16156
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527)
* firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532)
* firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528)
* firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537)
* firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536)
* firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.3.0-1.el9_6.x86_64.rpm
a7372d46d948151dbfff18d7f648bd9161e71ce4d7b447eb770056dd7531b714
RLSA-2025:16880
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm
8b0de631dde2fe199660595d727913dd4bc49c022e381b5ebf75b9810fe058b7
kernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm
893dd2163a9194f804ddbbecdd663aac55ab7a573c11ec20fc70b4d2fe30101f
kernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm
6a71325d1e3793b51ba9cc975d92021e16d8e9a0f27dbe6236ca33116c6d54ad
kernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm
ca23b5631ad6b5e3fcae960f6a439828d67dce752d136b4d214596110f2dca68
kernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm
c0858a8abdf5178c4d1147ad84829c2caffdc0c8437536a66786a18b1d26012d
perf-5.14.0-570.49.1.el9_6.x86_64.rpm
11827dc402dce2d4b5306b5e67b32953d1ed64ea9b68a8c83ae81fb6e7955e2a
python3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm
ebc92c018aeba567287b9188ffaddc138e1aa6657199059d579a6b5597f96aae
rtla-5.14.0-570.49.1.el9_6.x86_64.rpm
df6a16cdddc7e5691b91b91116ddbc4b8d4b9e4082a438b6356d1a6e2aefc97d
rv-5.14.0-570.49.1.el9_6.x86_64.rpm
50a420c1b40c5702e431eef04a7982cac91cefe4833a95574d54eb7594fe6567
RLBA-2024:3822
qemu-kvm bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Bug Fix(es):
* qemu-kvm running Vyatta hits assert when doing KVM_SET_GSI_ROUTING [rhel-9.4.z] (JIRA:Rocky Linux-32837)
* qemu crash with kvm_irqchip_commit_routes: Assertion `ret == 0' failed if booting with many virtio disks and vcpus [rhel-9.4.z] (JIRA:Rocky Linux-32990)
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-8.2.0-11.el9_4.2.x86_64.rpm
b437690b8d37c52e2e03606e58b909ff76a36be232b5fbc00276988f2916a921
qemu-img-8.2.0-11.el9_4.2.x86_64.rpm
1676b82a9f61270cdfca8fe339eb43abe1e2e39b5648c5d7fa7275b8ee7af2ae
qemu-kvm-8.2.0-11.el9_4.2.x86_64.rpm
326109b2fa5e5d11665360c7840188645662a59b389770757509f55a68628c62
qemu-kvm-audio-pa-8.2.0-11.el9_4.2.x86_64.rpm
50219d5301d6d4d338bf79d0e611fb711202c69f8afd8e454e17950ea4055af9
qemu-kvm-block-blkio-8.2.0-11.el9_4.2.x86_64.rpm
b1659a62571132bafc073452595f3cd7583e40ded7f439dea5012412fdd730c1
qemu-kvm-block-curl-8.2.0-11.el9_4.2.x86_64.rpm
d1da19e9cc5814e5021855b1509c3130409182129d091d13f451120d2e69be9c
qemu-kvm-block-rbd-8.2.0-11.el9_4.2.x86_64.rpm
8d211a8d47aa313fcf46a5a28662f1313916402304db6a8e934dfb086a7de702
qemu-kvm-common-8.2.0-11.el9_4.2.x86_64.rpm
e6f7b2a81aacea1ee33f708d84ad748f69b11e95ba5f455904da9225028175d8
qemu-kvm-core-8.2.0-11.el9_4.2.x86_64.rpm
3fd06c6f64fefe89657b2a6f171f01a603638594ff5d404e46eeae854dc85207
qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.2.x86_64.rpm
fc44fafdf7b682a572ca56e0ccbb139dfbaf721afaa430200a85ad6c0de320f2
qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.2.x86_64.rpm
b8289386c25940b1cebfe1243e1743d8dab51c3965ac183bd3ff4b901a516922
qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.2.x86_64.rpm
772eb33d77f4e37cc362359d5824b4f58d1ffa88d046a2ddfa4d524824f96241
qemu-kvm-device-usb-host-8.2.0-11.el9_4.2.x86_64.rpm
76fe5746dc57a543f2bcf39dedf255444b54d5c8516d7bfbfae30f6d7a40138c
qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.2.x86_64.rpm
a680e2db78e8855601cc4ae78e6b3a8cebcd0edc9046c3874146bc845be4ac6e
qemu-kvm-docs-8.2.0-11.el9_4.2.x86_64.rpm
484d567238721ba2c6dcd30a7e1aaa3645bd5790bb812a2c33d0fdd963122e62
qemu-kvm-tools-8.2.0-11.el9_4.2.x86_64.rpm
65c99a08b0f4cacde3fbeda6482edc0d58cd4176f9a6d42d0fd4211d6fd9c95a
qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.2.x86_64.rpm
46bc8480b269cbe4bdadcfe5337fe995ea7a2da0c74906f9fcfcf9a9affe1e1f
qemu-kvm-ui-opengl-8.2.0-11.el9_4.2.x86_64.rpm
819c7e590fd108a3b5d72aaa9b76339ae57d532c1ff176fe80dbcbc13be9a0c2
qemu-pr-helper-8.2.0-11.el9_4.2.x86_64.rpm
35b64c5267fcb80a991ac54819ca36283abee949b8468af9e2ed823001f11af6
RLSA-2024:3820
Moderate: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm
48b60682729d7741e5de8aaeab79073b822da42d377024dc132cf6f333b11038
fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm
4bf2637c54bbd4082376ddf7037b0bd9a4f87e63ac3beed1c3cbbf452fb9c35b
fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm
d1355cd60f55f462eaa9bb76a851544563b3ded179c81c0061038d2b77ae543a
fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm
d82a6e04fdd3284fa972628e3ae020efd00b30fc3969cba40168ef4e4ceb42af
fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm
3bb6c47d3435168ab44256ffa163d43755c36c96bad30fa37e931beb038e82db
fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm
227e0a4ec35157579695fdb2fc6d3d8ad425c81c4be9d216d503d9554c124496
fence-virt-4.10.0-62.el9_4.3.x86_64.rpm
bcf2145ad6a65935a534cad873a6c22886b86c566dd6f9b7142ff6eb8546ae02
fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm
fa9b4b7aa40b1df187568973016eb7a7fd49de3638209c103bd5b7cd1ba6e736
fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm
95b8fb7ab2e1def4173976b2149b4fae0106b14782cfcae092fe7194598f0981
fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm
403e45427354a831e404a31f5b129f3cd61113056b2ac2b3a9a0b1b3525f1f08
fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm
2035ebfd7b80ee5fc9aa07d23eb6be18b42e92d7195cea48ed3e88c8d1b284b8
fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm
96d8a291a7e7748b75cc1f07dedb9f2b612142b2f8e2817e9200be752b40e29a
fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm
15630f0b919f8a858022bd67544940e31ccac63ea6baf745654cc48e5502a5c1
RLSA-2024:3826
Moderate: podman security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fixes:
* podman: jose-go: improper handling of highly compressed data (CVE-2024-28180)
* podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* podman: jose: resource exhaustion (CVE-2024-28176)
rocky-linux-9-x86-64-appstream-rpms
podman-4.9.4-4.el9_4.x86_64.rpm
c6418c2edbe8e0162dc593eefdc43b471a504f6a6c5a3a058c28eb583eb1e838
podman-docker-4.9.4-4.el9_4.noarch.rpm
d0f5ace10efe6e29f1926fee8fc430c205f33949f24a602eb630b920aba772ab
podman-plugins-4.9.4-4.el9_4.x86_64.rpm
e427810613ad81e0c365511dd3780780be2322d50df950c5db6b4c0353c812ed
podman-remote-4.9.4-4.el9_4.x86_64.rpm
af6db91d11ada57f24d3caf67cc07662f1f1febdc78592f38d54d8a9e0a31dd0
podman-tests-4.9.4-4.el9_4.x86_64.rpm
2b6c29aa39baf446665a8d441b26c7b4eccea6b99fffb62fbadb09ca79928f9c
RLSA-2024:3827
Moderate: buildah security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* jose-go: improper handling of highly compressed data (CVE-2024-28180)
* buildah: jose: resource exhaustion (CVE-2024-28176)
rocky-linux-9-x86-64-appstream-rpms
buildah-1.33.7-2.el9_4.x86_64.rpm
f4fb43e3db04367623d85407d122b4b9f34bd022ebf34b9e78dd6aa4f26bbcbe
buildah-tests-1.33.7-2.el9_4.x86_64.rpm
30a08966a0f68effbb28168cd9fe6aaa6bdbf94101873c4954c8afd94fc4c1e8
RLBA-2024:3829
cockpit-machines bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-machines.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit component for managing virtual machines. If "virt-install" is installed, you can also create new virtual machines.
Bug Fix(es):
* creates broken external VM snapshots for pool volumes [rhel-9.4.z] (JIRA:Rocky Linux-34569)
* [Machines] Can not remove Host devices [rhel-9.4.z] (JIRA:Rocky Linux-35514)
rocky-linux-9-x86-64-appstream-rpms
cockpit-machines-308.3-1.el9_4.noarch.rpm
b761425307dd0d77b2877721044c02a5574433692981b2d3f4b87698c31dad93
RLSA-2024:3830
Moderate: gvisor-tap-vsock security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
rocky-linux-9-x86-64-appstream-rpms
gvisor-tap-vsock-0.7.3-3.el9_4.x86_64.rpm
28e857489e1e093c8cdcf83a1a0a2852528b9f70e45c7db7efbb740770943936
RLBA-2024:3833
NetworkManager-libreswan bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop
Bug Fix(es):
* Implement `rightcert` Support in NetworkManager-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33372)
* [RFE] Support `leftsubnet` in IPSec configuration in NM-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33376)
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-libreswan-1.2.18-3.el9_4.x86_64.rpm
980fe0366b02424d8daa107fc1d1d6c1c5a2a7244c96565272687001fc7ba094
NetworkManager-libreswan-gnome-1.2.18-3.el9_4.x86_64.rpm
c92e7e88ebd848da29d6f0fdf2fea1c31115b1f179e052ac1f78afd4de8b3c3a
RLBA-2024:3840
golang bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Bug Fix(es):
* Rebase to 1.21.10 (JIRA:Rocky Linux-35630)
* Re-enable CGO for cmd/go [rhel-9.4.z] (JIRA:Rocky Linux-36988)
rocky-linux-9-x86-64-appstream-rpms
golang-1.21.10-1.el9_4.x86_64.rpm
a9551eecba99feb12b592495875bce89164a68107493e7b41282e602ce17a320
golang-bin-1.21.10-1.el9_4.x86_64.rpm
bef80d844d5a1c9b3f05a087d653dc43c8c097bae16a052b81b238db44e6a499
golang-docs-1.21.10-1.el9_4.noarch.rpm
ff69c8140ae0ecb7677ba476815eb08e50967019b9f9707456800a1178856ddf
golang-misc-1.21.10-1.el9_4.noarch.rpm
317b9c72191ac2df4e3595710904b7edb5d079abee7ffa36b8ca258dca472b94
golang-src-1.21.10-1.el9_4.noarch.rpm
56f95700962c794033a17bbd1bc7bb1c6027191b013bc5557c02663f7dd2896d
golang-tests-1.21.10-1.el9_4.noarch.rpm
caaa23292ec0a5f7b2aa16ef632caf22fe814534538393dbd8455956b679aa25
go-toolset-1.21.10-1.el9_4.x86_64.rpm
39107d2ee75d81d289b463847d8801f182b1131a27df6828aff7cd3acb08f405
RLBA-2024:3841
rpm-ostree bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model
of bootable file system trees. It provides commands that can be used both on
client systems and on server-side composes. The rpm-ostree-client package
provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es):
* [9.4.z] Backport wrap of kernel-install for scriptlets(JIRA:Rocky Linux-36085)
rocky-linux-9-x86-64-appstream-rpms
rpm-ostree-2024.3-4.el9_4.x86_64.rpm
010922ba6951d923e19f4f0f31613af4fab0c92784b862cedeb1e6282a44c389
rpm-ostree-libs-2024.3-4.el9_4.i686.rpm
7a257a1d066337d226e16e9f08a39b4ae248b891e2ad62590bf674c1dc65daed
rpm-ostree-libs-2024.3-4.el9_4.x86_64.rpm
05d6c8d9fe76ecd4c472287d80e8c49834595b656113fe7851f2b718eff3b552
RLBA-2024:3983
kernel bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix(es):
* [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534)
* cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743)
* [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622)
* selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991)
* [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447)
* CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572)
* ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512)
* Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524)
* deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904)
* [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933)
* [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296)
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.22.1.el9_4.x86_64.rpm
562d1356bf3faf117a453db1fe6db6255b7f4f64afd2c02fa91662d54d5a673c
kernel-debug-devel-matched-5.14.0-427.22.1.el9_4.x86_64.rpm
dbd7c9ef66797ad95b541007ae747777e691b0b3c021dd0b576aa6d24dc49db0
kernel-devel-5.14.0-427.22.1.el9_4.x86_64.rpm
9345292a92521f55ea3cd69602ad13b5007732f7bc47d67bc08ee141418faabf
kernel-devel-matched-5.14.0-427.22.1.el9_4.x86_64.rpm
d1d340dd587fae9c90054127b0afcf08d233d861cdb5102c67036b2e5ab3964a
kernel-doc-5.14.0-427.22.1.el9_4.noarch.rpm
93d09695a1cd4c79b22a17f403fb5ce71ab5da171f7961e07263bdc51de4d9fd
kernel-headers-5.14.0-427.22.1.el9_4.x86_64.rpm
a405a8705edd313e9f7fc0a683ba27fb87d0cbeb4715819cea77b8c05a70a667
perf-5.14.0-427.22.1.el9_4.x86_64.rpm
c2a01cae57bfb52acb9c9e0fe4784d35b14c55e11939f436b5620476d097837a
rtla-5.14.0-427.22.1.el9_4.x86_64.rpm
7dc690453c59a17b45c9dd15b62d8e3c5ee438ec3c3bd1cc61b9fb85d8f67f00
rv-5.14.0-427.22.1.el9_4.x86_64.rpm
25140741233ac7238a86de6a0fd520f7a429eb9f2447bf27048cbffcaa052458
RLBA-2024:3982
selinux-policy bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es):
* selinux prevents qemu-kvm from read access to max_map_count (JIRA:Rocky Linux-36154)
* SELinux prevents the qemu-ga processes from reading the /proc/sys/vm/max_map_count file [rhel-9.4.z] (JIRA:Rocky Linux-36291)
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-38.1.35-2.el9_4.2.0.2.noarch.rpm
1d4ca026702d6f688abe9a103c258df6cc93acefb9f8901ed3d790b8f371e8f3
RLSA-2024:4078
Important: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.18-3.el9_4.1.i686.rpm
b7207e023f5281b37ef31495a7cd4ec2393452fee0a4e559f6f590f7d06b003e
python3-devel-3.9.18-3.el9_4.1.x86_64.rpm
85757372f923972992e4d33984cc792bf3c0b7221c6d118cf0f9bbef58e37bdc
python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpm
92d2051e9a06749f8e30a30d157f56c70875d5a650b27c1357aea5b5adeb6e5a
python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm
d0d68e30a25029016abe57dd40594b0c3c2c3dfd3ec5d3e1562106e010cad0e8
RLSA-2024:3959
Important: flatpak security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-1.12.9-1.el9_4.x86_64.rpm
7c40cea03f21e8e58e9f86bacb756859fa701ee3c84510a36d2b4235875d6d8d
flatpak-libs-1.12.9-1.el9_4.i686.rpm
12d1b51e883c648126e29daf5be0a016efa799c4403bc76d69d84eb872ccab28
flatpak-libs-1.12.9-1.el9_4.x86_64.rpm
b46e0dd8a3d8537789b21acaa8517c6076fd4007fd56f0203083c043386dd0cd
flatpak-selinux-1.12.9-1.el9_4.noarch.rpm
9a8325519721e0d441ddb9fa187921c455f40a48843d8741ef875099ecb78534
flatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm
bf0d1c423bf33e94a74f4e36b2a2eb10c0f1e1e4865aadea118f9e66473d4d17
RLSA-2024:3999
Important: ghostscript security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ghostscript-9.54.0-16.el9_4.x86_64.rpm
c01f585bbcd706c15531365f37ac5706882907b14edbc0c4b4f6e30d264cfa80
ghostscript-doc-9.54.0-16.el9_4.noarch.rpm
5bef9a89aacc863d3fd54c34036b3bf65cbe90ddad4df175dbe22a4c964075dd
ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm
6d5ebff65814817fc7a92721a84fa9c4f0834014e167cfa38a74078e25ce70a6
ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm
982bcd046298a8188ab97043126952f58c119d5976f23111741e426874472c98
ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm
8aea6fc1dc98b3255fc8ac38c6ca5a44ac76f4a091c2dc7ebc516d57f688f7b1
ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm
d0427782ee5ef04a8ba7b5444cbfe9d57d2de65e18cefb83e1543b1f8848d3ba
libgs-9.54.0-16.el9_4.i686.rpm
10feedde37a5bcc2c71957f28ad253fd5f3ae380857e25797a0d12c57ed6924e
libgs-9.54.0-16.el9_4.x86_64.rpm
39d8388a0dfa268669aeedd85778b3a819cedbf6baa526fcfb40927a482a7787
RLSA-2024:4077
Important: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.7-1.el9_4.1.x86_64.rpm
35d7a4ed0fc81ac91fde36b0b4477167b88a86e573056bc739698319bd498e80
python3.11-devel-3.11.7-1.el9_4.1.i686.rpm
de289ef779de08de56ada3c2811b00cf47efb746b03d0026d147e059a7ef02be
python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpm
69fcfb46b0682cba395fbbf8bb813c977f052fb8d24b06d9090e8767dfd3b72e
python3.11-libs-3.11.7-1.el9_4.1.i686.rpm
6f0b436476914b31a7a09626a47365485a9a578b9ddc2e804e7b00370f0b61bb
python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpm
6a5d421c27e10741ad2846a2be3990a52df6bd529a5c821328f474b32b632079
python3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm
16e9c0a15669da37e4dd9a2604ceeab1b5afe08a41327ecc2c4639ef3992998e
RLSA-2024:3955
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.12.0 ESR.
Security Fix(es):
* firefox: Use-after-free in networking (CVE-2024-5702)
* firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688)
* firefox: External protocol handlers leaked by timing attack (CVE-2024-5690)
* firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)
* firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)
* firefox: Memory Corruption in Text Fragments (CVE-2024-5696)
* firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-115.12.0-1.el9_4.x86_64.rpm
77c6a994ebc295bffbc74507f6ec988ac0de0c4a33ddfc748324ba010ec15b28
firefox-x11-115.12.0-1.el9_4.x86_64.rpm
a8c43c47eef4ac712086a473f60ad79bae728ed80c36cb0da6d1179cc156e222
RLBA-2024:3995
qemu-kvm bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Bug Fix(es):
* Qemu hang when quit dst vm after storage migration(nbd+tls) [rhel-9.4.z] (JIRA:Rocky Linux-33754)
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-8.2.0-11.el9_4.3.x86_64.rpm
f3e1427138e901a2438cc1d8a5fe86b7a2e60f9f558279fc3551c30698625d98
qemu-img-8.2.0-11.el9_4.3.x86_64.rpm
574659b5703549ca670e436691f507690d367a1d6ba7300c9d1139ef6a7e0c24
qemu-kvm-8.2.0-11.el9_4.3.x86_64.rpm
25d652cb962064a75caec50b6bd7943b487bf9d9682226130605f8fae071c798
qemu-kvm-audio-pa-8.2.0-11.el9_4.3.x86_64.rpm
548400b68b945ef24950e2a2151261444559bb33b0c75c18dc0d2e76a137bec3
qemu-kvm-block-blkio-8.2.0-11.el9_4.3.x86_64.rpm
8b37357b84326b7f2a4122ce0228e832146ecfa647d8b4b4528f1334020c48d4
qemu-kvm-block-curl-8.2.0-11.el9_4.3.x86_64.rpm
fcbf3dfc42f4662e79ab9410a420b22082cff61bc2911ab5cf6bb653ac1afd2a
qemu-kvm-block-rbd-8.2.0-11.el9_4.3.x86_64.rpm
18ce5159794a71be72df674e5258f4a8248355721430e9fb85aded7f765d9a84
qemu-kvm-common-8.2.0-11.el9_4.3.x86_64.rpm
273f3aae18909a4bb218873bc7242b168d1bc99c02d341c2474478f325cf937a
qemu-kvm-core-8.2.0-11.el9_4.3.x86_64.rpm
e0dfa62a33b6827b475d8db55686ded62fbda9cae0ff8639f2e600f508c15a59
qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.3.x86_64.rpm
00c8684cff40ffb13b6a6d1a419c2b6508303ed94493429468a2b57f0bcab3eb
qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.3.x86_64.rpm
109ab37db277be985973d1bff8b77ee7ce26bfe304b3911bc94bda7f282eaa6a
qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.3.x86_64.rpm
a4da8060fbbd9391cb58048ce55f3a0383956696c037b55dadb1850228556f4c
qemu-kvm-device-usb-host-8.2.0-11.el9_4.3.x86_64.rpm
0ea1d9192585d4e7502b87b45cf0478656cef5c939d1aee643af3a086d6ed568
qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.3.x86_64.rpm
a42079150bb5e31bea464866fdf9c5801d7ae4b68478ad25fc90b49a655a3f50
qemu-kvm-docs-8.2.0-11.el9_4.3.x86_64.rpm
2a2efaf8eb5021bfa0809f46b28646e6c4ff767958f01f541af0384588cc4681
qemu-kvm-tools-8.2.0-11.el9_4.3.x86_64.rpm
14358e878579d712911772b85da130b076606ba6a009930d29421d9e956a0073
qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.3.x86_64.rpm
01fd1283acca94b7b2c316bbdf85b0da446a579d534c5d65e6c942eab78c5efc
qemu-kvm-ui-opengl-8.2.0-11.el9_4.3.x86_64.rpm
1e965ef647a593cf2182f787fdc7a94cb9b5a518ecc282f24a7c20178feeb8f9
qemu-pr-helper-8.2.0-11.el9_4.3.x86_64.rpm
69b58a2f7cbb5654f95a06e6c6f10de31504713bbb99fde282b021f5163a5995
RLSA-2024:4002
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.12.1.
Security Fix(es):
* thunderbird: Use-after-free in networking (CVE-2024-5702)
* thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688)
* thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690)
* thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691)
* thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693)
* thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696)
* thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-115.12.1-1.el9_4.x86_64.rpm
0c802f52d3fde28dd34b1c51d8fcb2d61e9c89b4034c7bbe38cfcd3e4989e3f9
RLSA-2024:4050
Moderate: libreswan security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN).
Security Fix(es):
* libreswan: IKEv1 default AH/ESP responder can crash and restart (CVE-2024-3652)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libreswan-4.12-2.el9_4.1.x86_64.rpm
dabae4f644e4b16947be9d2476a851bffafb9dc57221825aa97ab8b8df2f3a2d
RLSA-2024:4083
Important: git security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: Recursive clones RCE (CVE-2024-32002)
* git: RCE while cloning local repos (CVE-2024-32004)
* git: additional local RCE (CVE-2024-32465)
* git: insecure hardlinks (CVE-2024-32020)
* git: symlink bypass (CVE-2024-32021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-2.43.5-1.el9_4.x86_64.rpm
8ef59585e996f4957a89eabfb96e9ff7daf2e00293b85d5ec8a358c1083b9a59
git-all-2.43.5-1.el9_4.noarch.rpm
25b84903a2b7def490442e114a2ba1e252d4e4c95e303ad03546bf9d18345a94
git-core-2.43.5-1.el9_4.x86_64.rpm
c516549022dae9d79803ef0c947d23bf3d95e3cd590d98de5a6e983daa4937db
git-core-doc-2.43.5-1.el9_4.noarch.rpm
47ed10ce165c4988912d2a942b94b3b1a2befd965844c71b2e535c8bee1a9757
git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm
75689a49a3b63d70caceff22b12fff8b67f78fed7ec5a332f7f2402c87fbde14
git-daemon-2.43.5-1.el9_4.x86_64.rpm
ba78c0ba8193726fc2a88267465fc4f58940cb7cd485bebc530f9b43a468a1d1
git-email-2.43.5-1.el9_4.noarch.rpm
2b6e20268b81eb0a5b27593c8d9a844b73090fb1ef0e5704b5fbc5a3ae7c3c28
git-gui-2.43.5-1.el9_4.noarch.rpm
28f7cea34e8a6cefd3ffa8b99874aaf102ee3eac2965f1499a5f68804f551eca
git-instaweb-2.43.5-1.el9_4.noarch.rpm
23ce06e42b207d2c5df787ca81cff85f8edf0ab82dfe2cb3e03c78e0834bd132
gitk-2.43.5-1.el9_4.noarch.rpm
77e5c18ea84f4c54a5d0b6b45b465c5956a67f9849ded0a22fa811d8472f857e
git-subtree-2.43.5-1.el9_4.x86_64.rpm
799b9497641fde6977e58045fd3530785e68af83879a01ec19ad67d1e49557f9
git-svn-2.43.5-1.el9_4.noarch.rpm
a80098af57e692d63058ef33b891732b3ec087b091e36dcc5aa0c5e4ed8c0715
gitweb-2.43.5-1.el9_4.noarch.rpm
0112ebde98f4b70cd1a6d39fb1098d69c2cb93231f92334d1a18c192d96f6e6f
perl-Git-2.43.5-1.el9_4.noarch.rpm
e0476211bb7e534dcfafc4a6f7efb6537d28fff2c7f31719be75e2be17bfe83c
perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm
74af8bc2f2fa67bcf371ea3c05b4c0aeec5b05fff65dc343430b535cd4f40bda
RLSA-2024:4165
Important: pki-core security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* dogtag ca: token authentication bypass vulnerability (CVE-2023-4727)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-pki-acme-11.5.0-2.el9_4.noarch.rpm
1e8b80befc37d0e51d55e6f245e95ecc03f0c4972193eb4244c4043b30c37cbe
idm-pki-base-11.5.0-2.el9_4.noarch.rpm
941b0e8ab1e39a2d682d9c3ae386805541bcb70d4c5dcadc8cb5469027866296
idm-pki-ca-11.5.0-2.el9_4.noarch.rpm
0c5e25e9d180c47530306f73313cb43e8fdcc1a6614a50e5a6760c069aa074ce
idm-pki-est-11.5.0-2.el9_4.noarch.rpm
c28c722b64a4827e17cb9ed11a8f777248c8eedcec1abf2c3bdd8d340d00009c
idm-pki-java-11.5.0-2.el9_4.noarch.rpm
72790b48c935e221766118978be18a91f4e5754f107727186df52d02e28bbd65
idm-pki-kra-11.5.0-2.el9_4.noarch.rpm
db035c01641c131e8622c5cc95c8944cba617fa9c12b6ec2b8e7d564c94ed457
idm-pki-server-11.5.0-2.el9_4.noarch.rpm
ee7ad84da3ad56c75625210d85c47cf5087de70ee9cc7c752c97cf3f4487e407
idm-pki-tools-11.5.0-2.el9_4.x86_64.rpm
ee40c35d7a59aa19b76b6b04cda4891aac6ce503d3ec879e344f651198f5e073
python3-idm-pki-11.5.0-2.el9_4.noarch.rpm
64ed511faba53264af8a77e26a70934395c6473a4393ce3de59b5d05700d8ff1
RLSA-2024:4349
Moderate: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626)
* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801)
* kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)
* kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393)
* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)
* kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870)
* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)
* kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400)
Bug Fix(es):
* cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943)
* BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672)
* [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220)
* [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687)
* ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716)
* CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641)
* IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669)
* [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252)
* Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595)
* [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083)
* [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953)
* bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm
371fb70f025426aafc1cdcbdfd4de445759f551953c120fb608f857409a51888
kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm
43c9137ffa262abd334951055634097fb1d5fc5f38c6195e9d2d54b8274e8252
kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm
14df6ff6b3f64e35bf5445e978336da7130bb70ddb079a340612ce2d0d06fa27
kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm
039d49474496f66713bc4b27256d55abe392be490e8b8cace882fe1fd288688b
kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm
0901534d845a71bcca65242bf95fd4fb1922842dc91572ab43a0af9b458e2129
kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm
4bcfafdbc77b698a74ce5501866c6f15990821120e28a1b86a5d709eb8ab26d3
perf-5.14.0-427.24.1.el9_4.x86_64.rpm
79a14e6efe5e121e99a300e25942692a889dcfebc5e826acf529084cb275cbac
rtla-5.14.0-427.24.1.el9_4.x86_64.rpm
37777de8f9781b21ca8be83c1f8c7828d7b481ae7bcddb5a563070316289f1ac
rv-5.14.0-427.24.1.el9_4.x86_64.rpm
2dfd6fd87b35efde85d95af3fa33c7483f6fcdb687e709b2c9503ead3b698723
RLSA-2024:4457
Moderate: openssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Possible remote code execution due to a race condition in signal handling affecting Rocky Linux 9 (CVE-2024-6409)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm
4abc7dc9030eff016aa999d3c4271c137ad35378b23e5ba452007452affadda8
pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm
42750c8004aa10883d9be4606ee2858acfc7f96c0d7d1c911f8f435910eccace
RLSA-2024:4450
Important: dotnet8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7.
Security Fix(es):
* dotnet: DoS in System.Text.Json (CVE-2024-30105)
* dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264)
* dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm
aa3629a9ebf6d634e51dc553d8e79526981817373bb4bd54c6888f091f6c3d2d
aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm
ffb8f23092899fa008130d9886735847ae2ccd835e6d58fb8b431752877e1cdc
aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm
ee311689c18434646abba609cda255942f68b0ad9617bae374331ae3559ea5a7
dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpm
0537034f87a8615b3b2e088deefdf7eda27e61795f237b496116c82488913212
dotnet-host-8.0.7-1.el9_4.x86_64.rpm
b5bedc3cd8e75e4f336b76e70e5c1d593cc1c115cf807fa9b7a6aa10d819f917
dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm
3e0af25f9f66dc7e3f0f5c129777f9000d552852bf4d91480c2aad3cc401d298
dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm
04f97ae2baf9a55830cb6c4db8ec20d1004ebc9cdd91619f1d883313ec21a34e
dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm
0ef25e1a53403455a05ecd32e8fd5fad00e134b1738a98305b3b8e7278c514db
dotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm
3a20b5d30605d206553b0cc700a8efda088a028f8b79f2b380fbe0ac930c4d54
dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm
93196ff56cd8be2c1d816930f8186c80306626a9a45d8e9959b5e9ad4bb34bf2
dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm
1659a67f21b644f634fa49ed3b7075608a1fb7244a559dcffabe0220fd8cfc61
dotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm
4229ed3b67194e42a0915d6136e24a916ce1ba0ea860b5379cb3287e746c80b4
netstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpm
45fe01f765360ec697a0bdf676d29adb3abfa611cad5dccb66305e8527234241
RLSA-2024:4212
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
* golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.21.11-1.el9_4.x86_64.rpm
fdedf1db97f6b6b756f2fb959a3f2e279548adfbf843f429bba9ae93e0459f12
golang-bin-1.21.11-1.el9_4.x86_64.rpm
d03519aa9ab640fad8de224114c31d7543f18d603a5334a311570b1e2cbfdcd1
golang-docs-1.21.11-1.el9_4.noarch.rpm
d60529cf51d0b918c63e86e794f92736cb8344e25e37bad6aaf998e39baf8906
golang-misc-1.21.11-1.el9_4.noarch.rpm
8eb46487eaaea0d9fa339fb74bb2a3bede2a2db9eee60ea541981bd40787d10a
golang-src-1.21.11-1.el9_4.noarch.rpm
623fbee54cb598e52c68a3b24cf59c9cd01e66466f43e0be238e020163ff1c4b
golang-tests-1.21.11-1.el9_4.noarch.rpm
f019ebf7d32fc5f45a368baf4babf5ee1b97c51d61a0f95cc19137e6cd802e0c
go-toolset-1.21.11-1.el9_4.x86_64.rpm
240aba7e8ee460662b62a1ba327cd143f4941d4a835f34cb23fcc7209a58e880
RLSA-2024:4500
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604)
* Mozilla: Race condition in permission assignment (CVE-2024-6601)
* Mozilla: Memory corruption in thread creation (CVE-2024-6603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-115.13.0-3.el9_4.x86_64.rpm
9be0fbc6ebdab53fdd0e982e8e815c5483092e6277fdfdfeebc863e220d8f203
firefox-x11-115.13.0-3.el9_4.x86_64.rpm
8a8b891796f17aa589eb8fd814d5923b224631243b5954d7be2b841e8058ae1b
RLSA-2024:4573
Important: java-21-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-21-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)
* OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)
* OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)
* OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)
* OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-21-openjdk-21.0.4.0.7-1.el8.x86_64.rpm
cc8fa7f4dadf144893a0340ea6a47c6f7ce5d3ae2cbb99593b9918f53c091ad7
java-21-openjdk-21.0.4.0.7-1.el9.x86_64.rpm
66b9432d2f9a2f6c473bed587f3add78449d89d044c6ba37a86992ca62e3b3fe
java-21-openjdk-demo-21.0.4.0.7-1.el8.x86_64.rpm
f9b0a73209f0f73f11e96eeed0d75c8fe8dc7db869db11458c1f8f9a4973856f
java-21-openjdk-demo-21.0.4.0.7-1.el9.x86_64.rpm
9c5669552d39622e348e6e4b03445c82d5e5d813493b021eec9adc50611705bb
java-21-openjdk-devel-21.0.4.0.7-1.el8.x86_64.rpm
09dd3fec685c0b308a1eaceaa092fd97a756bb11c26070f18bc12322a9fc72b2
java-21-openjdk-devel-21.0.4.0.7-1.el9.x86_64.rpm
936a0743832a80804bd199f72eef9280bf75894c3c5e20fe798457e04e6ac63b
java-21-openjdk-headless-21.0.4.0.7-1.el8.x86_64.rpm
68403f0fee82de02d3ff850b23bc8089b558012d9f6d8c1ced0cefdddbbab0c1
java-21-openjdk-headless-21.0.4.0.7-1.el9.x86_64.rpm
c3ee0ae4cbfd152f9a96b1976e8d0dd67212ed16df00220c6577b60ea3754be7
java-21-openjdk-javadoc-21.0.4.0.7-1.el8.x86_64.rpm
0bce9bf101d2b681418ecb905cf6db98a3fb1dbd85edc124cbc7115f82b14bf7
java-21-openjdk-javadoc-21.0.4.0.7-1.el9.x86_64.rpm
741cbd552664ddc1de8c525564e4050b8a770b679d4a0498417867ab4e0441c7
java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el8.x86_64.rpm
0b4773b2a33ca4d7b62ffecd9f25a52dab82bf272b0bb94d5475c8c6fcde606e
java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.x86_64.rpm
bfc36ea48faa44e1cd1597b8954b4e326f8b2ec105188f1768579c8edfa7a518
java-21-openjdk-jmods-21.0.4.0.7-1.el8.x86_64.rpm
93f2ca0b5986e1477ad4812adba2d35e91bb0bac1aab534a3d50e1806d724f36
java-21-openjdk-jmods-21.0.4.0.7-1.el9.x86_64.rpm
5baf283f9688cac7c0d2aab0cbc60061b80e078a648320b684bf1a3c03b3386e
java-21-openjdk-src-21.0.4.0.7-1.el8.x86_64.rpm
7bc97da06874fd497a12f9dce18bc04cd3d56d51d2fb1e91092a0d5446dacc8a
java-21-openjdk-src-21.0.4.0.7-1.el9.x86_64.rpm
e30cb1f543112e5a4bd93e9a637c860c259999cfcba4f38df79d623f32ff2d91
java-21-openjdk-static-libs-21.0.4.0.7-1.el8.x86_64.rpm
52ec1c422f541c0612919bd52dd844c522733d70c3fead2e9dec52b2c6f53c71
java-21-openjdk-static-libs-21.0.4.0.7-1.el9.x86_64.rpm
fe0f8ecc177a3c7eccbff2ef19cb2d13886b4813c9ab5a6e1ee6ba6c33f9a610
RLSA-2024:4583
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)
* kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596)
* kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)
* kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638)
* kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)
* kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
* kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435)
* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)
* kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)
* kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543)
* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
* kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593)
* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)
* kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957)
* kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm
de5a1772b9ccc009eb0cac3c3c20015aa4753f56f6ca4f1ecb715c1c0a5de208
kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm
d4896fc694e10f400c4ec5aff559d0d468c8c485d3bc310db71e064625ac1b06
kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm
8132bb198e04dada22e1064302eb234e46515136bae8e1141a3c7a4c820b24bc
kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm
9d6fedbb917798fe0881920b980d560177812f1df58e07d7565fc388bd1db530
kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm
929085c2d0686fa032d24108a5e4f8327d5b47bc83412c316c72f6dd7ae3507d
kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm
3002310b8b878377f46fa03e9f25a72d76614ec5f3e5107d75ee501fb39f5918
perf-5.14.0-427.26.1.el9_4.x86_64.rpm
d0d4d76cde216772bf2df9cb57b965b7060b8b503f9c71099f35c127451635e2
rtla-5.14.0-427.26.1.el9_4.x86_64.rpm
010a552c598b2111c2de1a804bba57d0c09f3a6058b405f90dccbc425dd85577
rv-5.14.0-427.26.1.el9_4.x86_64.rpm
f1fc9d602df4cc438d200c5a589116323aab342c62bde4916d96a00d79fc6db7
RLSA-2024:4623
Important: qt5-qtbase security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for qt5-qtbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt.
Security Fix(es):
* qtbase: qtbase: Delay any communication until encrypted() can be responded to (CVE-2024-39936)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtbase-5.15.9-10.el9_4.i686.rpm
0ac2eabf4591e701f2a5386aa812b3660ae69dcb3b0900c6e01aba0ac6a74e98
qt5-qtbase-5.15.9-10.el9_4.x86_64.rpm
417f1b8d14840782eea6d725164b250561667ed09c17187f9a6681645dd069d0
qt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm
0a00886aeb716a385de60c07c2d9f36e475bff80dc231a8fb6d572c4b551448b
qt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm
268b97189db4faf7e9c97191ce796f8679da2583cb4d2056e78dceea4a92372b
qt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm
268a9b3d3429abc2da9361ce036a50d54f635cc7be12bc92d40088a547233480
qt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm
5e37ae61a04e5fdabe3640b6644925273bbe5a756fb8541813790797dfc27f81
qt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm
665356136afca4d5cf28ef71ca6c6594fd6c658d5226424939ff3d85874f0a57
qt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm
f5110b017cfa360ac3e3051cf64e1213de4f6d80958be403211731a71a137827
qt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm
4b2e4d7cafa6cc9762b6c890c774ca8fa1474fdffcb3513a316278e8cc29aaac
qt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm
5e8a9d6a677033b0d4b0f5bf85f11d54af70a68d3b02ae04c98cc28fc3b6c393
qt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm
cd76e2cd4dee064a5aa2d06d2073acad270ed958f5ff18f2168093d04e0724bd
qt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm
1570e6e4baf8836e8f3ee2658e8d1079101382cffd9c30c4cbf26ba96e1c14dc
qt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm
fd900c26bc4bc21df0f7c085a8b6735819b121d39946750f2adb0d7af47ec494
qt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm
26fe4b5289d50332f582fa01cff77062acfb547f1e99c3032a85e93bd314a42f
qt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm
0ad991f8fd5fe689d6aa197ec704f90554206bb99fe49598baad5f1a77a1f938
qt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm
325801f1ef38ed45f2c4392e1c40e232001773d4c6f80a06032300075e459a4e
qt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm
d5d3f874d10126ea677fa42f700443befff1ad68ed2f4fef48b87f84e3d3b357
RLSA-2024:4502
Important: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.14.3-3.el9_4.x86_64.rpm
a6e2773b70fe97d9c5ff09b424d07d9c4ed1f5bfc08ec3cbc6bc4eec7c844315
skopeo-tests-1.14.3-3.el9_4.x86_64.rpm
e6c7f40a44094466dbf007daed71aa757fdb8c4c0bb4227b16fee4bbeebf7c25
RLSA-2024:4624
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* Mozilla: Race condition in permission assignment (CVE-2024-6601)
* Mozilla: Memory corruption in thread creation (CVE-2024-6603)
* Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-115.13.0-3.el9_4.x86_64.rpm
e7b227b02c43ac24f270b229e8ef4a1f81f698d37b21dc459989c1abc1c74827
RLSA-2024:4726
Important: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
* httpd: Encoding problem in mod_proxy (CVE-2024-38473)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.57-11.el9_4.x86_64.rpm
ee724ab3fad6fb81cc1f645732dcc1e89b4e96ed927e86ad6cda125f57cbdab3
httpd-core-2.4.57-11.el9_4.x86_64.rpm
bf2890e7bf8258e0377940241abd78c9f2bca45ef6a88976e4f73fc13e740593
httpd-devel-2.4.57-11.el9_4.x86_64.rpm
5806e6d3cfe80bec36ca6fb19f0a5c1fb9eb9d47f111a23904c6085f8f29bdd1
httpd-filesystem-2.4.57-11.el9_4.noarch.rpm
6ee4fd465f8a04ff1f6b25dde11311958b7e888572b8cc5c0cb0be722e3b538e
httpd-manual-2.4.57-11.el9_4.noarch.rpm
21c834b5a13e6545517db4c24c5ca7a8abdb869a0ac7e4193e26603d16be1bc0
httpd-tools-2.4.57-11.el9_4.x86_64.rpm
b5a77a636d359989d6c5d887fa2db62965e4d911abc9bb071187da1ea13fda6d
mod_ldap-2.4.57-11.el9_4.x86_64.rpm
f9533f85660c52750d0880f2f72a547df4d22f4fc1d0f3823a8864b6dd7b8b44
mod_lua-2.4.57-11.el9_4.x86_64.rpm
027f30aa3f4159e357cf5518c715c2f8fb0cfff25d7e078a68c877bea55ed1e9
mod_proxy_html-2.4.57-11.el9_4.x86_64.rpm
a790a42c69be63cd768a2e7cb1111d3c3dc0f094f17a6c4f3cc5cd800c0f3888
mod_session-2.4.57-11.el9_4.x86_64.rpm
42c25e43fdcc3f1a6d964999497a7054f9d4adbdc339ee82885604359e83e9cb
mod_ssl-2.4.57-11.el9_4.x86_64.rpm
e51f98dccd9c53f572fa80f87d05a6ea1429ec0a64bcb76a83bc833edc334e2b
RLSA-2024:4861
Moderate: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: vulnerable to a Denial of Service attack against Cache Manager error responses (CVE-2024-23638)
* squid: Out-of-bounds write error may lead to Denial of Service (CVE-2024-37894)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-13.el9_4.x86_64.rpm
6ba51b15b2a79583aa793268b25ec5b852e0f62075d26dd5a09368b25ec92205
RLSA-2024:4928
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
* kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737)
* kernel: dm: call the resume method on internal suspend (CVE-2024-26880)
* kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852)
* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
* kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046)
* kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030)
* kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857)
* kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907)
* kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885)
* kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809)
* kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459)
* kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924)
* kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952)
* kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743)
* kernel: epoll: be better about file lifetimes (CVE-2024-38580)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
7501833feba2e6bca698513d2141caa27abf0f20b5e0403accfb5d967a59b496
kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm
0e14d9ed5bcfb245ba21420872a9edcd7423fff0ae6a907971d53d02dd7621b4
kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
bfe2b48453bb0f715baa5ef00d0b2f23a01c50c9ea4bbaba84e8668cd14e8509
kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm
463908053f203a6261ecd337d17c484b9d3b55e0ee1ae3a07cbf85463dcf3a3a
kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm
30d0217a47f24b057c73f8651c708e256671a9dd6d49f71a6023b4993474c1b8
kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm
0d85aa3f0ed601e9eddee93c5d4dfb1929279751986864e6e814a44ecb9c2ccf
perf-5.14.0-427.28.1.el9_4.x86_64.rpm
427fba9902f6eb9961417cc81a558a5de0b9316773ebde3c9ccece7ba7f26272
rtla-5.14.0-427.28.1.el9_4.x86_64.rpm
55224ea72e474f20b86397c0a874df34ee43e896b16d8c222c3594402ef5ef24
rv-5.14.0-427.28.1.el9_4.x86_64.rpm
dc1af64972f20582ee7f25f2b8d498022b0b1a7cae3d3eea6a1d4b7532e2e12d
RLSA-2024:4935
Important: freeradius security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freeradius.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
freeradius-3.0.21-40.el9_4.x86_64.rpm
f5a35bd6b4d283fbf8862f9297fb7faccf775d56b2a4acc3489f37addff35dbb
freeradius-devel-3.0.21-40.el9_4.x86_64.rpm
94ca0bdd38e8d854e3fc316e7a8182da5dd64090f582bad233e65d3e99e71d5a
freeradius-doc-3.0.21-40.el9_4.x86_64.rpm
ac79df76665e46bc722135c901f71fd7be932cb97cf7caa033d5e977a414c2b8
freeradius-krb5-3.0.21-40.el9_4.x86_64.rpm
3f3c7d7e61497d7a11a110389175b91905e4c2ef1b5e3dc03bef3c2343cfd0aa
freeradius-ldap-3.0.21-40.el9_4.x86_64.rpm
745fd6260692b4a089efab61d4f593dff93c7e93ab7cd73bac89d4e2047ec191
freeradius-utils-3.0.21-40.el9_4.x86_64.rpm
3dbd993003ccc4b80d1a2dbbecbe74b63f27f1415d6f50ee114dddfb25c0d0f1
python3-freeradius-3.0.21-40.el9_4.x86_64.rpm
448a7bcf3a342aefa48b48a10995db03d38fc331862b9ea88b64890bb5b334e9
RLSA-2024:5363
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058)
Please update the description manually.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm
2362c0e985fc0974c3ca33399a42076d70f6837f6dd4925d56f0d3e01d67b1d6
kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm
af3a29fb91446ccd8dadc5f411ce8f11c59a121c7261c14e8ee62cb4bb02fb5a
kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm
2f7782b3ff9d49d799111e9181bf8797d35b977a6714f9bc5a4bb98dbbdad707
kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm
2d4349833e75cf661ac3fbcdaf77549fa7ce179a8a29c46be95ea4f382453548
kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm
2051df1527b042b66548e19007a94e6db537e3f7dbd4af41238f65e4e2ac5a92
kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm
274dff5b9c627945586c3187f3e425ffe95137753bc8d3e0ed9ac65fd851a606
perf-5.14.0-427.31.1.el9_4.x86_64.rpm
5195f51a1a3976de01a82fd22a846ca82ec2704a807d754bd1f5f282d59e6130
rtla-5.14.0-427.31.1.el9_4.x86_64.rpm
adde14f31219d606b35c685b316d84fb045363c81c6652524b6e5e552aea7ee0
rv-5.14.0-427.31.1.el9_4.x86_64.rpm
580a87ef2f15fb5494bf8fd2afb16d2c85649a7b6f3d04eb30d2ae4939b0b748
RLSA-2024:5192
Moderate: 389-ds-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: Malformed userPassword hash may cause Denial of Service (CVE-2024-5953)
* 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request (CVE-2024-6237)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.4.5-9.el9_4.x86_64.rpm
bce9ff04c0d3135dec9157ed64caac4076feeddebce7e334353d65e18462e1f5
389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm
1125c4507b053175a378cad9d75c6e19dc9ecb4e65e63f508a31a6559c9bdde7
python3-lib389-2.4.5-9.el9_4.noarch.rpm
a3f42f9edcf53706f06e92172efa0483385d7bd6e0710d82da84231f6945f963
RLSA-2024:5231
Important: bind and bind-dyndb-ldap security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind-dyndb-ldap, bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737)
* bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975)
* bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-18.el9_4.6.x86_64.rpm
40dc2f7dd9a6820ae46c80c2dd30151a4378c327ffa70c076b3d88744825adf0
bind-chroot-9.16.23-18.el9_4.6.x86_64.rpm
ce6b07e1042cfa92866ed514bfa884a80dccb911884785d2de12e4b3cab36888
bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm
16c7b39d7ecb5ba88a994ed9680042995db178b1ba6126b222cd976d12e79f9f
bind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm
b0e6550b4394eff5b64102b652ec8fd7e09e94d8897c0d98416ba137f7ca0138
bind-dyndb-ldap-11.9-10.el9_4.x86_64.rpm
73905fe6df833f30c3a28df5ef303130574c9f0a62d171ef7f0c2676e7707d0a
bind-libs-9.16.23-18.el9_4.6.x86_64.rpm
265de3564184c21bb273ba841f6a1bdee830439225087aa033529b536f29020f
bind-license-9.16.23-18.el9_4.6.noarch.rpm
d7d1e7b91c5e721bfd9e93071a85cde039007382f1fbcb84160f37fdbea192db
bind-utils-9.16.23-18.el9_4.6.x86_64.rpm
d7def451e48f6f40e7722a5a63812c3c8499ebe71ebc79d2cd2bf594cc95c05d
python3-bind-9.16.23-18.el9_4.6.noarch.rpm
144c2218b46f1bccbb2cd6686aa032ffd373527fd56193d70fe9cc143ce1a2a4
RLBA-2024:5463
virt-v2v bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-v2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible.
Bug fixes:
* qemu-guest-agent not being installed at first boot in Windows Server 2022 (Rocky Linux-54150)
* Uninstalling vmware-tools from windows guest sometimes fails with exit code 1618 or exit code 1603 (Rocky Linux-54151)
* Allow --mac gw and len fields to be optional (Rocky Linux-54152)
rocky-linux-9-x86-64-appstream-rpms
virt-v2v-2.4.0-3.el9_4.x86_64.rpm
2b36c2ac4d84e2e180b2d9344ac16a169fa9e9eb464c42a1aeb031858d15940b
virt-v2v-bash-completion-2.4.0-3.el9_4.noarch.rpm
c7d02ea81b02613ae254616a3af388d61be7c048933a58ce6f754571d0f95280
RLSA-2024:5533
Important: python3.12-setuptools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm
377365ee95abd045fb9c876c5d355938a809c5c22c846dfcae648d74a6715d37
RLSA-2024:5138
Important: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Security issues via?backend applications whose response headers are malicious or exploitable (CVE-2024-38476)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.57-11.el9_4.1.x86_64.rpm
e2fc806a5f99cff9ab328d83871a326cceecd5dd08042124c1bce6f08c1646e6
httpd-core-2.4.57-11.el9_4.1.x86_64.rpm
2c16142ab81ce85193dcedb81a0620badb0c499c1cd5b1737f84b9272b3e5601
httpd-devel-2.4.57-11.el9_4.1.x86_64.rpm
c478e339f43ff26f9d6db0368f48b08fcd5cb248d2cb3d20fda3e00740c1004b
httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm
424e10e81c95deb9f77499ef52aa78ab677d8f99c0f2a2f37bd4b3ba76f5c69e
httpd-manual-2.4.57-11.el9_4.1.noarch.rpm
aeef24b41d955cb4b8dcd5fb9d95e5954e6b906018c28886e6d79538595d1fff
httpd-tools-2.4.57-11.el9_4.1.x86_64.rpm
932cb0d7629c69cdfd4967e4fb9e54fe5525fd374875ba2ee1e120495b675ebc
mod_ldap-2.4.57-11.el9_4.1.x86_64.rpm
f15e65ee8661840f8830649cfeef84fdd34ebc15a0a4782a62f3b33be5811001
mod_lua-2.4.57-11.el9_4.1.x86_64.rpm
dbb968ce25509f2eb0dfda6aaa81a174a32aacd2b69290bb86d193edbf1c346f
mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm
d0c70d2e9b3504db5fe117639415d48d3a7c837d8e6fc91fcfc00fe9d0f80b9a
mod_session-2.4.57-11.el9_4.1.x86_64.rpm
8d1fb47f10c6a4c77c988639d6d01f6ebd370988be4e011d236592013f710338
mod_ssl-2.4.57-11.el9_4.1.x86_64.rpm
6e045d16afe5d6758b25ed33f5fb95b027b07eb8babeceb2515cd1ab122e17fd
RLSA-2024:5279
Important: python3.11-setuptools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm
82188a2a6550cbf1e870cddc088f7c42bbb12f58281ff307ffee805fb4b57766
python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm
75a83fc726278275e32d8eedea32f8809431b4babd374b8acb1f183976f2ecee
RLBA-2024:5811
scap-security-guide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux8.7/SCAP/Rsyslog] Rainier syntax not valid for cron and netstreamdriver parameters (JIRA:Rocky Linux-1816)
* CIS Server Level 1 installation can be started with "Server with GUI" (JIRA:Rocky Linux-23852)
* Journald is not configured correctly after openscap remediation profile CIS Server Level 1 is applied (JIRA:Rocky Linux-38531)
* Authselect rules hardening wipes already active features (JIRA:Rocky Linux-39383)
* ANSSI-BP-028 (intermediary) breaks password changes (JIRA:Rocky Linux-44983)
* CIS Rocky Linux 9 Benchmark for Level 2 scan fails on "Ensure all users last password change date is in the past" rule (JIRA:Rocky Linux-47129)
* Rebase scap-security-guide to the 0.1.74 version (JIRA:Rocky Linux-53865)
* Rebase scap-security-guide to the 0.1.74 version [rhel-8.10.z] (JIRA:Rocky Linux-53913)
* ANSSI-BP-028 (intermediary) breaks password changes [rhel-8.10.z] (JIRA:Rocky Linux-54390)
rocky-linux-9-x86-64-appstream-rpms
scap-security-guide-0.1.74-1.el9_4.rocky.1.1.noarch.rpm
f34b33940a6d5a41c8264dedd6af9f212713a982f811aacaa9f38b3a721c99d7
scap-security-guide-0.1.74-3.el8_10.rocky.1.1.noarch.rpm
c42412d3eeb4d53594df49acfb94c7a2045855be3e4c798298e2db648c40ae6b
scap-security-guide-doc-0.1.74-1.el9_4.rocky.1.1.noarch.rpm
a0a33fcb089c7dee91759382d6f75952b021b9b732a5f1af88c1b543cab8b747
scap-security-guide-doc-0.1.74-3.el8_10.rocky.1.1.noarch.rpm
7701a99ae47fafcaef2bde75ba7a1ddbb505f91297fa7f276effb94c296bcc21
RLSA-2024:6567
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
* kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)
* kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)
* kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)
* kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)
* kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)
* kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)
* kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)
* kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)
* kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)
* kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)
* kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)
* kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)
* kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)
* kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)
* kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)
* kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)
* kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)
* kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)
* kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)
* kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)
* kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)
* kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)
* kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)
* kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102)
* kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)
* kernel: nvme: avoid double free special payload (CVE-2024-41073)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm
2708f1af281f5179ec45a989769de8bdc33c35b548d65a98bf5a647561350e3b
kernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm
b0271e0bd1d54297942e7b79367af6816814505894e7927d377b4fa0d446edbc
kernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm
24d02923fec85b0a96f4ee0882075707e2d55134507b6d8982e8fcea2c9be1f8
kernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm
cdaec8f1b606cfd5df4539339687464c3f457419a3b10d1c6820094d2361070a
kernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm
c4095a1ac3f67b5c3ee8f64512726c55c21c7b17de10c5101894876f5f1ca2a3
kernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpm
fcb8b1335323494f0c6a4ef2b3088536ad94c7fbec405064b9831adcdc468894
perf-5.14.0-427.35.1.el9_4.x86_64.rpm
37d304c0cc6e93772d744970477b878d8ecec22db0f268b5ad93f8a073e04813
rtla-5.14.0-427.35.1.el9_4.x86_64.rpm
1f83539e941ca8fce9241fc5b4a753478d1fcdbe72b60c8a5caaa4da674f7532
rv-5.14.0-427.35.1.el9_4.x86_64.rpm
28fe72241d609d466a970fe26216869c4295574211481bfe19e8ab3fcb179ca8
RLSA-2024:6464
Moderate: glib2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib2: Signal subscription vulnerabilities (CVE-2024-34397)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glib2-devel-2.68.4-14.el9_4.1.i686.rpm
8a72a79ada8b4c30ef44147f64f41876ecdd1e4fee00a0cbd3f7d9e5d7c27abb
glib2-devel-2.68.4-14.el9_4.1.x86_64.rpm
7ef4a75f6a1295bacda881215c3f4eeead21913140ea02819aa882745dc301f7
glib2-doc-2.68.4-14.el9_4.1.noarch.rpm
d0571b256dbcadbbd6dd7cb2af8b9691897050828cb9aee276fe242e68581b3e
glib2-tests-2.68.4-14.el9_4.1.x86_64.rpm
d48d3f9ad7ae76aa39ea1aa620a03d9596551e5154651d4a40aa60c3c4b0803b
RLSA-2024:5999
Important: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.16-1.el9_4.x86_64.rpm
3134e2e1f66599bec78f9253fb3b89548d78dbfa29349ae6cdf74035394e84ee
postgresql-contrib-13.16-1.el9_4.x86_64.rpm
4e203afc1a165afdb33b1eae11691d4f4b9b485184ae421b319c6e480917f8c1
postgresql-plperl-13.16-1.el9_4.x86_64.rpm
2e8ca1c831a8090e2793687ec95e78fab91ebb818dbba47064bf2ce60da44840
postgresql-plpython3-13.16-1.el9_4.x86_64.rpm
9af349f8a12763c6440b4e8709c690d53c5762fe142b905f7d963a79f8ddb8ae
postgresql-pltcl-13.16-1.el9_4.x86_64.rpm
bdc31de3e0a3a9dfc4f6237627b5523c2feb9ab733891122ac5a58dfaa93e771
postgresql-private-libs-13.16-1.el9_4.x86_64.rpm
2edd85939b4eb7e948b9a0ced4a3cb78c0412ab238961c426020f36e40793f68
postgresql-server-13.16-1.el9_4.x86_64.rpm
d23761e5c7d995ab0c8bf9376ee8858d005e2e5dcc8f3d383d9b7505fce523cf
postgresql-upgrade-13.16-1.el9_4.x86_64.rpm
cd0c20e58bd73356d9552544365ea84ef238c0357df8ceb03f25ef43446a2730
RLBA-2024:6143
virt-v2v bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-v2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es) and Enhancement(s):
* [RFE] Bundle and support virt-v2v-in-place for MTV warm migrations scenarios [rhel-9.4.z] (JIRA:Rocky Linux-55823)
* Re-enable Windows disks post-live migration [rhel-9.4.z] (JIRA:Rocky Linux-55837)
rocky-linux-9-x86-64-appstream-rpms
virt-v2v-2.4.0-4.el9_4.x86_64.rpm
4a545de48c795bf2cc8c674dfaf8d60d466c2b746ba92e07d4805088edce18de
virt-v2v-bash-completion-2.4.0-4.el9_4.noarch.rpm
afbab338005883a80746c3f0ce3b42e02ce58f1a33559a90b661e3a611137b94
RLSA-2024:6146
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.
Security Fix(es):
* cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.1-4.el9_4.3.x86_64.rpm
9b1bf1bbfbc00d253a2a2f0867f77d66ea1f956d4bba4aa468c1912b2d94b957
python3.12-devel-3.12.1-4.el9_4.3.i686.rpm
78c890086949848e1ce4acfcd417822d90b3fcc4a48deaaded9d5e0180e947b4
python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm
451720fc2129c1a353676958acbc3317545753837dcce250f1950e03ea78ae62
python3.12-libs-3.12.1-4.el9_4.3.i686.rpm
cc1e5ec4ee57ec4a6bcb79e653561d2ea11858d946cd6fac42ded2ad6fb849be
python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm
60317b70b17a41d31ace3582458e3147c5ccae23143060ff3d6b36d2ab57b63f
python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm
521bf8f238f75fb0cbad0f70ff2760b63e55ac65f3a6c5e6e26f154f09bc6798
RLBA-2024:6287
libguestfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libguestfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libguestfs packages contain a library used for accessing and modifying virtual machine disk images.
Bug Fix(es) and Enhancement(s):
* sgdisk fails with "Invalid partition data!" for win2019, win2022, win2025 guests with three additional online disks [rhel-9.4.z] (JIRA:Rocky Linux-56697)
rocky-linux-9-x86-64-appstream-rpms
libguestfs-1.50.1-8.el9_4.x86_64.rpm
74a042a83610f58bb2b3c966aeb8d11ccb61fe5064d6c00f73c22effebfbeb8b
libguestfs-appliance-1.50.1-8.el9_4.x86_64.rpm
f127b2812bbb77218e3d6186c15af49c68b9252c547af9a85c6971d86e6ae42c
libguestfs-bash-completion-1.50.1-8.el9_4.noarch.rpm
f808fa5130ab9d2b5f71388bf4ef4852ae8f2a5c5a8bd8fbcacfcbc5317241c9
libguestfs-inspect-icons-1.50.1-8.el9_4.noarch.rpm
fa3557be8af2ac8b12b518db5fc9039fa29daf8f656aa934fe5612f10a24902d
libguestfs-rescue-1.50.1-8.el9_4.x86_64.rpm
751a9426e4b5d91ae19659c2e106639b0b52a7f796b7d2d575043c437487e7ba
libguestfs-rsync-1.50.1-8.el9_4.x86_64.rpm
ff6ba0a98b6cc3a808d566d0bf9f9dea0c8dbde70773c426bae7895e040265ee
libguestfs-xfs-1.50.1-8.el9_4.x86_64.rpm
7a34ad8fab91174715265c7fc3263b0bd8da1a891c3adf4308476700f6ef2e64
perl-Sys-Guestfs-1.50.1-8.el9_4.x86_64.rpm
6a938bb942415112cf1a2701da4e57af1681c354df9cad91e25b3246f0c91072
python3-libguestfs-1.50.1-8.el9_4.x86_64.rpm
7b83765493b55b0ef0fe84a2c41ce10804b7042401bcfe3a6103548bd6efaded
RLBA-2024:6416
augeas bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Augeas is a configuration editing tool. It parses configuration files in their native formats and transforms them into a tree. Configuration changes are made by manipulating this tree and saving it back into native config files.
Bug Fix(es) and Enhancement(s):
* libguestfs pops up error when ?there is a trailing comma after character like nosuid in guest /etc/fstab [rhel-9.4.z] (JIRA:Rocky Linux-56992)
rocky-linux-9-x86-64-appstream-rpms
augeas-1.13.0-6.el9_4.x86_64.rpm
ba47d317f491e35066efe9f0d595f5d7c74570baadced9ec3f07ae4fe8180af6
augeas-libs-1.13.0-6.el9_4.i686.rpm
38eb60c7d70e6f35e1a7c62da881b0baf1a7a1316b24dfe08d5dc1ebf11bcf59
augeas-libs-1.13.0-6.el9_4.x86_64.rpm
2ac9a5e626ea70d1890d5ecc64937eeb9fa9c701b38722476f0e5419d3967fe9
RLSA-2024:6529
Moderate: dovecot security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184)
* dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
dovecot-2.3.16-11.el9_4.1.x86_64.rpm
e2296f5adc2a56c9cc094aed17981b010ae294bc7739d64b227c4de13d85ecb2
dovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm
5d7749a0c30972971e68510b8c7b6b5526851da4ea63e1229f15bb81b33b005e
dovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm
58a3790e60ac7814543450287d37e0a04cfc6e38a0c398d5fbba59cf731fadc5
dovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm
c3c683af6946abcaffd4816513df5c2661d65461f1ee574f4c3c3190a8a61471
RLBA-2024:6669
libvirt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es) and Enhancement(s):
* Opening a vpx:// URL fails if the backing VMX file has a "*" character in any key [rhel-9.4.z] (JIRA:Rocky Linux-58676)
rocky-linux-9-x86-64-appstream-rpms
libvirt-10.0.0-6.7.el9_4.x86_64.rpm
7cb4ebd8b1c7dcd4bd307e3e6dc1b9512876423a1517ea9eba7d909059ec443b
libvirt-client-10.0.0-6.7.el9_4.x86_64.rpm
bd234ff2c4b9ab12d30439a4946c99933b655b43aa45d35a9e473719bf9a744f
libvirt-client-qemu-10.0.0-6.7.el9_4.x86_64.rpm
0a7f5487bb13e13e9a0f0a3be4246e0b91ef78ef7e4c9af469401b5f4ab7bc95
libvirt-daemon-10.0.0-6.7.el9_4.x86_64.rpm
b8ec58633eacf662b3ca629b7401c79e9b71cfa20380f89d36f6a164e36c8082
libvirt-daemon-common-10.0.0-6.7.el9_4.x86_64.rpm
552d8ab60605861dc53ae0a640af5376d7517c9be281ee32009280e49db0dbc8
libvirt-daemon-config-network-10.0.0-6.7.el9_4.x86_64.rpm
c4db64802f93b48a9a271beb2f387eb377adfc4ece86be633e3e4a5e38edb7bf
libvirt-daemon-config-nwfilter-10.0.0-6.7.el9_4.x86_64.rpm
00f59979dc52de395e3ff8fa58a303dcbfedbf7276862911af24fd48d87c1f44
libvirt-daemon-driver-interface-10.0.0-6.7.el9_4.x86_64.rpm
29512716d6fe50d3ee46f32eaff497986639d46cefc8f82bda82a46f4bcbe5cb
libvirt-daemon-driver-network-10.0.0-6.7.el9_4.x86_64.rpm
d3a2c4b8ed2510e4713e1e727094b9d766cf5eed5cdfa4b8e4eebad8db90107c
libvirt-daemon-driver-nodedev-10.0.0-6.7.el9_4.x86_64.rpm
5b8ddb5bfd0fe5a6eebead1fa075e6e81a5e0d4bd7f61104b21b5efe8f58efba
libvirt-daemon-driver-nwfilter-10.0.0-6.7.el9_4.x86_64.rpm
7a4369ec37f99094efb854a1d07156b0b9f3a5b7301f30bbf9186c0ca9f0c166
libvirt-daemon-driver-qemu-10.0.0-6.7.el9_4.x86_64.rpm
270bd729f6a9caf047b05d20fa8ef405af91c98aa8a4649bf75dd46b75b76d6f
libvirt-daemon-driver-secret-10.0.0-6.7.el9_4.x86_64.rpm
52851bc81e41ccbe4514d19aaa701e54bdad1044a1a8f029d21020f54fd19112
libvirt-daemon-driver-storage-10.0.0-6.7.el9_4.x86_64.rpm
f0d602e6e2df3ee47b3366af524bde998b0b0706e953bb8215fa3e74010502db
libvirt-daemon-driver-storage-core-10.0.0-6.7.el9_4.x86_64.rpm
6d65a0ffc8735ac493a0940a0f59dac83b68fbd67bb7055d090838dd3e6d5a07
libvirt-daemon-driver-storage-disk-10.0.0-6.7.el9_4.x86_64.rpm
fd3190ac41aa56c387515b8f209e09e9f2c40762341447bab318e69f3d05e7a6
libvirt-daemon-driver-storage-iscsi-10.0.0-6.7.el9_4.x86_64.rpm
9a133db155bb05ce3bdf73ee1585a98d350253675702132c9d92455833f9f890
libvirt-daemon-driver-storage-logical-10.0.0-6.7.el9_4.x86_64.rpm
3b05fa93b1494c3b5f54889c6d0b98105baba6542c1c0e61db09ee5da2b14edf
libvirt-daemon-driver-storage-mpath-10.0.0-6.7.el9_4.x86_64.rpm
6d67a693e72cae9ec81925399e524b36692cb343fbb9472d65d81aea62d77e04
libvirt-daemon-driver-storage-rbd-10.0.0-6.7.el9_4.x86_64.rpm
d846f0815621d8fce2d762221232455596b068ffbbc3b824b869f11b6b42356a
libvirt-daemon-driver-storage-scsi-10.0.0-6.7.el9_4.x86_64.rpm
6285bcce416632139dca76828863b7d136f9efa17f7857963b7b6fba32b5312e
libvirt-daemon-kvm-10.0.0-6.7.el9_4.x86_64.rpm
5843eb92fbcc41bf8479590cef5423693f92f267745a3389a335f887ea555829
libvirt-daemon-lock-10.0.0-6.7.el9_4.x86_64.rpm
c0a498b29f8aae2b1e6f0c5e5e4950babb5ac31c178f9fd1e7e4a8f8d3762834
libvirt-daemon-log-10.0.0-6.7.el9_4.x86_64.rpm
00c9ed0b5e598dd3014efbff54befbb6903106e20c78515d8158159f82bd12ca
libvirt-daemon-plugin-lockd-10.0.0-6.7.el9_4.x86_64.rpm
3be61fd531157e009a229a426df344c654916be543a08e256c12ce5c0b3a4c52
libvirt-daemon-proxy-10.0.0-6.7.el9_4.x86_64.rpm
b75f11d831a214ddc25619e709cab46130a81857e52ca5115914f2bc2861ec03
libvirt-libs-10.0.0-6.7.el9_4.x86_64.rpm
da255b1fc06e941516bd7c5e7b45bebd767e4aec5944e2f63925c1a315fddb91
libvirt-nss-10.0.0-6.7.el9_4.x86_64.rpm
a6d3fb6c765bc0732efd06f09010a4ebb2aa0768684bc8211ef2dea9e3362874
RLSA-2024:5693
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-1.el9_4.2.noarch.rpm
86e2b506ce80f6694357f69a310824336abd89da58fcb884a7472ccc27c457c4
tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm
60684fa05e5906fc04006ab34a27ddf06ead3379a9c73d4bd8e73c8f11dc5996
tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm
b2db5fbedcd1b74219683f09ed03c5151e30773e1f9bc9caa9604501b116bf9a
tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm
9e4fd3d3907a6a56b9cdca13639fde93202592b952ae0d1d4e1a249689b75e6a
tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm
043d008cad3e0f4e3ae140257bf288dd1065b01496b3b40cdf1dd6889461c341
tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm
76bb272aec2e0afe13b47eda30435595309c384ab42ee3a42b517add621f3f9a
tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm
70464fd366b6ea55028cb9a5e83f4d3d8c62186495a69d6b6a4905420f867c77
tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm
4a96e549feb5b49081f0cc4e0cc5e1c7e34a13e93b5cdaa0c1cda7e4399e2527
RLSA-2025:17084
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.12.2-14.el9_6.5.x86_64.rpm
6a98943af561e09b4cf134dbd72790c82969232914ef223a9ffcd1a9c619bb78
ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm
1bf756b143b60de707e6cbface9f1e4bfe99b15ea542c99410b1c6df46fb4548
ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm
17f52e599d90267f2d1ce573bfe42c4781c0e5f58e1c57017ccb4a60597a7def
ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpm
f2b1f713bf100b879b55b16b74c5dbbd5c6161647d92805730c559edaed256fe
ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm
fd135891319dcdcac2f7aa24ffcb6a2e6abd830d39a509c6d2c840b6d9b1dd83
ipa-common-4.12.2-14.el9_6.5.noarch.rpm
434ee5837d6cca9caf40c5ea3da211a69adfe4fed53e7e1c73e22a7e84f2b690
ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm
3c3fd87519f501947d834fc327401b832ea11b7170e8d559ff379e5502f5f352
ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm
83e2bd6d4e1921e6c557c3c3f93e50755ab327baed0c99f866ab050e2807abf2
ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm
de8795a950c7f2ba3230ac4fc4ec1eb68dac135e04b07e3bed51ae0bed92617d
ipa-server-4.12.2-14.el9_6.5.x86_64.rpm
ba14fcb2e31229fb89213698e069d82546f499d8744116dd38f9b86ea7423376
ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm
c03291e596001752495c4d28f21cc4d8d8d455f3f19f833ef4f7e11b2e946eba
ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm
feeda759aa157bffce6bc1a6f9fbf30e674d93a2747307c400ac84b5bbcb5bef
ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm
608ac8f4a783bf0ff27f4e7371bc97865b029fcb3a4a29f461e073dc1f851f1b
ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm
16b0269f8719aaf852d6dec9c9178eb03ef7324923d15e09aaf3a4d12ba9b1af
python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpm
67db30ce3e9d7d15f50e785c65fa28d2f5ea5d8dc791ae37f6f3f6a994f2c223
python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm
d85ae60ac4f7cad1fb618f9fcfde1cf02cace7064dc8293c3d133f7295095bc8
python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm
c1b1b564b74859dc8cbb8c61e765fbcb3845d4791f87c4fe02c096d7652c0f35
RLBA-2024:6469
net-snmp bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es):
* Getting "systemstats_linux: unexpected header length in /proc/net/snmp. 237 != 224" when starting snmpd service (JIRA:Rocky Linux-40403)
* [BUG]snmpd segfaults with error on subcontainer 'ifTable container' remove (-1) [rhel-9.4.z] (JIRA:Rocky Linux-46039)
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-13.el9_4.2.x86_64.rpm
8b54d7d80061818c2878d03266abedabca9fd21470de7e016595fdee8314a178
net-snmp-agent-libs-5.9.1-13.el9_4.2.i686.rpm
e558417f5609e91b7f211d92910216dfb6f6145f2e05c4651c8abf2e7ce91ca7
net-snmp-agent-libs-5.9.1-13.el9_4.2.x86_64.rpm
927be1e8f5de6a41a4fddbbbdb888034795d9ac2538725b6ed8dcc593ac73948
net-snmp-devel-5.9.1-13.el9_4.2.i686.rpm
360f32cb5dd05b3c0bf442eca04cbcf74d0df06523cd1b0dfe3f95f041470bc8
net-snmp-devel-5.9.1-13.el9_4.2.x86_64.rpm
ac464f0cf40688ef6655e69d0282b013faf1eacbe174dfa7257637d02a0d3267
net-snmp-libs-5.9.1-13.el9_4.2.i686.rpm
da24b5413d3bb11b444483296294504900da939214880d7fffbf2a89db10ae85
net-snmp-libs-5.9.1-13.el9_4.2.x86_64.rpm
ed2bcef68a27a781e845df17c7b197e34f2af16edc06cd4ce3cae0dedacf21d5
net-snmp-perl-5.9.1-13.el9_4.2.x86_64.rpm
2a818ac03894cbf20b7da781cbd21dbe11333ea16bc64d7137124d200f544b2a
net-snmp-utils-5.9.1-13.el9_4.2.x86_64.rpm
4b75b03163582179f21e5536787b22f9d346d9728e098b3a30dde411747d8c6d
python3-net-snmp-5.9.1-13.el9_4.2.x86_64.rpm
117c24bf0b309dc9aa4edda95e294419d6453f15c82b1f580fef86ce06d16e4f
RLBA-2024:6679
nss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* Rebase NSS to 3.101 for Firefox (JIRA:Rocky Linux-46851)
* nss: Mozilla: Memory corruption in NSS (JIRA:Rocky Linux-47122)
* Rebase NSS to 3.101 for Firefox [rhel-9.4.z] (JIRA:Rocky Linux-46852)
* nss: Mozilla: Memory corruption in NSS [rhel-9.4.z] (JIRA:Rocky Linux-47123)
* NSS: cannot decrypt PKCS#12 with MD5 HMAC, not even with allow=ALL (JIRA:Rocky Linux-49803)
* drop DSA self-tests in FIPS from nss (JIRA:Rocky Linux-5212)
* freebl/softoken ppcle64 needs renable INIT_SUPPORT. (JIRA:Rocky Linux-6198)
* nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines [rhel-9.4.z] (JIRA:Rocky Linux-53578)
rocky-linux-9-x86-64-appstream-rpms
nspr-4.35.0-14.el9_4.i686.rpm
e6e4d8c8d1a67be5d789475269692b7c1a03fd5ee62cb5784599568550f193ac
nspr-4.35.0-14.el9_4.x86_64.rpm
fce32babfcf598a75e01e80786626dd4d616d16a60f0bdf360112f94ba729601
nspr-devel-4.35.0-14.el9_4.i686.rpm
c748d6cfd0021349d46ac4c88a2562fcf3cfc6426d83b662a13e7fffe7dfb301
nspr-devel-4.35.0-14.el9_4.x86_64.rpm
81cf4876a4f59f09bed4ee67482ea42ce1559087311aef336a2361ef34113b60
nss-3.101.0-7.el9_4.i686.rpm
864a84dd0f376180300c93212a67fe542d291fe1c71a8dc93a1a27382ac1cf83
nss-3.101.0-7.el9_4.x86_64.rpm
0ce9c005fd04cacda4ed01cf607910265f062f75a313cc52415b926803c66dcc
nss-devel-3.101.0-7.el9_4.i686.rpm
29504d3424ef0ac0d900a311211f6b23626e1ee3c59531c943ea7cdebfc75f38
nss-devel-3.101.0-7.el9_4.x86_64.rpm
552628ce550730ede80af664fd1dafbcada27666f8f3b9ad22c0a019ff1e8cab
nss-softokn-3.101.0-7.el9_4.i686.rpm
4a4dab1a01243373256c923d791786ca388f2504da4a0b65c67e3e2ec3797213
nss-softokn-3.101.0-7.el9_4.x86_64.rpm
a8af3e5d885decd9b8160f0bb4ba22f241b559acf95c3f939e9dd885dc696f15
nss-softokn-devel-3.101.0-7.el9_4.i686.rpm
e161222b6fa92658a51c867acc8410fb294db205a7a66124e360a8404310ff75
nss-softokn-devel-3.101.0-7.el9_4.x86_64.rpm
3a9dc7e163487fd7523c81dd230b0a808cf5c404869a0e845990e1af42b4f9ed
nss-softokn-freebl-3.101.0-7.el9_4.i686.rpm
2d530c667fcc09f4a6d545ec75714694b9865e8459848fb68f9292d3d718c9fe
nss-softokn-freebl-3.101.0-7.el9_4.x86_64.rpm
ba13cb0716b92181938144c3869f0181664e6a89e3c92d3f51fd4eaaa66a7488
nss-softokn-freebl-devel-3.101.0-7.el9_4.i686.rpm
03d28172c7c15675f705768e256902a8a123f733cffc232f55483444eef3edfd
nss-softokn-freebl-devel-3.101.0-7.el9_4.x86_64.rpm
4f0ee5de3273693b017cd818ecded8b921891ce9d48acc3e90144d595936bc06
nss-sysinit-3.101.0-7.el9_4.x86_64.rpm
05650d77a5b450c320a5b8ac1e1e1150bccc82baacce35c2ec063ae81dd70539
nss-tools-3.101.0-7.el9_4.x86_64.rpm
468bbb8e3f739008ce621b64a430cd831247a80bec778c7783488daa181a4187
nss-util-3.101.0-7.el9_4.i686.rpm
57ccfe83152a5d61ca83a7683c384145b2e02cb57c2f2e14742befc539379425
nss-util-3.101.0-7.el9_4.x86_64.rpm
da8f3365471c5337af04eb9de452aae274c18e74fe50361a5e2776f95fa98183
nss-util-devel-3.101.0-7.el9_4.i686.rpm
80a43d609d6d5a6fd7c9d91cd6eaed0f29bee512018ceda4ecfcc6ed43907423
nss-util-devel-3.101.0-7.el9_4.x86_64.rpm
04d375ec84aed61bd7eb0a1e2f27417b30b4c7c37f227feccd6aa6103db2c5a9
RLSA-2024:6754
Moderate: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
* libexpat: integer overflow (CVE-2024-45492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.5.0-2.el9_4.1.i686.rpm
2bb54e0647b4a92a7dfc2111e19f8c3b526fdfa45412cc8ac4c617b5bf2fb2c7
expat-devel-2.5.0-2.el9_4.1.x86_64.rpm
e76a937e51189b76c1dd05916febffbe396f5654ff1de6e371a8b927241ce3f8
RLSA-2024:6783
Moderate: openssl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Possible denial of service in X.509 name checks (CVE-2024-6119)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openssl-devel-3.0.7-28.el9_4.i686.rpm
8dd5aea3afbca424ae1d3ded19d5e7809984e2874e2df6cc8e1f97d55bcc372a
openssl-devel-3.0.7-28.el9_4.x86_64.rpm
ce8b8dff9b8b57fe7d7a0fd13ea755d1c5a54ac596b744f02bb29eee356eb78c
openssl-perl-3.0.7-28.el9_4.x86_64.rpm
1342e88e5cf3cc72514ab0ec0cf0c68c0e5789ca941b7f7e23744b48e90f29a2
RLSA-2024:6757
Moderate: libnbd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Block Device (NBD) is a protocol for accessing Block Devices (hard disks and disk-like devices) over a Network. The libnbd is a userspace client library for writing NBD clients.
Security Fix(es):
* libnbd: NBD server improper certificate validation (CVE-2024-7383)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libnbd-1.18.1-4.el9_4.i686.rpm
8c7eeeeb78ec849476fcadacaa53df1ba518ad261ddc893a4004195c344ced22
libnbd-1.18.1-4.el9_4.x86_64.rpm
17f793943719191a6026854e28dc9340a616a895345030a510aa5959b07e1669
libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm
521dbf12fbb3f20accfa8c0b724f5d4c127f91a36998501a7c9c6350ee454912
nbdfuse-1.18.1-4.el9_4.x86_64.rpm
1cd2277466e539edc10b75129e20c9eda3d0cdb9d76da269462ca13c7b49ab1b
python3-libnbd-1.18.1-4.el9_4.x86_64.rpm
d36175ab081eb00c9094e6f8d3b3df085f95d12859a5cfe46efd3a9b1098f7f9
RLSA-2024:7346
Important: cups-filters security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-filters-1.28.7-17.el9_4.x86_64.rpm
d5dbaa7ad7969c98e7c6cb505518c8f481aff0a0c2d6a08c7eb1ae9f47a18904
cups-filters-libs-1.28.7-17.el9_4.i686.rpm
ff5293b83d61306b7607876443e3a40047d505647422de599146ec3273738ab3
cups-filters-libs-1.28.7-17.el9_4.x86_64.rpm
fe1ac3119116b3caab42a4e81905731421575228ed39fdbf97f843597818d158
RLSA-2024:6681
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: 115.15/128.2 ESR ()
* mozilla: Type confusion when looking up a property name in a "with" block (CVE-2024-8381)
* mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382)
* mozilla: Firefox did not ask before openings news: links in an external application (CVE-2024-8383)
* mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384)
* mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385)
* mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386)
* mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387)
* mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.2.0-1.el9_4.0.1.x86_64.rpm
aa10a07a87c2fbe578b2be7bd8a669cefbbbc1014602052d6db673827bf91e0d
firefox-x11-128.2.0-1.el9_4.0.1.x86_64.rpm
7bef68692434e518a30de00fc287f9abd3bc2323e3af5d8f0ee919d4dbdc5c1d
RLSA-2024:6683
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: 115.15/128.2 ()
* mozilla: Type confusion when looking up a property name in a "with" block (CVE-2024-8381)
* mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382)
* mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384)
* mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385)
* mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386)
* mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387)
* thunderbird: Crash when aborting verification of OTR chat (CVE-2024-8394)
* mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.2.0-1.el9_4.0.1.x86_64.rpm
6385865ee8d444bd8af8e8bb118b925abe7883cbf5db18e0a157923023fbf927
RLSA-2024:6726
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm
b069b687314fa883defca1e082876df6cc4c4c182e26b5ddec86ffcf85812c00
fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm
b7b88e7bba93aa7b63bd1e4618b4de73488157658ba057e71fc9ddb2fa40eab7
fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm
bae90478d1d19967e0f9458ff6a2ef3c338e64224b302243214528867168f918
fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm
a03eff80500f943dd0e26ee70761005688912b863f52fb4875ce7569ec912ba1
fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm
9ace2d8439cc3bc3b87967adfa32018337db7fd7bc3c2a9ca1a5553f1e8ebf7a
fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm
0cc96fe09eedcddb9e2ac8f221d4f8b50bdc47226d8478565c27e32256f0c042
fence-virt-4.10.0-62.el9_4.5.x86_64.rpm
3069f0d0f2141a44f2bcc2c37b55aed08b12375c9a40b4ee4c289c8853231e9e
fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm
5b63942be9278f3684ed57c6bfeeb93d6293f27508dbad7ea30f440ae56ec76c
fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm
255e180aaefeb274f89a7ebc9a44c90485eab6e45546df3b0d80e77b22621483
fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm
1d7e8c499566e7fcee25decf9840c04312b501a10e78f65cf31bf0271cf6afd9
fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm
b3e7a621325b9f3a9d16252cb4c0963743fecff7d8fcf88f11c83e71455f6be5
fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm
16955ef28501e1255eb6c90d0c28ec9906c8cc889450c59119f7202939f36276
fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm
f9d665b6be593708752d07430e4b166a9e3a2f9b1f7224f1514ca5801facc1e1
RLSA-2024:6848
Important: pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.
Security Fix(es):
* pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770)
* pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pcp-6.2.0-5.el9_4.x86_64.rpm
95e2eb4a8a6d8cb0901130dd6105a93a6903ce3d0e73921783dc9ae51a950527
pcp-conf-6.2.0-5.el9_4.x86_64.rpm
5b3c45733e5150bfe3e8b68b87f58648df28b54e7b5bfd53f0f710e083553838
pcp-devel-6.2.0-5.el9_4.i686.rpm
08b0738c53fc35ff4038013a6b1f6363996d8f6f059817547443fa5d8918e9f0
pcp-devel-6.2.0-5.el9_4.x86_64.rpm
e2e615293b7e4fa8523b5c64808d829bda4101ed20d6d8e84a2fd9ade9017465
pcp-doc-6.2.0-5.el9_4.noarch.rpm
eaf354aaf12011a48a03dbd5c409f2f8bb5c6034395fe4fbf4adbc02f2215d43
pcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm
d23756ff8d3166b9fec6a76ab917449526f11e728f5623e2f7c1d6e7dbaeceed
pcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpm
77bada175493bbcfd323afdeb577422e4334bb7483048b4713bcbac3c3f14304
pcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm
3d5a661b5157cab345207a386351c6da9045fe15c25668d86be810b219527c08
pcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm
3fc46c349e7256336aa0e419420f38f02b9fc78397f2a822cb61a404484eb36c
pcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpm
86a97d4afb6c7774a8518fd780fef319dfe4eb25dca9aa2b230c8d6646d4f4f3
pcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpm
353cc81934003682b258323d2c7175321fcc3fa1366b3b389c4b944afa9bafad
pcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm
20f126099f135447ad630a0b364b6d8b5c0be6c39f8713eaf1ef5770563763cb
pcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpm
bb33a9d8d667945a2364aed38e04fdf933610e9e7248153c1a7e8ad97bd61721
pcp-geolocate-6.2.0-5.el9_4.x86_64.rpm
b87dd79883d3a1b65b6ffe3c0cceeabda3e6a154bae0655c3314a4a9267f84a4
pcp-gui-6.2.0-5.el9_4.x86_64.rpm
5a2ce3a6288d72751f2aa005a0489e0c18b80dd7d00889e8459233c519997460
pcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpm
229b42ef0b30a6c3d8c7d7ff3e9898d26d854a4bfa4c03bc43fdf5c805f8481c
pcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm
df56fb63843e0e440f920778987e025164a4d7bab8dd1955d62ba1e43fc97f5e
pcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpm
0c323e42cc9e31fd028c67be97606ae8de0b6da098bf978c7c8877b48956bf5f
pcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpm
9dbc1d0996c78b1df80d801866802187b4763346be768186233653ac3c1afbd2
pcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpm
fbb7f5d22e950a1192e9c30ee4794442efc55c13af16ab891b539955c127f87a
pcp-libs-6.2.0-5.el9_4.i686.rpm
63d37d4e8206a28023fceefc9d2c85a6cf9115ca3c7c0909f2fb6dff2a2383d3
pcp-libs-6.2.0-5.el9_4.x86_64.rpm
7a268c6ef51744c6a960b4e46ee215abb339659a70038d82902fc64da299822a
pcp-libs-devel-6.2.0-5.el9_4.i686.rpm
3d39bbb18f9ae60975c254e30760cc3206f97d9fcfa7fa5ac7f43be50e28b16c
pcp-libs-devel-6.2.0-5.el9_4.x86_64.rpm
bcd2b064564a7aae636515d350f39813d43cd22b48b48dcfcb688b9174e8250f
pcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpm
7be476238c82cff028100415c659a641b93f2223d9912a4723e27906acb442f7
pcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpm
68176354f2f34b7b0fa71b501e8a1dbcf415789d5cc4cfafa1d76d567791ccbe
pcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpm
208009cf7a5d9f8b1ae1513aec3c0a4843bce97de40c9ecabb0db9a48e1f30a5
pcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm
e4c4f41fc69a713d5af0280fffbb39bea35018b51a919ca18644b06f2704d16d
pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpm
d33b8075590a7bf08051ce7574f5ae8d974568184971d4fbc1bfa950afe69b43
pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm
015068ef9c51d4e85bd2df05a911ea02f177dfd9f422ab5bcc7e384bac6780a0
pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpm
1db22bac38b56be211c9fa9f552a762474123f28d053d24a6d12752684d1770b
pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm
ccae4078728cf70a7df2b6a482470f2863ed839494dacd25527c82005f7f204b
pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpm
02bb6cf32eab91ec45e9bbd86e2b2414d318f5df7769aaf27ed8e5d0e4e6c62b
pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpm
aebb5a23b9491c22b574195a7082e0323efdd22745d6e6b91a60aaf18e58e0fb
pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpm
d5e8666f1d32271433ccf8a626ebaf2e596ec6e8a4d00b526a4a290a5a5dfaa2
pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpm
20ee43b434c3771c82f9a1e9971f17814052ffefd71747ab4408cce3bdaa4a06
pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpm
1fe7510357e3d42aada1a55f69f775404076fa664bcc1d4af105ae83655b1342
pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm
cd2127bf8e914958e3232f0480d72e232882f8164aeded5e7f60f2a67f0d3d77
pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpm
935d9a21d76ddd8d9f99671f8d5399a94b21f4a934d503ea920b547f6f9f0dfb
pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpm
c68c73bbb42862b78e6308d7df8ff5ae0cd64b9707b794ebccd4b54d3e270185
pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpm
913c6ba1ddf15d5a313e395fe0f8f72ba81e27fee137d862e2a720ec13ca7056
pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm
75538855892dea361282c593d1bdfbc1ecd67ad417516339200f4f8d08d341a8
pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpm
104c847cd258a703e0358a7e104b3e61eea7f097e415cdda277f4ba1bd69eefb
pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm
97cb6c3d2a85dfefc3fff1aff9a163c555512598c3aa417bb7cbaa3b13e0efea
pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpm
d2bbabbbf41773232c30c73f0463708d000d3c025cac270e05878036268a5ee1
pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm
3c8653bab07eaa98fc26ed90223cc7bfb7597b1bd9269287e475cbd679e539e7
pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpm
440954fd3f3eaad8fd08036633433c217a92b056bc6a9d4d717e3714d6bd0534
pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpm
4d08255569e309d5eb06ced8c396c73f0df8f412a15b22f3ab114662fac2d2d0
pcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpm
08d76cb9328506e21de1d4f700bbfad56de226bdc50d1c4149819909570e9ad7
pcp-pmda-json-6.2.0-5.el9_4.x86_64.rpm
5c06591238f77d6e6257ef5cdabd02ead370a426b9e2ab86df14851d5cb09956
pcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpm
e2f9b4472aeeb10a5f06753e50462b3c7cb4c7694d0f7ef70a0793647c673788
pcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm
41e879dc32a671bb1b35a74e7a4fb28c89807525d3635adbae98d6a15d94ac2b
pcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpm
84600b9235fa912cc565eecfc0f86ae0687c00fbbb9060a4fc49091778777284
pcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm
d2ab6a560a6e8c57e60a904f627e0fee3c497a462c56f37d70f0f016f3ba1843
pcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpm
8be95878b8bf09b0a69fe2e8d95bd024ce6dcffe6f0a9b200fcd4ce039017640
pcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm
311334d881886aec77f6b9248bfda2dbcd75aff8c62b6faaf30a478a100a1090
pcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpm
0732ecef13043b182ff4dde104b982bf4e37531c10a7e7943a08337b7362d260
pcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpm
b0806ea65e4ade863a028ec9b10568bdf2bb382025b61a121f97bf0a801eea44
pcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm
39d7d9c3266b02d62cda5d8b94d5ea869fe3ccfcce52023b9e2df1231c2a7027
pcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpm
f676d0fcf43744ff847f98af1ad8f61de5f5a6969063616d6b2825789f2664c6
pcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpm
02f6739bde87abf361015547b701bd8eb2ada3a41e408a63628e0f57b5de8aee
pcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm
5c42d8b3aadf436b82cc1c2016d8981b1ac16b13135564187d3331361f3d1e1b
pcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpm
1605afff673741ebbb996da1efbd565f4e50938ebf2de7c9b92b780c390fc3a6
pcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm
0f52aac9aa861f2f24e8d06114b5b4fdf6ce91eea5368de42b89ab722a3b4de0
pcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpm
b6ebf28de31631c8cd06ef189bc24be33be75a64062d52c73382c893fc4cd52d
pcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpm
40ea03e7b1a5de0b8d6a550f28fd1d0764623d772790cd66cbd0055de6a7f425
pcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm
fe6b77a365e4fca41344cdea00ac57c43f3632e68debdff3e7360b518c551980
pcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpm
2a69190df90b7fe892248fb441daa26d937ddf187a08634f8158b4f4ab89be50
pcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpm
307fe3c7fe953ef53c6a7e33294f76dcfa299cd055f36874bf131acc9684cf59
pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpm
8a024ffdc716cc6af3b510b65fb3d812b5f2a3081e83c846a7dc4f2ded1db650
pcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpm
59fc862b2a1080251b8915d25f0a1bfaad585fa7a05587adc5de4c81727394a4
pcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpm
c91296591ebac5c564d4d5ad8e13f739504998e33a566596f4f092f035a2d6e0
pcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpm
d26758b972cefad2b7d3af104a69d98abb5ae979d8bd6b0770b50bb9eeb26005
pcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpm
cba906b7128842ecc106427741d5448fc22691596ac4853b23ef5c3e487889db
pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm
23fd4ef98bcbcf7582ff6282d5a0ca599736121416ad2feff8b51ecaed679147
pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpm
d5b742aaea57ef9b68361ec69eb9040c528bf56ae03e69f07f893e68deb11c07
pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm
6d63dff2d9fae4d4ee20d555dc5c4ed1136a4ab653b9c95f6ee50f1062a329fe
pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm
031882d9290bc707d034e9f6e10af0599cccd7f408008cae321c464f7f722f21
pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpm
f90a7067827937c581d1ccda2b57852f8551a543b1ad5019b87e2a599879cec8
pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpm
4f5d8a6f07a6998c01a4e7a753d78bccbe1183049324597502d4508a42b843af
pcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpm
8ff4efd94d5f3b63e851bc83463cbaf9f2a14e925d89ffef2a61493b0d52c9a2
pcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpm
039948f74b521159fd1c77cd507cfd0d6d2d547860cea98b2541bce27369ea73
pcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpm
3b8eac12eb9f5358dc36fe2216f7cc8f04f23967e8b9a8fc927744947c027424
pcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpm
e3c7e6408dac9bc305b56e5e496fb7038e4e612ca99a9cf34bd2cf8e3e6610ca
pcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm
cfa087c363f94f53d51ebdd2e1dacf9b50af6cc68782c2eca5d14ac64d053b88
pcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm
a94b75ced0b217c067af3c17e3443d4479e44dde929ceca1ecb26943e04ac6ec
pcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpm
ca1831bf13effd0dce52047cb86388a4671049834f7de64b99eb835244f2cd27
pcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpm
25b90c74ed5119afad4492e2a344b3bb96a3331939681699d3ed8f26aee60886
pcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm
6284294d60ae8548044fc87cf56dc3130af894fcecfd42e1ab6dedbb484976f5
pcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm
265b8891eaf75808613949f1e0910d456424ff820276cf23d4abbe8712f641ad
pcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm
dbd140f1353fe17dfebcf045d63ceb65f7d4d6d5ba5e5fbf6587de83a1efeb31
pcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm
1d78091d50815c2303ec70e6226cfcea989b1da060e1b8dd8fe55cb74d4eb815
pcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpm
e9962da2b073cb21fede3f230c2d95441add177d0ebad4f662802238f2bfe6e3
pcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm
27b4518887d2215c6bb29841b4bf74427e0ffb72edcf8304f7761b3dd7f65e77
pcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpm
45f5c9ae82ced3964ebdf62440fbb0c1d0bd01a74fd92e81e8ae8f86ee4c8cd5
pcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpm
73fa50b4b9707a9498cf1241650d434a3b812f1647d53891b09db8c6a507dc33
pcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpm
2df06f6b4a3f6b766584a099dd8030e29d0f38de7d647a4afc2946ba9b9c371f
pcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpm
03ca4bc7556c503c39a17e987806c86294178da811ff5f91f5ff2b49939ea646
pcp-selinux-6.2.0-5.el9_4.x86_64.rpm
5eb4bf342ac3d6817ace960c5fb2e9b25d6e29bcfb9387b749192bc2c7084fe7
pcp-system-tools-6.2.0-5.el9_4.x86_64.rpm
d9cd6452a7c1a90ee17b86176e74dac09c0149233b6a6c94e55472d625daa7d0
pcp-testsuite-6.2.0-5.el9_4.i686.rpm
30d64f45ab4029fa18dc45e3e01a1e663bdd137aef07c7edf505cddd4edb48a3
pcp-testsuite-6.2.0-5.el9_4.x86_64.rpm
aeb6992a493c09468010c49aa56ca4ebb039f3f7b2e88ac2e60630c1ee4e706c
pcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm
fd4b5ab0af3b254d55216e1cba87e947ac427d79cab199e009f1645b11e83aa2
perl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm
9430cdda860ec33c0b821afdec0521d310f4e7c5ce52cecf199480935627028e
perl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpm
e7666a0cf013bea619cf637c54df22329b6f60d05e63ee4e01bb08cb8c49c64b
perl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm
b36dfcd60eb5ed42617d1a3967e4b1a2f6b706e86ec7de75b0c7f412057d60cf
perl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpm
321119f5720f9ab2b7a3ce43ec609a964400586c336d91e191aa5e61c19141fb
python3-pcp-6.2.0-5.el9_4.x86_64.rpm
824b7c765e48beea24a55c6fe0e65148d5a335a5f268d6e060f298c5b5d93daa
RLBA-2024:6728
greenboot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for greenboot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Generic Health Check Framework for systemd.
Bug Fix(es) and Enhancement(s):
* R4E 9.4 installation failing due to bootloader (JIRA:THEEDGE-4006)
rocky-linux-9-x86-64-appstream-rpms
greenboot-0.15.6-1.el9_4.x86_64.rpm
e807daff1c14b919ac7f7c4524ec53cf0c013b966c148cee63d63aca1d16dac5
greenboot-default-health-checks-0.15.6-1.el9_4.x86_64.rpm
ccc3f689978a39700d799d96fb0f7b780ec03bd368faeff31a1cb5b05fcedacf
RLSA-2025:12280
Important: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for jackson-core, jackson-jaxrs-providers, jackson-databind, jackson-modules-base, jackson-annotations.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Core part of Jackson that defines Streaming API as well as basic shared abstractions.
Security Fix(es):
* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pki-jackson-annotations-2.19.1-1.el9_6.noarch.rpm
72eded1a1c64e90fbab4ddaeb8fe861b39461255d47d86389154c517bf6fe5ea
pki-jackson-core-2.19.1-1.el9_6.noarch.rpm
4652421d102d382b62774242366e892e0f06f3f8f720211c75875111aceb8267
pki-jackson-databind-2.19.1-1.el9_6.noarch.rpm
49a1942d0995df3891f564857a47579e7af45ededc4db267aaa6fdcb654e26ff
pki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpm
af456093e778c75f6a421336d8ca8f9ed0ab100d3fa814ee2e03f0624b4889f9
pki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpm
4a2261295e5cb8cf5d38210239105d23cb7671cc8197618e43e7702a04a2194b
pki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpm
0ca8859169bb1e58ae38919af8225d3c0797cf74d0a29b90aa29afa773b36e40
RLSA-2024:6913
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.21.13-3.el9_4.x86_64.rpm
30dfc6e546a9f207e64fe2629b9a0dda933a0722adedebf082fa6adac6ca67da
golang-bin-1.21.13-3.el9_4.x86_64.rpm
c03827502d8b14fc84a22c887b847b3872e6bb077db90730fdcd7bd2fda343cb
golang-docs-1.21.13-3.el9_4.noarch.rpm
27abd6bd8c1aee99e3900819c28e57c714f2ae71eb51fb8ad3edd38e7bafb588
golang-misc-1.21.13-3.el9_4.noarch.rpm
5dc9c3f58f2f5e25943d806df78a7a9ba853320c5051bef16699318fde73ca9f
golang-src-1.21.13-3.el9_4.noarch.rpm
a8d7c976e90684101579617a711b37c530a288f4253a2f30027633d0ccd4c0df
golang-tests-1.21.13-3.el9_4.noarch.rpm
a81e26d473eeedc7198881e8206f69b1ceed550fada24e0c10ff0c3ca624e58d
go-toolset-1.21.13-3.el9_4.x86_64.rpm
ecf7f1520c100486d32c28a04c2c7155ff1b88bcff398fb1d7ee269a118455a6
RLSA-2024:6946
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-3.el9_4.x86_64.rpm
d7526c2b31dbf4411bf5d62790dcc1cda8d7daa4ffa23a3e1b060ceb6e4f29db
RLSA-2024:6947
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-9.2.10-17.el9_4.x86_64.rpm
8a9b7eb6a15b0d7763ccad1fccd9d4e7aa8c3dd731fa5e3d5f406a5b9def9847
grafana-selinux-9.2.10-17.el9_4.x86_64.rpm
736a5c204c9ab9c03a435691f0b98f96175ab9b5e973e0aaedef45afd48c939b
RLSA-2024:7136
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.4.1-4.el9_4.x86_64.rpm
d0a765603b67060773cbec2fee35d6065c751bd8fc32c5d8df55823671a45aab
RLSA-2024:7204
Important: osbuild-composer security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for osbuild-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
osbuild-composer-101-2.el9_4.rocky.0.6.x86_64.rpm
64d370217664a21c571e0d6793d7d181366d475309766616d9b7643dd5876ba7
osbuild-composer-core-101-2.el9_4.rocky.0.6.x86_64.rpm
439277676386420280e2b7a1a9a4673d12d0bfdfad74f112cfa424c3f8ddf4fe
osbuild-composer-worker-101-2.el9_4.rocky.0.6.x86_64.rpm
dfd913342c0d8200da1820386c4cf85ba9310e57fd55e6b76fd9b2966a68fbcf
RLSA-2024:7260
Moderate: net-snmp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Security Fix(es):
* net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805)
* : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806)
* net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807)
* net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809)
* net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808)
* net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-13.el9_4.3.x86_64.rpm
58358d6b3541c8135397fcec624d7a46c4db23189580b11368561f8eba8fe24d
net-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpm
1b40b0adb59dbe8c590f98d95bcb855f686a9267a074cc134ddbc8132da37c58
net-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm
c2d763881d95f22283bd7d15afa237c1d7245d30222892244435d7dd2f1fa3e9
net-snmp-devel-5.9.1-13.el9_4.3.i686.rpm
dace726d840ee7ac73ac3b66f45f894c41ab77f7f16fa888445cff7c1e4b28fd
net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpm
2442bc29bd63e0b5adadcfb07c9e8efcb7c48a945866429f76ab426edaf697d1
net-snmp-libs-5.9.1-13.el9_4.3.i686.rpm
1216bb0751c3c1343262465e66515c70be1067baabf03813c57ac775e8d9a0c1
net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm
150b7a4fa241bc04ec3f246249d7c24c37bf89321c97ff6d2fb5e9aac7627fba
net-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm
ae335e375eb8932c9a3848856640385381a29a0511558d0e778c1b72ba5fd1cf
net-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm
e3fcf81b898469639996e08448a0685922ad4c88136dc8f948e08f96585aa652
python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpm
9a4069302f4f864d0ec5dc5c11af68d27e92c274b752b1155d4d1a7a18e16eaa
RLSA-2024:8121
Moderate: java-11-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-11-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.25.0.9-2.el8.x86_64.rpm
110885baf9fcb5196103b2e4e67d172f5b484f2f276316011e363b290a30a985
java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm
e74c3155c99a81423ce7dfbd6cb7fd97df9a1a94d73d518a0ad28b4eb81d67b6
java-11-openjdk-demo-11.0.25.0.9-2.el8.x86_64.rpm
b79cfc614713208dd264e07e8c120a7478c7d4d06dddce94642af1aa71297bdc
java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm
acf5410cb94395316222888b8b97a7c5bb7e5d10e6bd8d9247c37d940bc19c56
java-11-openjdk-devel-11.0.25.0.9-2.el8.x86_64.rpm
3f9bafb537d0c175cc0647edb8e5fa3b7764c6f3409d34ebcdd15a743aeab9fb
java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm
97ccb138c41425bb5bb4a28f80431592c6cae3f18dd6cbbcea2a40ca2829d017
java-11-openjdk-headless-11.0.25.0.9-2.el8.x86_64.rpm
c84c7de702ea7202d96c241915d09abb94df989638ab4f93bcc3abceffa32053
java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm
71f8e9461d7435e2be857bbf688df1bc127409cf3a743ee97f5ba680288f98be
java-11-openjdk-javadoc-11.0.25.0.9-2.el8.x86_64.rpm
e2437dbaf43cc89b2c790e199aa48ed4759ee8a909925d3502de0ffa026ec42d
java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm
7bf34092aa2432d2959e8880353b7a2ff58d21997cd292e6e1e40addf51fb831
java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el8.x86_64.rpm
e10df969ad7adfa3fafb064355271b71264dcd6b5401107e479b9f6980cd9dcd
java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm
50a5b666682329d4fcd9153541f9d5a2f1aed43811243fa5d5ea0425bd54e21f
java-11-openjdk-jmods-11.0.25.0.9-2.el8.x86_64.rpm
efdceb4ceef619d690f3318ea74664f8140da5fc5030257458f9355998fd13e7
java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm
3586c7f355b68e7b6ae40ac1fb600714b0cc240405bf3465316ee57174807d72
java-11-openjdk-src-11.0.25.0.9-2.el8.x86_64.rpm
d884d219964ba8549d268762fa7d392694a32bd46cd36d903f5bf4706bfbb8b0
java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm
723cfbd63b51308e739581a7624582e54f309d61b9b5798633e558353ca88027
java-11-openjdk-static-libs-11.0.25.0.9-2.el8.x86_64.rpm
0251eee9fd0559cb281aa5c2f42151503c5366a446d42656790bae656751826a
java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm
984b18d5b12733d502e17e89282c35cd4ad01951c77cbdf7d550314231612bcd
RLSA-2024:8162
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)
* kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)
* kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
* kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989)
* kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385)
* kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889)
* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)
* kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556)
* kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483)
* kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)
* kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959)
* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
* kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272)
* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm
1e2fdc90bda20eb0783619c58ab182b0e7556c0d864781672b24e54aab08d1f8
kernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm
a8f925a196819b4e9507ba828d0bbd4ff5f1a4495ea690f5e8b637b9604d35fe
kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm
f7a081feec37d1a0c25c82987b7e2e3b52133f3312d482915506352fa53d53f2
kernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm
3ff1485deb6f8b9625882bee0f3ded0dc3d2ea854aee47a855ba66e197ce7d8e
kernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm
2679c2621e2eb427c1174729354a1a439d18f111be7d55b86f4f99b721dffa72
kernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm
8d750fa408ae7d4a4932e9c641594e99b28b73ea7b01a9062f9491925f544268
perf-5.14.0-427.40.1.el9_4.x86_64.rpm
070fe9141732806190b9f3bd69ec6aa6226b4864d3fe1543f87521900fac2de6
rtla-5.14.0-427.40.1.el9_4.x86_64.rpm
2b9e99d306fc390fd58e6071b685418c5e138214156aacc0d55a2f2560f9aa9f
rv-5.14.0-427.40.1.el9_4.x86_64.rpm
dede22950bfc9fceeb765c881c972b0f09f9cd42ab152dc2ac6d232d2ad87646
RLSA-2024:8127
Moderate: java-21-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-21-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 runtime environment.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-21-openjdk-21.0.5.0.10-3.el8.x86_64.rpm
868b4ea7031d41f70a388ef4d84ccb5cb3d0f0cf282afe6cdca8a8de0f3cffe9
java-21-openjdk-21.0.5.0.10-3.el9.x86_64.rpm
c258bcd8f2041349b5e7d24ade4b6fc7f451f813f93d07e5d9ff908f4a0b1d85
java-21-openjdk-demo-21.0.5.0.10-3.el8.x86_64.rpm
219784af58e3411bf9d7dddf0b70088af5d066068c1e49aba4078a58017f6454
java-21-openjdk-demo-21.0.5.0.10-3.el9.x86_64.rpm
db6ab1620beee99de9ed64d9ce69ef1d6aeb188142e9b67c0e23b094376041dd
java-21-openjdk-devel-21.0.5.0.10-3.el8.x86_64.rpm
e85ef08b120b9cb368b58a827ce900d9efaf95b5175e26050bb8c6c588af5295
java-21-openjdk-devel-21.0.5.0.10-3.el9.x86_64.rpm
28bca40b98b1bbf314d61a3f7ba1b844e820e84853a693e6bd108c74c9bb5991
java-21-openjdk-headless-21.0.5.0.10-3.el8.x86_64.rpm
299c67d56876765637e0b24a3ca1a4355d099bf86cf3095212f8d5982c500ae7
java-21-openjdk-headless-21.0.5.0.10-3.el9.x86_64.rpm
e0c77892fe58624521fe04fc409d98fddaea20aa20c8ad31d35e0d1672547acd
java-21-openjdk-javadoc-21.0.5.0.10-3.el8.x86_64.rpm
540704861189690709be841e05fc5e83bc481b9ddef9782b58ea4b4f64a76c20
java-21-openjdk-javadoc-21.0.5.0.10-3.el9.x86_64.rpm
8ed46e3b6862bf2677bcd4f7747c3ebccd9da831ee326affe5fc9a4984fc85ee
java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el8.x86_64.rpm
1b400d85d6fa63de39a1e5dfbb868ca1f12474543384cf95710a0ccd64d896f4
java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.x86_64.rpm
0626ed87ddc285ced1ffe8367f8e0f93ad3d349625e0ad1d2b3502c46d95c7e1
java-21-openjdk-jmods-21.0.5.0.10-3.el8.x86_64.rpm
91306042d0ac555562107a8c9c81be491176ef1df87b6568d315c4302e6f96f2
java-21-openjdk-jmods-21.0.5.0.10-3.el9.x86_64.rpm
fe8d357854d0177c049fb5396016643a8acbaafa35a1db915b10ff0b72d8e2d6
java-21-openjdk-src-21.0.5.0.10-3.el8.x86_64.rpm
611921fa3599f4dfaf41fd36b32d3afab6898fea62527d0fea7072bdebd36433
java-21-openjdk-src-21.0.5.0.10-3.el9.x86_64.rpm
253e8d154fd69bfb6fd4d77aa327119f3981629c62d982a5d8a2ce84111d35ef
java-21-openjdk-static-libs-21.0.5.0.10-3.el8.x86_64.rpm
70eae4c1f19f79c7086746b9b06125c1d1d07f47aadff131f9485263fb9d19e7
java-21-openjdk-static-libs-21.0.5.0.10-3.el9.x86_64.rpm
0d1899ea73eb683a09f53e66e4b9b6f7da2af039dc02cbc025b3e8b18a5cac23
RLSA-2024:8124
Moderate: java-17-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-17-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-17-openjdk-17.0.13.0.11-3.el8.x86_64.rpm
fee0c612db246a4d8aecca3f22bfe18385c6275f9acdd1cee582d56efc07c277
java-17-openjdk-17.0.13.0.11-3.el9.x86_64.rpm
5b727362c5f1ccd95478e877654ef4ad3fc8f386efb886db4f29089ee9cf8061
java-17-openjdk-demo-17.0.13.0.11-3.el8.x86_64.rpm
0e90eee05be3ab29b689d5cf6e577210354659912c4e5a2ae244690e3d31e58a
java-17-openjdk-demo-17.0.13.0.11-3.el9.x86_64.rpm
ff0c38a7ea5ecdb749cb4b25fc9142d4381b13f5ad92eb1b5716e0d02de6686d
java-17-openjdk-devel-17.0.13.0.11-3.el8.x86_64.rpm
7a972fdde85e298d7168ccdd9f41ff4ba90ee6cff261f32f191c64d6877ca65e
java-17-openjdk-devel-17.0.13.0.11-3.el9.x86_64.rpm
14efe0c25699c773be7632880c050af48a193dd8efa9373cb34acce8b07643a9
java-17-openjdk-headless-17.0.13.0.11-3.el8.x86_64.rpm
29f8d1804674ee87683a7e40ffa72705e5da07070278e68975bfe1f861cae23d
java-17-openjdk-headless-17.0.13.0.11-3.el9.x86_64.rpm
959d84d025e2db8ecf677fb227f648fcef886f3c85fc870222b5e05139a49755
java-17-openjdk-javadoc-17.0.13.0.11-3.el8.x86_64.rpm
fac1569226a5dc37dcc4ef0356b78321fe5cf703959968bfe77f2aeffae00cf3
java-17-openjdk-javadoc-17.0.13.0.11-3.el9.x86_64.rpm
36b994facfcf0f9e51d74d51c534a40bec69235ceb59c2c8f8e553c12cf08351
java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el8.x86_64.rpm
0f68dc4ac259dacf57e0178ba9893b2c020836120b44fa97b82b8eb27679132d
java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.x86_64.rpm
12d86fc67a834257f812af6540386c29da196bef63758f59591e669e2479791e
java-17-openjdk-jmods-17.0.13.0.11-3.el8.x86_64.rpm
91cebc725f4831414b0301251f8fbede0f7b0c067c77e6741069d1aed48013f1
java-17-openjdk-jmods-17.0.13.0.11-3.el9.x86_64.rpm
824aa01737a648551a651e4ac4338e7c9cb737d1b16d208311cc4d335c238a5f
java-17-openjdk-src-17.0.13.0.11-3.el8.x86_64.rpm
4a37eff6e161094de0116261e0a043af4fdc30345c3e718e5e1b418a73568bb0
java-17-openjdk-src-17.0.13.0.11-3.el9.x86_64.rpm
0e78b64be07c4a312e526ab017005850c9c481ff4cfb7eb19908c09ec5da691c
java-17-openjdk-static-libs-17.0.13.0.11-3.el8.x86_64.rpm
b02054bf492cad2ec74b1b89ca647e945220394eac3e4beb4739f6b64835caa0
java-17-openjdk-static-libs-17.0.13.0.11-3.el9.x86_64.rpm
737dd9c131f8021b57d4fb209d2abfcd2dc3eb01b2f614fa22b8afe0043a5b11
RLSA-2024:8117
Moderate: java-1.8.0-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161)
* JDK: Array indexing integer overflow (8328544) (CVE-2024-21210)
* JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208)
* JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217)
* JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.432.b06-2.el8.x86_64.rpm
3ae1b5f00be4f9feb09f31cf0fe829cdeb6a3e10168350f0a9dd80764a382199
java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm
ce1e777cc2f9a0187220603c0fe3426ef7b54d1e5330167aa207bca9192858ec
java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8.x86_64.rpm
151e25befa2028fc6fe443f903a2f4a2f0e0eae5a569668e0484c042d91e3caa
java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el8.x86_64.rpm
c2a922d1093dfd17f5e49bde88080735bd677b76c2fa06d47aa0d8190c729b64
java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm
af1ae314a71d8a452c4bb27f026494e59e6f8c4a3f77ed58e8637fcb110b451b
java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el8.x86_64.rpm
be568ecf420b6ce5e80a09cd85bc2c49b522d4a0af82fe8769a88a105562f8e3
java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm
bb131c97224763c8d9eb5231d5c9f76739fa0be2d131e37b3a781fec4ed18e3c
java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el8.x86_64.rpm
1494a4e5d6b76e486fd8d4f430a1378740a50fe8e9f231f79b01397f13248faf
java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm
3264b27a14d9c151b6c850e295692a0c7283f6f034dc4c3f62ea9aecabedc4cf
java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el8.noarch.rpm
6a647126ff148113998c546acb26f8ba304d4c1863379eb354b1ba5f7a49ebce
java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm
0ff0a0c54d894f4dc8e040fbf787fdb3ea6106973bf778f78a1839da43c81b77
java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el8.noarch.rpm
755ca7ead530d02c54e92182bb8f260d7689ff23c860b88c2531bb2f2ab701e5
java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm
8883cac0b1882789ae7497ee0c75c432c28a4cf46b11d724b9e87103a497beec
java-1.8.0-openjdk-src-1.8.0.432.b06-2.el8.x86_64.rpm
56560bc25b41135be75f40357abd4f379dc0faa3a79dbdbea33376a81f8c0d18
java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm
e773b35af46ae94b8ac9217835575db9df393cb9430a513c885ba7e58881b079
RLBA-2024:7448
glibc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es) and Enhancement(s):
* glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-9.4.z] (JIRA:Rocky Linux-46763)
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-100.el9_4.4.i686.rpm
21d8d58700be77c4293ba2f131c6439e7c1a3af676c40c0d6d3702b889dcbfa0
glibc-devel-2.34-100.el9_4.4.x86_64.rpm
b6e6d5d30da16bb5f1d863daa4b861a03f6fe96f519a4238580f1331df43ddc4
glibc-doc-2.34-100.el9_4.4.noarch.rpm
fb09c926ec3e7e54b98148fb15c0aebf72c072d6210b2514790e22e66b1ac23e
glibc-headers-2.34-100.el9_4.4.x86_64.rpm
afd1d1d82cb42390c76c0d38dd62cdcb520c660cfb7ab0a79d71d99fb5f5086b
glibc-locale-source-2.34-100.el9_4.4.x86_64.rpm
132d1818a9fa90e1eaaf892bd1d0fffd5bd30e0046fab97c1a21ca3086cc9e22
glibc-utils-2.34-100.el9_4.4.x86_64.rpm
1244b0d16a28a26efceb9420fc56a349af55c97c8d58fa6ddf44472b1b751592
RLSA-2024:8446
Moderate: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.18-3.el9_4.6.i686.rpm
7aa19cbdf9f8e79c2b4986e22ddec8bbf8b673197168114eab39be1a2098ccdc
python3-devel-3.9.18-3.el9_4.6.x86_64.rpm
9c60777d7715807eb5c12dc60fd8e5405ff4af18d7ceb8906953dee36d8c0de4
python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpm
d731e644f823934ba3418ece1ef8ff85eb6c3cd4b25d2a5d128e72653dabe845
python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpm
b009c2f2e6827e3b0b1c251d7bda3958f09448b73878303249887f38fd4b02c8
RLSA-2024:7867
Important: .NET 6.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.135 and .NET Runtime 6.0.35.
Security Fix(es):
* dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484)
* dotnet: Denial of Service in System.Text.Json (CVE-2024-43485)
* dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es):
* dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484)
* dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483)
* dotnet: Denial of Service in System.Text.Json (CVE-2024-43485)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm
9e479dd5d9fb3793fcf314095da1c7e519ebdd9349f4c55adb2e3a2dc9ea6d47
aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm
618189f354fde1e7301cb5a203366e6e185061bc3f0b78662bc20926e1df2cfe
dotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm
66a26d09d82af313a6c93d25abb8497c50a801f8f20afffd4ac703ce6c3bedf0
dotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm
c5446406e5c8471c90c65935685fdd62e96c3bbbf08f26a6c702e8e5e0e88e5e
dotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm
89d2a661a5a364d09de5cab12ff4bb247e0559d45da56c2699bd7f297ba8be27
dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm
1cff8f8755e3e46c049762693b674302cd9c78ad34b7eaaf8bae298652c5374f
dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm
c4c008e1ad042c7f3717b6b45a88045cdb1492fd876eae2342881286105d9142
dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm
2c895ac2c95e245baaedd40a4e3008709375c6dcaff07535dd0db20aef115c01
RLSA-2024:7869
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10.
Security Fix(es):
* dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229)
* dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483)
* dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484)
* dotnet: Denial of Service in System.Text.Json (CVE-2024-43485)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es):
* dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484)
* dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483)
* dotnet: Denial of Service in System.Text.Json (CVE-2024-43485)
* dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm
be151023dd28b0cd0421ad25b15cd5ddeffdde5b05b28de2061414f3fac46ae0
aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm
661ee0fde3558ac9b4755a502179ed2e73591e838e6597239d71db948c9aeb64
aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm
cc80a7a866615159f4c2d8bc2a99674f0092a0e12ae53cfcc60bda76e8b3105e
dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm
5803f0250a4dbeb489b438985286d16dcaba6e57ff6473359a166f72b173670f
dotnet-host-8.0.10-1.el9_4.x86_64.rpm
08c8f2ff860959bc098af13b7cdce21b42c47d5a72397ef780c337f95510caef
dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm
09f0c3ba32576068bef49516b4ff8e60f89f91d6077c855fdac65098980af0b5
dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm
387f61294b40249e08677a4874ac9bdc543109359e4ac49365793a79278214ee
dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm
c524c782ae1d79ddd579d41694856341d7346e4f1d8aca0de4ac92844bb347dd
dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm
be2cc6b6a51c04665f692e6b309357c0fe8ee241f6aeb49294ab24d3786161f2
dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm
16f7d67ac6945cf2bb4d39a1374ed78fa0d5719fe03bbde5e591776d6efdd7cf
dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm
347ebc4a467a57d53ebdbc7618d0fd09106021675f64fa39d50d9992055e089c
dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpm
3fe134cc1abcf2ac9e8ae822038985beaa3dfe4b7f88feeb3298b0a26b33ad79
netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm
f584f4afe2376105f17dcbe926a267cdcc693d837bca5424869d1c74747bd173
RLSA-2024:8037
Moderate: OpenIPMI security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for OpenIPMI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenIPMI packages provide command-line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring.
Security Fix(es):
* openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator (CVE-2024-42934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
OpenIPMI-2.0.32-5.el9_4.i686.rpm
fd6824d6d3d447f1961b06fbccd7688e78fbe15b2448697574cc05bd2f171d26
OpenIPMI-2.0.32-5.el9_4.x86_64.rpm
413ec9745f7f5bb7ed06f2b35a10b622bd0be1f2cef062bf92e2ccd2f2dd8fd0
OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm
2907e983d1a07edb393239cbe58d4f3f73d330b7e962246d187693fe902ac341
OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm
e1a4ffc01f8f0b044c5fe7a631097cd635b62b95ad4a3afd27b43d3ed415b320
OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm
75b7ac015cea1afa223d343268ebf66bb29bc6654a9635db5782874e948a5859
OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm
53ba60a0be214d00f10a3d72cffafd993599a23206c9da9b110f463b9e2dddef
RLSA-2024:8374
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.7-1.el9_4.6.x86_64.rpm
c1c33c56f90e51077a08f0bca9d973d32aa21051e49a10fe6aec8bfb688ab434
python3.11-devel-3.11.7-1.el9_4.6.i686.rpm
2aad327b7d6c4e1033d93811dd69d7834bd67bab6341c4052a8e6b22508eb40c
python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm
3b41c9ece9f07e6469ff63c33cb31a3dd04e29d470cd1a4e8a7fd123480eb2ce
python3.11-libs-3.11.7-1.el9_4.6.i686.rpm
ae7f52bb0b5589aac2b938985b2e09090bd32463c3ce570123776336f3d630b8
python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpm
b7a42414456ba29605df122346083dcbf859e65d0556a093a156a105665bba70
python3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpm
cb066effdc0e14e9672b9aed13ac2e5a9e1b8c4200056d571a510b5685e16b13
RLSA-2024:8447
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.
Security Fix(es):
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.1-4.el9_4.4.x86_64.rpm
11e7e536215c93f44bf5ea791820457a8f9b66b35f4abca01a46594be03f3d36
python3.12-devel-3.12.1-4.el9_4.4.i686.rpm
c200f11e1ca17829daaa8b9089147b6c9756dcc9a7cb43b213826f65ab8c36e1
python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm
63779c05ee1e17ab367d38b24afc9a746cd780a46c5eece748d940bce5542790
python3.12-libs-3.12.1-4.el9_4.4.i686.rpm
8f44ff2118f4815a207c8eb7edc2701137903460355017a01b40d23771f60da9
python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm
b466d1216de4364000b3318e063a7c5edb1948cdc58a89f3eef1c444c0b6710f
python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm
e0888355357ea56e884cc1cf80947995490f93bd86164f240f78748492b4337a
RLBA-2024:7457
mod_jk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_jk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_jk module is an Apache HTTP Server plug-in that enables the Apache HTTP Server to connect with the Apache Tomcat servlet engine.
Bug Fix(es):
* Rebase to upstream 1.2.50 release (JIRA:Rocky Linux-58855)
rocky-linux-9-x86-64-appstream-rpms
mod_jk-1.2.50-1.el9_4.1.x86_64.rpm
d274aa394a9288d4c606928d3c49eccc6344b799214bc24620ba244f81865991
RLSA-2024:7550
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.21.13-4.el9_4.x86_64.rpm
d6e1b36afa4d9c93e4765e7aa6055759b1bc7da4039dcf60b56f30ee83b9f0ff
golang-bin-1.21.13-4.el9_4.x86_64.rpm
1ed482e0e591ad06e97d88cc73efc1c143dd3e52cd3defb27135c3955f775a1c
golang-docs-1.21.13-4.el9_4.noarch.rpm
1c1a237dc9f5b2265584de5fe1e7f5fa63987ca8311b8fd271757fe01fcbf6e1
golang-misc-1.21.13-4.el9_4.noarch.rpm
f32e6525a60ad978a78e789922dc56e77e866a36472e89bba3ebfe57d7845c8e
golang-src-1.21.13-4.el9_4.noarch.rpm
754710a01bf5c86b04b9bc8105d470f4462a51b9d8382f21319aeed587ed34f3
golang-tests-1.21.13-4.el9_4.noarch.rpm
4c886bcd0a3881247afe3a3017c11cbe592569d38dd0be2f477d371ffbf5f054
go-toolset-1.21.13-4.el9_4.x86_64.rpm
ba48844137ce6297b67d271937b3485e768dae6554ef0cc0219296e1037ffff4
RLSA-2024:7958
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.3.1-2.el9_4.x86_64.rpm
fb8e557d6a380bab8aeb9e01f6009221bbcc8323c46dfcaa96e2ca70ded193b8
firefox-x11-128.3.1-2.el9_4.x86_64.rpm
281c92cade9fa06dc3dc01db2d6c020993f7dc9660173868c9b4588077a79bf2
RLSA-2024:8025
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.3.1-1.el9_4.x86_64.rpm
38fe9ff8cbacbeaae029de336f8870ede005b440c3a443ee35fc10cf7841ed7f
RLSA-2024:8039
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
* Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-4.9.4-13.el9_4.x86_64.rpm
a933f4656be7f0de80c573403258070f5bbe5a2151bf576d0e10c2b0047747a1
podman-docker-4.9.4-13.el9_4.noarch.rpm
657ab93d37122a7e279fa5993d845d8657537734bc8b39ad7a34cf0ebaee6549
podman-plugins-4.9.4-13.el9_4.x86_64.rpm
6ba01ef67374906c57f56aeda8a83c799a4e82c166d76ef5b2c8a076d6e59b59
podman-remote-4.9.4-13.el9_4.x86_64.rpm
9d794996585ee6757c4a565f6da46da9853908d0ebb42c2bf2d829431c66a182
podman-tests-4.9.4-13.el9_4.x86_64.rpm
fc985ec70b2556802b1761957aac9c20e1e980da0e21bdddde19ac2e20192696
RLSA-2024:8110
Important: containernetworking-plugins security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm
abab1cdb45a76b5c849198c08651e8329ddd5f1fd6e681c2c49abefa5f722c71
RLSA-2024:8111
Important: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.14.5-2.el9_4.x86_64.rpm
4eaa276c0ea97dfd33c5310ce925b111e331a3afe06d10b2a74a25afaec7a64b
skopeo-tests-1.14.5-2.el9_4.x86_64.rpm
2016d0e2ddd311949c7169e2b5b67fab890b26f1722a89ba2c9b6e55daa80cd5
RLSA-2024:8180
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.46.1-2.el9_4.i686.rpm
27448036a8ef8219981856c7ed68a2462dbfd0b0f5bf47c204343e7146a9bdbd
webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm
41c9ca8f3cce181db4ac0c76798a5bf90dfb87c251916d5ca0079d7dea422ab6
webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm
698ee76d436b84b07a45696b3f1dfa9d3eb7303b44dfecbee82db592b87d1016
webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm
02fe4ad21b73b197e7f017aba38ce60bc758ebe0bda5cbd55995a445faa783a3
webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm
9a0d365826aa16462d95a309fc9740badc15192424d917ebb20a0331ac350460
webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm
7bf4bd07f566835900a681f802a855062cfe25d28abbbdea2d8cd73414af412a
webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm
0deb9b3590549494806ac89f6a11487ab20c4adf7e647201d6c010d671c95a90
webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm
d2f03f916d6e99edc5c1bfe629bd2273cadc36e04f431d2d879ac45fccf414c8
RLBA-2024:8454
rpm-ostree bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es):
* Rocky Linux for Edge build with image is failing - error: Writing commit: While writing rootfs to mtree: Not a regular file or symlink: zero [rhel-9.4.z] (JIRA:Rocky Linux-62651)
rocky-linux-9-x86-64-appstream-rpms
rpm-ostree-2024.3-6.el9_4.x86_64.rpm
31118a3865e97283a4b78cc5ac1d216662b8ded3c34d825850b2c8e6f62e1139
rpm-ostree-libs-2024.3-6.el9_4.i686.rpm
db76108196bb0698ea697f84c6ce224a1688f68e94c8e86a361cdbad84f93ba0
rpm-ostree-libs-2024.3-6.el9_4.x86_64.rpm
d33fa8522f9107d0de9012736fa1a9ead33cbcddd73c4d896f0546c216af62ed
RLBA-2024:8805
tzdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024b, which addresses recent
changes. Notably:
* This is an optional update. This update does not contain any urgent time zone changes.
* Several changes to improve historical data and conformance.
* A variety of changes documented in detail in the NEWS file.
rocky-linux-9-x86-64-appstream-rpms
tzdata-java-2024b-2.el9.noarch.rpm
2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21
tzdata-java-2024b-4.el8.noarch.rpm
d22ef14062b63f4619e7fce194729fa90612101c7c2c2ea158ece31d98a4a2d3
RLSA-2024:8617
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)
* kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)
* kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961)
* kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)
* kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)
* kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)
* kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)
* kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)
* kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)
* kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)
* kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)
* kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)
* kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)
* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)
* kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (CVE-2024-40998)
* kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005)
* kernel: xfs: don't walk off the end of a directory data block (CVE-2024-41013)
* kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014)
* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm
b42da7717444c98699b41efa7db6ee2018b3cef59f7e746e5ae4b701772c2918
kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm
17936d83e1f5efa48e557511afcbd75059254972c646c784874796dbcf6c5d43
kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm
c9114ff7e5481ca1c478e9de6c455d25f6b416164447eadc1c8d530558ec79f5
kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm
7b23fdd5d5d2c215d1bb9b3be9c360513f049369cafdd937ea6411b2c1f2a689
kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm
5108aa97c06944a0af22d535ff70b4d08b50be9bcb693de40ce79507634def42
kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm
d0a8b4934b535c79bff19f87c2540a299e96bddf5a10f07893436be627342c09
perf-5.14.0-427.42.1.el9_4.x86_64.rpm
034ea3536c77a0a9712793d5bc6fc5e07abb9114ef69d7750806026a1c81530b
rtla-5.14.0-427.42.1.el9_4.x86_64.rpm
1b1a336ae8060dbff5b55c3589f3e9a1bdd369c2f13ce66e15ba34cded9a0c93
rv-5.14.0-427.42.1.el9_4.x86_64.rpm
f14fd33c1c6ca31d8ba8e122ac194cac979dda899d90aa6e95bbfb967a97d8d6
RLSA-2024:8800
Important: openexr security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.
Security Fix(es):
* OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openexr-3.1.1-2.el9_4.1.x86_64.rpm
a15c09469b452c2873f7832cad1d02b4894850fbf81dd37d4d80e52a0795cfd5
openexr-libs-3.1.1-2.el9_4.1.i686.rpm
405e1722c4c8fa35a98486397949ed37ee6a364fd651d73bec6b0de3aeb6d7ab
openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm
2ef6b71f86446bc448e3a5d2942246dbffc18ea0db6080fc5a13694f9df36e1d
RLSA-2024:8914
Moderate: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.4.0-12.el9_4.1.i686.rpm
01ac8e4ebb906f14e83ebdab4bd003124562561720a342e57080d074bf3c6b3f
libtiff-4.4.0-12.el9_4.1.x86_64.rpm
d760a963c5b275793109894ef139967f9a168ccf57cf844cc7c96f32d9c4a3d5
libtiff-devel-4.4.0-12.el9_4.1.i686.rpm
81cd421c0d481c28773cb83095eb71a50326385af678c0394eb0b00df35d7a14
libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpm
97309d185e3c813e7328588e4e4eea46be1546ba90b2cfef0cf19ef7b8cf377e
RLSA-2024:8935
Moderate: edk2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* openssl: Possible denial of service in X.509 name checks (CVE-2024-6119)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20231122-6.el9_4.4.noarch.rpm
5716082e60f11bdb5afb834aa9e7a69545546758a50e3f5de497ff21124083c9
edk2-ovmf-20231122-6.el9_4.4.noarch.rpm
01c5a535b13fcaa13e5d134ca94d118368f1d15fe2f030b6d9b1a1644d773c7b
RLSA-2024:8563
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.33.10-1.el9_4.x86_64.rpm
8a6b806c1385c7b99aef8b70856fcecee00ad74811ed6c8ad240fb388beeb5f1
buildah-tests-1.33.10-1.el9_4.x86_64.rpm
454ef8265911f74ba1a38023abd213ddc35ab5d13d08945c7cf87f52ffafba27
RLSA-2024:8678
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355)
* dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-9.2.10-19.el9_4.x86_64.rpm
779e5ffaf315ac66b3d0a35ed68d81c510e072bdf99939e3fc43e9f8ba8513f1
grafana-selinux-9.2.10-19.el9_4.x86_64.rpm
7ddee198960050b5fd3a6410f814b6f39cd3f7448bbc27a7e9478efc670d49ee
RLSA-2024:8680
Low: mod_http2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for mod_http2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_http2-2.0.26-2.el9_4.1.x86_64.rpm
93718ddf0a2fc81c2e556534c06e0f29905cf33b1c3421430f4a7cc3a20b8ead
RLSA-2024:8726
Moderate: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
* firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.4.0-1.el9_4.x86_64.rpm
e81198c0fc7c842c382c38ee6c8dc3e6fa7fe71f27780c3f089ec9293a6734d0
firefox-x11-128.4.0-1.el9_4.x86_64.rpm
d76dc9f8ce5abcbb243711e99bc67c6c0804826cb38e6a059318389a04dcc156
RLSA-2024:8793
Moderate: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464)
* firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461)
* firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458)
* firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467)
* firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465)
* firefox: DOM push subscription message could hang Firefox (CVE-2024-10466)
* firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463)
* firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462)
* firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.4.0-1.el9_4.x86_64.rpm
f2060ec5918c5e6d4e47f10c05187ecb14a3448004865f1f4adcf187ff1e47f6
RLBA-2024:9106
qatzip:1.2.0 module bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
QATzip is a user space library which builds on top of the Intel QuickAssist Technology user space library, to provide extended accelerated compression and decompression services by offloading the actual compression and decompression request(s) to the Intel Chipset Series. QATzip produces data using the standard gzip* format (RFC1952) with extended headers. The data can be decompressed with a compliant gzip* implementation. QATzip is designed to take full advantage of the performance provided by Intel QuickAssist Technology.
Bug Fix(es) and Enhancement(s):
* [Intel 9.5 FEAT] [SPR][EMR][SRF][GNR] Update QATzip (JIRA:Rocky Linux-20180)
rocky-linux-9-x86-64-appstream-rpms
qatzip-1.2.0-1.el9_4.x86_64.rpm
3b75e21e0078875871f95ff22bcc11f969b861ef836f4c4cf5b0a9c2e50b0f64
qatzip-libs-1.2.0-1.el9_4.x86_64.rpm
c940c373763e0494eeb99b96bdc0a37bdb600baf71a8de0292113fb95eac95d9
RLBA-2024:9107
qatlib:24.02.0 module bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Intel QuickAssist Technology (Intel QAT) provides hardware acceleration for offloading security, authentication and compression services from the CPU, thus significantly increasing the performance and efficiency of standard platform solutions. Its services include symmetric encryption and authentication, asymmetric encryption, digital signatures, RSA, DH and ECC, and lossless data compression. This package provides user space libraries that allow access to Intel QuickAssist devices and expose the Intel QuickAssist APIs.
Bug Fix(es) and Enhancement(s):
* [Intel 9.5 FEAT] [SPR][EMR] qatlib: Add RAS/HB/VFF features (JIRA:Rocky Linux-20174)
rocky-linux-9-x86-64-appstream-rpms
qatlib-24.02.0-1.el9_4.x86_64.rpm
e03575d24572e10d5919879963e1f3df5fcb995b5a996501fe4158f436cb5b06
qatlib-service-24.02.0-1.el9_4.x86_64.rpm
20273dfe3465437abe002819320da9a7771c46006976334bb3a719c9ca41b9e4
RLBA-2024:9138
libappstream-glib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libappstream-glib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libappstream-glib-0.7.18-5.el9_4.i686.rpm
82affb4d025712a8fa3a8ecd7c6af8c2d544c5b40be92dbd17a367259c8b8bc9
libappstream-glib-0.7.18-5.el9_4.x86_64.rpm
b0f2a36b7271c2c10a2baf46368b465ba86cf38a44a7cd009334926de8a7d58e
RLBA-2024:9230
qt5-qtbase bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qtbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtbase-5.15.9-10.el9_4.i686.rpm
0ac2eabf4591e701f2a5386aa812b3660ae69dcb3b0900c6e01aba0ac6a74e98
qt5-qtbase-5.15.9-10.el9_4.x86_64.rpm
417f1b8d14840782eea6d725164b250561667ed09c17187f9a6681645dd069d0
qt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm
0a00886aeb716a385de60c07c2d9f36e475bff80dc231a8fb6d572c4b551448b
qt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm
268b97189db4faf7e9c97191ce796f8679da2583cb4d2056e78dceea4a92372b
qt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm
268a9b3d3429abc2da9361ce036a50d54f635cc7be12bc92d40088a547233480
qt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm
5e37ae61a04e5fdabe3640b6644925273bbe5a756fb8541813790797dfc27f81
qt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm
665356136afca4d5cf28ef71ca6c6594fd6c658d5226424939ff3d85874f0a57
qt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm
f5110b017cfa360ac3e3051cf64e1213de4f6d80958be403211731a71a137827
qt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm
4b2e4d7cafa6cc9762b6c890c774ca8fa1474fdffcb3513a316278e8cc29aaac
qt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm
5e8a9d6a677033b0d4b0f5bf85f11d54af70a68d3b02ae04c98cc28fc3b6c393
qt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm
cd76e2cd4dee064a5aa2d06d2073acad270ed958f5ff18f2168093d04e0724bd
qt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm
1570e6e4baf8836e8f3ee2658e8d1079101382cffd9c30c4cbf26ba96e1c14dc
qt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm
fd900c26bc4bc21df0f7c085a8b6735819b121d39946750f2adb0d7af47ec494
qt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm
26fe4b5289d50332f582fa01cff77062acfb547f1e99c3032a85e93bd314a42f
qt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm
0ad991f8fd5fe689d6aa197ec704f90554206bb99fe49598baad5f1a77a1f938
qt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm
325801f1ef38ed45f2c4392e1c40e232001773d4c6f80a06032300075e459a4e
qt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm
d5d3f874d10126ea677fa42f700443befff1ad68ed2f4fef48b87f84e3d3b357
RLBA-2024:9270
libblkio bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblkio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblkio-1.5.0-1.el9_4.i686.rpm
db6ad045393ea741385a432227f1d01f76fe6849b0994bd6187b4040fa2213c9
libblkio-1.5.0-1.el9_4.x86_64.rpm
cf8e04ee37c96440b80c87739cc3d66127ab6345985e13abe33d9b49ab9d1093
RLBA-2024:9279
augeas bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for augeas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
augeas-1.13.0-6.el9_4.x86_64.rpm
ba47d317f491e35066efe9f0d595f5d7c74570baadced9ec3f07ae4fe8180af6
augeas-libs-1.13.0-6.el9_4.i686.rpm
38eb60c7d70e6f35e1a7c62da881b0baf1a7a1316b24dfe08d5dc1ebf11bcf59
augeas-libs-1.13.0-6.el9_4.x86_64.rpm
2ac9a5e626ea70d1890d5ecc64937eeb9fa9c701b38722476f0e5419d3967fe9
RLBA-2024:9284
postgresql bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.16-1.el9_4.x86_64.rpm
3134e2e1f66599bec78f9253fb3b89548d78dbfa29349ae6cdf74035394e84ee
postgresql-contrib-13.16-1.el9_4.x86_64.rpm
4e203afc1a165afdb33b1eae11691d4f4b9b485184ae421b319c6e480917f8c1
postgresql-plperl-13.16-1.el9_4.x86_64.rpm
2e8ca1c831a8090e2793687ec95e78fab91ebb818dbba47064bf2ce60da44840
postgresql-plpython3-13.16-1.el9_4.x86_64.rpm
9af349f8a12763c6440b4e8709c690d53c5762fe142b905f7d963a79f8ddb8ae
postgresql-pltcl-13.16-1.el9_4.x86_64.rpm
bdc31de3e0a3a9dfc4f6237627b5523c2feb9ab733891122ac5a58dfaa93e771
postgresql-private-libs-13.16-1.el9_4.x86_64.rpm
2edd85939b4eb7e948b9a0ced4a3cb78c0412ab238961c426020f36e40793f68
postgresql-server-13.16-1.el9_4.x86_64.rpm
d23761e5c7d995ab0c8bf9376ee8858d005e2e5dcc8f3d383d9b7505fce523cf
postgresql-upgrade-13.16-1.el9_4.x86_64.rpm
cd0c20e58bd73356d9552544365ea84ef238c0357df8ceb03f25ef43446a2730
RLSA-2025:17428
Important: open-vm-tools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.
Security Fix(es):
* open-vm-tools: Local privilege escalation in open-vm-tools (CVE-2025-41244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-12.5.0-1.el9_6.2.x86_64.rpm
4dd66769066dc2fd59b810c05fe12d260f14016f9345c9c32629157b5739573c
open-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm
289af42aa48afe9f4afad81f057bbf3b35b39e8bf15eeddb1f275e830336f7e3
open-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm
732b95d6569ec16624945b3d9337924c7a56e270ac7c3ad241f0c60679d98a72
open-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm
95d888d7ed0f9614821c3805e0846367614e00dc204947623f4fc837d78d6cdb
open-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm
2aab2fe86bb4d87213c7e3f8c080bbf76903e7221ab9612a7725a1bc4352943a
RLSA-2025:17558
Moderate: iputils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: iputils integer overflow (CVE-2025-48964)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
iputils-ninfod-20210202-11.el9_6.3.x86_64.rpm
b982dd0f7b339830b0a1f2be251d9ec9bc9201bc6a3145ecfa11139605da81e3
RLSA-2024:9548
Important: openexr security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.
Security Fix(es):
* OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openexr-3.1.1-2.el9_4.1.x86_64.rpm
a15c09469b452c2873f7832cad1d02b4894850fbf81dd37d4d80e52a0795cfd5
openexr-libs-3.1.1-2.el9_4.1.i686.rpm
405e1722c4c8fa35a98486397949ed37ee6a364fd651d73bec6b0de3aeb6d7ab
openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm
2ef6b71f86446bc448e3a5d2942246dbffc18ea0db6080fc5a13694f9df36e1d
RLSA-2024:9051
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407)
* buildah: Buildah allows arbitrary directory mount (CVE-2024-9675)
* Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-4.9.4-16.el9_4.x86_64.rpm
b3551c832b05016948833ba5e0ee9473ff37926db32e6f422c916f0798334849
podman-docker-4.9.4-16.el9_4.noarch.rpm
45b183910b93c9d5565be00d2f22b2b20b7cab00bf5e320cfea56d690e8390be
podman-plugins-4.9.4-16.el9_4.x86_64.rpm
43b9c53f1e3b12c4f1d44e34aec04e1a4006b804d8876df3221bfdc2e24f2109
podman-remote-4.9.4-16.el9_4.x86_64.rpm
57860fd4c0d139bf22e0891d83d98aa3dae26b57a708fa85c17ee338ec542149
podman-tests-4.9.4-16.el9_4.x86_64.rpm
d51eed2da23c222aaa60285d91fd100b63444fbeaad4b5bc990ccc0e54b0bf63
RLBA-2024:9112
qatengine:1.6.0 module bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatengine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package provides the Intel QuickAssist Technology OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms.
Bug Fix(es) and Enhancement(s):
* [Intel 9.5 FEAT] [SPR][EMR][SRF][GNR] Update QATEngine (JIRA:Rocky Linux-20176)
rocky-linux-9-x86-64-appstream-rpms
qatengine-1.6.0-1.el9_4.x86_64.rpm
a882fefc905d5f18e055a8fe6d3c89689229486d25e39772fe94b08de35ad378
RLBA-2024:9146
grafana-pcp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-3.el9_4.x86_64.rpm
d7526c2b31dbf4411bf5d62790dcc1cda8d7daa4ffa23a3e1b060ceb6e4f29db
RLBA-2024:9186
gcc-toolset-13-gcc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-gcc-13.3.1-2.1.el9_4.x86_64.rpm
1465aa86aa652caea9d27af902f6c2c6dcb3695b85dd56d15d9610006d7adcba
gcc-toolset-13-gcc-c++-13.3.1-2.1.el9_4.x86_64.rpm
f3cd2056921f918f5550a412659e8350004ac1cd4836aebb08a6e9aab4237c2a
gcc-toolset-13-gcc-gfortran-13.3.1-2.1.el9_4.x86_64.rpm
79959ebb7f255a57c4b36303cb89301ebd265d85523ed9a686df539638d7bfc4
gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.1.el9_4.x86_64.rpm
a2ad5239ec3f4070e1e1b68e21730edd0464d2a7cfe6ca51bc48e95515c575ed
gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.i686.rpm
bd109149f28c4a5d18c0181186f306bbf914dee6886a053595a1bd51b578fbbb
gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.x86_64.rpm
a2225fc807afcc58842af1b09540d587bd1fa4263967c1f0639268ba7d74d3fa
gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.i686.rpm
5c60bd86136c862ca19c6d4286b7144f827bce5446545270449f37cf144777a5
gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.x86_64.rpm
ab334600ff4ce45cbf3dfff3dd8131a8255160d4c9cf3007ec6c1ecccabbd139
gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.i686.rpm
e0dfb9115da466e6a6ce566a3e2fc6eebba04cd1cf85a10b3d562fb75009af19
gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.x86_64.rpm
3194790775ead29e37b5ff098d49406d34d4de623510bfc552cddf44b4c195c9
gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.i686.rpm
203d95f6364f16d3b9f9273f9e32953a300a7292426f77c692f3ff3c3c02b950
gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.x86_64.rpm
17fff10b3718179cd5805a19a655991791f49078af0899310e3a2104454f3ceb
gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.i686.rpm
03dd9a984697fd8c1ae32405ff4e58ad748b3f8ce719260249e50b72ca50ed31
gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.x86_64.rpm
995e4fdc0af853c35522e118963c12a9ab820beec2ac9317153717c5484290e0
gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.i686.rpm
d3453f4ef022af3bcfa56b85b43dc107de72cd7380b79e1c674093ccb30f9dee
gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.x86_64.rpm
15ff144d59a1d656e331204c37ac13bfa7f12dcaa92768092d91115c2a107d0e
gcc-toolset-13-liblsan-devel-13.3.1-2.1.el9_4.x86_64.rpm
9afc99c78b2ac38939aebf367bdb9ada3497a23de6c92e5c5947d460363f4d69
gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.i686.rpm
e1e5cb7a2c82dc895287f622542fc97f4bf1818e7b37278fc7eed24ee88e1ac1
gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.x86_64.rpm
784a6ddaaa6058e39344af633afac1f813816f3e598a7437968b8b720f883dd2
gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.i686.rpm
22789092f67f2bc34d4ce619b2aba1ef554076b08de454f2b945dca5294e4e83
gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.x86_64.rpm
4da283c9291cd3f1bb3607d6d832992458c769ef8f9eca65e664562b60739f0f
gcc-toolset-13-libstdc++-docs-13.3.1-2.1.el9_4.x86_64.rpm
33dcdfb8438ac8b8aecb0a069cb1eb7ada11e89145478638b9b18388f28b4418
gcc-toolset-13-libtsan-devel-13.3.1-2.1.el9_4.x86_64.rpm
b6d05d0aadf761b09f90c03e7d0a1b25d049109ab0bccdb1b996026c0863f937
gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.i686.rpm
8243cfee5b5b4585b37138d109df713d17d1557583c87b11c7138eab7e3b3c55
gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.x86_64.rpm
acbf918634d8fb824c7d82055411bcb843c036cd985f82e4ce36445b3dcb1799
gcc-toolset-13-offload-nvptx-13.3.1-2.1.el9_4.x86_64.rpm
9f755a062b5869e53d09c0d65fa86c641b0e11f7570ac7f70ade7cf904b520b3
RLBA-2024:9211
containers-common bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
containers-common-1-91.el9_4.x86_64.rpm
eff1ddc99c483dd29413211b68cccc739a89cd48ec9d00edaaf4f81109ca9b99
RLSA-2025:17742
Moderate: vim security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
vim-common-8.2.2637-22.el9_6.1.x86_64.rpm
405377fb999d27fbe9773594c1e00d9afb1800c4b2ff55d703152b2eb0907649
vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm
0966b3881b6386c38044bdc1b78c58c890b97e52c542d515fa318edae82303c3
vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm
405993f5496c4cb615fd1ab026dc7e74b9b4f0ac04bcaaa56af1208cbc421c68
RLSA-2025:17760
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
* kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
16c1d7c6e83b3ebf9262f0218ad1f9118396b0f153afc1d2d57e3bf9a66ec91d
kernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm
9c823c7c6b236e4e8efb2ccc6656e64de6e878382b02a8203cfc3292530eb2b9
kernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
ef2b7d48f41f571244907fad587d780d2ffddccb7ded1a5bb953624ce6dd4f35
kernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm
8126ee73e866823472dc4e1e252d8cc2e9a4394c96cdb63d302e4cc4e38699f0
kernel-doc-5.14.0-570.52.1.el9_6.noarch.rpm
223d4a25b9b56285f7b929eea9b7e3a7bd824db932bf723f63b9195894d7fd65
perf-5.14.0-570.52.1.el9_6.x86_64.rpm
5c3a3704874a68b0815cff2ae1c98e2a0cd784322aa3806a04ee3c2040f8889e
python3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm
afe62b2ce53d56fd2786f76a0ed9b4ec9cf3c8b6ed9e28b434364bd0a3906f5f
rtla-5.14.0-570.52.1.el9_6.x86_64.rpm
a021f9a7a5b8ec46951dfcce764884be02cc1ac55c2fc6830c232573a8c17dff
rv-5.14.0-570.52.1.el9_6.x86_64.rpm
aa29104da7f671ff86819a3a7213d47ff890dd7cbcacf009ae4d3df697ef4714
RLSA-2024:9302
Moderate: emacs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203)
* emacs: LaTeX preview is enabled by default for e-mail attachments (CVE-2024-30204)
* emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-27.2-10.el9_4.x86_64.rpm
fa3ed83a9b3d607e31b4d53f344a3afd7a2623bef184395c2293972180b63c57
emacs-common-27.2-10.el9_4.x86_64.rpm
bc6c711fa255e8cf751dfb3cba72917deca8fc645ef87d0d13af6b64577b299b
emacs-filesystem-27.2-10.el9_4.noarch.rpm
85b21bc3342ea2403a9e5d7ad3df352d2948f93efef23c52a922a67fb5a24ba3
emacs-lucid-27.2-10.el9_4.x86_64.rpm
911bd89bfa1eae35a08f4d4618049f5e0ce331e1ca1387918ab76d6f0d8852a9
emacs-nox-27.2-10.el9_4.x86_64.rpm
a10cd0d4af98ad6648340b2bb8efffe84a654e0904bd5aee9cc339b0d86f926e
RLBA-2024:9308
bind and bind-dyndb-ldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind-dyndb-ldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-dyndb-ldap-11.9-10.el9_4.0.1.x86_64.rpm
fa51a4fd9d6c35845930d299fd93726d09efb98906951735c39b4b7ccdf8ef3f
RLBA-2024:10833
scap-security-guide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for scap-security-guide.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
scap-security-guide-0.1.75-1.el8.rocky.1.3.noarch.rpm
678c059c1aba5c796c670dc0e2d40dbdc68a8665b4e2949b8c8ba1ef5a2d4968
scap-security-guide-doc-0.1.75-1.el8.rocky.1.3.noarch.rpm
ceea1e45622dc1d4d94b92c5eb2b1d26ff1d71cd5ee0edbb5318567be31b8030
scap-security-guide-0.1.75-1.el9.rocky.1.1.noarch.rpm
6b20bfed967ba99e1c29cfc95ad91e3c71638efdba0186a13735a6e757c9aa31
scap-security-guide-doc-0.1.75-1.el9.rocky.1.1.noarch.rpm
bbef87912d5bd58cfc400695c3d51c8dafa204ed386aceb7eab2aeb23583f98b
RLEA-2024:11248
tzdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
Bug Fix(es) and Enhancement(s):
* Update to tzdata-2024b [rhel-9.5.z] (JIRA:Rocky Linux-57794)
rocky-linux-9-x86-64-appstream-rpms
tzdata-java-2024b-2.el9.noarch.rpm
2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21
RLSA-2025:18149
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm
cc6d356ff52174463c3259d4cda74819029c5357e1304d2fcb08ca7948a6e6e1
aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm
b51006212a919f0d09be6c92111d5aabb7e9c8482f5c831c43e5137f8f6bfc42
aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm
e8d85594c470c20fd7ba283c6e9d4cfac7726bee6ff140f89354602acddaf0d6
dotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpm
6b47236dd9a8359d07bcf196c2a208565c6bd3aa4ce3f227fbab49eb178544e7
dotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpm
fddee92361bbf76791985f45ce9b32e46089c8873c01f7d5277c6aa24e17a621
dotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm
1019c44e630f517d6e347f93d2361c33b16d6cc642796ce1a319d6c20f002ae5
dotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm
1910741f7310de5e7bd1c12c42238ca4679e204cca451f8775fd8bc4334dc62f
dotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpm
beac1d862fb6b2c4aeace929c3e3c04bf62c173e30d7c07fa3695ab34cb46ecf
dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpm
8a0331d672dd064e19440fe69d52eaceae8ce56056fc5bfee4e9b8fc276a65b9
dotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm
e0e731d8178dc3379bcf9c138ed3921c888123020a8c36d95c40c76009491240
dotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm
bfa9843de9d49c719a01585803b40f3a9523440166b716564ee84c0f80b14de0
RLSA-2025:18155
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* thunderbird: firefox: Memory safety bugs (CVE-2025-11714)
* thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709)
* thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710)
* thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708)
* thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715)
* thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.4.0-3.el9_6.x86_64.rpm
009f365c547fdca8679e92ce6c241741b70910ac4465408c855d870bad29be57
firefox-x11-140.4.0-3.el9_6.x86_64.rpm
bac45b07359028a5b83c10bffedac708d80fbb5a21b07f734ad43a340c41ef01
RLSA-2025:18151
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm
6d4475040011a06d6742d684dc9f400c4904156e6ea471c46d0fa5d750d2f611
aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm
5eeb44353ee5625967eeafa18eceb2b23e8952fcf91ea5ed08611ee511ed721b
aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm
2df2d4c91c31c5f926a3dafa113ee597f513eb099da7cd20b86e8e9df784869e
dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm
e13984eecf93ff6509074b273038d68c0a174b1d1426c9757cef9ff290978031
dotnet-host-9.0.10-1.el9_6.x86_64.rpm
405679de0459e3dbdaaacbca6f6a8022d00318a76f8fc2bf57e9b3d379b552c2
dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm
5d9b0697a6fe9e50594ccd36ae57efb8e9ff530524108c9b357e84a0fa0ef74a
dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm
1bf455bb6988b01608ccfaf51b02d9a2f49d139b509817dd50d41b90b29d0923
dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm
bf30c47803564beffc04d0345089367f7ca3507833c9145bcbf8ebed523c0ee8
dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm
3116fa60894b2f3b5f569ac5b449835ff13ac3fe90c683d00fcca9b1f2e4f614
dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm
70304d3a99708775cac247efcc6c460155798a96a6c0465ebcad49192bc8ddc7
dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm
75c63fc9d6cae325b01a9483f6bcc9a4465cc90cc432340d74911acb56c0c296
dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm
2afe1a26f3eabb86747555bba367a4dcf31191e4d54051910be0a71a0e02528a
dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm
5e39520701407da304c0f2e851c6097942ea4cf527fb1c8c2a265e1788ed4204
netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm
4dc0b881f6b61cca5cfc89e69660185c4a2cbdf19894f800261668516e7bf2e3
RLSA-2025:18275
Moderate: libssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libssh-devel-0.10.4-15.el9_6.i686.rpm
a96fd41045298736b05f64283a13519ae5e99653ca31944b20ba73159b583791
libssh-devel-0.10.4-15.el9_6.x86_64.rpm
61e448230e57ceb63bbf5682809c8cde43f0598dc8d7fd81081eb854befe4256
RLBA-2025:1104
tzdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
Bug Fix(es) and Enhancement(s):
* Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309)
* Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311)
* Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432)
rocky-linux-9-x86-64-appstream-rpms
tzdata-java-2025a-1.el8.noarch.rpm
fec09a50f50a993cdadfe03b7bc1d1d1da271126daa968a6fd8ddcfb8a3c761f
tzdata-java-2025a-1.el9.noarch.rpm
ec47b067903f046c7fd625b1ef96d5c7b27a1f0992fc8783752a34caf36bc2ea
RLSA-2025:0426
Moderate: java-21-openjdk security update for Rocky Linux 8.10, 9.4 and 9.5
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for java-21-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* JDK: Enhance array handling (CVE-2025-21502)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-21-openjdk-21.0.6.0.7-1.el8.x86_64.rpm
6df2370b5aa078f394b52ddb2e06a0f27ff4ce527bd844d1f4311500bf1a9a41
java-21-openjdk-demo-21.0.6.0.7-1.el8.x86_64.rpm
642af058ee4327ef19b4e6636d3d27cbbb5871d8296a130df18577c361706ab5
java-21-openjdk-devel-21.0.6.0.7-1.el8.x86_64.rpm
b43b7f07195998008d8bd90a7568ed7a9dd6bf0699ae834b2565235fb6af6e8c
java-21-openjdk-headless-21.0.6.0.7-1.el8.x86_64.rpm
e4ab115a956b11873f7919c871800d59e9414a1a12f952549f2b19a03b7f88f0
java-21-openjdk-javadoc-21.0.6.0.7-1.el8.x86_64.rpm
0eeea0c8ec9f6ba3765b674d5dac23903bd8a235da4157a7f9a7b76a6c5b4a08
java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el8.x86_64.rpm
de0a4288a1105e13c7279f622fac00ef81422007fa8c1ac298b791c105c0527c
java-21-openjdk-jmods-21.0.6.0.7-1.el8.x86_64.rpm
e02625364a94503d4622e5d71075953bd159d23b14ec76e16547d9d08fc5d0fe
java-21-openjdk-src-21.0.6.0.7-1.el8.x86_64.rpm
9d9b571fa830d17f92a3a94d785ef56cf1820060bebdb572e1d4d0367665557e
java-21-openjdk-static-libs-21.0.6.0.7-1.el8.x86_64.rpm
c6e07ef18b3d2e533f39c0dbe67d616f78e75ed1112313287fe0ba2b19bab011
java-21-openjdk-21.0.6.0.7-1.el9.x86_64.rpm
143d5d4534cb105790f758eede6c958da3d7857fef970e0c0a450dcd3c5cbef2
java-21-openjdk-demo-21.0.6.0.7-1.el9.x86_64.rpm
c086c7ce1f236ec987f381f26a855ec1c8c8259536e0ed713b988012bf466ae5
java-21-openjdk-devel-21.0.6.0.7-1.el9.x86_64.rpm
5fcf7a120a36c99abff3a637a42d72c99e8c5bcf1e0e4d372a19bacc8dcd00cc
java-21-openjdk-headless-21.0.6.0.7-1.el9.x86_64.rpm
10d5aece80d2dffd3c33e31ff6735341bea9cb66f3880bb19e705fc40ec7cea3
java-21-openjdk-javadoc-21.0.6.0.7-1.el9.x86_64.rpm
60c8e4af0d498327f1bb679c703bbcf0dcb49e131a4aa310a1c3886bc14cdbd2
java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.x86_64.rpm
11dcb16f6176441929607447b4000462d516d85ad6a5a5247ef02dce3b853f15
java-21-openjdk-jmods-21.0.6.0.7-1.el9.x86_64.rpm
d3022079ee536e74a1b84b250073e0748e496a7306ecebfa07badb1ebbee53cd
java-21-openjdk-src-21.0.6.0.7-1.el9.x86_64.rpm
f6659cddd5b78ef960bee368bf9f8e6f441ae36ec515df647d2ce8ca50ca89da
java-21-openjdk-static-libs-21.0.6.0.7-1.el9.x86_64.rpm
3353aa449f481b17e6a83803ee866322e5a13c7f4697d88df79b728f97d049d7
RLSA-2025:0673
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs (CVE-2024-53263)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.4.1-4.el9_4.x86_64.rpm
d0a765603b67060773cbec2fee35d6065c751bd8fc32c5d8df55823671a45aab
RLSA-2024:10384
Important: tuned security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Security Fix(es):
* tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336)
* tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tuned-utils-2.24.0-2.el9_5.noarch.rpm
f018576481ce6921afdca59f415a297b38985bcce273d2e0d79298cae7ab6ae0
tuned-gtk-2.24.0-2.el9_5.noarch.rpm
6c47c658828f0518c6b112f2e9c021089cca4026e70a8ec35c75ad75316edaf8
tuned-ppd-2.24.0-2.el9_5.noarch.rpm
0338eb57401aeb49caa95931728048ddf7952484187bc74a82f0cbe23b6ee1a6
tuned-profiles-atomic-2.24.0-2.el9_5.noarch.rpm
5ca5290cb79e39ca7ed2f6ad66bc4cf86223a5a21091158af885d81af9055ee5
tuned-profiles-mssql-2.24.0-2.el9_5.noarch.rpm
d083f4d1f2b1ad216dfc7d755193db2e7e0d1710bb7f0dd51b5725f844f87179
tuned-profiles-oracle-2.24.0-2.el9_5.noarch.rpm
8ef961e41ffb93d5c4c28107cdc7e5bdb23f5afad800b5ffd662aba82c2819e7
tuned-profiles-postgresql-2.24.0-2.el9_5.noarch.rpm
c17802d666befac62640385fa52e5a67338f12ce122aa56bde01dac80c089653
tuned-profiles-spectrumscale-2.24.0-2.el9_5.noarch.rpm
983eb34db971315d8551b483b4274d87b52957a5ba5176fdd1b34541422a7ba8
RLBA-2024:9320
libpciaccess bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libpciaccess.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libpciaccess-devel-0.16-7.el9.i686.rpm
518b2d43a538d115ade774b28e1c46860e7e9666940186de1241d20e49b627bf
libpciaccess-devel-0.16-7.el9.x86_64.rpm
e2af53b1675d8237c62c82246335651eae491400003eee669dcbf06a8253e82d
RLBA-2024:9321
python-pip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-pip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pip-21.3.1-1.el9.noarch.rpm
6bc98b27a014d530be724f1988f213d200751ada53380a87a634e453e0cdf9c2
RLSA-2024:9325
Low: cockpit security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for cockpit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Security Fix(es):
* cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option (CVE-2024-6126)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-packagekit-323.1-1.el9_5.noarch.rpm
e1b7287af6aabbb101f9d113ab910885fcb82fdb685d919d36076a2264fa52e7
cockpit-pcp-323.1-1.el9_5.x86_64.rpm
16c2300303b4b56a6e085bbba909f77488859d9c9fc023f00b9a5c9fea3bbefc
cockpit-storaged-323.1-1.el9_5.noarch.rpm
e6a36f5432ea9871e970a5f407fc394ee6d85ce03589fc61938e718591cfb939
RLBA-2024:9330
libsolv bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsolv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-solv-0.7.24-3.el9.x86_64.rpm
ffe4be2968ab5276e047b84d6a0d8454c55fbe90e4cca1c61d81cd2dc1a49f6f
RLBA-2024:9336
rsync bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rsync-daemon-3.2.3-20.el9.noarch.rpm
369fb0f9ac262f87400bc5018409566e82b495effcbf7bfaa3df3a5fd58bac34
RLSA-2024:9333
Low: openssl and openssl-fips-provider security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for openssl-fips-provider, openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511)
* openssl: Excessive time spent checking DSA keys and parameters (CVE-2024-4603)
* openssl: Use After Free with SSL_free_buffers (CVE-2024-4741)
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openssl-devel-3.2.2-6.el9_5.1.i686.rpm
82fd93d7f932e24813b9fbfc854a7b27c3a5fa2e32f75d5ed4f46161b32c8df6
openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm
027505056b21615587a77642bcb545497d8ac4c4eb1473517a0a3075cca68cde
openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm
6f667ce95a37c91683455f25e25986e6ef7b641aa5db5fa400b181e4f950a283
RLBA-2024:9339
pcre bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcre.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcre-cpp-8.44-4.el9.i686.rpm
925983157b207139580ced4fde53914478513232cfa5b06ce55e6ac34af420f4
pcre-cpp-8.44-4.el9.x86_64.rpm
5921a7ff131ddd53a092d350ea6398601ce2455441f947cb6d27aaf42a9386ca
pcre-devel-8.44-4.el9.i686.rpm
80438e82a171d150e47f9117469c3af15882a529841694e0f9b48ec904c6c144
pcre-devel-8.44-4.el9.x86_64.rpm
1ab8b2c53365db6af779c532790378653f0257302d355fd57b8277bd53addfae
pcre-utf16-8.44-4.el9.i686.rpm
5372824d145b1f4c3d83ae622444a230a9a996d5681744ca966051f8fddc7f5c
pcre-utf16-8.44-4.el9.x86_64.rpm
80d78c80a57ea3f6aa28a02598772af9ea72a064148fbe1ede075f2213dc8258
pcre-utf32-8.44-4.el9.i686.rpm
3e01185cd2346401ca6b3ba5a855c287f3cd89957b056595da0717137a5afcc7
pcre-utf32-8.44-4.el9.x86_64.rpm
775407b7f0b2f6234f15372442a2c43aa6f9d3fe77aefdcf4d021abdbbc9d855
RLBA-2024:9337
selinux-policy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
selinux-policy-devel-38.1.45-3.el9_5.noarch.rpm
3000e1493ba0f20c4811ec309074f80f4f4c8b28bb4770c47328001921379921
RLBA-2024:9342
libnvme bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnvme.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libnvme-1.9-3.el9.x86_64.rpm
0c61b4357868b03e93303025e98526313a3861637523bdf71d98763086f5681e
RLBA-2024:9344
systemd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
systemd-boot-unsigned-252-46.el9_5.2.0.1.x86_64.rpm
1931b2c6c2f0ac888ae36d1d2c8ea62d72a0dd7bc14d7198199184ae70201f6b
systemd-devel-252-46.el9_5.2.0.1.i686.rpm
c89f03f678385cb69c90cd2eeb5489209a091bd7f8ee52f6c253cecb96a0dbb8
systemd-devel-252-46.el9_5.2.0.1.x86_64.rpm
acbed4865022279e75512e1e9ccae1af3dc7e062a971cae75db1a25ae6266f65
systemd-journal-remote-252-46.el9_5.2.0.1.x86_64.rpm
8c322df2ae2041a92800d73b60178c0325f1db3b0d52d431463797fa5c31c2de
systemd-ukify-252-46.el9_5.2.0.1.noarch.rpm
8807b637004b846e74df9a9d8b21787a524c7aeeed823461df245bb9e48533e9
RLBA-2024:9350
evolution-mapi, openchange, and samba bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openchange, evolution-mapi, samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-mapi-3.40.1-7.el9.x86_64.rpm
217db50b4c9ddb535405d615ae30fba046addd1a7cdabc6ee0f786ad5f87702c
evolution-mapi-langpacks-3.40.1-7.el9.noarch.rpm
d0a78e069bf02a8120540f56eb184fcd76adc5c17345b117953d43e7cf87e326
openchange-2.3-42.el9.i686.rpm
6d85ebe9d34fe254014979ef8260d957d021c618152106139006b68569520045
openchange-2.3-42.el9.x86_64.rpm
6e8fd648e9273c16d53c6a7abec67a4f5b16bdf3c94882b698fc28ae45f701d5
samba-client-4.20.2-2.el9_5.x86_64.rpm
80143b8c6fc53512165975878a0e91a635ffaf2006b3234c9518c1e65bcc4126
samba-gpupdate-4.20.2-2.el9_5.x86_64.rpm
94c3dd820a44f58d297d3e3ab7c38fe3616644176dcbf0279d22b9c7847c3f60
samba-krb5-printing-4.20.2-2.el9_5.x86_64.rpm
ffcfe90fbcb155ab9a1588dee832e723ab32fb3e29254c942f92b768bd592868
samba-vfs-iouring-4.20.2-2.el9_5.x86_64.rpm
a547d8822545961b927e24e0b8bdeafe816e164a07415cc01a26f57cb5e618fd
samba-winbind-clients-4.20.2-2.el9_5.x86_64.rpm
b6a0598fd64019aebdce19e052bebe2a4bda12eccadc05452d1915828b77d660
samba-winbind-krb5-locator-4.20.2-2.el9_5.x86_64.rpm
d6b4d11eebad5dffed82babb50d0a0b70db759551bb98375ba63162964682ba0
samba-winexe-4.20.2-2.el9_5.x86_64.rpm
9e297169bf906eb597ab07403bf18c15f17c994e004063746197af2ae6911636
RLBA-2024:9351
sssd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sssd-idp-2.9.5-4.el9_5.4.x86_64.rpm
ca72fdb1bc964e29a6b73e71bf825b93026f007d7256f783634b16a9b4d73e20
RLBA-2024:9352
elfutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for elfutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
elfutils-debuginfod-0.191-4.el9.x86_64.rpm
91edf911d7d4b1d6db58c25070ac994c7f81199c9c3fea357e530c59ddd07ff9
elfutils-debuginfod-client-devel-0.191-4.el9.i686.rpm
ab7a3cda4d2236b596ebf6d1d375ef7112f3f34b6bba4a29daa5a015c8d5e657
elfutils-debuginfod-client-devel-0.191-4.el9.x86_64.rpm
1158314d339d38e04e3a6aa76ac88dd2f400ec03c61532c8ef4d15ab99cb0098
elfutils-devel-0.191-4.el9.i686.rpm
5f27de4f9b2bcb119ebc7349139445000633c4793eeb441e1dd656cb8f90921a
elfutils-devel-0.191-4.el9.x86_64.rpm
a75629f2947cb562dd8d499f2f3d22983039050447a46ec9c964358e4547ac69
elfutils-libelf-devel-0.191-4.el9.i686.rpm
322e60eeaa424fe4be390c1282effbb91204058fd411cc19cc77bbd001bd428a
elfutils-libelf-devel-0.191-4.el9.x86_64.rpm
4852566a0e15039e7f5bd51c2537fe787576f0f8b5a7181e855763d6b621e460
RLBA-2024:9357
dnf-plugins-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-dnf-plugin-leaves-4.3.0-16.el9.noarch.rpm
a53891be9a911bf8930eb23511c355a6c5a1900e03cfd5803c91ef5b29ebe102
python3-dnf-plugin-modulesync-4.3.0-16.el9.noarch.rpm
203a598c71df38aa8bfbd666dfd5922aebd0b86d2d5cc501038eaa4b445dc5a5
python3-dnf-plugin-show-leaves-4.3.0-16.el9.noarch.rpm
ce5a21a469189b7b6bd22395a4c25d7d16ef59cbcbbeeeebf3dbbb87b51cff80
RLBA-2024:9359
rdma-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rdma-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibacm-51.0-1.el9.i686.rpm
aae755f209dd5d0d2b6cc1d5ac569d3e61267e45430f17a7e796cb880c4217f8
infiniband-diags-51.0-1.el9.i686.rpm
69c8bf71b0c3a353e19ca2422f97d07e9f18c7d1a58d9d8c5cbe5f412b50252c
infiniband-diags-51.0-1.el9.x86_64.rpm
160b391236759b96e4e8a2bc380a55c5d92a67618830a628d44c6b6085036f3d
python3-pyverbs-51.0-1.el9.x86_64.rpm
441be845bb94cf1f55ba2aaa0841442423c2881284192ebd9a534b852205f7da
rdma-core-devel-51.0-1.el9.i686.rpm
fef3c99e7ba10125cb4a6e097d95a4cb8ee1c214aba15a40d249d9cacf603db3
rdma-core-devel-51.0-1.el9.x86_64.rpm
8a8fd778367e825484e231d93dcbd4dfe7bfaa584b0acb3438648a2e741f09c0
RLBA-2024:9362
xfsprogs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xfsprogs-devel-6.4.0-4.el9.i686.rpm
9ffb02f2a95daf9b0baf3857ed378bfabe81073ba490f983201d1b57cf0f4aac
xfsprogs-devel-6.4.0-4.el9.x86_64.rpm
c618b064e54dd2ee57ab99d6324414914c5b7784b5c6bdc331412386d85cde5b
xfsprogs-xfs_scrub-6.4.0-4.el9.x86_64.rpm
df241a65efba7c3e0a132f31f54c12f55873b7866b4ffa577432b3ad6f8c5e07
RLBA-2024:9367
rpm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rpm-apidocs-4.16.1.3-34.el9.0.1.noarch.rpm
7156f848480afdb16a5bfac0a87f568cde5fde52a3e0a5717ca65e9562e5b259
rpm-build-4.16.1.3-34.el9.0.1.x86_64.rpm
b8f6abc253d962187052415eb1aea13e1158bc64756774c555fd80431761a600
rpm-cron-4.16.1.3-34.el9.0.1.noarch.rpm
679265d930bd3358e6ee4fe343672412e20ac04f45b2954031a3179380d84837
rpm-devel-4.16.1.3-34.el9.0.1.i686.rpm
a27406920abc3f165158e83e203406534d918ee34a25548b06b2951b5dea5023
rpm-devel-4.16.1.3-34.el9.0.1.x86_64.rpm
de34fade0466c69db0fe78376d7f80e0076de0d8248ea09fc878955dc2b2f109
rpm-plugin-fapolicyd-4.16.1.3-34.el9.0.1.x86_64.rpm
52bee7fea14b9d91a3d82d73f5c7530c2a787b6a471303ae33eab0dcdaecfba3
rpm-plugin-ima-4.16.1.3-34.el9.0.1.x86_64.rpm
c12eb62bf5dc578476dd4f91277bc56479b8c6346abd76630470f26bd6cfc2d9
rpm-plugin-syslog-4.16.1.3-34.el9.0.1.x86_64.rpm
89925253337864666bb2230e12743e15d4158b1fa51cea6d4a7e1cb3ebd54077
rpm-plugin-systemd-inhibit-4.16.1.3-34.el9.0.1.x86_64.rpm
6fb40c9ce0573ff6a83a303103d012838f9e03a2258757d0d4a9486a99078081
RLBA-2024:9365
openssh bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openssh-askpass-8.7p1-43.el9.x86_64.rpm
38adf7037510d75ccb4f2792fd725c6b3f14a27ccf248609843c1d120650ca54
pam_ssh_agent_auth-0.10.4-5.43.el9.x86_64.rpm
65055ccf0044e5e2c4851c95b4f8b79d61dd92588a6ebf9d46298a5ff4dda11f
RLBA-2024:9370
polkit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for polkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
polkit-devel-0.117-13.el9.i686.rpm
ede893ae2040f09541d3aafc87a31aaf638e9e743d9f00a414c6bd1a5b7d47e5
polkit-devel-0.117-13.el9.x86_64.rpm
bd038b21f5bc09e9d1a5119b8bf07c4b88689300ae929cced5306335ebe1df24
polkit-docs-0.117-13.el9.noarch.rpm
8999ce993ffa8f325796979528218d48aec766b054b75e69ce6d431b3611db3b
RLBA-2024:9374
cifs-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cifs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pam_cifscreds-7.0-5.el9.x86_64.rpm
a9aa3e3e659ad2795c69fc9eb23968dd79dd8ec93d8f8c156470f333c9b3a8b2
RLBA-2024:9376
nfs-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nfs-utils-coreos-2.5.4-27.el9.x86_64.rpm
0ef2448adde158ac4fb32a1376100864880ac4028b4d3e3d125874dcf67d5f80
nfsv4-client-utils-2.5.4-27.el9.x86_64.rpm
44affb658fd9e221b695315a94e4d1b6b70b13b2da3af77fe8bc9406a1af6b70
RLBA-2024:9377
libdb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdb-devel-5.3.28-54.el9.i686.rpm
6f462101ef9194d6979a085413127a957b63bec5cd962d395018f40a50819d49
libdb-devel-5.3.28-54.el9.x86_64.rpm
b0ae7c0fe86db1b885605ab6c697b3a5e848f251564e7289baadf42576175fc4
libdb-utils-5.3.28-54.el9.x86_64.rpm
dc055b3b13ff65ef7931ca96961a1072c73c88a69dcfd6b47ea5dc91d26a409a
RLBA-2024:9384
binutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
binutils-devel-2.35.2-54.el9.i686.rpm
e667ac0d57fec3f0a591986cce5ddeabed3bfb2c433e7adacc67761d81cb6ae5
binutils-devel-2.35.2-54.el9.x86_64.rpm
0a9cc5905ed4074255292ab5b6f8035c633875ab62bc32e1b28e1b7d2b303387
RLBA-2024:9387
fuse3 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fuse3-3.10.2-9.el9.x86_64.rpm
8a988c30e93b16df00fcf9b67df680fbe79c24a73857976c17ff0117cbf0e3ec
fuse3-devel-3.10.2-9.el9.i686.rpm
044fca5374d00c3616aa986332dd489212a9450eee8a48f6178e5d33020a7fa3
fuse3-devel-3.10.2-9.el9.x86_64.rpm
ab79964a87316e0da27554e9c394bb774fe3a1c94e9da2a8c70932d71b52f934
fuse3-libs-3.10.2-9.el9.i686.rpm
a9cd2597c0d2a35d9a6a64be6cff445bb023136e294b726bbd73aad8888e2acd
fuse3-libs-3.10.2-9.el9.x86_64.rpm
53288648d76449d1bef5e7cbf93d008f1ed77fba45f51a3ea33c61952c589aa9
RLBA-2024:9395
quota bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for quota.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
quota-doc-4.09-2.el9.noarch.rpm
1ae5b46ed8b7d2f435e76518aa0f34cfaf257c9ade984221b1ae0a701030d2b9
quota-nld-4.09-2.el9.x86_64.rpm
9594208a83f093163378c90d2d53635ffd706cec042af05b2a9786782ab69117
quota-rpc-4.09-2.el9.x86_64.rpm
5824d6df10a7a2261671cc87a3241043e7fe6d4bd88364b4dc64c3f342bcfba4
quota-warnquota-4.09-2.el9.x86_64.rpm
a9322d29d75b7b7c2ff4017453a08717bf933c693fa60dc5bc6f31a56c4f395e
RLBA-2024:9394
lvm2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lvm2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lvm2-dbusd-2.03.24-2.el9.noarch.rpm
e0ebaa66ba3db8385d87e680f04115a0c9973628f157232bfcb51b87678f3e77
lvm2-lockd-2.03.24-2.el9.x86_64.rpm
48eb9245d134d14929d82ec73d0a7806973f94b44541e711d9ab2d57c031e463
RLBA-2024:9403
pcre2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pcre2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pcre2-devel-10.40-6.el9.i686.rpm
730403487e2418ec944f8432bd97404733af71121709ed39453dc427ca0ef5bf
pcre2-devel-10.40-6.el9.x86_64.rpm
6923645f11ecfd70868a3382ac17e79bca1a20c36c6a31e37b6fd50abed6336a
pcre2-utf16-10.40-6.el9.i686.rpm
8020591feb8ff6cb91940bedb248bb237dd169439fa0c0a012637d7024bd10d5
pcre2-utf16-10.40-6.el9.x86_64.rpm
2b661890af3ced083d2bc35376e40a05ee9fc1b8d0fe393740a967cc72a8697d
pcre2-utf32-10.40-6.el9.i686.rpm
6657cab4f4998daa875d697c3d816b6e5330c370e39fa74022ae935b75fe79a2
pcre2-utf32-10.40-6.el9.x86_64.rpm
852cb9f5ea8e0d573d1752e4630924463f7bce74db9ae647139b50cc0c15556d
RLSA-2024:9405
Low: vim security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: heap-based buffer overflow vulnerability (CVE-2021-3903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
vim-common-8.2.2637-21.el9.x86_64.rpm
6d10b80fd9b8d92dded3a5893aaf3bb96e72cff5a2182f1055904ac0180910b7
vim-enhanced-8.2.2637-21.el9.x86_64.rpm
a12154b376e90db585728c54f971924e78ce6f30b3923ce395262dfb98ac8086
vim-X11-8.2.2637-21.el9.x86_64.rpm
6c762244d6a5ce7ce8f1345443ad9a9f23cfcdce98261848ea91e82e36529b29
RLSA-2024:9404
Moderate: libgcrypt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libgcrypt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Security Fix(es):
* libgcrypt: vulnerable to Marvin Attack (CVE-2024-2236)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libgcrypt-devel-1.10.0-11.el9.i686.rpm
8d9e92a0f188fdd97f7e71614f86287b40f46dcd17bd6813fb544811656616f7
libgcrypt-devel-1.10.0-11.el9.x86_64.rpm
5aae73b9f361eb02c6793994628d8c59f0f77b77ea520e26e78d2dbb7cb75b05
RLBA-2024:9408
usermode bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for usermode.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
usermode-gtk-1.114-5.el9.x86_64.rpm
3f2e0ded7aa2e97af952d9ff7652133512f2ad295234225500680896fb4894e3
RLBA-2024:9407
audit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for audit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
audit-libs-devel-3.1.5-1.el9.i686.rpm
fb31b9d1562d964d4800b8d25b1dd4335c9e25db375fde79678764995d9c49d8
audit-libs-devel-3.1.5-1.el9.x86_64.rpm
dcd0621ee8a49d2a4b379d97f8ecee3e33ade8ab07fd55ad354b400881de9dd8
python3-audit-3.1.5-1.el9.x86_64.rpm
c8466f6cbe2b1e793df5c8981daf82e5fb1ddd88e509ed7dce7c2ad3ee80a399
RLSA-2024:9413
Moderate: bluez security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for bluez.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files.
Security Fix(es):
* bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution (CVE-2023-45866)
* BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349)
* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-51596)
* bluez: OBEX library out-of-bounds read information disclosure vulnerability (CVE-2023-51594)
* bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability (CVE-2023-51592)
* bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589)
* bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-2023-51580)
* bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (CVE-2023-44431)
* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50230)
* bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50229)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bluez-cups-5.72-2.el9.x86_64.rpm
50ff1173bc6297e01e1222d45f65aff5f4c263094f3b9aca4f47689f4d4a12c8
bluez-obexd-5.72-2.el9.x86_64.rpm
9884ffe5a5c47d416f33f3a24bc83bb45adb00bf7748f9affca648479ee1c02f
RLBA-2024:9412
s390utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for s390utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
s390utils-2.33.1-2.el9.x86_64.rpm
deb78656406b225e4b9fc1078ec423be4b6363376811dada4ceac262bd6123fe
s390utils-se-data-2.33.1-2.el9.noarch.rpm
6272b2fe18f3db58671e6ba1b4b874693f03f65fce643501166f327e695a3ae4
RLBA-2024:9416
dracut bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dracut.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dracut-caps-057-70.git20240819.el9.x86_64.rpm
e72145b94a2023e82edc8f9d37659284ce7b45370a21b25fc4a4594ed4994c3c
dracut-live-057-70.git20240819.el9.x86_64.rpm
d266362692efb43a9102aa262afdc79bdd888feac0ecb5101bc57cfa1e7e1520
RLBA-2024:9427
curl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for curl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libcurl-devel-7.76.1-31.el9.i686.rpm
654c0e951950bb43ab44813390e42da72f6755c70a40e4c6f4d5ef6ca50bc719
libcurl-devel-7.76.1-31.el9.x86_64.rpm
64e2bb78cb7c74b87fae3bf890c9e66ae381d4a48feaeb0e378ca4c02afe9a88
RLBA-2024:9428
ndctl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ndctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cxl-cli-78-2.el9.x86_64.rpm
c74765e471cfcaec5974dc7e50b3ac621889e648f1e59945c2e41506b7e998e7
daxctl-78-2.el9.x86_64.rpm
9b42b531d67691e63a29bc91b9a0d82c48393ac05d80f827452a4c2acc5ae9ca
daxctl-devel-78-2.el9.i686.rpm
e4ef49008a475394d8d751818db8e6f65e870a0fe02030af3f9915df6ebc876a
daxctl-devel-78-2.el9.x86_64.rpm
93dd77cad72864155d39126aeb09737aca7ac417c89221dbd1b907dd9fc2a086
ndctl-devel-78-2.el9.i686.rpm
e5d170b16a42a40c6c5eec29aa2f716be2c041a3d0c27ec1947315493ae3eaec
ndctl-devel-78-2.el9.x86_64.rpm
0c736160b90c95ea52e88c5ec0e91dd8d66c0a9500e2c94d293b4fe8a92e0264
RLBA-2024:9431
util-linux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for util-linux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblkid-devel-2.37.4-20.el9.i686.rpm
78d3e9c923832ddf3da3ce84f1f6eba6b24a7ff2d06cf23e21eb163a87e7f298
libblkid-devel-2.37.4-20.el9.x86_64.rpm
b22f7cb3e26c29e7566a851e59b46e10413034ea9c5a353c86a046da0d6dc8f6
libmount-devel-2.37.4-20.el9.i686.rpm
df19a7faeb6e7ed7ab3bb5cc2bf9da1b2bb0f873d9adbf00112a32163f74e2ac
libmount-devel-2.37.4-20.el9.x86_64.rpm
91b1d625fa6165900ce9fc260d5f221565ab723164174a94d9f9b04464262cbf
libuuid-devel-2.37.4-20.el9.i686.rpm
6ecef49bde69399c88b33843f80c8ee401fcd0d2218a147e1b1b50541b04dd0f
libuuid-devel-2.37.4-20.el9.x86_64.rpm
f6fc19d10e54bf1d7a52343e2341bfc6dc9433aac0a396549d1d6083011aef96
python3-libmount-2.37.4-20.el9.x86_64.rpm
f061bc3dcb00f3b0f3a80fd7327480680fb43b2ddc108e485123926f56308bac
uuidd-2.37.4-20.el9.x86_64.rpm
89bd6d54e9f2a6d7e1bd031dab09d712592f7a37a2210a50f2094cbd81b0b6f4
RLBA-2024:9434
avahi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
avahi-autoipd-0.8-21.el9.x86_64.rpm
80d654f44b68ed277bbb8081fd0e24915fbe5c53f6f1a2a3535805d39b216f4f
avahi-glib-0.8-21.el9.i686.rpm
ffa77624afb5bb1673bfd888f361e5a302d473b7a589a46cb69b902c3f554f29
avahi-glib-0.8-21.el9.x86_64.rpm
f20bc28aec19f70091a2aed8f5206e37d5ac83206edb161a941f436a90fbccbe
avahi-tools-0.8-21.el9.x86_64.rpm
cff0a0b19ae81b8b2300e608b2e26f5e86396dbeeaba5cae8680f614fd86afb6
RLSA-2025:18097
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43272)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43342)
* webkitgtk: A website may be able to access sensor information without user consent (CVE-2025-43356)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43368)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.50.1-0.el9_6.i686.rpm
65786e98a2690424594031e5ae7052a3f0f03c6ef77c844c48bdd6d05ea46d8a
webkit2gtk3-2.50.1-0.el9_6.x86_64.rpm
9b8d6d1565f846cec2e0ce9db5baf0caeb79b55d741875a78cb1ff1981508250
webkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm
4b7c141863c303daac28f6c0de9fed82cfcb91f5db4b8cef7f66c20fd28ad280
webkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm
327d7107febd053c7b09fe38326230bdc71eee831b21a557c547163072970db0
webkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm
6481669ec9bcf7899236930c5847a36584cb065c2d3d0a4d2df0e0dd998916cf
webkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm
d0010ceb125b74ccb74510b788d0b617b4dfeed0484ac4fbac196c19ea6d1585
webkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm
16a6c01c9d2e17698c58442cb183fdf7ad79118147479624d3bb3b4389ad8cf3
webkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm
45e4a4b875184ce1c1a560e949fdccc49d95697473648f1f1e826fa61a622da8
RLBA-2024:9437
numactl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for numactl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
numactl-devel-2.0.18-2.el9.i686.rpm
a1b1ca1675cd9cc9dd865216a4e0748711f2d3306cfa26aba1a9776dd8dfb949
numactl-devel-2.0.18-2.el9.x86_64.rpm
ebb02768cbc58da6812a084c7d39bebe7a9b7057e04e624e2bbb40a6083bb9e3
RLBA-2024:9438
chkconfig bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for chkconfig.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ntsysv-1.24-1.el9_5.1.x86_64.rpm
2897817748c79b52ca48cf9c5a0470561d915361b1a693a081cc429c45719648
RLSA-2024:9470
Low: cups security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for cups.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-2.3.3op2-31.el9_5.x86_64.rpm
aad3736f03a0b73f46ce08419121079ac5fb2c87cf41acbbcd79139f6cf58863
cups-client-2.3.3op2-31.el9_5.x86_64.rpm
2a0e28eb92125d3e8cc874aa0d536223ddb6d6bb2649f4d1979cb89e72baaf53
cups-devel-2.3.3op2-31.el9_5.i686.rpm
8555eb36114665c5623567847754746856efe403f9bdd85ccaa57a6735d14ca7
cups-devel-2.3.3op2-31.el9_5.x86_64.rpm
0fa2c92973fbb3e07be1e38ea4215d8b27790a38ede2972410ef448f46d1a6ba
cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm
a2a82e0a75e86442df57101ffbdd941fbfb8a94732777c1ce27f410edfef22dd
cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpm
a5063f02264ef89196d219b789d6adf73706b06c3c0c040a0ae85477e8599ef7
cups-lpd-2.3.3op2-31.el9_5.x86_64.rpm
6e9201b2a638a0f23e67c0ae114572efa9f3ba56faf3e4c10e8e6d6a6e1d68d5
cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm
6863d39ad08b50bef04fa41c17d07b224f8f18bd863c21cc68c2b4b47bf9d41b
RLBA-2024:9471
samba bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for samba.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-9.5.z] (JIRA:Rocky Linux-59912)
* Package certs directories in samba-common for gpupdate [rhel-9.5.z] (JIRA:Rocky Linux-59913)
rocky-linux-9-x86-64-appstream-rpms
samba-client-4.20.2-2.el9_5.x86_64.rpm
80143b8c6fc53512165975878a0e91a635ffaf2006b3234c9518c1e65bcc4126
samba-gpupdate-4.20.2-2.el9_5.x86_64.rpm
94c3dd820a44f58d297d3e3ab7c38fe3616644176dcbf0279d22b9c7847c3f60
samba-krb5-printing-4.20.2-2.el9_5.x86_64.rpm
ffcfe90fbcb155ab9a1588dee832e723ab32fb3e29254c942f92b768bd592868
samba-vfs-iouring-4.20.2-2.el9_5.x86_64.rpm
a547d8822545961b927e24e0b8bdeafe816e164a07415cc01a26f57cb5e618fd
samba-winbind-clients-4.20.2-2.el9_5.x86_64.rpm
b6a0598fd64019aebdce19e052bebe2a4bda12eccadc05452d1915828b77d660
samba-winbind-krb5-locator-4.20.2-2.el9_5.x86_64.rpm
d6b4d11eebad5dffed82babb50d0a0b70db759551bb98375ba63162964682ba0
samba-winexe-4.20.2-2.el9_5.x86_64.rpm
9e297169bf906eb597ab07403bf18c15f17c994e004063746197af2ae6911636
RLSA-2024:9474
Important: krb5 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
krb5-devel-1.21.1-4.el9_5.i686.rpm
488b467b9db5fd9b338c9e1c1199554c6827339d3019e2d2ba156bae86f9cc13
krb5-devel-1.21.1-4.el9_5.x86_64.rpm
d20f63e1703ae6720e799b5ce5407e32ad423bab8bcef3ad5b71f62b22e27ca1
RLSA-2024:10244
Important: pam:1.5.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pam-devel-1.5.1-22.el9_5.i686.rpm
511352c9f2e2efd5888704c22e2dba5cc71dff1febf76cef995151cd034f02e4
pam-devel-1.5.1-22.el9_5.x86_64.rpm
d9bbc29d818f48787ea50216e21c54d69c7c16bcca599895361ef015bb70cdb6
pam-docs-1.5.1-22.el9_5.x86_64.rpm
80601fe4ab8034f601898f55d7a2a0a6b89662d22e51f334393ad9e7ce9b5192
RLSA-2024:10983
Moderate: python3.9:3.9.21 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.21-1.el9_5.i686.rpm
2e40f536bf9840012af0c8ca034b95e0e01cedb7f624455e4c2a4daa75dd601e
python3-devel-3.9.21-1.el9_5.x86_64.rpm
866c542b431bad92660f395cd656220c716e53c53587cba82d95fa7cce766fbe
python3-tkinter-3.9.21-1.el9_5.x86_64.rpm
6c1e7c689f4ba924df3fc32bf96f9e4c2aaf443ed7659e7e954593950c9945f7
python-unversioned-command-3.9.21-1.el9_5.noarch.rpm
3209b97f006f84a85b39590198f389318c199000f54831c66f9b46859fccad2a
RLBA-2024:11245
brotli bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for brotli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Bug Fix(es) and Enhancement(s):
* Brotli: check n_bits and BitMask(n) n value for kBrotliBitMask[n] bounds (JIRA:Rocky Linux-32153)
rocky-linux-9-x86-64-appstream-rpms
brotli-1.0.9-7.el9_5.i686.rpm
edd5c058ee6840c86a98824d22379f09c8bd84e1a2a6144675212b528460f34c
brotli-1.0.9-7.el9_5.x86_64.rpm
41f9c29d215d95dfcbacd5caf5e692e98d6fec29e85fde00ce7c3916a85f0902
brotli-devel-1.0.9-7.el9_5.i686.rpm
8bdd8a76fbadeda22bf5ed7e0dcc373f419660066274914bbfa74e336bf00e14
brotli-devel-1.0.9-7.el9_5.x86_64.rpm
3cfd4d6bf4d864d89d3e386f134af49836e1a82a111844c034c4419e9dcd0ee1
python3-brotli-1.0.9-7.el9_5.x86_64.rpm
6125ee8365afc657ff4d9a125ea47da01ca963cd69555a28fc7cd4362f5dfa8d
RLBA-2024:11247
iputils bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Bug Fix(es):
* unable to ping via a VRF IP [rhel-9.5.z] (JIRA:Rocky Linux-63060)
rocky-linux-9-x86-64-appstream-rpms
iputils-ninfod-20210202-10.el9_5.x86_64.rpm
d02902d97910e6ae09e693cae6397aaefc3726362d747c57fe0061f566655973
RLBA-2024:11249
p11-kit bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for p11-kit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.
Bug Fix(es):
* Regression in ca-certificates from bz985428 [rhel-9.5.z] (JIRA:Rocky Linux-64917)
rocky-linux-9-x86-64-appstream-rpms
p11-kit-devel-0.25.3-3.el9_5.i686.rpm
4d5af37c44a70c895c9a228f89c56b8a94e93d4f76c4e36bcc45914372e58f8c
p11-kit-devel-0.25.3-3.el9_5.x86_64.rpm
418ccb6de82a328821dcfe324ad08536c8a1ae161201993ff2e68f57a127d7b6
p11-kit-server-0.25.3-3.el9_5.x86_64.rpm
34c04b3c2623be1df8104e0b98bdcf9d64964c80044acdf5fb9406b5e8c7aa86
p11-kit-trust-0.25.3-3.el9_5.i686.rpm
bce6079ed2422028f6d131c6f1a8991f8396b42b03363e4aae6283757a86becb
p11-kit-trust-0.25.3-3.el9_5.x86_64.rpm
28548ac14bcf8f2cdc8de6832b5e8444eb390de9ce7ae5db93ccb7fcefb2a90c
RLSA-2025:0324
Important: rsync security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm
7b6da89731b2aa4bfb0c5f0cb870c77e8f0cd62a1e46142235a11708d9e6e1b9
RLSA-2025:0377
Moderate: Security and bug fixes for NetworkManager
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for NetworkManager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Security and bug fix(es):
* Routes in table different to main are not deleted on reapply [rhel-9.5.z] (JIRA:Rocky Linux-73013)
* Route to VPN server not stored in routing table that is specified by ipv4.route-table [rhel-9.5.z] (JIRA:Rocky Linux-73166)
* VPN connections do not support ipv4.routing-rules settings [rhel-9.5.z] (JIRA:Rocky Linux-73167)
* CVE-2024-3661 NetworkManager: DHCP routing options can manipulate interface-based VPN traffic [rhel-9.5.z] (JIRA:Rocky Linux-64726)
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm
fb0d1d4aafbb72857ac897b67203dc776bf132c2ced87e154b6f482edc97fe85
NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm
ec77b2f49b4a951326633c32806b63130578eef6e98551076c9fc1279530942d
NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm
7ae76f8e715f8e9767f7930f815e7d2585136b0d0870be97d05f5c8e62b63835
NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm
12133083d8e0391337b1e5a9d8e2b07edf37bc2d9932abb22a5783ecd025b8a7
NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm
2e697f958b2a12f1811de6429ae99d262e1347ce5199817f2671ee63450f65c5
RLSA-2025:0925
Moderate: bzip2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for bzip2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs.
Security Fix(es):
* bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). (CVE-2019-12900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bzip2-devel-1.0.8-10.el9_5.i686.rpm
fcff6819c6193bfc7c630531074005bf18e62251185837145b3570678732680e
bzip2-devel-1.0.8-10.el9_5.x86_64.rpm
bf2316ed91c2b84274e54ec901dcd2b808d4836dc339bf51996851df112ba6c1
RLBA-2025:0926
iptables bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iptables.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es):
* [Rocky Linux-9] xtables-monitor reports error message [rhel-9.5.z] (JIRA:Rocky Linux-69283)
* [Rocky Linux-9] iptables -Z report No chain/target/match by that name [rhel-9.5.z] (JIRA:Rocky Linux-69284)
* ebtables-nft eats '-p LENGTH' parameter (JIRA:Rocky Linux-5825)
* Second bitwise in rule may break listing (JIRA:Rocky Linux-5831)
* protocol names changed to number in iptables output on --numeric (JIRA:Rocky Linux-70173)
* iptables uses `_unpackaged_files_terminate_build 0` rather than removing the unneeded files [rhel-9] (JIRA:Rocky Linux-72005)
* extensions/libebt_arp.t fails on aarch64 (JIRA:Rocky Linux-72027)
rocky-linux-9-x86-64-appstream-rpms
iptables-devel-1.8.10-11.el9_5.i686.rpm
1df00f58d0e4b69b0b80e2fb736eb4e786cf1ca3a6ec413f8ab3a80d46d7f1c1
iptables-devel-1.8.10-11.el9_5.x86_64.rpm
30dca15e773f85d3c533cf43d622ffbd9de75032cc1754b488379af5a41caa3e
iptables-nft-services-1.8.10-11.el9_5.noarch.rpm
b33988478af6080a3b85251d2667c0d10615dc8a1af3e964a57e5adf12bc7a38
RLBA-2025:0929
firewalld bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for firewalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.
Bug Fix(es):
* Raise port range for ceph service to be inline with new ceph defaults [rhel-9] (JIRA:Rocky Linux-66205)
Enhancement(s):
* [RFE] Need a service to be added to firewalld for xrootd. (JIRA:Rocky Linux-45253)
rocky-linux-9-x86-64-appstream-rpms
firewall-applet-1.3.4-9.el9_5.noarch.rpm
132abbea4cdc0a4da333d1ee70f3c725eee01a154b95fab294c0f787cdb07817
firewall-config-1.3.4-9.el9_5.noarch.rpm
b09699ed9309516c6b0d075fdf479d0a3c00156476ed58dc4250e7c81b7aad62
RLBA-2025:0930
ipset bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipset.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set.
Bug Fix(es):
* ipset-service - comments refer to wrong path (JIRA:Rocky Linux-5788)
* ipset 7.11 cannot parse service names (JIRA:Rocky Linux-67098)
rocky-linux-9-x86-64-appstream-rpms
ipset-service-7.11-11.el9_5.noarch.rpm
a4273a190bd94da429aac020ba17ed090fec2a926ecdfa2946f84b068a937d6e
RLSA-2025:1330
Important: openssl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openssl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: RFC7250 handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openssl-devel-3.2.2-6.el9_5.1.i686.rpm
82fd93d7f932e24813b9fbfc854a7b27c3a5fa2e32f75d5ed4f46161b32c8df6
openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm
027505056b21615587a77642bcb545497d8ac4c4eb1473517a0a3075cca68cde
openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm
6f667ce95a37c91683455f25e25986e6ef7b641aa5db5fa400b181e4f950a283
RLSA-2025:1346
Moderate: gcc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
cpp-11.5.0-5.el9_5.x86_64.rpm
3971c47b7a719db54e855219d96a141b7f1110afde1802d7ecbf7b440717002e
gcc-11.5.0-5.el9_5.x86_64.rpm
df4fbf20221f16b2ec0a09a7e95b1dcfd24d0671b495311c47219e0ddc356d1b
gcc-c++-11.5.0-5.el9_5.x86_64.rpm
e0fcf34c6adec0de07cac60351b84ca91964d9b562fac2ea6fd2da03ef33690f
gcc-gfortran-11.5.0-5.el9_5.x86_64.rpm
99dccf59e5f52df2b6386dce7d2d2b62048014c9decd05bb81f9a958b09c1d13
gcc-offload-nvptx-11.5.0-5.el9_5.x86_64.rpm
8a0cacc9c94f0cc608c08febd444ab02e2c7f8d50986a9b2399e82b3a76c3a85
gcc-plugin-annobin-11.5.0-5.el9_5.x86_64.rpm
e653c72fa5f05f7496491fc0d8df77ee4690f6d888e3e34d42b47457c6d429f3
libasan-11.5.0-5.el9_5.i686.rpm
3f82e72820dd25c1094a1017fd46003b9f160445f703a8ab55b25395534a58ca
libasan-11.5.0-5.el9_5.x86_64.rpm
75fdc22cf1d46c9e1e5eb174f93d5b384667ea76135da0eb7d04230deb81303a
libgccjit-11.5.0-5.el9_5.i686.rpm
0ca5d384fb1b5b6fe007fd3b245b798034bfd7a36780deba77b1f5871c6d6672
libgccjit-11.5.0-5.el9_5.x86_64.rpm
8be830c0d3c87f4133c97bb0a305421debaa193c59dbf522d86126c425e29799
libgccjit-devel-11.5.0-5.el9_5.i686.rpm
3303b6b92376ed107d7021d10f29812bfcdbd8bfddc4c19a55ad31784b3ce74d
libgccjit-devel-11.5.0-5.el9_5.x86_64.rpm
cb647d6c5e3dfed24c1f016cdad8b977b98d8c1895d07a790cb6f21f4a7834e6
libgomp-offload-nvptx-11.5.0-5.el9_5.x86_64.rpm
69876ec48e7cb4410adaa346b8ba78a05dac483e08ae4533ebae9c8c17b164e1
libitm-11.5.0-5.el9_5.i686.rpm
85c9e8c336dec768a6fff5c45c71a0aa51c5fabb58941b3c144ab550a44fcaad
libitm-11.5.0-5.el9_5.x86_64.rpm
58838019e588b1b7b7612253b2994b79e5f46d8a8b848ac5253b5b057940a3ff
libitm-devel-11.5.0-5.el9_5.i686.rpm
ec020f66b5e71da328a067384db8eebb622ca2a365524df28010529e46d44d4c
libitm-devel-11.5.0-5.el9_5.x86_64.rpm
fcb24f164917d3899322648399b17f8021ac303ab0190c4f67db39b402b98f7c
liblsan-11.5.0-5.el9_5.x86_64.rpm
9a85d37f731233a701d8cfb4e3fd501f8d7a72a5af79801303cb2f8247d43268
libquadmath-devel-11.5.0-5.el9_5.i686.rpm
04b610243d4dfb7a6bc04f55caf9947fcdd00a27fb277039380c87f95b7ad3b8
libquadmath-devel-11.5.0-5.el9_5.x86_64.rpm
64ed8ea7853eb36314aa9714a3dd5719bc191e743e79a5060790f32e9d38adcb
libstdc++-devel-11.5.0-5.el9_5.i686.rpm
8dd409ea671f11c345b55ef017a0521b6b6041d9c4368d281b7a70ba001fa19f
libstdc++-devel-11.5.0-5.el9_5.x86_64.rpm
a9df7e426503b79954e995b927c528628053740956fad1c9dfb84ee44e06ddc6
libstdc++-docs-11.5.0-5.el9_5.x86_64.rpm
503256e2f52d035386cf38fb387de0d324b25beb982a020419e35e6e7ace3c87
libtsan-11.5.0-5.el9_5.x86_64.rpm
e395d006f8d7bc6aaba68aada5eb1026eced331cb7a935a546d2005b4ac7a8b2
libubsan-11.5.0-5.el9_5.i686.rpm
a62488b62e2dff9abaa14facae63b72e76bfb46a79a84525a8bf4a9b54dcbc64
libubsan-11.5.0-5.el9_5.x86_64.rpm
e5775b3c432a4abc3ed0d4cb570eca52facdc0010ac77a1e08caf9b2ed7e6450
RLBA-2022:6583
WALinuxAgent bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud.
The WALinuxAgent package has been upgraded to upstream version 2.7.0.6 in order to fulfil the minimal requirements of Microsoft Azure. (BZ#2110415)
rocky-linux-9-x86-64-appstream-rpms
WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm
7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148
WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm
f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1
RLSA-2024:9088
Moderate: edk2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)
* openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
* openssl: denial of service via null dereference (CVE-2024-0727)
* edk2: Temporary DoS vulnerability (CVE-2024-1298)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20240524-6.el9_5.3.noarch.rpm
4028b087e6ae46a5aa42437a1a23327bd87d42b19b7c98774b5211ed6500c120
edk2-ovmf-20240524-6.el9_5.3.noarch.rpm
fc0caf09a366d9af2744b360332c131580cca70d734a06cc6db99a13300aff34
RLBA-2024:9086
libnet bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnet-1.2-7.el9.i686.rpm
a3f183d7d53431cbacb1973856c0cb747d6a132759ca004843b2dc65e9703ce8
libnet-1.2-7.el9.x86_64.rpm
336ce9fa67a6ea9d13f243fcd73b1cd66de1608ed62e7394484b7052f0d3e48d
RLSA-2024:9092
Moderate: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset (CVE-2024-22211)
* freerdp: out-of-bounds read in ncrush_decompress (CVE-2024-32459)
* freerdp: OutOfBound Read in interleaved_decompress (CVE-2024-32460)
* freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data (CVE-2024-32039)
* freerdp: integer underflow in nsc_rle_decode (CVE-2024-32040)
* freerdp: OutOfBound Read in zgfx_decompress_segment (CVE-2024-32041)
* freerdp: OutOfBound Read in planar_skip_plane_rle (CVE-2024-32458)
* freerdp: out-of-bounds read (CVE-2024-32662)
* FreeRDP: ExtractRunLengthRegular* out of bound read (CVE-2024-32658)
* freerdp: zgfx_decompress out of memory (CVE-2024-32660)
* freerdp: freerdp_image_copy out of bound read (CVE-2024-32659)
* freerdp: rdp_write_logon_info_v1 NULL access (CVE-2024-32661)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.11.7-1.el9.x86_64.rpm
a19abdb774db4f9ba156e431bd4392742800253f3b21aa3b5ae2d74b93327049
freerdp-libs-2.11.7-1.el9.i686.rpm
1b77a2392163e8ef7c68804171592e5676153025b9a10784f288878c3e903da7
freerdp-libs-2.11.7-1.el9.x86_64.rpm
6a63cf99de98c661dff748b65de7d7b7d9795972c1009915bae80a520016c6ac
libwinpr-2.11.7-1.el9.i686.rpm
9dcf5b104562b2066569076d846ad324ca6ba8629fd89837e89a845cd070c551
libwinpr-2.11.7-1.el9.x86_64.rpm
05abdd16a9c2d9214f6afc0a7768204b6c9be5ac308fd099802fd17a7a402460
RLSA-2024:9093
Moderate: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm
90752a30273b1c7ee096e697f38017b5bd7bfe60b50a55e1d31e7fed84043868
RLBA-2024:9100
sip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-wx-siplib-4.19.25-2.el9.x86_64.rpm
44ce0860bb577ba1a57c3d9367723589e4b36d641364d9ee81c9cb8044096021
RLBA-2024:9103
perl-Tk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Tk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Tk-804.035-8.el9.x86_64.rpm
0b714f0bd80798fe14e1831d6c8b024200ae8e454e33c6a7c5880b23609fa509
RLBA-2024:9111
pytest bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pytest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pytest-6.2.2-7.el9.noarch.rpm
1f1dbad89f60e030343d4d2f84e8ceb69bd5fd0590421d6e481051ad8413431d
RLBA-2024:9118
anaconda bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for anaconda.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
anaconda-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
655e28c4795fd0b1086c7c5d34798b8725e841a4b51c9f5692d107a068aec220
anaconda-core-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
6c8b44f6feed1dd8d0f45735109f8838557ef7fc96f25e1694b74e5bef6ce1b6
anaconda-dracut-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
021675bce56ddc637310537fb1509d916874dfeb0f1c08e561f452b23a72b786
anaconda-gui-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
553cf7275d49e51987cbeaceb051f16c3dfa75805721d279b48954808114d785
anaconda-install-env-deps-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
0e983d00202a59e7d9ee42d7c83a5b1f98408d98a3c61ed7e36b607157cdb668
anaconda-install-img-deps-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
c9a863548fefda6cf5821050e7f94d941b2b486d9455580904b405c006cb861c
anaconda-tui-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
149552465ebb09cce3acd64aca625628dc2be8e9d565b9eeed69021fc3e538b4
anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.i686.rpm
99cae5c51d8ee872ad6eb687fcb54858b3dd4444a8d9b24bfe6ab4f135413323
anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm
0f36357e0377358d6caf826a4686a539ade1093afb3664f248e2de2404ee7ee0
RLSA-2024:9122
Moderate: xorg-x11-server security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm
001a40a96c381fe59d90decd592da9abcfb7d29ce4315d06dc4288ebe06a81e3
xorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm
6d5127ddbcd57ea9a9db40af7b8c79d0da6f12617b2f11688a966470694e6a88
xorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm
2540fecaa4ed18d4bf1d38633055a20c07a8030e19c0699325010c6eadf151fb
xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm
97651b1799835e2b94b367f1311c6305cfa97129d852fad72102c24c9021177d
xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm
e4d144118702e7ad76239aee7e01b0f4f95617f44c422b424bf72bacd9532ed8
xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm
dcca88e032ba55b8f9f855b1dffa89ac7ae6ba88df0ef6338d54cb6573c23c2d
RLSA-2024:9128
Moderate: libvirt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvirt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):
* libvirt: Crash of virtinterfaced via virConnectListInterfaces() (CVE-2024-8235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvirt-10.5.0-7.4.el9_5.x86_64.rpm
69faaeba13ca7a3564d0764701f751f5c8ccf001106345e7860e66fdf5eb3e6a
libvirt-client-10.5.0-7.4.el9_5.x86_64.rpm
bbfd07fda35c8d24f5e3589900c7d5415fe73becebeb1e15760034971c750416
libvirt-client-qemu-10.5.0-7.4.el9_5.x86_64.rpm
b57086d51e0a2aec4567d2b5782fddeaa8ec3a4408198818596ca055b023b536
libvirt-daemon-10.5.0-7.4.el9_5.x86_64.rpm
1b5765652def7b5374e947deddb83cf790ffa0cfb69e9115b198fcfed5eea7ab
libvirt-daemon-common-10.5.0-7.4.el9_5.x86_64.rpm
f423416553a6f719059b83be635d8a0698806c4ab5c0ccc311d40dfe16e080c8
libvirt-daemon-config-network-10.5.0-7.4.el9_5.x86_64.rpm
b4a3e98d878a7b3c21951e9b00b4d02a96d6fc4e659a1e2ec4fc6d04e04fe8a6
libvirt-daemon-config-nwfilter-10.5.0-7.4.el9_5.x86_64.rpm
6f2987a12c837db7a25b6043f28c816015c1718c337761e0f7a2cf6c4f35f654
libvirt-daemon-driver-interface-10.5.0-7.4.el9_5.x86_64.rpm
fbae450b95f9809744cf29ebb85a79ca3152848cfafa3e1752cbb7c3ee7dd167
libvirt-daemon-driver-network-10.5.0-7.4.el9_5.x86_64.rpm
51263d3e004bf5f25d7fb546f9e2bd5d24aa319d297d8f1c9f04b47c0900ffbb
libvirt-daemon-driver-nodedev-10.5.0-7.4.el9_5.x86_64.rpm
8f9a49cf4fc476de98d178005c6b839900c199d45e27914e4ddba9bcf040ab74
libvirt-daemon-driver-nwfilter-10.5.0-7.4.el9_5.x86_64.rpm
2011f25c2817d3f7c5bb6e4030bf24c35a4f1dad12233d7b68e4d63bd207a544
libvirt-daemon-driver-qemu-10.5.0-7.4.el9_5.x86_64.rpm
cd0ca10e762d099d8906d375819f06ed150814668f9cbe328052e6303412027c
libvirt-daemon-driver-secret-10.5.0-7.4.el9_5.x86_64.rpm
a800c9f4a7305d1e0663c6b22a188387cc080f4198a816150c7bc3d9df38f839
libvirt-daemon-driver-storage-10.5.0-7.4.el9_5.x86_64.rpm
44243c5a06e826bea9f0830ce35deb47a92c203b5710aa5c31f15c64109b6066
libvirt-daemon-driver-storage-core-10.5.0-7.4.el9_5.x86_64.rpm
dd1bca8c933752e83d4166a70e6546fb65c564a443f50aabbac2003b6fced9f3
libvirt-daemon-driver-storage-disk-10.5.0-7.4.el9_5.x86_64.rpm
9842df083d0a14f0109a857564a88bed573bef7665574efcf7d50bbdd5921f30
libvirt-daemon-driver-storage-iscsi-10.5.0-7.4.el9_5.x86_64.rpm
e0cd6da97cd8a33fb70f13be72be69b70bb12482626dadd9060659c5776b49d3
libvirt-daemon-driver-storage-logical-10.5.0-7.4.el9_5.x86_64.rpm
723d0ef7ed0a3c379f160222f72cffaf254a10e4cf81bae70be92ad0fd204bff
libvirt-daemon-driver-storage-mpath-10.5.0-7.4.el9_5.x86_64.rpm
c8e734fe320d5fbe7f27649ea12eeeccfbb97156dbe887c3ee571fd61fb977b5
libvirt-daemon-driver-storage-rbd-10.5.0-7.4.el9_5.x86_64.rpm
90294c2c96d41af958699c1d3d6371078ed56b17f0100c3bee32be4ea5bd4725
libvirt-daemon-driver-storage-scsi-10.5.0-7.4.el9_5.x86_64.rpm
9d2c18c9ac3a2d4a2ec21f61dd274b98a7dd70e07a75cff5df2eb09251e6bef2
libvirt-daemon-kvm-10.5.0-7.4.el9_5.x86_64.rpm
871b3c6244618e0ca3408f5898e952bfb28646839ffd17c9f52db037a6b9086e
libvirt-daemon-lock-10.5.0-7.4.el9_5.x86_64.rpm
e709a3c77f61592c560b4119122057bcd6fd53d611752a49fe83cfe23f1bb5fa
libvirt-daemon-log-10.5.0-7.4.el9_5.x86_64.rpm
811f06778582a166c95702038958337b20d1714400a861bb321057c926607da2
libvirt-daemon-plugin-lockd-10.5.0-7.4.el9_5.x86_64.rpm
c939a08f664c3dc180e971c7066c60a65947ad8d66dcc9830ac16c242f4697d6
libvirt-daemon-proxy-10.5.0-7.4.el9_5.x86_64.rpm
cbe3ee28c55177e82450b7df60ae0c0140f3e4d9dbb4e8b19b3592424f7ae6b4
libvirt-libs-10.5.0-7.4.el9_5.x86_64.rpm
dc0cfea0b556881d68d99cba023e190ebcdb3999279786434699a3d64d61ee94
libvirt-nss-10.5.0-7.4.el9_5.x86_64.rpm
91e775175843b383e0c97e1c03de135b359d17bba686262f5094108e5fcbe4cf
libvirt-ssh-proxy-10.5.0-7.4.el9_5.x86_64.rpm
32a7ae669662bed0eca9851c7851ba324a6798d0fcfd81e60fe1b0fea125b93f
RLBA-2024:9131
nbdkit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nbdkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nbdkit-1.38.3-1.el9.x86_64.rpm
2e90570fc7a79107acf5384e1c8e963fdf2b19d32d685d975f60a6a6c31260af
nbdkit-bash-completion-1.38.3-1.el9.noarch.rpm
86f312106dc565af59774279c61f7be9724bff8f361293885b5a628622b698ac
nbdkit-basic-filters-1.38.3-1.el9.x86_64.rpm
2f25489cbed3b130fc9100e4f23edfb61afe8411523b5e5bcf39c8cfcbca56f0
nbdkit-basic-plugins-1.38.3-1.el9.x86_64.rpm
30be7a454a1f1c944cff132d1d36828b5cbf3a5bc88e548a0188c5ebe36177e9
nbdkit-curl-plugin-1.38.3-1.el9.x86_64.rpm
06d6d8e9c401a0d46ee45867dfeed3ee78dea8ec23655d8b8db7b013976354e8
nbdkit-gzip-filter-1.38.3-1.el9.x86_64.rpm
d59b5adcdb33979b575f065beb3f791f03bdd58a03447d7c58b05164597d73af
nbdkit-linuxdisk-plugin-1.38.3-1.el9.x86_64.rpm
e738332c2d9390ed8eb00afab306d701b1725b4cf6ce6dfbcf11af7bd5f1a16f
nbdkit-nbd-plugin-1.38.3-1.el9.x86_64.rpm
c65600101dca40ceb7b06bd6e0e4529db50ee7b7607a2f1d8d85884e144a56c5
nbdkit-python-plugin-1.38.3-1.el9.x86_64.rpm
d743f0f1f2448e622fc0135ed13eebe7b30ebb03f95c213448993459cbf153c5
nbdkit-selinux-1.38.3-1.el9.noarch.rpm
3456ee61fb57165f4580828ec36875c42b375ae0fc3b5d4f71f3455287986bc3
nbdkit-server-1.38.3-1.el9.x86_64.rpm
97b3e945f798bb5a033d1d18a3d2bc7d4c973719de23d7cacbf1bf1b50001940
nbdkit-ssh-plugin-1.38.3-1.el9.x86_64.rpm
a9735f26249346268c544ff367e86744264e151529d3c83e7c22ba0651456508
nbdkit-tar-filter-1.38.3-1.el9.x86_64.rpm
56f87dbd7634e634aba50d2b44dc8b0ab5071efb35ba1952717d0af748114799
nbdkit-tmpdisk-plugin-1.38.3-1.el9.x86_64.rpm
25505da6cf4f85d0b1776630cb6c2d9231fb7a6a95f01d3a42d755c13396f1fd
nbdkit-vddk-plugin-1.38.3-1.el9.x86_64.rpm
c57b442c110aecce9b611302cd774f4bc8bb3c5c950600185a30831911c0a3e7
nbdkit-xz-filter-1.38.3-1.el9.x86_64.rpm
3acc1043bb7e0a2d3b27f203aa7b89b3eed349f4d1d6eae47fe96dfad9196dbc
RLBA-2024:9141
libmaxminddb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libmaxminddb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libmaxminddb-1.5.2-4.el9.i686.rpm
9be0d7437490d05ceba3728a4b9336fa357af554caed6f158597591b218ebbd5
libmaxminddb-1.5.2-4.el9.x86_64.rpm
9d460205283f4f044c5bc016d861ad2098190cd9333db09c6c5d7c33f274624e
RLBA-2024:9147
ipa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.12.2-1.el9_5.4.x86_64.rpm
ad68dfbcc60bc941214fed5b58cfd8be2325563aa852fcaaeae5135e53e088fa
ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm
84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4
ipa-client-epn-4.12.2-1.el9_5.4.x86_64.rpm
5acd3bee384607d33a1273676fc51913ee889e593d8ee05065e51096f92a904e
ipa-client-samba-4.12.2-1.el9_5.4.x86_64.rpm
ebadfb136d57fbf665b2e947612deb5ca60c531a25eaa1475e6881106ed18b92
ipa-common-4.12.2-1.el9_5.4.noarch.rpm
36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705
ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm
cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26
ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm
d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a
ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm
8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037
ipa-server-4.12.2-1.el9_5.4.x86_64.rpm
bdb694b073494c919c1cc9f8a57a3e15754618fd934b138a7d78fa493714dbc5
ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm
3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700
ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm
2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547
ipa-server-trust-ad-4.12.2-1.el9_5.4.x86_64.rpm
ad08b2754469eee2fd7d272d2a778660e6d81d520133e79526a6dcaebf1cfaeb
python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm
f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc
python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm
1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac
python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm
bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3
RLBA-2024:9151
libnbd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnbd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnbd-1.20.2-2.el9.i686.rpm
a5c14b9284b034114631d2e097e536c0b8a00294fd7621c9e4651172f0cdcbcc
libnbd-1.20.2-2.el9.x86_64.rpm
32ab5685280ea117ac36ef28e10da4cbda24907293fa6706a7876b7d87832570
libnbd-bash-completion-1.20.2-2.el9.noarch.rpm
abf0cb7b1ffc31d9869ff0d254cb510cbefdfff9adbb82b7525154543f06103d
nbdfuse-1.20.2-2.el9.x86_64.rpm
d6092e996a8180f299c722c05b1bcd796c308eae35ef592c1ec431cd914e428e
python3-libnbd-1.20.2-2.el9.x86_64.rpm
29469502d5515667311118cba063c2c3f4f2805ce3489a61a79afe7c56b274af
RLBA-2024:9155
WALinuxAgent bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for WALinuxAgent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm
7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148
WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm
f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1
RLBA-2024:9157
egl-wayland bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for egl-wayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
egl-wayland-1.1.9-3.el9.i686.rpm
d5726263c77217cdc490a388045d2d47f90c3757310747656f2c58e691ead204
egl-wayland-1.1.9-3.el9.x86_64.rpm
383ba8f7c8f885855c011265ab67d3ff503761154e7bdeaba4afd7a0e440535b
RLBA-2024:9165
crash bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-8.0.5-1.el9.x86_64.rpm
7280d2d9fac6edf3f732ca4c5902f5b65c4878885be497c8aeca6d4766672a34
RLBA-2024:9166
udisks2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udisks2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libudisks2-2.9.4-11.el9.i686.rpm
d8b4cc493b888e69a13c5fb8a3f50990c706ae1ba1562c11ceeb7fdae1fa04d2
libudisks2-2.9.4-11.el9.x86_64.rpm
fb5a12d99d915c161b19230c7c831264b96d337973bdd0d628b34ad3f1cf9128
udisks2-2.9.4-11.el9.x86_64.rpm
ac2b76a949d69ea15309cacf6f8b84effdc91a816f5f295da951f35df22c14b8
udisks2-iscsi-2.9.4-11.el9.x86_64.rpm
94c1a91da453919de6be0c0bba9622ebca13ccbd15cca0705c8b1ae893826641
udisks2-lsm-2.9.4-11.el9.x86_64.rpm
ca1622463826215ea2edd924eed7a57e94ed9f6f87cc2914421631230ec6cc0c
udisks2-lvm2-2.9.4-11.el9.x86_64.rpm
64b1972bb84ffd752b34c56d20b8f0418f7a2665487b25df4dce66c13cc00ecf
RLSA-2024:9167
Moderate: poppler security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: pdfinfo: crash in broken documents when using -dests parameter (CVE-2024-6239)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
poppler-21.01.0-21.el9.i686.rpm
1811a8649ae0f32b12bc41438e45d4d540f0e55685a06e0bade36d371c9261e4
poppler-21.01.0-21.el9.x86_64.rpm
f4f588f272f2db5dc0c21a86e0dde898c187d6678bc4f6e1fa1f6f5961546d09
poppler-cpp-21.01.0-21.el9.i686.rpm
d6acc74e4f903269684ba725428e2cc73dd62d3f65f23d3eacbacdd9d57a3968
poppler-cpp-21.01.0-21.el9.x86_64.rpm
726ff890ad4f80657ff5c5ef4fbbc6717b27db874e22e457e3c5975d491f9062
poppler-glib-21.01.0-21.el9.i686.rpm
c70baf7cc222dd964635cf126dbdbb370a5bd40471eed5993aa6770dfccdf1fc
poppler-glib-21.01.0-21.el9.x86_64.rpm
90b46b14161992dee6cd5f44310ade969bfd1e66efc51b4af05f5cad9b360a06
poppler-qt5-21.01.0-21.el9.i686.rpm
7755c75113df48e46dbc47bf2d6b1cd9c1c16bdb28f72a85699c1f0204fc5f9e
poppler-qt5-21.01.0-21.el9.x86_64.rpm
63f7e34d68e28e172eb33e59faa1dda72c9a80e977921885e5d31ae6ff259f8a
poppler-utils-21.01.0-21.el9.x86_64.rpm
ac57b8a13a8b0abe5a7d8f1fb1bade77e60adf9710e83b3f6ba7606a6d9fd6cc
RLBA-2024:9179
glslang, shaderc, spirv-tools, vulkan-headers, vulkan-loader, vulkan-tools, vulkan-utility-libraries, vulkan-validation-layers, and vulkan-volk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for vulkan-utility-libraries, vulkan-validation-layers, vulkan-headers, vulkan-tools, spirv-tools, vulkan-volk, vulkan-loader, glslang, shaderc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
glslang-14.2.0-3.el9.x86_64.rpm
c807fb2b7a55a300724d6119b5ea2d3dd2c364215aca5e39b8fdcb4c03441cb7
glslc-2024.0-1.el9.x86_64.rpm
37de97adba307e39706fb556a0567e1d2bea1bedf77ef8b78a4521a7b5d55309
libshaderc-2024.0-1.el9.i686.rpm
d84454c7dab4d2b788e9b72df994d691b6860fb9362d46aadfa861a774046621
libshaderc-2024.0-1.el9.x86_64.rpm
df9493279c4a94d8761931ef74c75e4cb8044b918bded949a5d91db7accca180
spirv-tools-2024.2-1.el9.x86_64.rpm
5a585f08d78423ea1e0f74de03c71f159e3b4bc93a79f9bf4af8e1babf48ecb7
spirv-tools-libs-2024.2-1.el9.i686.rpm
4e371ef8e9337fc313ebc886c21372b3529e87ef7a6486e5f0d730a6c1de663b
spirv-tools-libs-2024.2-1.el9.x86_64.rpm
fc8b5729b0e3569742dfae2ab856afaf634e46f2c0fa685487a58b16057184a0
vulkan-headers-1.3.283.0-1.el9.noarch.rpm
601121cfad5f1b52648f7a100cde8414d822f62d12343c4c59e3905e2ced23aa
vulkan-loader-1.3.283.0-1.el9.i686.rpm
d0913e8b9e1df6d095941304a26cb6f5720d60657a20bc5a097de608b345a4f4
vulkan-loader-1.3.283.0-1.el9.x86_64.rpm
b3857f4c53bbd5d6f6ded9cbb327cd79f14970b919f9e48349ec7b7d5d8a9ecb
vulkan-loader-devel-1.3.283.0-1.el9.i686.rpm
f4215ae279f079e14db033da3172d6ee0c0db2f676aedfb37b6e6b9662c623e1
vulkan-loader-devel-1.3.283.0-1.el9.x86_64.rpm
48e775ad62936af22e3da34fec6dd1e849570a89600be30c579e42fdef11bd4c
vulkan-tools-1.3.283.0-1.el9.x86_64.rpm
3ccd475dc7def6546027158a540b23208fb77eff7491d33e3effa86dd5fe430d
vulkan-validation-layers-1.3.283.0-1.el9.x86_64.rpm
64a7881829b1c9011152b156405bc1d3d2c7e0f67be2a5e69e6305e19f10c652
vulkan-volk-devel-1.3.283.0-1.el9.i686.rpm
0645da9baa144c28481c4deb872195692e288cdf5ef3738daa46f0cc0d5d811a
vulkan-volk-devel-1.3.283.0-1.el9.x86_64.rpm
9956446eec8c9307fde5f7046b6285701dd902bcb86a852fa33645772803bbf0
RLSA-2024:9181
Moderate: jose security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for jose.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Jose is a C-language implementation of the Javascript Object Signing and Encryption standards. The jose package is a dependency of the clevis and tang packages, together providing Network Bound Disk Encryption (NBDE) in Rocky Linux.
Security Fix(es):
* jose: resource exhaustion (CVE-2024-28176)
* jose: Denial of service due to uncontrolled CPU consumption (CVE-2023-50967)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
jose-14-1.el9.x86_64.rpm
008ef1ca834b36f258e1c1bffd10fb759010765363d14c3bd6a6baa260767157
libjose-14-1.el9.i686.rpm
3297132e1a1e9eaf2089baa775532d47bb70f24971a67e458b08371f6187c0e3
libjose-14-1.el9.x86_64.rpm
d6b56b06baace8cc61a4c1a3e2a9ecbb91d209227f39aa73f930a7bb9bb1a94e
RLSA-2024:9184
Moderate: gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GTK+ library provides a multi-platform toolkit for creating graphical user interfaces. The gtk3 packages contain GTK+ version 3.
Security Fix(es):
* gtk3: gtk2: Library injection from CWD (CVE-2024-6655)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk3-3.24.31-5.el9.i686.rpm
03d7e4dd514ef3d7ef236aefa75bda6f2a0658df0f076b662710cab670ce24f7
gtk3-3.24.31-5.el9.x86_64.rpm
6f7d4744107632dc7ce1f6cc21ca94157e58585d359cfc4f05421df1a9e5ebdd
gtk3-devel-3.24.31-5.el9.i686.rpm
d63f9be6455413d9d351e08b6926379ffcbdf02852ec84680531b825d2cdb867
gtk3-devel-3.24.31-5.el9.x86_64.rpm
99d3aaace71ac7898c6c8cd9f2cb3d895b0646f29ae7c7189b209022295a6505
gtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm
378fcd8b7c15778a5d74117dc7969b973614c00c073f4016f0824cf986ad2ba3
gtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm
5c94a8ed45d3b54e9e2b6b347fa7a04de51c6ac0cd7eebc9d0f59e40dcfbaef3
RLBA-2024:9189
libtool bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtool.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtool-2.4.6-46.el9.x86_64.rpm
8b550ee747afeee92dbf6ee69af6b70474ab4f9b4eabc49ba02f6b2114a827a5
libtool-ltdl-2.4.6-46.el9.i686.rpm
5bbc02660a221d24ad9590ffecaf5894b586b6bb94ac870845096e4401d2a89c
libtool-ltdl-2.4.6-46.el9.x86_64.rpm
2225f18e23d3b4b9e886c1048c93c23c74c32753cb74112812db1f2a688eed53
RLSA-2024:9190
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix.
Security Fix(es):
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)
* python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.5-2.el9_5.2.x86_64.rpm
13068b3d2d159d3dd79bb8bd9292ab441e3cedec06a856108ed41b17671415ee
python3.12-devel-3.12.5-2.el9_5.2.i686.rpm
27835d17dc8d471df1aa98464c3aaa5f64b080af59fa82f00b74d98f35eb05a5
python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm
2e85915155d7a00d0d450f43bd77e9af1b7fdafc06df10046080177f9a640ac5
python3.12-libs-3.12.5-2.el9_5.2.i686.rpm
df823df61d3ea03fe21b4c12f67e7a0b92cd20c758e161773dc08ac626103295
python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm
734619b3748242eb68db1a140490d525d5816efa5f99e8b80768d6c4a6f2cf31
python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm
4dbf4922fa735cb19eb96909e1e999dd739f648fcd606b79af80e1faec8e8bf5
RLSA-2024:9192
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
* python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.9-7.el9_5.2.x86_64.rpm
4102b3d8fa4c7e88d42bb789af82f5eff01363fdbbc2c8e857e9007e17c1be14
python3.11-devel-3.11.9-7.el9_5.2.i686.rpm
9e0849fba38aba89b912d4d5772d7cbc27b911c0c3ef339534c2402656148ce6
python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm
9bf5ef11ab19ddbcb5a3b23314aad46ba40ee883bebd4c8e41dc4f3c2ae2e4df
python3.11-libs-3.11.9-7.el9_5.2.i686.rpm
954b9a12254755d9652ffb9c600448812f8b842ad7b9f470ffef1c72d8a57d43
python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm
d397384c6b20308123b4da6baf43e9b3b753482b69fc5c54e71204697ed9f1b3
python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm
a7b6a3cb91a3e93d0ec42711d8ac6a0339538aa1672bd43ddd1150ddf32bae78
RLBA-2024:9202
mesa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mesa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mesa-dri-drivers-24.1.2-3.el9.i686.rpm
f3257db32ae55c146dda3a586e72188a96a64bc66c0a25a7471a9fce98fc4f0a
mesa-dri-drivers-24.1.2-3.el9.x86_64.rpm
3a3da202dc1e6d32fcec0bc684684a9991e329180635c724aa5c445464068d2a
mesa-filesystem-24.1.2-3.el9.i686.rpm
ebbd9ef2cd03af560c0187c69622d3276a5a734b7e0b9fb4f3b2ed06c4222873
mesa-filesystem-24.1.2-3.el9.x86_64.rpm
98f35d76801a651cc85e1981e87021221c22c4fff060c7520f7ecb5109fcb92d
mesa-libEGL-24.1.2-3.el9.i686.rpm
4e2317e068ad37131a042c866a7896693a70f2245d29e3382eecc3f7bc8a1da5
mesa-libEGL-24.1.2-3.el9.x86_64.rpm
49d769cbcb60e4bdeb58579f18f8bd29d4e66873c48b2a8ccf10ff6ffc4c020a
mesa-libEGL-devel-24.1.2-3.el9.i686.rpm
373b1e2d1cb41403260297e36626ad1a11c473d5869d4f3d2996bde480ca2ac5
mesa-libEGL-devel-24.1.2-3.el9.x86_64.rpm
dd6a30918a61e1c44003a28cc5eae171d84386a963e9122241ed37f0fa66e575
mesa-libgbm-24.1.2-3.el9.i686.rpm
c44a100cb79f67defe5e8dda63775bb2d3bc92a9570da28f0a32638ff6b352cf
mesa-libgbm-24.1.2-3.el9.x86_64.rpm
7e594ffc889a99526c0962e59a61a042afb1d3887c95d96729e11e9607af36a7
mesa-libgbm-devel-24.1.2-3.el9.i686.rpm
bd4624f5994aef2876b375f4b1311b0084daf3db7ce77b48ec1fa8076c2c9a74
mesa-libgbm-devel-24.1.2-3.el9.x86_64.rpm
49217541294fe91a81a39eaa03b9d9fba2201c8d0f32a37911ef17391782e778
mesa-libGL-24.1.2-3.el9.i686.rpm
7d1a7126304326bb15cb7829052ee5fc8bccdb27942e15fcc55274feadde63ac
mesa-libGL-24.1.2-3.el9.x86_64.rpm
3d3b41f45a1bbb80fc21ff82e55d04745d7237a9115b6f94b0c95b2deaef1104
mesa-libglapi-24.1.2-3.el9.i686.rpm
b45044aa430630b23c6cbcfa72dda5a49f75ebc2275de6f5faa623bfc4f413b2
mesa-libglapi-24.1.2-3.el9.x86_64.rpm
08a8f468aa02c2ec44fa12f4a182f08599460c42a7747f8429619a02d569f55b
mesa-libGL-devel-24.1.2-3.el9.i686.rpm
de698354a38dfb1aa56ed0c7c27ebe2836f1c7f470f7bab8c01c757c13859dd4
mesa-libGL-devel-24.1.2-3.el9.x86_64.rpm
0c0cc0f8fc731981a120ac3a1b79d124ae87ba1ecef8cc0cb208aaf5174ad07b
mesa-libxatracker-24.1.2-3.el9.i686.rpm
08bebeec3a0dd7afe9446a9f42dca99c36f4f411fe0303609d050b0dcff4c440
mesa-libxatracker-24.1.2-3.el9.x86_64.rpm
8757b5ed0b8d577278f9f6328a744adeeb88d70d680d2fda9011a4af02a342dd
mesa-vulkan-drivers-24.1.2-3.el9.i686.rpm
5986785258ae1cd61f7ea3557349b6a6f1586ec458b991b1fa503bd507f34f6d
mesa-vulkan-drivers-24.1.2-3.el9.x86_64.rpm
e26dec7c9dc4a0f985d23f2197d690850c3210df850ec6f3986e00b9b1aeeb88
RLBA-2024:9208
bind9.18 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bind9.18.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bind9.18-9.18.29-1.el9_5.1.x86_64.rpm
01675a7a1f0c7fc392673e4b042cd86edd01f482b313eac735bd2f6e98a88d6e
bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm
e5ab34561a296d37914f352154c49e2f82bca2e87f3755d57675df9b9e70dd67
bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm
c944af447d7755750ca3c66653452d5eb9196100b5890ec2b9a46745a729247f
bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm
2a3aa8c8bdf987e778187c892ce5eda9ac9bbad78a10faffacc5c9c38109e0c7
bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm
99a331b6d6d78f2050a583123205336d1d50218adcad3e0565133f65781cbb99
RLBA-2024:9217
corosync bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for corosync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
corosynclib-3.1.8-2.el9.i686.rpm
de0d63b4e975c51ff003d297e04708ced032aa5415c292c34d8e21ef664766bc
corosynclib-3.1.8-2.el9.x86_64.rpm
01a5b510f35fa57470bc081c090e2b4cda9575eb6f0d754a1c70a18f15c267ec
RLBA-2024:9222
libiptcdata bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libiptcdata.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libiptcdata-1.0.5-10.el9.i686.rpm
ad171773fe7ea8dffb08e19b69f2bae4906212467ece6b8d2fe7505038ff2a1c
libiptcdata-1.0.5-10.el9.x86_64.rpm
fb547a30d0491b507bd6960fd390ebf055ffae798467f6987a8d20b7b8547d10
RLBA-2024:9221
gdm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdm-40.1-27.el9.i686.rpm
ff7d599815696dedebc949ca752bd50e9a3512a766f7495ac6f6cf39d9c0b85f
gdm-40.1-27.el9.x86_64.rpm
4588505dc56cab8c420c7034dddffb3debcc9bf63937032c8679bb95d4e7b629
RLBA-2024:9227
qt5-qttools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qt5-qttools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-assistant-5.15.9-5.el9.x86_64.rpm
bc597b1b02bd06940b82b7e8464f819834dbf26bde91ef7e1f747ea235a84876
qt5-designer-5.15.9-5.el9.x86_64.rpm
1077d1f97c04ed763ef7912d4b1af93182269c8ef5191dff229b5e321b225ffc
qt5-doctools-5.15.9-5.el9.x86_64.rpm
d3b8706296c64d36bed748173ab64b5b8ec2dc659ba9121d2ab266360f1835aa
qt5-linguist-5.15.9-5.el9.x86_64.rpm
55c4bb9b2fbbf4e461cce1c17dba186d7a8a37608b560526d958cfeaec8f94eb
qt5-qdbusviewer-5.15.9-5.el9.x86_64.rpm
ccf3ce50c721ad5cc6b75b144eaf6d5a06be52ea56b0d44fcdb3d0b032aee188
qt5-qttools-5.15.9-5.el9.x86_64.rpm
1b8400c7aae0f1932d733bd01ad97044ed2ea5fe0d4a469c5762f1deec69470c
qt5-qttools-common-5.15.9-5.el9.noarch.rpm
4edf61dc600d99ef490b13b19853435fb65e83beb28310bea31777e0f815e449
qt5-qttools-devel-5.15.9-5.el9.i686.rpm
153f79dc158ad0555e8a71333f0942e91df4538aee3403f204cb89164a9e74e4
qt5-qttools-devel-5.15.9-5.el9.x86_64.rpm
8bab02972dba4f7c665106d634afad6dfe4fc25f00574ae26102f12175dd49cb
qt5-qttools-examples-5.15.9-5.el9.i686.rpm
69e779fc501c7dc7e5464089ba1174f1f8a0380fb126b0fb5bce228e3413078a
qt5-qttools-examples-5.15.9-5.el9.x86_64.rpm
6d18270690c0ae0f9b65cb5251cb4361dfcd3bc9538cefff6a1c3b424f2ad648
qt5-qttools-libs-designer-5.15.9-5.el9.i686.rpm
3a91a9eb23412817b5f84c20f6fb9f1cd9346c552b976f5e43097a46b085e285
qt5-qttools-libs-designer-5.15.9-5.el9.x86_64.rpm
ff3f632343480bc61c2fdd2a07cc8afa0afacf0baccf0d32645952a9f9e370e6
qt5-qttools-libs-designercomponents-5.15.9-5.el9.i686.rpm
e75aa47355887e3662b9d587351deea89153fa412e1d411ad795c39f4ded5b4d
qt5-qttools-libs-designercomponents-5.15.9-5.el9.x86_64.rpm
c1fdbf520c254f57d9ad806ab51eca75ae7cfc9b1fa6503b888d3acb2103d52e
qt5-qttools-libs-help-5.15.9-5.el9.i686.rpm
b9932dcd424903f7490276be825680890d069c787a4d33f06d8b74885562f96e
qt5-qttools-libs-help-5.15.9-5.el9.x86_64.rpm
144261840fb75f7a9d0bb756c323ec1d703677a5417bdf307b850132ab760f0d
RLBA-2024:9232
libslirp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libslirp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libslirp-4.4.0-8.el9.i686.rpm
08e79c326da94cad183c40b99590f54ae17d6e4d4cbd9bc901fcabb30c9fc1d1
libslirp-4.4.0-8.el9.x86_64.rpm
0282bb34fc3b3e987068ef397ef9f23ad6bbbac4a9b13b4e8d599245c2f94e47
RLBA-2024:9236
libstoragemgmt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libstoragemgmt-1.10.1-1.el9.i686.rpm
1591e6c475c60b0b0e0e9722d5572928791e7a436ca669bc02cc4b853029da75
libstoragemgmt-1.10.1-1.el9.x86_64.rpm
5827ab4b55e35897eb2404f6edc32ad18314a6673660637c7d6d9f219107723f
libstoragemgmt-arcconf-plugin-1.10.1-1.el9.noarch.rpm
c62002274524fac370c0d026615edd1623aa85bda34063e74a71d29422348738
libstoragemgmt-hpsa-plugin-1.10.1-1.el9.noarch.rpm
391c0afbbb1becd70281d4ea1d2531ac0186117ad792affa5aa90f660e7091a6
libstoragemgmt-local-plugin-1.10.1-1.el9.noarch.rpm
8c91ed0ef9d072cdd5ca43800129a8d717e9a723a4c6b3098b14f1d452c3c31f
libstoragemgmt-megaraid-plugin-1.10.1-1.el9.noarch.rpm
d762aa873b056c09124a22c1321af2149c3692646152eb2d62ec02e62585b1f5
libstoragemgmt-nfs-plugin-1.10.1-1.el9.x86_64.rpm
8b7cc51613bf23d871f00a3e505c6cde984aa74e730623ff4e835ed11b6defb6
libstoragemgmt-smis-plugin-1.10.1-1.el9.noarch.rpm
1857c5e3f924fc46ec9f8f0ce2f78cf6b8bc3f7031927f0ec0c6bcd20d470c39
libstoragemgmt-targetd-plugin-1.10.1-1.el9.noarch.rpm
fe9ec585a0c79ae862a2bc8738e187eb7173aa07784a5b9855fa46abdee58d8a
libstoragemgmt-udev-1.10.1-1.el9.x86_64.rpm
775c7fef4732f6626e23308e4fceabef585c0b324f637d0630508af3ffb94528
python3-libstoragemgmt-1.10.1-1.el9.i686.rpm
020dd04b542287dbba01748fe1b3558d1b6d355138758eeb4b8632eb4c635b64
python3-libstoragemgmt-1.10.1-1.el9.x86_64.rpm
a825fd68db9d57ece09502a58e050f19039af986c139e22ba756edfdf0031f30
RLBA-2024:9239
wireshark bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for wireshark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
wireshark-3.4.10-7.el9.x86_64.rpm
80f861382f9764d7284c53196901913484e29eafed1fd1be97e8b90a38d76583
wireshark-cli-3.4.10-7.el9.i686.rpm
fd44ff3bd9c67fb34ce0cceab539b72c3ad60d035ae344dd8f9df1a1ddfa242a
wireshark-cli-3.4.10-7.el9.x86_64.rpm
395f1c119100890198d9232db783a229cde8e9c31b845105197edd23b57ac37b
RLBA-2024:9247
python3.12-setuptools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-setuptools-68.2.2-4.el9.noarch.rpm
72b7afb7b6bc572cc1605ed1a53d95a30b9c91e70550b1f2c0bedfe55ee557d3
RLBA-2024:9254
openblas bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openblas.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openblas-0.3.26-2.el9.x86_64.rpm
62c3226ea151d067424baefc8e85220b45fd5d6b48a3ed2122cdcbe222ca7c5f
openblas-openmp-0.3.26-2.el9.i686.rpm
3a88ea407dd038b58832a859c2ec23f222d276c5b109980f6273f97e64eb99ab
openblas-openmp-0.3.26-2.el9.x86_64.rpm
52ab1c3d872941c374a5940b6a1669129b2c9fabf2726ae5a3daddeb8ce3e1c0
openblas-serial-0.3.26-2.el9.i686.rpm
14cdd4ba97b1a3f0d97352f758b614204426aaeeb4336f76ea40c0be7cb09280
openblas-serial-0.3.26-2.el9.x86_64.rpm
22731972d6b7ebab58b0e3e58565a69adbbb766eb575f3b6a0959ac93aaa0f02
RLBA-2024:9252
gnome-software bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-software.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-software-45.3-3.el9.x86_64.rpm
5a56151cb6bef308b39254604bffbd6cb77450e358b424cb74674b1837f39e18
RLBA-2024:9266
cups-filters bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cups-filters.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cups-filters-1.28.7-18.el9_5.x86_64.rpm
3dbd95ce375f12ea388505c45df78637de2b858c9371be884a728ab44ff038b2
cups-filters-libs-1.28.7-18.el9_5.i686.rpm
9c4388d416123c31f3e5342984d125002745c28994b2d94a9febcf1aac7f05fe
cups-filters-libs-1.28.7-18.el9_5.x86_64.rpm
597b1f6ff698429b3c7ae9a5367f2f66d27c41d7f20e7cd767a5943e9ed5f7d4
RLBA-2024:9267
dovecot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dovecot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dovecot-2.3.16-14.el9.x86_64.rpm
d6a5c65025d667980e27c918cdb1e3fe2b873d5afaddca22048f1fcdfbff6650
dovecot-mysql-2.3.16-14.el9.x86_64.rpm
ba625dc96aeabcdd19fb029b7d15c340b00d44f177483cb96352c7c4f8b4455f
dovecot-pgsql-2.3.16-14.el9.x86_64.rpm
ae6092f14caf44b8082151ece9412453a35d18d5869d3b4156e5e104592818cf
dovecot-pigeonhole-2.3.16-14.el9.x86_64.rpm
0f499470397080858ef5a615f117d7e3fccb30873f5bf685a4e8e282da67bf80
RLBA-2024:9271
ibus bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ibus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ibus-1.5.25-6.el9.x86_64.rpm
b941f6d55ecf63f9e81095f62365de6300e0cd3c1764a9e58c42a26bd70fd3a1
ibus-gtk2-1.5.25-6.el9.i686.rpm
f7fb3008f39462132cf85eda04a94d57442f5261c8541d6e9cb247901c8b8cd4
ibus-gtk2-1.5.25-6.el9.x86_64.rpm
44528e1d9fcd50578cd286e1f1a3471ac3a5fe71b81b03bb4487775ba4dfb1af
ibus-gtk3-1.5.25-6.el9.x86_64.rpm
9589f52a44787b3236e027948986476afaab9fae6e5895ed95ce1430a49e152b
ibus-libs-1.5.25-6.el9.i686.rpm
b7fa10eb220de71b901a8338a5c6e8961a2fac5d5dd45a14c12670c2b143d898
ibus-libs-1.5.25-6.el9.x86_64.rpm
d76c6b098db5dc0239fc6961fc67cb576a3aeb1863ad3d3fcde2193824083dba
ibus-setup-1.5.25-6.el9.noarch.rpm
168a07536b47c23d6ffa9217d860d0bc7c6aa3da27af041226c36f3e32d91a46
ibus-wayland-1.5.25-6.el9.x86_64.rpm
42296c00e7ec49610357971f9b3704e31e7486c9c0a89e3ee061ac5420e3be87
RLEA-2024:9272
source-highlight bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for source-highlight.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
source-highlight-3.1.9-12.el9.i686.rpm
27f628f1a62589a89de662e2ed68bf4d443afdfce70f01e04301a9c234eb5273
source-highlight-3.1.9-12.el9.x86_64.rpm
b64c82233488fc60c2b0ddbece160e131d3c967a97b9aa35dcdd013fe99388b9
RLBA-2024:9274
xmlsec1 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xmlsec1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xmlsec1-1.2.29-13.el9.i686.rpm
a4d480ab0bc3974d3c595c1fddbe2a970b036624f5ae1c87930f10711674b227
xmlsec1-1.2.29-13.el9.x86_64.rpm
cb86ad344c6542f6697f39a36b4d485eebc3109408fd1298e9fd62685453a382
xmlsec1-nss-1.2.29-13.el9.i686.rpm
84ea864fc0edb5d54e0f5f60f572a83a4e0772125b64bcb073709eb396b9248a
xmlsec1-nss-1.2.29-13.el9.x86_64.rpm
90b7e21c586d0c4552adfc5813456eb7fae2c47db527169fe0bdda1367ab75bf
xmlsec1-openssl-1.2.29-13.el9.i686.rpm
5a18de8b798b5a4e0a378cded1259b8c0a1071688f5ff427550bd7babc210321
xmlsec1-openssl-1.2.29-13.el9.x86_64.rpm
f7115096e02e52940b3b7653b757fbcb8e7b1429fd13ea94343e977b7f3bab85
RLBA-2024:9289
sanlock bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sanlock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-sanlock-3.9.3-2.el9.x86_64.rpm
ed7afffa626d1b79d12f3adf599d18ede917c26d1f4123b8d452a4ddbb8cbc90
sanlock-3.9.3-2.el9.x86_64.rpm
564686f82ed32ff936f8e0c1f6b42e0ad0fbfde7a6e10d806a34226522e8a11a
sanlock-lib-3.9.3-2.el9.i686.rpm
b2f03dbb8a164065db96d22a95f7e5616772026df0e57104cc8e3e18bd1926b2
sanlock-lib-3.9.3-2.el9.x86_64.rpm
3b452368909e36c87ec46e85d6f7e16ff37a8116943e2d25aab46631e33be54b
RLBA-2024:9294
varnish bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-6.el9.i686.rpm
bef00aa960db7e0e4634a66213de2a477ec4976670e7ac58b45f6f4599fc915d
varnish-6.6.2-6.el9.x86_64.rpm
7bf1164396396e5260728ce850f7cf3a2262493add7967e9ab575fb07824c10a
varnish-docs-6.6.2-6.el9.x86_64.rpm
8834cfc37486bdb6b93746a93dc29a2d40835d8065c65282b6f70b7b425656b2
RLBA-2024:9291
nginx bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nginx-1.20.1-20.el9.0.1.x86_64.rpm
6a85c56594eba915335e384ae5a05d105b41459fdb630482667da603b5da2404
nginx-all-modules-1.20.1-20.el9.0.1.noarch.rpm
3adf5ad07ffe60ba5499482ba564e6992aa36bb8e72ac93eff5e53e18996697f
nginx-core-1.20.1-20.el9.0.1.x86_64.rpm
ae61c8c146c688dada925739c58bd0e8bb06e75629d91299701f2b048f2ba3ea
nginx-filesystem-1.20.1-20.el9.0.1.noarch.rpm
73805e893b600e14b42dba7626e6fa2ae072b3da578f31036dcaee05ff0f51a5
nginx-mod-http-image-filter-1.20.1-20.el9.0.1.x86_64.rpm
b12e5be7bee4df5468bde5352a94ecc49e08887d906318ea38a3cdf33c2fc3e2
nginx-mod-http-perl-1.20.1-20.el9.0.1.x86_64.rpm
087c35e6476963aaa185ceed9681a44cb7be402decf842a75e68e5ba849f7dd4
nginx-mod-http-xslt-filter-1.20.1-20.el9.0.1.x86_64.rpm
a174497a84c8c3b24e4630406f1eed4aeab4ff17410d2ddde837f743a44bbb02
nginx-mod-mail-1.20.1-20.el9.0.1.x86_64.rpm
368b2986c1e023d5e11652ce0fd2f29b80186d3adc7b0bef334ae235508d6840
nginx-mod-stream-1.20.1-20.el9.0.1.x86_64.rpm
dfa18435d9b5e0307cd810401d1a5105b0ddda31c844f0c44d9110e5a383f764
RLEA-2024:9296
libguestfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libguestfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libguestfs-1.50.2-1.el9.x86_64.rpm
a866f46919aa0cf7be464e521a30e71b221ee469021fc08ebe34e825a596c155
libguestfs-appliance-1.50.2-1.el9.x86_64.rpm
297558e5b2f758256ff68667314d3c3cd2329cfb639404f6330d062fd714e9fa
libguestfs-bash-completion-1.50.2-1.el9.noarch.rpm
60a63adc6b59746e0591ee0d83af4a2d45369b6b28ff7b4b0c32c381fd524094
libguestfs-inspect-icons-1.50.2-1.el9.noarch.rpm
3fdfe6d60883a9956619e00f1d359b7a5db195f39d0dfedce1df89ea1540c30e
libguestfs-rescue-1.50.2-1.el9.x86_64.rpm
1630dc6120d0fd34d3090e3daed59617fd2eb8094ccb8c78716b18ba77e242f9
libguestfs-rsync-1.50.2-1.el9.x86_64.rpm
441d8b0377080290b1d2aaf092b3210f7124da78ec294ba95e68288fc0ba153b
libguestfs-xfs-1.50.2-1.el9.x86_64.rpm
8e55d427eda97781986250896bb4c0737e45367484ec44c0cf914542be29cbd7
perl-Sys-Guestfs-1.50.2-1.el9.x86_64.rpm
251582f57ad9fdf17c8bc4d3675d585cf94b2b6783423fa6d4adcbbed8db1f22
python3-libguestfs-1.50.2-1.el9.x86_64.rpm
d57c371368c4a0dd4cb009b16a9b090ed0bee60a50c588ac9a43d9036ab38bfb
RLBA-2024:9300
libtiff bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.4.0-13.el9.i686.rpm
6709af0f6adf0feae7d25223e901ac249a093ba01e4cc20b723fca19a066e63c
libtiff-4.4.0-13.el9.x86_64.rpm
0e00ec2a40085ea5a5141f9164f6a85e5a9301881685767aff65ee07d3ebcb85
libtiff-devel-4.4.0-13.el9.i686.rpm
d2fc3b25d3839b6bf573e4810d14697b1161ce7d984330e7928c14ddc952f408
libtiff-devel-4.4.0-13.el9.x86_64.rpm
a34c396e6403a55bb10d432d288c2ce9388b5630734b595c13510d5205d3cb41
RLBA-2024:9305
OpenIPMI bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
OpenIPMI-2.0.36-1.el9.i686.rpm
62313413bc9ef221386f0bdf3e43ca758d48a3c7ba1af97fd3c1356357eb975a
OpenIPMI-2.0.36-1.el9.x86_64.rpm
64e9ad1cd2e6780c242ed5c2a232017b72cb029b0b0de78c659233fc74c8e38c
OpenIPMI-lanserv-2.0.36-1.el9.i686.rpm
14509f26046d7a85c21b0e52b5edee634cbac7b87187bbda59c8b9ad70e8d6ed
OpenIPMI-lanserv-2.0.36-1.el9.x86_64.rpm
ffae44ccac0d00a7d6c0a6cd6b26ddab8e49ed3e28e5d01954cf414a43bba5bc
OpenIPMI-libs-2.0.36-1.el9.i686.rpm
df7bde0817d51f77bae4346967c17477b84da9b1986a12615ebb8cb1f3a5b3cb
OpenIPMI-libs-2.0.36-1.el9.x86_64.rpm
f485ec4304ae472b6d49336a6effe4155785955208d8a9e482198cacdf176e6b
RLBA-2024:9310
cjose bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cjose.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cjose-0.6.1-17.el9.i686.rpm
be7e040e34597922c883cfef9f3e5c4b4cd7f6a544f79569a7c8b632f3dbc77d
cjose-0.6.1-17.el9.x86_64.rpm
32bcce5e5a2a7674419cb5ab59217f82c7109dfb31456347768ab32aefd8e30c
RLEA-2024:9448
OpenJDK 11 is no longer the default system-wide version of Java on Rocky Linux 9
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-11-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024.
As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024.
Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions.
See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide.
[1]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport
[2]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index
rocky-linux-9-x86-64-appstream-rpms
java-11-openjdk-11.0.25.0.9-3.el9.x86_64.rpm
7fe0faf5fe7227258379926610e0ec4a04cc1837b6f5cf9a3503e58e68bd5921
java-11-openjdk-demo-11.0.25.0.9-3.el9.x86_64.rpm
f172b098f4a4971d31b52ff2f5a8f1ee81d1a346e55ea325fa2ce2614126f9dd
java-11-openjdk-devel-11.0.25.0.9-3.el9.x86_64.rpm
25327f5caf2f2994b85e821f3304d7f3250037ab4ff68f8079a20441d8d8ce64
java-11-openjdk-headless-11.0.25.0.9-3.el9.x86_64.rpm
c3c3fd483ed65034e36dbd2a6b023c3953b89cd5e65487304dd22751957eaeb6
java-11-openjdk-javadoc-11.0.25.0.9-3.el9.x86_64.rpm
65865d90d7f620b215ac234c4b510e3686d834b688ec6d01713fe88eabb25a59
java-11-openjdk-javadoc-zip-11.0.25.0.9-3.el9.x86_64.rpm
07ef90f6790172217a394fb16b2f664b80bfc5ea596d20cad130aeb6b09a568f
java-11-openjdk-jmods-11.0.25.0.9-3.el9.x86_64.rpm
d5130c74036bc078a2708f175f7fd31fc9199659a66012e107a0ff937760cb1a
java-11-openjdk-src-11.0.25.0.9-3.el9.x86_64.rpm
a95c7e5f1dd2ed0448f2193f8f23fda47f855af6a48d7e983d5bc9f818bae614
java-11-openjdk-static-libs-11.0.25.0.9-3.el9.x86_64.rpm
78d2e07917f942b6173125feb978465d8474cb197d34fe3b93388bceafba6d85
RLEA-2024:9463
OpenJDK 17 is now the default system-wide version of Java on Rocky Linux 9
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-17-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024.
As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024.
Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions.
See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide.
[1]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport
[2]
https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index
rocky-linux-9-x86-64-appstream-rpms
java-17-openjdk-17.0.13.0.11-4.el9.x86_64.rpm
0f34cc3c03baf4609e8beb46b19b530bd7f95185f3030d6edd781735861107c4
java-17-openjdk-demo-17.0.13.0.11-4.el9.x86_64.rpm
aa9351db4ef2da5dfd3e679a7abba1f6564d33283b39c4cbfd19f14b1153ab77
java-17-openjdk-devel-17.0.13.0.11-4.el9.x86_64.rpm
95aa82574310a99ef1101eb55ea8eb48286e21ebef42858213063fb29c55f7b2
java-17-openjdk-headless-17.0.13.0.11-4.el9.x86_64.rpm
dde484b81487f168886e46cb5d6697d293c0a756dfae23429b1ab6cf5c67b807
java-17-openjdk-javadoc-17.0.13.0.11-4.el9.x86_64.rpm
dcdb1d02117f00e2a1086e6eda9267da93c4b46bbdcff1dc69f25c11e82bd37b
java-17-openjdk-javadoc-zip-17.0.13.0.11-4.el9.x86_64.rpm
f001d3124c67e71ecdbe3b01a9a60941e0b7a1e19e96518a54e7892d39e5d0d6
java-17-openjdk-jmods-17.0.13.0.11-4.el9.x86_64.rpm
f6a664db19e3beaedb7a9de327aa104bd389c1ec915542a8d8b5f5a3b51e00aa
java-17-openjdk-src-17.0.13.0.11-4.el9.x86_64.rpm
35fbf9b9632cb508a77abb7df66eb2a4fff70a9ccc00b04644cd05b8b4d11369
java-17-openjdk-static-libs-17.0.13.0.11-4.el9.x86_64.rpm
873199af165780ad77c52c5ab7a6c58db329234547b1936fd3b14fa7286891ba
RLBA-2024:9466
mutter bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mutter, gnome-shell.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit.
Bug Fix(es):
* gnome-shell crash on wl_copy [rhel-9.5.z] (JIRA:Rocky Linux-62993)
* gnome-shell crash on ctrl-alt-shift -left/right shortcuts [rhel-9.5.z] (JIRA:Rocky Linux-62997)
* Some application popups switch workspaces and steal focus on Xorg sessions [rhel-9.5.z] (JIRA:Rocky Linux-63000)
rocky-linux-9-x86-64-appstream-rpms
gnome-shell-40.10-22.el9_5.x86_64.rpm
67f548570067015241f3f04ff2d3824767616cf59bce24acf4ac02ca88769ea1
mutter-40.9-22.el9_5.i686.rpm
1f800f43706f43d1f2e2c0f2c7b0cc4106b6ee24af1ef1c674eff3b55ddf2fe6
mutter-40.9-22.el9_5.x86_64.rpm
e67c6c431932c34cde6b5bdfb30753bdc88c9c7259fe6f14ecfa7634bf8f35cc
RLBA-2024:9462
freeradius bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for freeradius.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Bug Fix(es):
* SIGSEGV after upgraded to freeradius.x86_64 3.0.21-40.el9_4 [rhel-9.5.z] (JIRA:Rocky Linux-61557)
rocky-linux-9-x86-64-appstream-rpms
freeradius-3.0.21-43.el9_5.x86_64.rpm
596870c3885eda85b87c6ecf04981cc1130a93336bda44d05c29131564e869a9
freeradius-devel-3.0.21-43.el9_5.x86_64.rpm
3a907d4ba3fe9ac6b2342b43024c94994e294a879cc6f4d7a3b9ad999d9c29a5
freeradius-doc-3.0.21-43.el9_5.x86_64.rpm
61111412bae27e076bbf9c920d63b22868b2c34d57e0185ffb35cd048c0a1e10
freeradius-krb5-3.0.21-43.el9_5.x86_64.rpm
7f91a3f7c3cbcc96eb3159a9ce3bb88e9e73321085b92f3fd5d652adfc257f4a
freeradius-ldap-3.0.21-43.el9_5.x86_64.rpm
b174cc55879adef04d639970e5c443ff25e9bfe02de190b447caa36dbe19df56
freeradius-utils-3.0.21-43.el9_5.x86_64.rpm
8b6bef1bf5216e67bf4b5064c06f359faf1312d4c66a52e1052f89b6c48d019d
python3-freeradius-3.0.21-43.el9_5.x86_64.rpm
bd8c06a933ab40dcb117f8849cd5da4503d1907928a87429c5313625711dd3dd
RLBA-2024:9464
java-1.8.0-openjdk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-1.8.0-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 8 at that time, which was OpenJDK 8u422, released on 16 July 2024. OpenJDK 8u432 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 8u432 to Rocky Linux 9.5.
For more information about the changes in OpenJDK 8u432, see the release notes listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-1.8.0-openjdk-1.8.0.432.b06-3.el9.x86_64.rpm
ae049e84e292fafa8aece776476a02166b6424257e786786ba1e1c692617f401
java-1.8.0-openjdk-demo-1.8.0.432.b06-3.el9.x86_64.rpm
814da7badf40313a19a542a951bc8f7d1952999c1d732fb1791e7652d552ebb2
java-1.8.0-openjdk-devel-1.8.0.432.b06-3.el9.x86_64.rpm
0dacf837cc717624c80cf2e4ce59f52df41c5a2be248dcded4e6d7040bc7961f
java-1.8.0-openjdk-headless-1.8.0.432.b06-3.el9.x86_64.rpm
4309baf39c9aa719fdef04345ebe835332976207eefeadea83c40631fb42b9e2
java-1.8.0-openjdk-javadoc-1.8.0.432.b06-3.el9.noarch.rpm
1cc278c3e7938bd05849a810f1909cfb1c1a6bc42967e2834065b271c2bfc4e7
java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-3.el9.noarch.rpm
feb4595ca7a86329b65f4bc2617333aabf1b0883353f601c9c30f9d0b5301a58
java-1.8.0-openjdk-src-1.8.0.432.b06-3.el9.x86_64.rpm
890b418360b10ee129231e12a51d4cbe38fcea6036778d94a7045143a81d780d
RLBA-2024:9465
java-21-openjdk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for java-21-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 21 at that time, which was OpenJDK 21.0.4, released on 16 July 2024. OpenJDK 21.0.5 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 21.0.5 to Rocky Linux 9.5.
For more information about the changes in OpenJDK 21.0.5, see the release notes listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-21-openjdk-21.0.5.0.11-2.el9.x86_64.rpm
e45ad6858bb16e74479b2c7abac707c894563df32f05c75ddb49134da3733c4d
java-21-openjdk-demo-21.0.5.0.11-2.el9.x86_64.rpm
3abab1b17cda454a706a79d18b70c3bc63c49acff20de863c610bb72973afad5
java-21-openjdk-devel-21.0.5.0.11-2.el9.x86_64.rpm
b1de8c72ec3ac660398ac6ac5a06e3256923bd9d75d670e697fa3979ea2c6cd3
java-21-openjdk-headless-21.0.5.0.11-2.el9.x86_64.rpm
41a25fdf7b5fb65ff4631425257d4d28e5ce3da9726ceba2566364cef42ae7e0
java-21-openjdk-javadoc-21.0.5.0.11-2.el9.x86_64.rpm
8289d34e18c4f4f65bf8f2abf76a50efe619733919ff158e795026f13ab84f3a
java-21-openjdk-javadoc-zip-21.0.5.0.11-2.el9.x86_64.rpm
2450a2cc54b812b1f694f37e5ac6fe918afe6c7073274c1babe164f97c565ce5
java-21-openjdk-jmods-21.0.5.0.11-2.el9.x86_64.rpm
8a4e36ae86da885f778175d99ba42a5b94e37f1177cb8eda887eb365aa08b731
java-21-openjdk-src-21.0.5.0.11-2.el9.x86_64.rpm
072bebcee32bdda1c3d5283d95092c3c5e3489913e7149960efe2ffb943f378b
java-21-openjdk-static-libs-21.0.5.0.11-2.el9.x86_64.rpm
06205b801dcf25ae7242dd7e671da453ed4ad3d0b4a1e0d14e1488dab5f2b00f
RLSA-2024:10858
Important: ruby security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ruby.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rexml: REXML ReDoS vulnerability (CVE-2024-49761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ruby-3.0.7-163.el9_5.i686.rpm
9a25cd85c8d81643d7732acff97c2920430c680d8903fd6341ea8364736966c4
ruby-3.0.7-163.el9_5.x86_64.rpm
29ac14e9bcffd87508de7856c193b53f0e22636b39d89af59c975467926d51a2
ruby-default-gems-3.0.7-163.el9_5.noarch.rpm
a5c350c852d7f09343cfbe00900acf0b8c3ffe3937b786bbf5ca8309e6bcd07c
ruby-devel-3.0.7-163.el9_5.i686.rpm
77f612e37e230ca0878f33f0e376b390d0f49b8f95e696d7b0603ae32fdf5449
ruby-devel-3.0.7-163.el9_5.x86_64.rpm
3db34b30524335f93655071eaead8b517840fce9f7f4b4af51df9633d637e4c0
rubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm
e3e15f80ecd59b2ca60e189263d7b4865372bd6c8320cee10f57e1e82b30dd74
rubygem-bundler-2.2.33-163.el9_5.noarch.rpm
cdfc451d598da39186c365b98deb0e32a2948788aaba4e2d5752aa6b07f2e116
rubygem-io-console-0.5.7-163.el9_5.x86_64.rpm
29100317f2d18dab4c88fc157bc62aaf6f5820c4d1e2d95b28e37996db6870a8
rubygem-irb-1.3.5-163.el9_5.noarch.rpm
0cc27955063cd72afe8f4ffd573b57441e21d3140963c94a868fcbddd095b091
rubygem-json-2.5.1-163.el9_5.x86_64.rpm
812cfe7e839cfda9a273b74c212929c4fb1c9790a28a179efa277c9226f92187
rubygem-minitest-5.14.2-163.el9_5.noarch.rpm
6a6d491aced2d193ca00652dfbc2311ae9ba58f57e690a054bd55bc03df37b60
rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm
6013de5e545c1b1ef87c3ad43e767673a6996f4b6c72143d8cf345fb520e0d6e
rubygem-psych-3.3.2-163.el9_5.x86_64.rpm
9b9347efd0e1b13fe5af28848cb1bdcc5d148f6e5db9a756184cb8caaa5e7267
rubygem-rake-13.0.3-163.el9_5.noarch.rpm
519259da5ce23051e8ca382266b33c3245dccc8161a4499c273b82421ec6125d
rubygem-rbs-1.4.0-163.el9_5.noarch.rpm
d48255cca59db9adf5dd6beea6976e73ca03c0dd4e8fe6739afc9ccd7341251d
rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm
80e2e46213e999645c89ed3d47c633a909a2dd5e8f2994ca4b439d5689227f8a
rubygem-rexml-3.2.5-163.el9_5.noarch.rpm
e5887f5549ec4cbcc6aa75d30269c144a50b0aea9295883e374633b1657110b6
rubygem-rss-0.2.9-163.el9_5.noarch.rpm
3e2b82f2cf471d15f60f18485dc81f26f76b07a1336a9f44452b1f8938bd783c
rubygems-3.2.33-163.el9_5.noarch.rpm
8cd280f68721ff773c87942525c71c135fc03283351831d1b5cbfeb0f6a6d842
rubygems-devel-3.2.33-163.el9_5.noarch.rpm
065382cc4ebf7923bcfd27aabb0539cb86f1ae78a65b8c40de9f7bbd68e9828d
rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm
b859d3f1fa8ed72ae753e4f01176b4f737d92e2aa5e428d5f68ac6e1d8506ce2
rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm
66bfc80c06ea5babd07692fd86d680b1c1f001b691429c6c65186d55965e5501
ruby-libs-3.0.7-163.el9_5.i686.rpm
c9819a8286cbb452528cbb9d3a093a94f885d807236695a0f44f57bfc7ee7836
ruby-libs-3.0.7-163.el9_5.x86_64.rpm
738cead901fa2df5f68daa3758dcc3cefa4e8ee4838f03d7eb3b3b7e476132a8
RLBA-2024:9567
.NET 6.0 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dotnet6.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET Core is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 [rhel-9.5.z] (Rocky Linux-65365)Bug Fix(es) and Enhancement(s):
* Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 [rhel-9.5.z] (JIRA:Rocky Linux-65365)
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-6.0-6.0.36-1.el9_5.x86_64.rpm
c841f069d20d896bd6b57688bbc943cd984498e1dbaa169cd57b8c13e4df6e61
aspnetcore-targeting-pack-6.0-6.0.36-1.el9_5.x86_64.rpm
1fa55047642bb213e6afc028addb1a9ea2273338dbb4cdb0c50c0c74bd734133
dotnet-apphost-pack-6.0-6.0.36-1.el9_5.x86_64.rpm
a67e0ffbe0895da7e95a0466c64b1a92cea16418dbdec6eec0c27f9ee61b7535
dotnet-hostfxr-6.0-6.0.36-1.el9_5.x86_64.rpm
0158f077190b91201d7216e52ce2ff2dfde7342b8ba75792a794feec0a5a9e86
dotnet-runtime-6.0-6.0.36-1.el9_5.x86_64.rpm
6e7441f5adc725272a9b966ba9766c2aef3f5a33b7f45806eff603ea3fa1f642
dotnet-sdk-6.0-6.0.136-1.el9_5.x86_64.rpm
8c4433a9f8807a72570470edb9f0bf115416da72f48766c199c3f3b8a0c4c866
dotnet-targeting-pack-6.0-6.0.36-1.el9_5.x86_64.rpm
d28dcfd6c4b631012e66cd47e6227884680fd75fdff9a404c9adb67a3f81ce7e
dotnet-templates-6.0-6.0.136-1.el9_5.x86_64.rpm
47cfed3b835477f82eea6d6e1bf20625af5baefe87abcbc5adae3c89e28ebe4c
RLBA-2024:9683
evolution bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.
Bug Fix(es):
* WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-9.5.z] (JIRA:Rocky Linux-62680)
rocky-linux-9-x86-64-appstream-rpms
evolution-3.40.4-10.el9_5.1.x86_64.rpm
d6f2e51cc80592c3cf2651b0462feba05a9475b5d21cea1899da61af12725859
evolution-bogofilter-3.40.4-10.el9_5.1.x86_64.rpm
52f1faf66655a2b7999f631d9e6d7d4be1fad3b914f7038f15db9c0972b4d439
evolution-help-3.40.4-10.el9_5.1.noarch.rpm
0b54cac31f654fcac4f363a6a1f6523c97112f70b41e86a2da0fcc1acc214db6
evolution-langpacks-3.40.4-10.el9_5.1.noarch.rpm
1f82734bd3ef4790afb5754d186f24697258d96a7116afd45148963ec67e9c04
evolution-pst-3.40.4-10.el9_5.1.x86_64.rpm
3691d678f6873cda347ad212725b53239db1ae7b4e86f54e2cadd66c4d85f865
evolution-spamassassin-3.40.4-10.el9_5.1.x86_64.rpm
bd1e802bf0f9c1413ab66e5df3bf0d8c979078dda49267564c034d02041bde87
RLSA-2024:9827
Moderate: libvpx security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libvpx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Integer overflow in vpx_img_alloc() (CVE-2024-5197)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libvpx-1.9.0-8.el9_5.i686.rpm
44ccc6147c34f1ad83b012559e34458f44b18168b582133e96fba316ad92259f
libvpx-1.9.0-8.el9_5.x86_64.rpm
c28e54f6e4ee62a7e60fee71f951bffe40fdf11498e6b8e321bbbabdd9bd5067
RLSA-2024:10978
Important: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Unbounded memory buffering in SelectorSocketTransport.writelines() (CVE-2024-12254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.5-2.el9_5.2.x86_64.rpm
13068b3d2d159d3dd79bb8bd9292ab441e3cedec06a856108ed41b17671415ee
python3.12-devel-3.12.5-2.el9_5.2.i686.rpm
27835d17dc8d471df1aa98464c3aaa5f64b080af59fa82f00b74d98f35eb05a5
python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm
2e85915155d7a00d0d450f43bd77e9af1b7fdafc06df10046080177f9a640ac5
python3.12-libs-3.12.5-2.el9_5.2.i686.rpm
df823df61d3ea03fe21b4c12f67e7a0b92cd20c758e161773dc08ac626103295
python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm
734619b3748242eb68db1a140490d525d5816efa5f99e8b80768d6c4a6f2cf31
python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm
4dbf4922fa735cb19eb96909e1e999dd739f648fcd606b79af80e1faec8e8bf5
RLSA-2024:11111
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.9-7.el9_5.2.x86_64.rpm
4102b3d8fa4c7e88d42bb789af82f5eff01363fdbbc2c8e857e9007e17c1be14
python3.11-devel-3.11.9-7.el9_5.2.i686.rpm
9e0849fba38aba89b912d4d5772d7cbc27b911c0c3ef339534c2402656148ce6
python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm
9bf5ef11ab19ddbcb5a3b23314aad46ba40ee883bebd4c8e41dc4f3c2ae2e4df
python3.11-libs-3.11.9-7.el9_5.2.i686.rpm
954b9a12254755d9652ffb9c600448812f8b842ad7b9f470ffef1c72d8a57d43
python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm
d397384c6b20308123b4da6baf43e9b3b753482b69fc5c54e71204697ed9f1b3
python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm
a7b6a3cb91a3e93d0ec42711d8ac6a0339538aa1672bd43ddd1150ddf32bae78
RLBA-2024:11218
nmstate bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmstate.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound.
Bug Fix(es) and Enhancement(s):
* Disabling ipv6 on ovs-interface is failing due to verification error [rhel-9.5.z] (JIRA:Rocky Linux-60242)
* nmstatectl gc mode does not support blackhole routes [rhel-9.5.z] (JIRA:Rocky Linux-58666)
* nncp route-rules applied breaks br-ex connectivity [rhel-9.5.z] (JIRA:Rocky Linux-60261)
* nmstate: Connectivity issue with a configuration has `ipv4 dhcp: true` and `ipv6 enabled: false`. [rhel-9.5.z] (JIRA:Rocky Linux-61899)
* Pod interface removed [rhel-9.5.z] (JIRA:Rocky Linux-65031)
rocky-linux-9-x86-64-appstream-rpms
nmstate-2.2.39-1.el9_5.x86_64.rpm
91797a2c427d42023af2a7b9c3da1576a399f16103985b2c2efd6a27dbee594e
nmstate-libs-2.2.39-1.el9_5.i686.rpm
b0b34daa24bef8bc12c31203930372cacb228a6738c64514db325f3290d1fe9e
nmstate-libs-2.2.39-1.el9_5.x86_64.rpm
2e4bb5b3a04834495df52ad55c6e2d9eac5d95778ae5e6c36e9e3884cb1e6634
python3-libnmstate-2.2.39-1.el9_5.x86_64.rpm
2079ab9ad2767aed2515064f21822116efa3d65f969bb2c4ffaf6733f728a152
RLSA-2024:11219
Moderate: edk2:20240524 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* edk2: Integer overflows in PeCoffLoaderRelocateImage (CVE-2024-38796)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20240524-6.el9_5.3.noarch.rpm
4028b087e6ae46a5aa42437a1a23327bd87d42b19b7c98774b5211ed6500c120
edk2-ovmf-20240524-6.el9_5.3.noarch.rpm
fc0caf09a366d9af2744b360332c131580cca70d734a06cc6db99a13300aff34
RLBA-2024:11223
javapackages-tools bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for javapackages-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The javapackages-tools packages provide macros and scripts to support Java packaging.
Bug Fix(es):
* javapackages-tools: Make OpenJDK 17 default JRE/JDK [rhel-9.5.z] (JIRA:Rocky Linux-62403)
* javapackages-tools: Include java-21-headless in generated auto-requires [rhel-9.5.z] (JIRA:Rocky Linux-62409)
rocky-linux-9-x86-64-appstream-rpms
javapackages-filesystem-6.0.0-7.el9_5.noarch.rpm
a888ded88c325405d7bb3edeef9e1da54543f018eeb815c1505ec156310def9a
javapackages-tools-6.0.0-7.el9_5.noarch.rpm
19596e1a8e86530a7a8e7614fc9413f51ebc3f2661a13dcf8d7f6cc6c8defe20
RLBA-2024:11224
ostree bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OSTree is a tool for managing bootable, immutable, versioned file system trees.
Bug Fix(es):
* [9.5] ostree Backport https://github.com/ostreedev/ostree/pull/3300 (JIRA:Rocky Linux-62772)
* [rhel-9.5.z] Rebase ostree to 2024.9 (JIRA:Rocky Linux-68351)
rocky-linux-9-x86-64-appstream-rpms
ostree-2024.9-1.el9_5.i686.rpm
fb7ab56eb742f2bb7c815b3b81d9b17e4598d74ddc31762835621aec8953763c
ostree-2024.9-1.el9_5.x86_64.rpm
da76a6c72e048a96795048b2a121e84e3836c058c40a092d1a83844112b8caa4
ostree-grub2-2024.9-1.el9_5.x86_64.rpm
97a1e8fbadd7e27c4e41b71d8e0cf6bd0decd739d966a9edf0ba31397809f5ab
ostree-libs-2024.9-1.el9_5.i686.rpm
bfc9ef78f9af89c68c968d63621d5f7992564bd87d9963e4b453f9660d29f0a6
ostree-libs-2024.9-1.el9_5.x86_64.rpm
39465a886eb548b4e6588b945882d3217cc3eeb7a3dc516e9f95d4a9d991b28c
RLBA-2024:11228
bcc bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool.
Bug Fix(es):
* The bcc-tools 'bio*' does not run as expected on Rocky Linux 9.4 [rhel-9.5.z] (JIRA:Rocky Linux-65192)
rocky-linux-9-x86-64-appstream-rpms
bcc-0.30.0-7.el9_5.x86_64.rpm
997bbef1ec36898140473c80662a11bcbcd5362fccba5a97065c9f272aff5c88
bcc-tools-0.30.0-7.el9_5.x86_64.rpm
b4bb4c9beddf04080adff014cdc893f8be40a6946f372897680fdd2754271487
libbpf-tools-0.30.0-7.el9_5.x86_64.rpm
449b823363c9afbc98e996fb22be564886c50ff9cb3316feae31c445a6e949f4
python3-bcc-0.30.0-7.el9_5.noarch.rpm
dca9c4ef964bd159a3ffab66aa8ac17e2450a305ff1ea772911b725a57d1732d
RLSA-2024:11232
Moderate: unbound:1.16.2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-unbound-1.16.2-8.el9_5.1.x86_64.rpm
63d604946e0315e41ac915ae62a46a0cb5780feefdc9e783e633e28982274c62
unbound-1.16.2-8.el9_5.1.x86_64.rpm
759adfb91086882c1ece12f110c97b10836e34ed5fe53249f3fb1f0a557f1ee9
unbound-libs-1.16.2-8.el9_5.1.i686.rpm
aba7529f4ac1d0284d87bfe2dcd32c8effefd9e089786d461adab50e0c3c5653
unbound-libs-1.16.2-8.el9_5.1.x86_64.rpm
b0547915c6918dfbf0d0d21db6c6de8633a65c106a8afe4191f509e077869a53
RLSA-2024:11237
Moderate: libsndfile:1.0.31 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libsndfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV.
Security Fix(es):
* libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() (CVE-2024-50612)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsndfile-1.0.31-8.el9_5.2.i686.rpm
7767650e71fa0c4e60a1ebafbdda829bf5dd8b4377c5ed3e93d6c6a74851042c
libsndfile-1.0.31-8.el9_5.2.x86_64.rpm
ff30d83abd19537a9c052d588451755e8b1d8fb0dd82529ef71dc19f1fa28bc7
libsndfile-utils-1.0.31-8.el9_5.2.x86_64.rpm
c0e96773576e9439b7fec11c42cd95d50c50761db79389c776ee6e3be3a6ac7c
RLBA-2024:11241
seabios bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for seabios.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The seabios packages contain an open-source legacy BIOS implementation that can be used as a coreboot payload. They implement the standard BIOS calling interfaces that a typical x86 proprietary BIOS implements.
Bug Fix(es):
* amdgpu failed to initialize when multiple AMD MI210 GPUs assigned and firmware is seabios [rhel-9.5.z] (JIRA:Rocky Linux-68955)
rocky-linux-9-x86-64-appstream-rpms
seabios-1.16.3-2.el9_5.1.x86_64.rpm
e99001e25c9dd6ef4a0336ff2c1701e444892ad6dc4a7c5c4ff345623292bf99
seabios-bin-1.16.3-2.el9_5.1.noarch.rpm
8928d209011e99e7f23d8c3a0053bc3e0a6c6c6e9a68251e2c7ef0125f288c3e
seavgabios-bin-1.16.3-2.el9_5.1.noarch.rpm
e34541684cb8c726bc494c91ef3fc57c134d841f496834823fcf68c7b696b125
RLSA-2024:11242
Moderate: mpg123:1.32.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mpg123.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mpg123 packages contain real time MPEG 1.0/2.0/2.5 audio player/decoder for layers 1, 2, and 3 (most commonly MPEG 1.0 layer 3 also known as MP3), as well as re-usable decoding and output libraries.
Security Fix(es):
* mpg123: Buffer overflow when writing decoded PCM samples (CVE-2024-10573)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mpg123-1.32.9-1.el9_5.x86_64.rpm
f0b39d7451f8e981bf43035698f4f5102e8067a999e5cbcb14e7a3a7dbd40c8a
mpg123-libs-1.32.9-1.el9_5.i686.rpm
91ed0a46c8067d14de528bf8e676566bdcbdb1129649a869ae0b8a19d45e17e4
mpg123-libs-1.32.9-1.el9_5.x86_64.rpm
99bc4d1b58905a0d0418216990031577a04dec76433cb3cede0eee7f73566c00
mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm
abe8ea2011681d83613ae760a27443c7acdf2f047c590214c98f49ffd03b8d56
RLSA-2025:0312
Important: raptor2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for raptor2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples.
Security Fix(es):
* raptor: integer underflow when normalizing a URI with the turtle parser (CVE-2024-57823)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
raptor2-2.0.15-32.el9_5.i686.rpm
46f70588fde2371004e52db687ac3c330186f9f76f2f47e5835422ed3c64ce44
raptor2-2.0.15-32.el9_5.x86_64.rpm
8148637e35151336d77865df95bfe868e0303042a537953f0d7273b4db20f2b1
RLBA-2025:0515
libisoburn bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libisoburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libisoburn is a front-end for libraries libburn and libisofs which enables creation and expansion of ISO-9660 filesystems on all CD/ DVD/BD media supported by libburn. This includes media like DVD+RW, which do not support multi-session management on media level and even plain disk files or block devices. Price for that is thorough specialization on data files in ISO-9660 filesystem images. And so libisoburn is not suitable for audio (CD-DA) or any other CD layout which does not entirely consist of ISO-9660 sessions.
Bug Fix(es):
* genisoimage doesn't work after in-place upgrading OS from rhel8.10 to rhel9.4 [rhel-9.5.z] (JIRA:Rocky Linux-74055)
rocky-linux-9-x86-64-appstream-rpms
libisoburn-1.5.4-5.el9_5.i686.rpm
9a05c2a6290a0b7a77b13a9f943b91ae1d1d6fe509367843c91f6c35ba76e918
libisoburn-1.5.4-5.el9_5.x86_64.rpm
2b817f8886b909c7d019c018676c0b832eb2bca710048b63e48dec189c4732a3
libisoburn-doc-1.5.4-5.el9_5.noarch.rpm
7ef427434f6cc2f95008499afd173639cc47f958e061b01216833146523ecaf9
xorriso-1.5.4-5.el9_5.x86_64.rpm
f5402d307ea85081a427abf9a533ec0cf0bd6a44b176a98caa4aec0210b6261f
RLSA-2025:0914
Moderate: galera and mariadb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for galera.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a community developed fork from MySQL - a multi-user, multi-threaded SQL database server. It is a client/server implementation consisting of a server daemon (mariadbd) and many different client programs and libraries. The base package contains the standard MariaDB/MySQL client programs and utilities.
Security Fix(es):
* mysql: InnoDB unspecified vulnerability (CPU Oct 2023) (CVE-2023-22084)
* mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) (CVE-2024-21096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
galera-26.4.20-1.el9_5.x86_64.rpm
0b78850c1ab174d01bedd92644d2fc1cde8128862f08fd4100508bc7426b9eed
RLBA-2025:0915
389-ds-base bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Bug Fix(es):
* Wrong set of entries returned for some search filters [rhel-9.5.z] (JIRA:Rocky Linux-65775)
* deadlock during cleanAllRuv [rhel-9.5.z] (JIRA:Rocky Linux-66138)
* cleanallruv consums CPU and is slow [rhel-9.5.z] (JIRA:Rocky Linux-67163)
* Freelist ordering causes high wtime [rhel-9.5.z] (JIRA:Rocky Linux-70257)
* Some nsslapd-haproxy-trusted-ip values are discarded upon a restart. [rhel-9.5.z] (JIRA:Rocky Linux-74350)
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.5.2-5.el9_5.x86_64.rpm
f1e37499168fbe013568f78443996b34453bc9327df36bf103440dbf58f6c0e9
389-ds-base-libs-2.5.2-5.el9_5.x86_64.rpm
4f935010f4e0c1222ec95cd23defc6b0fe97e24b67fba638aa24ac279602cc5d
389-ds-base-snmp-2.5.2-5.el9_5.x86_64.rpm
2949bc42fc13e91dd30c17b8562b6488df2b9ba70b7c893b1e4a5f58eb408269
python3-lib389-2.5.2-5.el9_5.noarch.rpm
dd44408b0b595fffda8f1accda4d4000156e4f3cdf2e8b225fe6f0c07c19a7eb
RLBA-2025:0924
ipa bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es):
* kinit with external idp user is failing [rhel-9.5.z] (JIRA:Rocky Linux-76011)
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.12.2-1.el9_5.4.x86_64.rpm
ad68dfbcc60bc941214fed5b58cfd8be2325563aa852fcaaeae5135e53e088fa
ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm
84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4
ipa-client-epn-4.12.2-1.el9_5.4.x86_64.rpm
5acd3bee384607d33a1273676fc51913ee889e593d8ee05065e51096f92a904e
ipa-client-samba-4.12.2-1.el9_5.4.x86_64.rpm
ebadfb136d57fbf665b2e947612deb5ca60c531a25eaa1475e6881106ed18b92
ipa-common-4.12.2-1.el9_5.4.noarch.rpm
36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705
ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm
cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26
ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm
d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a
ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm
8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037
ipa-server-4.12.2-1.el9_5.4.x86_64.rpm
bdb694b073494c919c1cc9f8a57a3e15754618fd934b138a7d78fa493714dbc5
ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm
3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700
ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm
2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547
ipa-server-trust-ad-4.12.2-1.el9_5.4.x86_64.rpm
ad08b2754469eee2fd7d272d2a778660e6d81d520133e79526a6dcaebf1cfaeb
python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm
f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc
python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm
1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac
python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm
bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3
RLBA-2025:1512
virt-v2v bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-v2v.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible.
Bug Fix(es):
* Migration Plan / vddk pod cannot remove open-vm-tools in case of dependencies [rhel-9.5.z] (JIRA:Rocky Linux-78842)
* CentOS 9 Migration from VMWare to Openshift Virt fails [rhel-9.5.z] (JIRA:Rocky Linux-78844)
rocky-linux-9-x86-64-appstream-rpms
virt-v2v-2.5.6-8.el9_5.x86_64.rpm
92b38043a527eb79ef3d5965bbf1375f0794f4bebcf8d6d9695970d415bcd5fa
virt-v2v-bash-completion-2.5.6-8.el9_5.noarch.rpm
b8669fb849e05a6db73a8af36178cad0cd4a71997a956d8f443dc03dd74a098f
RLSA-2025:1670
Important: bind9.18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind9.18.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Security Fix(es):
* bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187)
* bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load (CVE-2024-12705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind9.18-9.18.29-1.el9_5.1.x86_64.rpm
01675a7a1f0c7fc392673e4b042cd86edd01f482b313eac735bd2f6e98a88d6e
bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm
e5ab34561a296d37914f352154c49e2f82bca2e87f3755d57675df9b9e70dd67
bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm
c944af447d7755750ca3c66653452d5eb9196100b5890ec2b9a46745a729247f
bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm
2a3aa8c8bdf987e778187c892ce5eda9ac9bbad78a10faffacc5c9c38109e0c7
bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm
99a331b6d6d78f2050a583123205336d1d50218adcad3e0565133f65781cbb99
RLSA-2025:1671
Important: mysql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for mysql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
* krb5: GSS message token handling (CVE-2024-37371)
* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
* curl: curl netrc password leak (CVE-2024-11053)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mysql-8.0.41-2.el9_5.x86_64.rpm
235a4a25de5c86a52fb7080f3f2705979c306c4c1a56aa34d8d5898a02935123
mysql-common-8.0.41-2.el9_5.x86_64.rpm
6fbc9d6ce606ab1117f51b10d4f5238daddc7512a9f6fdfbce476291d8d9c366
mysql-errmsg-8.0.41-2.el9_5.x86_64.rpm
7a63a79c21b351391c7846c11fc9cfee952ca4a727285050b3bf016ec41213f9
mysql-server-8.0.41-2.el9_5.x86_64.rpm
6628e5c2a07528191427efcc77602cd49fb3d37a03664e47a77b359583816251
RLSA-2025:1681
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-24.el9_5.3.x86_64.rpm
fb11ef35fa96b1fa61a798ac856c4c996711d5a1546136a5a45af7b77d63a9ab
bind-chroot-9.16.23-24.el9_5.3.x86_64.rpm
1fbfa8a427dcbd478fe3f59bf1e173747d6f37ebb4c7f7d1b05af7a6b72bc459
bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm
f571985b61f890be72f6f070cfb42cf642c8dca0a5303f438f9e2d4435142613
bind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm
057b77bd05909e3810d31a6487b6860c244d82c6e6e5993a9e1eaec431be1533
bind-libs-9.16.23-24.el9_5.3.x86_64.rpm
c1e198fc362a6cdbc2f3a00f671d9e80c34292930f94763fab99d611a8695bf5
bind-license-9.16.23-24.el9_5.3.noarch.rpm
c4c4c242889fa4d75748628e15265b7dbc19d40115679b4ee2355f2663cf12e6
bind-utils-9.16.23-24.el9_5.3.x86_64.rpm
33f70dd2375726850c715c06b2481250774d0923176142f50dc7d82b2e6f6254
python3-bind-9.16.23-24.el9_5.3.noarch.rpm
454965885e9940851b833d59a8f15dace7d3f6042aaba3862b9f1142c362816d
RLSA-2025:1742
Important: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.20-1.el9_5.x86_64.rpm
12475508121ea1d0411ccd91fce29369a885dac6f22c8c228b19e3ccff51fead
postgresql-contrib-13.20-1.el9_5.x86_64.rpm
62f0c83dce23469d8395205bdbb91c17f07ee770c1426ede8a7d03c777e9b3a2
postgresql-plperl-13.20-1.el9_5.x86_64.rpm
9a588c7fbd88883a16530a7d954cb597cd8653248180eae92938c5f751cab85d
postgresql-plpython3-13.20-1.el9_5.x86_64.rpm
6c14fcfa34ed041381cb56a62de98d19ba45801ff0d1ffd1643a5df84c7b7d08
postgresql-pltcl-13.20-1.el9_5.x86_64.rpm
56429951e32541c8cec675f4ac7e337c6eed612653a384545510b7133a7d0f81
postgresql-private-libs-13.20-1.el9_5.x86_64.rpm
21290dab36b52a2b7e9a9b1767cfaa0102c633281ac539d45c1cca76eab44335
postgresql-server-13.20-1.el9_5.x86_64.rpm
785e2b0393615e87e76c8fb05b5dc6d3db201f84d1476753c1d89976746eb769
postgresql-upgrade-13.20-1.el9_5.x86_64.rpm
f2430ecf521c694e030963abd54e58a96fe51652f83d7e8353df94b8e7f9ccfa
RLBA-2024:9087
ignition bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ignition.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ignition-2.19.0-3.el9_5.x86_64.rpm
345045a8c337f8b8a06234d99fd1871f6b831aac3fed3c4d19023397a89514a1
ignition-edge-2.19.0-3.el9_5.x86_64.rpm
6d544d0718315ac7bf674f22931d68f021cf99b4388057d6a4a8ed18a0b9b60a
ignition-validate-2.19.0-3.el9_5.x86_64.rpm
5e4a9003e298c464a397a35a54d06229212e801523f8bcf08c78a94e8c4469e0
RLBA-2024:9085
cockpit-composer, osbuild, and osbuild-composer bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-composer, osbuild.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-composer-52-1.el9.rocky.0.1.noarch.rpm
3d09ee06a9bd28bc891131bc5b06080d7a29bade513ebc978e245448f81bb2d9
osbuild-126-1.el9.rocky.0.2.noarch.rpm
1fa656fbf4780993db7ac95e247429b95fcb63e047378fd79401e16f6043027e
osbuild-depsolve-dnf-126-1.el9.rocky.0.2.noarch.rpm
2ae11a9f0238550c58be634d78ebccabd5b2cadd3cece80197914af53a96d4c5
osbuild-luks2-126-1.el9.rocky.0.2.noarch.rpm
3b285f6931f5d6c3ad53286385b41db641cb54bfb923ccccc3c915afc19b7aa5
osbuild-lvm2-126-1.el9.rocky.0.2.noarch.rpm
e2175ba6c078ab43f2a4bb8040d4a7eed96494f7576c58c19aa34467a3758907
osbuild-ostree-126-1.el9.rocky.0.2.noarch.rpm
37118f31799de9e0c1fb9320d5d9a6a17341ad8df8d4ced58603ae5718cfce3b
osbuild-selinux-126-1.el9.rocky.0.2.noarch.rpm
1b21c0509ac41008e07701e845672cff53d46e54742a5d6fc0d0c35381e3bae0
python3-osbuild-126-1.el9.rocky.0.2.noarch.rpm
44a894b74e38807473ae47cd8397c3f80f74a91d2c06ee2a136648b9aab6e3eb
RLBA-2024:9090
container-selinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
container-selinux-2.232.1-1.el9.noarch.rpm
7d4b02ee61a19c7b18ada3d509fcab9a677124155bfbc92731c2d48a4b11eac8
RLBA-2024:9094
fence-agents bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm
13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb
fence-agents-compute-4.10.0-76.el9_5.1.x86_64.rpm
1cebfa38f6802d639582bc993e76663aa6d2d3d96b4a0bdf573932156df6a392
fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm
c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb
fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm
979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704
fence-agents-kubevirt-4.10.0-76.el9_5.1.x86_64.rpm
8e7a84e36d56b29c115ef6ff1ce914bc9feba4c2fea9f60a73869c82fade5b1b
fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm
90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073
fence-virt-4.10.0-76.el9_5.1.x86_64.rpm
408112bfa50d8d99a3a1081008428254532c7964c4bac5aa220f0f8455c4ff43
fence-virtd-4.10.0-76.el9_5.1.x86_64.rpm
b42a2c3b074f0f14241c9e798f32469351f236f93049f3d984bae92db82923ba
fence-virtd-cpg-4.10.0-76.el9_5.1.x86_64.rpm
24d4dfb0ea048c3ddc63b9fad0265ef8dc5d69740dbc47dffd73ed9ae8d092b6
fence-virtd-libvirt-4.10.0-76.el9_5.1.x86_64.rpm
3d16376833af531b2e8c6ca168370b539486e5199c3ec3ccb848d612288ec4f9
fence-virtd-multicast-4.10.0-76.el9_5.1.x86_64.rpm
3a42cbf09e1a2e1cf984a0df6412c8a5a0d2fcabd8697b8dafcc2605b82672dd
fence-virtd-serial-4.10.0-76.el9_5.1.x86_64.rpm
1b6d159a4422a8015a506059e74865c51ff848e0936a8af5bd6c6fc22e2242f4
fence-virtd-tcp-4.10.0-76.el9_5.1.x86_64.rpm
fe5accd323eadead37a910fb95b5b0572500cb76231d54cd5459fd27dcc35c03
RLBA-2024:9134
cockpit-podman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-podman-93.1-1.el9_5.noarch.rpm
3e2b3a6a2f195881971b73c84b6236a4f23b9865e5b0c4e4c02caaa9951aebcc
RLBA-2024:9099
crun bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crun-1.16.1-1.el9.x86_64.rpm
11367280a1264c51a93f4294ceef6cd8a50b06e85953c45d530946042c597faa
RLBA-2024:9104
perl-Scalar-List-Utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Scalar-List-Utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Scalar-List-Utils-1.56-462.el9.x86_64.rpm
3c28f6e6e2610c33cab2282fe4db7e0d0316537e81ab33c70d9571ef4daf5db6
RLSA-2024:9102
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: Symlink error leads to information disclosure (CVE-2022-4122)
* containers/image: digest type does not guarantee valid type (CVE-2024-3727)
* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.2.2-13.el9_5.x86_64.rpm
776a1adad50d599bbb42e73a7238f4dba5625ea1a8eeabc9bdd0467ab83c8ac2
podman-docker-5.2.2-13.el9_5.noarch.rpm
53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4
podman-plugins-5.2.2-13.el9_5.x86_64.rpm
6475de32f2e34ea1cb53d6f5bf38d3cb841cd218577bd2e275e30247e3458d91
podman-remote-5.2.2-13.el9_5.x86_64.rpm
dfb5d2ac5934ec5f86f766c9f13016e8562ca7379de9e78d3f6d73794c7369cf
podman-tests-5.2.2-13.el9_5.x86_64.rpm
0a01a3fa387d5267fe206918dfeee547fa4905c18c0b95aa6f65be29c2cee344
RLBA-2024:9108
python-podman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-podman-5.2.0-1.el9.noarch.rpm
6a8a0886b35552581b34d1a218fe592ce4963af02d7c3c45165815666870b931
RLBA-2024:9109
udica bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for udica.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
udica-0.2.8-2.el9.noarch.rpm
610f5b8e97ffe4871beccf3688d9e41d2b14577d030d9e5b4d7c703572915ad8
RLBA-2024:9113
python-awscrt bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-awscrt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-awscrt-0.20.5-3.el9.x86_64.rpm
37ea6507f1e7f5af1678e4b2ff33ce27d1fd2d84c91325c13397f98eca7ee908
RLSA-2024:9114
Moderate: gnome-shell and gnome-shell-extensions security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnome-shell-extensions.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts.
Security Fix(es):
* gnome-shell: code execution in portal helper (CVE-2024-36472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-classic-session-40.7-19.el9.noarch.rpm
9d56ad1efffb0505aef270d16fa10b925d4c464437446f9545372dfe8f74de3c
gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm
04befb8843268be3768c13590e97ed0156d70f1d63f9290686936c1b10f2794e
gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm
2aae479e0529020808288a9ff57b5071e086885e130a0c0b59dca6eb3e41ad3f
gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm
748abdbc93f1a3be0252c7c979efd04aa01b15a32b27278520813dd025a43461
gnome-shell-extension-common-40.7-19.el9.noarch.rpm
c0ed95b34ce76e52d1f7c56d574c5c17a55743ad8cd8d96a93a8f3c431f9e2ba
gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm
d18c87bc15410b9149a48a2ff0167bd92d1c5dd81842cfbc7041c5d3326bd65f
gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm
c583fc900fd4cb149cf77c1a6b7772553afa6acd6b56b65525134bea03eb1b63
gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm
e969204ecfb677284ed522e5e87f41eb3ee720bbcc7e0f18bb16e83f60cf03c7
gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm
fd7fff23154a2ebe2d3ec3f00fef1f39a18e4bca9014145a0608b71852a516ff
gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm
2154c9b1458a62d39bc71dab882216aaea1016d5be0bc8d06e7a612298de4561
gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm
f6bd4aaf4af84094c78ad1d20e98c4cb80dbea0b296aaae38f328badfc7c0d52
gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm
e2eeef07eddabeeb2617cd5dc93ef46fd28cd92c0b08c1751eb8b29a4e63257d
gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm
994db90c66c3279e7abd3f2b3d202b1c5f1a38e6f8b9f080441e5d904e0dcc4a
gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm
ee5b542877d939baad1e3e8db0421002e3efa7efd8d998223cf68f8adddd23b4
gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm
d320c5c9978c03b4ad39efc47d79899bbf6949e9a35e42d5aa8faffad8ed160d
gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm
6254ccc209b2c418c8056ba388644fe3074e1abc3fa32982ee7a0a55771df904
gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm
1e349076d56ae439a25f867bdeb575a5965e6299973d3c4d7233fc278c1a84be
gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm
72b58c32acd2639980f9724e2aee789175da2270c0e29f3237bad5fab63825bc
gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm
9053ddb883f3f6fe8754c1812e45a33572399612d819a27b493c6cc60d031aa2
gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm
b435739929319521700a5baad9137e65d455c35be9816f41f09163be71e6bb79
gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm
9cb0658cf8e14a4ac58208b349b1de89ffdbf6ec26281e4c849f8cd2651441d6
gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm
4d06f40f88f8ee5c3d8c4702b5fac5f2350908c090cfb748e5f6dc1003917ffb
gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm
6b46eff306b622851fc92b5262f5495fcc4a69aa4f8eebc098d51d394439733d
gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm
97301e4b2a2cf09b2fd89e531318105ecd4d64581009defdd327002b9ff23a8a
RLBA-2024:9116
conmon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conmon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
conmon-2.1.12-1.el9.x86_64.rpm
1c273b6c99bebdab8bbca9b03fa3523961697ac68406248e58bf62373f05913d
RLEA-2024:9119
rhel-system-roles bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rhel-system-roles.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rhel-system-roles-1.88.9-0.1.el9_5.noarch.rpm
db22cba6eaab627bc6e9d7530c533316da5cde071fee75a01da30d06bfbcfb1e
RLBA-2024:9117
delve and golang bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
delve-1.22.1-1.el9.x86_64.rpm
3eeb63858fdc51f679879469021cc0723f1e74f44c43d7c5d50c44349edf3391
RLBA-2024:9124
softhsm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for softhsm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
softhsm-2.6.1-10.el9.x86_64.rpm
c1516b627a79c03c558f8a392357088f5cc53dab047d27e832da3292f8674a2f
RLBA-2024:9121
gnome-settings-daemon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-settings-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-settings-daemon-40.0.1-17.el9.rocky.0.1.x86_64.rpm
ef53ea2bccdc294ecb70c04dd6b2b4762636b71d90106abb366caf9404cb516a
RLBA-2024:9127
cockpit-machines bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-machines.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-machines-318.1-1.el9_5.noarch.rpm
65b8ace4816f2b5748d2bc504a8b5dd2ba3a2ac369020770a4c08e235330fea4
RLBA-2024:9129
cockpit-ostree bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-ostree-204-1.el9.noarch.rpm
8d9e7f519c13956642bdbfea9b2c3c882f7d3e4c125e88009015e15e8442c298
RLBA-2024:9133
mingw-qemu-ga-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mingw-qemu-ga-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw-qemu-ga-win-108.0.2-1.el9.noarch.rpm
98cf624f95171cbbfdad921fb95be8c075aab7970ab1a85c5ce0ff22e134b500
RLBA-2024:9132
open-vm-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-12.4.0-2.el9.x86_64.rpm
7e67f61e4e4aae18fab276fb30cbddaf974d1db95139f4d79eb2886186f6108f
open-vm-tools-desktop-12.4.0-2.el9.x86_64.rpm
b28927f0d32b1e61e6495397cbad12dcbce54f00d1a20264cc0d3aeec4550a30
open-vm-tools-salt-minion-12.4.0-2.el9.x86_64.rpm
9a80dd662605247fea513e34d0ef5ec7ce944e88b6a22f4b2db7c60baa99dc24
open-vm-tools-sdmp-12.4.0-2.el9.x86_64.rpm
0c945acce76390476ec3a19fa98d0c965c34f3ccbb4e9823687e98a341496e19
open-vm-tools-test-12.4.0-2.el9.x86_64.rpm
4175f66a35d2f04e3682b91c006b7fa42298aa0a17ebdf3b9935180137708468
RLBA-2024:9130
cloud-init bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm
8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe
RLBA-2024:9137
gnome-screenshot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-screenshot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-screenshot-40.0-5.el9.x86_64.rpm
a4a3df0e6ae02ca81262b9e6ac4766485d5532accbb73908303922b7363b9547
RLSA-2024:9135
Moderate: toolbox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for toolbox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
* golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
toolbox-0.0.99.5-5.el9.rocky.0.2.x86_64.rpm
1522beed2040e6819cbf586a99fe0d67edf4eeef5d83702bdb6d7746b33b6b89
toolbox-tests-0.0.99.5-5.el9.rocky.0.2.x86_64.rpm
ab54c664f4493fbc1b186dffcaba6abb12f30e729b7b9769b3d994cd1633cdba
RLSA-2024:9136
Moderate: qemu-kvm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327)
* QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446)
* QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-9.0.0-10.el9_5.2.x86_64.rpm
b6aec138968abfb9748361a2ee14487aeb62569ce67bbffbb0150808d34f6a83
qemu-img-9.0.0-10.el9_5.2.x86_64.rpm
3bee7bf4b9fc4bb6df430a11508d46e97ca144e113be6bb016ff09e8eaf6d9e0
qemu-kvm-9.0.0-10.el9_5.2.x86_64.rpm
d697468f7fe4a63bf40176a79c2556e2d40916afbe6e27b417503807992fb45c
qemu-kvm-audio-pa-9.0.0-10.el9_5.2.x86_64.rpm
e0ad9f64e4e8c7a8a404a5486438c3e5e1a20bfb6f74bb9c443292713b78bb59
qemu-kvm-block-blkio-9.0.0-10.el9_5.2.x86_64.rpm
9b624993d16687dc6fea42574d7eda74856ed3e4cbb0b09ca5924b663e61be3e
qemu-kvm-block-curl-9.0.0-10.el9_5.2.x86_64.rpm
c03ede6b75808402bcfc3e4ce42284f27d9b4e390fb844c7c5aa086793b5f088
qemu-kvm-block-rbd-9.0.0-10.el9_5.2.x86_64.rpm
212fcbf408dd454c22ff13fca6e36d30bdc2b8820020c78a95cc62b1c94eaaf8
qemu-kvm-common-9.0.0-10.el9_5.2.x86_64.rpm
74bd4f43a2e51ab2d7ce1701f75a9ee369d1e766e1f360c4f1d6c48aef95283e
qemu-kvm-core-9.0.0-10.el9_5.2.x86_64.rpm
446815c893e0ceb4b73f9e33f8caa6a28c6ebc93659e50f0bfe11c66ad039163
qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.2.x86_64.rpm
e77624bff0f5e1c9be0f819ad738ff99c3abd1ab00c36f0f9138e35ed2c2a1fa
qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.2.x86_64.rpm
0c046c01a1c8bb36c0dea865dcb8e57560afdd69308ae1f8de756de6cc29a036
qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.2.x86_64.rpm
af8cc83dea4eaf9cbc28016a75d3244b4094ac3358846f0524eb61f29667e8b6
qemu-kvm-device-usb-host-9.0.0-10.el9_5.2.x86_64.rpm
8f1f3c95590603101ac05cd8eb0c41315a0f950418380bbb28c410092ec348e8
qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.2.x86_64.rpm
0a44ad51f2feee3a4261c115a0e4ec99180f4ebd104f58e78b45b27c63634e2d
qemu-kvm-docs-9.0.0-10.el9_5.2.x86_64.rpm
6cbf058372af85d5ff38d4de8fde6d1b7eeec673da2f7a3b8b16c98586644d18
qemu-kvm-tools-9.0.0-10.el9_5.2.x86_64.rpm
c97c7e26bcb5d96ac998a4963b72018a6834380317efad52e24053460fe88bfb
qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.2.x86_64.rpm
a01a9a177bce335c7fd3934cbc9b0a572ac9c81c1b5a40543f2e2b192b048799
qemu-kvm-ui-opengl-9.0.0-10.el9_5.2.x86_64.rpm
11706725eb43cdc64f6464da7392576e4ec67ea42ed90a58aac87fc19efc2db3
qemu-pr-helper-9.0.0-10.el9_5.2.x86_64.rpm
234cdffe2fba47d414152b3599084508be0c3846af8d205a736b669e74901183
RLEA-2024:9140
gcc-toolset-14 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-14.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-14-14.0-1.el9.x86_64.rpm
b769d196a9e6af6fb86f8e40817ca724f45b8cab61e1c7ac26b43896a2366124
gcc-toolset-14-runtime-14.0-1.el9.x86_64.rpm
56498f787358b2418ebdb7f3f7453cabd7a5d1cbe5afc2bf914685d9f4cc256a
RLBA-2024:9142
stratisd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratisd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stratisd-3.6.7-1.el9.x86_64.rpm
2390fc766e22716be1ee571590df5870d7dacb51a47107aff2c4dff7972324e0
stratisd-dracut-3.6.7-1.el9.x86_64.rpm
d14acfd4a9124e68310e88744b335e86127e539302d7b3dc7896938fabb71438
stratisd-tools-3.6.7-1.el9.x86_64.rpm
f73727e6a23795525451577b667f10bb67a552a85e78106b7e697be4aa6bf4c1
RLBA-2024:9139
gcc-toolset-14-annobin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-14-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-14-annobin-annocheck-12.70-2.el9.x86_64.rpm
b69d3046fea69870c25fcb1b353e671703d0c18bd1f461232e7c696640447000
gcc-toolset-14-annobin-docs-12.70-2.el9.noarch.rpm
23d3588d75639f77eff14c4a329dd57dc748e4c120c1a4a621f237f9308cff8e
gcc-toolset-14-annobin-plugin-gcc-12.70-2.el9.x86_64.rpm
a75d319bbd2e9067686fccacefd96202d7eb9e095d3660c15841cad4b0f0c974
RLBA-2024:9143
valgrind bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for valgrind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
valgrind-3.23.0-4.el9.i686.rpm
f6dc6e2238b09dce250f7dea03bc9f797521fb9a162af583b2af46b41f7b20e7
valgrind-3.23.0-4.el9.x86_64.rpm
56dcf322f638cf994884316a13dbaca1108e8663bacc4b74d94145cd76401b7a
valgrind-devel-3.23.0-4.el9.i686.rpm
04861c89ca0e7be1756f0850435a0109c2b2ba6ce3662b20e0b67d6fb293e1bf
valgrind-devel-3.23.0-4.el9.x86_64.rpm
ed1b02d83fef6f7d1c74bb932a2bc0cf065df1096a83bfa4555314c6d9ca0a14
RLSA-2024:9150
Moderate: python-jinja2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment.
Security Fix(es):
* jinja2: accepts keys containing non-attribute characters (CVE-2024-34064)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jinja2-2.11.3-6.el9.noarch.rpm
9e34d88c9835f11c7dfcd46b16021461f2b659808f1ff36fcbf893e5128f7c64
RLBA-2024:9148
hyperv-daemons bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hyperv-daemons.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hyperv-daemons-0-0.43.20190303git.el9.x86_64.rpm
bf8d9715d408c89e0c93193a9b8f0ea0c8ca87aa54e426e6e9f9d455579ca486
hyperv-daemons-license-0-0.43.20190303git.el9.noarch.rpm
8f98697c621703bd49d669aaf5ce4b88776eccad80624fc2889ff7cb8c78e87d
hypervfcopyd-0-0.43.20190303git.el9.x86_64.rpm
eb32d3bd0e2e87910cc428361f729f37fb121b682a5c42693ada9e79573b0d5d
hypervkvpd-0-0.43.20190303git.el9.x86_64.rpm
9fb3d2ac310e43756323c3bcf9e39f94bdf225996143ded6efa048a92b3a3918
hyperv-tools-0-0.43.20190303git.el9.noarch.rpm
f6c79f8536d22d0b80b1ff3c7915e98737308d503c384391b8e6922edf73e919
hypervvssd-0-0.43.20190303git.el9.x86_64.rpm
b5baaf241bb1e401249902acbc6e424b991a2ff32d9473486b9f1f11e6a50863
RLBA-2024:9149
slirp4netns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for slirp4netns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
slirp4netns-1.3.1-1.el9.x86_64.rpm
8bec68ec0bf3354410e0320f93948a188e77562eea9fb810af22cf44a84be405
RLBA-2024:9154
systemtap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for systemtap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
systemtap-5.1-4.el9_5.x86_64.rpm
3f002362833e84b06a9fbaedf98b6aec7a62bc24848742cc4e3091a76d081f6c
systemtap-client-5.1-4.el9_5.x86_64.rpm
bbf31a59d68154f864601dee5a8fddec14c68f68bcff34ef4e851acde274bf7b
systemtap-devel-5.1-4.el9_5.i686.rpm
4b66db72ed0148ad9d3eb48bb53886a549237c9ebe8da48df33100254ade4c4e
systemtap-devel-5.1-4.el9_5.x86_64.rpm
f9fbb8f3812af1ebb073fd73e61f2fba3a1c4a8d590d6ee86c251bfb80738710
systemtap-exporter-5.1-4.el9_5.x86_64.rpm
f193e1dbbe5a7de467856d2ddac42d11717dacc178d5fee1fcbb65dcaba37363
systemtap-initscript-5.1-4.el9_5.x86_64.rpm
18c66a364cf7d07abab645b201250b8adf3135a38d75469746f63433444133a4
systemtap-runtime-5.1-4.el9_5.x86_64.rpm
7a113e6f500881d43f8d03b12fca710819679ed9a0a06dc4b7d815c66505b92b
systemtap-runtime-java-5.1-4.el9_5.x86_64.rpm
0c5628837cd645f635254f94d2e9ed349edb55000a0d11a53e209e8722f68afb
systemtap-runtime-python3-5.1-4.el9_5.x86_64.rpm
fb6708f24dc36e6fef85008041806cfd73c3a3c35a46af926a020eb126d5240d
systemtap-runtime-virtguest-5.1-4.el9_5.x86_64.rpm
0dc1f6657b586f915c064d54ce5eae46b355d62d525a549b330b1071d23148d1
systemtap-runtime-virthost-5.1-4.el9_5.x86_64.rpm
5bd3fb7d3090391ed74862c582d67eb42414516f300e2f16444e2e960bf6a4a8
systemtap-sdt-devel-5.1-4.el9_5.i686.rpm
c55b3e43a7fe5cf05021ac525a0869eaa54e1c8b97c6d2f9defc37a88118dd4e
systemtap-sdt-devel-5.1-4.el9_5.x86_64.rpm
386fc1ad0c54f0735dce2d0fa9691181088d2d154812c0f15f17aae428e621ec
systemtap-server-5.1-4.el9_5.x86_64.rpm
9c68c4301b865a7dfd3b43e44381ede633c356ac9fc11a580bf36fb707faed17
RLBA-2024:9152
python-colorama bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-colorama.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-colorama-0.4.6-3.el9.noarch.rpm
32cd450d40807606c2a77ff55056cde5ab78e829efeca03ac7b96e71d1831271
RLBA-2024:9153
realtime-tests bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-tests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
realtime-tests-2.7-2.el9.x86_64.rpm
6b9d051a627bbadc29edde6986a5f6825a9292bd09653a727348d3e1db60ed20
RLBA-2024:9156
awscli2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for awscli2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
awscli2-2.15.31-3.el9.noarch.rpm
826823d87808f360dddabb7bad990ccac844bb6a42d81d1da0d6b0848aab2a6d
RLSA-2024:9158
Moderate: lldpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for lldpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.
Security Fix(es):
* lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827)
* lldpd: out-of-bounds read when decoding SONMP packets (CVE-2021-43612)
* lldpd: CDP PDU Packet cdp.c out-of-bounds read (CVE-2023-41910)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lldpd-1.0.18-4.el9.i686.rpm
db41286c4c121a0a0c7a1ca8980be57b8ebc8995ecd9e8f2f687a5bacdf24090
lldpd-1.0.18-4.el9.x86_64.rpm
fe16f4cc9e0f243bb80c0ad556ee9bf6a4c9290fdb401daac4147f0392d3275f
lldpd-devel-1.0.18-4.el9.i686.rpm
75ce7b75f56328095c7f874f5a45d390a0c0574a8cd4e97725563263b43e997c
lldpd-devel-1.0.18-4.el9.x86_64.rpm
e84740ddd7068671edea44cb679a01999456e76c4d29622f80d2ef12ce4a039c
RLBA-2024:9162
squid bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-14.el9_5.3.x86_64.rpm
336441636ff36a801486627f8f871a61ed2dfbb2ab5d6ffd0ba04f4da471283c
RLBA-2024:9161
python-drgn bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-drgn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
drgn-0.0.24-4.el9.x86_64.rpm
9d6b29de8641ae710983ac98a83442502c859667fcf295fa0a9789c649acf7f0
RLBA-2024:9163
fapolicyd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fapolicyd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fapolicyd-1.3.3-100.el9.x86_64.rpm
5b806b795533507cc15fe5ab4cd0c39105af7f240dee59a1015cde07800f22ba
fapolicyd-selinux-1.3.3-100.el9.noarch.rpm
5cedbae04c403bc62bf01e16bd9cc277c6b24cc2b8abaaa6dc346e1a123ccc02
RLBA-2024:9160
gnome-control-center bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-control-center.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-control-center-40.0-31.el9.x86_64.rpm
70da1d97b6417c7e05aa65ff82cb3ec5de1a9295c5b5594ec28d622bf2b9dca1
gnome-control-center-filesystem-40.0-31.el9.noarch.rpm
01917ebf7ab4e08fefbd174574cd14bce91704fde1db1d5ff66d44192bf68516
RLBA-2024:9168
aide bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
aide-0.16-102.el9.x86_64.rpm
2ec5193a89507cebe05f502bae1377da3278336753c2cab12a46bb78370063ce
RLBA-2024:9172
python-blivet bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-blivet.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
blivet-data-3.6.0-17.el9.noarch.rpm
aea9cff1f9498d2ddfa55e6e8f14e447e9434d6e62a92b1e863cda32d07be76e
python3-blivet-3.6.0-17.el9.noarch.rpm
5f6e1375d14694ccdebf1a93b7e91e7f58b7d08108fb0528b206c65f7e83bc11
RLBA-2024:9169
clevis bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for clevis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clevis-20-200.el9.x86_64.rpm
1736d8d36f62c07eef6d2866ee7aafa016d85d7461d7f1a46b282cf79a6c95f4
clevis-dracut-20-200.el9.x86_64.rpm
0f33f53d48dbb55fc04143658d3870d125e79a3c9ad843282cc4b8209b28fe39
clevis-luks-20-200.el9.x86_64.rpm
4599a20dc3efd85204f2da5d11a4b6b94d348f4a01c33e0cfa59a0180369815f
clevis-systemd-20-200.el9.x86_64.rpm
51dd39ecd922b324f270af6b2a9fb18e785c08aa587f9e68c629fe3932f067e7
clevis-udisks2-20-200.el9.x86_64.rpm
f9fade07fae4f4ae6914eac133b80a2e9f3405b714d24acd57642851e195c53e
RLBA-2024:9171
ansible-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-core-2.14.17-1.el9.x86_64.rpm
941b4674260cdedeab5bd193cb0b778c5d17318d219667ccc70c42693e798253
ansible-test-2.14.17-1.el9.x86_64.rpm
c201eea040f7ff5e28e8e10290d653a9bd7e436267c3e4f22c0c3e9428ec3322
RLBA-2024:9170
rust-bootupd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bootupd-0.2.19-1.el9.x86_64.rpm
621cc59f4e4d35ce054597cb843708e6337aed473c2571e5afb36ce48abb5dec
RLBA-2024:9173
socat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for socat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
socat-1.7.4.1-6.el9.x86_64.rpm
9cbe23691b70c6e3352f7428df4ac743e926cd27b7203737f5e130ca0dc4d62f
RLBA-2024:9174
boom-boot bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for boom-boot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
boom-boot-1.6.1-2.el9.noarch.rpm
1d4d369b8686b76607d292faa0a1cc99aa0cf3404c6d63a294881554d0118410
boom-boot-conf-1.6.1-2.el9.noarch.rpm
15a439be3b6a5620837cfebb64819c64b5afb8675879d19a62dc3940f3833403
python3-boom-1.6.1-2.el9.noarch.rpm
537e99d5d5da0f1e59644592fd27e41010688c1ad54766dd6266d41c376bd803
RLBA-2024:9176
xorg-x11-proto-devel bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xorg-x11-proto-devel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-proto-devel-2024.1-1.el9.noarch.rpm
9590f529800b5324c3bffd648a62db61e8760130ba61c702d301011ea1cde630
RLBA-2024:9175
libvma bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvma.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libvma-9.8.51-1.el9.x86_64.rpm
537a8954346e1d80fd1cf15bee2f13c6e7354615dfe370545ee41798a3bf4d4d
libvma-utils-9.8.51-1.el9.x86_64.rpm
03761320f01916456a7c82f39275e66cfc500079cad573f8b4cf86472b5a10a4
RLBA-2024:9177
stress-ng bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stress-ng.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stress-ng-0.17.08-2.el9.x86_64.rpm
8f6d07e17fb434476142a9286a466724cc51c51d4286290cf7cda18f558249e6
RLBA-2024:9178
net-snmp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-17.el9.x86_64.rpm
e50a9c6ddde6d0f9ee7d36ffec8f4ff3aadf189c540e531962d59244e68a1c3f
net-snmp-agent-libs-5.9.1-17.el9.i686.rpm
ffbcba9ddca0404395d8acfef14b87ae9df1211775c702f254678272338421df
net-snmp-agent-libs-5.9.1-17.el9.x86_64.rpm
a200576a41612f8526353a46f74bdd895fb6557b566b49cbeea38d16ca1c8d53
net-snmp-devel-5.9.1-17.el9.i686.rpm
c2c8e58340f0a15443c21247098cdf85a893b2db76bb54e4c45a714f4c2e1ab4
net-snmp-devel-5.9.1-17.el9.x86_64.rpm
d974c222e33d31fb75c28c92526856f03e26451b96aa575e7d93350f967d4098
net-snmp-libs-5.9.1-17.el9.i686.rpm
0effbb3b31d052aadf311847b288f8496bd453a09006a3281da64cea61e596b3
net-snmp-libs-5.9.1-17.el9.x86_64.rpm
09867173e83d2bb5a7165baf1758bedea61f65d7b642d9d709e9a9299916141b
net-snmp-perl-5.9.1-17.el9.x86_64.rpm
00efb6dfa3c815871c8d7259e6da44125c131a1cc80fa81f7cf9ddb944a450e1
net-snmp-utils-5.9.1-17.el9.x86_64.rpm
b479718085d02ae6bd652034d99d89f0aefbf0ccb169ded3e88de1d58cdc7ac3
python3-net-snmp-5.9.1-17.el9.x86_64.rpm
40fac5f7ef0c9afbfe7f55351595e7f0b045893f7a04a9d8a1e956d04fb63e38
RLSA-2024:9180
Moderate: mod_auth_openidc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_auth_openidc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies (CVE-2024-24814)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_openidc-2.4.10-1.el9.x86_64.rpm
d7a0783d76a8f689283f2e5be00ae668156a663e0048fcd3986f6c8a0def590b
RLBA-2024:9182
libdrm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libdrm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libdrm-2.4.121-1.el9.i686.rpm
3a593b96f0abcc023baff88aad48e486786d55dba70e3c8ea8d48269625a0591
libdrm-2.4.121-1.el9.x86_64.rpm
ec1a97284d190c7efe4fbbc23480fe68d06f8d9c84a2ed30ad1c840e83f4f979
libdrm-devel-2.4.121-1.el9.i686.rpm
e20850dc8a9d6aa992fce1aafbfd1cfa53d8522a73fc468d6c9a2f41deb80d8a
libdrm-devel-2.4.121-1.el9.x86_64.rpm
1aed8cbfad9a0b8e7792a7fdb4bb8e87dda234d7a1fa043637b8a60e51f66296
RLBA-2024:9183
netavark bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for netavark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
netavark-1.12.2-1.el9.x86_64.rpm
7718230c7bd867887bd35f048109ee9091f258a603d75be37a5d6dafd0893dd2
RLSA-2024:9185
Moderate: iperf3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: possible denial of service (CVE-2023-7250,ESNET-SECADV-2023-0002)
* iperf3: vulnerable to marvin attack if the authentication option is used (CVE-2024-26306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
iperf3-3.9-13.el9_5.1.i686.rpm
a87e81f2ffbf3bc1dd8a4f56d4330d16e03c2e31d7de92526907c6ab7135358c
iperf3-3.9-13.el9_5.1.x86_64.rpm
1b622b64bfe74b11ae8e2eea032fe02e3935811aa6eac7569332f00b59c90153
RLSA-2024:9188
Low: bpftrace security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for bpftrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap
Security Fix(es):
* bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bpftrace-0.21.1-1.el9.x86_64.rpm
48699b70edc61e55465bff69eaa62721ca2158bddf0f5967fce1cda7b6401864
RLSA-2024:9193
Moderate: python3.12-PyMySQL security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12-PyMySQL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains a pure-Python MySQL client library. The goal of PyMySQL is to be a drop-in replacement for MySQLdb and work on CPython, PyPy, IronPython and Jython.
Security Fix(es):
* python-pymysql: SQL injection if used with untrusted JSON input (CVE-2024-36039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-PyMySQL-1.1.0-3.el9.noarch.rpm
6cf52f81d42ad260142cc69f2bf7374b5d86de0e862bd8daaf52389b1c2c1a03
python3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpm
b4f7cc3f91c351d8915123889b1606c75f8fdffb1bef9c77bea0d9e05adb208d
RLEA-2024:9191
butane bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for butane.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
butane-0.21.0-1.el9.x86_64.rpm
003c266168b8d95a05e880a16e863dcfc0fb02e4b9ea4e4be5dc0349fae970f7
RLSA-2024:9195
Moderate: cyrus-imapd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for cyrus-imapd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.
Security Fix(es):
* cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cyrus-imapd-3.4.8-1.el9.x86_64.rpm
7bbd025530a822c1f01c9cac198e1e11ca5c96190b8985bf7350468ecfdc6c6a
cyrus-imapd-libs-3.4.8-1.el9.i686.rpm
a7ceff4e3e525445386188cae9c411838c78a7ea71ec126e45e975762c24dc61
cyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm
8b5815420dcd052e1ffb9f73350af12f31efea2b850808ee4934f96c69bbbeda
cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm
e399ae41e7cb48368cae9d9dda208361c39977a16f0271f73485617486d0790b
perl-Cyrus-3.4.8-1.el9.x86_64.rpm
3cc9133cfe5c09bc3503fb06c4824a2ca0da824e932fdd0286449c415addf651
RLSA-2024:9194
Moderate: python3.11-PyMySQL security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11-PyMySQL.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains a pure-Python MySQL client library. The goal of PyMySQL is to be a drop-in replacement for MySQLdb and work on CPython, PyPy, IronPython and Jython.
Security Fix(es):
* python-pymysql: SQL injection if used with untrusted JSON input (CVE-2024-36039)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-PyMySQL-1.0.2-2.el9.noarch.rpm
eed7b6f8876d14eaa32a53fafef8c377bc4e89bc34b7cb35226d454a08fed337
python3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpm
7c76b774ccd9e83c1090ffd907f7c176bf3cb9191b9ac17b14ed580d36bd48c8
RLSA-2024:9200
Moderate: runc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
runc-1.1.13-4.el9.x86_64.rpm
54327ec4197f58638f293d876927cc3a8d7add804f8bff9ff5c04890121dad7a
RLEA-2024:9201
gdb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gdb-14.2-3.el9.x86_64.rpm
efc3a39b1747ba62852827facc06821c5288795c0c64ade4cf75cf9292034495
gdb-doc-14.2-3.el9.noarch.rpm
b3182d00ec1bcc4a3beef5d98e502ba539ce7dc4c793904d45e17d3e6a48aab5
gdb-gdbserver-14.2-3.el9.x86_64.rpm
ff840f6ca80512e9644a1e1468f892382cb23466982b68cd1c268fdda7466832
gdb-headless-14.2-3.el9.x86_64.rpm
72f9104b7f3102ff2f4be7839158f75127d0d907ebb94045baeabaf864a31a57
gdb-minimal-14.2-3.el9.x86_64.rpm
fa7ecd713b0cb7d42ea3715db88635837e438550f90a832d36535dca14b3e19e
RLBA-2024:9206
intel-lpmd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for intel-lpmd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
intel-lpmd-0.0.6-1.el9.x86_64.rpm
eda660955fb0038fc2cb4635a2d0b97a79269366e30014364a695b1b99cb55b6
RLBA-2024:9204
perl-IO-Socket-SSL and perl-Net-SSLeay bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-IO-Socket-SSL, perl-Net-SSLeay.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-IO-Socket-SSL-2.073-2.el9.noarch.rpm
d6aaf5d0d4aa4bd716956767bdbe75996c1c9f99c2e5b41440a8b92e92ba678e
perl-Net-SSLeay-1.94-1.el9.x86_64.rpm
1b4ae97697c44b196a13909cd8c284c4b3013b2032a72c5505945c2fe11118ab
RLBA-2024:9207
certmonger bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for certmonger.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
certmonger-0.79.20-1.el9.x86_64.rpm
0c27fc4994f280c1cc31266d2afcdcdca88c223c46447ca5dd406388efaa1cae
RLBA-2024:9203
xalan-j2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xalan-j2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xalan-j2-2.7.2-11.el9.noarch.rpm
5b432a1c50e11aeb4f8b863e64a5afafbb76b87b68a9fb3bc97f1d2b91c8dc0f
RLBA-2024:9205
libvirt-python bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libvirt-python.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-libvirt-10.5.0-1.el9.x86_64.rpm
e185b00895708101ac4da58896f66f551981cca59a845dc16fe617cf931acb9e
RLBA-2024:9209
dwarves bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dwarves.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dwarves-1.27-2.el9.x86_64.rpm
9977713209a2d351c0aeba8f7919dee55c9131074908ccf6faa0b6fced8be313
libdwarves1-1.27-2.el9.i686.rpm
6af1bfdd285deb6ea273e499668a404e4f90c4e8a48bca35565eb773da8cb9fe
libdwarves1-1.27-2.el9.x86_64.rpm
9a1b68a71247e3bdbb36c72cf1f99feccaa6811301f315b7bd126d974bfc7a0d
RLEA-2024:9212
rust-afterburn bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-afterburn.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
afterburn-5.6.0-1.el9.x86_64.rpm
6b5c4b0fecbae6d79ab8dea29bcb3da1ea9670b7c4001bd1b35a294a1e4d58c5
afterburn-dracut-5.6.0-1.el9.x86_64.rpm
0ca50af1b28f2a2a808ce12bba9ca5e68445afc415cea4497098a597f876f35b
RLBA-2024:9213
gnome-online-accounts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-online-accounts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-online-accounts-3.40.0-7.el9.i686.rpm
d10e8d0110f858e8f5979568a666aa9000a61d2e6f3891e7a4440bbe714364f3
gnome-online-accounts-3.40.0-7.el9.x86_64.rpm
171415c7c37720a2c2f02bc63febf205dec7e745b61be14477f3adeac88e8300
gnome-online-accounts-devel-3.40.0-7.el9.i686.rpm
fc737da48e465d792d17a0b96e3aa344a7d5ac7f49210474bf5addc9b4efbe61
gnome-online-accounts-devel-3.40.0-7.el9.x86_64.rpm
528fe031c40114c0d24e85aff95b61fdb4703962e6f9210fae1b9ffc1ec07a2f
RLBA-2024:9214
python-rpm-macros bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rpm-macros-3.9-54.el9.noarch.rpm
75dc73fe54ee7cecfa99f951f34d38c9eef556dbc101738a66a8af589a57b1c6
python-rpm-macros-3.9-54.el9.noarch.rpm
747a00910d3ef1df58a33393925e13d42f2cf555ec6054c48750ed952d98360c
python-srpm-macros-3.9-54.el9.noarch.rpm
bc317132bec082f5614b531617f69e552133257dc261dd1e4cc2b3bb2f3f457f
RLBA-2024:9215
clang, compiler-rt, libomp, lld, lldb, llvm, and python-lit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for compiler-rt, clang, lldb, lld, python-lit, libomp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
clang-resource-filesystem-18.1.8-3.el9.noarch.rpm
28092ba376edd238cc79830d499f6c40fd97ff41958900ccd42b366bfe2750bf
RLBA-2024:9218
alsa-lib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-lib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-lib-1.2.12-1.el9.i686.rpm
d2e9961069c999fea3e45a171120e6c84684ce4b72e657e887a72faa4c506992
alsa-lib-1.2.12-1.el9.x86_64.rpm
12e71303e6c59d10f1ff9f4490d92ec50b5653a6d86cab0d6642f80c3466ead0
alsa-lib-devel-1.2.12-1.el9.i686.rpm
36a50bd294e6d35b11bcff177d0649df53e9e080fa40ba467a1880e5ee6e3347
alsa-lib-devel-1.2.12-1.el9.x86_64.rpm
4c1934ce998cad36e4539da9a74e399b17f672ce19fac200e6c2a272a5913f84
alsa-ucm-1.2.12-1.el9.noarch.rpm
6b906970bbe4e45d4c0e661e76cb5958bd1e699f4ba3bbf74e7252eec8dbaf08
RLBA-2024:9216
ansible-freeipa bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-freeipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-freeipa-1.13.2-1.el9.noarch.rpm
73a3a573e19d436b782269e2d995a75488de1ff60c1e8b24713aa1d41d19e88a
ansible-freeipa-collection-1.13.2-1.el9.noarch.rpm
1bfcbb0dbc7dac5d53bcbfc22aa4c8991808832149630044c4dab5bcccd0411a
ansible-freeipa-tests-1.13.2-1.el9.noarch.rpm
c31aadb7a0f923114ba68e7aec8651736f4054c56128209bcfffc2642352ba33
RLBA-2024:9219
pki-core bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pki-core.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-pki-acme-11.5.1-1.el9.noarch.rpm
8602ae265875c43ac837b6f249ba227d8eeb1aa8b5e5afbd4599943ba78dbb61
idm-pki-base-11.5.1-1.el9.noarch.rpm
f0807009ec76c37c84caffdb8d8963a100f494c27e699d61f03e54ed057f0209
idm-pki-ca-11.5.1-1.el9.noarch.rpm
2d1e179b96697613e4147e5968a0c86cdf8b8410973000eeac9294784a22df34
idm-pki-est-11.5.1-1.el9.noarch.rpm
036dafcd640cf1ccc8a554281d379d33e053283f05b4519f9726078942a23775
idm-pki-java-11.5.1-1.el9.noarch.rpm
2106627a855e3519945a5109a5edd104689790155356c863f018ac407007c280
idm-pki-kra-11.5.1-1.el9.noarch.rpm
4b5e1cad6cff6b725ef046a808199f7995619829ad9b46831fdf61b048d4d123
idm-pki-server-11.5.1-1.el9.noarch.rpm
fc0358cf26d488bc403c33964a667265cebe02e4370b62bf7182b0d8dc60a704
idm-pki-tools-11.5.1-1.el9.x86_64.rpm
631069217d2d1ad089d7f07090098cb0371aaf0bf5c5e586dd4adfa3e92adc94
python3-idm-pki-11.5.1-1.el9.noarch.rpm
37c3d6831e995c8bf0b1c70e6e76f6ddd3eac0239b6b0cd11effd809cb52463c
RLBA-2024:9224
fuse-overlayfs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fuse-overlayfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fuse-overlayfs-1.14-1.el9.x86_64.rpm
9fbfa6f3992d42b9c509cb9247e9a12a2c1fe1a7906b8635151227a32b9afb47
RLBA-2024:9223
nmap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nmap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nmap-7.92-3.el9.x86_64.rpm
ba310088a3e9644f85136020dd4419e9a0537842e6e4724c99b9d7fad34a1205
nmap-ncat-7.92-3.el9.x86_64.rpm
b2bb390936d0e65379201d21b0a56707665f2b588367343e8238405acf7907db
RLBA-2024:9226
mstflint bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mstflint.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mstflint-4.26.0-2.el9.x86_64.rpm
567a6880f5c753f49e791c28a434f9f5f8885a5729c3a7d546f569878cfca98a
RLBA-2024:9228
python-virt-firmware bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-virt-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-virt-firmware-24.7-1.el9.noarch.rpm
4f36a38a5aedc7a8fa6147bd6660ca71589d5f3e74e8f0ef6885634fd07a0a55
uki-direct-24.7-1.el9.noarch.rpm
afd47dbc675187b73cd5686629c6b876a7060d4ca9f878d24f2d12b3018dfa04
RLBA-2024:9225
crash-gcore-command bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash-gcore-command.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-gcore-command-1.6.4-1.el9.x86_64.rpm
2b9f3ca301287f36f0d1951be60d9c75516f0575d49b3f3b14faaeefb565bfd9
RLBA-2024:9229
cockpit-files bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cockpit-files.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cockpit-files-6-1.el9.noarch.rpm
67fb67b09d32a4cf5088b05949d173a0e8ed2970318b8a5d3b5504f4956ec450
RLBA-2024:9231
power-profiles-daemon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for power-profiles-daemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
power-profiles-daemon-0.21-1.el9.x86_64.rpm
bee83b24a74d72f0b946a9892c909752ce618a09eec7cd55c413d45567ee63ab
RLBA-2024:9237
make-latest bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for make-latest.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
make441-4.4.1-3.el9.x86_64.rpm
f98630462367ca43c34dae19fee7822cc8119a35f3bd873bbf6e1876d707da71
make-latest-4.4.1-3.el9.x86_64.rpm
3333771bffc4f99905da6fa4c9504e25443c456339d998d8d121241735cfde40
RLBA-2024:9234
virtiofsd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtiofsd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virtiofsd-1.11.1-1.el9.x86_64.rpm
38b9908a0400a17179a13ad3fff0a8968e3d3249ea150e1d719919682c114f1a
RLBA-2024:9235
spamassassin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for spamassassin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
spamassassin-3.4.6-6.el9.x86_64.rpm
eabaa3d2106867721e90f75c8c8d723ab440ae996b6a237b7ee03c89f4f43a9f
RLBA-2024:9238
autoconf bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for autoconf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
autoconf-2.69-39.el9.noarch.rpm
f4425dde5a8dedd34194bd0dc3380234b9ceba33ed766516f4a1d4ce079657d6
RLBA-2024:9240
stalld bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stalld.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stalld-1.19.6-1.el9.x86_64.rpm
068c59fc7eb1971b677aa446103ff018ed0bda3b6f5e47d0db53040a482f5470
RLBA-2024:9241
virt-who bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-who.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-who-1.31.28-1.el9.noarch.rpm
c8706cbabaa3f60262e8b950de2f6c231c66b1cc330bdfaf2976dd9a6c3bbe06
RLBA-2024:9245
gcc-toolset-14-dwz bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-14-dwz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-14-dwz-0.14-0.el9.x86_64.rpm
86b651f4afecf2450d361ba097493e7b80bf9bc34f674eb94b0ccb6a4adb4592
RLBA-2024:9244
ipa-healthcheck bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ipa-healthcheck.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-healthcheck-0.16-4.el9.noarch.rpm
a59ced0a4ff4c104d1b2a868ae944eff335c56644603c03b0edcfa3ab3f4b8bb
ipa-healthcheck-core-0.16-4.el9.noarch.rpm
0326b71de4c443301cb11e4068e6144dfe74e74f93f9ffb5a36c72f30a9007ed
RLBA-2024:9246
redhat-rpm-config bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for redhat-rpm-config.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
redhat-rpm-config-208-1.el9.noarch.rpm
2eb40f56065ca479c4e9404c9e27fe3b9a9823f19bf0d1ec791260ca5830c96b
RLSA-2024:9243
Moderate: postfix security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postfix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The postfix packages provide a Mail Transport Agent (MTA), which supports protocols like LDAP, SMTP AUTH (SASL), and TLS.
Security Fix(es):
* postfix: SMTP smuggling vulnerability (CVE-2023-51764)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
postfix-3.5.25-1.el9.x86_64.rpm
6e1ca7de16e602542afceacd86bbcbec73bce81af7dbb11c4054199bf98a7e61
postfix-cdb-3.5.25-1.el9.x86_64.rpm
25379079c54c8b80242aa0af735da951b0a643536fecd57c2959e7eeae0f4120
postfix-ldap-3.5.25-1.el9.x86_64.rpm
88f374b92291a9cf76a615d6380f0509e885158156ce0a954acbf37fb2daf7aa
postfix-lmdb-3.5.25-1.el9.x86_64.rpm
f22c7771e6f7fe2af04f298509bc0ffccea31f00e8d1973c24fae223d91a8233
postfix-mysql-3.5.25-1.el9.x86_64.rpm
6f80259b3044a22211b0900691406012d875f6d9e1814c008ff22ab67756c2dc
postfix-pcre-3.5.25-1.el9.x86_64.rpm
d701590ab360dd969a0f3ccd764265511d0d3232de5c7253b182736435144e2c
postfix-perl-scripts-3.5.25-1.el9.x86_64.rpm
51afd0d4be992ff26297c40928ded66cfc0a2c4cccbe405112cc8ea599c5b2ea
postfix-pgsql-3.5.25-1.el9.x86_64.rpm
93b437636020c8ccac9984e0818b1ddec770c3c46d17af166eb18756635e135e
postfix-sqlite-3.5.25-1.el9.x86_64.rpm
ab3ec680517daebab13c6285161e0785746f12501d9aab765c33aed6ca67020c
RLEA-2024:9250
annobin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
annobin-12.65-1.el9.x86_64.rpm
753e376946474deb51a5c7cdf490b14048cd4400b88d9b4f7b7ab98ce9bedaaf
annobin-annocheck-12.65-1.el9.i686.rpm
391fc07da7f5349eadfe44138878d469e4c48320d92017280fdc7bf392eeea97
annobin-annocheck-12.65-1.el9.x86_64.rpm
a0e657bc615ccc540dc92daba5feace1af6328ab5d422601bcb42bebc02adb52
RLBA-2024:9249
python3.11-setuptools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.11-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-setuptools-65.5.1-3.el9.noarch.rpm
608091390d09f11256750ef7c52a51f2b6160bdf32cd72c3b0c8a73b1d3378ca
python3.11-setuptools-wheel-65.5.1-3.el9.noarch.rpm
4460fbe215d22842d53a78712d2f0fdb5013ebb441ee003b4103cd06a56f6e1f
RLBA-2024:9251
gcc-toolset-13-annobin bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-annobin.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-annobin-annocheck-12.69-1.el9.x86_64.rpm
9b99947e4fac85b00f9d8e9a796cec21feb5d936cbb5da97b81f2ba8aada9b9c
gcc-toolset-13-annobin-docs-12.69-1.el9.noarch.rpm
6b626e255444ca214a452c2dc08d2b80fdd705367c8028d7ab7690ca07d24bc9
gcc-toolset-13-annobin-plugin-gcc-12.69-1.el9.x86_64.rpm
1d81a1293a8976dabe541867d24d347380a8199b3cd3234bc713557059893a8e
RLBA-2024:9255
lorax bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lorax.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lorax-34.9.26-1.el9.x86_64.rpm
f9096f76ec092e238a1fbf76cada592f60e5cd563a3fc8bf93d79d7ee639e8d2
lorax-docs-34.9.26-1.el9.x86_64.rpm
08201c2ec0e199446e1f670fabdedbb31b19869fcd6d261e8145ce41e0aaff2b
lorax-lmc-novirt-34.9.26-1.el9.x86_64.rpm
8df0535d8ec03744c9bd0bfc99f9819a0804fd0a3322713cf074ef38542e10b5
lorax-lmc-virt-34.9.26-1.el9.x86_64.rpm
7eeace72d267cb279f9473c4415f3eaccb06ed843da428831bbfe4ec60706412
lorax-templates-generic-34.9.26-1.el9.x86_64.rpm
1e8ffcc82058803d0f899e996bca96dd5d842a8900fa6aabad427041fa47e358
RLEA-2024:9259
rust-coreos-installer bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust-coreos-installer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
coreos-installer-0.22.1-1.el9.x86_64.rpm
85770f887c09f61acf1ff2039639e203c84226660435f96ba377a9b7ffad9472
coreos-installer-bootinfra-0.22.1-1.el9.x86_64.rpm
a47b07324400d8e26e2a38964a5d0337487bca111050ac64af67870d66d2d3ff
coreos-installer-dracut-0.22.1-1.el9.x86_64.rpm
1c4a0141163c11b8674dc6a942f58dfa9123225360cc10f496e823e206ec5e49
RLBA-2024:9258
orc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for orc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
orc-0.4.31-8.el9.i686.rpm
c92f75f5b6eb2fc3ecb802686bc8b8c83c0af416e742d862bbeb77989f1bb37d
orc-0.4.31-8.el9.x86_64.rpm
e4c568d24d992714f5f6703f03d6460d81b1800c628423932108ae9315813b75
orc-compiler-0.4.31-8.el9.x86_64.rpm
bb70ec13385618a521b66ec3d50d4d2a3c4b760149c004aedb0e46fe69200da0
orc-devel-0.4.31-8.el9.i686.rpm
ac20d270ab0d1a8a23df0a5d55afc3aea9ecf26467a10f481ea77fd9caab8355
orc-devel-0.4.31-8.el9.x86_64.rpm
cf6819cbd8bd6b0d374ba95cbcd152ba9d12e89624eb88678866056a538f5701
RLBA-2024:9257
perl-Crypt-OpenSSL-RSA bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-Crypt-OpenSSL-RSA.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-Crypt-OpenSSL-RSA-0.33-1.el9.x86_64.rpm
dcebd0b0e84ba768004822ecf23ea8686f297c3208004a55383e44dde2863537
RLBA-2024:9260
libreswan bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libreswan-4.15-3.el9.x86_64.rpm
2c46920a48dc0b236f33854375275656ab2949b0eb52700f01a01e11d081fe80
RLBA-2024:9263
gcc-toolset-14-binutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-14-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-14-binutils-2.41-3.el9.x86_64.rpm
f257d40df7edd4ef039367e3bc649d827dac0406b1746de78afe0d6a6bc8c89c
gcc-toolset-14-binutils-devel-2.41-3.el9.i686.rpm
ad73b64cd782bd8cf69486f96420f5d1163ca168100d62fade70a59b539a6c0a
gcc-toolset-14-binutils-devel-2.41-3.el9.x86_64.rpm
20ba427407a5da6995c0b8b988c15f95853462b574cff702237c26035cea379f
gcc-toolset-14-binutils-gold-2.41-3.el9.x86_64.rpm
54b96517c2a66436b52074037111243038e64477ce34b21270d978943282b9de
gcc-toolset-14-binutils-gprofng-2.41-3.el9.x86_64.rpm
d90e6ebb412b558424d120746be6365e60b14ab9329477a0721b31d0398251e8
RLBA-2024:9261
go-rpm-macros bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
go-filesystem-3.6.0-3.el9.x86_64.rpm
20c51fdc0f44014214d9e2a0bb660e7cf0ef47049e4377b26e451f9444d0fe94
go-rpm-macros-3.6.0-3.el9.x86_64.rpm
bb18e03db9690b1c394ad9ba057d024113183a08e8b3735cc626323e97fc4dfb
go-rpm-templates-3.6.0-3.el9.noarch.rpm
e65a440ff0fdd2547ca730b1357953a7cb64937c307371db2166a1eb97a93aca
go-srpm-macros-3.6.0-3.el9.noarch.rpm
4e1b0d8ab6cb3e74aab9202d07adb27cc5a93b8c27599b7407f733c612af4fc2
RLBA-2024:9262
rear bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rear-2.6-25.el9.x86_64.rpm
e4b2183b0d9d878c951fcc07b6b0c5e3295a626bf049139396197e7ecf7e362b
RLBA-2024:9264
gvisor-tap-vsock bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gvisor-tap-vsock-0.7.5-1.el9.x86_64.rpm
abc4c668dc8b5a935cbe7c634cfab5e552aea2a46dde8266665cb50a2491cdfb
RLBA-2024:9268
osinfo-db bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for osinfo-db.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
osinfo-db-20240701-2.el9.noarch.rpm
3335d41f2b595bc9e5775b1836062dbaddda5cbdcfd08e9ec31db987e1f86b5e
RLBA-2024:9269
linuxptp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
linuxptp-4.2-3.el9_5.1.x86_64.rpm
82b5dccbd82868fc3a2f1ca90834c5fd7b6a4c9ea37c4f0f6cbc1317cdeaecb1
RLBA-2024:9273
alsa-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
alsa-utils-1.2.12-1.el9.x86_64.rpm
97bbb7e44341d3c29fbc95bfcf8c76f5225bb9b73f375db1d9ce62545d69f28b
RLBA-2024:9275
dlm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dlm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dlm-lib-4.3.0-1.el9.i686.rpm
116b77230e9afd01bd5c9d4966a814df14bc08c34101b1ddea0c13e5a5999f62
dlm-lib-4.3.0-1.el9.x86_64.rpm
9e6193d329cc279c42459579de1984c010b5d774c4f5219145a4c5c383794324
RLBA-2024:9276
mod_md bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_md.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_md-2.4.26-1.el9.x86_64.rpm
9045fa79e594b1c3562e168ac854a23b6d4a596e2bc2dd7ae5ac60f005dcd0d3
RLSA-2025:20943
Moderate: libssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libssh-devel-0.10.4-15.el9_6.i686.rpm
a96fd41045298736b05f64283a13519ae5e99653ca31944b20ba73159b583791
libssh-devel-0.10.4-15.el9_6.x86_64.rpm
61e448230e57ceb63bbf5682809c8cde43f0598dc8d7fd81081eb854befe4256
RLSA-2024:9277
Moderate: oci-seccomp-bpf-hook security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for oci-seccomp-bpf-hook.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OCI Hook to generate seccomp json files based on EBF syscalls used by container oci-seccomp-bpf-hook provides a library for applications looking to use the Container Pod concept popularized by Kubernetes.
Security Fix(es):
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm
3b8f6f2231e8db059486d3a3574ac80307d3271380e7821109226a3bee51e9ec
RLBA-2024:9278
mod_security_crs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mod_security_crs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_security_crs-3.3.5-1.el9.noarch.rpm
87b545115a9d870a49567de9b26c32e1d7e9ea7b2c1421d6bd5a1a1f9d7fa5b1
RLSA-2024:9281
Moderate: python-jwcrypto security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-jwcrypto.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards.
Security Fix(es):
* JWCrypto: denail of service Via specifically crafted JWE (CVE-2023-6681)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jwcrypto-1.5.6-2.el9.noarch.rpm
684dc4c2011bbfc15af685d037fdd6a694de190aabaf45303e34589dc0728c97
RLBA-2024:9290
vsftpd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for vsftpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
vsftpd-3.0.5-6.el9.x86_64.rpm
f48a83905b7405af866425f8b60b7f9ccc57cd01f57581f7eed45b6384917979
RLBA-2024:9288
blktrace bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for blktrace.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
blktrace-1.2.0-20.el9.x86_64.rpm
b13a651683d24f6859298f751ef564e96ffd7c842c2140ddec281a1c144054e7
iowatcher-1.2.0-20.el9.x86_64.rpm
9e3afda1bb263ffe56f08b75a23e85429c7cc69f6fc914afb3641f02418875b6
RLBA-2024:9293
sysstat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sysstat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
sysstat-12.5.4-9.el9.x86_64.rpm
2161ef34d63de754b206819614ca72850a1d4885f4dc6a0a99e69d0233cc7bb0
RLBA-2024:9292
ecj bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ecj.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ecj-4.20-17.el9.noarch.rpm
30ee19ac399798491a1355e07ff98f44c2e7dfa3dd8957b9a3b47c6ca9917876
RLBA-2024:9295
composefs bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for composefs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
composefs-1.0.5-1.el9.x86_64.rpm
4b76180274303a9efe85a162cf13b7c3f3d46fca52f7549b5d31c6c00912b8da
composefs-libs-1.0.5-1.el9.i686.rpm
a3395e2aab54f42d0cb4a6a7398c0ea0ee91a866ef903652a6421c44e9b856bf
composefs-libs-1.0.5-1.el9.x86_64.rpm
0f27a0911d943492a9ea957bbde6a6f9c94782b652d6daf3c9a096d31aac62c0
RLBA-2024:9298
tomcat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-2.el9.noarch.rpm
fe9333e1c43aba7846f0ce478eb5f555dd684ce81e3f39c7c17e535895fd4d3a
tomcat-admin-webapps-9.0.87-2.el9.noarch.rpm
b175cbcaee57d48b9396b80e39c976f5ccd9be254300779e9786cf3f86e1f8ee
tomcat-docs-webapp-9.0.87-2.el9.noarch.rpm
9e5cc3a8e03b233f33f6ca91fe283280e074501e70b45a16f2fb326a3abb37d9
tomcat-el-3.0-api-9.0.87-2.el9.noarch.rpm
7cb2d6c38304a52641989eb1b6648e27d9213b9279002c40d6de2898c3d1e0ec
tomcat-jsp-2.3-api-9.0.87-2.el9.noarch.rpm
9fba32b19e10d444445e646d824f8566daa84fbae2cd0cf97e02983e22362df4
tomcat-lib-9.0.87-2.el9.noarch.rpm
eadaa69f8091ae5b983e405c50da2b9e9e82e2871b24a5d29153669c84da024b
tomcat-servlet-4.0-api-9.0.87-2.el9.noarch.rpm
0ebcaccb1094e089bedd1bce070cef3f1838cb623d0dc4d74c51d2bd4125ac3f
tomcat-webapps-9.0.87-2.el9.noarch.rpm
aa9967616be9c7ef7e6a6f578b16664d0fec5f529aec06ba72f35c9e9e7c0795
RLBA-2024:9297
guestfs-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for guestfs-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
guestfs-tools-1.51.6-5.el9.x86_64.rpm
2d5690fcbcc3b0e2de9302d36652e9a8663d39c9e9f990550a59fca5fcb3d1eb
virt-win-reg-1.51.6-5.el9.noarch.rpm
3820d261273d377065fad9a40fd250954ea6004b5bd3e7c929a8874474a68bd4
RLBA-2024:9303
rtkit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rtkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rtkit-0.11-29.el9.x86_64.rpm
1f0f36027082bfd168e15cca53ca7e72e13c154c722c81b9562b52109748bf29
RLBA-2024:9304
rasdaemon bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rasdaemon-0.6.7-15.el9.x86_64.rpm
f8cfcacc12b00a84e66ccce45406e71110a80d6abae0ad20e140093f79f22a8b
RLSA-2024:9306
Moderate: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP response splitting (CVE-2023-38709)
* httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
httpd-2.4.62-1.el9.x86_64.rpm
e41b3aa9f1a465710e67929e7cfbbd51dea641b8e1c0fd2fe5b8558c8cad0569
httpd-core-2.4.62-1.el9.x86_64.rpm
153367ba0db800b2ee61ad674b3d170f0d2bba426e9e3d3e091a2018d54a87de
httpd-devel-2.4.62-1.el9.x86_64.rpm
025ed9fb5f3f7a1c30360e1be47f924bcfe0bd05f51af9bdbe90c58150d5828d
httpd-filesystem-2.4.62-1.el9.noarch.rpm
6588c09fd00a8657551b9e944fefe00e69611eb42cf8455e6367cf1331c2b43e
httpd-manual-2.4.62-1.el9.noarch.rpm
5e18b1e6b69cb9c61943ffdf71e9ee546d0e0dbb04618b8198d112467f1a919c
httpd-tools-2.4.62-1.el9.x86_64.rpm
9805a08f14ddd02831c89707ec82c82de6ba52eb7feee5568628404ce92d46c4
mod_ldap-2.4.62-1.el9.x86_64.rpm
46a12528649e72619b3fcc551fd1ee986cc5a34f63485483d257921f1ffcf244
mod_lua-2.4.62-1.el9.x86_64.rpm
53186365853438f2059a58e74a3bfc2adc445afef608294ee187ea12ac62ae92
mod_proxy_html-2.4.62-1.el9.x86_64.rpm
beb57999a626002a2aabaa5d944fd8bb2d9efcb9cc1ae1184f39da64d183740d
mod_session-2.4.62-1.el9.x86_64.rpm
001473eb8226a1c52e23ea92967e84903f4ff5206c394e3f41b8252b86cc00f8
mod_ssl-2.4.62-1.el9.x86_64.rpm
3813ce9aa737852df5ce04559173767bddd6f67da94b0395db7d3a40feec42f9
RLBA-2024:9307
appstream-data bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for appstream-data.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
appstream-data-9-20240827.el9.noarch.rpm
6f8a9bc00967e08671112efbfbadd909c05c54db210e1bbcc8af10bc46d1f53d
RLBA-2024:9455
fence-agents bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Bug Fix(es):
* fence_scsi agents results in failures with less number of registration keys over multipath devices [rhel-9.5.z] (JIRA:Rocky Linux-59882)
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm
13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb
fence-agents-compute-4.10.0-76.el9_5.1.x86_64.rpm
1cebfa38f6802d639582bc993e76663aa6d2d3d96b4a0bdf573932156df6a392
fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm
c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb
fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm
979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704
fence-agents-kubevirt-4.10.0-76.el9_5.1.x86_64.rpm
8e7a84e36d56b29c115ef6ff1ce914bc9feba4c2fea9f60a73869c82fade5b1b
fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm
90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073
fence-virt-4.10.0-76.el9_5.1.x86_64.rpm
408112bfa50d8d99a3a1081008428254532c7964c4bac5aa220f0f8455c4ff43
fence-virtd-4.10.0-76.el9_5.1.x86_64.rpm
b42a2c3b074f0f14241c9e798f32469351f236f93049f3d984bae92db82923ba
fence-virtd-cpg-4.10.0-76.el9_5.1.x86_64.rpm
24d4dfb0ea048c3ddc63b9fad0265ef8dc5d69740dbc47dffd73ed9ae8d092b6
fence-virtd-libvirt-4.10.0-76.el9_5.1.x86_64.rpm
3d16376833af531b2e8c6ca168370b539486e5199c3ec3ccb848d612288ec4f9
fence-virtd-multicast-4.10.0-76.el9_5.1.x86_64.rpm
3a42cbf09e1a2e1cf984a0df6412c8a5a0d2fcabd8697b8dafcc2605b82672dd
fence-virtd-serial-4.10.0-76.el9_5.1.x86_64.rpm
1b6d159a4422a8015a506059e74865c51ff848e0936a8af5bd6c6fc22e2242f4
fence-virtd-tcp-4.10.0-76.el9_5.1.x86_64.rpm
fe5accd323eadead37a910fb95b5b0572500cb76231d54cd5459fd27dcc35c03
RLSA-2024:9452
Moderate: pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems.
Security Fix(es):
* pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770)
* pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pcp-6.2.2-7.el9_5.x86_64.rpm
c518cda520d769515b154bc7ba0da017c8fc45aa9e31ed354dd70c24cbc05ea6
pcp-conf-6.2.2-7.el9_5.x86_64.rpm
9ff8328f8dd8c482be84deccc0f69c3633de744bc1d2f53ca7c192ab8a74276e
pcp-devel-6.2.2-7.el9_5.i686.rpm
2950ec76bdd0922be66d1ebc95da6cd9c55b7d991692d9e787716adc09858c56
pcp-devel-6.2.2-7.el9_5.x86_64.rpm
3216e1e4fe77f38e60e6950fc06229e7899415100b3162c91e97acb8d18ec40f
pcp-doc-6.2.2-7.el9_5.noarch.rpm
c8763d215d2777ac860f3c2694bb346687fb0378e84111be2c61cc4b0198e6f3
pcp-export-pcp2elasticsearch-6.2.2-7.el9_5.x86_64.rpm
a5f92aafcc4232366049f136f18dd52ec09d6d007229d6424a08d56ca3dc165c
pcp-export-pcp2graphite-6.2.2-7.el9_5.x86_64.rpm
bbf0840d7fdcfff2190f48e1017d6fabeccaa259827a4c8dfe00e7ce3ccb3b10
pcp-export-pcp2influxdb-6.2.2-7.el9_5.x86_64.rpm
52ff587401399cd95c194d49a0380c1c9cfb22c06da20830d294216134734333
pcp-export-pcp2json-6.2.2-7.el9_5.x86_64.rpm
c6d03d5d20fe4e769fee6a314c55a2b587510784306d457fb0d2f2ea93e9df05
pcp-export-pcp2openmetrics-6.2.2-7.el9_5.x86_64.rpm
00e58ced8729c243a770a30fdfbd4952eba785b6577363523c69c91f3c97df17
pcp-export-pcp2spark-6.2.2-7.el9_5.x86_64.rpm
61879f4d89c2f1d47eb8a26e895732985602ad80b6c9828724ce9e8989707ccc
pcp-export-pcp2xml-6.2.2-7.el9_5.x86_64.rpm
4206efe6202f92b8f21800a182eccf796b6ac0fbe4d49416958835ae70f85457
pcp-export-pcp2zabbix-6.2.2-7.el9_5.x86_64.rpm
fbe6bb40a1fe518b35edd073b1404802694ddfd80f1753d89c5498b81b954153
pcp-export-zabbix-agent-6.2.2-7.el9_5.x86_64.rpm
a366308a2e94e39bd7d4a9876540301b46a14cc852b0528e43b90af9d86fbe1c
pcp-geolocate-6.2.2-7.el9_5.x86_64.rpm
88dc85f14f88dc2eb098d89daa5ad863234d9063274aa248f62baeddd48fb295
pcp-gui-6.2.2-7.el9_5.x86_64.rpm
6ab187fb6503ec6c0ff9cf66e2739925ba7ac24718c2c549604639bce667361b
pcp-import-collectl2pcp-6.2.2-7.el9_5.x86_64.rpm
57fac75c87bb0a268c4676f5ab3ab6108640a83a1bcbb1d152a0848d1a40b9fe
pcp-import-ganglia2pcp-6.2.2-7.el9_5.x86_64.rpm
f72a8f0012dbb048dc4f073c80e979277b578c183102935ff52518f89ac6fcb6
pcp-import-iostat2pcp-6.2.2-7.el9_5.x86_64.rpm
b4411306d7d8d81264db000889ceb838838dd651144b6b5806bf851d4cc65fed
pcp-import-mrtg2pcp-6.2.2-7.el9_5.x86_64.rpm
7b429ca42650ba9f08eb7aa2e08bb6374a359124ecd30594c16dfa36adb15d36
pcp-import-sar2pcp-6.2.2-7.el9_5.x86_64.rpm
77b4766ea5d94927799569af3e415bc0d792eb1efbe1d0a8afb7c13ce604d295
pcp-libs-6.2.2-7.el9_5.i686.rpm
9ea127b5a1b8a9c4cf4ae2781d3d420923f6fcaf3dbb544cddd1dcf5417df09d
pcp-libs-6.2.2-7.el9_5.x86_64.rpm
f5d608a45fe19057bb7bcf36150d31a2af945df0c1ade5ca1e852c15a9c373d0
pcp-libs-devel-6.2.2-7.el9_5.i686.rpm
952af36728e41b5c8809f9c8c70fce3718139477e1b8a2de84d8504071e16dab
pcp-libs-devel-6.2.2-7.el9_5.x86_64.rpm
8294b10dbae8886bff628dc3a707ed732fa0d3573551cbcbd6a8b6947b433b1a
pcp-pmda-activemq-6.2.2-7.el9_5.x86_64.rpm
0ea621256d10027880fe6603f4fda131169d2a4ba07e1a6a7a5d3075c68ca6e2
pcp-pmda-apache-6.2.2-7.el9_5.x86_64.rpm
84f6add58a6d3ea32e791e6b1ab30c410a0ea7ec6cca690be55ffbcce3fa5561
pcp-pmda-bash-6.2.2-7.el9_5.x86_64.rpm
1921c2f22cfce662e9a36a28ad991ca8baa06842e50386a37dd2029a4f38f7c9
pcp-pmda-bcc-6.2.2-7.el9_5.x86_64.rpm
9a9787944e48d2f5cc7965089b63b7211536352403c32edd7e6bd1cdc6a55938
pcp-pmda-bind2-6.2.2-7.el9_5.x86_64.rpm
9b296e30f5d69b57a40b30de2e154c58550c29f312922d726008fa5b2406ad37
pcp-pmda-bonding-6.2.2-7.el9_5.x86_64.rpm
c81ce938a05e713c1d2ea08b3d7affb0eb23ebaa72f612a1e8e0f5d3cfda18a8
pcp-pmda-bpf-6.2.2-7.el9_5.x86_64.rpm
9c00fdfd050995039045d6cf3dd6a3b5231e645ea20ee712d42f1e054cab88c9
pcp-pmda-bpftrace-6.2.2-7.el9_5.x86_64.rpm
fcc36e30b3402550d4b19c59a6727272919fca27a3efc70b6e129454aa1b81c5
pcp-pmda-cifs-6.2.2-7.el9_5.x86_64.rpm
4b3150eac97a24843e00f25b71f3f7d89e26a6cab7999306f6c24d646f20e90f
pcp-pmda-cisco-6.2.2-7.el9_5.x86_64.rpm
b94a46d63e46450e12b6cbb8fcdd356fbf379e6ed6d61aca811cd3993725e04a
pcp-pmda-dbping-6.2.2-7.el9_5.x86_64.rpm
34dbf5da6024ce245081408bf994531f329c79e7ff783b8a6f77571ba0467850
pcp-pmda-denki-6.2.2-7.el9_5.x86_64.rpm
56d305f4aa861c63ddf0d7a420c76c776d161b42a4550169d650ec359c2b5ec4
pcp-pmda-dm-6.2.2-7.el9_5.x86_64.rpm
e70a130d182b42cd2e6858499f0681814ab261c39eee2b98f94f5a4e46b35edd
pcp-pmda-docker-6.2.2-7.el9_5.x86_64.rpm
41f96f7f9c6b0a01dff002dd738e91173b68f7234f584cc35e80409a3a0dcf5e
pcp-pmda-ds389-6.2.2-7.el9_5.x86_64.rpm
30ce8751ad4b0608502610fe347365af067cf4c95879bf2b06f3dd63f977464e
pcp-pmda-ds389log-6.2.2-7.el9_5.x86_64.rpm
ce4db354ff15b60989917f1b54ba96fd52c7fbfab1c605535362bbc82ca0cd2b
pcp-pmda-elasticsearch-6.2.2-7.el9_5.x86_64.rpm
461c0cd64cde189a4999fae2a318d08d715ce42458f476fa5c698662f4d63f2a
pcp-pmda-farm-6.2.2-7.el9_5.x86_64.rpm
b0be29b76fc7d794ce15ade8bb112bd58cf1ecd5d5993e1ac27d5126c443d41e
pcp-pmda-gfs2-6.2.2-7.el9_5.x86_64.rpm
b5ffa0f25839b288ed11c85c7faef3063104da2dc517f8aa30b0551b567380fa
pcp-pmda-gluster-6.2.2-7.el9_5.x86_64.rpm
4afb931bc9656c20cce7860bd713aee9fc0179574e32e647cde1f5e5306078f0
pcp-pmda-gpfs-6.2.2-7.el9_5.x86_64.rpm
e335130a3b3ca65f0992c35e86ea9d330827103783d95521b029256b25ae7f0d
pcp-pmda-gpsd-6.2.2-7.el9_5.x86_64.rpm
e5a6409f5c1b45b86094bbf5e6ce738d024b443255300cdf00c4cbc905c6f70d
pcp-pmda-hacluster-6.2.2-7.el9_5.x86_64.rpm
99762005f2ba50deb066b4a9ef1e255f7479170477cefea4b234f5af6e0514a1
pcp-pmda-haproxy-6.2.2-7.el9_5.x86_64.rpm
104b0262e28796c55778eab02ce2690ebc282ee3e31565a067c9bdda36153184
pcp-pmda-infiniband-6.2.2-7.el9_5.x86_64.rpm
14faa4924cabc3027565982cc7ee32a34f87064f6a3faa0b82dc800a5a79848f
pcp-pmda-json-6.2.2-7.el9_5.x86_64.rpm
68100b1d6fe5f445f79a2d661dac30668405087ad69d2e5e178dc81191781d89
pcp-pmda-libvirt-6.2.2-7.el9_5.x86_64.rpm
1c435292ee52e544f6d8594da3a093000c22eb29faccb5685533e5a2f2eeaaca
pcp-pmda-lio-6.2.2-7.el9_5.x86_64.rpm
eb0b74064c69b6eec7ce305a5f2f70cb97df2e99634f9bb7b0be7c4e9434e948
pcp-pmda-lmsensors-6.2.2-7.el9_5.x86_64.rpm
6f8168e8d62139b2ea7aa26bc120f56ae6ecd4484e0764d622bbe79dc8db799c
pcp-pmda-logger-6.2.2-7.el9_5.x86_64.rpm
24d705e5f7ec79db333cd9f6daa9648f0a624282e1c038faccd650419fdb4287
pcp-pmda-lustre-6.2.2-7.el9_5.x86_64.rpm
2ab54989657ebf60d7786de60eb2fc7e52c3cec159ae12c6dc37907cc13f1c76
pcp-pmda-lustrecomm-6.2.2-7.el9_5.x86_64.rpm
4eb2e1a5c0affe46a7fec5b0ebedb589e29a8b7c5939531530ba8610b59ed3e4
pcp-pmda-mailq-6.2.2-7.el9_5.x86_64.rpm
390b7e7d380c776aacd03a1263d40bcd1ceba6e059dceffda900a0defb54e14a
pcp-pmda-memcache-6.2.2-7.el9_5.x86_64.rpm
97e8ca2dfbb1af246d2014e3c9f23e9691ac2c7568b0c3b74deb2d1db34c52b4
pcp-pmda-mic-6.2.2-7.el9_5.x86_64.rpm
8a444b656b36e04976337715cd095a0b181ea4cfe8404879ed56aa9832930bbf
pcp-pmda-mongodb-6.2.2-7.el9_5.x86_64.rpm
aec38b4122d9826dd5bd57bff88e62d0e6cc83088776192966234314a59ccc87
pcp-pmda-mounts-6.2.2-7.el9_5.x86_64.rpm
529daa1201ef0751ad8e148a2e9183d3f5243e659cd71f1633000d67b8f924be
pcp-pmda-mssql-6.2.2-7.el9_5.x86_64.rpm
9ca30c3cc9d554b0f83498d07f536dfe130f02e98a3ee32f9ee78150098447ad
pcp-pmda-mysql-6.2.2-7.el9_5.x86_64.rpm
b227da142819eee934c170b7a75e5aa93d202c72229261413803d18c68929a91
pcp-pmda-named-6.2.2-7.el9_5.x86_64.rpm
5c6aabfbef9c9e008c32501d322e72a5df5dbcebedb1c324370c9f9d232524ea
pcp-pmda-netcheck-6.2.2-7.el9_5.x86_64.rpm
3316513ca98f554bb7d40cceb07a7a4436a2bf88724b3c36ddb55d081e786015
pcp-pmda-netfilter-6.2.2-7.el9_5.x86_64.rpm
7970d28a5ff622977f7a090ee8d1ff92d963e602d8998211617735efda8bef69
pcp-pmda-news-6.2.2-7.el9_5.x86_64.rpm
ef1add1352d3d374601a97e869bc50d922d39b30da5978342c666fbf629e9c08
pcp-pmda-nfsclient-6.2.2-7.el9_5.x86_64.rpm
ef5d576427665a25794d8ff03ef1b16947257167625983131bcf31fc1f2b1fc2
pcp-pmda-nginx-6.2.2-7.el9_5.x86_64.rpm
8c20ef97403740c2985263a8f4865a1ea1c9f42aadc1cf15289c62ad6d89d4bb
pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.x86_64.rpm
71093c657cfe20b7be22ec19a4d1dc66664ea7297eaf46adbfc51332a4fc22c3
pcp-pmda-openmetrics-6.2.2-7.el9_5.x86_64.rpm
1d38e46df4390e79e456235acb7fb6b3ad7c91e83b43f54a1c7475143a2c28ee
pcp-pmda-openvswitch-6.2.2-7.el9_5.x86_64.rpm
1bd507ef8a1b40ac7b56d98f727edf2062e80efb5668226f22d55539161bcafb
pcp-pmda-oracle-6.2.2-7.el9_5.x86_64.rpm
0ba66ec881cb58f350dbeb8afad56255d5dc7786569a26abfe0d78d0028898b6
pcp-pmda-pdns-6.2.2-7.el9_5.x86_64.rpm
12d3be683f68ebe8a58c68310dd18ed2131d83c7ce936396e569079fcfb2d2e6
pcp-pmda-perfevent-6.2.2-7.el9_5.x86_64.rpm
168666ae1f996830d23fbbf8d19a6a19fde74ba92f7973e14118d405ca374039
pcp-pmda-podman-6.2.2-7.el9_5.x86_64.rpm
7657f9178ffac703b409f959696fa5590e040218385df09cd2ed9ccaf292b577
pcp-pmda-postfix-6.2.2-7.el9_5.x86_64.rpm
2d726616b2c6da7b4ac9662ed5ce1bc89fdb6ac31148969a7139d72369a95a2f
pcp-pmda-postgresql-6.2.2-7.el9_5.x86_64.rpm
6cac42842a63b74f0dbaf15ad1b399957bbcebc3e13027f755d729bc0e75f946
pcp-pmda-rabbitmq-6.2.2-7.el9_5.x86_64.rpm
70157f64d7f392b7dc75a2e45956c3aa66e833d3cdfa9a6d44f339917f9b22d3
pcp-pmda-redis-6.2.2-7.el9_5.x86_64.rpm
24d655260fce7d480262b46ee888ec818168d52c5911a9f9d97bd6d034c29171
pcp-pmda-resctrl-6.2.2-7.el9_5.x86_64.rpm
06a6e8b91df96fcb680ab70723316c9ebafd83db9e47e0faf7c79b3d963645d9
pcp-pmda-roomtemp-6.2.2-7.el9_5.x86_64.rpm
a0fceda99ea0cc922e4fa8e94830ef61ba9ba6f01058d39b4348a47d5d3d8443
pcp-pmda-rsyslog-6.2.2-7.el9_5.x86_64.rpm
d9552db4730b6865d86e063ae3b351f3c95458ec8db947916e43c7c79919d17c
pcp-pmda-samba-6.2.2-7.el9_5.x86_64.rpm
df98e6ddbacfca98a0a59f64e446927d6e61f48dd97afb00121584ab7bcf1fd7
pcp-pmda-sendmail-6.2.2-7.el9_5.x86_64.rpm
742f7cce64fc00848b1684ab58655382c66e97ce8b294f32a4e1953f583f6ac9
pcp-pmda-shping-6.2.2-7.el9_5.x86_64.rpm
64f3923c50aa815393402d1217bc3afd0f475f8fd518708cff7b3449b4979377
pcp-pmda-slurm-6.2.2-7.el9_5.x86_64.rpm
70113192a6fb7cd3aeb9aa8bc148ec406fa68021a248bebf5ab7fd57a89f86da
pcp-pmda-smart-6.2.2-7.el9_5.x86_64.rpm
8b782d2c553a8801064b4540ea4cb81780444d93fc42e32679e0bd89c351a834
pcp-pmda-snmp-6.2.2-7.el9_5.x86_64.rpm
3f00b0d9cd873a8529eed62f9635fc67537a92feee49b93fef461ba829f39683
pcp-pmda-sockets-6.2.2-7.el9_5.x86_64.rpm
153881b73762c397312f325d3e96c0356d29bf610f5d10abcae496b0a4c2e619
pcp-pmda-statsd-6.2.2-7.el9_5.x86_64.rpm
fa0b154fe9b39fe65958be40767be110dcbc908587606c029ca4deff99b25365
pcp-pmda-summary-6.2.2-7.el9_5.x86_64.rpm
b16e30aea3f571eb473d8deac2402fb6f16b36f112817fcfa1e27f6256a3a265
pcp-pmda-systemd-6.2.2-7.el9_5.x86_64.rpm
bc1a4ff07f61eebc8d44efc08e879e491190eb5faee030350efb2e1f1ab22789
pcp-pmda-trace-6.2.2-7.el9_5.x86_64.rpm
6093c19383da516007227de22c89371f8d892fc391450e4561e316e116b0828b
pcp-pmda-unbound-6.2.2-7.el9_5.x86_64.rpm
32dc8e8aa465f985dbbd72c46d30e2724c4d45bec98ab1a844372ac1484f567e
pcp-pmda-uwsgi-6.2.2-7.el9_5.x86_64.rpm
bba95782a6813d700e25816d46049f6f6572e44e7865063004c87e449474e295
pcp-pmda-weblog-6.2.2-7.el9_5.x86_64.rpm
6e9b30e9a643aef6c7f3e6c342e9086270f95ca4bbaf4a9b5cf64df178b148e1
pcp-pmda-zimbra-6.2.2-7.el9_5.x86_64.rpm
f462ec9c2e70ffe33b91f2f19253255f3c4c6bbc9f135fabd3d423b170b2c826
pcp-pmda-zswap-6.2.2-7.el9_5.x86_64.rpm
ca343bb812df656b37b88c313a65f5c16b0d6f8fb32e164bae0da47625d379c8
pcp-selinux-6.2.2-7.el9_5.x86_64.rpm
1e163d8cf83ac63708b768b6d5b34eaf0efa679af7fc451882f1bc9cb5d10647
pcp-system-tools-6.2.2-7.el9_5.x86_64.rpm
32af3feb8710befdc23c34a5c143eb2638c1986d1810affbe2592cd4322ec9f6
pcp-testsuite-6.2.2-7.el9_5.i686.rpm
e8265c6e4d4ed4519cf20e852271b8152a7c07b97ac3ae680389b575eb0a70f1
pcp-testsuite-6.2.2-7.el9_5.x86_64.rpm
b03f1d6d7cb0572c31431784b0e087efa61c6d3634b6bd883477af3fc214fc8c
pcp-zeroconf-6.2.2-7.el9_5.x86_64.rpm
74ea1c8cf2b1781b86b6d45e0137df006645f0edea525575d92dbf3c9b59e9f6
perl-PCP-LogImport-6.2.2-7.el9_5.x86_64.rpm
df2f578c3c8c08d3fe84a9babeb9ae245efaa3a96d62c2ed5b57cfc8c8e3e9d7
perl-PCP-LogSummary-6.2.2-7.el9_5.x86_64.rpm
d01c1c07d642d6efdf3b7d71040e4d62de8b1d7d4c02f1faedcb59fcf7f6bdc5
perl-PCP-MMV-6.2.2-7.el9_5.x86_64.rpm
5b4ba540f9b07a337944dd3aac3fe170ea04fdf463e267f1a5f846a7641eeab5
perl-PCP-PMDA-6.2.2-7.el9_5.x86_64.rpm
d939bb9a5c45cbbd17ee4e6882e4cf65c9758beb8c939f7b403f1e6c09b10b03
python3-pcp-6.2.2-7.el9_5.x86_64.rpm
35f295fc14a77bcfff785ca60797950d73514819f19dac6a30abad9b508575c5
RLSA-2024:9456
Important: osbuild-composer security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for osbuild-composer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
osbuild-composer-118-2.el9_5.rocky.0.6.x86_64.rpm
733843260d4af7a56acea0aecdd04335e2378270533d9a927f0c8efa9b837e44
osbuild-composer-core-118-2.el9_5.rocky.0.6.x86_64.rpm
f3c5786603ea677d55bd9feaf46061fa57aaa6242cbb815ab5dce56bd7f1a67d
osbuild-composer-worker-118-2.el9_5.rocky.0.6.x86_64.rpm
3e06ddffc4394a03c993b531cc88745fea9d92581074c29bf3f4126e3765d6a0
RLSA-2024:9457
Moderate: python3.12-urllib3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12-urllib3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
urllib3 is a powerful, user-friendly HTTP client for Python. urllib3 brings many critical features that are missing from the Python standard libraries:
• Thread safety.
• Connection pooling.
• Client-side SSL/TLS verification.
• File uploads with multipart encoding.
• Helpers for retrying requests and dealing with HTTP redirects.
• Support for gzip, deflate, brotli, and zstd encoding.
• Proxy support for HTTP and SOCKS.
• 100% test coverage.
Security Fix(es):
* urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm
07f7d96157dce5accd2e7622d9b8a1c4b13aa55706617e5d625462f5a3f631a6
RLSA-2024:9472
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-9.el9_5.x86_64.rpm
d218c299d14cdc353b8160f3bca75b9e8341edbe962d431fc9caeb0d8412e9e4
RLSA-2024:9473
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
* dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-7.el9_5.x86_64.rpm
72dcc00c7006eebcd0f06d1014414102c848d307774a52f0f513d379a8d0db6d
grafana-selinux-10.2.6-7.el9_5.x86_64.rpm
5d76498f096b5578713f6aff79525331b35f3e4a835b5d176a193c9dc63bb08c
RLSA-2024:9555
Important: NetworkManager-libreswan security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for NetworkManager-libreswan.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop
Security Fix(es):
* NetworkManager-libreswan: Local privilege escalation via leftupdown (CVE-2024-9050)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
NetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm
74604f0c5cb6b6a7c66fd5bc157c9cb68d582b6f20f871a6992a6dd5a29be12d
NetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm
0e45b62b929a85e06392b3783acfb67af60b204a1424b5c0d41afad05fee31ec
RLSA-2024:9559
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: infinite loop while reading websocket data (CVE-2024-52532)
* libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-8.el9_5.2.i686.rpm
89e25765a4e858530aacae9ebbc1b82c7e1112f9101738a8dd3d18eab9b570d5
libsoup-2.72.0-8.el9_5.2.x86_64.rpm
16174a05d4e064ede29d450dc992d4166bc70fb081abf270b128ea1095f3fc36
libsoup-devel-2.72.0-8.el9_5.2.i686.rpm
e0ff272a25cffdf7ecae1cdac57bc17c7afdafeed380821876b26a3b6fae7336
libsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm
fc75fa4320dc4bc69ec1801ba81ff2335a0271fbcf473aeb7edcb2e2710f5b30
RLSA-2024:9625
Important: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: Denial of Service processing ESI response content (CVE-2024-45802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-14.el9_5.3.x86_64.rpm
336441636ff36a801486627f8f871a61ed2dfbb2ab5d6ffd0ba04f4da471283c
RLSA-2024:10090
Important: tigervnc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.14.1-1.el9_5.1.x86_64.rpm
1bbaf3519214e912ff87e50723e36afb3b14cc8a57acd867e92a0efac0911ae2
tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm
846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097
tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm
c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb
tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm
9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d
tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm
1e9f54db73c3f55c02a22025ef0af74b4eed8be253c84a02151d9ca1b863099b
tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm
2f7ddb7d43e0afa3c33111e9d2ff410c7d11afa03c7320e1ad587a07264299a6
tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm
afa7cca671a7c6141d6d2ab9a659209a6113e2c86136eb4f2b08a438355a1c1b
RLSA-2024:10218
Moderate: perl-App-cpanminus security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for perl-App-cpanminus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Why? It's dependency free, requires zero configuration, and stands alone but it's maintainable and extensible with plug-ins and friendly to shell scripting. When running, it requires only 10 MB of RAM.
Security Fix(es):
* perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability (CVE-2024-45321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm
e82b68086e728c08ccb0029c5f85d75e9af6c48a62be384d923078077b4f89f0
RLSA-2024:10590
Important: python-tornado security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-tornado.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tornado is a Python web framework and asynchronous networking library that provides an open source version of scalable, non-blocking web server and tools.
Security Fix(es):
* python-tornado: Tornado has HTTP cookie parsing DoS vulnerability (CVE-2024-52804)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tornado-6.4.2-1.el9_5.x86_64.rpm
e5f190ce47d798727b4e02ce80d6c950a8f80ae682487eb9021c3ea57fde267c
RLSA-2024:11122
Important: gstreamer1-plugins-good security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer (CVE-2024-47540)
* gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c (CVE-2024-47537)
* gstreamer1-plugins-good: OOB-write in convert_to_s334_1a (CVE-2024-47539)
* gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush (CVE-2024-47613)
* gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (CVE-2024-47606)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm
d72d61ea8f817942c429889a37011481aa699f0d9cefd37198dd5c2f37ffa53a
gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm
457cfb4a37c45680777637430358e1536a8ca8219a0fe20938464c7ef01f2769
gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm
32054f59884418940e925c55c58ef6ba2005dd4a995acff4e95952185894b612
gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpm
a6eb580ced10181be47bbc0f9c94c1d4211a9440e3fc166fb952798ff445d531
RLSA-2024:11123
Important: gstreamer1-plugins-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.
Security Fix(es):
* gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet (CVE-2024-47538)
* gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer (CVE-2024-47615)
* gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header (CVE-2024-47607)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm
22180a2be432c555de9be3bc81936291a1b340c20c70aa8b0a2b9f1ea5f6ba3a
gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm
a85e8834265aa097cb43ef064cf529243c6c5fc9d3ad99c2df637a51845bf458
gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm
f536b896e2fb20cf04bc43dad85fa9b3cf749e0f8c62a5783fa597a8dc4cb002
gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm
d9da27b6c78c9733a5cc404bd77c6c5b470819cb0bce0764abafe3db60f33af8
gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm
485286de13d35d2fa5cebfcdd2f2d10b4612e94ca03c23be28c6e60554ea702e
RLBA-2024:11214
aardvark-dns bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`.
Bug Fix(es) and Enhancement(s):
* aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service [rhel-9.5] (JIRA:Rocky Linux-57072)
* Issue with podman and netavark / aardvark-dns (JIRA:Rocky Linux-58233)
rocky-linux-9-x86-64-appstream-rpms
aardvark-dns-1.12.2-1.el9_5.x86_64.rpm
10950cd232bb2395c8de2d33b2c57cbcd1d26997606a7eb8e3cda037041d619a
RLBA-2024:11215
libtpms bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtpms.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines.
Bug Fix(es) and Enhancement(s):
* swtpm: Win10 guest reports TPM error on Rocky Linux 9 hosts [rhel-9.5.z] (JIRA:Rocky Linux-58056)
rocky-linux-9-x86-64-appstream-rpms
libtpms-0.9.1-4.20211126git1ff6fe1f43.el9.i686.rpm
da05b93ec04ba3cfa6fc693f91021d54857534882ad5d84adce568603efcb92c
libtpms-0.9.1-4.20211126git1ff6fe1f43.el9.x86_64.rpm
5ee56b4dbdf9c3b667cca15eef11661ac1a598b2dc8553faad5fa3ae5bfd321a
RLSA-2024:11216
Moderate: containernetworking-plugins security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
containernetworking-plugins-1.5.1-3.el9_5.x86_64.rpm
667a92330e2cfde69a5c5a7fd0f8a9be23feef90c68a4cec9cb003a25c5fc0e9
RLBA-2024:11221
ksh bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ksh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KornShell (ksh) is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell (sh) and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard (IEEE Std 1003.2-1992).
Bug Fix(es):
* Regression in behavior of exit with no args in trap handler. [rhel-9.5.z] (JIRA:Rocky Linux-62228)
rocky-linux-9-x86-64-appstream-rpms
ksh-1.0.6-4.el9_5.x86_64.rpm
049a3456a6b904835c4987d6d6584d49d8c9713b1e303ec54aeb1578e11c3b5b
RLSA-2024:11217
Important: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.16.1-2.el9_5.x86_64.rpm
c06ad66a9530fe815168b6b8a1edf21327e3c6d544aeef9aa55cbf8f34aca77b
skopeo-tests-1.16.1-2.el9_5.x86_64.rpm
7479441716771bb66d4939fcadabbdb2863d8924aa9ba50ea93cf2f7fa645b42
RLBA-2024:11227
cloud-init bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cloud-init.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
Bug Fix(es):
* Configuring metric for default gateway is not working [rhel-9.5.z] (JIRA:Rocky Linux-65018)
* NoCloud - network_config bridges incorrectly configured [rhel-9.5.z] (JIRA:Rocky Linux-65021)
* [Rocky Linux-9] Prevent NM from handling DNS when network interfaces have DNS config [rhel-9.5.z] (JIRA:Rocky Linux-65778)
* cloud-init fails to configure DNS and search domain [rhel-9.5.z] (JIRA:Rocky Linux-68409)
rocky-linux-9-x86-64-appstream-rpms
cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm
8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe
RLBA-2024:11230
greenboot bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for greenboot.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Generic Health Check Framework for systemd.
Bug Fix(es):
* Greenboot v0.15.7 to rhel-9.5.z (JIRA:Rocky Linux-67299)
rocky-linux-9-x86-64-appstream-rpms
greenboot-0.15.7-1.el9_5.x86_64.rpm
9faf55f6bb9833f7c19e535d935cc815a166c2ad427d55fce93f82e710965530
greenboot-default-health-checks-0.15.7-1.el9_5.x86_64.rpm
2fdf48e4e994b873c8d429c190cea1d41ee0cc8a9c45c1ce3f488bc977a1cc2b
RLBA-2024:11231
containers-common bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for containers-common.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. It is required because the most of configuration files and docs come from projects which are vendored into Podman, Buildah, Skopeo, etc. but they are not packaged separately.
Bug Fix(es):
* storage.conf enables zstd:chunked partial pull support in Rocky Linux 9.5 (JIRA:Rocky Linux-65057)
rocky-linux-9-x86-64-appstream-rpms
containers-common-1-96.el9_5.x86_64.rpm
35f35df491a5a01ad271f196156eb0b8c24a4f577295456bce5eace905deb725
RLBA-2024:11233
golang bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Bug Fix(es):
* Update to Go 1.22.9 [rhel-9] (JIRA:Rocky Linux-67672)
rocky-linux-9-x86-64-appstream-rpms
golang-1.22.9-2.el9_5.x86_64.rpm
cb632e2b03e55db7bbb8938bab7248914c7a60782173fd571c25a3a2ac2bf031
golang-bin-1.22.9-2.el9_5.x86_64.rpm
777487b110a00d25009ff6594ec7edc7296ade01b967dedb10d82ae0a3cabb44
golang-docs-1.22.9-2.el9_5.noarch.rpm
fcbb4dd59a76cf67cbb12dd44de1335ab95acbe991db90b3a2720d20e75344bc
golang-misc-1.22.9-2.el9_5.noarch.rpm
bfe8aa3ca26ebef5236911ed7f53a0d1196161a2aaf946f7f3569deb2bcb7368
golang-race-1.22.9-2.el9_5.x86_64.rpm
1cf47dd9739e68d31f000abf5037d90db01774c6c26f9934f135be692824407e
golang-src-1.22.9-2.el9_5.noarch.rpm
08edfa141f14fbe34d38f82066a219caea02d30c01d712a1a9158a280bb77fd9
golang-tests-1.22.9-2.el9_5.noarch.rpm
f10f619b46ce422f8878df524530c7b7b2dbb704d5c7ab7fb4c61882523f7281
go-toolset-1.22.9-2.el9_5.x86_64.rpm
b15b22a15b21929044a21f3ac0c28a5c1c0ecbcabd34655a31752cb65fccf2ee
RLBA-2024:11234
virtio-win bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virtio-win.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.
Bug Fix(es) and Enhancement(s):
* [virtio-win][viomem] guest BSOD or stuck if try to resize the mem to a smaller value than the original setting value [rhel-9.5.z] (JIRA:Rocky Linux-66540)
* [viomem] Implement VIRTIO_MEM_F_UNPLUGGED_INACCESSIBLE feature [rhel-9.5.z] (JIRA:Rocky Linux-66563)
* [virtio-win][vioinput] Update INF to support DMA Remapping [rhel-9.5.z] (JIRA:Rocky Linux-66564)
* [virtio-win][fwcfg] Update INF to disable DMA remapping [rhel-9.5.z] (JIRA:Rocky Linux-66565)
* [virtio-win][balloon] Update INF to support DMA remapping [rhel-9.5.z] (JIRA:Rocky Linux-66566)
* [virtio-win][virtio-fs] virtiofs driver should use DMA API [rhel-9.5.z] (JIRA:Rocky Linux-66567)
* [viomem] Improved waiting for the command submission (1 second wait can fail) [rhel-9.5.z] (JIRA:Rocky Linux-67482)
* [virtio-win][vioserial] Update INF to support DMA Remapping [rhel-9.5.z] (JIRA:Rocky Linux-67483)
rocky-linux-9-x86-64-appstream-rpms
virtio-win-1.9.44-0.el9_5.noarch.rpm
9540279743cb188ac6582bf70db0ca30bff37d59aeb37be4f006ec3140af067b
RLBA-2024:11236
bootc bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for bootc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bootable container system
Bug Fix(es):
* Rebase to 1.1.2 [rhel-9.5.z] (JIRA:Rocky Linux-66610)
rocky-linux-9-x86-64-appstream-rpms
bootc-1.1.2-1.el9_5.x86_64.rpm
40d9e16dcff514ef9884fcda99ebf8c6b2c122a99a9fc1f4585cc74a43b599c9
RLSA-2024:11238
Moderate: python3.11-urllib3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11-urllib3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm
edf26997373df5bca4c704084b8dcf063461333145b0b8f102372a69cccf6374
RLBA-2024:11239
rpm-ostree bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rpm-ostree.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks.
Bug Fix(es):
* [rhel-9.5.z] Rebase rpm-ostree to 2024.9 (JIRA:Rocky Linux-68144)
rocky-linux-9-x86-64-appstream-rpms
rpm-ostree-2024.9-1.el9_5.x86_64.rpm
16b54fd7ebe89a8fa3a079d6631839cf4600ce9501aed44e598e343b008505c5
rpm-ostree-libs-2024.9-1.el9_5.i686.rpm
1bd64feb364230c9fe542500d6610b23cf19b91d29235d7911a97bb7d9742c4d
rpm-ostree-libs-2024.9-1.el9_5.x86_64.rpm
c5ffa0eb8f712aa94f7078c84c73b1d22f674d318fbef27a6d351a70633ea376
RLBA-2024:11240
git bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Bug Fix(es):
* git 2.43 extremely slow shallow clones [rhel-9] (JIRA:Rocky Linux-67118)
rocky-linux-9-x86-64-appstream-rpms
git-2.43.5-2.el9_5.x86_64.rpm
5632adce592d411d0790b3fbf356baa694931d95f6c3eb235f406d09fd9b2646
git-all-2.43.5-2.el9_5.noarch.rpm
b1b8197f277c57a9d6809c03ed620d3987bfecf653199b56d40b989d62407fc0
git-core-2.43.5-2.el9_5.x86_64.rpm
16a095da6cdd948bf5bad6393c4ab2cb8d65cc84873f9517b23156598665eff8
git-core-doc-2.43.5-2.el9_5.noarch.rpm
d3e6cba781ab5ade8398480206a8ea4ac987e508ae94734e798da8ab984f8fb4
git-credential-libsecret-2.43.5-2.el9_5.x86_64.rpm
7e4c5330282a56897430fa76384638abc7f016dcb607a706b9aab4ee9bc5ce9b
git-daemon-2.43.5-2.el9_5.x86_64.rpm
2ff73834477f08d09e4432c7cb45487518034fc25cabbfcec88107ba2579be65
git-email-2.43.5-2.el9_5.noarch.rpm
c5e0b58255c2a296eed0dc78aa4aeb8000220f658cd0a0360c9afcbb8ff619e1
git-gui-2.43.5-2.el9_5.noarch.rpm
5dd5c6e7d62e64ed1acf37dc38f339d524348e14a1bd1a961075370a90c8edec
git-instaweb-2.43.5-2.el9_5.noarch.rpm
aaf008e3288d83d91bcea12adb8be452b6b2102bc10598fa004680ce988ba9f7
gitk-2.43.5-2.el9_5.noarch.rpm
bb9a48d05b71cf5d53e71ba5282f7121f561cb1eac4dfc6f6948939084fe443d
git-subtree-2.43.5-2.el9_5.x86_64.rpm
85380d92ded2b3e02b6ccd5e5d6a8b55874d377723d507a7f3c92c90a1a35316
git-svn-2.43.5-2.el9_5.noarch.rpm
552c06ee88945a3325256bbc6812269e96b557cc6f637233d1f34ff36f869150
gitweb-2.43.5-2.el9_5.noarch.rpm
dddf44f7e3cdfc8c4146d75146bb1976eb7f8ea2ad86bd6b065149c40d99f035
perl-Git-2.43.5-2.el9_5.noarch.rpm
7e7aef261de567f58f527de6f278d4982fee0c4af2cdb9d2de024bbf8c61c1cd
perl-Git-SVN-2.43.5-2.el9_5.noarch.rpm
c68a7a898c04869fce31dabd391cc9cddd2d2d5861d4c9d786260725d3dae1f9
RLBA-2024:11397
nss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Bug Fix(es) and Enhancement(s):
* shlibsign is broken in FIPS mode (JIRA:Rocky Linux-61294)
* shlibsign is broken in FIPS mode [rhel-9.4.z] (JIRA:Rocky Linux-61295)
* shlibsign is broken in FIPS mode [rhel-9.5.z] (JIRA:Rocky Linux-61296)
* nss-softokn pkg-config file still lists libdbm3 (JIRA:Rocky Linux-61300)
* nss-softokn pkg-config file still lists libdbm3 [rhel-9.4.z] (JIRA:Rocky Linux-61301)
* nss-softokn pkg-config file still lists libdbm3 [rhel-9.5.z] (JIRA:Rocky Linux-61302)
* Incorrect indicators for ECDH (JIRA:Rocky Linux-59580)
* Incorrect indicators for ECDH [rhel-9.4.z] (JIRA:Rocky Linux-59581)
* Incorrect indicators for ECDH [rhel-9.5.z] (JIRA:Rocky Linux-59582)
* NSS FIPS service indicators mark RSA-OAEP as unapproved (JIRA:Rocky Linux-61272)
* NSS FIPS service indicators mark RSA-OAEP as unapproved [rhel-9.4.z] (JIRA:Rocky Linux-61273)
* NSS FIPS service indicators mark RSA-OAEP as unapproved [rhel-9.5.z] (JIRA:Rocky Linux-61274)
rocky-linux-9-x86-64-appstream-rpms
nspr-4.35.0-17.el9_5.i686.rpm
b93d1619f8cb369c8365f1af2bc5c5468540e84b4df48ace651b0ae02ffaea39
nspr-4.35.0-17.el9_5.x86_64.rpm
38888592dfea730a0fece05f129aa081c3e7a33ed8edf29edfd095ea39f413cc
nspr-devel-4.35.0-17.el9_5.i686.rpm
9fffda941a75886b4d5f1299df3d5c930be1aa520ee048f1224dc5e4a9adbf67
nspr-devel-4.35.0-17.el9_5.x86_64.rpm
71cdb0d347128354d797f4d420ae56d59984a5d9de029e47f99aa26d4c60806b
nss-3.101.0-10.el9_5.i686.rpm
a0d8203609a6db08d6f1d7dcfa672d7cf48934a64013724b50d5e4af1c9edc30
nss-3.101.0-10.el9_5.x86_64.rpm
de547e8f8833bc94b9a0a10d103730829da0140bf0e91fae4edf7e9d4b8560e9
nss-devel-3.101.0-10.el9_5.i686.rpm
3b71e8da9f1770cb2ac701183498f7cc7cc046ca31e411ed1f6676a921cc7ce0
nss-devel-3.101.0-10.el9_5.x86_64.rpm
ecc0686ad85141aff38f825624657f3cf1894d4bd10a11716fe8661f100fd7ef
nss-softokn-3.101.0-10.el9_5.i686.rpm
0512bf2a82cf230f3ae0c98437b08d97d30e8422707cc7e14e7e8f15618a990b
nss-softokn-3.101.0-10.el9_5.x86_64.rpm
dd9e60e8c1a61c558454a657fb3c4e2a9e92c5c54319ebc5e8ec7b16f1bccce6
nss-softokn-devel-3.101.0-10.el9_5.i686.rpm
01836b26746520095cd8241f68c338776815ca7e7c5f374cbef138a456a601d0
nss-softokn-devel-3.101.0-10.el9_5.x86_64.rpm
11074d88b2fc98110e6cd8fd2daee95a758b8980f244a66568d639d8e3d4e6fb
nss-softokn-freebl-3.101.0-10.el9_5.i686.rpm
7ed9195f92f820ea75a77d4bf4b40be37259653e1029fba97c9098a61cad048e
nss-softokn-freebl-3.101.0-10.el9_5.x86_64.rpm
a6f07b7d8036e51f177d02a7534c98388ae4ef891c2f2b0c8437e1b4a5175df7
nss-softokn-freebl-devel-3.101.0-10.el9_5.i686.rpm
5a82965c8c8ffcb8c0f1b81cfed89cb7a2b8cdffc3da89c17b19674b492a5983
nss-softokn-freebl-devel-3.101.0-10.el9_5.x86_64.rpm
2ba29d16a099cde71ba526fd119163cf24d6c2c4a7cadcf427fa6963207e8de2
nss-sysinit-3.101.0-10.el9_5.x86_64.rpm
92e8225ba84e0021bff0fcd3d016290fcb7187140709d3c4cc054e16d8ff279b
nss-tools-3.101.0-10.el9_5.x86_64.rpm
921e41f90d85dcd4fcc8050626156c226a7c40dfb77143b88dcb8b4ccb0de2ff
nss-util-3.101.0-10.el9_5.i686.rpm
47e93025f93674777ec65dc3b7c991d3caeca58d1e61e74985057c6d89eb08ed
nss-util-3.101.0-10.el9_5.x86_64.rpm
e56eb4eee80b1e8d57a1b4a2720d116424091d5d940ab80561835d6426726288
nss-util-devel-3.101.0-10.el9_5.i686.rpm
1fef9f711494646c890b655e4e7f9cc24ea1b5cf6ae71f0dc361a1c3f1981f17
nss-util-devel-3.101.0-10.el9_5.x86_64.rpm
04de29ce01403cd5fee4841fb168b7547af029924881007c0e7b6a391d44f38f
RLSA-2025:0161
Important: iperf3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf: Denial of Service in iperf Due to Improper JSON Handling (CVE-2024-53580)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
iperf3-3.9-13.el9_5.1.i686.rpm
a87e81f2ffbf3bc1dd8a4f56d4330d16e03c2e31d7de92526907c6ab7135358c
iperf3-3.9-13.el9_5.1.x86_64.rpm
1b622b64bfe74b11ae8e2eea032fe02e3935811aa6eac7569332f00b59c90153
RLSA-2025:0308
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* fence-agents: Jinja has a sandbox breakout through indirect reference to format method [rhel-9.5.z] (CVE-2024-56326)
* fence-agents: Jinja has a sandbox breakout through malicious filenames [rhel-9.5.z] (CVE-2024-56201)
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.4.noarch.rpm
4149d445c1ca679ae96d838b3135f3afa8006ac7b79147d30087ce5963658468
fence-agents-compute-4.10.0-76.el9_5.4.x86_64.rpm
b2217fa53cdb8bf96ad1a17d6e3eaca12a0aaf4d07e62dc7774d093c2c16bb44
fence-agents-ibm-powervs-4.10.0-76.el9_5.4.noarch.rpm
48be5f9fe074ee82bc19e1e353fce0266b19d5373bb94383b37c6018dd432998
fence-agents-ibm-vpc-4.10.0-76.el9_5.4.noarch.rpm
48fffe328c7e0ae34b0e0f81b4dcd50cebc9a0f55796a9b3361cb37c3e948690
fence-agents-kubevirt-4.10.0-76.el9_5.4.x86_64.rpm
3c7d426fde71af2b9781a74c74f020fe784a69e1e7a95cf76dc6fe42eee54560
fence-agents-virsh-4.10.0-76.el9_5.4.noarch.rpm
629803c10b5eb880588420b22d77794979f2cbb5f775ebc1055161334b9c43fb
fence-virt-4.10.0-76.el9_5.4.x86_64.rpm
0a423b1d227231e3a32335afb44bf802a31929944bfeb193f235de9fae90de7b
fence-virtd-4.10.0-76.el9_5.4.x86_64.rpm
1bd88c587059a7196d00f6d2fed763e37ff65cfa142a6f36f3df0bfe8653b00e
fence-virtd-cpg-4.10.0-76.el9_5.4.x86_64.rpm
43f3f785171a0b24dbfe235161413caeeb630ff65e4ffca4758c3f9b6fdf9eb7
fence-virtd-libvirt-4.10.0-76.el9_5.4.x86_64.rpm
59410ab04185b7495e99313544d0a16e4485a3a682db132456916c7f0b6597a3
fence-virtd-multicast-4.10.0-76.el9_5.4.x86_64.rpm
61158e4fa8fea6ed5c835309d00f4514780f95e3367a3e57a1777ed6465d2f5c
fence-virtd-serial-4.10.0-76.el9_5.4.x86_64.rpm
32859b173c4fac8119608103708f2d8733603ceb3a9cf3939bf411cb608f7981
fence-virtd-tcp-4.10.0-76.el9_5.4.x86_64.rpm
630c8dbf469048c5ccbe1bc7a219081615386bdbb91b3b4d41e252c65a0d7b2e
RLBA-2025:0541
httpd bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Bug Fix(es):
* openssl 3.2 ENGINE regression [rhel-9.5.z] (JIRA:Rocky Linux-69456)
* RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 [rhel-9.5.z] (JIRA:Rocky Linux-73580)
rocky-linux-9-x86-64-appstream-rpms
httpd-filesystem-2.4.62-1.el9_5.2.noarch.rpm
747dc60adeb0325fae0bc0f7cb43cdd8cd7bc01980f453e8dc4d3ab7bb2ee03b
httpd-2.4.62-1.el9_5.2.x86_64.rpm
ff8e5b5738c73dec2f5146c82a08d43d3c39ee61874b70d520307737aae2640d
httpd-core-2.4.62-1.el9_5.2.x86_64.rpm
2bbd4f7110a5670beadaf3d3ebd4678e84cfa3309a42782a5c39e27c99db965d
httpd-devel-2.4.62-1.el9_5.2.x86_64.rpm
d6182d0d474d9fae99e277468660759b1394d01c73172cf2a45349cb7fc964d1
httpd-manual-2.4.62-1.el9_5.2.noarch.rpm
a696e00084a121399c0cf2e164f168e15c6adf8e2e5efed7e3bf2fd6df888058
httpd-tools-2.4.62-1.el9_5.2.x86_64.rpm
2e4e7e22f067a4ee192dfe57c97e0f183412b20d3d4c5041680c81dcfc51eb68
mod_ldap-2.4.62-1.el9_5.2.x86_64.rpm
776af70a85e2a615bcdfc5a5207ab479fc8ba9ef807bcbf87a93b06cc638f8e5
mod_lua-2.4.62-1.el9_5.2.x86_64.rpm
f9046d4e50afe19d75c0c0a8faa0e4de2560ebb7d342350aeb406959d5819015
mod_proxy_html-2.4.62-1.el9_5.2.x86_64.rpm
9d3bfd9c92babab273b94d599fea4ebdf18eb53cfec0722f221a6d0b1b4abcd2
mod_session-2.4.62-1.el9_5.2.x86_64.rpm
1f63e1901e1f92e252fa5ce1ca2ef4d9f2d04c913b41afe22967ace37190d1aa
mod_ssl-2.4.62-1.el9_5.2.x86_64.rpm
fe46aa3dcddbe9ac33e2b705d73c71a2247548ecb0d04d94f7b59eadacdf417b
RLSA-2025:0667
Important: python-jinja2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* jinja2: Jinja has a sandbox breakout through indirect reference to format method (CVE-2024-56326)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jinja2-2.11.3-7.el9_5.noarch.rpm
826b5329d897a044c321be59b1c90b1dc8d2226e647b960634e572b6cdb722b1
RLSA-2025:0692
Important: redis:7 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.redis, redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981)
* redis: Redis allows denial-of-service due to malformed ACL selectors (CVE-2024-51741)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__redis
redis-7.2.7-1.module+el9.5.0+30204+5d6debe1.x86_64.rpm
8f7e695ffbf939a42738ccc293f91816cc7ee686047d7d5879d94cb81898c807
redis-devel-7.2.7-1.module+el9.5.0+30204+5d6debe1.x86_64.rpm
631ddfb099f911a2e44e156c928c7e893b3facc9605698950d38f19cb0ef9f3a
redis-doc-7.2.7-1.module+el9.5.0+30204+5d6debe1.noarch.rpm
020c8ce2443a525d948d5f6c4936ba60ae3e36f4e40c26ba384734dc7fbfd5e2
RLSA-2025:0693
Important: redis security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834)
* redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145)
* redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449)
* redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228)
* redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.17-1.el9_5.x86_64.rpm
017d920a25942e243a2b5d97360b51304e855b01f1fc2dc33366cb47473479f7
redis-devel-6.2.17-1.el9_5.i686.rpm
b0671cd8217ba814074eaa4a792c145c5216af1f1719fa1093615534169d3f89
redis-devel-6.2.17-1.el9_5.x86_64.rpm
9eb56cda03556f7852d873aad8f5abb0922fed5608baac25314aa966d7f70516
redis-doc-6.2.17-1.el9_5.noarch.rpm
df89ffd6492d1746fe62b039c6c436347eeb7aeb5fa5ab7bef7799579f1c93dd
RLSA-2025:0791
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-8.el9_5.3.i686.rpm
d172816face90e802801177eb9a3c0c572ef823dc71108ab1e5c2df9df8cb5e4
libsoup-2.72.0-8.el9_5.3.x86_64.rpm
2130c3c7f5f9087a637eee21a1d05e9046cd59b23820fcf5227163ec5d113957
libsoup-devel-2.72.0-8.el9_5.3.i686.rpm
e3d9cc79d3cf4b47b3ee07ca2579d40ee9d342f0b84223f4ddca006facca061e
libsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm
765d0855d6c88c0abef5af690893bf1953bc7e425cf285c2a5fe8ccb84a3b50b
RLBA-2025:0909
alsa-sof-firmware bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package contains the firmware binaries for the Sound Open Firmware project.
Bug Fix(es):
* Update Intel/AMD SOF firmware in Rocky Linux 9.6 [rhel-9.5.z] (JIRA:Rocky Linux-62358)
rocky-linux-9-x86-64-appstream-rpms
alsa-sof-firmware-2024.09-1.el9_5.noarch.rpm
ce54af2d3e1b04adb688defb98d49f85bb7be72d754c4a86a548b78768f597c5
RLBA-2025:0911
conntrack-tools bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for conntrack-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use.
Bug Fix(es):
* conntrack-tools-1.4.7-2.el9: Rocky Linux SAST Automation: address (selected) true positives [rhel-9.5.z] (JIRA:Rocky Linux-67564)
rocky-linux-9-x86-64-appstream-rpms
conntrack-tools-1.4.7-4.el9_5.x86_64.rpm
b8f96cf6d52e56c788e3ad4e06fb27f95e985f899096aa1b8a9e8da24aeaae0e
RLBA-2025:0913
mysql-selinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mysql-selinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SELinux policy modules for MySQL and MariaDB packages.
Bug Fix(es) and Enhancement(s):
* Rebase mysql-selinux to 1.0.13 (JIRA:Rocky Linux-69603)
rocky-linux-9-x86-64-appstream-rpms
mysql-selinux-1.0.13-1.el9_5.noarch.rpm
d62f6850b694e29424638dc01823471d72e5d2b9c680f3a9120c8a4c2ab0c249
RLBA-2025:0916
rust bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. This package includes the Rust compiler and documentation generator.
Bug Fix(es) and Enhancement(s):
* regression in rust-toolset 1.79: %cargo_install macro no longer accepts arguments [rhel-9.5.z] (JIRA:Rocky Linux-70036)
rocky-linux-9-x86-64-appstream-rpms
cargo-1.79.0-3.el9_5.x86_64.rpm
3c5824116c511d01bc14caa05d1d2333807197ea82dadda7672eae5e71e46c67
clippy-1.79.0-3.el9_5.x86_64.rpm
eae5a298505cf929c2f562d30ec8f5342c1e4ff5e7f6c6f409d6d62054ccaff3
rust-1.79.0-3.el9_5.x86_64.rpm
38f5504cb0a3665e0d983583da9d3b4f4b87a698e34d62e1c3c14c142c708276
rust-analyzer-1.79.0-3.el9_5.x86_64.rpm
bd4eaf2f0d255682ef4c30dda14b99d2ff078717133cb4dc5c9d406491d0f843
rust-debugger-common-1.79.0-3.el9_5.noarch.rpm
029df4467e19c7be274bd5a3547152d02d9965c8d8621117440567249d6879ce
rust-doc-1.79.0-3.el9_5.x86_64.rpm
2ad3819ead5a01b5b885ff300ebf3ebaa853205052c351f6475f2064758c1a33
rustfmt-1.79.0-3.el9_5.x86_64.rpm
9d4d9f8900ef9adba917db64c04ecde21cca6ea039442313780d0d7940b52d53
rust-gdb-1.79.0-3.el9_5.noarch.rpm
511e1815f8b8940c0b9e09129e4a3537cc522765cbd59e18bcc5a5973dd4aa3f
rust-lldb-1.79.0-3.el9_5.noarch.rpm
6a70057becb0702b48f10d926b47aa64614dd33260346c12926854d11869d91a
rust-src-1.79.0-3.el9_5.noarch.rpm
4f4f282d73f69e3dcc778c06ef64e76d5b56329c50516d7c7c87ad405559d1aa
rust-std-static-1.79.0-3.el9_5.i686.rpm
8c0f7d5a19b8573fc8f573915481168d6de2929cd1643bfefbc861e3336affb9
rust-std-static-1.79.0-3.el9_5.x86_64.rpm
a534344d32586a783ede22bfa8e4af24ac5cb8d8e39858c6c86b77da16706206
rust-std-static-wasm32-unknown-unknown-1.79.0-3.el9_5.noarch.rpm
a1cede993e1594128861b2c80b50207e719d46e6b0afba5d6446dfce3ad46021
rust-std-static-wasm32-wasi-1.79.0-3.el9_5.noarch.rpm
8d0b974f42a6653e6ef2eca89e32d2d6651bed7b663183346f256b4c22e30751
rust-std-static-wasm32-wasip1-1.79.0-3.el9_5.noarch.rpm
fdc16b3c0291449e32ff8708c23ce428b33844766d7e03201a7cc9517d0ed8dd
rust-toolset-1.79.0-3.el9_5.noarch.rpm
1ecd99b1b7ba672adc81957000ce34e55c2aaf16086096f062620332744cceb0
RLSA-2025:0917
Moderate: keepalived security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for keepalived.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The keepalived utility provides simple and robust facilities for load balancing and high availability. The load balancing framework relies on the well-known and widely used IP Virtual Server (IPVS) kernel module providing layer-4 (transport layer) load balancing. Keepalived implements a set of checkers to dynamically and adaptively maintain and manage a load balanced server pool according to the health of the servers. Keepalived also implements the Virtual Router Redundancy Protocol (VRRPv2) to achieve high availability with director failover.
Security Fix(es):
* keepalived: Integer overflow vulnerability in vrrp_ipsets_handler (CVE-2024-41184)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
keepalived-2.2.8-4.el9_5.x86_64.rpm
d45ee31af4a22b47618394e86c6188b85f4b2ba3217b29cc313387583b7bba70
RLSA-2025:0922
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-docker-5.2.2-13.el9_5.noarch.rpm
53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4
podman-5.2.2-13.el9_5.x86_64.rpm
776a1adad50d599bbb42e73a7238f4dba5625ea1a8eeabc9bdd0467ab83c8ac2
podman-plugins-5.2.2-13.el9_5.x86_64.rpm
6475de32f2e34ea1cb53d6f5bf38d3cb841cd218577bd2e275e30247e3458d91
podman-remote-5.2.2-13.el9_5.x86_64.rpm
dfb5d2ac5934ec5f86f766c9f13016e8562ca7379de9e78d3f6d73794c7369cf
podman-tests-5.2.2-13.el9_5.x86_64.rpm
0a01a3fa387d5267fe206918dfeee547fa4905c18c0b95aa6f65be29c2cee344
RLBA-2025:0919
haproxy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for haproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
Bug Fix(es) and Enhancement(s):
* Newer openssl library (3.2.2) breaks executing haproxy [rhel-9.5.z] (JIRA:Rocky Linux-72952)
* HAProxy fix CPU usage spikes [rhel-9.5.z] (JIRA:Rocky Linux-72955)
rocky-linux-9-x86-64-appstream-rpms
haproxy-2.4.22-3.el9_5.1.x86_64.rpm
f1f88ce0cd2ffcf6afda68ffb4b3e54de1a3d8230ad56f03c8d125df517b69ea
RLBA-2025:0920
passt bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for passt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges.
Bug Fix(es):
* [Pasta] TCP keepalive causes connection reset [rhel-9.5.z] (JIRA:Rocky Linux-68948)
* Poor Performance with Pasta for rootless container when compared with slirp4netns [rhel-9.5.z] (JIRA:Rocky Linux-73251)
* pasta fails to associate container packets to existing flow, connection data is discarded [rhel-9.5.z] (JIRA:Rocky Linux-74301)
* Issues with Camel-Quarkus Integration in Podman Container Post-Upgrade (Podman 4.9 → 5.2) based on Pasta networking [rhel-9.5.z] (JIRA:Rocky Linux-75645)
rocky-linux-9-x86-64-appstream-rpms
passt-0^20240806.gee36266-6.el9_5.x86_64.rpm
72f66ce603df8e6df3336f6c9ef70223aa346fdee0a91e27d1474046b14f0760
passt-selinux-0^20240806.gee36266-6.el9_5.noarch.rpm
90b6783920a286f357131a95d0fd925313bbf50de9254c0014d5576e5cfa36f8
RLBA-2025:0921
linuxptp bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for linuxptp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel.
Bug Fix(es):
* [RFE] Option for assumed NMEA delay in ts2phc (JIRA:Rocky Linux-70168)
* [RFE] Allow phc2sys to get offset from ptp4l without -a and -w options [rhel-9.5.z] (JIRA:Rocky Linux-70678)
rocky-linux-9-x86-64-appstream-rpms
linuxptp-4.2-3.el9_5.1.x86_64.rpm
82b5dccbd82868fc3a2f1ca90834c5fd7b6a4c9ea37c4f0f6cbc1317cdeaecb1
RLSA-2025:1210
Moderate: tbb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for tbb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Threading Building Blocks (TBB) is a C++ runtime library that abstracts the low-level threading details necessary for optimal multi-core performance.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tbb-2020.3-8.el9_5.1.x86_64.rpm
dcdd99f87fbd23b5fc54dc4332f0c28522dbfd98f3e1b956af99d163ed274844
tbb-2020.3-8.el9_5.1.i686.rpm
b6500ee2e56caa7287d387ce3828e3ff0bbbd9fd5ee78f76a58dbddaa45e418c
tbb-2020.3-8.el9_5.1.x86_64.rpm
a8b678297e29ccf6907400119d0e0e749507b49f5bac9959d39aeeef327a80c6
tbb-devel-2020.3-8.el9_5.1.i686.rpm
10f509b875e8e5e8b4520b50d830ba7e58e96d05c162fa0a1c82f2e4951539cc
tbb-devel-2020.3-8.el9_5.1.x86_64.rpm
b8674bab7d1a90a44fc4956f7193486c0dd7490b39e4dc390154e43ed611fb59
tbb-doc-2020.3-8.el9_5.1.x86_64.rpm
bd90dde2e34775b7b2cf927d84f2e66f3f36e154b8fa16a83bd128410ccdd12c
RLSA-2025:1300
Moderate: gcc-toolset-14-gcc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-14-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm
876a22394894a9d39c907bd40143d8cce61c87cb841393d11e8d9231d00cc1df
gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm
1c0eb9ee545cc0952f7e89775ad5154c057f0faeec4d01a8d88b614360e3679c
gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm
f0b5beb0439263344aba9534af0110a7c1a3477fd4097841ebe1f500b0e0eb9e
gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm
a3682d4b06232f361481c5d6582bfcae8a0d8d5e373b45e818d39663015a9e95
gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm
10e6c7e0eb322deb6d5cd1956012858fa873f947c8b3c542291374f3553c9383
gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm
77a2cbce8147769fb47be0b4f2d2f8df7be6e6f3d5ca4710e0fbe707bd77fd7e
gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm
0cee025c62a34090388d08784e10d57764d1063a0cf3c8eded46a740c9827cef
gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm
7162bf0287aec97a1faeea41a938a003b994d7b35ed03eb295e46e67e311e034
gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm
4949e4da015b6ad75f2b92da071306da7def068d88c6c7070981219bf64fbd16
gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpm
71d1642c759f26578d5ae2035d3ecc04942e3ae3a67e50ecd1bd1877ba11ea7f
gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm
ebba9f23155cd712d6180c12364bba6d71ef87c2ba7a25fd2cbe60408d256387
gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm
a28b67152086a93b73c006769b17b49a16a3f3066895cd553fea1cd5f8ee2381
gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm
9ebd338fcb93d7b02415ddb42e51c9c6abfc0d54107ba31373747e2a7807496e
gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpm
3a797e49fe4884a2b4760a3df444538da2e69dd09ab5e0503fc4c1c273a8a90d
gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm
88a4d8d55339176e922a30689656105bd9b770497a30834a15ee6bda657e21f6
gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm
e4c7090aa4ef335af7baafc834c687c71cbf19e9aa172c6c4f0e3ef24c01869e
gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm
648fcdf105b1fb40c21434c8180d2990f9d742358882ac65aa8fc9f4b20a70be
gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm
946412d2ccecfea823eb02910c1c5038193aa88583bcd1eb41a6e59b585675ee
gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm
89e721914855a78ee67486d9d83d49132d5986f77d52bd48a05fe935b0f14506
gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpm
878abc14cb7af14968833e01ea14533344089698034aae5008477d837a62870f
gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm
b4113560467c2d37fae2ea34cbe65a6e69f1e6e4d7747f4a346ab865e32dd277
gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm
f37b475497cf46d9604a7c8e3d168c1caa6aa0805092cce8f59cf95ed64f927f
gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm
e376e993b663ecd695faf16fdc0b1f37e52da1f3cc8830c70d1eca2104e8e81c
gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm
7123846f4f7291b4065bde58a3096ae656ee4b2bf7d897119f0ffecd6a5d7a54
gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm
ceaec2312da3428660838b9999f94f8138077805276e6f4994332d786496e8db
gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm
38b1e47e3c97eaa7a6d099a4da3bbdec07a6617a7ead48609aa1bf19886e4a38
libasan8-14.2.1-1.3.el9_5.i686.rpm
29c00c38aff4eb8bf212a589b8b03d737336473b107e7b4f4787bec304d5328c
libasan8-14.2.1-1.3.el9_5.x86_64.rpm
dd6f52b3c505847b5546f3c8ebe270d6953aeb22da44d873970c360c7569fb52
libtsan2-14.2.1-1.3.el9_5.x86_64.rpm
34e8b5ba48aff6d257d44f90170968966afae333ec02c8c875e23d6a8a6d4ba6
RLSA-2025:1738
Important: libpq security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libpq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libpq-13.20-1.el9_5.i686.rpm
05732ad4970087938ad9054b10bff63d556ecb5942d1954480c55be520335772
libpq-13.20-1.el9_5.x86_64.rpm
e201fb92fd5c1eac7418b2ddd8647d5ccd15aebcc1f6db37e78b610aa1cf3db1
libpq-devel-13.20-1.el9_5.i686.rpm
35262b6ce777cf323ec275102fd62353aa6c2634bfef80c9fd8ee4539ecebc22
libpq-devel-13.20-1.el9_5.x86_64.rpm
4d17be86c0325ac8b6111c869dc572217cf403cfe64ceb315812b941f37ee0b4
RLSA-2025:1309
Moderate: gcc-toolset-13-gcc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-13-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-13-gcc13 package contains the GNU Compiler Collection version 13.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm
bc5c3b646535eda7b65e323dfceffb5eee1024ca19bd091c190fb0a68b4fd606
gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm
b5ee6b7f650e26a9697dd37891cc481ad2e285fdda8ee6c2e1e0db6ebea48fde
gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm
e5d5242efdc85adee1c48e70f63094916f7fd497535f9b99fe7549d9acddaf0b
gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm
ee6f2c86a2355a4ca4bbcf4f56041794d30a42704a80512e19113d5b78fff0a0
gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpm
4fb1ec79e1d1606506eca85b996ffbccdfe86dd21ee61df2dcd9af8bfe8b7f06
gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm
21c30595772dd4a6dadbc5f0ed83dbb8e262152a46d8d598269495adbc6f04ce
gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm
0fc6ac71ec82e533617a0f7f25ca53720a665d48d8ab02a8a1c00e45bde6deed
gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm
233c2421cead89007a87a2486eec45834680f1aec861e78b063c49e4aff8fff5
gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm
b4b2b7b4ebdd7257e44dcb9e8a18b49dcc7f85f9de3cfbe14ce094a0e9f2593e
gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm
4acac9699ee47273868bd09d0feab2dc75744a39f1c66c5db74fee38990fb4aa
gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm
a4b7309e4da3ee04c3452aba4c2aa1d41ca9ccfbcf529d06c8e914f73a5729b1
gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm
8bf2c6fb5f42acecab918cc27063f4782e8e84e1e7f2bd209ac5c51a74118251
gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm
a9476d46d303a863b71e35659dd0b0679eee75ab140f5ce282bd7759011bf057
gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm
603552d85511075283224ef8ee81c74f1aee1291f9df45f23042fa29e4cc4cfe
gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpm
c8ad171a67a83fc261a8e5899c1b9467bbde8eda7f14498768bd584ad99e5a3b
gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm
561a9988ba615e28e4bc0acd5a116258e80d6d9756f61cc4e420216229b01446
gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm
f41dc3f00e61d1813034c0829b57d770a28e8727604315aa3c08067586c8faba
gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm
7f3b75713e759719c81f81eb29bf71557e2a13c710f56242833b53283cf0a173
gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm
ab2ee740f7ee97666b5e982e3400e1f478295db74a128ff5ad5689a624055633
gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm
391e6bbf1b1393dce07c37d21a137a3a9ac8e25b7481205accf8a0d5a3e1adb9
gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm
ccb3a7d10948e12d58a65fb9f947f7ab0f84af81ac1c9965a9ff1a515791fd4b
gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm
2132db3c0323180bbc9c1cec2b5d5e78badfa2dbfd58542785a48d48deae8ef5
gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm
676c5084d5ac78bb2ab9ecf72c211c0f8670cb8199236e73249784a5ccb929eb
gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm
4cd9ad88617f8c04d9b87e72fb986d562638bf3e965fec1e91ecf2259c9684ba
gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm
5876e697c0625db3c6772799862e19f85ca236d52384d7e6d618f9f02b953cea
gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm
3854537a72fde399f98853e12a4a6bcbf2920fd65bb28d725419f7f5e6d19d6f
RLBA-2024:9256
opentelemetry-collector bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.107.0-10.el9_5.x86_64.rpm
a8bd9ad015c01c8c32ccf5870343f8f6c57ad49b283d8a5c62065fb564e976a5
RLSA-2024:0465
Moderate: sqlite security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
sqlite-3.34.1-7.el9_3.i686.rpm
ebb4946387ff332243511f31856d8529259475e81083f49bc4ab9f5949f883f4
sqlite-3.34.1-7.el9_3.x86_64.rpm
3db7e0a7937231a5b23a8537bec0ee58ab03e16dad01564ccfc7d0b844fcfc39
sqlite-devel-3.34.1-7.el9_3.i686.rpm
c7ee3573baa23603c95a631b38938f121af306f1a1ae4f823a0cfa64eef86384
sqlite-devel-3.34.1-7.el9_3.x86_64.rpm
350885c689cab113d7e24eaa95191c84fcc01d2ed34d6817e57269387620a793
RLSA-2024:2410
Moderate: harfbuzz security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for harfbuzz.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HarfBuzz is an implementation of the OpenType Layout engine.
Security Fix(es):
* harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks (CVE-2023-25193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
harfbuzz-devel-2.7.4-10.el9.i686.rpm
b2860af84e2115576de6d4badd1de5000ac718c53b9d5cddeb95d9f4b2d1b611
harfbuzz-devel-2.7.4-10.el9.x86_64.rpm
8126d9e44867d237fbeba20ce0e692399c9acefa9aa8148e35acdee4acbc969a
harfbuzz-icu-2.7.4-10.el9.i686.rpm
b3f096c16ab1f767a4b7339530720c4cf8233124e2ec9588dec52148934d3ecb
harfbuzz-icu-2.7.4-10.el9.x86_64.rpm
4439cad4cd72355100bc6724220df6f90ba43aac254c7811e739c48095c4531f
RLBA-2024:2430
libfido2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libfido2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fido2-tools-1.13.0-2.el9.x86_64.rpm
1afb7d89af0b2f46071aef984d8716a1cf8f037a3c81d3d1bd846a2396898460
RLBA-2024:2442
policycoreutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
policycoreutils-dbus-3.6-2.1.el9.noarch.rpm
82c99ff741149e770750767380e94b023c8e8d0598aa3b7c796f4d158d0d131d
policycoreutils-devel-3.6-2.1.el9.i686.rpm
68552a5868edd7df9eb74d91a308193a42dd88fdea0af70e7b15d24689309cb2
policycoreutils-devel-3.6-2.1.el9.x86_64.rpm
664aae3e74491a4871246ac9995eb47e8ca924c97f1e38aff754e3dac4807700
policycoreutils-gui-3.6-2.1.el9.noarch.rpm
30772604a3b6ad3b61acfcde8484c34bc698d58460dcc3ecfaccc34b492c2969
policycoreutils-python-utils-3.6-2.1.el9.noarch.rpm
78c3d948436dee8718d5994bbfbb991a54c1de33591dca381726d63e4aa14579
policycoreutils-sandbox-3.6-2.1.el9.x86_64.rpm
c611ef185e1cc2fbf358b3d60af7d01fa951e448858fe4c66a41300454dc7d0c
python3-policycoreutils-3.6-2.1.el9.noarch.rpm
2d1c23b07f4b428b3b46230c61fb1073064e09d81760cf516c08ae4787f85ae4
RLBA-2024:2443
libselinux bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libselinux.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libselinux-devel-3.6-1.el9.i686.rpm
e3d2ca801ba991e588d495eedef08a028cb029dfbac42d435a9d2b7a1ddf059d
libselinux-devel-3.6-1.el9.x86_64.rpm
53f451c22a43535c5542c1c41fcb3acd44b013be171367ba54436cd235a5edc1
libselinux-ruby-3.6-1.el9.x86_64.rpm
5e97adc57d3603b708ef01385f8169a168c5228b545e9e2f2347c722e0e5374f
python3-libselinux-3.6-1.el9.x86_64.rpm
3744ff0bdd26d9666c0025a2a58fb33a482a13a1c92bd6fc9b7347984ccd6db9
RLBA-2024:2454
nettle bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nettle.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nettle-devel-3.9.1-1.el9.i686.rpm
cd77fb736b0d481cd3f5e3d93ec45d16574bdb750185be7d10b56ba3268e20b8
nettle-devel-3.9.1-1.el9.x86_64.rpm
30333749ec75e76ce5bcc54ddf6877461c388802bfd7b026d31e7797a14e0e64
RLBA-2024:2457
libnl3 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libnl3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libnl3-devel-3.9.0-1.el9.i686.rpm
3771b1a994d477d43aeea4f1858caef1b4929572b211df47146e3a7296845d6a
libnl3-devel-3.9.0-1.el9.x86_64.rpm
537cd61150b79ace602af6e30e07374a73c8f396e0e49f2ffd9d3e01cf6d247e
RLBA-2024:2460
openldap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for openldap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openldap-devel-2.6.6-3.el9.i686.rpm
9f2eb26ae79c2dddd8cd8f3930ce11bdc0eb73b068f843adeebdc8bd03fc2fd3
openldap-devel-2.6.6-3.el9.x86_64.rpm
724740cc641a431cc169dbbef1b37496ac18bf41331916f6c7ff1ff376ab96c9
RLBA-2024:2466
iscsi-initiator-utils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-iscsi-initiator-utils-6.2.1.9-1.gita65a472.el9.x86_64.rpm
81314e1b3a72ddb476d7a6e12b20c6f0d37804a3276d4c8a16b7c59eeb48b16f
RLBA-2024:2465
setools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for setools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
setools-4.4.4-1.el9.x86_64.rpm
e167e2db93e6f1a25ad2b8d47676a118ba9a6b256cefb36aab1c31039237f940
setools-console-analyses-4.4.4-1.el9.x86_64.rpm
32d2c79172533519d3195a98b11713d31af08690880d114485485f8493bb2335
setools-gui-4.4.4-1.el9.x86_64.rpm
10983b40d85ed9a00bcea3aab5221cb26c712c93d9eda3a455b88b21813ce12e
RLBA-2024:2487
python-requests bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests+security-2.25.1-8.el9.noarch.rpm
676b05532e43a8b7ea183fcd2b858549aa191d0d65e4b6a722d77bd72bfa8de5
python3-requests+socks-2.25.1-8.el9.noarch.rpm
80220380ba92bd3a66c65bc44a0dc996c568417c2c807c703dc2712c939124f5
RLBA-2024:2500
fwupd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fwupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fwupd-plugin-flashrom-1.9.13-2.el9.x86_64.rpm
69d830eaccc260de22c35d5f219b2ab0e36366121636adbbc08c5fbdcd88cf14
RLSA-2024:2504
Low: libssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for libssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004)
* libssh: Missing checks for return values for digests (CVE-2023-6918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libssh-devel-0.10.4-13.el9.i686.rpm
09aac19ba4c4179b45c9579b9bf99f9b202c98438786eb68c779a0de87c81745
libssh-devel-0.10.4-13.el9.x86_64.rpm
43fad4c6dc131266197b575e8f21ecad048849ebc3269a36e38e42abf5577e78
RLBA-2024:2516
lksctp-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lksctp-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lksctp-tools-devel-1.0.19-3.el9_4.i686.rpm
11835bfda38e68771b910854ba8d06a6de57408eefb0f32c6412582122126698
lksctp-tools-devel-1.0.19-3.el9_4.x86_64.rpm
654f72525e3ce339d0f404a863d993f08aaaf422b87ba15334009cc8ce9ef56e
lksctp-tools-doc-1.0.19-3.el9_4.x86_64.rpm
bd67935a8b2efe541e8d7c2bebb6f55ad682cf8e3cb72e95a75b900b5ca4b1fb
RLSA-2024:3842
Low: c-ares security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for c-ares.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
c-ares-devel-1.19.1-2.el9_4.i686.rpm
4c8a007bf821eabca00319aa0958ea6340e0a71ad10e79e62f87273c83528718
c-ares-devel-1.19.1-2.el9_4.x86_64.rpm
829d24bd8cdd5e181190723b032e02a50d8b3c01ecf12202d39038ba5e195105
RLBA-2024:4778
mtr bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mtr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MTR combines the functionality of the 'traceroute' and 'ping' programs in a single network diagnostic tool. When MTR is started, it investigates the network connection between the host MTR runs on and the user-specified destination host. Afterwards it determines the address of each network hop between the machines and sends a sequence of ICMP echo requests to each one to determine the quality of the link to each machine. While doing this, it prints running statistics about each machine. MTR provides two user interfaces: an ncurses interface, useful for the command line, e.g. for SSH sessions; and a GTK interface for X (provided in the mtr-gtk package).
Bug Fix(es):
* Regression: mtr --address doesn't work with policy-based routing (JIRA:Rocky Linux-29176)
rocky-linux-9-x86-64-appstream-rpms
mtr-gtk-0.94-6.el9_4.x86_64.rpm
6c3e0ad235366ad099b55bf8ee5d936b0d3aa291bd37949cb190d4b0e5985be1
RLBA-2024:6161
libevent bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libevent.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libevent packages provide an abstract asynchronous event notification library.
Bug Fix(es):
* Socket is closed twice when retrieving an HTTP request fails [Rocky Linux-9] (JIRA:Rocky Linux-26128)
rocky-linux-9-x86-64-appstream-rpms
libevent-devel-2.1.12-8.el9_4.i686.rpm
ede34e0bed5b9b46cc137a4896b6febab923c16a8f302c320dc06ace5da23be0
libevent-devel-2.1.12-8.el9_4.x86_64.rpm
684b3c7f129aaeb16929026d433191aed032129a1114f4da805a10310ca83c37
libevent-doc-2.1.12-8.el9_4.noarch.rpm
db519c0939cd740a789939e3c7ae32686aa22bbcec7b0eafc2872348e54e5e34
RLBA-2024:11252
sssd bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for sssd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-9.5.z] (JIRA:Rocky Linux-66268)
* Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-9.5.z] (JIRA:Rocky Linux-67673)
* sssd backend process segfaults when krb5.conf is invalid [rhel-9.5.z] (JIRA:Rocky Linux-68508)
rocky-linux-9-x86-64-appstream-rpms
sssd-idp-2.9.5-4.el9_5.4.x86_64.rpm
ca72fdb1bc964e29a6b73e71bf825b93026f007d7256f783634b16a9b4d73e20
RLBA-2024:11253
libsemanage bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libsemanage.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es):
* semanage fails to get lock if / is on NFS (or /var/lib/selinux/) [rhel-9.5.z] (JIRA:Rocky Linux-69531)
rocky-linux-9-x86-64-appstream-rpms
python3-libsemanage-3.6-2.1.el9_5.x86_64.rpm
6240cebf3aa8e7e62c17ad7535080d53b6c02187b853c6c978e6be5071fb9eee
RLBA-2024:2120
xxhash bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xxhash.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xxhash-0.8.2-1.el9.x86_64.rpm
8541fa3e3e794b5702c684d8de3171e26aea778a47e6c8e728083d932a64ef46
xxhash-libs-0.8.2-1.el9.i686.rpm
9c04499c3f4888bf93baf55efff91b70b36998560310bee5eb212ad3a5c2c4db
xxhash-libs-0.8.2-1.el9.x86_64.rpm
7e80a3bb4811c9e9843b50cc5c2af0d88a0add48a952516b4e539d26237458d7
RLEA-2024:2127
nispor bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nispor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nispor-1.2.14-1.el9.i686.rpm
e1f230e3ea99ac0a47f0a71374eb35538739c42540a2a4082d0e4fe2dd495dfd
nispor-1.2.14-1.el9.x86_64.rpm
5de747b4800a825da69b8b26d91fda9ce637b46f9de60f8de9c423c358f754f5
python3-nispor-1.2.14-1.el9.noarch.rpm
e1ff4f8da91fda815864d7181d02570e2b8c384f081c766c945397f9df123944
RLSA-2024:2137
Low: LibRaw security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for LibRaw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).
Security Fix(es):
* LibRaw: a heap-buffer-overflow in raw2image_ex() (CVE-2023-1729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
LibRaw-0.21.1-1.el9.i686.rpm
ef9f7ce01213439fc8426ecf11752c0678643b8452adbb2e0430e4a3a3903113
LibRaw-0.21.1-1.el9.x86_64.rpm
56b7b9a54d7b0752707914b30b86ba4ca3cc4bf911280ff37f68f5b84722b640
RLBA-2024:2136
gegl04 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gegl04.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gegl04-0.4.34-3.el9.i686.rpm
360f1cc2fd135ca784ab70af06aecd57323246e089df0842d4e5dacb3d7ae14b
gegl04-0.4.34-3.el9.x86_64.rpm
49d98aae79b428b62cbfa78a1861469e39c6ad843e5e8f2b8c1a85a5a7df2a0c
gegl04-devel-docs-0.4.34-3.el9.x86_64.rpm
945322bf200a604877e9404b07f868f402e8cb33da460a3b0ec0db9943c25671
gegl04-tools-0.4.34-3.el9.x86_64.rpm
c3f4f2506ded6bd6ecb59d67d874f7ef324b8b64455ba2446d7b6bf4f48fce94
RLBA-2024:2175
tpm2-abrmd bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tpm2-abrmd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tpm2-abrmd-2.4.0-4.el9.i686.rpm
07362c19135b04d1d3e478331f5587dcaea00243d6824720d6a05415a7781c7c
tpm2-abrmd-2.4.0-4.el9.x86_64.rpm
2f2b973edc7178fd4d29945f1ce8f665d19352b716393af892e804a667a4e05b
RLBA-2024:2178
nautilus bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nautilus.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
nautilus-40.2-15.el9.x86_64.rpm
d541a87e8814c212a9d5902ab8968cd8233cf615590f9b9bd13dca49b374d3ae
nautilus-extensions-40.2-15.el9.i686.rpm
a0a869ad09c894f954f89c90aef7bc2ad08769438b215cfb8a90b1260e1c25ab
nautilus-extensions-40.2-15.el9.x86_64.rpm
abd06a0dda484eaadc04f96beb87fb488f055028628ffcc63a445e19cf030aa6
RLSA-2024:2199
Important: pmix security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pmix.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Process Management Interface (PMI) provides process management functions for MPI implementations. PMI Exascale (PMIx) provides an extended version of the PMI standard specifically designed to support clusters up to and including exascale sizes.
Security Fix(es):
* pmix: race condition allows attackers to obtain ownership of arbitrary files (CVE-2023-41915)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pmix-3.2.3-5.el9.i686.rpm
d3ea74f4ade7e7d87559cc2a021f0c31449de377704d9861f683ad874cefe6f8
pmix-3.2.3-5.el9.x86_64.rpm
32485c9b6a3f8c09002e9a784521aa2f59dba23347edf6758944626d6bd32186
pmix-devel-3.2.3-5.el9.i686.rpm
f6fc885eacf6480d3a7d4503651c030041e90934fa1d6e6d071789b5f88da34e
pmix-devel-3.2.3-5.el9.x86_64.rpm
1f7d525d3ef19aeea7f58443fb0ee361f55655694daee636873f8957118375cd
pmix-pmi-3.2.3-5.el9.i686.rpm
492cc7fdbbf635fe5951a3e79b8548032ffbfd95e9887e33f9697e2fbb7a82ef
pmix-pmi-3.2.3-5.el9.x86_64.rpm
e4de9928b42edadbc4724be5faa825926809265bc7aff7793a210cfb029deeec
pmix-tools-3.2.3-5.el9.x86_64.rpm
ba14508ed426b05e9b7775ae438670d185e929e04e812023cb681f7e0c02ca18
RLBA-2024:2209
google-noto-cjk-fonts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for google-noto-cjk-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
google-noto-cjk-fonts-common-20230817-2.el9.noarch.rpm
302b518493d06e6b2d266104db33e226d5a01170cd47f3d96c8b0dee1e5c9c78
google-noto-sans-cjk-ttc-fonts-20230817-2.el9.noarch.rpm
f224dc9d08a734f992c1ab5726d7b7f3ddff8aabf2861189bc0b7050bd8b3e2b
google-noto-serif-cjk-ttc-fonts-20230817-2.el9.noarch.rpm
d953bebf157753796138782c8225d71a77ec9172583f4dcef2e41e2fe9299c99
RLBA-2024:2232
papi bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for papi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
papi-6.0.0-16.el9.i686.rpm
cfd0331dac5ce40c3002c346cf402adbb935fb51bb9a440c6b2450e4e92b98f1
papi-6.0.0-16.el9.x86_64.rpm
0cd405721c3a73055c517345cad78d05581c86767ba56e72c558b6836c163b4d
papi-devel-6.0.0-16.el9.i686.rpm
12e518f56678509bd738216ec20602100eb570568cab2210bff88bc421802f61
papi-devel-6.0.0-16.el9.x86_64.rpm
f638f82758b900442f473d7809877e5c871b9656b6471699d9871094932cb4f0
papi-libs-6.0.0-16.el9.i686.rpm
460bcf9d422286d5e939af7e4cd67abd45e9ced8915c6750320fa604c0863476
papi-libs-6.0.0-16.el9.x86_64.rpm
d70b2a936f24a41917bc20095901785b5bc02b85b49596e8aa3b3d23c3880746
RLBA-2024:2273
libadwaita bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libadwaita.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libadwaita-1.4.2-2.el9.i686.rpm
8101398dd8fdf98c13b15153d8315841f95d3c743e3388a76a4c1750210e96a5
libadwaita-1.4.2-2.el9.x86_64.rpm
9a49b7f63b8f17962fc3245b2903fc350b8c4f9f553dc54642888ecd71898ad9
RLBA-2024:2296
libtimezonemap bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libtimezonemap.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtimezonemap-0.4.5.1-13.el9.i686.rpm
0caabf2c1ccbb9e2530aa40779e1f4a30ca0c65f42b2156a9fb05062e26afb73
libtimezonemap-0.4.5.1-13.el9.x86_64.rpm
de78d0c334d102b7507d92996e6c4cf9bee00df960bc0d197191e405d43f701d
RLBA-2024:2300
libzip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libzip-1.7.3-8.el9.i686.rpm
c460312a55aa535dc6660f1ae447834c40f51e3bbb48eb1bbc6df85c998ab2fd
libzip-1.7.3-8.el9.x86_64.rpm
4aeac47b95260b13bded303cca2e895bc5936b556703d7feb542881e525b1a19
libzip-tools-1.7.3-8.el9.x86_64.rpm
81a11cadc7daa60818fb90a5b189907474915738d1b3f2cc061a80d4cf09af85
RLBA-2024:2321
python3.12-scipy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-scipy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-scipy-1.11.1-2.el9.x86_64.rpm
0088b44014127c5043fca277f5798afea20da72f98731919949b54f7abb77a7b
RLBA-2024:2317
python3.12-wheel bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-wheel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-wheel-0.41.2-3.el9.noarch.rpm
28940dc20566f474aeedaab81f1006a56ffd02184ea7db2aa96f36f5299ca99d
RLBA-2024:2319
python3.12-psycopg2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-psycopg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-psycopg2-2.9.6-2.el9.x86_64.rpm
921770bb8003c560180cec2e58d0bac3024b4febf50ebaba3b9b1826fc6113c6
RLBA-2024:2330
gtk-vnc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gtk-vnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gtk-vnc2-1.3.0-2.el9.i686.rpm
91bb098c2e357e8d91c29a2b9418dd4d1f6a587694a52c80b93de544a206b16a
gtk-vnc2-1.3.0-2.el9.x86_64.rpm
b201478fa1fab9c364e4feed3595788a8d324975318484d65f3f5105760c0208
gvnc-1.3.0-2.el9.i686.rpm
9bfc47c771fbd39079ab22e3a54bd0d8e23ff4cc4b40aae7bb8ce1e7e3a2a925
gvnc-1.3.0-2.el9.x86_64.rpm
548410605bc23963b83ac7116f212d41b4c3eb352931a1aa9c0ba653a071ce1c
RLBA-2024:2334
liburing bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liburing.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liburing-2.5-1.el9.i686.rpm
c7f4f428f980fc3a8892b6cce4a03ec72a77b372c9ed1b27321cd05f9d3645fd
liburing-2.5-1.el9.x86_64.rpm
4156100a58ba1de50cf31d26e2efc398aea332a4c3bceb98c0b9a16452fea9f3
RLBA-2024:2339
python-ruamel-yaml-clib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-ruamel-yaml-clib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-ruamel-yaml-clib-0.2.7-3.el9.x86_64.rpm
a9a0971c8a7471ed9fdd4ff8ae994c773ed64a94188fa98ab276a71e7ed5ca1d
RLBA-2024:2350
pyproject-rpm-macros bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pyproject-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pyproject-srpm-macros-1.12.0-1.el9.noarch.rpm
1a5c9ea7910fc23befec1ed332c3729aa795f41849a3ad7673ebfb282cc9a7d3
RLSA-2024:2353
Moderate: mingw components security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mingw-w64-tools, mingw-headers, mingw-zlib, mingw-binutils, mingw-winpthreads, mingw-libffi, mingw-gcc, mingw-crt, mingw-filesystem.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MinGW (Minimalist GNU for Windows) is a free and open source software development environment to create Microsoft Windows applications.
Security Fix(es):
* binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 (CVE-2023-1579)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mingw32-crt-11.0.1-3.el9.noarch.rpm
c51230f416183e0c57de307d407e2ffba39f5c4090da825baba386b61741f5fe
mingw32-filesystem-148-3.el9.noarch.rpm
ec3132796ec36ed721b243022b478be4a6daf1d12aee2c81ead248ed61269fcb
mingw-binutils-generic-2.41-3.el9.x86_64.rpm
9f427f572607cb57bb40d5d6613be6b04d1666085b88f82f6c7be6a310ef8f88
mingw-filesystem-base-148-3.el9.noarch.rpm
7b01e206f79e561a50b62f94540ad910b9f52435ca135bb0872511c0685f788c
RLBA-2024:2355
expect bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for expect.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
expect-5.45.4-16.el9.x86_64.rpm
bcef638f64ddec217f154ba7b1d6a88ece428fe21c186c7b74dc3a0796cae1e6
RLSA-2024:2377
Moderate: zziplib security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for zziplib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: invalid memory access at zzip_disk_entry_to_file_header in mmapped.c (CVE-2020-18770)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
zziplib-0.13.71-11.el9_4.i686.rpm
467c09448b6739d457820606a767f94935885a61a4b402bad4963143aabc8478
zziplib-0.13.71-11.el9_4.x86_64.rpm
49d0e9ba7852f512cee2bee842fa0c54922083b428691c6934c804213ce4fc20
zziplib-utils-0.13.71-11.el9_4.x86_64.rpm
c91663ea12bd085ea3e523e04524167690fc58a95adb6a11ba2d397c6ef0a5d1
RLSA-2024:4756
Moderate: libuv security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libuv.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libuv is a multi-platform support library with a focus on asynchronous I/O.
Security Fix(es):
* libuv: Improper Domain Lookup that potentially leads to SSRF attacks (CVE-2024-24806)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libuv-1.42.0-2.el9_4.i686.rpm
5c31bcf9e0c60d2557c04ab16e5537ae91d51357cc0230e4a76818dac9756a49
libuv-1.42.0-2.el9_4.x86_64.rpm
9c633e2eec1ec0c2e9f859b30d21ee11a8722f7a356a6b7eaa42528303206581
RLBA-2024:4760
qatzip bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatzip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
QATzip is a user space library which builds on top of the Intel QuickAssist Technology user space library, to provide extended accelerated compression and decompression services by offloading the actual compression and decompression request(s) to the Intel Chipset Series. QATzip produces data using the standard gzip* format (RFC1952) with extended headers. The data can be decompressed with a compliant gzip* implementation. QATzip is designed to take full advantage of the performance provided by Intel QuickAssist Technology.
Bug Fix(es):
* qatzip: 1.2.0 update [rhel-9.4.z] (JIRA:Rocky Linux-41077)
rocky-linux-9-x86-64-appstream-rpms
qatzip-1.2.0-1.el9_4.x86_64.rpm
3b75e21e0078875871f95ff22bcc11f969b861ef836f4c4cf5b0a9c2e50b0f64
qatzip-libs-1.2.0-1.el9_4.x86_64.rpm
c940c373763e0494eeb99b96bdc0a37bdb600baf71a8de0292113fb95eac95d9
RLBA-2024:4759
qatlib bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatlib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Intel QuickAssist Technology (Intel QAT) provides hardware acceleration for offloading security, authentication and compression services from the CPU, thus significantly increasing the performance and efficiency of standard platform solutions. Its services include symmetric encryption and authentication, asymmetric encryption, digital signatures, RSA, DH and ECC, and lossless data compression. This package provides user space libraries that allow access to Intel QuickAssist devices and expose the Intel QuickAssist APIs.
Bug Fix(es):
* qatlib: 24.02 update [rhel-9.4.z] (JIRA:Rocky Linux-40921)
rocky-linux-9-x86-64-appstream-rpms
qatlib-24.02.0-1.el9_4.x86_64.rpm
e03575d24572e10d5919879963e1f3df5fcb995b5a996501fe4158f436cb5b06
qatlib-service-24.02.0-1.el9_4.x86_64.rpm
20273dfe3465437abe002819320da9a7771c46006976334bb3a719c9ca41b9e4
RLBA-2024:6180
libwacom bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libwacom.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libwacom packages contain a library that provides access to a tablet model database. The libwacom packages expose the contents of this database to applications, allowing for tablet-specific user interfaces. The libwacom packages allow the GNOME tools to automatically configure screen mappings and calibrations, and provide device-specific configurations.
Bug Fix(es):
* Backport libwacom updates for Cintiq and Intuos Pro devices to Rocky Linux9 [rhel-9.4.z] (JIRA:Rocky Linux-53014)
rocky-linux-9-x86-64-appstream-rpms
libwacom-1.12.1-3.el9_4.i686.rpm
3cddbe09b6a16f4f11af41dc7c230c65e8b204a85b5bbd54dc545e70c90c1f29
libwacom-1.12.1-3.el9_4.x86_64.rpm
923c7d8ab3dd96a7287419acb91631f417b4fe8cb80e862aab19c0b52735bca7
libwacom-data-1.12.1-3.el9_4.noarch.rpm
88a411167bee34df4c11d3f9396a36b2c73b3a348b2e77276e28a2cdc9d26569
RLBA-2024:6182
libblkio bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblkio.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libblkio is a library for high-performance block device I/O with support for multi-queue devices. A C API is provided so that applications can use the library from most programming languages.
Bug Fix(es):
* I/O error on a vhost-vdpa blk device using directsync cache mode [rhel-9.4.z] (JIRA:Rocky Linux-53566)
rocky-linux-9-x86-64-appstream-rpms
libblkio-1.5.0-1.el9_4.i686.rpm
db6ad045393ea741385a432227f1d01f76fe6849b0994bd6187b4040fa2213c9
libblkio-1.5.0-1.el9_4.x86_64.rpm
cf8e04ee37c96440b80c87739cc3d66127ab6345985e13abe33d9b49ab9d1093
RLSA-2024:6197
Moderate: ghostscript security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510)
* ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869)
* ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ghostscript-9.54.0-17.el9_4.x86_64.rpm
15489effe2f0301e148ee63e3223d43ecc3e4da06b26627001ee298e062cdc57
ghostscript-doc-9.54.0-17.el9_4.noarch.rpm
8fc380d55d4895e82633bd5003f45094ce9ad8dbf862ca0d810bdcbcdef062ff
ghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm
ab2dcde21226cab3180a4386fd6f2d47a715570e2e717d2e303d2d3336ec034c
ghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm
3ddad590bf383ea2e95149b572afb328612494d6c3a16684930aac1a143da836
ghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm
ba1ec6a5268f06e1b64287f65849647f6d82bc1eaf53ded828aee82169c376dc
ghostscript-x11-9.54.0-17.el9_4.x86_64.rpm
edf9284756cb04c4afa3864133be4b6c68cb2faf25440a7080247732838988bd
libgs-9.54.0-17.el9_4.i686.rpm
b260e17cc12e158a0c1825415d68fb62646c750b0c270e7167526f130cffb6ad
libgs-9.54.0-17.el9_4.x86_64.rpm
863d2e89d8404a002c559d5a87e8cfa617539103507e5db923d73a844fcb254f
RLSA-2024:6356
Important: bubblewrap and flatpak security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for flatpak.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces.
Security Fix(es):
* flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-1.12.9-3.el9_5.x86_64.rpm
80eacd4468c3f7f76b7750d862f89d23b46e475d3d7c337eafac8dca204fc36a
flatpak-libs-1.12.9-3.el9_5.i686.rpm
2aaaf694f61da1d2942f876500edd4e652eafca864a1618e363f37b37fbbcd2b
flatpak-libs-1.12.9-3.el9_5.x86_64.rpm
74b4b7d4cb8a41a1ff43b5694e3f19b5d2343bb77d5405f89d9a9e650bd63ca2
flatpak-selinux-1.12.9-3.el9_5.noarch.rpm
9a7a53e33d124e6838a778da95590442fdd3b984734b618807ef14ffff2e2194
flatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm
b50f940198df8ce8868e962728202d50fd8711058a41c3e64ee4653bec2866ba
RLBA-2024:11220
ant bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for byte-buddy, jzlib, xerces-j2, xz-java, xml-commons-apis, jdepend, regexp, jakarta-mail, junit5, assertj-core, univocity-parsers, jakarta-oro, objectweb-asm, hamcrest, opentest4j, ant, antlr, apache-commons-logging, junit, xml-commons-resolver, jsch, bcel, jakarta-activation, bsf, apache-commons-net.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Ant is a Java library and command-line tool, which drives processes described in build files as targets dependent upon each other. Ant provides a number of built-in tasks allowing to compile, assemble, test, and run Java applications. Ant can also be used effectively to build non-Java applications, for instance, C or C++ applications. Generally, Ant can be used to pilot any type of process which can be described in terms of targets and tasks.
Bug Fix(es):
* ant: Add OpenJDK bindings [rhel-9.5.z] (JIRA:Rocky Linux-62405)
rocky-linux-9-x86-64-appstream-rpms
ant-1.10.9-11.el9_5.noarch.rpm
1c4aec9df75cab4de1294af4857af0bf672528f1092044e2c38fe7a00a363cd1
ant-antlr-1.10.9-11.el9_5.noarch.rpm
fd0895435fed9892fe409db9e3cdccb6d1496630afd651a53060ddfd17656d1f
ant-apache-bcel-1.10.9-11.el9_5.noarch.rpm
a7e1449ca05cc60924b0f873a8abea8f5d6d3e646a7aca9600f08c73539b1acc
ant-apache-bsf-1.10.9-11.el9_5.noarch.rpm
a0c5e55694e0e37e34965f7043de9479ffb6140c74439d2557d56cd4bc9ad199
ant-apache-oro-1.10.9-11.el9_5.noarch.rpm
8566017758aefdd542ce6a62041e6a9b2b988dd03388ba38027e345f1cf04875
ant-apache-regexp-1.10.9-11.el9_5.noarch.rpm
11cba04f4e37ce2e7d30df42da5d5f96dbf7fa60ce8f2bbb316415d4f94faf36
ant-apache-resolver-1.10.9-11.el9_5.noarch.rpm
79fd9596a8c0fabe630789988b9dab3f4a4ef680c2cc3d0c90ca8e0dac8a9bcd
ant-apache-xalan2-1.10.9-11.el9_5.noarch.rpm
c3bf010e5d5f1905da74b5d71b00262e5c35c1b5e834d0a7e52d59fe650639de
ant-commons-logging-1.10.9-11.el9_5.noarch.rpm
04dc67de448d8ccf06e32df1367c261b262ff0a988cbe175e5fcb4e4b9cc8285
ant-commons-net-1.10.9-11.el9_5.noarch.rpm
992b63b67a5acb6ed48f8e3bf9839434fa060286ffd325bc3ff314b39375690e
ant-javamail-1.10.9-11.el9_5.noarch.rpm
acdea8988cb8ad841f69c8f0d82d58299a1f1205ee87c4ed7daa314e77c4a1c0
ant-jdepend-1.10.9-11.el9_5.noarch.rpm
a8fb999950207209ef4c34383116ae9c04450519ef1ab7f74ded8e8da9f98853
ant-jmf-1.10.9-11.el9_5.noarch.rpm
ef28afc8865422dadc6bb86ba330f0b67c9ddca6fa72cdcda09568ebc5ad8342
ant-jsch-1.10.9-11.el9_5.noarch.rpm
6496ed6fdee2705ef1c1560aaddd82a828df453d4c348432545936e08f9a51af
ant-junit-1.10.9-11.el9_5.noarch.rpm
4445b849b6262d1e436af9c80a07cda70b3a4325910e20a67a8058780c488d1e
ant-junit5-1.10.9-11.el9_5.noarch.rpm
4423797ac4487eb43fde4fc1c7974548c3b6ee29077a6b3011063d91ba9602ab
ant-lib-1.10.9-11.el9_5.noarch.rpm
f9519570cb3bfadf8674b0d94f3daff63bfd4757b6efb789e64ebcc8d52fc762
antlr-tool-2.7.7-70.el9_5.noarch.rpm
f88990fec7ddf6acfc00756aa843f9b6d1e72bf38cd47d713146c3be8921e249
ant-openjdk11-1.10.9-11.el9_5.noarch.rpm
d4ca711c2c1be3203f4a7538fe203bf6b4c15939c09ab36e0bdd05dda79e192b
ant-openjdk17-1.10.9-11.el9_5.noarch.rpm
726a562b2251c710c7841a57b7733bf67bb026a40c62992059f3fdd6702a0699
ant-openjdk21-1.10.9-11.el9_5.noarch.rpm
751586f497071e427a77b2ee39acd10bfea31756ec0917e4e6e7132ca0289b24
ant-openjdk8-1.10.9-11.el9_5.noarch.rpm
8e24e1c573386fec69a9a08c78b9b136de56933ecbf84ff1cbe54b24e9ae85d4
ant-swing-1.10.9-11.el9_5.noarch.rpm
02b8d80681a15db831af32a9e8088cd0398318ce00bd33d523e89742f8ae84f0
ant-testutil-1.10.9-11.el9_5.noarch.rpm
c6d005d7aa725d9ae2a0970e65acde476f13041cd825edbcf99c36a91724242b
ant-xz-1.10.9-11.el9_5.noarch.rpm
698e387118a0629fab8c10853894d5483f0abac29ebd19e78271128f97c13d1b
apache-commons-logging-1.2-31.el9_5.noarch.rpm
076fab2c3b13fde2586fd82249c221f73bde11eab292e4505deb1b24084facc3
apache-commons-net-3.6-15.el9_5.noarch.rpm
66bf86679254ccfc645f40aa5753d2519727ce34afa85aeccb90b9227568ca57
assertj-core-3.19.0-6.el9_5.noarch.rpm
41c3093573d2c707bd0b6cfc9101bb9cf5891374970cb1f65eaaa9963cbd5870
bcel-6.4.1-11.el9_5.noarch.rpm
9cf2f0c13b6eab7a1000bafa2ce6ae999e1adbc1e894fcd55b78ddb871aa69f6
bsf-2.4.0-45.el9_5.noarch.rpm
d77224d70e968e3a391a33dd5cc6fbf7a9036d2e5a64d61ea7d47ffcd7c02913
byte-buddy-1.10.20-7.el9_5.noarch.rpm
9c1cea78988441136bff9f04326b7a1a3e302cfefe716190ea855ce2424148eb
hamcrest-2.2-9.el9_5.noarch.rpm
106ca09fc8a2883044fb05d04bac90bd8426fad1e1b2f7c67e3d291bf16f7654
jakarta-activation-1.2.2-6.el9_5.noarch.rpm
95bd815ec51166ce25ccca83a52d23cb36942e4713d34bc0c24fc9bde1b87966
jakarta-mail-1.6.5-6.el9_5.noarch.rpm
e792e337a6a3c5c02555a36179b7abdf12bacc6015a68e7618e6bc0ebbd9e67f
jakarta-oro-2.0.8-36.el9_5.noarch.rpm
ec9cb2cfc39d6038d4a9eac891276cd082d77b60b90af405aaa03bdde3e29c86
jdepend-2.9.1-29.el9_5.noarch.rpm
8f32f06bc130f7000cc62a739fb59e849b05c25aa7a3ae20c3bb23e0a7d8aeab
jsch-0.1.55-6.el9_5.noarch.rpm
c6aa4517b05bb15d44a31f08523f267c4bfe1fe435d95e939eb8497cd2770a92
junit-4.13.1-7.el9_5.noarch.rpm
2687ac5a0b2fcad707eaf307ccdbbbac76fd01e4ab788fec7f98b3c3240aee37
junit5-5.7.1-6.el9_5.noarch.rpm
410120c1f750c87af60e9e3f2884cb3cd9b2d4ce343f862552bf4c37d97f9c5a
jzlib-1.1.3-21.el9_5.noarch.rpm
819b86ff0674102366f16bf647966be7815bef7706ed7f775bceff6bbecd231c
objectweb-asm-9.1-6.el9_5.noarch.rpm
4364992df6971959294b679dd537c6ae3138efa444cf5bd5064ab8268332d8ea
opentest4j-1.2.0-10.el9_5.noarch.rpm
1f26cc5b507705f16e8c2aa9ff0689957c67b2adbc9d127659913931f24579f1
regexp-1.5-39.el9_5.noarch.rpm
78ea3c07047dd4116565f7f956b32e56b20f23af8ad334622437e7d40a16bea0
univocity-parsers-2.9.1-6.el9_5.noarch.rpm
40443d59904066181bca1363d29a8b0aef5787e27884a263ddbc8ece8d66ea31
xerces-j2-2.12.1-8.el9_5.noarch.rpm
8295da0ac0c1e1f1fd2969f1ea79583944873aca707ad48d7dbc4f2069a9ff09
xml-commons-apis-1.4.01-37.el9_5.noarch.rpm
ea0b78bea7bae81ba063bb65a7cc56de729fb929fee9de7a1b06a302075b35e6
xml-commons-resolver-1.2-39.el9_5.noarch.rpm
994f345c1d9800affa35087c86e51a44051a1c3fb04241015347923f1ab0544b
xz-java-1.8-15.el9_5.noarch.rpm
e6d96628b59b81e9a33f75fb34ddf4a03f0ec0328d5ce40659da5ff550650175
RLBA-2024:11222
maven bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jansi, cdi-api, google-guice, maven-wagon, plexus-cipher, guava, maven, httpcomponents-core, jakarta-annotations, apache-commons-io, maven-shared-utils, apache-commons-lang3, apache-commons-codec, plexus-interpolation, plexus-classworlds, sisu, plexus-sec-dispatcher, jsr-305, maven-resolver, httpcomponents-client, apache-commons-cli, plexus-containers, plexus-utils, slf4j, atinject, jsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.
Bug Fix(es):
* maven: Suggest maven-openjdk17 [rhel-9.5.z] (JIRA:Rocky Linux-62398)
* maven: Add maven-openjdk21 [rhel-9.5.z] (JIRA:Rocky Linux-62407)
rocky-linux-9-x86-64-appstream-rpms
apache-commons-cli-1.4-18.el9_5.noarch.rpm
04da72630479a92a25157004a1f09bf525f091769f6c4fa13e7ef5aaffb08fbc
apache-commons-codec-1.15-8.el9_5.noarch.rpm
894241cf0e45528ff00118c2b6ad79550b63f89c0f8b77b79e58254c2115f06e
apache-commons-io-2.8.0-10.el9_5.noarch.rpm
46413f0bf2810291d66d0dbd0992471c684580eac73cf295e99e066dbe98e174
apache-commons-lang3-3.12.0-8.el9_5.noarch.rpm
41eeb78b8c9bbcf4b6efcc7623b7c5ae7e988a707be02824cfa9eaf68afba8b6
atinject-1.0.3-7.el9_5.noarch.rpm
19c4267998818ee76f2a9d8d9edbd24c4135a73928f9d5e7cbf65066b7aaf1e6
cdi-api-2.0.2-7.el9_5.noarch.rpm
30883769f6b0d175e2bfaba213bd7a29aebb3c84ee084b8ae4cd4b858182e208
google-guice-4.2.3-10.el9_5.noarch.rpm
334c479a28c490f9576db65fea67ecfcaef04c53bd87ea850867d91b3477144d
guava-30.1-8.el9_5.noarch.rpm
4edf35bc681794407fa0be5e0fe5a3207bf911c7b44f4e792b7e1bfb0ddf90e6
httpcomponents-client-4.5.13-5.el9_5.noarch.rpm
ad92ab286f6db164dca0abb39750fef669036ad35fe24cfcac6362425dd7441c
httpcomponents-core-4.4.13-9.el9_5.noarch.rpm
0400ad0c9a620f5981ab8b59405b6c7a3b89e1c5515716f184734cad896b97e8
jakarta-annotations-1.3.5-14.el9_5.noarch.rpm
b3eccaf167c17ba118e753d1f55ef44ded9a4012df2506478e8e84eb0fc86b8b
jansi-2.3.3-7.el9_5.x86_64.rpm
7339bd473e9b3b0b37a0515a259a9151761e7bd22242c07a0e82599bbbae1ec8
jcl-over-slf4j-1.7.30-14.el9_5.noarch.rpm
9459a36182b0dc723c6bbdb0218e4b84d93647b3f13c401306344c7ac38cec05
jsoup-1.13.1-11.el9_5.noarch.rpm
fd55edecef7f15eaf622d160d39136b057331e042b336e8072ea86291e63fc9b
jsr-305-3.0.2-7.el9_5.noarch.rpm
d8879d3aa5d1f5044eaee485261ec351180b953366a948ed7c07ed0132b6c400
maven-3.6.3-19.el9_5.noarch.rpm
af1c37b6d579fd7ffc59f0c906e8a0c5c2785d594a20ebf1776f8b7c20b1f31b
maven-lib-3.6.3-19.el9_5.noarch.rpm
d22cb618f580cf1704810511dbce01855a5228b414f00078a17f905a93a8d234
maven-openjdk11-3.6.3-19.el9_5.noarch.rpm
b95fe7b253b702421288c2be6db001ac5d5141151a50b5bc6b1facd460bd6afe
maven-openjdk17-3.6.3-19.el9_5.noarch.rpm
0e34cd602afc5fa28200378674fd1d74d29a2ff27f07682e76a51e5e01be5b46
maven-openjdk21-3.6.3-19.el9_5.noarch.rpm
4db0384edd684b1c06e3ee1b10e11b10464f322f664e724e5a818dd0b0734669
maven-openjdk8-3.6.3-19.el9_5.noarch.rpm
88f390b45a57ad969f0dff4b8b0a9f0b34fbc23220c0dfa4921bb547515d3259
maven-resolver-1.6.1-12.el9_5.noarch.rpm
a6cf8c57f9e4230917791e3fcc27c5c750b19424cdc1406537285281099f3e63
maven-shared-utils-3.3.4-5.el9_5.noarch.rpm
0417d35e3c4bcfc9a5e0aa52febb6bca767e6c0c46dd06373b5a30314ac32fd5
maven-wagon-3.4.2-8.el9_5.noarch.rpm
32059059feb662305e159ace4fe3b40477411b836727c6190accc52caf1148f2
plexus-cipher-1.7-28.el9_5.noarch.rpm
3dacbcb72e638900a781f086fb1475876834496c6ab2a0a31b6674672cae9477
plexus-classworlds-2.6.0-12.el9_5.noarch.rpm
9fb6fb8af81afaa50c0e4f6c5cbb8238fdd65209e59c71305309d20df5dbb703
plexus-containers-component-annotations-2.1.0-11.el9_5.noarch.rpm
eac8aafa8d7cefb2cbb37a0138d2995219898cef6f9914f2298bd523b8845554
plexus-interpolation-1.26-13.el9_5.noarch.rpm
ba9a92ade4c70fcffbd28e0ffdefaf60b994a138b674f80c9bfb80ab9c7de598
plexus-sec-dispatcher-1.4-39.el9_5.noarch.rpm
efeda0b1ee009ede8b11517d9ec0abb181677edb9e96337cdc097cc1d2e76b29
plexus-utils-3.3.0-11.el9_5.noarch.rpm
24fd272c4742e8d18371c7ea998e8f0e8f367f9c701fd4cf26cede84ffaead16
sisu-0.3.4-12.el9_5.noarch.rpm
7015eb49550303d7ea5657968d35f583fb3de41329e122f7c9fa39fc60215ac0
slf4j-1.7.30-14.el9_5.noarch.rpm
795803c0ee2023607c2e6dd3922930ccd4aa5b8a20ec3d55d196fd7074dac508
slf4j-jdk14-1.7.30-14.el9_5.noarch.rpm
a44926d065682a8a1ab13d15b5b6d8198ce580bb475442f4df1612df99743df3
RLBA-2024:2134
xcb-util-cursor bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xcb-util-cursor.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xcb-util-cursor-0.1.4-3.el9.x86_64.rpm
c48d4f5cff29ade91a6478b44e8b06ac9309e9455ee18ab99fb708f94e966e18
xcb-util-cursor-0.1.4-3.el9.i686.rpm
536e3858f16112548dda5f644591346e77880d02b82bddea09369a26c6a0abbc
xcb-util-cursor-devel-0.1.4-3.el9.i686.rpm
640d133df67aba41efd47b7d52150b283271ab9be15bce59f841f13899b2a386
xcb-util-cursor-devel-0.1.4-3.el9.x86_64.rpm
301317f7caa899d8fbe852f616982db57f331b470ea914af7547f948b7c10058
RLSA-2025:18321
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: firefox: Memory safety bugs (CVE-2025-11714)
* thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709)
* thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710)
* thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708)
* thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715)
* thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.4.0-2.el9_6.x86_64.rpm
5da614a3eb66576a30bb2f58780d5430df2b41e40a91e4fb04d420b2940964e7
RLBA-2024:2139
pixman bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pixman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pixman-0.40.0-6.el9_3.i686.rpm
da487fd3e58203be67933398e63c88a0cf584b78e29870f178a0419e1903d30b
pixman-0.40.0-6.el9_3.x86_64.rpm
f90f7b61c355aae65c1c94ab19a6538212ba4f64236457fee42793710331321c
pixman-devel-0.40.0-6.el9_3.i686.rpm
033ada248bb6ae729bef27027af04e91c8f9ce6f4ca5d229125dcc17301dd41b
pixman-devel-0.40.0-6.el9_3.x86_64.rpm
c156955e73d9edf4b78c13a26a44dcc1970a15f82c070d20b704f266fce9f9c8
RLBA-2024:2138
hexchat bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for hexchat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
hexchat-2.16.1-1.el9.x86_64.rpm
71749a0d3f91b0ca0ae9caa6b233970309a6a54e76de687c7ce6a82d5fd02b1c
RLBA-2024:2143
container-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for container-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
container-tools-1-14.el9.noarch.rpm
6aefbe6ecc2b86b10fcc5940e8323e6cf3095dd046ab030446e2328243934e2d
RLBA-2024:2148
evolution-data-server bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-data-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-data-server-3.40.4-9.el9.i686.rpm
8b6f9a14de82145ea069ca8a467b1f7fe74c89a292b054dae536e13b5ca0420d
evolution-data-server-3.40.4-9.el9.x86_64.rpm
8ec8132e4fc15b05c0a84399626f0373edff9a86f02444202640861ecc1d5f54
evolution-data-server-devel-3.40.4-9.el9.i686.rpm
0e98e15dec04ce6ca33510feab368e134a8cbb084ab198d597a9ea1dc95689c9
evolution-data-server-devel-3.40.4-9.el9.x86_64.rpm
8c28a38536cc9a2419269a6e546a3f518fcb109ee84153ae12418918c0343729
evolution-data-server-doc-3.40.4-9.el9.noarch.rpm
16c5a08f942847ec4b817e4191dddfb0a571a1c1aa5e12110c600acb277880e3
evolution-data-server-langpacks-3.40.4-9.el9.noarch.rpm
0cec2d5e0b6f21e16417c45df72c91c18b3f889926c98f42b8f6cc3d0ccd6bae
evolution-data-server-perl-3.40.4-9.el9.x86_64.rpm
081305cab753a2fccf196fee639851fdc8700ffa26331a5a4eff16b2e7bd4800
evolution-data-server-tests-3.40.4-9.el9.i686.rpm
545197cd2a908dcb2e6dc86fb38577d1f15040b5aa862aa3cc69bab3de53e92a
evolution-data-server-tests-3.40.4-9.el9.x86_64.rpm
9e87d78681e21e551507686dd1ec1a538e13c221102685261e3cfc3088875ac9
evolution-data-server-ui-3.40.4-9.el9.i686.rpm
94b597cdca328ae3c025a63c70e6e45e1542577c33da7eacb880c443291bd672
evolution-data-server-ui-3.40.4-9.el9.x86_64.rpm
c3768a81fa81b138e462e7d0249dfe287ab039a4d00f9497926c83f0fd3d553f
evolution-data-server-ui-devel-3.40.4-9.el9.i686.rpm
198fdd59ae48c2e2688de95b69072ae18c7032026cfb150f0ecf4ac9024f0044
evolution-data-server-ui-devel-3.40.4-9.el9.x86_64.rpm
6164be553136a47121c821e17cf94a90a2bda6d3d31a99a07863136e7ea23a7d
RLSA-2024:2146
Moderate: libXpm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libXpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org X11 libXpm runtime library.
Security Fix(es):
* libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788)
* libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libXpm-3.5.13-10.el9.i686.rpm
75e073b0e5ed1bdba7aa1812a28c882d632c8e6cbe3c944b5ecb293c832ca08d
libXpm-3.5.13-10.el9.x86_64.rpm
067d8be7d78ec2a42ea86d23592c6ab083ea36c361bc612ed4ea2560087d80b4
libXpm-devel-3.5.13-10.el9.i686.rpm
2f2affd48eb946a5006989b7114da9d4a756ba6becc3db03f25d72497e36c44c
libXpm-devel-3.5.13-10.el9.x86_64.rpm
405b5e018ef816a859c40521f243c7156184c02eb78a940248bec3ce02929bfe
RLBA-2024:2144
libkdumpfile bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libkdumpfile.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libkdumpfile-0.5.2-2.el9.i686.rpm
b4a0a3ac89b97ff762927e257a2b02210d96b5264b68348bb6de5c96dfd5cc89
libkdumpfile-0.5.2-2.el9.x86_64.rpm
070236a9b2d05979b5e3b67ee33ffbf8c4acf266eef5eaf66d28587b577ac495
RLSA-2024:2145
Moderate: libX11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libX11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libX11 packages contain the core X11 protocol client library.
Security Fix(es):
* libX11: out-of-bounds memory access in _XkbReadKeySyms() (CVE-2023-43785)
* libX11: stack exhaustion from infinite recursion in PutSubImage() (CVE-2023-43786)
* libX11: integer overflow in XCreateImage() leading to a heap overflow (CVE-2023-43787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libX11-1.7.0-9.el9.i686.rpm
34b2f17a30de2ed6c1cdf43ee2d524ce9c616f9d236c5c018b6bf76f04ec02ca
libX11-1.7.0-9.el9.x86_64.rpm
bd4fb0a4223fb3d842cf476a895869abb455e69e456535bab81fd0341c3ef8cc
libX11-common-1.7.0-9.el9.noarch.rpm
bc6997ba2e9741f99446ecd29ecdd2730adcba45aeaf7ab286a953a1fb936083
libX11-devel-1.7.0-9.el9.i686.rpm
b054456e38df83ce62b6952403e97cf93407b6c5ac66dc9275ec6016fd13b746
libX11-devel-1.7.0-9.el9.x86_64.rpm
3c7e327d39e21d365a71e7f00ad8b15eac95109361de60397ecb915dae1ff726
libX11-xcb-1.7.0-9.el9.i686.rpm
0e69f769a446745b18e74414e3e1dc9d713b1c063f456f892fadce1692c2159e
libX11-xcb-1.7.0-9.el9.x86_64.rpm
c92a3188c44a3f0e760bd1c6e580f814d814aa538957a0bfc6d0f5e04df7c976
RLBA-2024:2151
gcc-toolset-13-binutils bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-binutils-2.40-21.el9.x86_64.rpm
9f1adf1f31a928cc654c5ae11cc0c4feca8d52e224fd2ce2c72f3ebdfa838e7f
gcc-toolset-13-binutils-devel-2.40-21.el9.i686.rpm
da9a433631e27e493924bcf792da4551dfec158d37e65d8ffe0a1bf30063792f
gcc-toolset-13-binutils-devel-2.40-21.el9.x86_64.rpm
eb927a00b3ff5a13032e6df44f3ed3e4c61a6d2627a3583879d6386cceed50b4
gcc-toolset-13-binutils-gold-2.40-21.el9.x86_64.rpm
ef17f2b1eb1ecff56970010d56fc9470fc3573cf07305789f5621928f4731cc9
RLBA-2024:2173
libblockdev bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libblockdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libblockdev-2.28-10.el9.i686.rpm
a5ed25900523410cfd88e7f908b547fb16d24c308797acd56889032516f22aac
libblockdev-2.28-10.el9.x86_64.rpm
e44ff53b9c974d1646a8a622e0af3f27621196721920956eb213291b9d74c33b
libblockdev-crypto-2.28-10.el9.i686.rpm
d287e44eef3443efad013987ee90da5a9410af7ead940186e0b2538dfd64cefd
libblockdev-crypto-2.28-10.el9.x86_64.rpm
148aefffb89821910e2fb80786afb8237fe0a2430fc492ac4edfb3c6c3d4320d
libblockdev-dm-2.28-10.el9.i686.rpm
c39ac1054bc620eb646b7810eee021dd3e59cba00b166e7e6526cd3d9c2c6378
libblockdev-dm-2.28-10.el9.x86_64.rpm
ecdfd7a25b082c2eedfc8c8acab924b2324586ea152ca8db4d0261ffd3fb2723
libblockdev-fs-2.28-10.el9.i686.rpm
4fb8ebf7df2c1b12110391277962dcb24cb2d7e591c3e50347aaf27f460a2e62
libblockdev-fs-2.28-10.el9.x86_64.rpm
6ba19b8ea755760d9a8c76ea9183c080e98ac8bff6ac896d11c88cdd49078e9d
libblockdev-kbd-2.28-10.el9.i686.rpm
ef682c7662af6afdf3e1bf1ba562da2b20af62eb7c76d9bae406716489d1b24c
libblockdev-kbd-2.28-10.el9.x86_64.rpm
8734ec14285b9af361289cc7ec5a27cd4b4fa6b18aec237fdf1079f1bc616860
libblockdev-loop-2.28-10.el9.i686.rpm
d9f3e25adf08fc64332a53e7b3d6d3c04c692d325bf48cf35269e749510e215b
libblockdev-loop-2.28-10.el9.x86_64.rpm
eeda2f3f6769c80c6163cd66f0a2cb3771ffe6e32bd7cb1a2d0d02a7484ca3d8
libblockdev-lvm-2.28-10.el9.i686.rpm
4e184e1373a55a27f6db3d275b943edca5c6c4274aed5cbf379356a5bbe62f96
libblockdev-lvm-2.28-10.el9.x86_64.rpm
dc60d66d0ea6fa938801200f1ba5aecd907706dd52fdbb457702a3ae5da299d2
libblockdev-lvm-dbus-2.28-10.el9.i686.rpm
fdd339a4c0768e35e7cc8fb7aa376e428125ba5b38fdeca48722f3b78d5570b3
libblockdev-lvm-dbus-2.28-10.el9.x86_64.rpm
02d0e680a064ef80d0141c8994e2a1cc47b09b27d9baca711ec64015e314396c
libblockdev-mdraid-2.28-10.el9.i686.rpm
91f7fbf0815659c4aff068046f3aa68da8605067515da1005aae02f41b9f8d95
libblockdev-mdraid-2.28-10.el9.x86_64.rpm
88fde156d7154c26a843c16fa8b15b08516540179d11f9c51d642a143ef68542
libblockdev-mpath-2.28-10.el9.i686.rpm
d4cebbb57ee3c783bdf23252d5cdeac6ce573f0e4721201aec57f243738ccf42
libblockdev-mpath-2.28-10.el9.x86_64.rpm
8a2618010cbc9ecb0fc63bbe40f3b9d62f8c2a5deb7c5939b699108cb4cd79e7
libblockdev-nvdimm-2.28-10.el9.i686.rpm
7ae29a1d32e1a87aeb891086e0e92298646e924cfe43675c60ea017d19805cd7
libblockdev-nvdimm-2.28-10.el9.x86_64.rpm
8c9a6d65ce5b2b469ffb60382faa421c624988b1ccb41d25a9fafb185c065ac0
libblockdev-nvme-2.28-10.el9.i686.rpm
eadf4dca61f4ff0f2a63fdb44cc69c322366e35d5870941081c4dc203917d2e8
libblockdev-nvme-2.28-10.el9.x86_64.rpm
a5ef56ab0c579839f1a19c0839a91d1286e5ab15ea0a23035e632c799bd823c6
libblockdev-part-2.28-10.el9.i686.rpm
fc71fad445a8a8f7c9169e371933ef4dd590a0d6768e4d79f924381f236b17e3
libblockdev-part-2.28-10.el9.x86_64.rpm
f6b2f3306aafef32843e30983273c87e5649a1fb3eb0c05e7c57e070e8ab6956
libblockdev-plugins-all-2.28-10.el9.x86_64.rpm
dd55369f9c733fcc9fded079f43e7d9b50fa34eef11d120f5f418b3f235a16a9
libblockdev-swap-2.28-10.el9.i686.rpm
f3165c018b9b2db5df52bb89b7a465114cec597c2096ea3ad4cdc24b237ad24c
libblockdev-swap-2.28-10.el9.x86_64.rpm
66ce03a02b8b6a2babce38224d33ace584cc16a07b7018584d9aa93f8baa4861
libblockdev-tools-2.28-10.el9.x86_64.rpm
d9ec549fe5c08439b02f0abc4a0a991672adb80682527404f74ea15d789f43ce
libblockdev-utils-2.28-10.el9.i686.rpm
59db799c9fdf16c19f8cfe03ec41aae4e644e100dd1b1f2e9832f830c9335098
libblockdev-utils-2.28-10.el9.x86_64.rpm
835f6fe3d28d80837a8273ec9aa57ab60cadb1029570f786c2d6a07e4949b886
python3-blockdev-2.28-10.el9.x86_64.rpm
3ff3b458323b3413b7f410f200fa192b06292be3fe42c7eef414e1ac5e6248a2
RLBA-2024:2154
liberation-fonts bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for liberation-fonts.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
liberation-fonts-2.1.3-5.el9.noarch.rpm
ac2caee9c12142279d3702ac9ecb20dccda9e24863d4ff958b8e70d5221a9763
liberation-fonts-common-2.1.3-5.el9.noarch.rpm
705782e7cac23d8e15e81fddce10d3e0e8a61e0b6ae319d6ac357450eaa76b11
liberation-mono-fonts-2.1.3-5.el9.noarch.rpm
4ed9f623b22ebc5c076832b0b14ab1eade6dc77d2e3bbe89eb051d69cf50023a
liberation-sans-fonts-2.1.3-5.el9.noarch.rpm
bcb1a77deb5672b9246be90f4b025cb9387d0f6875f7a7be7cef65c303cfc0c3
liberation-serif-fonts-2.1.3-5.el9.noarch.rpm
ada0d431df4a0b2ae1cb50ff48244266e811ae1328aad9d795c0ecb8a260dfab
RLBA-2024:2161
gcc-toolset-13-gdb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-13-gdb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-gdb-12.1-5.el9.x86_64.rpm
31eb6071466b79b1142e80d25b010ea8a6ca40035818582b35fda22fd0193c47
RLBA-2024:2164
virt-manager bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for virt-manager.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
virt-install-4.1.0-5.el9.noarch.rpm
b6f49e815a392e8e03792c296d1d6f4b119efc53e3a28777cf6ef7f6cb767a55
virt-manager-4.1.0-5.el9.noarch.rpm
5ad7fe3702c776ff7361f4e2f3576aac8fc441667487adcc957fa363588f83ad
virt-manager-common-4.1.0-5.el9.noarch.rpm
449cf3f7e66ce03b1b1ab92cf77e2f4bf66a3b630f5144c74b2282e180ad8d9c
RLBA-2024:2177
targetcli bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for targetcli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
targetcli-2.1.57-2.el9.noarch.rpm
5f068b951129f3be275380a07d2dec468c3eddb10fbb9bc9e544bdd244b7f77b
RLEA-2024:2176
python-rtslib bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rtslib-2.1.76-1.el9.noarch.rpm
11c281f21d6ab5c35204b79c843c5a2795f01783e0b96a16959c97bc3991b06a
target-restore-2.1.76-1.el9.noarch.rpm
20e46d5fab92e99ad70e6a06f67ba7d896e46ec5c7e57aeda46be92d9811261f
RLBA-2024:2187
stratis-cli bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for stratis-cli.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
stratis-cli-3.6.0-1.el9.noarch.rpm
8acb19639a598849e7af0bbfbcf653e25c6f79075de1bfd14ee87d82eee5635e
RLBA-2024:2191
ucx bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ucx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ucx-1.15.0-2.el9.x86_64.rpm
7cdd77e58a11c24f261641e561b034d1c575a5a78c40a77a843e59a525098f73
ucx-cma-1.15.0-2.el9.x86_64.rpm
7fe2092839942f9a4fc5d23e265594b642bad6d6e9bf2f8265fd9b23e2bf7acd
ucx-devel-1.15.0-2.el9.x86_64.rpm
4ff215f2f5c18a4bc0da7a3b3850ad337aa06ba548b828cd3c4e5001999f0c2f
ucx-ib-1.15.0-2.el9.x86_64.rpm
3479c055e3ec64cc8a67873a9ed45a94d38bc32def7840754ca4a15d9107eb82
ucx-rdmacm-1.15.0-2.el9.x86_64.rpm
540e62c30e18279ed998cf5b01cdf34f1a63885044b1e4d4e71983ca7eba565b
RLBA-2024:2198
libqb bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libqb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libqb-2.0.8-1.el9.i686.rpm
a95551066971ce69edc6dbe5bc3caf852d046e8a273cf77f40ff548b566d4c03
libqb-2.0.8-1.el9.x86_64.rpm
bb34853f0145e19695030ffd55db3c0d5793b14460eacd8634ae62b38e332dac
RLBA-2024:2197
cepces bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for cepces.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
cepces-0.3.8-4.el9.noarch.rpm
c8007f37dab9e0a1cef257829813b5b41a1b3421cbad4e90262138a065799b90
cepces-certmonger-0.3.8-4.el9.noarch.rpm
7c4c887754d5c4120b9ac7dfc8fb1a3b1f5dcfb148fd42c28522b3dd6b6e42c1
cepces-selinux-0.3.8-4.el9.noarch.rpm
f857b627bf0c8de3026f80c3346cc79607561900a647eeb63357053d2c21580e
python3-cepces-0.3.8-4.el9.noarch.rpm
f5de0810a89dc436b7fe7c62253e802e814c991fcb97ef01cd047fd3024fd5b0
RLBA-2024:2206
rsyslog bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rsyslog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rsyslog-8.2310.0-4.el9.x86_64.rpm
81e5de9ba7d4da6cad7fc1eac379467a0ae0b03a3934fc07ee57057f880db74f
rsyslog-crypto-8.2310.0-4.el9.x86_64.rpm
aacde10f787eec52e76c6f8f68ad5c2322eb44ed98175bee7f99ead57f71293c
rsyslog-doc-8.2310.0-4.el9.noarch.rpm
d4f4d52740d8e2f0df3909a562db23b90c74babc75a5b072a211276ea2e2cc02
rsyslog-elasticsearch-8.2310.0-4.el9.x86_64.rpm
577b370ac9b473eb709ebd15d36cc7f8624f6c7b06ff7a84967a9c1b1576561a
rsyslog-gnutls-8.2310.0-4.el9.x86_64.rpm
26b17e10018ff678a804ed0232925bf4126680083a027c7120c693bfdf1c23cf
rsyslog-gssapi-8.2310.0-4.el9.x86_64.rpm
8cfcd41e00b38f0f3a0af16bd6d47cc62f2a8a3dd72240482d749e4079029e8d
rsyslog-kafka-8.2310.0-4.el9.x86_64.rpm
a9c92723ebce0cb629e5f914d659e3211bf5a57addb6649403d0472f7145567e
rsyslog-logrotate-8.2310.0-4.el9.x86_64.rpm
4fe33205368b2f62009fab34c857a5c0c92c6bae9de82d2a5f3a28baffd8de49
rsyslog-mmaudit-8.2310.0-4.el9.x86_64.rpm
54c61b391d13cd713522805ead3dadd4c45ed59ddbfa79640f3cad990c40ede7
rsyslog-mmfields-8.2310.0-4.el9.x86_64.rpm
02734df65b3cb3c6acb5cf3167d22f1a8188abd8fce668f1a561268709383f9c
rsyslog-mmjsonparse-8.2310.0-4.el9.x86_64.rpm
8fc8af6d6a55c5bd420da8d9d7ed550a02443ea7f4761c9fc9d8cf1c7a14eb33
rsyslog-mmkubernetes-8.2310.0-4.el9.x86_64.rpm
53de1d0978b4b3141f8980270a03dbdd18a18ce512732ff5f9e1368fdb159419
rsyslog-mmnormalize-8.2310.0-4.el9.x86_64.rpm
884be71a64c784fbdf592999604c87ef1d9ebefdfbcf5e680649f7a293b8ab29
rsyslog-mmsnmptrapd-8.2310.0-4.el9.x86_64.rpm
6b5412343f62f2c1c31336ba828aa253bb75dfcef53e5db47da50bdabde92cd6
rsyslog-mysql-8.2310.0-4.el9.x86_64.rpm
c34ccf187848f11749ef784554ae8dfbd951dd513e729633858c8b379930bd82
rsyslog-omamqp1-8.2310.0-4.el9.x86_64.rpm
057912a13cd12f4fbc22b535c6642aedf9851000f746dfaba5f024f26af09010
rsyslog-openssl-8.2310.0-4.el9.x86_64.rpm
0876ffeaafd3090c7cf435811c4131b95c2974147e64fdd23e4210a2c3288099
rsyslog-pgsql-8.2310.0-4.el9.x86_64.rpm
a370d71201c76deffdf25afd39687b252f484a619e579748f9b0cbc9b592224c
rsyslog-relp-8.2310.0-4.el9.x86_64.rpm
0e1efcf43d3a4373a86d738ba0323b2966b9024808f7b27397e4506ce4e86900
rsyslog-snmp-8.2310.0-4.el9.x86_64.rpm
a76ebd9a6f59dd55989b4d9091609e329709f1c1ba6bfb7aec6796b3afc211ed
rsyslog-udpspoof-8.2310.0-4.el9.x86_64.rpm
42ce40994951a0201cd00b5581fe6f356efb2d05bfa90136fd3b581f1216e27b
RLSA-2024:2211
Moderate: tcpdump security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for tcpdump.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces.
Security Fix(es):
* tcpslice: use-after-free in extract_slice() (CVE-2021-41043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tcpdump-4.99.0-9.el9.x86_64.rpm
522f68468a356808a837f3545594cd859188b64ccd272de932010bb9bd53e1a4
RLBA-2024:2212
flatpak-builder bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for flatpak-builder.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
flatpak-builder-1.2.3-1.el9.x86_64.rpm
fa3f9742bb8c9f478c1a1bf42102a48e6246dae2a9ab68e06bc6eda120990a04
RLBA-2024:2210
crash-trace-command bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for crash-trace-command.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
crash-trace-command-3.0-7.el9.x86_64.rpm
c4f1c74c10543c005338560371e384c798e63b87e7cee84e91170642921ad12b
RLBA-2024:2216
xdg-desktop-portal bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-1.12.6-1.el9.x86_64.rpm
06181557017a6c03dc21f241b8afa401403f104e5b54985a6754706edf097f8c
RLBA-2024:2215
python-rpm-generators bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-rpm-generators.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-rpm-generators-12-9.el9.noarch.rpm
0cf0319af9943c795c093656b17753bbb3c0bebccb8d08dba522b7506aa9c67e
RLBA-2024:2218
ansible-pcp bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-pcp-2.3.0-1.el9.noarch.rpm
c4bfbaa80d508a442780b44e5976e00daaaddfb85cf5630f5f183ef487fb1b5d
RLSA-2024:2217
Moderate: motif security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for motif.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The motif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager.
Security Fix(es):
* libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788)
* libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
motif-2.3.4-28.el9.i686.rpm
6849484501028d8994c15bccd5cebdea754b65eadfe0c725e22a566af05b1726
motif-2.3.4-28.el9.x86_64.rpm
7f1b72f8325ea284a5842360b12c4ecdf5a0d24bef43cea2a1412a93faf7a6b2
motif-devel-2.3.4-28.el9.i686.rpm
5d39183a120fe5ac3eed22dd0d1796851ef710c4a295522a26344b4c94893869
motif-devel-2.3.4-28.el9.x86_64.rpm
5b0d9a2a72255be3f53bbdc07a53db7175c437806c67ab1af1d4bce8076d8402
RLSA-2024:2228
Moderate: perl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Write past buffer end via illegal user-defined Unicode property (CVE-2023-47038)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-5.32.1-481.el9.x86_64.rpm
3a7d8f3ebd108219af4c00f386c437af45e2ebfcc405b93fc0eefd19630f11e1
perl-Attribute-Handlers-1.01-481.el9.noarch.rpm
3d3e54bb2087fbfdc78d41c396b5d455de2ec07cf715f89544b21205744517f4
perl-AutoLoader-5.74-481.el9.noarch.rpm
9aa9dda77aafb5a988f87fbb1c2a9e4e67d2ce3cc651926411c7379d5bf873bd
perl-AutoSplit-5.74-481.el9.noarch.rpm
49837c08c5e91b416a0e7feebf84f848b39636af519aa7130e6ea7d315afeee2
perl-autouse-1.11-481.el9.noarch.rpm
e53f7911cab14e80ede5e0cce01da475b11c4094f3b04f41382b2490842ecc4d
perl-B-1.80-481.el9.x86_64.rpm
c7af412760829e3c2134c74e50bd30d921b01d79ef937942746dc0bd350063e4
perl-base-2.27-481.el9.noarch.rpm
5bbfb8583d08ef5c347e5d05b770ca79b1d99dd636c6fca549160648c47e35a1
perl-Benchmark-1.23-481.el9.noarch.rpm
2acc95b33acc1c9d9af09df0a1fcc800c13295eb12bc0acc90840c066c622370
perl-blib-1.07-481.el9.noarch.rpm
5ca71eeaa195c9ed1827a66a315cfcde8771cbac430a275df89c9c1229672b74
perl-Class-Struct-0.66-481.el9.noarch.rpm
d1ea95f70bcfdab8a2f294c80fb362f2711e38c370d4306af02dc02deef6ad87
perl-Config-Extensions-0.03-481.el9.noarch.rpm
8a8c97053e1e74f66491c2f2aff1b81a03b34f817314f1e72b0d49a139ef29f6
perl-DBM_Filter-0.06-481.el9.noarch.rpm
b5d3c439cfaad235c073db43901e0b862daf4e640b0d2f3c6f2da831017b9806
perl-debugger-1.56-481.el9.noarch.rpm
0454da3af00d749b87f0894ea867d8051e0141b510916f3a6b0bbb9fb280e7e5
perl-deprecate-0.04-481.el9.noarch.rpm
ec6af196db8842c1c8036ed6b36c3fb4cd632989bdf87a1f5080f029ba15f6a6
perl-devel-5.32.1-481.el9.i686.rpm
a7f5ceb2db775a56b0458a3ed16d6b85b92c9ceb44c89768969869cc638b5916
perl-devel-5.32.1-481.el9.x86_64.rpm
40ab18dc76a1a4435b2cf4fae13ea66df3112e381a32531a824c2e3e335d0c25
perl-Devel-Peek-1.28-481.el9.x86_64.rpm
dff3abc3c68c6934152122e7cdb4ad548581e1b6c6b86a6cd1f5610b846369c5
perl-Devel-SelfStubber-1.06-481.el9.noarch.rpm
dedcc32baff6099adc1b6a4d67fee40364fe8efba08b97b018eb77a5795502c9
perl-diagnostics-1.37-481.el9.noarch.rpm
3279b2187a7c6c208406e934972d97cd5f049bb375b7aef067fa8a0c3bd3ba24
perl-DirHandle-1.05-481.el9.noarch.rpm
df85fb7dd4f9f63a4663f29b43c5a624cb5db7d9a28338e653b08e50f418b5a2
perl-doc-5.32.1-481.el9.noarch.rpm
6f50f795d59fc2c93a1947128f3635321413529b9695b4ff63258f7f3076a71c
perl-Dumpvalue-2.27-481.el9.noarch.rpm
86674740dbb6e2cd25ed116a07a5e14f1d9c1acf006ac62775572bbcec2a7bb9
perl-DynaLoader-1.47-481.el9.x86_64.rpm
d7fd48f9213ca72b55b9ed075bc1b32dde91b68f3a20c5204ecc61aacc2502d6
perl-encoding-warnings-0.13-481.el9.noarch.rpm
7b936471fde47c3490b5132835e9ab2e8546b511f817e4c9ee9f298623bcfe20
perl-English-1.11-481.el9.noarch.rpm
bdc4cafe69e9ca8f23bec24d72088f03930db1e4e4d60a0cd8abff0a61c871d8
perl-Errno-1.30-481.el9.x86_64.rpm
b343d310f4eebb86afc5db4b9b384b4114085f7c314ff462dd5a4a9990a44ff1
perl-ExtUtils-Constant-0.25-481.el9.noarch.rpm
c4de2141dd9829e696480ca335cef458c15ae5a2eeafb26c9ca7beb6a0eb2c2e
perl-ExtUtils-Embed-1.35-481.el9.noarch.rpm
08c61ec791f90eb4263d4014b93df2f9e25e14a78d53d3399c75dfad7001dbfa
perl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpm
6f29468c40628a78dda0776886bff4933dd0e2afa67dccc521c51e9eee885464
perl-Fcntl-1.13-481.el9.x86_64.rpm
79f202015983eae7635818a0e6971bd11ddbb5ac3cb13a07ea3b15ec3a46b6e8
perl-fields-2.27-481.el9.noarch.rpm
6bccb8ee91e199caf199b25065b5602b6a759cfb545fd4d6e465247645f08dce
perl-File-Basename-2.85-481.el9.noarch.rpm
f4cc7d3a83df21da9dd068bf2a158e63795813861f2a49bf2dcc2785f8fa2d39
perl-FileCache-1.10-481.el9.noarch.rpm
6d100a7d39abf13a741bf39fa7c139b2ab75315e4cac0168eb7918c6df787263
perl-File-Compare-1.100.600-481.el9.noarch.rpm
75d9633f9944159ef64592b7fb5e8c77347682c9274b1073d5a33ee9cdc32301
perl-File-Copy-2.34-481.el9.noarch.rpm
a4cb837e8ac076dbedd0d2d760f2aa3de2e9c33895225be237940339d06c2a41
perl-File-DosGlob-1.12-481.el9.x86_64.rpm
76cda39c0032c670d7b4777897df25ca2e592afc7f89c54afba6520d06f16a40
perl-File-Find-1.37-481.el9.noarch.rpm
9a3a9683e143d3052c5b1a19d11d51e2b4ee9ba5e2bd9b4d7739225e1d4c1b0d
perl-FileHandle-2.03-481.el9.noarch.rpm
e29a352a522aef70a70fc6a4bb5e6dc1009728c1b4b4123d56a9d930b312dbbf
perl-File-stat-1.09-481.el9.noarch.rpm
3c46828f175ca774f576202eb7fdaa2d01a8216645139d500a1dab4b18f8b27e
perl-filetest-1.03-481.el9.noarch.rpm
31b50be58c601dbea3854ddc64e0e7df06e9eca8e3e40322eaf8bc3c5c19239f
perl-FindBin-1.51-481.el9.noarch.rpm
2288edda19ea5af1b284991a9ef28f58d6f8e55b90c5f80896c48b4aead361e4
perl-GDBM_File-1.18-481.el9.x86_64.rpm
e1881e45f03ff16c6448f1916becb62c997b24b06a38c6ecb66e02bb581e15d4
perl-Getopt-Std-1.12-481.el9.noarch.rpm
1cd94181b35adf2e335d597d7107bd995ada5bce4b4738616762d7cb8b951bc5
perl-Hash-Util-0.23-481.el9.x86_64.rpm
842eb5ba42727a261c0d7eb179ba71e9e5b2e1802c9c78e94fa0d4b81b95fcdc
perl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm
aca71a2d6eceba7b1228066f7962d1e504402e813b088e3f680c5f37e10c85c5
perl-I18N-Collate-1.02-481.el9.noarch.rpm
3b3e91a10f597c16de83ce5cc6c1c554d0140bcaa735467de81dd97f1f150ed2
perl-I18N-Langinfo-0.19-481.el9.x86_64.rpm
ed03bdb90cb98c378b7a21eb5dc3215408b531d619d3e6dbdf93887e421256d7
perl-I18N-LangTags-0.44-481.el9.noarch.rpm
65565049fbeba5a820b8cd6848c509ee6d06eacf6109a79bf6143b52dbcae519
perl-if-0.60.800-481.el9.noarch.rpm
2acfafe1d6ca93bfd457429b08c75c184dcdc00b4b7f1c8135217219313b9a64
perl-interpreter-5.32.1-481.el9.x86_64.rpm
13564c85615718b53e829b40eae0b23b583837ee4f7a41faeb7e46beabd2337c
perl-IO-1.43-481.el9.x86_64.rpm
ed931da5eb7897a6684344694fb0e167b33dd5937eda02884207b92e3b8fd445
perl-IPC-Open3-1.21-481.el9.noarch.rpm
73d8b8f517ea83da7908e576d3b7550b816cd1c1d41fc093226157f0c1da692f
perl-less-0.03-481.el9.noarch.rpm
7b43ebb416f2b780173f859b372fb9b1414e79debe8894ca3951b94843faea28
perl-lib-0.65-481.el9.x86_64.rpm
6eb3092cd0e21ce4a3072d40a57e57bdd4e05023edb9192960c080631ea69fa6
perl-libnetcfg-5.32.1-481.el9.noarch.rpm
61d77858761c24cda6ddc3e90d9ebb33a114ed640b195622f829ed988c699973
perl-libs-5.32.1-481.el9.i686.rpm
5dae5171cfc40b5458fbabf7eb231487ea3d6d1aa594f63e6b0a66b946ad7a14
perl-libs-5.32.1-481.el9.x86_64.rpm
3c145fbcae80f3eada47484a3e55bdd4258ea8a2e4d26950ea254624728b26bd
perl-locale-1.09-481.el9.noarch.rpm
0687bb64a6a8796e5b3972fc57443671ecbead99ca71621d76180412b8bb5b93
perl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm
8ffa1dec060a265e8148343679bd49ba61b7143a1503776a2af9dbabf5060413
perl-macros-5.32.1-481.el9.noarch.rpm
6700fac9968aa45f9a39caa494370198f610c44bc01f3baa0c8185dea9750c7d
perl-Math-Complex-1.59-481.el9.noarch.rpm
6c7ad827ed76176eb327a3c6354dcf37a1978db09da9ac5f38fc0dcfebc7fd3b
perl-Memoize-1.03-481.el9.noarch.rpm
b266d0452bea935fb25f87b96478b33102de563d6fb7813b894354424a5a1c98
perl-meta-notation-5.32.1-481.el9.noarch.rpm
d8bf9c7c73e6038232658231efbeaa87437c62339f307b233637db5eec63d7f6
perl-Module-Loaded-0.08-481.el9.noarch.rpm
72312877ea3fda7f11f924c0a74c3c5b543d677f18222ffaa13ddd12e435dee9
perl-mro-1.23-481.el9.x86_64.rpm
e3c72165b3a5c973e3f17b8b5b3fb7ee2f99d89a8cd0138908802b9dcb084535
perl-NDBM_File-1.15-481.el9.x86_64.rpm
76367c62439e3e29f23064210edf7a18cd18ae35eeeccf1f72cab235d8a33573
perl-Net-1.02-481.el9.noarch.rpm
213201f7adf1d3f106f57050fe6dd7c3b9703f01acbce60a723cbc5f85a92b7f
perl-NEXT-0.67-481.el9.noarch.rpm
d86d91b66e0b55b613a170bb0b490e2d09dbd1ec481250a86eb094165be704d3
perl-ODBM_File-1.16-481.el9.x86_64.rpm
c69e4bd118aec2684363fa6cef34871eea74f6251145c7aa0c38890ed0a3060c
perl-Opcode-1.48-481.el9.x86_64.rpm
c00b299c6281ef7a2922728d47b4a08684f9c9acbd3828e30614d52f77487cbe
perl-open-1.12-481.el9.noarch.rpm
4f83ef59c50fa9c2268acfb6e62856cbd0cdbab6050ef27355effff97c7bed32
perl-overload-1.31-481.el9.noarch.rpm
2bf1e504cd02b80fc4cacdc7d147f27d8882a5b954cf10260727238f97a9d6fe
perl-overloading-0.02-481.el9.noarch.rpm
341b8e5b82f88db98bac72f844ec22733b4a64c7ba0eab1ee8da280cd468a99b
perl-ph-5.32.1-481.el9.x86_64.rpm
a72a96264e6f22b6f44d0d5ad1c158c7585441457c8efb95cd8e4631c1f15102
perl-Pod-Functions-1.13-481.el9.noarch.rpm
a439a129e599068b70661f261e60577cf55bb246b4e05ad0a2211660ec08e047
perl-Pod-Html-1.25-481.el9.noarch.rpm
250ec814fc09be44820972558c61ad42c473cd565516a99c6f7db20c32f56906
perl-POSIX-1.94-481.el9.x86_64.rpm
650af076023979d32018abc16420b3e4fc76fb1a45506b00f218a0c61ec0f5b4
perl-Safe-2.41-481.el9.noarch.rpm
30069ae04cc2101bd77a445d93d281d20b3fc75105a6948da6146dbb7d4658a3
perl-Search-Dict-1.07-481.el9.noarch.rpm
4ee3c2795d995fb653901ac70057490204062f2eda6793dd7f7b5e5d58e14d21
perl-SelectSaver-1.02-481.el9.noarch.rpm
82588662b0010b539850457c71b36573efef63e197fbdf176597b1894e41e70f
perl-SelfLoader-1.26-481.el9.noarch.rpm
f1dba331f92301798a0a926b61a9377514f8f20a0cd3c3c4b7684b01e3d351ec
perl-sigtrap-1.09-481.el9.noarch.rpm
ac3abc2a0dcc3af768279d2b43e579b0b78bdd291284bb9034187888fb6f16fe
perl-sort-2.04-481.el9.noarch.rpm
9ce6f8a79c21b242ad3f3dc99dc347c18b6e363dd077c24cd6d65c3f8bb36f21
perl-subs-1.03-481.el9.noarch.rpm
b57c63d0112190f26bb5e9dc39cf0840fe4a449ae76245dac68be97da3511663
perl-Symbol-1.08-481.el9.noarch.rpm
1a706b5a16eeebf1879b099a90ebcb2cad20f9ba7b92e331cba2450d0208abb9
perl-Sys-Hostname-1.23-481.el9.x86_64.rpm
7479e9aca716a16ea4604e0912faf4fe5d9c6b7a846907c2679b5ab232ee69f3
perl-Term-Complete-1.403-481.el9.noarch.rpm
3e59aa000d57d2df6eaa68ee4da6703be82b38252c07c08e78550118f3364082
perl-Term-ReadLine-1.17-481.el9.noarch.rpm
2935a1fa5d52d30ce609f3801035addce6207adcfdfa21d30d29790d24d2545d
perl-Test-1.31-481.el9.noarch.rpm
a8ba23539287ba435b824c0661cb1f3e1a847cd766ba763d8040090f7415e68e
perl-Text-Abbrev-1.02-481.el9.noarch.rpm
e993d1504981ea67b92ed515ae1db68b90104865b504429b5c5ff4d17bcfb821
perl-Thread-3.05-481.el9.noarch.rpm
0591bccaac2d65c4ba80da82cf2286ed53789f4f3c897ac94af2bdf35363d174
perl-Thread-Semaphore-2.13-481.el9.noarch.rpm
4580e540f4d177f7918e6c2501d554546967101bda28279e0e0c52fd72cb6c87
perl-Tie-4.6-481.el9.noarch.rpm
9239d59e98d0ed7b32ebd6ff8fe67b26747534e6f9b60518f33bc72f520f847a
perl-Tie-File-1.06-481.el9.noarch.rpm
ff1e1737f93356af3d903505675a3855d878170bf8f49aea0d50894462b44df1
perl-Tie-Memoize-1.1-481.el9.noarch.rpm
b83bcb5cb7faf8df85e49fecfc68406c7b9f4d6af95794ca932134aa3be571d4
perl-Time-1.03-481.el9.noarch.rpm
3bb66e38e60acd30c54ae86670a7b46d05fe8f83e1cd7d595844118567f5e7a5
perl-Time-Piece-1.3401-481.el9.x86_64.rpm
60c2f6de94c46fc719aa48e60fb639b05c20a5ff4ba5b95de1503dcc826302c4
perl-Unicode-UCD-0.75-481.el9.noarch.rpm
8914613dff27960accb7152dff1f8cc4fa738375a49c76d0070a60a8f0653034
perl-User-pwent-1.03-481.el9.noarch.rpm
7b0a3d897727d7af3fd3714f8bd32453bcb037e883ea0dc1a9c84dd410f3959b
perl-utils-5.32.1-481.el9.noarch.rpm
c656c02890987b946f8cdb8f63f4fd11210a8c9fa0fb0653cb51e100a25e32de
perl-vars-1.05-481.el9.noarch.rpm
abc13d52018cd5bf66b9270646f69f108a40e10a4ab75802b7e528b257288945
perl-vmsish-1.04-481.el9.noarch.rpm
5d710baa610a6ddc292bb836a26888c6bfd0ec4a471c7f0c8fc857f24b51e0f2
RLBA-2024:2226
php-pear bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pear.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
php-pear-1.10.14-1.el9.noarch.rpm
3af34ad41229c87e1335712b8cde2f850cace3ee19edf7ab3396af7922e1c54b
RLBA-2024:2233
tracer bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tracer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tracer-1.1-2.el9.noarch.rpm
1cca4592f68de12c09398d39adbd524fdf85286f6af43a1f4a65809d041c10b2
tracer-common-1.1-2.el9.noarch.rpm
992e62c9563d9a92ebb4dac6e08b9248f2dac77b797ab15fdf8f68457ebc36de
RLBA-2024:2253
jss bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for jss.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-jss-5.5.0-1.el9.x86_64.rpm
766eab20481c0fe5a0524278f0e29a67cccdc22cd099fd99b205240b516b6c39
idm-jss-tomcat-5.5.0-1.el9.x86_64.rpm
e3f456c472ed273e6a2525a97640a6938b84eb42b7b5e39ce7275d0352111679
RLBA-2024:2252
ldapjdk bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ldapjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
idm-ldapjdk-5.5.0-1.el9.noarch.rpm
43a3a04e32377a1c730cecf35f7d6e5951b39d31629df4fe2a3f9b9c8cfac8ae
RLBA-2024:2254
driverctl bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for driverctl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
driverctl-0.115-1.el9.noarch.rpm
efa88d9ad57799f0230b78e9f7cb9d9fc60f922d7f385186bda8e78c3eddf90c
RLBA-2024:2255
smc-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for smc-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
smc-tools-1.8.3-1.el9.i686.rpm
943f2a4a641a40ee061c562ca9104f1c6608f2ef48210b37a4c704c44a5e37c2
smc-tools-1.8.3-1.el9.x86_64.rpm
ac7e0e53646cf669576e8c5eac5c08a7f79e7f9e944a72886ce600a76d159dc0
RLBA-2024:2261
libserf bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for libserf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libserf-1.3.9-27.el9.i686.rpm
f80361879343915fcd6f6c7436b65a7c104a5d5706cb0ecf5a7d4a4ddd3d73a8
libserf-1.3.9-27.el9.x86_64.rpm
4cbbf24cd552bdbdd1bacad7b5de6735196e246d38afccfa07aaccc3eca762dc
RLBA-2024:2275
evolution-ews bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for evolution-ews.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
evolution-ews-3.40.4-3.el9.x86_64.rpm
88aba7228c31443263f14735d251b895a28891aa6838d7aaa70d71723a007191
evolution-ews-langpacks-3.40.4-3.el9.noarch.rpm
bf33dbd5c36564132b02f0bc6f51b742cf0ca331ca9968e3ee480f81dd544d06
RLBA-2024:2277
gnome-session bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-session.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-session-40.1.1-9.el9.x86_64.rpm
3f623c6ff861c6d4b1c37bd7a43918680377ac7f791bb9d19f3538ed5168bc22
gnome-session-wayland-session-40.1.1-9.el9.x86_64.rpm
434442eaf69b5d7f67a03ce046c4c478f7d284e1e0ba8ff031f0cdd989f0fae4
gnome-session-xsession-40.1.1-9.el9.x86_64.rpm
af657c73d331b3789f015401d7b298a89ec416f35ab3bdd6e593c12e6bc09de3
RLBA-2024:2280
ansible-collection-microsoft-sql bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for ansible-collection-microsoft-sql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
ansible-collection-microsoft-sql-2.2.3-2.el9.noarch.rpm
e7c4b3880665142de4822ff74645bd38849775d27453982c6d0b7646e16dc91f
RLBA-2024:2285
livrsvg2 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for librsvg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
librsvg2-2.50.7-3.el9.i686.rpm
976d649f6057a0ae2b2c875f371e9fcfe973b00f8b4aa37221102d7b1f940be2
librsvg2-2.50.7-3.el9.x86_64.rpm
fef79d59b1ba3986a4e6739153c3504e991d1ccf280087e7ba81c1ee6438569f
librsvg2-devel-2.50.7-3.el9.i686.rpm
e519c822cdf0f6f4900fffb8a09017e448dacb3aba582a94a0cfcd60bd4038ce
librsvg2-devel-2.50.7-3.el9.x86_64.rpm
735b2e699aec426d2254164bfadf9007a4880cdece00080405b38bc37c12666e
librsvg2-tools-2.50.7-3.el9.x86_64.rpm
7a4b2ff2c0b2b3e7e4e419ec97a85713079ed69c60801efb357a070992b9e178
RLSA-2024:2290
Moderate: mutt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mutt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP.
Security Fix(es):
* mutt: null pointer dereference (CVE-2023-4874)
* mutt: null pointer dereference (CVE-2023-4875)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mutt-2.2.6-2.el9.x86_64.rpm
b1a022e2cc1b616ffb16f197c6e81c9a806228647566eff22c670f7637de813b
RLBA-2024:2294
pykickstart bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for pykickstart.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
pykickstart-3.32.11-1.el9.noarch.rpm
b0b97b86915eb56e99c9a4bf5d7e1d46145c32bac9ed62115fc9f19dacf7d3a4
python3-kickstart-3.32.11-1.el9.noarch.rpm
bb820f53d2104aa7a58fa5d74660059aa3697bbb65f51e881cff376a11d978fa
RLBA-2024:2304
lynx bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for lynx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
lynx-2.8.9-20.el9.x86_64.rpm
61fe2cde587d449f96a04871ce03a8053b0bf0e37c20ac045254e0860d3ab513
RLBA-2024:2299
perl-HTTP-Tiny bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-HTTP-Tiny-0.076-462.el9.noarch.rpm
4d7badc2339ef6f35c53fe221d5d6830588ad144957d0f93e6c9bf8b7519821a
RLBA-2024:2310
python3.12-pyyaml bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-pyyaml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-pyyaml-6.0.1-2.el9.x86_64.rpm
6f51237a3f1d235f2bf3345602267383f6f9504850e99e7fc6fccd6b78eb3d0b
RLBA-2024:2309
python3.12-cryptography bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-cryptography-41.0.7-1.el9.x86_64.rpm
35d2d816387a3e82e2ecce857a554f4f0094b10aa62ecab630985b37cfcf855b
RLBA-2024:2307
python3.12-ply bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-ply.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-ply-3.11-2.el9.noarch.rpm
9415f542437606f037d2b5e41918afb36c0d7b1d1483f6dc2651294dedafbe63
RLBA-2024:2316
python3.12-pip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-pip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-pip-23.2.1-4.el9.noarch.rpm
d0b183a9e68396e55c3caef387d844e1b7ee475b7d8583e6ecadbb2a674c4271
python3.12-pip-wheel-23.2.1-4.el9.noarch.rpm
25af0679546e7c7af172c98c2ee56408a90021d957f86384de146276091e8103
RLBA-2024:2313
python3.12-charset-normalizer bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-charset-normalizer.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-charset-normalizer-3.3.0-2.el9.noarch.rpm
a6403777d6dd01a7a3e36b4e366d32e1c9dda62cee6891b21c290851017e5a6b
RLBA-2024:2318
python3.12-numpy bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-numpy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-numpy-1.24.4-3.el9.x86_64.rpm
58ca56130a2e76695e81da54d116d1e7b97d910e7ab5fa7a523b73f2aec28deb
python3.12-numpy-f2py-1.24.4-3.el9.x86_64.rpm
eaba2a5065d053112a3d0a3cf0b3ae79318a99cd9c99aef9b13ba5cfe634d125
RLBA-2024:2322
python3.12-requests bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-requests-2.28.2-2.el9.noarch.rpm
baeb88405d3763fa807383a0ac0125a59ddf27d3bf5c87b7b13bf53f1d9d95e6
RLBA-2024:2324
python3.12-idna bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.12-idna.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-idna-3.4-2.el9.noarch.rpm
8b653aabe82ee825d0b440e557c3c34232976125f12293e884c5bb31197ac09f
RLBA-2024:2336
python3.11-lxml bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.11-lxml.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-lxml-4.9.2-4.el9.x86_64.rpm
d08c3073e95b168f94f446cc5be921f5b9149275918394b8a8ee778e51512f58
RLBA-2024:2340
python-prompt-toolkit bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-prompt-toolkit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-prompt-toolkit-3.0.38-4.el9.noarch.rpm
4b18bb150db520151f7c0a364f592a7b9348a7bad7087cef8755dd0f1e472ed5
RLBA-2024:2341
python-websockets bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python-websockets.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-websockets-11.0.3-6.el9.x86_64.rpm
a37a24d334dbccbbf2e07464d6d1ce916482477b33e6620c16de2b20a82146d6
RLBA-2024:2346
xdg-desktop-portal-gnome update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for xdg-desktop-portal-gnome.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-desktop-portal-gnome-41.2-3.el9.x86_64.rpm
631cdd622734c24d025dd82cdd91ddf6431448244c125bf664bc09386cdb1b09
RLBA-2024:2356
mrtg bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for mrtg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
mrtg-2.17.7-11.el9.x86_64.rpm
cdd07735bfef16a9c9bb85e93f1c15885fd9c8bb0d65a424db18caaad5ad77b5
RLEA-2024:2357
maven bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for module.apache-commons-cli, module.cdi-api, slf4j, plexus-utils, module.plexus-containers, module.apache-commons-lang3, module.apache-commons-codec, plexus-interpolation, cdi-api, module.httpcomponents-core, module.maven-wagon, module.guava, module.plexus-cipher, module.sisu, module.maven-resolver, jsr-305, apache-commons-lang3, module.plexus-interpolation, module.plexus-utils, module.jakarta-annotations, module.jsr-305, plexus-containers, module.maven, apache-commons-io, jansi, httpcomponents-core, jakarta-annotations, maven-shared-utils, plexus-cipher, guava, httpcomponents-client, module.maven-shared-utils, module.slf4j, maven, module.apache-commons-io, apache-commons-codec, maven-wagon, apache-commons-cli, module.google-guice, plexus-classworlds, module.httpcomponents-client, module.plexus-sec-dispatcher, module.atinject, sisu, atinject, google-guice, maven-resolver, module.plexus-classworlds, module.jansi, plexus-sec-dispatcher.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__maven
apache-commons-cli-1.5.0-5.module+el9.5.0+29736+f35c064b.noarch.rpm
f8b217b6c365f3cf374802f70ef8edbd0c50918f03e608ba567d97af088ccb38
apache-commons-codec-1.15-8.module+el9.5.0+29736+f35c064b.noarch.rpm
7e2a8e505d912f008d5c8ce35dfdd27c7856d4488e04d920a1039a9a2e089e24
apache-commons-io-2.11.0-3.module+el9.5.0+29736+f35c064b.noarch.rpm
f75aa218df2852beb7c95bd177b325b34cd6f18cec7409959a95327e0dddee17
apache-commons-lang3-3.12.0-8.module+el9.5.0+29736+f35c064b.noarch.rpm
e16802ed0ae01ea5816e99c384f8758b68e66c606597d04b72fe0760533b91a1
atinject-1.0.5-5.module+el9.5.0+29736+f35c064b.noarch.rpm
f8ba93e6f7554f6d11628c322d5913e0b52639ea64d4871ae6b0e787b8ea4551
cdi-api-2.0.2-7.module+el9.5.0+29736+f35c064b.noarch.rpm
ed72e0659a38a36b06b0a169692112503c3f333d6abe09a7e1eebf849e5c616b
google-guice-4.2.3-10.module+el9.5.0+29736+f35c064b.noarch.rpm
0a64b94ba8679a42b9b9c2cacc914c511e4906e5868afda2538842b12dc6d489
guava-31.0.1-5.module+el9.5.0+29736+f35c064b.noarch.rpm
4541062a0ac2c847bac2a572f64a632582c3384e42ac2b8bf5cda13b7cdd271b
httpcomponents-client-4.5.13-6.module+el9.5.0+29736+f35c064b.noarch.rpm
765d051377376c09888212e564f4d017c2fc572c9c7b26c5283834eb5274c7ab
httpcomponents-core-4.4.13-8.module+el9.5.0+29736+f35c064b.noarch.rpm
f0db807d527c038c29847741bd6d1ef45ee7995326c88b29612a959a8506ee9e
jakarta-annotations-1.3.5-15.module+el9.5.0+29736+f35c064b.noarch.rpm
93c89a8f7fdee0a4f7e3d4541054218495ab9c7e094dfc9b2f1d05caafdd8bf1
jansi-2.4.0-7.module+el9.5.0+29736+f35c064b.x86_64.rpm
3a5b7789fd3c29e65b81180c01a74312bb6e3dbaa0e64dcfbbfc09a4fde4de1c
jcl-over-slf4j-1.7.32-5.module+el9.5.0+29736+f35c064b.noarch.rpm
74fda405b5b27e18895ea4ed6abf8c02fa62d05eb7514fef02b52ce7940b3568
jsr-305-3.0.2-7.module+el9.5.0+29736+f35c064b.noarch.rpm
17b7eb8ed6104a79ef8d570b36961b6fbf61f493b1a760efebb2c09987e759a8
maven-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm
3fc333ef4e689609784dd13feca1908b6bd4073627f2f68a36e691bacb476085
maven-lib-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm
09269e810f3ef67c25ad58a7a1faf5e399266ca2343c222b715f5d46dd88ac6a
maven-openjdk11-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm
ea5e2849d30e901c2e7ff3218467a5527c8a05e70813df7a63d42387b74cce9f
maven-openjdk17-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm
45990601d77f6ae35127836879bb16b4a81ad364dd4fbf714f011409b9deb699
maven-openjdk21-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm
db01fdaa9ea2875ef20f8b8a11c2f65f86894a4c3b3ed47e4c2c8a266abc1ca8
maven-openjdk8-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm
ec64543679ea39dbce15b4e47ed5eafcd22583ae2f438886396143c8eaebf8d0
maven-resolver-1.7.3-6.module+el9.5.0+29736+f35c064b.noarch.rpm
136edb5eb9ef2bcb45a62e0500b9b46cedec2c9ae35964f7b9d5c897a9391164
maven-shared-utils-3.3.4-6.module+el9.5.0+29736+f35c064b.noarch.rpm
8c29fc97a009805da3ace75cf469cab88c256dd5f0fb22f47a56abddffdd8349
maven-wagon-3.5.1-3.module+el9.5.0+29736+f35c064b.noarch.rpm
1bbf7d29ccd7a1b3193684eab7b18c4027924236e35c10b149382c308a19467c
plexus-cipher-2.0-3.module+el9.5.0+29736+f35c064b.noarch.rpm
0924ed85094b21273e11ad23a4e92b23d734943fb0b3cf9eae8d22f9a46809b5
plexus-classworlds-2.6.0-13.module+el9.5.0+29736+f35c064b.noarch.rpm
11bb3e9e3ff0b9a182ed1b12853fbb9fa94120cb8701af02c77bb9df9a751c25
plexus-containers-component-annotations-2.1.1-3.module+el9.5.0+29736+f35c064b.noarch.rpm
b5b257e1c62ad38d495a9983cc563bfbe37609ba18593f1dc231fb6c5555b49c
plexus-interpolation-1.26-13.module+el9.5.0+29736+f35c064b.noarch.rpm
9d4fb5cf583b4fc000b00049a5fde3a4e0164bd3a58156b1f16b841da43e43cb
plexus-sec-dispatcher-2.0-5.module+el9.5.0+29736+f35c064b.noarch.rpm
a1b50b62d95219d8f433750b53748f823c5ce59b32cd2bf96d72166a110cb849
plexus-utils-3.3.0-11.module+el9.5.0+29736+f35c064b.noarch.rpm
e090a6b5dcd71ae2cb1a330e8498d6b038d3e4be4254104da262f1e556dce328
sisu-0.3.5-3.module+el9.5.0+29736+f35c064b.noarch.rpm
cd1ce7ccb317d8b32e96a75e35ef55bdbf021cdd238cbde81e1b6f2edab485c3
slf4j-1.7.32-5.module+el9.5.0+29736+f35c064b.noarch.rpm
9d8b8e7feaffad8c26a0f9f1a3c6c8e047847dc196d7e52a038b634979449794
RLBA-2024:2363
python3.11-pip bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for python3.11-pip.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-pip-22.3.1-5.el9.noarch.rpm
cd33c2c1c4b6f66dc96ae72a16a768f3691f54247dda5d225781da019be8b63f
python3.11-pip-wheel-22.3.1-5.el9.noarch.rpm
c426da0a808b015d8a5cd9ca18c2603dfb0bb6cfba4ea6f362523df5a2b7e066
RLBA-2024:2358
tlog bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tlog.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
tlog-14-1.el9.i686.rpm
400be167bc4e6630412a7f58cab80933b64ef39aa1fdc6f3649ee97899a1405b
tlog-14-1.el9.x86_64.rpm
e8a5cb8df9356b8600343e16770b55acb138b32d2108d862a181964dc08e1831
RLBA-2024:2380
dnsmasq bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for dnsmasq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
dnsmasq-2.85-16.el9_4.x86_64.rpm
0355c990e46b7d40f84b6f853035e7bf014cb4e181f36177936d55ed2a8b98e7
dnsmasq-utils-2.85-16.el9_4.x86_64.rpm
8c759fafff6be07b2ac673ba839d4d9ea8939509b82c7795cd56437897d77f39
RLBA-2024:2385
weldr-client bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for weldr-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
weldr-client-35.12-2.el9.x86_64.rpm
e15d02dd57b7fcfb92fbe123302bb8c43668d9b53f3333491cccf79102165477
RLBA-2024:2389
fido-device-onboard bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for fido-device-onboard.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
fdo-admin-cli-0.5.0-2.el9.x86_64.rpm
e134f179df91a99cf7b894e64e0dc2d55ede7fff4dde155fc45e0b98ca8d48d8
fdo-client-0.5.0-2.el9.x86_64.rpm
052e19a734c97b14c81ea013644c78ede717f85e7f60f034391bf0f42637248a
fdo-init-0.5.0-2.el9.x86_64.rpm
a2c74dc017a113139f65d82f24a4876b8c22f6202c5c27ae5d56b5b03164ee63
fdo-manufacturing-server-0.5.0-2.el9.x86_64.rpm
d2c6914a489228104fefc30e4c3e573ab9e81cdd91b04b7f72ea1ab49688b324
fdo-owner-cli-0.5.0-2.el9.x86_64.rpm
c1217cf2c8403fcf305e19ff5962812fe2b229e3ce3dd36e9087ded8bac6a63e
fdo-owner-onboarding-server-0.5.0-2.el9.x86_64.rpm
b7dfc348c0674c5b8c00b35ebde834e343e39911a33af1780647870bb546fe4e
fdo-rendezvous-server-0.5.0-2.el9.x86_64.rpm
3c0f3eab39c469cf275ac6f21ad0300608af9689dac74e18b59b5fe5daee26c5
RLSA-2024:3834
Moderate: gdk-pixbuf2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended
by loadable modules for new image formats. It is used by toolkits such as GTK+
or clutter.
Security Fix(es):
* gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gdk-pixbuf2-2.42.6-4.el9_4.i686.rpm
85ac80964283b7e88f0e442f5c89e0009a5376f55d4b186f88a6409a059c16c8
gdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpm
9f23d0f41ae83f45da6048ce309783355091cac0b4c76851cefe805c445ac549
gdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm
e2c0502b6787cf57836a66990eff3a6497c39cb734a296aeeb7fc65c3b0f117f
gdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm
83678201e6c93c1eb6d5682568e0b11dbb5a02955d6ff37d5c05e3a3e8009745
gdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpm
6b40e0101e2cec7ef3a6a69ad552332d430e44c42d4019589af272b749bd95c8
gdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm
d24bd8a516d13628e1d58b3cb6c79c8ee7e93afefa09c4a9a040209c5dfc0a3c
RLBA-2024:4758
qatengine bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for qatengine.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package provides the Intel QuickAssist Technology OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms.
Bug Fix(es):
* qatengine: 1.6.0 update [rhel-9.4.z] (JIRA:Rocky Linux-41076)
rocky-linux-9-x86-64-appstream-rpms
qatengine-1.6.0-1.el9_4.x86_64.rpm
a882fefc905d5f18e055a8fe6d3c89689229486d25e39772fe94b08de35ad378
RLBA-2024:4771
swtpm bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for swtpm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SWTPM is a TPM emulator built on libtpms providing TPM functionality for QEMU VMs.
Bug Fix(es) and Enhancement(s):
* swtpm: Windows reports TPM error due to missing SHA1 on Rocky Linux 9 hosts [rhel-9.4.z] (JIRA:Rocky Linux-46788)
rocky-linux-9-x86-64-appstream-rpms
swtpm-0.8.0-2.el9_4.x86_64.rpm
179a40feb1b9626d914edd9ac5bf287a7996d83e112fb501c72c6a44a8ad53da
swtpm-libs-0.8.0-2.el9_4.x86_64.rpm
897f92f5f91c6d361cce194c0c6927494e23a93efd1f39df5fc59088bb7ee056
swtpm-tools-0.8.0-2.el9_4.x86_64.rpm
1cf41ba5420147c16077a170f8b4c3db2ca104fa35ae8503f6d1f9c98bf21d66
RLBA-2024:6181
synce4l bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for synce4l.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
synce4l is a software implementation of Synchronous Ethernet (SyncE) according to ITU-T Recommendation G.8264. The design goal is to provide logic to supported hardware by processing Ethernet Synchronization Messaging Channel (ESMC) and control Ethernet Equipment Clock (EEC) on Network Card Interface (NIC).
Bug Fix(es) and Enhancement(s):
* synce4l broken on aarch64 (JIRA:Rocky Linux-54121)
* Rebase synce4l to 1.1.0 [rhel-9.4.z] (JIRA:Rocky Linux-52089)
* [synce4l]synce4l select a non-existing external source as best source [rhel-9.4.z] (JIRA:Rocky Linux-52090)
* [synce4l]synce4l reselect best source twice after a port down [rhel-9.4.z] (JIRA:Rocky Linux-52091)
* [ice synce]DPLL still locked after stopping follower synce4l app [rhel-9.4.z] (JIRA:Rocky Linux-52197)
rocky-linux-9-x86-64-appstream-rpms
synce4l-1.1.0-2.el9_4.x86_64.rpm
1ec2e9b53a2e5f2f058fd18b46dc45c8ca3d1142d5687dad11257b089f88f5c7
RLBA-2024:6191
gnome-keyring bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gnome-keyring.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-keyring packages contain a daemon which manages passwords and other types of secrets for the user, storing them encrypted with a main password. Applications can use the gnome-keyring library to integrate with the keyring.
Bug Fix(es):
* gnome-keyring-daemon hangs and pins one CPU core if SSH agent fails to start (JIRA:Rocky Linux-25560)
rocky-linux-9-x86-64-appstream-rpms
gnome-keyring-40.0-4.el9_4.x86_64.rpm
cfacf3868790f8183808726032a0203529b9d1749cdd2f8ca35db1a93d475d51
gnome-keyring-pam-40.0-4.el9_4.x86_64.rpm
863ceeebfb63db81458adb71b780b83554587c0cfb68c4cfca1100b09fa632a8
RLSA-2024:6192
Moderate: wget security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for wget.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.
Security Fix(es):
* wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
wget-1.21.1-8.el9_4.x86_64.rpm
85fe22b9e444213e7ce7ed26734fca6015f59c0119a44b759dc442db77fe8371
RLBA-2024:6198
gcc-toolset-12-gcc bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for gcc-toolset-12-gcc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux9] GCC 12 vectorization exposes wrong code on P9 LE starting from r12-4496 [rhel-9.4.z] (JIRA:Rocky Linux-47819)
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-12-gcc-12.2.1-7.7.el9_4.x86_64.rpm
15a335bea21de498791850886edd605f1e9f44cb9435ddf5df3b001664e002cb
gcc-toolset-12-gcc-c++-12.2.1-7.7.el9_4.x86_64.rpm
a2737fe3c09d7bab1d135e1bb87848a3817953a6423e7e8474839f7b96b7c67e
gcc-toolset-12-gcc-gfortran-12.2.1-7.7.el9_4.x86_64.rpm
7b6669d7c6e89713dd3dac2e4452ff6c44ba08ba4c8de6e7cc0e2b59199a8b16
gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.7.el9_4.x86_64.rpm
109c23f2de564d925d43b52932b00c6a8a9712485f7d8b12e3cd7bb0390604ee
gcc-toolset-12-gcc-plugin-devel-12.2.1-7.7.el9_4.i686.rpm
1b92baa6c1e7a2ef948365836b8a42db59d2135807960bbef4738143d9a6ed88
gcc-toolset-12-gcc-plugin-devel-12.2.1-7.7.el9_4.x86_64.rpm
7923d961bdc603c18ae235a8f6df661dceac6af045f831e390df9402e687a43c
gcc-toolset-12-libasan-devel-12.2.1-7.7.el9_4.i686.rpm
a822b6d4f2b411d173f224fa0d16eb6f67eddc902bb39d97787deb3f29cc56b4
gcc-toolset-12-libasan-devel-12.2.1-7.7.el9_4.x86_64.rpm
ac6f3ad64cffef652f68821a4a868894f5d6f95241d5e570783ca2aa5a2152ed
gcc-toolset-12-libatomic-devel-12.2.1-7.7.el9_4.i686.rpm
d3b0d78fdf5e5acfc40a95d4d9c07932534de513cf3129de41d192f570af3226
gcc-toolset-12-libatomic-devel-12.2.1-7.7.el9_4.x86_64.rpm
0b0af259ab76660ebfcdddb10bea450809873a54bb89c39b7af01b1790188b7a
gcc-toolset-12-libgccjit-12.2.1-7.7.el9_4.i686.rpm
bb09b24ee2d74df4970fbf2276db2966c2e1981fdcf42003859ecebdf20c5bc6
gcc-toolset-12-libgccjit-12.2.1-7.7.el9_4.x86_64.rpm
6b2763b6c77c1901eaaa678a0d24bdeba464d85166350efe890b527763fcc16d
gcc-toolset-12-libgccjit-devel-12.2.1-7.7.el9_4.i686.rpm
53a7327c89177f16940a0184278eefa83b22ae99f8d975c46264305677b411b8
gcc-toolset-12-libgccjit-devel-12.2.1-7.7.el9_4.x86_64.rpm
a2bb948261bee86607e1c2c41810f702c58c627dabae06a12b397fcf98e91b4d
gcc-toolset-12-libgccjit-docs-12.2.1-7.7.el9_4.x86_64.rpm
aa980ceb14a020ec183a43c8830b45942c63a9a2d842d38d67fad4895d2a451e
gcc-toolset-12-libitm-devel-12.2.1-7.7.el9_4.i686.rpm
9cf2c75845325f3dfc0f6b0947cabf05a0e995d855bd3ef3ae4ff297e70908f7
gcc-toolset-12-libitm-devel-12.2.1-7.7.el9_4.x86_64.rpm
15251855cbfb9924b2bc1b30e4a1b2d3da64d5a11726d1faefa6941f23785031
gcc-toolset-12-liblsan-devel-12.2.1-7.7.el9_4.x86_64.rpm
a1a5fba0a5a970c65a65ac0cd1d001f0b71a789a2cdf2d6f12d50812223dd193
gcc-toolset-12-libquadmath-devel-12.2.1-7.7.el9_4.i686.rpm
bfe08db0f67a38b2778745a9bc9e749c40cb2f76dea196b3345c7bbae515e62a
gcc-toolset-12-libquadmath-devel-12.2.1-7.7.el9_4.x86_64.rpm
4fd77e91f6ff8579dd8df6a513cb3690caf3e9650b7489d4fa56aeb3e7c829a4
gcc-toolset-12-libstdc++-devel-12.2.1-7.7.el9_4.i686.rpm
6556519f4cd1314038eb9059b66431448b39d9ad41bdfdc25702968d8ec155ef
gcc-toolset-12-libstdc++-devel-12.2.1-7.7.el9_4.x86_64.rpm
00f76e962928cae503ced625ab6a028615bb0e6fce6f6ea00c9a08056a5f5747
gcc-toolset-12-libstdc++-docs-12.2.1-7.7.el9_4.x86_64.rpm
6ef10e87f0eff610d09e0beea1dc1e964f4f802ebbe37dd5dd5899787ced2bc3
gcc-toolset-12-libtsan-devel-12.2.1-7.7.el9_4.x86_64.rpm
3a9d7daf753f7a65a14c04126ce2ebb7a80d0e46a2789a241370f3a492036650
gcc-toolset-12-libubsan-devel-12.2.1-7.7.el9_4.i686.rpm
d5aa088abcdb729aedcf1cf89cd8fba56f575f92b275e8717e0e57ed719f0744
gcc-toolset-12-libubsan-devel-12.2.1-7.7.el9_4.x86_64.rpm
0d632cb53ad896b2a5d64c90a31736a79d55bca2c71e7e6ca9e3b82aaaf494f7
gcc-toolset-12-offload-nvptx-12.2.1-7.7.el9_4.x86_64.rpm
e2fe7ef70e83c076e26e2adc9c02361f1ce0d81983931fea9f38200b5db6fd98
RLSA-2024:7457
Moderate: mod_jk bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_jk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_jk module is an Apache HTTP Server plug-in that enables the Apache HTTP Server to connect with the Apache Tomcat servlet engine.
Bug Fix(es):
* Rebase to upstream 1.2.50 release (JIRA:Rocky Linux-58855)
Security fix(es):
* mod_jk: information Disclosure / DoS (CVE-2024-46544) (JIRA:Rocky Linux-59800)
rocky-linux-9-x86-64-appstream-rpms
mod_jk-1.2.50-1.el9_4.1.x86_64.rpm
d274aa394a9288d4c606928d3c49eccc6344b799214bc24620ba244f81865991
RLSA-2025:0923
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.37.6-1.el9_5.x86_64.rpm
6e47a3030889bdda3210272259681a3c31ade87cdb0d4e6ffe681617800e51bd
buildah-tests-1.37.6-1.el9_5.x86_64.rpm
ca00f7623e0c2f43bdbb0882ac9ed5b137436d0716753a6cbbf91c506d774d65
RLSA-2025:1915
Important: emacs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-27.2-11.el9_5.1.x86_64.rpm
76bf72fcea0f033345a5b310aeaadd40507f369bfcbd45bd5288032769535009
emacs-common-27.2-11.el9_5.1.x86_64.rpm
50b20e43e63aa3beb7bb3c4c47180e5c9aa62b04b4973ef1d56ddfed8a1d030a
emacs-filesystem-27.2-11.el9_5.1.noarch.rpm
17b9274a53b1287a9da36982096248b91bd26da6307f6abb9da62e2dc0b1dee3
emacs-lucid-27.2-11.el9_5.1.x86_64.rpm
ffc61278fa3a10ec21ec7744c25f308ed3ce2614638d6b6a6c9371c24669bcf0
emacs-nox-27.2-11.el9_5.1.x86_64.rpm
696c77b2eb5731a259950e6e2589771fcd4dbf9da7ed50e6dfb56d55987ccdcf
RLSA-2025:2500
Important: tigervnc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.14.1-1.el9_5.1.x86_64.rpm
1bbaf3519214e912ff87e50723e36afb3b14cc8a57acd867e92a0efac0911ae2
tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm
846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097
tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm
c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb
tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm
9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d
tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm
1e9f54db73c3f55c02a22025ef0af74b4eed8be253c84a02151d9ca1b863099b
tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm
2f7ddb7d43e0afa3c33111e9d2ff410c7d11afa03c7320e1ad587a07264299a6
tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm
afa7cca671a7c6141d6d2ab9a659209a6113e2c86136eb4f2b08a438355a1c1b
RLSA-2025:2679
Important: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Use-After-Free in libxml2 (CVE-2024-56171)
* libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-6.el9_5.2.i686.rpm
d53a8493d41ba11495d3f3bbe33b841b02a44ea9412d921efe49a2355292eb20
libxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm
678d28675f03ae6e5e204f272d8160970b1d1783a5e3d8710e89e342a79317c9
RLSA-2025:3531
Moderate: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.5.0-3.el9_5.3.x86_64.rpm
e28a99fe6a867be1d1795a9bf012a7a88a8f37624f3ccfcadf561e262230ef03
expat-devel-2.5.0-3.el9_5.3.i686.rpm
1daae7c7d79bd008f4a3f6775e45d804bf546fa56581c372cd049c5fd36fae4b
RLSA-2025:3407
Important: freetype security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freetype.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files (CVE-2025-27363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
freetype-devel-2.10.4-10.el9_5.i686.rpm
dbe638a0cd8a2bd8eef818140193c83c7b84d90d92afb65a9987d7b1e6af1be9
freetype-devel-2.10.4-10.el9_5.x86_64.rpm
e5a1fc23861e922b2e3abd370377d89cbdcd833eafadc2ac266182c8fe19842c
RLSA-2025:4244
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-125.el9_5.8.i686.rpm
73fbf8beab0fea69803e6c706d7828eaa07ba4b99d4ff1f82cae594c55c5b882
glibc-devel-2.34-125.el9_5.8.x86_64.rpm
71b669dae2d01ab784068454f2a7f196fc6a39c038f92aab025ce70909080a79
glibc-doc-2.34-125.el9_5.8.noarch.rpm
cfd172ced118dd02594b94f016a17fd905cb8b6ba3ddf7125946dacbf1278dc6
glibc-headers-2.34-125.el9_5.8.x86_64.rpm
1581f170a3e272715013f4e3d93aec13f97a79c3f720731e02369f8c59c4b169
glibc-locale-source-2.34-125.el9_5.8.x86_64.rpm
139778d5adf58b07b240c760675df2bf54f381a5228b83b47a2924d8398321b0
glibc-utils-2.34-125.el9_5.8.x86_64.rpm
5486c48233c4a1efff382998c7e0421b29ba00b0459584c25adc7351fcfb99a3
RLSA-2025:4341
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
* kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322)
* kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)
* kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)
* kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-503.40.1.el9_5.x86_64.rpm
ff07e8f615f3ff6466bc3163a2bd4434f2c00342227aa5bcc142d9f6c330a28e
kernel-debug-devel-matched-5.14.0-503.40.1.el9_5.x86_64.rpm
cfc6361f5e70c33abb43e0d6c55f45624205e9320ae8fb62bd57cdc8fe034b0a
kernel-devel-5.14.0-503.40.1.el9_5.x86_64.rpm
92cd4631a44fdefb112feca5d4528089738fd89f726ef5edb936eb31331da3c7
kernel-devel-matched-5.14.0-503.40.1.el9_5.x86_64.rpm
d6771e0da9212990c4821ae81dd720d78c4ca751e7b60112b94244bf254e2440
kernel-doc-5.14.0-503.40.1.el9_5.noarch.rpm
86da0adcdfa82a75da3c8ce34385332582a22b2ba222de9def5d3ee89bf3648e
kernel-headers-5.14.0-503.40.1.el9_5.x86_64.rpm
c1ce3fba00143e7f225b2200b18356da5e6361ea956c9d962d12eb20d25ea301
perf-5.14.0-503.40.1.el9_5.x86_64.rpm
747a2bc8eade099c4dba81b7551463a57a789124a1c9fc1c2c61f806650dd80a
rtla-5.14.0-503.40.1.el9_5.x86_64.rpm
d496693fba16ca3d830a8cc022d4c105ffbad5dbacb494140b81cd4047972e20
rv-5.14.0-503.40.1.el9_5.x86_64.rpm
8283d0ee23e8d2781c680cd045270998a573b6650bc7f1f1eafe71aded011509
RLSA-2025:3408
Important: libreoffice security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libreoffice.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Macro URL arbitrary script execution (CVE-2025-1080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
autocorr-af-7.1.8.1-15.el9_5.noarch.rpm
5391ef05b5a1c9b5469531db42657fc697ae647c5cf7fd39bef34936b484a04a
autocorr-bg-7.1.8.1-15.el9_5.noarch.rpm
528eb94ef117a95c77880e29c23854ecc1fff8c70b8d246f4ec7961f36130a78
autocorr-ca-7.1.8.1-15.el9_5.noarch.rpm
996544f8adb37eaf08c384929ee0b208c7069712a0cfe30455ceda54625eb20a
autocorr-cs-7.1.8.1-15.el9_5.noarch.rpm
30238f5f27531b8256f83a6a8943e36422587f672e4b5f0f67a748ffc23a09ef
autocorr-da-7.1.8.1-15.el9_5.noarch.rpm
3560f7e1b416aa60b50ef1b7074ead4d6668d345c646391a8822cb7fe7481785
autocorr-de-7.1.8.1-15.el9_5.noarch.rpm
c396d949f8eeac69664e858299c3a68339310a1a01c9ad1de685e5bddced39ce
autocorr-dsb-7.1.8.1-15.el9_5.noarch.rpm
f08eaf337f930f5a29222aadda60f655a16aebfaa0db8b4c1fe634065d651359
autocorr-el-7.1.8.1-15.el9_5.noarch.rpm
ebc58dfbd5fe21d830329fdc26c195f7493bcfbda92dcb9a80ec79a7c5ffd8f6
autocorr-en-7.1.8.1-15.el9_5.noarch.rpm
a8071eb6e29921d8efcab7856e206facef70c4ab69323276cd83518d46f50f8c
autocorr-es-7.1.8.1-15.el9_5.noarch.rpm
090536f15bdbd885554d0210ed9da36b0408297359a4715f6a93207378563285
autocorr-fa-7.1.8.1-15.el9_5.noarch.rpm
df043331b5445d3edcf4c1f5bf09b99941ed4b4ed5dd896dee2fa3c1d50f6a4f
autocorr-fi-7.1.8.1-15.el9_5.noarch.rpm
9677ece7ecee8fb3e418ad04e25917edff683b27c2bdc890808820d7366185de
autocorr-fr-7.1.8.1-15.el9_5.noarch.rpm
74eaca3b9135910584da28d4f1979277b2f6850d74fa291997010c297b474e81
autocorr-ga-7.1.8.1-15.el9_5.noarch.rpm
40331c304b9e1ea6052a3ac9d32e7b5b6e6144efb756b283a56ed3d05773cc99
autocorr-hr-7.1.8.1-15.el9_5.noarch.rpm
45cb0cc3cfcfaef845ca4fba6393cde5d11343064c6adc618027918d2262138c
autocorr-hsb-7.1.8.1-15.el9_5.noarch.rpm
273f0f0b2e4e5274c05c4dd935abb86a99eab241a8e6adcbeedbdff15c50abc9
autocorr-hu-7.1.8.1-15.el9_5.noarch.rpm
e725028f15029f1582f554babf8996ee4b81eea97fee94a80c9e80f689f99731
autocorr-is-7.1.8.1-15.el9_5.noarch.rpm
215bbefc0fe56e35d9c86a5c2c8d2af1cc32c8bf7b1c8418bc61632ab0035043
autocorr-it-7.1.8.1-15.el9_5.noarch.rpm
29afc24255b411f9b63921ba07538a8fb1b52283e3bb668ac6683818000f5369
autocorr-ja-7.1.8.1-15.el9_5.noarch.rpm
27eea344d1518ecdd750a7bf7651fdf2b16caa8a0b07aedef94978b36fb33b1c
autocorr-ko-7.1.8.1-15.el9_5.noarch.rpm
46ed1ba881347a03e6b7bd696a187f3cd68759dba1c062d1ada64d95133ff388
autocorr-lb-7.1.8.1-15.el9_5.noarch.rpm
9a2fd230c6c8118a65f2d50b8fd2e560fd9589be8c6e7c3ae611effb548fdc64
autocorr-lt-7.1.8.1-15.el9_5.noarch.rpm
13380bc186a097410a8c8180f38dc648d1938a0fbd9a08e6a2b64c1ed7785e09
autocorr-mn-7.1.8.1-15.el9_5.noarch.rpm
23ef2baa220ca4d012f725b61e9cf72e4c24358755f23223f499d4c949a21309
autocorr-nl-7.1.8.1-15.el9_5.noarch.rpm
e483e1a89b25927b34be05272ff753045ac1206dc638541d1578634d8df06314
autocorr-pl-7.1.8.1-15.el9_5.noarch.rpm
55d0640f10c3c9f8ed23cf77d81edf81f0f85a774db7b04e9d9b6ae00d97d8b7
autocorr-pt-7.1.8.1-15.el9_5.noarch.rpm
4ea99dcca7b964e26749576ffebab87bd7053339bf608f5ca0134e71867a21aa
autocorr-ro-7.1.8.1-15.el9_5.noarch.rpm
a152100cecc561ab1236da5751035af17c27a191acae0b6195be519145eeeb77
autocorr-ru-7.1.8.1-15.el9_5.noarch.rpm
5fabb6c0293b4e14d64df995a5f9b6d07e4849360386b0b3c724f626015dd6f7
autocorr-sk-7.1.8.1-15.el9_5.noarch.rpm
7685df9e5bc4c94241804de736fc43a58134820e0434c4e7af3bead35736cdab
autocorr-sl-7.1.8.1-15.el9_5.noarch.rpm
ce151455df7ab263115a59ef91a231a9c18add46cde5430310a98ee99011c13f
autocorr-sr-7.1.8.1-15.el9_5.noarch.rpm
0d49767ce49d0959df0aeee5b37248fc27ef840caa70a548cc42ab061bb4004e
autocorr-sv-7.1.8.1-15.el9_5.noarch.rpm
4b06940763716abdbd1f2c7f350bfb1905d51edb949023aed8ce05b1560dabe6
autocorr-tr-7.1.8.1-15.el9_5.noarch.rpm
2e87c4acfa1ae95fec70cf323c5cf4719ccb444a344babc1c6a6ee968dc5d56e
autocorr-vi-7.1.8.1-15.el9_5.noarch.rpm
a5f2aefdff05189d0de5fd29dc05cf73d3bc7c4fa4dc775c4a36005e266ff8c3
autocorr-vro-7.1.8.1-15.el9_5.noarch.rpm
1b34733caa43b1d6f4794bfe8a9083648f8e51cbd14ba3783e8d9c1b2cfb0a0b
autocorr-zh-7.1.8.1-15.el9_5.noarch.rpm
933c85b9283dfff89aeac6dbf2dbd0681b9a229afb769ffbed927e6c723991dd
libreoffice-7.1.8.1-15.el9_5.x86_64.rpm
539d54abdb981590ff22884d3a4c4a353bbe09aeb5625e8fad6e8b7731444af6
libreoffice-base-7.1.8.1-15.el9_5.x86_64.rpm
456ca285c0ec0cb56c0c8f6d7bd287219d8ecbfd689d17c74db060225b6a605e
libreoffice-calc-7.1.8.1-15.el9_5.x86_64.rpm
671c603133c443b8cdfc14fadffd8eaa279f32d1a1acff2b6252c7bbf3e7996e
libreoffice-core-7.1.8.1-15.el9_5.x86_64.rpm
da4cc21f1af8992d5f5cfdf5c6aa78b4fa1620c3dc5b028f25990db177c5c420
libreoffice-data-7.1.8.1-15.el9_5.noarch.rpm
c80a44a5be5c0ba776e8c2ae3015c46d2be40053d1c66f2efab17d98b77c905a
libreoffice-draw-7.1.8.1-15.el9_5.x86_64.rpm
d1f256c9e8ddb17466af728a062e35592e2390bd44d2fef7ddd737cfe558b342
libreoffice-emailmerge-7.1.8.1-15.el9_5.x86_64.rpm
ae7ef259875fd8831cf8650c9034845ccc969b18012c6e5e0fffc00255092515
libreoffice-filters-7.1.8.1-15.el9_5.x86_64.rpm
c07ee9323329895bbba3f9cb8cbe7a221c89139aef9c8c8af9914e67f02b6f2e
libreoffice-gdb-debug-support-7.1.8.1-15.el9_5.x86_64.rpm
f9c1a4982b5edc602a912248d93c38d34382fafcb4d369aac90db5a63c6fa8b3
libreoffice-graphicfilter-7.1.8.1-15.el9_5.x86_64.rpm
2bd1f7c32dcd2592c216f907cfe727f94402941a42c9f6acd653325279059bdb
libreoffice-gtk3-7.1.8.1-15.el9_5.x86_64.rpm
91ca675c8ec46c1db6b5592d263fe2650ac02ab0cdf259a4f20008faa67eafdb
libreoffice-help-ar-7.1.8.1-15.el9_5.x86_64.rpm
9b77b9accecf7efd8f805ab7d2af2736fbfb88771e11ee241753a05caf6016bb
libreoffice-help-bg-7.1.8.1-15.el9_5.x86_64.rpm
549db3fdfd0e4b67525f35bf60ada8916dc079a27eca82d7dc1669f38a2b55e7
libreoffice-help-bn-7.1.8.1-15.el9_5.x86_64.rpm
35ec99e0c5de3d4f45500b590859e2a184d9671d315bd06dce9e4cb99ccabaae
libreoffice-help-ca-7.1.8.1-15.el9_5.x86_64.rpm
44f55795604b42e96b1fc61048597556daab8e92c4129df83e31bfdd38bc9112
libreoffice-help-cs-7.1.8.1-15.el9_5.x86_64.rpm
5658958e828e5baa4d0ffd577aa8b37408c3a082251869c7c31692a6e706e5dd
libreoffice-help-da-7.1.8.1-15.el9_5.x86_64.rpm
b694f44a7e836af8759ef128f9b3228f52a87b32780a614e89c1fc6e4d8b01d5
libreoffice-help-de-7.1.8.1-15.el9_5.x86_64.rpm
8f23b3b0c015c0802a7d0c619a4749c1d44e9f2be40031dacad2fe3468ce2a3f
libreoffice-help-dz-7.1.8.1-15.el9_5.x86_64.rpm
50c1ef449c729132f739aa212ef1f81ff3e1567d3117a994cb16c48614429947
libreoffice-help-el-7.1.8.1-15.el9_5.x86_64.rpm
b72fd8787f7ab5410f0aa2156afb8c4df13de71b297f1065110c54dc61278ff0
libreoffice-help-en-7.1.8.1-15.el9_5.x86_64.rpm
6541470e9e62b844e7c4a5ed890fe32cccbf1df20c1ab29085a4d72e894294a7
libreoffice-help-eo-7.1.8.1-15.el9_5.x86_64.rpm
1382e47d40e3d4f754d90b8ad41ccb4451d5155de3c92dbe24cd980f8bef5c7b
libreoffice-help-es-7.1.8.1-15.el9_5.x86_64.rpm
2650fed93bae6731280bd0906117fdbe2250c128c8de04949b0be654f6118297
libreoffice-help-et-7.1.8.1-15.el9_5.x86_64.rpm
538f009e3b5cd31b4175fca949bcbf01dc80a204e85d826c083755e71a5155e0
libreoffice-help-eu-7.1.8.1-15.el9_5.x86_64.rpm
2a7e04f98af0303d4fb50354822a3436534d7011c2db026626e8fbd14b4ddbda
libreoffice-help-fi-7.1.8.1-15.el9_5.x86_64.rpm
e0c9b13ecb3633ab5e94c59de36ee04df148ab12fea0e66688cbdf0db31f76f9
libreoffice-help-fr-7.1.8.1-15.el9_5.x86_64.rpm
55d8df43c00a4f25aa950054ca97c32cfb99de4a04af5f71fb0885872e8fbf4d
libreoffice-help-gl-7.1.8.1-15.el9_5.x86_64.rpm
9abd94ad29a159da666d2f72edf99faa8d46218cee438ac310b5929bc32077ee
libreoffice-help-gu-7.1.8.1-15.el9_5.x86_64.rpm
d649b18435425fb13056384bed439a05359bed89cd764a04c0484bb911316c62
libreoffice-help-he-7.1.8.1-15.el9_5.x86_64.rpm
85acc4036c0aee8f68bcfef8468ab26f8e899a8136f677ca6609b5d13badd7e4
libreoffice-help-hi-7.1.8.1-15.el9_5.x86_64.rpm
506bfa3abffe6b9b74f00505b256e27c72d65b33d882eabd4f343c45a0d76a5e
libreoffice-help-hr-7.1.8.1-15.el9_5.x86_64.rpm
14c4443cb5630ddafcf5aaea3ef741933904aad2fbbb2b7f5b5b0aeb79b5e89f
libreoffice-help-hu-7.1.8.1-15.el9_5.x86_64.rpm
cbc66d0f3b03906211b635898dee5c03e87247196c6cc640489b3422eeaa14e3
libreoffice-help-id-7.1.8.1-15.el9_5.x86_64.rpm
3ab54468c13c647d1690e89c866c7b9e4f1eee7607e28c76c2ad39608cfd53b0
libreoffice-help-it-7.1.8.1-15.el9_5.x86_64.rpm
0dc2829f57bc2da438204fc06b1edaa92778f059714cfa49ec40ce102fa8689a
libreoffice-help-ja-7.1.8.1-15.el9_5.x86_64.rpm
32b5b7af8ace29ba915acace228a4d9a5ca855fbbbb1afd2a728748db1086d7e
libreoffice-help-ko-7.1.8.1-15.el9_5.x86_64.rpm
7497a80f6efc0e3a13cf0a74a414e6ff41c9620bd9386022ed28357f11060a18
libreoffice-help-lt-7.1.8.1-15.el9_5.x86_64.rpm
fc7f3a2e2b73341fa7b7b57b1bc68af3df8c6619235a5b970d71d993426d4b02
libreoffice-help-lv-7.1.8.1-15.el9_5.x86_64.rpm
653b59d7eb4b708dea0ff96693f54ee45f521ce658c45be06e24dd3a6acc4b0c
libreoffice-help-nb-7.1.8.1-15.el9_5.x86_64.rpm
b8ff4138b5b50d1b81c1f0663f216a0affe8f04252730924cbdeee3080b6d9f9
libreoffice-help-nl-7.1.8.1-15.el9_5.x86_64.rpm
ae6058ed97702d0b2daa36ae65b98044779bec561ebf1635bd15ca364e6396a3
libreoffice-help-nn-7.1.8.1-15.el9_5.x86_64.rpm
857a57f51f2f4bdaa124ae3bdcb5c3fcbe5557aae1b24bbbd1d39ae5321bdb23
libreoffice-help-pl-7.1.8.1-15.el9_5.x86_64.rpm
3e7f0f562d03b1b13354baeb0adbb2266b08c4dd472f9d4901eb4c86f9165e15
libreoffice-help-pt-BR-7.1.8.1-15.el9_5.x86_64.rpm
b765fa3e99e12abe239548c89366315686600e8e250f16506fbbecca353a98b6
libreoffice-help-pt-PT-7.1.8.1-15.el9_5.x86_64.rpm
013a10cca2ca26e256159f140dcb719c8e7ea52929be9536241ff092fbbeb375
libreoffice-help-ro-7.1.8.1-15.el9_5.x86_64.rpm
32e82be0e85fb2ce7faf13c4bbf9bc0c7b535362747d3a4ffc4eec8bc0d11c96
libreoffice-help-ru-7.1.8.1-15.el9_5.x86_64.rpm
b531799160c83c2fe3c6d13830bfd3ffe23dbd808c4c8521a00870809d95e43d
libreoffice-help-si-7.1.8.1-15.el9_5.x86_64.rpm
f531f6cd2aa8937f93f48dbbee3fcb93857051ea40dc2cc758f352155dceec8b
libreoffice-help-sk-7.1.8.1-15.el9_5.x86_64.rpm
7726dcc76a86f2b89f9172c8f14429fae991ba44cd8fb33ea6d92d3c3b677437
libreoffice-help-sl-7.1.8.1-15.el9_5.x86_64.rpm
75e9f316a0d3d62d30b8c7c64a02711ec90990dee4938f00ef20a2ca7e7f20a2
libreoffice-help-sv-7.1.8.1-15.el9_5.x86_64.rpm
b38d0f0e5b55f60668b039192f5c74f6c8c565ac144b3b25e3d0f547576ac998
libreoffice-help-ta-7.1.8.1-15.el9_5.x86_64.rpm
e85379273aa371abdbdc693a0b588fd7f6f7274fc4189ab8e2a6db21656a0bec
libreoffice-help-tr-7.1.8.1-15.el9_5.x86_64.rpm
2b858a6ebf2c9892e57e0cbff1a66c133a7d9dbf8085fd00d08734c6133ecdef
libreoffice-help-uk-7.1.8.1-15.el9_5.x86_64.rpm
e5e2547dca6a47e98607683ae09ec98fd1a56d6683b918f532606d6db7a8a0ab
libreoffice-help-zh-Hans-7.1.8.1-15.el9_5.x86_64.rpm
576aae3feefa4b79dbb5a67b6133cc8a5d75dc66058c597f755da5488891c372
libreoffice-help-zh-Hant-7.1.8.1-15.el9_5.x86_64.rpm
3f64624272fedb256c122ab3d9873231f2fb71ed10e8311bb572fe3c2fc9c5d5
libreoffice-impress-7.1.8.1-15.el9_5.x86_64.rpm
0edba290fb818bac84bf1bec0b0ce4448fa8da52f1e79d6e267f38156798ce0f
libreofficekit-7.1.8.1-15.el9_5.x86_64.rpm
e9632bca05a0e10daec5dd5205473df3ee1d52603a1b6e9ad6efefc629798634
libreoffice-langpack-af-7.1.8.1-15.el9_5.x86_64.rpm
84220bf2e8915114b508b2da778bc6dd37e5f37047efe61bde045cb70e7b5346
libreoffice-langpack-ar-7.1.8.1-15.el9_5.x86_64.rpm
fb2c866f420e52b50fc58365bc60e75128787d1ef384ee7837adf81705024783
libreoffice-langpack-as-7.1.8.1-15.el9_5.x86_64.rpm
2dcea149d0ec26dd807babaf3576ada4dc155d97cd0cace451328cc7f8598a5c
libreoffice-langpack-bg-7.1.8.1-15.el9_5.x86_64.rpm
1ec3d2f7a8cd0be8c24fa577426640b7e4fa618e8e9e18b3d028df4387e8f112
libreoffice-langpack-bn-7.1.8.1-15.el9_5.x86_64.rpm
17b1ec2d8538e349777d41834f35f37552da22ab658d5fefe66f5656c1cd42a2
libreoffice-langpack-br-7.1.8.1-15.el9_5.x86_64.rpm
bd9ecee69c34229381949c6816a93e01bf734e792acf219988094eed1e78cfd5
libreoffice-langpack-ca-7.1.8.1-15.el9_5.x86_64.rpm
121d5ddfd6626642bcd94064e9b4761d73f16ca4b59f9f79985f974554050efb
libreoffice-langpack-cs-7.1.8.1-15.el9_5.x86_64.rpm
c3a381c07dd9f120b3f091f60badd3101516016f1610c212730b49efdef44d14
libreoffice-langpack-cy-7.1.8.1-15.el9_5.x86_64.rpm
f3e90ddd9d16bc25a8d63cf1b3fb0e461a9e76261695e5dd3bf019a19d9e35ee
libreoffice-langpack-da-7.1.8.1-15.el9_5.x86_64.rpm
6bb122fc000822f0fc39bb258f8e660d18c66c32872dd168921265f7db3b8e90
libreoffice-langpack-de-7.1.8.1-15.el9_5.x86_64.rpm
12716db4c4573bd1dc405ca480cf5c8594600223c7fae5fd08d92c04b2f3bb7a
libreoffice-langpack-dz-7.1.8.1-15.el9_5.x86_64.rpm
2b7aa4e1ab0a35f25c24028ab31b800632824ed98ef2e752a9586c2709acdcc2
libreoffice-langpack-el-7.1.8.1-15.el9_5.x86_64.rpm
b9641255a5993456835598ee406daa37df87378caec84ff80c62f379046eff21
libreoffice-langpack-en-7.1.8.1-15.el9_5.x86_64.rpm
2f7a30aba60c9697f20cf8b685e6db70b4f0de591dfb2453f946f45a48cf25ef
libreoffice-langpack-eo-7.1.8.1-15.el9_5.x86_64.rpm
da8f41cac4b019883a26e202022aace7cd7693de35029002bab246fd35ec0e08
libreoffice-langpack-es-7.1.8.1-15.el9_5.x86_64.rpm
a7fce4f7f796d3811364537907332971fc3acb42e25df649f7881c1c4ddefdab
libreoffice-langpack-et-7.1.8.1-15.el9_5.x86_64.rpm
31bf68ea06aad6e72ab51a3da3e2a50c2fdda47d819d122c692005f2ef0bc4a9
libreoffice-langpack-eu-7.1.8.1-15.el9_5.x86_64.rpm
3be3421746d6b88bd421e041c232028bb3f120ddd8275cc129dfd3cbcf80974b
libreoffice-langpack-fa-7.1.8.1-15.el9_5.x86_64.rpm
54cf436947b07341ca1497fc726e47f674289c7dd55283351aa4e1e5d763a3ac
libreoffice-langpack-fi-7.1.8.1-15.el9_5.x86_64.rpm
cbe2d9f50bfdc0915b96f076280906dacbdf3ead7dc55fdc7737d6c350e5c5b6
libreoffice-langpack-fr-7.1.8.1-15.el9_5.x86_64.rpm
aa36bb4a5a145f53253498ce80ee051da1bf403a72b87ca4af14c66a21222fcb
libreoffice-langpack-fy-7.1.8.1-15.el9_5.x86_64.rpm
5b5428923dc7472a4340d68cd4415ce9a3309eff897e4aec87494edc686d605c
libreoffice-langpack-ga-7.1.8.1-15.el9_5.x86_64.rpm
ec0238c4828491d972ba10971fe9d46bbb06301be22fc82b600724c56e8cdf0f
libreoffice-langpack-gl-7.1.8.1-15.el9_5.x86_64.rpm
25b09afaf7cfe836a203301827a83df2c3331684e040b452c5bbc1f4f14cc554
libreoffice-langpack-gu-7.1.8.1-15.el9_5.x86_64.rpm
74f00e151437305df955812d04042fe54004e090cc9691dcc1127ad967e7db0d
libreoffice-langpack-he-7.1.8.1-15.el9_5.x86_64.rpm
5980f3a67b207cb6a0a8bfe324180ca3fdcaaab0d189f6fde1f2fdbdc2bef280
libreoffice-langpack-hi-7.1.8.1-15.el9_5.x86_64.rpm
d189c50c9629a38505f4278fa890dd190aa872be2159a05e1ac895811e8785e2
libreoffice-langpack-hr-7.1.8.1-15.el9_5.x86_64.rpm
803b4219b9a137ff818fdaf07b2ed87231e3cb96ece04cc267c987f2d2afe806
libreoffice-langpack-hu-7.1.8.1-15.el9_5.x86_64.rpm
a1b76a3d277eefc35431bcb75314fa15bc54e5c3a0b89fe6f6264d546d506955
libreoffice-langpack-id-7.1.8.1-15.el9_5.x86_64.rpm
20077f814f3e4481d38e9beaf9cce866be3139a32b366ef6153845d9b6cd933b
libreoffice-langpack-it-7.1.8.1-15.el9_5.x86_64.rpm
ac4b2e98c93597d13829bf25d7fbeb4191b5d771c2516b5e1cf576861bbb1e47
libreoffice-langpack-ja-7.1.8.1-15.el9_5.x86_64.rpm
95385f721ed3faefb030bc99944a3856b0bf281ca92afffc85727830a9e60210
libreoffice-langpack-kk-7.1.8.1-15.el9_5.x86_64.rpm
361aabee1a088fa1f8335c58346969f5ec98750d63e41dfa2cad7a7ac7fbcc5b
libreoffice-langpack-kn-7.1.8.1-15.el9_5.x86_64.rpm
80b593fd11397e5f03a3ca33808cd7fbc4268369275a8fd4a8d97e098dbaa7cc
libreoffice-langpack-ko-7.1.8.1-15.el9_5.x86_64.rpm
fc2e704f66049c527cb6d05ff1ef825801a396f0ac6ee7755a7152b6adfd6fb5
libreoffice-langpack-lt-7.1.8.1-15.el9_5.x86_64.rpm
5ce3827e0b0e816d20b3e793ca9190ed96084d23ec26557700a788288e493411
libreoffice-langpack-lv-7.1.8.1-15.el9_5.x86_64.rpm
870f1e9a7714e4438a6bdebf9561dc97521a1fa9baf74949a6c262c32518ddcd
libreoffice-langpack-mai-7.1.8.1-15.el9_5.x86_64.rpm
0a51018376396079a344d1894c3e6124513143a770e533e412be17ebbdacb5f1
libreoffice-langpack-ml-7.1.8.1-15.el9_5.x86_64.rpm
cc88c3e7170ec11252ba9bd5fe72d2496c86aeb3ae55c995e0dc61525391cf67
libreoffice-langpack-mr-7.1.8.1-15.el9_5.x86_64.rpm
5e6d44b280a088fe130f9f37c17c1efe69b2b69cbf97d70e369f0ddba784abf4
libreoffice-langpack-nb-7.1.8.1-15.el9_5.x86_64.rpm
d097f1039c672ec6e675f94abb8b7e87eaa8c7793e88829e7227a87b4965416f
libreoffice-langpack-nl-7.1.8.1-15.el9_5.x86_64.rpm
bc51fcfa8b26dabb4b6a064880ee5cce187e985092342301df20da6468e16201
libreoffice-langpack-nn-7.1.8.1-15.el9_5.x86_64.rpm
26c771a0d336fb44235a42a91b60f23eda5be164e60f7cf3ca7471fd7d2140ed
libreoffice-langpack-nr-7.1.8.1-15.el9_5.x86_64.rpm
892996d09248a9d398fed41215a197541dfa53aafa4529e18ef1e59992e1b4c0
libreoffice-langpack-nso-7.1.8.1-15.el9_5.x86_64.rpm
74488fb0a0b5588ce63cc099ddbd389879ee3e8b491207c461463b926b67f0b7
libreoffice-langpack-or-7.1.8.1-15.el9_5.x86_64.rpm
a51db510894abf9ee3f8d3541c4f503d5e132de17f085aba4b9f3429d433b30a
libreoffice-langpack-pa-7.1.8.1-15.el9_5.x86_64.rpm
c482c8a62ebebcc23495512799efbc8f95c445b6e966e99641690ff1fb03ed38
libreoffice-langpack-pl-7.1.8.1-15.el9_5.x86_64.rpm
f5335b0fd9505d3bae455c0422067055dafc7a0f7bb60ff0ebd1fa7e6a569d84
libreoffice-langpack-pt-BR-7.1.8.1-15.el9_5.x86_64.rpm
b49c7a254518e840d5a82e09f114a219b8c358bb175a1aeb0dd39050811ca7b7
libreoffice-langpack-pt-PT-7.1.8.1-15.el9_5.x86_64.rpm
54c7e1be019f98a96ea7f9f2b928e234b42b5d078ebbc9532e3f1a8c79bb0dfe
libreoffice-langpack-ro-7.1.8.1-15.el9_5.x86_64.rpm
be9b284a43a059b2b92681f7fbbae8584e133fb650d36366166ee73b7ee763d8
libreoffice-langpack-ru-7.1.8.1-15.el9_5.x86_64.rpm
92726662876d9afb3cbe1f77c8061ed9fe346e37bdb6d0367b02eae34b2e0ef7
libreoffice-langpack-si-7.1.8.1-15.el9_5.x86_64.rpm
e0e4d0abfc43b87eaddf4aefa485f9907da37db1c6167a04a084d88199d021af
libreoffice-langpack-sk-7.1.8.1-15.el9_5.x86_64.rpm
12835c811094de23147c6603f7936b1fde7de7b78a2baeb9684eb5eb421cfbc8
libreoffice-langpack-sl-7.1.8.1-15.el9_5.x86_64.rpm
841b9f9c384abebfa163be0348cdafd2cc8f48d58923ed955e5d2867d7d1c06b
libreoffice-langpack-sr-7.1.8.1-15.el9_5.x86_64.rpm
2fcfdfeb3f19b5136e84505ef6dff527613a1cc40dd431284dd31eb3fabaa7b8
libreoffice-langpack-ss-7.1.8.1-15.el9_5.x86_64.rpm
87bce221867bc4d4ff3b76fcad731a174feed70c29de58b13eeb4b52342a5bce
libreoffice-langpack-st-7.1.8.1-15.el9_5.x86_64.rpm
28b9bff583c49fc68c29841d6bde58ebb16a2c4ce31eac44e787646a3806dc1b
libreoffice-langpack-sv-7.1.8.1-15.el9_5.x86_64.rpm
2c3eb4b341cf29e22fdd43bbe2024dba6cc0dc998aac41ca1c14e0e4662d91fc
libreoffice-langpack-ta-7.1.8.1-15.el9_5.x86_64.rpm
8fc5e2c2867fc4241c88734275a18c8400055c73f95827e15059fb89844ac0bb
libreoffice-langpack-te-7.1.8.1-15.el9_5.x86_64.rpm
5216eff6d612b0fa89ff183f56fe1338d686c1d9ee25938c8f488a51c777d209
libreoffice-langpack-th-7.1.8.1-15.el9_5.x86_64.rpm
a84d81252738722f922ab127897be2e64d55ee36366a89c905897cae55f25f09
libreoffice-langpack-tn-7.1.8.1-15.el9_5.x86_64.rpm
854e117b5a08b56e1acb24694609a384e2c380f35b6d7ec9f7f39b83c477a98a
libreoffice-langpack-tr-7.1.8.1-15.el9_5.x86_64.rpm
8f119c3f68d0ce6bfecc31eff88fabffd8423e9e1d21d620e78489f175e5c209
libreoffice-langpack-ts-7.1.8.1-15.el9_5.x86_64.rpm
8763bb30a816650eef8b75f59cfac18aa008c2eee0d50b83bd815bf7a6baf3cf
libreoffice-langpack-uk-7.1.8.1-15.el9_5.x86_64.rpm
019a83c4319b308f04eed31f56e8338c6b05c0e291acc79bfc9060fcb409d633
libreoffice-langpack-ve-7.1.8.1-15.el9_5.x86_64.rpm
339c57472a46e80466ee2d6b5e553417e8df1cdf47a132a055de519e8802ec88
libreoffice-langpack-xh-7.1.8.1-15.el9_5.x86_64.rpm
69a6b6b3e8a430d88fd5cefbc4f40dd79ce0e3d404bad901005de9da5fcbf9f0
libreoffice-langpack-zh-Hans-7.1.8.1-15.el9_5.x86_64.rpm
cc9cec42042fee6756e0d3e5ffd303ee408d585d51cb52c10927dec238f5682e
libreoffice-langpack-zh-Hant-7.1.8.1-15.el9_5.x86_64.rpm
c604f705429d3728a979d821b391388adc79cc23d941602c1342b4bfca7e7c52
libreoffice-langpack-zu-7.1.8.1-15.el9_5.x86_64.rpm
c5937b6fe8b2d44bbfd258a94226c9d2e56142c578b1669783e4295d28c2457e
libreoffice-math-7.1.8.1-15.el9_5.x86_64.rpm
605e952e77ad6d7cd2e08c4027df9c05ce0919f5db7d585646bb94ca510e29c1
libreoffice-ogltrans-7.1.8.1-15.el9_5.x86_64.rpm
d683103dcc6b7b9e0b8d8910c0b4cca790e210dfeead5bce85665b9dc7c45487
libreoffice-opensymbol-fonts-7.1.8.1-15.el9_5.noarch.rpm
5c697c4cd75af171ba3bf8a25e3d345bd8740e839406d324feb562812db8f735
libreoffice-pdfimport-7.1.8.1-15.el9_5.x86_64.rpm
dbd3b7224a7a51c20a0d3be94b14bb9c053fefa58ddf29532539576bb96e231a
libreoffice-pyuno-7.1.8.1-15.el9_5.x86_64.rpm
bedefeb133eb04a9068a96ec1efbc6455334a70132be96db601f2f67aafac843
libreoffice-ure-7.1.8.1-15.el9_5.x86_64.rpm
63874f086b533411000d1908ef4f049e823ca793fecd0809fe43cfed0725548d
libreoffice-ure-common-7.1.8.1-15.el9_5.noarch.rpm
919b8359cc2079a97274ec50c0ee1c1984cc18299906df769eaa00e7431b6f78
libreoffice-wiki-publisher-7.1.8.1-15.el9_5.x86_64.rpm
f71c0b4c0d79d61291ed1de978b5fa81b7308eed4af77dfc89a9a27e20dec0ef
libreoffice-writer-7.1.8.1-15.el9_5.x86_64.rpm
efe44a7a15c9856edb47bc66b0c60af77e6102c16e8cd1b8460e382bf12302ab
libreoffice-x11-7.1.8.1-15.el9_5.x86_64.rpm
cbf5f5aa6ed1e3531eebdb171344ea93d8954c026338a4a9f626d853d540b0b9
libreoffice-xsltfilter-7.1.8.1-15.el9_5.x86_64.rpm
af4f3cbc0948dcb6f3bbb29f53ed286febb795735f5ae2bec1d257d8d77ec64a
RLSA-2025:3631
Low: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.5-2.el9_5.3.x86_64.rpm
9c9d12b1c28e51b866c7970a68ef7eac3e636d775c4a8f51ce3d8e033f9dd8ec
python3.12-devel-3.12.5-2.el9_5.3.i686.rpm
561825806417d650da739b460159cd20279aaa10f54c0313b89053d86a16230e
python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm
f658b5839b9b15edad5f333812f2cdc1a08a5c9d7c607671c608e1a578251201
python3.12-libs-3.12.5-2.el9_5.3.i686.rpm
256237758a161f72f1beb9964f5a43bdded8d5e74963d1f60f0a29e59af576e5
python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm
71efc1a9abeb08ea7a32a1899af4d9f31896361554cb09abf4f49974a50c274a
python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm
ff5d067fe54864d3d86f96c651fff6d665ed087ce328e87ab936fee00db14aad
RLSA-2025:3634
Low: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.9-7.el9_5.3.x86_64.rpm
23db3a5a3d124ba9768d9afeced2d6818332a582be85cfd2156fe87e09650614
python3.11-devel-3.11.9-7.el9_5.3.i686.rpm
ad41b83a4fbd5e093f7dda6b180d8022f09bd39820e2d0572ab1aa4a5b7fde5c
python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm
7b6956d7a0d77045b6494d74c34b02528492b559e557642e8cbd269c0a4ca9d3
python3.11-libs-3.11.9-7.el9_5.3.i686.rpm
743d1e202b391dbecb9bc4133ce84fdb9c057085ba498d35254f8b0051d874c3
python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm
4a2020a0c6d29cfdc48af361b7fe14af058f27bfad7d4ec42171899a34ccfed5
python3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm
ee13a821996e5cabb1296365a4dc90166dd442a86ceb846494e8b8b50b06d9df
RLSA-2025:4491
Moderate: 389-ds-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.5.2-9.el9_5.x86_64.rpm
502f331b400efb9c3160463ef959cc59e410bddc47e2f23c0935a55f43cece11
389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpm
5d972b05b3a82942dc7d32c95b0389b99f9a051ae2e203f62a17ed2520560216
389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm
9ad472b9ea9f5f3a401f069a219a0729cc25d4c0e470275d4a09abce3722dc86
python3-lib389-2.5.2-9.el9_5.noarch.rpm
36768b6576ca2bca5d30864d479f774eab8ee837b7e93d23302793330e2e1184
RLSA-2025:4487
Moderate: ruby security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220)
* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ruby-3.0.7-165.el9_5.i686.rpm
26e59bd281d897bdd3266cff009a4179f81183c6c14dfcc5562d912387c0d4dd
ruby-3.0.7-165.el9_5.x86_64.rpm
3b4038dc1fa27b6a3391f1e4ce8e870d05aabc87b946d2b53dc7e436fa54b67b
ruby-default-gems-3.0.7-165.el9_5.noarch.rpm
a66c0571c61bd5f0bf4141791047523054c7f6c6b115f539789ae9d173d0b1b0
ruby-devel-3.0.7-165.el9_5.i686.rpm
226428611370dfe47725db7829ec2d3792431260da7854f6418d6480f46b10aa
ruby-devel-3.0.7-165.el9_5.x86_64.rpm
f1b1fb02527fef327628f49f6d860f6e483fa9ad1a50f3f6f0ed7e491e73cf04
rubygem-bigdecimal-3.0.0-165.el9_5.x86_64.rpm
906e410e6bf821fd5bd88e6f52f8f7501b778be561281c2a5a0bec422755cd2c
rubygem-bundler-2.2.33-165.el9_5.noarch.rpm
15c379e53d948ef7045c56023a796718e24cd1fa0af653d196910da29132e1ff
rubygem-io-console-0.5.7-165.el9_5.x86_64.rpm
a6e011968f2085f72ea1995bd19f05441cb949735f4c746727fe7ad5126753a5
rubygem-irb-1.3.5-165.el9_5.noarch.rpm
6ce90dee15c92c4b468461d1a5dae8ccc29a428c3190876a405efe26804635f1
rubygem-json-2.5.1-165.el9_5.x86_64.rpm
04b27cdc8bc8af6dfc65b96d7a8fa9e267b7032f54a658653c6ce018e919d79d
rubygem-minitest-5.14.2-165.el9_5.noarch.rpm
140df9f2417311d580a1bd957030f971c57c915d28a76431363989e4a4ebeb54
rubygem-power_assert-1.2.1-165.el9_5.noarch.rpm
518a3f8ca7db35f5e01da9399869adeb02b00c2b62d6c6d4340466141cd89dc0
rubygem-psych-3.3.2-165.el9_5.x86_64.rpm
c073c51a3ca710f5c03d9d9a0f5125a8955dea0d2e7317c90b3fbbd6cef10b14
rubygem-rake-13.0.3-165.el9_5.noarch.rpm
d3b1a70aa4fa04b8113029b6a2ae709271ca5c45c0b0146aaed31020279b930c
rubygem-rbs-1.4.0-165.el9_5.noarch.rpm
7908ef57ad09034756f13b2a2acb11a319e5500b996400ee865dcbf7570491d8
rubygem-rdoc-6.3.4.1-165.el9_5.noarch.rpm
50475bcf87161a9744fae86ba786a06621aa2bdb0c76aea46922c66a454b77a8
rubygem-rexml-3.2.5-165.el9_5.noarch.rpm
b354ce87b586cb6909321a9f3903ef313acf3da52c87230c98edabfaa921c64c
rubygem-rss-0.2.9-165.el9_5.noarch.rpm
4eb2721317ebadd8c0b4e03b11145a1a1172703ca21224f41ba034ddd2eed92c
rubygems-3.2.33-165.el9_5.noarch.rpm
77110de2a9f7e83e2df42f6ee7977aeed29e137b375f90fb2b32844dc44ac0b0
rubygems-devel-3.2.33-165.el9_5.noarch.rpm
492c895645d08e793f771d9ecf50690689783bc5926da04e738a9c6fcdec8b57
rubygem-test-unit-3.3.7-165.el9_5.noarch.rpm
dbec1a510ce6ed840988fe9c00ff3e7ed291f8deb91af80757d93d7701a183e4
rubygem-typeprof-0.15.2-165.el9_5.noarch.rpm
d16ae2dbb615c62251b74546577b22489c9d837430ad721b53d0c2fd68fa0b97
ruby-libs-3.0.7-165.el9_5.i686.rpm
c11a9cbe41165f689d2ece82bd9005f029392c2689a110b72db1df114ee51e53
ruby-libs-3.0.7-165.el9_5.x86_64.rpm
cc605e9f31d6ab62dc023bf65dd8d1286c60f9a122fdc42639ac01b064df96ba
RLBA-2025:2973
Moderate:mod_proxy_cluster bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality.
Bug Fix(es):
* Rebuild mod_proxy_cluster against httpd 2.4.62 (JIRA:Rocky Linux-70140)
* Rebase mod_proxy_cluster to upstream 1.3.22.Final release (JIRA:Rocky Linux-80435)
* Update deprecated misspeled EnableMCPMReceive directive (JIRA:Rocky Linux-82135)
rocky-linux-9-x86-64-appstream-rpms
mod_proxy_cluster-1.3.22-1.el9_5.2.x86_64.rpm
c6bd6e1ad674b8ceb49efee4c06ed72125b1303c0372590e4f8892aa3c1b5715
RLSA-2025:3113
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-common-4.10.0-76.el9_5.6.noarch.rpm
5919ab248b8025e88bcc9554062e04c9406e1b17849c66ff033def74c173d8dc
fence-agents-compute-4.10.0-76.el9_5.6.x86_64.rpm
921195169138cc32e55077fa604c15d02e079cd19a637e0e128da585eec893a4
fence-agents-ibm-powervs-4.10.0-76.el9_5.6.noarch.rpm
62c8ead516da824e97c05ab8f70290beddf665bb9e9485f8ee0c4efbcfa275a4
fence-agents-ibm-vpc-4.10.0-76.el9_5.6.noarch.rpm
25cfb3e83f562ae117c0f5dad201a89955851ed61c12805f47411c586d430adf
fence-agents-kubevirt-4.10.0-76.el9_5.6.x86_64.rpm
5d2a8508aa33a6479d600d6efb537e1a8a7c9fd8834943a42b601f64062cc4d6
fence-agents-virsh-4.10.0-76.el9_5.6.noarch.rpm
0ca3334e5bf88e6daf310dd09b89cdbb8ec4ef5d37f85eb77608f8474de8aecc
fence-virt-4.10.0-76.el9_5.6.x86_64.rpm
bf7dd02bfd5d8a81527289b8212af9418fc6e9dc8974626cc061309c530b115c
fence-virtd-4.10.0-76.el9_5.6.x86_64.rpm
e3aa48ec3645983a36dbf59d3862affc068b965e492f8cc9293c48e4c7aef21c
fence-virtd-cpg-4.10.0-76.el9_5.6.x86_64.rpm
491c394e597e8c7ec123751e0546d35a9b67914977dd32b9006bca18f8866cd3
fence-virtd-libvirt-4.10.0-76.el9_5.6.x86_64.rpm
b85b18d666b957f3b09fe4fc99ea17366a57b76a90828f92b90ee265330bc256
fence-virtd-multicast-4.10.0-76.el9_5.6.x86_64.rpm
ef283bd2322d87d0236adb9f6bf9910db073d63de7a6d29a05d91287b864c75f
fence-virtd-serial-4.10.0-76.el9_5.6.x86_64.rpm
ec1cf2bd753800030cab1e8c79adade5c47ad6501b0cfa189d2e0500529d6e0e
fence-virtd-tcp-4.10.0-76.el9_5.6.x86_64.rpm
1752742181b84ffa4f086afbacac5a069b226817dddd548a3190e4bf826be56e
RLSA-2025:3344
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-9.el9_5.x86_64.rpm
b49bd0c2a45b4b5ce54544d9276d248b1911e2e9043180c223bb6af9a46bb0ae
grafana-selinux-10.2.6-9.el9_5.x86_64.rpm
dd13d3d6e9ed0c34d1434fbcd34bc17ada464c926ce0f9e7e409adb73b6a53b1
RLSA-2025:3406
Important: python-jinja2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-jinja2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-jinja2-2.11.3-8.el9_5.noarch.rpm
614c6a8c726785841abd211d19efc1ec08e2cda1852c7b159f366e32718dcda0
RLSA-2025:3411
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.107.0-10.el9_5.x86_64.rpm
a8bd9ad015c01c8c32ccf5870343f8f6c57ad49b283d8a5c62065fb564e976a5
RLSA-2025:3645
Moderate: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: RCE due to TOCTOU issue in JSP compilation (CVE-2024-50379)
* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-2.el9_5.1.noarch.rpm
1defc3380205f799ac63578da48431802e5c2a3a89b633fdc53523f1f0dff5b2
tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm
a856d442f9e8d1c3b96d24a848c5647c4d583c22955ee971c9fd4787f4d9ee30
tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpm
b95a4cb12558d1304b8a042972f8c79f4e32ee02fff7d831d064ba31dda5b624
tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpm
5bfca0316b3637db78c757c04ebedf9e0590147e290f29d2e968350bee8f2f2e
tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm
dd6afb2ce63b79a2532e2524a4558b89c7d5624c73d4db19440e25a84e96a4d1
tomcat-lib-9.0.87-2.el9_5.1.noarch.rpm
1279618f17bfa3edb48d7f5c3948c120fb9946e8b22db1df96c9db43485271a4
tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm
175b3a7926c6005ad2786bbdef7573441c936af1c6264cb0e3f674de073566ea
tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm
28d6fd30622e5a5d46c742086b506adf89bcee85c60bb941c719a3bc8c5ff886
RLSA-2025:3713
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.48.1-1.el9_5.i686.rpm
09ad8896315f233ba0f9bfbc07951ddab5abb7f08ef74aaaa1fa70a997b0ada1
webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm
177734562a0ffa5f3f09dde52e7ad228d5690caaff1a6b2542c4c83e09b645c2
webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm
f609ec8203ef898e313f1e2ed8af35c686d903f2898b7ae9399c12f8b199b8b0
webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm
ca01e96c67e5fea3ef494f375d3947c37e8345de6f215a1398a1c8535f2a3ee9
webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm
47c6bdfa9204b037c6eb4276115b416d1f63c1d666677f892b7ee1190fd2398f
webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm
baf3b7ecfda5a32fe41ad401f284c2458e9edcfa1205800811197602f17d9415
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm
08778da4290e9ef2fd89e3cdbf23cbbe2b9c33d032790738aa24182afd81f398
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm
d73519f4ea3a5b303c861d1c7389e140ff28e656923d9f38b8127cbe14d59385
RLSA-2025:19105
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)
* kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
* kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751)
* kernel: fs/smb: Fix inconsistent refcnt update (CVE-2025-39819)
* kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.58.1.el9_6.x86_64.rpm
d8d2141081d54509d85819cf1858e9ee59a9d5e5a49ac28fd2ef0553d8fe410f
kernel-debug-devel-matched-5.14.0-570.58.1.el9_6.x86_64.rpm
01975b4717512421c0e8123b66b82d3ddb69ca0192c96910cb4364e7902aeba3
kernel-devel-5.14.0-570.58.1.el9_6.x86_64.rpm
bdd8e6e2f8c10557f786f1587d701583dcf0e0b5aaa88097fef7e7b426bb3adb
kernel-devel-matched-5.14.0-570.58.1.el9_6.x86_64.rpm
dec78697bdf5188f687b5325f94caac1c7bbc3f463c677acccef08d032e2634b
kernel-doc-5.14.0-570.58.1.el9_6.noarch.rpm
80ac780357661d7bb092a4d0f6d180c6281c4e78823014467dfd9fcaff94bc72
perf-5.14.0-570.58.1.el9_6.x86_64.rpm
033d18f3bf8002c24628fdfca3f0b128f42a1bf48fa50ac4878f2ec12a642d72
python3-perf-5.14.0-570.58.1.el9_6.x86_64.rpm
2156f3f7f2b80e4c2dfc64ef5dcb9e0b1cda05004da71549e45b515d12da487b
rtla-5.14.0-570.58.1.el9_6.x86_64.rpm
1e808be408345bc6d195de9ef65be6ab6fc2f4adc2085c444e00a6f23691f6af
rv-5.14.0-570.58.1.el9_6.x86_64.rpm
fcddb2a0028061a21f573d784a5a6fb56beca6cf839fa5c5b91c30bd828eee29
RLSA-2025:19113
Important: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: LibTIFF Use-After-Free Vulnerability (CVE-2025-8176)
* libtiff: Libtiff Write-What-Where (CVE-2025-9900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.4.0-13.el9_6.2.i686.rpm
37b2a23537fbcc583d9c5999d23438e5ed202283ba31c40590426c830d1a9613
libtiff-4.4.0-13.el9_6.2.x86_64.rpm
fd32fd77a542446c5de58e22632765ab9b502d094c60458957a703ec4a9b465f
libtiff-devel-4.4.0-13.el9_6.2.i686.rpm
496d62b6a5e308b4f646f94d95dab9d85abac23993f11a583af11c721861528e
libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpm
9f2ecb08e91230d6871ac3d2108d36caf6f33100c24ab390b482d38423c0f423
RLSA-2025:19237
Important: redis security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.20-1.el9_6.x86_64.rpm
8e07cc54df96ce47e64b2fc96a3af51239f6c7d88d3012dca7b4c533769cfb07
redis-devel-6.2.20-1.el9_6.i686.rpm
c8808cbc62240864af64c21ae7a93f37ce3304333f46b0a964e14134b07d16aa
redis-devel-6.2.20-1.el9_6.x86_64.rpm
fc52dbea571a75ae7967aa076606daf96982fd5074de1bdc87c7e826d94c6014
redis-doc-6.2.20-1.el9_6.noarch.rpm
53398a62a39a90635338c5a41777561275e68ebf2a497332205ef8b51a3f3183
RLSA-2025:21916
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for valkey.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
valkey-8.0.6-2.el9_7.x86_64.rpm
6a1c14616c77048ed9918d1e47aadc0b1bc61d30f53bb66d5fc7837331871b7d
valkey-devel-8.0.6-2.el9_7.x86_64.rpm
b96f79d7a173dcaff82ed3a3cea556e46c4f7eaf7ca9691e7a1da492fc417662
RLSA-2025:21968
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10922)
* gimp: GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability (CVE-2025-10920)
* gimp: GIMP WBMP File Parsing Integer Overflow Remote Code Execution Vulnerability (CVE-2025-10923)
* gimp: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10921)
* gimp: GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10925)
* gimp: GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability (CVE-2025-10924)
* gimp: GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10934)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-3.0.4-1.el9_7.1.x86_64.rpm
1646255db35fc81f6f378bb33c8b4e597609ab059a11bf91f73de72d46291f32
gimp-libs-3.0.4-1.el9_7.1.i686.rpm
67e44a804f657ced6d1a790177bcc764875a4299691582defff9002ad8cc7c62
gimp-libs-3.0.4-1.el9_7.1.x86_64.rpm
899bc4e52a7a228571c3427b3e8854422c8492aa9f50f25a7504513c752cc816
RLSA-2025:19584
Moderate: galera and mariadb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for galera.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Galera is a fast synchronous multimaster wsrep provider (replication engine) for transactional databases and similar applications. For more information about wsrep API see https://github.com/codership/wsrep-API repository. For a description of Galera replication engine see https://www.galeracluster.com web.
Security Fix(es):
* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
* mariadb: MariaDB Server Crash Due to Empty Backtrace Log (CVE-2023-52969)
* mariadb: MariaDB Server Crash via Item_direct_view_ref (CVE-2023-52970)
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
galera-26.4.22-1.el9_6.x86_64.rpm
ff0cceaccd03c9d92f22c0f88d89e707305528d2ce750f4e09e7d4da265031af
RLSA-2025:4443
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817)
* firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087)
* firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091)
* firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.10.0-1.el9_5.x86_64.rpm
ea07422540a0301c39afe8fe4d6af23036edc4d000bef5351c548bf5063e5606
firefox-x11-128.10.0-1.el9_5.x86_64.rpm
92115e9f925ddf5610004578442fb5dd47a1bcb139a35df15a6db53ad42fe57c
RLSA-2025:4460
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817)
* firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087)
* firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091)
* firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.10.0-1.el9_5.x86_64.rpm
3c345da09047edaf7e2c5611514829eea3374e7fd4a34db1429bd9dd87c555d8
RLSA-2025:4492
Moderate: qemu-kvm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693)
* qemu-kvm: net: assertion failure in update_sctp_checksum() (CVE-2024-3567)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
qemu-guest-agent-9.0.0-10.el9_5.3.x86_64.rpm
a2366ab92599dc8294aff24fc24a3fadbad218f0596a215fda67dd640900dbf7
qemu-img-9.0.0-10.el9_5.3.x86_64.rpm
c8484256286b782786b8605d79da69d3ffdad8b0b098c92bd5cca4853bbf7b9d
qemu-kvm-9.0.0-10.el9_5.3.x86_64.rpm
1681c3d80c70b50aa45b25ee0d899fc54c2fddcfb4f50fc434eaffe67ff088a1
qemu-kvm-audio-pa-9.0.0-10.el9_5.3.x86_64.rpm
d8b5190833cb501851c521816d61cb80f2c8b141a954ad4772ab5d45dc314561
qemu-kvm-block-blkio-9.0.0-10.el9_5.3.x86_64.rpm
136b1d85015b955a58c3c30e41c9565869a2ae27ccb4e8843d1a91c5418eaa48
qemu-kvm-block-curl-9.0.0-10.el9_5.3.x86_64.rpm
5b8cd58f70c3b58d92aeb8da64cd9014cdfce6ccbe60d0f06ebc5b14ef2d42a4
qemu-kvm-block-rbd-9.0.0-10.el9_5.3.x86_64.rpm
3236788bc018fc69dfa7e766b544e8be3a8ddef4fb6933ed0141d115afa9869d
qemu-kvm-common-9.0.0-10.el9_5.3.x86_64.rpm
3dba6cdd66b3b5ddaf1419f7a36cf3df8536d79cd5da7a7ad02467f1d08e3006
qemu-kvm-core-9.0.0-10.el9_5.3.x86_64.rpm
648ab321aa2eba1063d5594d2e9975dca19008f227d754df72596779dd8416ab
qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3.x86_64.rpm
5ebe3c6e98d9723bd553bca09a29bd79fbde84ca2a3558c654d137483cc93397
qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.3.x86_64.rpm
10b41cc1c2c689c69b1a975ccc8e2f7b9996baeeb503393342d7055f69b1961d
qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.3.x86_64.rpm
465f4c2e11afb8a209a7033c41a8c696e42afff38f59407e291a9a6449b243cc
qemu-kvm-device-usb-host-9.0.0-10.el9_5.3.x86_64.rpm
db7fb377de4757758ca6dbfed0e2ab8ea8fa8cbb00078b635c624b5ad8a2d942
qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.3.x86_64.rpm
77dbf2b5842e4b584390ce262418234cedf1bc60df00f9c37eb7553d66fbe85e
qemu-kvm-docs-9.0.0-10.el9_5.3.x86_64.rpm
1d67febbec318222714360b87e1f22a0eb9f3622e08f9c5c60180dc00ee1d9a8
qemu-kvm-tools-9.0.0-10.el9_5.3.x86_64.rpm
75f021791217edbb475910bbf0a7c2452d2ac5b841b04b06e8e048fc82a91518
qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.3.x86_64.rpm
968f32ce88710f49b61a23fa6978ebabb52abdfa9583db8c3542f3a568a1d49a
qemu-kvm-ui-opengl-9.0.0-10.el9_5.3.x86_64.rpm
bd568d822ff312679ceb23700ee6f10cb826adf3ab31e9c15df448cf68d72f5b
qemu-pr-helper-9.0.0-10.el9_5.3.x86_64.rpm
25c698ab3a4ad95bd41b8c9b1c3816fb9d73f82ced02978671a86d618ad4474a
RLSA-2025:19713
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-10.el9_6.3.i686.rpm
650f4a08e4e239e5302983fa4f575e16d127148c17b62e4af3b730d607c8f47b
libsoup-2.72.0-10.el9_6.3.x86_64.rpm
9e81b532cdc663dd56ed1b4fa985f4f18ee3d7685e3942650b97e2fbfab3ccff
libsoup-devel-2.72.0-10.el9_6.3.i686.rpm
052def4d3964d0735f218e9b2c2651a8c17f3958bf1df4aee42b022543a57f8a
libsoup-devel-2.72.0-10.el9_6.3.x86_64.rpm
58884142314219bc12a63d651279e19713ba407cbbacbf2467fd4f84a6bbfd75
RLSA-2025:4787
Moderate: emacs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-27.2-11.el9_5.2.x86_64.rpm
4db2921e83c2392cba48692f55ea579407926fcdbc3b58e019e533a654492314
emacs-common-27.2-11.el9_5.2.x86_64.rpm
0c56a6da81490bfd798cafebf5617c55e991730ef04d76aa466f42a537723491
emacs-filesystem-27.2-11.el9_5.2.noarch.rpm
ab4236bc25f78caf03c02b010d5473b72994b44f4c2914d95033491c8ef7e2a4
emacs-lucid-27.2-11.el9_5.2.x86_64.rpm
0dd479077927d780f907390d3c3f1611c993cae6a942d6954f63efcd0a05c277
emacs-nox-27.2-11.el9_5.2.x86_64.rpm
146d9cac21322b3ea9acc316587fc261511a4e5b520189d9d33a26c24bbe8388
RLSA-2025:7387
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.48.1-1.el9_5.i686.rpm
09ad8896315f233ba0f9bfbc07951ddab5abb7f08ef74aaaa1fa70a997b0ada1
webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm
177734562a0ffa5f3f09dde52e7ad228d5690caaff1a6b2542c4c83e09b645c2
webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm
f609ec8203ef898e313f1e2ed8af35c686d903f2898b7ae9399c12f8b199b8b0
webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm
ca01e96c67e5fea3ef494f375d3947c37e8345de6f215a1398a1c8535f2a3ee9
webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm
47c6bdfa9204b037c6eb4276115b416d1f63c1d666677f892b7ee1190fd2398f
webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm
baf3b7ecfda5a32fe41ad401f284c2458e9edcfa1205800811197602f17d9415
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm
08778da4290e9ef2fd89e3cdbf23cbbe2b9c33d032790738aa24182afd81f398
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm
d73519f4ea3a5b303c861d1c7389e140ff28e656923d9f38b8127cbe14d59385
RLSA-2025:7138
Moderate: protobuf security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for protobuf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* protobuf: message parsing vulnerability in ProtocolBuffers (CVE-2022-1941)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
protobuf-3.14.0-16.el9.i686.rpm
c3eb56f882a74970aa215fa43d17a460e9d3f1e33816d084efa2d7bdb9ec021b
protobuf-3.14.0-16.el9.x86_64.rpm
a82026191a8f49c916d838de0e5da8c7d4ef8a67459d0030fda03502b3064aed
protobuf-lite-3.14.0-16.el9.i686.rpm
449f3b74dce8decd7aa4ed050d8409cbd652bc0de86de2c23a13381476ae4ffa
protobuf-lite-3.14.0-16.el9.x86_64.rpm
5bac32e143e0d1f0e4ef705d004c72dcd7962047a58935478fcffd1994ba7118
python3-protobuf-3.14.0-16.el9.noarch.rpm
c53884a58180b86ff7a2c426e9d55bde4328964fc65a6cec1a672a1524b47008
RLSA-2025:7178
Moderate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gstreamer1 packages contain a streaming media framework, based on graphs of filters which operate on media data.
Security Fix(es):
* gstreamer: EXIF Metadata Parsing Integer Overflow (CVE-2024-4453)
* gstreamer: AV1 Video Parsing Stack-based Buffer Overflow (CVE-2024-0444)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-1.22.12-3.el9.i686.rpm
75a4a92b6f8e87c0dc679e68fb66b97aaa070a0e047a06ad416410eb5502cc0b
gstreamer1-1.22.12-3.el9.x86_64.rpm
33bde0ad67e6c448220e9b328d6fb9a2ad51bef4df8801043376c48d98fe5570
gstreamer1-devel-1.22.12-3.el9.i686.rpm
baacf25a970f3c57147c2a100aed5a1d28d5e169469560734e4d9fbdae4d52a3
gstreamer1-devel-1.22.12-3.el9.x86_64.rpm
5d177096122c3b38e3df9f9d9fae8057b67e5137f12767de56182c157379d935
RLSA-2025:7243
Moderate: gstreamer1-plugins-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.
Security Fix(es):
* gstreamer1-plugins-base: ID3v2 parser out-of-bounds read and NULL-pointer dereference (CVE-2024-47542)
* gstreamer1-plugins-base: GStreamer has an out-of-bounds write in SSA subtitle parser (CVE-2024-47541)
* gstreamer1-plugins-base: GStreamer has an OOB-read in format_channel_mask (CVE-2024-47600)
* gstreamer1-plugins-base: NULL-pointer dereference in LRC subtitle parser (CVE-2024-47835)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm
e45d98a09ecfb3c75bbc98961efe85f1d9f2eaefefbf309c64a96189874ae969
gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm
a6bd8ad2a8a99a12009abab85ca393b53f4de1984f98cfc54799506356a1ba83
gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm
1fd775eac6f168f58dc3e9f669a548a662c4db013b749be94555b4d566aa0321
gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpm
9beda2c9e09d2c283d7138182aab1f50e61dc15b130649d6aa2766ccb5265f64
gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm
e1823bb1110fa1ed9e874b39e6b62a424972d74137cec2c0f0019e8b9e61ff64
RLSA-2025:7242
Moderate: gstreamer1-plugins-good security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gstreamer1-plugins-good.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
* gstreamer1-plugins-good: OOB-read in qtdemux_parse_container (CVE-2024-47543)
* gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk (CVE-2024-47774)
* gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk (CVE-2024-47777)
* gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk (CVE-2024-47778)
* gstreamer1-plugins-good: OOB-read in parse_ds64 (CVE-2024-47775)
* gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing (CVE-2024-47596)
* gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (CVE-2024-47599)
* gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate (CVE-2024-47834)
* gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk (CVE-2024-47776)
* gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling (CVE-2024-47544)
* gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47601)
* gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples (CVE-2024-47597)
* gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read (CVE-2024-47546)
* gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (CVE-2024-47602)
* gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table (CVE-2024-47598)
* gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47603)
* gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (CVE-2024-47545)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-good-1.22.12-4.el9.i686.rpm
988d01ad916c58b26783d8d33afa2c609ad192bf196e975bf731a76eb803d42e
gstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpm
cb86e4840ddcb69ef66c29e643a7ec6fc5131b5c71e90f01985a01af102991da
gstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpm
dbb41e66549f580879c91d092b626bb019cd2639361c00995ee52ab68108ec08
gstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpm
34fa23217fd5cb1223f76602129f732612790d610a3f46cafca61a5c963a17cc
RLSA-2025:7201
Moderate: corosync security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for corosync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software.
Security Fix(es):
* corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
corosynclib-3.1.9-2.el9_6.i686.rpm
8823e5580c3d1c9167946ab86fa55837940683aeb0f0b3204814a8abe87ab451
corosynclib-3.1.9-2.el9_6.x86_64.rpm
86e737632242193fb9f0241cf098a4a9da871b164f5be5698d15fca67bca8029
RLSA-2025:7309
Moderate: openjpeg2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for openjpeg2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: heap buffer overflow in bin/common/color.c (CVE-2024-56826)
* openjpeg: heap buffer overflow in lib/openjp2/j2k.c (CVE-2024-56827)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openjpeg2-2.4.0-8.el9.i686.rpm
00985eadaeccc5212a6bd2ff3d732297363fd80693e59ac1fba3a73143ab019c
openjpeg2-2.4.0-8.el9.x86_64.rpm
a7ab9643943926f99d24dce2a3b523593c19a11c5afa130c4c71364e0e118008
RLSA-2025:7410
Important: libxslt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libxslt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism.
Security Fix(es):
* libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxslt-1.1.34-13.el9_6.i686.rpm
7406e396df62d04c205e3c5d04a66ad0fd5dd8d58227823d4fd6f738062ef7ad
libxslt-1.1.34-13.el9_6.x86_64.rpm
fac9a4758013437961bc90a3ad59cf09e5dfd90c42a846e2d0f1b711a53982ec
libxslt-devel-1.1.34-13.el9_6.i686.rpm
67c259eaaf9e383b492d2375f7c3325bd3a317de94c8e62054ee37e81fe58f24
libxslt-devel-1.1.34-13.el9_6.x86_64.rpm
f818b9b6d575e618db858784885e4fbd8f796bad739c491d56b51ebd0838467b
RLSA-2025:7586
Moderate: ghostscript security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ghostscript.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ghostscript-9.54.0-19.el9_6.x86_64.rpm
29658fbde53511b9368698c154d33b8e4a7041b5bf71e4c3a6982f5a947d9964
ghostscript-doc-9.54.0-19.el9_6.noarch.rpm
9501701f96e64b9c109083e7f8fade953cd92d8b58eb4ba8f358b6b842a0df5d
ghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm
11498c8a3ede9045d27ae645e352faad7bcac3fec2118ddea57e7352e9a59ce5
ghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm
3474c367f0e9c4dd748760dd593dc5692afca9f8da007c98696ef656c77199f2
ghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm
4dbe5f09fd59e1fe72d29be01073a0339a85b348a60446c4c927109314b08ef3
ghostscript-x11-9.54.0-19.el9_6.x86_64.rpm
11459c4865ed30e8eb5c5e52b1ed47062999c382c20a21925adf705d76a7b153
libgs-9.54.0-19.el9_6.i686.rpm
6327f190cba5539a86d2fd19dfa88e0eaa26fcca4465fd62ea467a6981fe62ab
libgs-9.54.0-19.el9_6.x86_64.rpm
ee8079fc47bc470aaf92d7880170539fedbb5a3e7c1d027128836c1599c441fb
RLSA-2025:7937
Important: compat-openssl11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for compat-openssl11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSSL toolkit provides support for secure communications between machines. This version of OpenSSL package contains only the libraries from the 1.1.1 version and is provided for compatibility with previous releases.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm
3392695869abf2bea47b8239c00697a11bbf9d00fc0a852e88ac4a928c0f6f91
compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm
2305692961df47a4a61a3b76c3af8ac980fe005ff7a80b3a72c4ce95aa835b82
RLSA-2025:8136
Important: python-tornado security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-tornado.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-tornado-6.4.2-2.el9_6.2.x86_64.rpm
33c96a6cec2bee69cf1ea7e8cf9d89ed88096de573cf1374d6f4c37a2c731674
RLSA-2025:8183
Important: gstreamer1-plugins-bad-free security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm
e8e6bbc3538f5dfa1a9d5329f400fde552ef408422fa488dba87e70d6d5571ec
gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm
16556eb3ee74fa01173d74c60b2a00918d1f387ca38afd3762e4fff2e79b7fca
gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpm
75ae2e8341bf60c49e70dce636a8d3d585fef98938ad753b171f93ea95d45e80
gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpm
f417d761bee31270b39be6952a96a92da02a979dbedda06d7f449334ea7e4189
RLSA-2025:9118
Important: libvpx security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libvpx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double-free in libvpx encoder (CVE-2025-5283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libvpx-1.9.0-9.el9_6.i686.rpm
03018357da366c09d97dd32b0b38b5f87e1a982cf17f7ba7b5b6ecba62b11fa3
libvpx-1.9.0-9.el9_6.x86_64.rpm
39b33df758653f9161c702d7aa5917b3ea20ba5349639033fbeadc0d669f97f0
RLSA-2025:9327
Important: libblockdev security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libblockdev.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID.
Security Fix(es):
* libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libblockdev-2.28-14.el9_6.i686.rpm
009de7846aee550fc1537daf45717a2e99ddb456d5b9b053d2b1f249766ddf2d
libblockdev-2.28-14.el9_6.x86_64.rpm
d3de1a92652b2512958b9c5420e9b07bc190e8d1305d3e4584291ef045d7eb87
libblockdev-crypto-2.28-14.el9_6.i686.rpm
5191e2575a94b2c7e1f6e47da5a7818eb22a9aa7d8e45e4dd0d0c39e6a72ef64
libblockdev-crypto-2.28-14.el9_6.x86_64.rpm
1ac8a8ac8dfce7a709f7c8147461700c73370dc0681aa904bce6f765096bfd58
libblockdev-dm-2.28-14.el9_6.i686.rpm
0e1fd8581a8ebb616c3d1438e5e8b1b24ab8b9e82213230308432f1fe1a8754f
libblockdev-dm-2.28-14.el9_6.x86_64.rpm
97b3c2a56da4651309b1e10fc66674e187690df18f4259a7a6be5c16b2373b14
libblockdev-fs-2.28-14.el9_6.i686.rpm
fefc41337d46cde3e84ce5591888bf0a1f78a7ee1120f64ce478f374ae54b320
libblockdev-fs-2.28-14.el9_6.x86_64.rpm
0cb5962dcc3dfc5b5ec6fa4ed9d432a6110110ee23c6e8a33e3d690bb57ed961
libblockdev-kbd-2.28-14.el9_6.i686.rpm
49b8aef93c15b520eee92a8d3334b5650533889e7f7421c0cc1d1abb8d3383d7
libblockdev-kbd-2.28-14.el9_6.x86_64.rpm
7d86c3ed397e70baa7ce1c14df9819a4c9c2a295cb8eaeb46a98786177ad5582
libblockdev-loop-2.28-14.el9_6.i686.rpm
c696614fd2c188141adaf0a192445ce5660a3fc6284a98c02fecec7c36e9e4b6
libblockdev-loop-2.28-14.el9_6.x86_64.rpm
bc91317b817601a520ab558163a983e537b7b5cc0186eba246deaa8dd344c7ba
libblockdev-lvm-2.28-14.el9_6.i686.rpm
8f3f22e461d92efd519c305a3a56f7204d97e120f1c2812cf9f5bc8a087ed0e4
libblockdev-lvm-2.28-14.el9_6.x86_64.rpm
2e66b996df5d66bfafc6b1f5e5183f439ad706242e9bd1fa7165286dc471feef
libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm
f1786f9a278a973704e42d3486c703c5d4829250fed3d94bb5eeef76ef343c72
libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpm
3aaf095ad4f660658054074d7cde7600b2da686c7e94d734cf3b4295953f05eb
libblockdev-mdraid-2.28-14.el9_6.i686.rpm
f16639c802e1ba3d56aba1caae1b9c0cd9062c9948a8323f8190ce582ecb5655
libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm
ec2c21fae9ac16d3abd622be149fd42cc13da2d77e61a6ef71c8e2e124a4a9dc
libblockdev-mpath-2.28-14.el9_6.i686.rpm
753f7e845fcd1683750699e467efd0441e021f39a73830c5782e8fbd9773d32b
libblockdev-mpath-2.28-14.el9_6.x86_64.rpm
64809864a3ab1b2c2f861137979d9b9c18cc0c5fe0535eb5fb59a1e7c49eec8c
libblockdev-nvdimm-2.28-14.el9_6.i686.rpm
7fbcfbb60e612bda112a3428b5fd622630000ab79486e4af852c7dfdd7e06c57
libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm
73a216d11de7fce7badffd87ee7243ddb419510054620686011ca74ab16b98f0
libblockdev-nvme-2.28-14.el9_6.i686.rpm
6823e269785007d0d3df42a92ddd20b193583819a22d93892f00aeb5674185c3
libblockdev-nvme-2.28-14.el9_6.x86_64.rpm
9ae47ba2a3a268e058a7a6341906e37950c8ccbe4c81cd1ab4cad99aace600a3
libblockdev-part-2.28-14.el9_6.i686.rpm
8d26d1fd427a5e3090dc214c017f2f47af741e7d0e657bcf5951208dcaf0ffc7
libblockdev-part-2.28-14.el9_6.x86_64.rpm
acbf9eb663bd90dbeb06b62aa2e01b434b80defa1732b891bb415e9c8155964f
libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm
bbb5278eec47221b5cecfb9017d27c2f365483d81eabb130f476474dd6d2c87b
libblockdev-swap-2.28-14.el9_6.i686.rpm
5714bc5ae0a0481f243a494abf022569ba846095b65f3c12ae311d8adf18b1ab
libblockdev-swap-2.28-14.el9_6.x86_64.rpm
dacd203e283ee62577189f95233ce0517a1a929b4f6c84c77366a562ef6dd134
libblockdev-tools-2.28-14.el9_6.x86_64.rpm
13c85104a44349ebeb91039b0eb2ba749f638aca4369c593cf03edf12268b519
libblockdev-utils-2.28-14.el9_6.i686.rpm
645add8d698f969da4503a60c84978d470acbf343ffa14ad713086b8faa29a16
libblockdev-utils-2.28-14.el9_6.x86_64.rpm
def83bfde9972f284bce04ca6b3e06f92444ee2191ecd8fd0e92bcf207646358
python3-blockdev-2.28-14.el9_6.x86_64.rpm
e5e35052daefdebe60c3cc696392dd09582aadb9c9f6b10196213f0728326cad
RLSA-2025:7428
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817)
* firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087)
* firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083)
* firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091)
* firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.10.0-1.el9_5.x86_64.rpm
ea07422540a0301c39afe8fe4d6af23036edc4d000bef5351c548bf5063e5606
firefox-x11-128.10.0-1.el9_5.x86_64.rpm
92115e9f925ddf5610004578442fb5dd47a1bcb139a35df15a6db53ad42fe57c
RLSA-2025:9462
Moderate: qt5-qtbase security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qt5-qtbase.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt.
Security Fix(es):
* qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qtbase-5.15.9-11.el9_6.i686.rpm
b5ef4a6d5577208e33abd248910818a0f4b95dce8041110e128272a5097ab427
qt5-qtbase-5.15.9-11.el9_6.x86_64.rpm
b88498f0b37fa8d6ede110e781abca32306d9316f9cd0c889fab6fded88a52b9
qt5-qtbase-common-5.15.9-11.el9_6.noarch.rpm
20e7ce9e6bf4335c1ac3bb2d28f85643a18c6392cea5670c4fdf7c739e77d78c
qt5-qtbase-devel-5.15.9-11.el9_6.i686.rpm
93b8498ea18fc261f1fddce20432b377320b4ed87b5841cc77881971b8788422
qt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpm
44f736a733f8f0bd607c9b694e7923041cedec55c60b4758155d4aecb5a3efe0
qt5-qtbase-examples-5.15.9-11.el9_6.i686.rpm
64d7b4a67aa0f0be14a148bbcecd0cbe4cf79959c94fcfa75c391d959743a464
qt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpm
6e87268e4edb70867e8de2e199bfe3334507950660c525936da97c9b20dbb636
qt5-qtbase-gui-5.15.9-11.el9_6.i686.rpm
556cd476866b5a84a8ce86c6a1817dec94758540c8046a1248df174f58f96029
qt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpm
8869d9e1c48449b9bd89f915d27af13989134124b651b002edca35d6604bc830
qt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpm
c889bebd0e0b3c1a793e2eb0fd9026d9918ea01ab07bae5e45b9d0b9bc31cdf4
qt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpm
346105f68f78c3284a381c4102a712ad70f8d8800093c7d272523d7fc6b3f467
qt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpm
9aca7f26e7f9dd51f8e71fa7653a6155c856ab98cca44e0b9c544444e0744c58
qt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpm
b3812af421ea49c97c152f5d0c10e2c1561ac420cb92cea0075a88617affe285
qt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpm
b60aa44a3c268f32b2c1315b7cd3ae59e7d4da4d97a597500b9335b74cc6ea03
qt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpm
5e59459a3262cce083dc2e90e0a9ec201dcaf9c5747a3a9c2812d74c5ada9ef8
qt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpm
a82088897e8f96db4c215e5f2e70901926536a1817ee4a22744edc7dc324d84d
qt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpm
f652f3e83d77166df729cb5da4b016cd1421de68147cc43d893fd9cbe1843ec2
RLSA-2025:11804
Moderate: perl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for perl.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-AutoLoader-5.74-481.1.el9_6.noarch.rpm
5fb4cf43908ab35d97b5a2323ca4710668ede5313302ee3fe5cce2b4b9c3b5f5
perl-5.32.1-481.1.el9_6.x86_64.rpm
dbe5c42d3d60472ca9e6d658cf22b7783b21b789f3e33092edbfd48bf4a9e204
perl-Attribute-Handlers-1.01-481.1.el9_6.noarch.rpm
b7fde8984ae43f5d340aa86750157e22308d619d9f556dbe1deadace6470c9f1
perl-AutoSplit-5.74-481.1.el9_6.noarch.rpm
953af599f6d042f1a2f529801cae15f0ac48e65fde620f413a873d09658fda54
perl-autouse-1.11-481.1.el9_6.noarch.rpm
35ea81f7805f9ce850f5114c64a61e05a67c49b39cb46db50f6d71b34809d1c3
perl-B-1.80-481.1.el9_6.x86_64.rpm
3bdb1db099cd202d219129d30ce9dc2adbeb23ede667cf0a0fd22f6349540f9e
perl-base-2.27-481.1.el9_6.noarch.rpm
3d77858021530864b6e353f78a4aea3dd21c9ddf14ca32296a0dc165a9b9eb7c
perl-Benchmark-1.23-481.1.el9_6.noarch.rpm
2f1bcfeddb2101af957644119d98d499b965b5a7f9cbe4627350ee06bcdbf5b2
perl-blib-1.07-481.1.el9_6.noarch.rpm
e83ece24493b302bbebeb6167ec7cbaa732c601076ae286687ad1e4dc6531f71
perl-Class-Struct-0.66-481.1.el9_6.noarch.rpm
d77c297f4c93074936a0a50fd932d7b43eb623401e5b73590db76c7f0ba469dd
perl-Config-Extensions-0.03-481.1.el9_6.noarch.rpm
c00e88ef4bcb1819c3267e0b48889568b4248a568f0a4f00fba13e35ee238e43
perl-DBM_Filter-0.06-481.1.el9_6.noarch.rpm
0f30d6cd9f7a63966961b324c9b02b13a5fe9725599c46ae7e6b8acdfb476518
perl-debugger-1.56-481.1.el9_6.noarch.rpm
55f6270b30436d1c2787c43f091cb9934d7c1be599c9916d6e0b2f1f57bdc445
perl-deprecate-0.04-481.1.el9_6.noarch.rpm
ed5caaff377140bd8ca66b8a0ee2ab4e9e195a27a6b2ecc8fc7814e75fbba423
perl-devel-5.32.1-481.1.el9_6.i686.rpm
ac5bfc81615d2c73ef559c65d51325223b58b6131a53e2bdbe77d2dd36f664c1
perl-devel-5.32.1-481.1.el9_6.x86_64.rpm
488a74c6b0869b80a29511467279f13cb9116ed26958844f8ef95f56c54f05bf
perl-Devel-Peek-1.28-481.1.el9_6.x86_64.rpm
38245f369e90c7249e45bb0d00ca8e28fc362b075f4c02edc6591b3bbd561efd
perl-Devel-SelfStubber-1.06-481.1.el9_6.noarch.rpm
66fbc9c049745a5cc9fa6ddbc70d4499fc7f424ae0dcdd0e2b01ef722facfcf8
perl-diagnostics-1.37-481.1.el9_6.noarch.rpm
909e293a65e028218ce54aecfbed86efeaec5d008b41fc906a4d0d3f89366613
perl-DirHandle-1.05-481.1.el9_6.noarch.rpm
3869f6612174c71856f32e1c7acad19184aa75b359f0c6c57ca1ab6b184b10b4
perl-doc-5.32.1-481.1.el9_6.noarch.rpm
93ae38dacdaf747ed61d1ea81d8d3e2c5bb01cef0a94219e9b3c1006d9cf8e97
perl-Dumpvalue-2.27-481.1.el9_6.noarch.rpm
3d1a975bb128bfe3ea089c80ff831554f13cbf2c898cfab4a4095409d7c15a6a
perl-DynaLoader-1.47-481.1.el9_6.x86_64.rpm
118df30163cf818f27370cdfb8d80da8426421e60bbf6f69ab5163d03eefff9f
perl-encoding-warnings-0.13-481.1.el9_6.noarch.rpm
0555675ea47f4283ec4ce861012ba73f549c27b8ce222c6501e2f56ae0817405
perl-English-1.11-481.1.el9_6.noarch.rpm
bd3cd54237fc263d97bb722f2efd8101bd08ff12e8c1ece1cc06fd0e170082f1
perl-Errno-1.30-481.1.el9_6.x86_64.rpm
ae4bef99c5797aa4286b39986ce30b05bcb07652b0f8b37d6c417e54ef8e37d7
perl-ExtUtils-Constant-0.25-481.1.el9_6.noarch.rpm
cbfd263eaa66249015845d4cf18617bacb536369e0bcc2276aaf90ab08c703aa
perl-ExtUtils-Embed-1.35-481.1.el9_6.noarch.rpm
37703f0b94bd27f8fa7fecf918ea5ac7166d7907ed2f622b2fee0e6d5045318e
perl-ExtUtils-Miniperl-1.09-481.1.el9_6.noarch.rpm
b39c73e2d061b964eae9db58c9f068f816848172fcf6c7986581ca7dcf2fd71e
perl-Fcntl-1.13-481.1.el9_6.x86_64.rpm
600072000bbb8dada561923e0bf1a005d5c12608d08c2aefa95446781c0fe98f
perl-fields-2.27-481.1.el9_6.noarch.rpm
fbf59d38f50cda7c68b7a28e49aba551cc7ea9ddf9c4582da60bae5555b3c057
perl-File-Basename-2.85-481.1.el9_6.noarch.rpm
5245601ae54986863aff6291badddfa294e4272e14f763a070048e75930b0e81
perl-FileCache-1.10-481.1.el9_6.noarch.rpm
790e8737e928f3351222102cf9e55fa7b970cf1686ee9a7f3589f444c8df5987
perl-File-Compare-1.100.600-481.1.el9_6.noarch.rpm
f182bfe4999e301a255154acbea11eb6da3b61935160373f7ccf7247c63ed6f6
perl-File-Copy-2.34-481.1.el9_6.noarch.rpm
17b5bc5daacc51aa48b8a5f925e7cbc087b13052766ce04372a5f8309182fc04
perl-File-DosGlob-1.12-481.1.el9_6.x86_64.rpm
45828558cf9ed81cade36f3de5ae1b2f47be788d261ee4c147a8e84e4a0dd8d4
perl-File-Find-1.37-481.1.el9_6.noarch.rpm
90c4d7147a3f43ffd5dd6d66cfbefde2e9577d59aaa8c6e7978f90e8ecbaef6a
perl-FileHandle-2.03-481.1.el9_6.noarch.rpm
85cf4db1d292557e1829c170c35063253a970ff6d338f1546b7d4d5032231287
perl-File-stat-1.09-481.1.el9_6.noarch.rpm
937ec664f943b994dcd175feec2bc74e64969fc3481f64981a6c09b146e4b511
perl-filetest-1.03-481.1.el9_6.noarch.rpm
75cabd873c80a40fe6cee606d787c5ce7d4f26d489a9084ce625a247332b4a9a
perl-FindBin-1.51-481.1.el9_6.noarch.rpm
d8109df03aa1e956b44ab90f9bc2e9f83bfd7eecc8f897c58630dc3964e1e2e8
perl-GDBM_File-1.18-481.1.el9_6.x86_64.rpm
593653cb21b557d9ca08de88ceabd32c3e827ad96f2af1e7eaf80f41e92266bd
perl-Getopt-Std-1.12-481.1.el9_6.noarch.rpm
42354346e696ea3de8178288d62d0ccab37d83d27558b6b5c820c57449d253e2
perl-Hash-Util-0.23-481.1.el9_6.x86_64.rpm
b47158323da02ba86214f43c64bc4571a0efb0443ad43b0da3cfa00f417591ca
perl-Hash-Util-FieldHash-1.20-481.1.el9_6.x86_64.rpm
20a6b3babeec3ab68233376f83693912a062610c5c854668a817254425313264
perl-I18N-Collate-1.02-481.1.el9_6.noarch.rpm
1e4dda25421f70b2ff63f199cf81b017b99587b0074c246717ee4922ec6e363a
perl-I18N-Langinfo-0.19-481.1.el9_6.x86_64.rpm
13179abe1903adbae4ea786f59e64af869b2bbd014b58d6aba4090e7446ba866
perl-I18N-LangTags-0.44-481.1.el9_6.noarch.rpm
5ff0af572b0c259b1032adf375350559bb604c2bda4ad7fed50764ff5a61fac6
perl-if-0.60.800-481.1.el9_6.noarch.rpm
75a4bd8f511c758b3c7e664a6a17181240e9d9cf127fb58710108b881676dd37
perl-interpreter-5.32.1-481.1.el9_6.x86_64.rpm
fda8d0616ed874871d9cd7a6083b08036837046c4abce155d911271b92d39f72
perl-IO-1.43-481.1.el9_6.x86_64.rpm
68682ce4f860ac680ee5c905aa9c1910b44c2530c4b88dfa3cb909ce05ca1b5d
perl-IPC-Open3-1.21-481.1.el9_6.noarch.rpm
db1136339fffd9825622420185994573788a88e1ffe25de3bc8fccc157e72c60
perl-less-0.03-481.1.el9_6.noarch.rpm
fafea2cbec4d596b00c38521e504867d9a0fef30de6c99ea0728c0b3eb5a0990
perl-lib-0.65-481.1.el9_6.x86_64.rpm
4b5035f73c3cb31beab8c3dbe816009c8661cf98285d34e22a064232db766917
perl-libnetcfg-5.32.1-481.1.el9_6.noarch.rpm
5895c230b771067b3e81ed0d1ff0b11800a6fcc6e948947b554909069b2fedec
perl-libs-5.32.1-481.1.el9_6.i686.rpm
8ad26d5b900611ff66a421e4a1f709cf3689a38846a4b11d1547bbabc70ce41a
perl-libs-5.32.1-481.1.el9_6.x86_64.rpm
e729814bf78fc5c3d6e8412a246a749884a9808288b980dc321cf5146cc24316
perl-locale-1.09-481.1.el9_6.noarch.rpm
2f4b6ece3eceeacea40cc9c61b365eea8778364454a88cefccff135a324d8b4f
perl-Locale-Maketext-Simple-0.21-481.1.el9_6.noarch.rpm
e3dd1c4c2f914cb3738956efff012440f644254c485ef0446c1176d00ac32142
perl-macros-5.32.1-481.1.el9_6.noarch.rpm
4a65ded6a8415ab2e50e78e0fe2ca3435d4eec1a22dfb4f4248b649f852a35f1
perl-Math-Complex-1.59-481.1.el9_6.noarch.rpm
a3289302aaf28f07fde001315f00b4764e39e2b444ff35c8224ec43b7e8e7110
perl-Memoize-1.03-481.1.el9_6.noarch.rpm
0a8f795579863b0faa6b4a003e202c4273b38f469697a0f1a48027c5d3c07599
perl-meta-notation-5.32.1-481.1.el9_6.noarch.rpm
123a7a0feb72c97e6b135dcf6ca9f2bbcbc6d1abc643be6dc19cca8ddf431c25
perl-Module-Loaded-0.08-481.1.el9_6.noarch.rpm
2f8b9e76d5a4c5e9bdaff93c82766cd010106bad95f3ae6a3edb19be8ded9c8e
perl-mro-1.23-481.1.el9_6.x86_64.rpm
f4b0857ba6580e9c3d7a774a3ef08ba203994b4334de1c39d86467c4e298f44f
perl-NDBM_File-1.15-481.1.el9_6.x86_64.rpm
0cb700df3a67a53fdca6feea4c60f097999d5231588f7701cdf9826383761429
perl-Net-1.02-481.1.el9_6.noarch.rpm
5e10b41626b2311cccc8c8923822fc7d7d5cf019f255ec1d0a03557ac1834b07
perl-NEXT-0.67-481.1.el9_6.noarch.rpm
994eb630a6440f4646775864a683bd7b8cca3806952566bcda5bd33fdab6ec7b
perl-ODBM_File-1.16-481.1.el9_6.x86_64.rpm
925a8bd8837270659a7b5836318933ac026b01c8c10f1771d4d98f34bef01645
perl-Opcode-1.48-481.1.el9_6.x86_64.rpm
bbacfbb4b41a0954d78b9ad36da4cb1213b8d381d6781f7ed13b698dd3cd9986
perl-open-1.12-481.1.el9_6.noarch.rpm
58079f3e4cb32e2fb12fef41da5df1600fd1af2c83ce0c3d9178313d81f86475
perl-overload-1.31-481.1.el9_6.noarch.rpm
6a88ad1df43e183e9b6abbc108a62915b02b397abd92dc43002f9798c6b46258
perl-overloading-0.02-481.1.el9_6.noarch.rpm
e884589964f5d37c8562ea4093225a9b1c9b827337f22bba3c19ba4378b61a37
perl-ph-5.32.1-481.1.el9_6.x86_64.rpm
26a15775eaece62708faa6125c0d5c645f71cf44c2f76c74e7ef15db88a8abd4
perl-Pod-Functions-1.13-481.1.el9_6.noarch.rpm
370e93a292b159be74b63097f952ce7d7b8ffd85c5066ed00d384a0ae820e704
perl-Pod-Html-1.25-481.1.el9_6.noarch.rpm
3fc47766cc0bf4decb53be466a0a6785ad86732b956c434cafa1bd6e903f75ae
perl-POSIX-1.94-481.1.el9_6.x86_64.rpm
78c011b363d5ffb5fece0737100c6e62c61121c4b8a2dbbbe933713043ce4158
perl-Safe-2.41-481.1.el9_6.noarch.rpm
8c600ab3f5bd460ee6fad5ea371e92efe5e68c8db46b22e0f3be88b0313d2622
perl-Search-Dict-1.07-481.1.el9_6.noarch.rpm
46ae56203051ddb047ef912678212d28ba15539aa693fecf49b155e2410570dc
perl-SelectSaver-1.02-481.1.el9_6.noarch.rpm
681ca4222fb9e6000312e51d65413e246cc592f34f8c2349d1658955a70a0024
perl-SelfLoader-1.26-481.1.el9_6.noarch.rpm
ba0809f70fa192cb3687c28af71f6987c79eabdc8fbe10883429b55169718e42
perl-sigtrap-1.09-481.1.el9_6.noarch.rpm
ddbfb602a200f500b3beb4314831406b25c8134853f128708f09f7799f437079
perl-sort-2.04-481.1.el9_6.noarch.rpm
7cc8e33b4bcfa93c2b6126699d557177c6911e07ae8ac37238f3f04ed9f2030f
perl-subs-1.03-481.1.el9_6.noarch.rpm
57065e051f3727449c7c72cfc34ef902235344261b72f5766e4852b4df2b00b1
perl-Symbol-1.08-481.1.el9_6.noarch.rpm
9dd7c6e3487dabc2868c7772313c96ecf8c5848d3bbbe031620cee3d4b5d4f1f
perl-Sys-Hostname-1.23-481.1.el9_6.x86_64.rpm
927719e74294944613cb139f35c5df66458cd4089ba801341a5d43b1b89d4f1f
perl-Term-Complete-1.403-481.1.el9_6.noarch.rpm
b5e72141a07adc14449b365ee2389fdaf903eb8e28f136e47ff8a655d91d08ba
perl-Term-ReadLine-1.17-481.1.el9_6.noarch.rpm
75053214c42026fe2ad3d37638ab1da651f1034de91c03c839a5bdcb279bb463
perl-Test-1.31-481.1.el9_6.noarch.rpm
d42a398b2860e78a1dde19caf7d416de3a0118b42e445bdba41efa0df6736344
perl-Text-Abbrev-1.02-481.1.el9_6.noarch.rpm
d325cf9ac0168298bf45e4e3c9fe0febae3da3541cb34896c8cfdfac86aa69d8
perl-Thread-3.05-481.1.el9_6.noarch.rpm
eb4e772e67ed2b2664ed63c6e264d65e339a154580f9a8c88ce8e8e53a6b88e7
perl-Thread-Semaphore-2.13-481.1.el9_6.noarch.rpm
7849541cf0bebb4e167f508433d2775c8f9ab8301e6c469f64e1c3d84684f3ab
perl-Tie-4.6-481.1.el9_6.noarch.rpm
6e53d2d9fed06c6387257c811767ff0b2ba815ae734158e77f78fcb6c7b9eb00
perl-Tie-File-1.06-481.1.el9_6.noarch.rpm
2a856e50c258e14fb6d95a20e3e60b60c4d2a38b5ee5f7bc2fea61f3855e0105
perl-Tie-Memoize-1.1-481.1.el9_6.noarch.rpm
6dc9bbcb3b9fa8bcae10a5533666ba71f629b7517ed4a64830dc3a6b94bea877
perl-Time-1.03-481.1.el9_6.noarch.rpm
08622730df9bba6a17ad403a71c6f58b9037fd028e354ed00b50486dba092638
perl-Time-Piece-1.3401-481.1.el9_6.x86_64.rpm
92bd06b709db6d57f5ca4ad53491910d86c1f3c293e88f9405547da7b9765a76
perl-Unicode-UCD-0.75-481.1.el9_6.noarch.rpm
2594bd55ebc2c570d50d7b9b5fe4a1465c9a5092bfc20b63d85bdfa7bb1ec11b
perl-User-pwent-1.03-481.1.el9_6.noarch.rpm
28a65a35bc868fba022bc05883fbda22b711c76e77954b522aaf217715780a7c
perl-utils-5.32.1-481.1.el9_6.noarch.rpm
ed7a215c1aa2df0853fc4b0ee2e5b88d583dc60b0ab6d18a67b8224e16023541
perl-vars-1.05-481.1.el9_6.noarch.rpm
1745cc552a7a9cc9165e5d5cc3a4e551ba24d1345afba25af71486e0d611531c
perl-vmsish-1.04-481.1.el9_6.noarch.rpm
b2d782c3b5f388e2027e714c7a4f8fb349db1a3999e184117aecb0dddce92bc7
RLSA-2025:12083
Moderate: icu security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for icu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
icu-67.1-10.el9_6.x86_64.rpm
bfd84f221c8db580aad975795c6b2459c807cc9ed3cdb6e5ef38d406a03c20ad
libicu-devel-67.1-10.el9_6.i686.rpm
7184ea0e7c721b50137809b6096df6a1c00deb3ad334789dc99fea7257c024af
libicu-devel-67.1-10.el9_6.x86_64.rpm
947757202db604346daaed541de7c63ce42a1e2035ab6741f65a837a8c20a791
RLSA-2025:12841
Moderate: gdk-pixbuf2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.
Security Fix(es):
* gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gdk-pixbuf2-2.42.6-6.el9_6.i686.rpm
69c13a62661f25cc6cd1abd9420f41a2acecf9fe1688669f8a939728e728d8ec
gdk-pixbuf2-2.42.6-6.el9_6.x86_64.rpm
45a809fb972eab8cec05fa036649ce53d1f68b48b0107b7ac9595facf387e8ee
gdk-pixbuf2-devel-2.42.6-6.el9_6.i686.rpm
bac98eff4998c620ba1960d77bcb88417691ac3e9ecbb8ccc7539cd5ce444168
gdk-pixbuf2-devel-2.42.6-6.el9_6.x86_64.rpm
d0de65f49b276d24517e38122474e5d646906e497c800cbd1b8210086889f7dc
gdk-pixbuf2-modules-2.42.6-6.el9_6.i686.rpm
2d354aff28a900919e92a33c941666073c4400af13d368ee74cfae619a95280a
gdk-pixbuf2-modules-2.42.6-6.el9_6.x86_64.rpm
d2e4f4c553ac47fd16cd245eb764397086f0763db580b6f50b52ff75eb5b5940
RLSA-2025:19433
Moderate: xorg-x11-server update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Please update
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm
032b6fcd9be72b1863d2cbe41c6b823c4e23e36fb151044b0a303082cbf286d2
xorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm
6d75104dc2c5df65e216f822918a15b4f81aa08c4c7686d59b35cc9d3fb8662d
xorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm
c5ed61747dbc0f8706f57c57090160f09a403d66be48ebef43c5b0b10af08792
xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm
5b1d663e9d707d539cf8405c95562d69fbebba9daca4c5aa9ab7fd2e116a61a5
xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm
4c7d67a2fe2927ba1f2ae4ec5b0b06752726838d2199e298f95db37ac58284da
xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm
283ebe5c8fe2246776e83fb0b54ea4483ba44a511d325bac0f554e4b6951e357
RLSA-2025:7435
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: User Interface (UI) Misrepresentation of attachment URL (CVE-2025-3523)
* thunderbird: Information Disclosure of /tmp directory listing (CVE-2025-2830)
* thunderbird: Leak of hashed Window credentials via crafted attachment URL (CVE-2025-3522)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.10.0-1.el9_5.x86_64.rpm
3c345da09047edaf7e2c5611514829eea3374e7fd4a34db1429bd9dd87c555d8
RLSA-2025:19623
Moderate: xorg-x11-server-Xwayland update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Please update
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm
dfbfc44c6e706b581fd881556eb63f10795d250c7515b6a1f2c378ba98b71a75
RLSA-2025:19911
Moderate: qt5-qt3d security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qt5-qt3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt 3D provides functionality for near-realtime simulation systems with support for 2D and 3D rendering in both Qt C++ and Qt Quick applications).
Security Fix(es):
* assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qt3d-5.15.9-2.el9_7.1.i686.rpm
240a5ab0de8252e90c888ed70eab240b8d49222dd725ad376e4fdd30960c9f48
qt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm
a13ddf6f33d82129a0bb2c935db5295fc72b3f0c099f94f2fe3501e534fc14bf
qt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm
195e8222a120d08952db77655129005fc0d8090a7e4bf7427a8232e99b5de44d
qt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm
41d6eff74766201a535c168ae3e98c1156d33faef0f7dbe64744df8940d7ca7e
qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm
8ab62dfb231a94678438846f7c9e54affbcfa46ea8efe3d2a474435c386c5442
RLSA-2025:20838
Moderate: zziplib security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for zziplib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
zziplib-0.13.71-12.el9.i686.rpm
b4cf54712c113b5a1f29d2d0e4b8b75193844ca7fe2fca66b9cc4d2fc7135024
zziplib-0.13.71-12.el9.x86_64.rpm
42742c43c45cad4d1f94521153d57f3af9e59ceca9bb2d556dce761f287d32be
zziplib-utils-0.13.71-12.el9.x86_64.rpm
8c51022bc245ac593772b35200a747276e7ddd7540c541bb759d98edcc77d52a
RLSA-2025:20922
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43272)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43342)
* webkitgtk: A website may be able to access sensor information without user consent (CVE-2025-43356)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43368)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.50.1-1.el9_7.i686.rpm
36a6b11e0a9ec5c30e5a2b81b2f10c156591374586487054753f74abd9946b94
webkit2gtk3-2.50.1-1.el9_7.x86_64.rpm
f9de574ef1d490355dd4f72b6814bbd6631c10dec61c06e1e22e70a0e704b2d8
webkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm
fab75570ebe6b342618143a7cc4decffde602bb43319d7d09e772d835fce209c
webkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm
d9f20d37974dda06e4fc0734ee4f488eadc3ac1ca7f574f63fcab6a455359493
webkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm
29fb2bc8b713bb0b6733af2fe1e4797afbb5c9adba969338926d317d0fb7682f
webkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm
ba73bb0efc5112031f91f3dccf8aca507730b558c3abe5ed15deec98e718ce04
webkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm
83b055353f5f6d65c2b8087ad052fb7591f30a34c8caf88902ccd3c930630af0
webkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm
ebbe190cece07ffc0db7d5bf4bdec434a6789ccc63dccf7204ccfd0e6a886a7d
RLSA-2025:20926
Important: redis security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.20-2.el9_7.x86_64.rpm
b6af6f27648781354a312ddb70936360851e405df17d609acb5f57e10960fce9
redis-devel-6.2.20-2.el9_7.i686.rpm
43b3ff74db78d8371d778f39601c1775ba6feeb4a65665d4e051e22bc6dd9eb0
redis-devel-6.2.20-2.el9_7.x86_64.rpm
6c0a5c6e99329c8dd6eb91e3abf971251cc1e074e2adee807ceda7b81fdcfa60
redis-doc-6.2.20-2.el9_7.noarch.rpm
694b0aa1e28a8e3ec5eb3c52b274a44bf29874d15309f2bb37cef0a7ef37452e
RLSA-2025:20935
Important: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects.
Security Fix(es):
* squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-22.el9_7.1.x86_64.rpm
ad76a332096983ed9dd856cf3224ab0b536fedffcc0b1ef76531b0cb98b39522
RLSA-2025:20928
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.12.2-22.el9_7.1.x86_64.rpm
1db32f836daffaa1b95a5d253eec8970b2c8a655b5d3b992d2a776490fd9bb51
ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm
2a2e85256480c36a73e96d2f392e2c6f05a1ce1b0ddd07d3b15984afe54b7bd2
ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm
6e3725205332c6cc25700d3d4ae19c713121fb633beda3ccf46c26e265b115a5
ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm
feabd1789490b9fdc39ceff63533fed60a6c3f02b067806cf9c559433a04ae18
ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpm
5656f152d3799e787720f22eeaee925d1259b5b856667c5c8dd039cf21cad90e
ipa-common-4.12.2-22.el9_7.1.noarch.rpm
ddafab49ba5ce4ee02962d6786aa3be19ee61d31a23d1c4c53d8b381d56b56b7
ipa-selinux-4.12.2-22.el9_7.1.noarch.rpm
2aa5fd136cddd78d253a4a7eee2d18cd01e3c95a343a5e3d6f1fc54506704562
ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm
b3f7adb60c52dce91de0db6f8da2f25cd64ffd7e382b02bfc90959117db6ab27
ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm
069fda08df229ea44e28b205a11deb5db6a610c9e2cebdd4ddda565fde1ce46c
ipa-server-4.12.2-22.el9_7.1.x86_64.rpm
4ba4ee79337e23804e7b9930fdf22e5a5025553e932982737ba80facdfdc9803
ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm
d9cea55896eb3e7d67d4ff6a0cd3d07e4b8b497e03bae9ab53ffbe9a85722eb2
ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm
ba89a99e04e56669dabe50ca5189a867d78df7d51f7c1fa366190185215cab34
ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm
1e48b7b7d5b09dedb90506b3a76b9e6fa5b8e58d321f60b92203fce4463fec1d
ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm
02684646ff0f8fc3d6bba4e480124f2903367f00b9378549d627131c04a8b42b
python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm
cba5e54e856d1105a64413e52d3acc30901e0b016be703e9ce9d95d2a22fb307
python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm
e184ca07ccd37590cbc9a091acfcd96aa4e946a429fd5fd7faaf06553aab577b
python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm
611a8606169acefe2cf641d899d7c6a2708ea0fed618a7ca9411711d0fe0b8c4
RLEA-2022:8164
ruby:3.1 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm
3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6
rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm
31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c
rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm
7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c
rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm
8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656
RLEA-2022:8224
php:8.1 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm
685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71
php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5
php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396
php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1
RLSA-2025:3617
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: dds buffer overflow RCE (CVE-2023-44441)
* gimp: PSD buffer overflow RCE (CVE-2023-44442)
* gimp: psp integer overflow RCE (CVE-2023-44443)
* gimp: psp off-by-one RCE (CVE-2023-44444)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-libs-2.99.8-4.el9_6.x86_64.rpm
0048ba8e7864961c3a88a296acafc9844854e9ce8d1b79700f99423dd0813964
gimp-libs-2.99.8-4.el9_6.i686.rpm
ba8b56877f3843a76746a5c75beb59b44d759331f9aa79a654323a05a091b81a
gimp-2.99.8-4.el9_6.x86_64.rpm
e60d5a3d2bf267eeac8e126983400d89c70c6682d292ac764ddae73ee133582f
RLSA-2025:20963
Moderate: qt5-qt3d security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qt5-qt3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt 3D provides functionality for near-realtime simulation systems with support for 2D and 3D rendering in both Qt C++ and Qt Quick applications).
Security Fix(es):
* assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qt3d-5.15.9-2.el9_7.1.i686.rpm
240a5ab0de8252e90c888ed70eab240b8d49222dd725ad376e4fdd30960c9f48
qt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm
a13ddf6f33d82129a0bb2c935db5295fc72b3f0c099f94f2fe3501e534fc14bf
qt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm
195e8222a120d08952db77655129005fc0d8090a7e4bf7427a8232e99b5de44d
qt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm
41d6eff74766201a535c168ae3e98c1156d33faef0f7dbe64744df8940d7ca7e
qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm
8ab62dfb231a94678438846f7c9e54affbcfa46ea8efe3d2a474435c386c5442
RLSA-2025:20959
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-12.el9_7.1.i686.rpm
79da9ee547a04cf327716b082cc2f5175739b20435d787b61f706702bafe9964
libsoup-2.72.0-12.el9_7.1.x86_64.rpm
9683fbd7fca1c432090f17ce546e25fc9c219f4dd3363f6bba0dccff3f0fd125
libsoup-devel-2.72.0-12.el9_7.1.i686.rpm
b05468d0cca7b0df9975af92f4691f05a59cc66b85fb6034af6439cc23c70398
libsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm
1f69dd1023f773111319b8585b9db955ac36470185bed0be4019820959f0d95f
RLSA-2025:20957
Important: runc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
* runc: container escape via 'masked path' abuse due to mount race conditions (CVE-2025-31133)
* runc: container escape with malicious config due to /dev/console mount and related races (CVE-2025-52565)
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
runc-1.3.0-4.el9_7.x86_64.rpm
0dae21eadd2ffe4ddec3f1a36138c496656954786eab22b99bbab4e537f3b88b
RLSA-2025:20958
Important: tigervnc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)
* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)
* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.15.0-6.el9_7.x86_64.rpm
6bcda1b445c5283610368a9319cf6944a6e6f196400881a0265fcd41b3a00baf
tigervnc-icons-1.15.0-6.el9_7.noarch.rpm
c5e8a131841af3b7dc3e2207fb06b67c5390881dbfae09b6d8c9a3864d90cde0
tigervnc-license-1.15.0-6.el9_7.noarch.rpm
817b211165e97f4fa07e4dd7347b429b1d6f369408c26fff04437a6673c3a129
tigervnc-selinux-1.15.0-6.el9_7.noarch.rpm
99d93f152eb19b73fcf0d530d1b33e018de778d30f5850f724df46e058783bf0
tigervnc-server-1.15.0-6.el9_7.x86_64.rpm
2094caf4cde76674578e6bfd0accdb9cbbc539b652ca3a704cf8f8b16fda3eb0
tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpm
f2d160035b17a5a9a71cead3c2268107c0c9d147ad2142174898d62f726d168c
tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm
295bf4f3c5889b1ca8abc549cd270106a9a05b2eacab4adc651da8194b38e5af
RLSA-2025:20960
Moderate: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)
* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)
* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm
dfbfc44c6e706b581fd881556eb63f10795d250c7515b6a1f2c378ba98b71a75
RLSA-2025:20961
Moderate: xorg-x11-server security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)
* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)
* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm
032b6fcd9be72b1863d2cbe41c6b823c4e23e36fb151044b0a303082cbf286d2
xorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm
6d75104dc2c5df65e216f822918a15b4f81aa08c4c7686d59b35cc9d3fb8662d
xorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm
c5ed61747dbc0f8706f57c57090160f09a403d66be48ebef43c5b0b10af08792
xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm
5b1d663e9d707d539cf8405c95562d69fbebba9daca4c5aa9ab7fd2e116a61a5
xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm
4c7d67a2fe2927ba1f2ae4ec5b0b06752726838d2199e298f95db37ac58284da
xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm
283ebe5c8fe2246776e83fb0b54ea4483ba44a511d325bac0f554e4b6951e357
RLSA-2024:0387
Moderate: php:8.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: 1-byte array overrun in common path resolve code (CVE-2023-0568)
* php: DoS vulnerability when parsing multipart request body (CVE-2023-0662)
* php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247)
* php: XML loading external entity without being enabled (CVE-2023-3823)
* php: phar Buffer mismanagement (CVE-2023-3824)
* php: Password_verify() always return true with some hash (CVE-2023-0567)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm
685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71
php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5
php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396
php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1
RLSA-2024:0675
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: dds buffer overflow RCE (CVE-2023-44441)
* gimp: PSD buffer overflow RCE (CVE-2023-44442)
* gimp: psp integer overflow RCE (CVE-2023-44443)
* gimp: psp off-by-one RCE (CVE-2023-44444)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-2.99.8-4.el9_6.x86_64.rpm
e60d5a3d2bf267eeac8e126983400d89c70c6682d292ac764ddae73ee133582f
gimp-libs-2.99.8-4.el9_6.i686.rpm
ba8b56877f3843a76746a5c75beb59b44d759331f9aa79a654323a05a091b81a
gimp-libs-2.99.8-4.el9_6.x86_64.rpm
0048ba8e7864961c3a88a296acafc9844854e9ce8d1b79700f99423dd0813964
RLSA-2025:21111
Important: bind9.18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind9.18.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Security Fix(es):
* bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778)
* bind: Cache poisoning due to weak PRNG (CVE-2025-40780)
* bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind9.18-9.18.29-5.el9_7.2.x86_64.rpm
df0e6e1a29e5e4021640b28d66ad2454bcafb711681f11a7a3cb02252dcf521a
bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpm
f01a4566ccc6bda8a771fa03abad15b21d07b217e5ef617368af1b3d60a7d611
bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpm
e7acc53688529f32c67562865b10e5614710e261869376ed4dd5db4523fa48bc
bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm
ea8d180a074fb4460729278f7d2ce472ac7daecabae574584826118bce7150aa
bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpm
93ee0d5dca5ba0f638fb12309202410f9a7dd50e816bd498088d04bfe90ac86f
RLSA-2025:21110
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778)
* bind: Cache poisoning due to weak PRNG (CVE-2025-40780)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind-9.16.23-34.el9_7.1.x86_64.rpm
d26b9560a3f7c7265ccc3846c3d01ebb609b4c3937449f3eb6a1c79ada5b485a
bind-chroot-9.16.23-34.el9_7.1.x86_64.rpm
a40bda7e49266813126a8e7cf2fbf15470cd628d82fcdf58957771edb6f695d6
bind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm
3e8b80afbada5181e2872a0618b1561eb48d933507bdcdf358e8f02bd9a6a5d4
bind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm
4ecbc7068727e9d7ceb601590ee379481a7fc4cf03f92b8428934a4539548cfc
bind-libs-9.16.23-34.el9_7.1.x86_64.rpm
3db01de3a089deae4596560cb01b58d4bf2886f53ec3f21a9030e1fc3c62a11c
bind-license-9.16.23-34.el9_7.1.noarch.rpm
3ae6c9f247d7469d329638368fbab16ff8cb81c5393b8802d2ddaecdd36066b9
bind-utils-9.16.23-34.el9_7.1.x86_64.rpm
31afb33a303ffad1bd52d78f36641e3df1056d75c69c4854d888264f0faf8aec
python3-bind-9.16.23-34.el9_7.1.noarch.rpm
3831dac464c7624f665f259652b3469d81056ab8fc5415ea039147963bb98b50
RLSA-2025:21139
Important: python-kdcproxy security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-kdcproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088)
* python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-kdcproxy-1.0.0-9.el9_7.noarch.rpm
ac33ca75c542ab1c6d4416011757a0ca4e98a423799c9860dc6d08ce1e0fcf52
RLSA-2025:21280
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018)
* firefox: Use-after-free in the Audio/Video component (CVE-2025-13014)
* firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016)
* firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019)
* firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020)
* firefox: Race condition in the Graphics component (CVE-2025-13012)
* firefox: Spoofing issue in Firefox (CVE-2025-13015)
* firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013)
* firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.5.0-1.el9_7.x86_64.rpm
65235237a788b6472e62c2227a9b64ed9e9c83a04384df4e40ebc120a00d6143
firefox-x11-140.5.0-1.el9_7.x86_64.rpm
d27deb19f6e8cc100abf0d19f2c54b8917361d2a0e197e7c8bc18994e81eede9
RLSA-2025:21462
Critical: lasso security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for lasso.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lasso packages provide the Lasso library that implements the Liberty Alliance Single Sign-On standards, including the SAML and SAML2 specifications. It allows handling of the whole life-cycle of SAML-based federations and provides bindings for multiple languages.
Security Fix(es):
* lasso: Type confusion in Entr'ouvert Lasso (CVE-2025-47151)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
lasso-2.7.0-11.el9_7.3.i686.rpm
d76ae2c0540b9fc9f68c17d409316c83ec09642f3ea4161bfb8697e18ba08188
lasso-2.7.0-11.el9_7.3.x86_64.rpm
4e62e80a7601caa723cdd4e579b9c94c5d599685d978abf1126e9c8daf4c10bc
python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm
d2edacfdc49babd84ff5487660a4896230351b86eb6526e2d24cc8a50c02c1ee
RLSA-2024:1576
Moderate: ruby:3.1 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.1). (Rocky Linux-29052)
Security Fix(es):
* ruby/cgi-gem: HTTP response splitting in CGI (CVE-2021-33621)
* ruby: ReDoS vulnerability in URI (CVE-2023-28755)
* ruby: ReDoS vulnerability - upstream's incomplete fix for CVE-2023-28755 (CVE-2023-36617)
* ruby: ReDoS vulnerability in Time (CVE-2023-28756)
Bug Fix(es):
* ruby/rubygem-irb: IRB has hard dependency on rubygem-rdoc (Rocky Linux-29048)
* ruby: Ruby cannot read private key in FIPS mode on Rocky Linux 9 (Rocky Linux-12437)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm
3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6
rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm
31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c
rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm
7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c
rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm
8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656
RLSA-2025:21693
Important: haproxy security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for haproxy.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
Security Fix(es):
* haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
haproxy-2.8.14-1.el9_7.1.x86_64.rpm
e94db3e49502e00f5d5664fdc06539ffdab72b381bfb5716c2b71d3b0371e75f
RLSA-2025:21702
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.6.0-7.el9_7.x86_64.rpm
d62bca2f3e3d39c26a90d837e64b319014a62183884c1d4a41ed4467729d21d9
podman-docker-5.6.0-7.el9_7.noarch.rpm
36045178688a10b69f05a6203b1e0e41849182bbd46adca0140a1ec29ac2f530
podman-plugins-5.6.0-7.el9_7.x86_64.rpm
63259144ff5b613232a815615fcddbf786ee548e6ceb1b3f5a5f02f7f574de9e
podman-remote-5.6.0-7.el9_7.x86_64.rpm
fae418dffc70ae49a6dea85436e5f9d16780235723c51606fa224bb7177fb75e
podman-tests-5.6.0-7.el9_7.x86_64.rpm
c1c7bfcb4f7db16d16a8f2eac2889b986f285fa79f3b4c06da62f5d3afa41f8e
RLSA-2025:21815
Moderate: delve and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang, delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Go Programming Language.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
delve-1.25.2-1.el9_7.x86_64.rpm
4c5b1c0821fac8319934d81d50eb9d5af849fb0d6098454debe5582575f3e145
golang-1.25.3-1.el9_7.x86_64.rpm
cbd73d0f59f59f7f4a0d3c9e6ce178bbdeda20d6b5d3f08b13ac514c233fcf61
golang-bin-1.25.3-1.el9_7.x86_64.rpm
a6512b2679b308db1b411e077b533393c6ed908a4e2c502531ffe8d83e52d921
golang-docs-1.25.3-1.el9_7.noarch.rpm
ee2670b960aa4110099084e07e47daeee27942db9c8aa98687e566190f6c84f5
golang-misc-1.25.3-1.el9_7.noarch.rpm
fffb71e9fa898a10b37c4035e9302e828939319e5fb3002ae71eeda0c751338e
golang-race-1.25.3-1.el9_7.x86_64.rpm
1d4ff79b6aa8587f22dc619b32b77b339179c0c7fc695214db2f4c72c518839b
golang-src-1.25.3-1.el9_7.noarch.rpm
1ff839bb6ac59e690a1659e0e5da16417b92c7d7afd8ff38e8aa58aad42fc829
golang-tests-1.25.3-1.el9_7.noarch.rpm
61f11419d913aaf9c5e01b197511529d95ecc899464ddb936b960e5b20c1c5d0
go-toolset-1.25.3-1.el9_7.x86_64.rpm
de9d9f3de31302b3854a218337ad0d8b1074ff55b82ac110a7459236791b998b
RLSA-2025:3773
Important: delve and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Go Programming Language.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
delve-1.24.1-2.el9_6.x86_64.rpm
0546dcd174478d65d0e8534b1c557e6ff85395a0d3049684f1fe487be4efd4bb
RLEA-2024:2244
new module: php:8.2
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm
323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b
apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm
48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1
php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4
php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.2.2-2.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8efbd8cea37b667dcafbfdfb0de2bf8d1150dabd06bf52e31719ef7af1ee6071
php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d
php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm
cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22
RLEA-2024:2343
ruby:3.3 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0
rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab
rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0
rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b
RLSA-2024:3668
Moderate: ruby:3.1 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.1). (Rocky Linux-35449)
Security Fix(es):
* ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280)
* ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281)
* ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm
3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6
rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm
31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c
rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm
7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c
rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm
8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656
RLSA-2024:3671
Moderate: ruby:3.3 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: ruby (3.3). (Rocky Linux-37697)
Security Fix(es):
* ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280)
* ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281)
* ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0
rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab
rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0
rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b
RLSA-2024:6785
Moderate: ruby:3.3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rexml: DoS vulnerability in REXML (CVE-2024-39908)
* rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> (CVE-2024-41123)
* rexml: DoS vulnerability in REXML (CVE-2024-41946)
* rexml: DoS vulnerability in REXML (CVE-2024-43398)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0
rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab
rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0
rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b
RLBA-2024:9280
nginx:1.24 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx, module.nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
e3c6944ba95608d0adf4c12369be5128909b1dc25e47ca57443882edea471fe3
nginx-all-modules-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm
7e770d61827c913560677583f650d68f42c7565d07dbe30e5d5b4b778239021f
nginx-core-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
1f18fa1a8b2b6e7dd61c51162b0e6c1737b5ccee6cd3d8e09369d9a7a24c5845
nginx-filesystem-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm
2ef9100409099e11fa653239e39e09cd0f0b639bc981662937778bd3199f0aa8
nginx-mod-devel-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
f669fb809be1b27eb36c670129b59a71a976d403846e7c9261182146b1b6d529
nginx-mod-http-image-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
8b6c17bf2a3652cca077ac44e7bcaaa4a2305a3ed48c3b3c624334ace9afa536
nginx-mod-http-perl-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
829288e8ab13002261b43dcc443d7883cf28c28576e62219c7a35a7349852b65
nginx-mod-http-xslt-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
b3aad91c5b362e6f3ba21b8ce263d7142814800f25f14b8a56194a6bd414067f
nginx-mod-mail-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
5760a6eda92f589b61319d0e9c1aaad0da99c9294fd06bc863a6738ae4d1f012
nginx-mod-stream-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
f4b8f06d1b55914ea8574f53a2f5d196b1db0b776bd505ab5b96515f28bbaebb
RLBA-2024:9285
nginx:1.22 bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for nginx, module.nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
85b6cc6d05a2247a6602aecc2e624eefbfe958d9ba385cd80a2544bd17fa6329
nginx-all-modules-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm
ce606d0f6a9420cd99082bf1b7b400e3f18ecd04b5f97fdd263aae4e1a9facfb
nginx-core-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
c4484257458ecfc811dd7477b0c909f61623e2ad7d146597d42ffe6644f9cd73
nginx-filesystem-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm
c6076d70f359d6879ea882f4613e945d80cf9227f1a74f50eb95e9e8a4b3d587
nginx-mod-devel-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
8ef0b240ff854892f21d8e29e435191a33cbb2880ad9e439b0933f45b8d51f1f
nginx-mod-http-image-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
59cf9ed416db98f7e601b83e9d4fae11df1bc7a7f55de06155f64ceece3252ee
nginx-mod-http-perl-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
2395878ef9c4b6a0b0fd132216eb859512a7b57db294f6e33286575ff363ffc3
nginx-mod-http-xslt-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
ea838ea4f9911689b67b8f28a8239fe88d6657268887b55438662a97cd06eccf
nginx-mod-mail-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
c8f2ce25ef92ebc00270a70954a3c3da58de1f44fe4936f88ee7f343d27db8f6
nginx-mod-stream-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
c5acdd66ad2e969ea49a378baeec87025f19fa748db31d2084b06b6162ebd7ab
RLSA-2025:23919
Important: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for httpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082)
* httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200)
* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_ldap-2.4.62-7.el9_7.3.x86_64.rpm
25a38309d8fc16024e9259a3b0b570bb31e9aac289aa6e1740c7bb536184ae16
mod_lua-2.4.62-7.el9_7.3.x86_64.rpm
c203b72ea9e57006bc79b6e384f6584db931c9b60b8749146ddc054f91e3d7a4
mod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpm
baded07b71378b0d5362c81c7cfaaf606e991bde9eb7082f5bf84e6ae1b5f818
httpd-2.4.62-7.el9_7.3.x86_64.rpm
343f3269a37e2aacfd7123b55e9c1f29945538e9b40972890152fbcf854d3c34
httpd-core-2.4.62-7.el9_7.3.x86_64.rpm
2759133ae53c193d2c8fd42fb27b61c507bfe4f86df0dc06a4374db2f317eb1b
httpd-devel-2.4.62-7.el9_7.3.x86_64.rpm
b33615b1465fa174fda5ecacfb1699334b98fafe8d363684dbadc67832982adc
httpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm
66d6a53480913acc22959f85a8e91e722bc3bb3a17a3c0dab076db12f18ed10e
httpd-manual-2.4.62-7.el9_7.3.noarch.rpm
2b3979c227cf7b5d9caafc262a9900b3e829ede0a71a8719d9a1caccb681ba26
httpd-tools-2.4.62-7.el9_7.3.x86_64.rpm
7e7e24fa7d231d009ab8960c71ee068658485818feb292796c272d59896c1205
mod_session-2.4.62-7.el9_7.3.x86_64.rpm
a3974277da003fe10536d4d3847de52f59869cb297252fbd69d406e7c706a90f
mod_ssl-2.4.62-7.el9_7.3.x86_64.rpm
0dd495755bf80f5d9a09fb404b68ba54ef0b91027d605bf6571d34d65dce3d45
RLSA-2024:10860
Important: ruby:3.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rexml: REXML ReDoS vulnerability (CVE-2024-49761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm
3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6
rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm
31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c
rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm
7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c
rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm
8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656
RLSA-2024:10949
Moderate: php:8.2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: host/secure cookie bypass due to partial CVE-2022-31629 fix (CVE-2024-2756)
* php: password_verify can erroneously return true, opening ATO risk (CVE-2024-3096)
* php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458)
* php: Erroneous parsing of multipart form data (CVE-2024-8925)
* php: cgi.force_redirect configuration is bypassable due to the environment variable collision (CVE-2024-8927)
* php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm
323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b
apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm
48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1
php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4
php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.2.2-2.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8efbd8cea37b667dcafbfdfb0de2bf8d1150dabd06bf52e31719ef7af1ee6071
php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d
php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm
cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22
RLSA-2024:10950
Moderate: php:8.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: host/secure cookie bypass due to partial CVE-2022-31629 fix (CVE-2024-2756)
* php: password_verify can erroneously return true, opening ATO risk (CVE-2024-3096)
* php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458)
* php: Erroneous parsing of multipart form data (CVE-2024-8925)
* php: cgi.force_redirect configuration is bypassable due to the environment variable collision (CVE-2024-8927)
* php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm
685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71
php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5
php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396
php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1
RLSA-2025:0912
Moderate: mariadb:10.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.galera, galera, module.mariadb, mariadb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Security Fix(es):
* mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) (CVE-2024-21096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__mariadb
galera-26.4.20-1.module+el9.6.0+31841+9417776a.x86_64.rpm
7da292844fc5b67bfcfb52b392711168f4dd148500e8abe0232db0d1864ba8db
mariadb-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
f61e7dffc815b9b1d50bf55e5c0ee7180641821a9cbbae4ac89862a1cb0bfef8
mariadb-backup-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
a626a1db0fa9504cd8f39c92be5c88c4ab6ce4d13e4455f2fe1aa0f1573d9563
mariadb-common-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
87ae1526e3d151edc7b6b47c4f0d8d0b619ff60142172d0f42db4f8ffd3dbe6d
mariadb-devel-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
08e629193e3880a3526894585d18ec278702283ea8ac0b0849cd7272411c09f7
mariadb-embedded-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
9be20c1f3c2dd52e8672b3e9a3dd3cb1dedfd4d356fd024072371662105012c9
mariadb-embedded-devel-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
e342372830a99b3e70c6980c881008caf158f3369339d65e5fbd7c837b57bd2f
mariadb-errmsg-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
dfd41f8ec3057bbab94861a6305555aa7d9602016ea2aff66fc0f8d70faf2830
mariadb-gssapi-server-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
a24c7683163f6de6b1cf520cbafa2bafeb1359307200c0e019a494a313b8bced
mariadb-oqgraph-engine-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
fade345133e0fe6be86b40daa3ecf61fbaa1260e2d349309b2e657a592763a78
mariadb-pam-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
c2d32d263621183db3d2294eaf9f690eb080960ac7d59e827834d7869e41fd34
mariadb-server-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
6ca1eaf64439fb4dc168be2a78657fa68414e0744af476c0f13184d16d2ad782
mariadb-server-galera-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
161099ff98df6130938b5e432a3c0fd53a96fc497d03e88564b1ad434255f055
mariadb-server-utils-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
c25d450f37911c85bce6076883a43ba8aa32fa12bd02529e471a9ef7d4ac2e8f
mariadb-test-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm
f6f69f5068d880014fa384edd08a5860e90c6f646738e3f1c8c899ace29446a4
RLSA-2025:23034
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
* firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
* firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
* firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.6.0-1.el9_7.x86_64.rpm
aa5c23af40fea7b4545e451b50114020f04903b01da1d389f82b755f8149a441
firefox-x11-140.6.0-1.el9_7.x86_64.rpm
6ab719eaeafde2d143a560d8fadbcef53e4b27771d386a222fc27a6faa9fdc15
RLSA-2025:7444
Moderate: expat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for expat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
expat-devel-2.5.0-5.el9_6.i686.rpm
46c03f42bb017257a45b8be91faf3d154b71b099235e73540a7b41c853745edf
expat-devel-2.5.0-5.el9_6.x86_64.rpm
be4c3fadf8cddee4bdb08507279a82d852e0095125a1058660a8736a695ad055
RLSA-2025:13428
Moderate: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-12.el9_6.i686.rpm
7d448438b5e2e2324b5ccb5bbc2504b36a175e1ef2445206ad01ac9ee09f59d1
libxml2-devel-2.9.13-12.el9_6.x86_64.rpm
9d066fabb9c198f22271073bd7b53563e5c42f7717317170fd85c0fd6197f9da
RLSA-2025:3261
Moderate: nginx:1.22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nginx, module.nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
85b6cc6d05a2247a6602aecc2e624eefbfe958d9ba385cd80a2544bd17fa6329
nginx-all-modules-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm
ce606d0f6a9420cd99082bf1b7b400e3f18ecd04b5f97fdd263aae4e1a9facfb
nginx-core-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
c4484257458ecfc811dd7477b0c909f61623e2ad7d146597d42ffe6644f9cd73
nginx-filesystem-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm
c6076d70f359d6879ea882f4613e945d80cf9227f1a74f50eb95e9e8a4b3d587
nginx-mod-devel-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
8ef0b240ff854892f21d8e29e435191a33cbb2880ad9e439b0933f45b8d51f1f
nginx-mod-http-image-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
59cf9ed416db98f7e601b83e9d4fae11df1bc7a7f55de06155f64ceece3252ee
nginx-mod-http-perl-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
2395878ef9c4b6a0b0fd132216eb859512a7b57db294f6e33286575ff363ffc3
nginx-mod-http-xslt-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
ea838ea4f9911689b67b8f28a8239fe88d6657268887b55438662a97cd06eccf
nginx-mod-mail-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
c8f2ce25ef92ebc00270a70954a3c3da58de1f44fe4936f88ee7f343d27db8f6
nginx-mod-stream-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm
c5acdd66ad2e969ea49a378baeec87025f19fa748db31d2084b06b6162ebd7ab
RLSA-2025:3262
Moderate: nginx:1.24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nginx, module.nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
e3c6944ba95608d0adf4c12369be5128909b1dc25e47ca57443882edea471fe3
nginx-all-modules-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm
7e770d61827c913560677583f650d68f42c7565d07dbe30e5d5b4b778239021f
nginx-core-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
1f18fa1a8b2b6e7dd61c51162b0e6c1737b5ccee6cd3d8e09369d9a7a24c5845
nginx-filesystem-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm
2ef9100409099e11fa653239e39e09cd0f0b639bc981662937778bd3199f0aa8
nginx-mod-devel-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
f669fb809be1b27eb36c670129b59a71a976d403846e7c9261182146b1b6d529
nginx-mod-http-image-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
8b6c17bf2a3652cca077ac44e7bcaaa4a2305a3ed48c3b3c624334ace9afa536
nginx-mod-http-perl-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
829288e8ab13002261b43dcc443d7883cf28c28576e62219c7a35a7349852b65
nginx-mod-http-xslt-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
b3aad91c5b362e6f3ba21b8ce263d7142814800f25f14b8a56194a6bd414067f
nginx-mod-mail-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
5760a6eda92f589b61319d0e9c1aaad0da99c9294fd06bc863a6738ae4d1f012
nginx-mod-stream-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm
f4b8f06d1b55914ea8574f53a2f5d196b1db0b776bd505ab5b96515f28bbaebb
RLSA-2025:3833
Important: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gvisor-tap-vsock-0.8.5-1.el9_6.x86_64.rpm
b9dee5d9cf2be3289905256a1074d29277538e429f3d1886e20e9f8423146d26
RLSA-2025:4263
Moderate: php:8.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php, module.php-pecl-xdebug3, php-pecl-rrd, php, module.php-pecl-zip, php-pecl-apcu, module.php-pecl-rrd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Leak partial content of the heap through heap buffer over-read in mysqlnd (CVE-2024-8929)
* php: Single byte overread with convert.quoted-printable-decode filter (CVE-2024-11233)
* php: Configuring a proxy in a stream context might allow for CRLF injection in URIs (CVE-2024-11234)
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm
685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71
php-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
6f953bf8a95949c5185a23905e837b7d87205ceaccea624a2e2d448803278ab0
php-bcmath-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
b95b4eb6afef3d5eee6fbae9ac81c9fe62ecb5735ea2508d328580f540826971
php-cli-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
42bce85c3c7f28108d42a51a024c1158c039de6e8ba1953861c6713e33c237df
php-common-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
4a1550617cabc9b0c286aeb81e854bcbb90f87af2ba87d6e68b33b2c39a74833
php-dba-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
94ff4e555fd7238dd217dcc0b1a92d18c82b1fd103ade2355ffc01bd68b0dfd3
php-dbg-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
e16b82276eba47f10ba66381db0196d19945a7f6cbea6ecbd1a3de091ce33443
php-devel-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
82688ffa7b10d5680df6511561dbc655354357931ce08455f6e0575aebf45c8c
php-embedded-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
00d78fa414a52ab3cd0be2bbdeff4fca8977fe8898640833fb9eb13326e2410f
php-enchant-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
0be2c414dcf4c70bc3f1bc81b63f7cb77d230c55680005556c8b6b938b9f7a64
php-ffi-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
fda6ff4b55f9eb96575d5e80463e66b89f474cedf34e6f6bc824e4981c0f71b1
php-fpm-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
28df12efaff1b963f8c7a4cf910d913e628d66a1d5e4a1d13436628c0be5c9be
php-gd-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
ee83566e04a31dfa513b8310a657f024275e75ee2926c442cc2844dc167b67cd
php-gmp-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
762ded2c635e008df2c217fb5750c9a2603ee6d452caa8946234035223686546
php-intl-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
a6e98b4bc7993c619a24d1637381bf4f84c0e6ada451e62e14564ccc337bb5c8
php-ldap-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
0cec6e001d2c41e0c6a4671fa80d6f39d86cd98b8d21d9a2ed0958d80d2277b3
php-mbstring-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
ba230bde7256bf2d49922060c711d008d5f2214747777d5e93fcb03082521de5
php-mysqlnd-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
536bfdf6a2a8f809351518b46fd9a707c50f1b2b763c3916ad441be5c8113896
php-odbc-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9b38274b0e8a7e1cc4be1ff63421dd678607d718600a1cedfe23670a4159e816
php-opcache-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
3afa2bd00b74bfdb75b8e495eb5ce7e7936a2c412d3223a509f1b81ca3993a08
php-pdo-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
bae7b09d2fc6fadd5caff86c3c7d2b70dbc3a312fea9b0f4e6a2faf477f885ab
php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5
php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396
php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1
php-pgsql-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
bbf05f9b7ed03b83c0d661bfb3d627e8e707ee28e11a5c68ef77802c46d246e2
php-process-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
18a064a6dee4ba480c906671c4d0e3c3e9f933af71ca3aa3a47b036e29ec3349
php-snmp-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
92f84f62cd0aa35490fed3713f76822f04eac367bd22e184f3b533d1a825db62
php-soap-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
3b53ee05390906632d6557bdd83a5862db5bd9176e6c2cb750ad7e3dd014ec33
php-xml-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
501c5c78256e1076b07f282e6fb6fb106c53639afd9b60fbc1e41ed4f84c20cc
RLSA-2025:7109
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: URL parser allowed square brackets in domain names (CVE-2025-0938)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.11-2.el9.x86_64.rpm
6917a8243e308d4cf7ee03d13f2ed4edcfb4efe2ec58f3e306a53d16a598d297
python3.11-devel-3.11.11-2.el9.i686.rpm
ea0446ff22ffa8271c49f96949474032cb50ffbc25935ced38a49dbc5a502f24
python3.11-devel-3.11.11-2.el9.x86_64.rpm
ae12c19b0e99f6ab48d694b4f6ff78cb64aae0e5214cfaf775ad9bb413e8ee8e
python3.11-libs-3.11.11-2.el9.i686.rpm
684c2dd72dc3717eab92a648507b7833279244ae3f365b60994f19526afce3ab
python3.11-libs-3.11.11-2.el9.x86_64.rpm
ae957346a9735f28f40cb1eae20521c101c48b4c5fc0274ad44507780f7e26ee
python3.11-tkinter-3.11.11-2.el9.x86_64.rpm
45d8b889758b9fda833d16bc50b77a811be69a617a54b9b19c47ca72ba166b48
RLSA-2025:4488
Moderate: ruby:3.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.ruby, rubygem-pg, ruby, module.rubygem-pg, module.rubygem-mysql2, rubygem-mysql2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* rexml: DoS vulnerability in REXML (CVE-2024-39908)
* rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> (CVE-2024-41123)
* rexml: DoS vulnerability in REXML (CVE-2024-41946)
* rexml: DoS vulnerability in REXML (CVE-2024-43398)
* CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220)
* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)
* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
ruby-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm
b805b6929ed7017d4d14c8e341e99ee1e2c4508ced03d9a742e9d0b5a83bb519
ruby-bundled-gems-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm
4497a8da496f16ff62d99e82184f9d1699181af3a160c6134a64cf70cdc191f1
ruby-default-gems-3.1.7-146.module+el9.6.0+31865+0893c253.noarch.rpm
71e4197a1b8208e496325db8c0fdbd6f5cdb3850e2f6766acd54b0287a09045f
ruby-devel-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm
35c111c42b607cea6b3301589680c4b6f5c7b76c3d9b6ed71c31a74cf78c9969
ruby-doc-3.1.7-146.module+el9.6.0+31865+0893c253.noarch.rpm
cb66ee7d9feb6dab1c2bf1c4dc35925f1141529bc9b602aca51448c4dd71bf1d
rubygem-bigdecimal-3.1.1-146.module+el9.6.0+31865+0893c253.x86_64.rpm
c1bd15b9d8b3235a524caa166f90ea024baeb7537a72b7a99920332bc810ab94
rubygem-bundler-2.3.27-146.module+el9.6.0+31865+0893c253.noarch.rpm
96cd44ea857359e725e8bdc2b399ff94de9539bd8be1c3071267afbc22c1a7d6
rubygem-io-console-0.5.11-146.module+el9.6.0+31865+0893c253.x86_64.rpm
678f2dfcb1916a2ef9a6abd1d1877265b9fbaaa0a56121dc22319add74dc3d85
rubygem-irb-1.4.1-146.module+el9.6.0+31865+0893c253.noarch.rpm
876c9e1be2eb80d34775c1862a51ee4fb408ba47bee53df5381631458da30140
rubygem-json-2.6.1-146.module+el9.6.0+31865+0893c253.x86_64.rpm
3c3b029590e1491be4deacf93076613c36ada9539f1c00a3aea004ed63a77f6a
rubygem-minitest-5.15.0-146.module+el9.6.0+31865+0893c253.noarch.rpm
99eb8313f31ec5b5e32d79ec0866a017cf431336b3a147b9411d6b28ef929c37
rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm
3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6
rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm
31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c
rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm
7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c
rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm
8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656
rubygem-power_assert-2.0.1-146.module+el9.6.0+31865+0893c253.noarch.rpm
8e64f6e1cdeb0b1c728ae200ecab5533a40e32b98bab153dcbe28f359c033d27
rubygem-psych-4.0.4-146.module+el9.6.0+31865+0893c253.x86_64.rpm
ddc9402e1ae0be4aff639e22bb57860ee6b40f988a4b7e4e6cec1903517ca64b
rubygem-rake-13.0.6-146.module+el9.6.0+31865+0893c253.noarch.rpm
d442dd0b20b83e0214073445f49511d7143b67abd7416977f56466ff127c9d01
rubygem-rbs-2.7.0-146.module+el9.6.0+31865+0893c253.x86_64.rpm
37aa46959277e6c375a4597449bf99cc00d72e99354eba3e1f6fd0ea27f55b3c
rubygem-rdoc-6.4.1.1-146.module+el9.6.0+31865+0893c253.noarch.rpm
29470e4f2bfde0eaa8f6c4d54e808280e12850b6d4709d0146c207fc575563a9
rubygem-rexml-3.3.9-146.module+el9.6.0+31865+0893c253.noarch.rpm
159b18a0d3e73723f9f150f6cb42cf51e64de610cfcfcba9e92e6cd47c9f3fb7
rubygem-rss-0.3.1-146.module+el9.6.0+31865+0893c253.noarch.rpm
33561ccb46b6d6beeef879c55275bdf4351f55f581ce66eeca899d4c3e18354f
rubygems-3.3.27-146.module+el9.6.0+31865+0893c253.noarch.rpm
fda7d8f388a0667e0836c7ef2f46d9c2b983d95a6db0ded25dc54a5ed01089c5
rubygems-devel-3.3.27-146.module+el9.6.0+31865+0893c253.noarch.rpm
7a52b1bd01a6902047f9f2d86d93bf0e6ed0923fc574018f6e33a498ee3cea64
rubygem-test-unit-3.5.3-146.module+el9.6.0+31865+0893c253.noarch.rpm
8a8de7378b6c3617a37d60b69c17c0842841ec243b197503565bd001c5e9ac83
rubygem-typeprof-0.21.3-146.module+el9.6.0+31865+0893c253.noarch.rpm
924c4230ba41917d704665483aec53db10770ffa6103bd25cfd593d82aef6588
ruby-libs-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm
265abd88ad9b6a068120c5fe977b9a6a0d23e4866fb2c62ff4d4412dbe58bbbb
RLSA-2025:4493
Moderate: ruby:3.3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.ruby, rubygem-pg, ruby, module.rubygem-pg, module.rubygem-mysql2, rubygem-mysql2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186)
* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)
* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
ruby-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
414f085f44d6967ccb721577b6f6359b024362e01ad703d2872f5274e7792e8a
ruby-bundled-gems-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
78b51a016b21b110656e3440dc0007db3b6d12ea16004b458ded0d8b289d011f
ruby-default-gems-3.3.8-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
c628fb95780719833760fa0031537198f8da0b229dbf4621b23718e99968aa73
ruby-devel-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
6b9840c7333231581512f8cc7fae6bccf9d7348ab4aae5723205dbf35fbaf82f
ruby-doc-3.3.8-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
d093247793b0506e7204056ac9b88e82fcb8d4414b0f60922bccc99b6846affb
rubygem-bigdecimal-3.1.5-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
71356537b67cc9c20e321231147a86b68faffce9bc953a8392345378f0f6d9c9
rubygem-bundler-2.5.22-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
49384b57c0e4229850a381719f8b02483395dc79acc603f59cf21b22b2a54851
rubygem-io-console-0.7.1-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
a5411942b17011033320413aa6d843b1247a23b8969c75417c8442b36982f435
rubygem-irb-1.13.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
d4788f0efd260d551f1726630ff2be4f52d1c09e2d6d6ad9cd53fbc25b33859a
rubygem-json-2.7.2-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
deff5756036cfaf991a70c57c476caa6fd9e44c8e5663d744d7a96fa9388adf6
rubygem-minitest-5.20.0-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
0665662c133b3c58487f25a3f1a3a24036f5eeb6aaec3a45a971069762a18ca6
rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0
rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab
rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm
df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0
rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm
227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b
rubygem-power_assert-2.0.3-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
d2559d172fe2cdbfa0b207992dcb7a6c085edc05fe5b56899394ceee0067e70c
rubygem-psych-5.1.2-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
5c67b8ec8fbdb9a4334ff97417d6cb6668043885261e7934df34c69c767b382f
rubygem-racc-1.7.3-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
d3638655bca019e1b59c6039a2f3a082d9a22476c7d2eaad560c1aadbb0e794b
rubygem-rake-13.1.0-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
12ea038f0db64e8747fe007a6426c5a2fa24550b1377a7ec1167ee0977adfb5b
rubygem-rbs-3.4.0-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
1e97877341ebe1d69a95d2d016f980150cf1018734fb3d1f4ff74b3e5ac56bf0
rubygem-rdoc-6.6.3.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
c43397f99cbe4a0a371c7ebefb234b0a66d4bfab74ed95a7f17e079d3f023316
rubygem-rexml-3.3.9-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
8a79d9aeacd8ae90e43ddd6dc3cf102b9bcc0b007f97347ccb2f1d0fae143782
rubygem-rss-0.3.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
82f0b515276eb526780f096cbe520df86abfd588bebfca37a167222180b14c1b
rubygems-3.5.22-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
db6e408960595c84f61919caf55241081f34aa8aa1dbc4ab7e42e3d7c0a64081
rubygems-devel-3.5.22-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
213b5eb92629cde83d677180f4d1fb32dd98b71e53a3fd2ee7007589bb965335
rubygem-test-unit-3.6.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
ea62f9d5779a678a0e0a3355de60891e7662ee8a7b4858aca59ad72e732fda17
rubygem-typeprof-0.21.9-4.module+el9.6.0+31867+3a5bf654.noarch.rpm
8789d1f24a3c047b3b97a05f639d857ac6a27796ed7c458f9e32761e8d64953a
ruby-libs-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm
d66588a092989974ede0ccd563c6aca336776737a8e508af2dc13d5a829b36d9
RLSA-2025:7077
Moderate: libtasn1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS (CVE-2024-12133)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
libtasn1-devel-4.16.0-9.el9.i686.rpm
71bb5295efbcb73d5170d6ebfcef2dc0154cbc25474f78b005b258b554222329
libtasn1-devel-4.16.0-9.el9.x86_64.rpm
6d7a60ababb38363adf4865da38018163216f4d532a261a094c4dcab99bb4b3b
libtasn1-tools-4.16.0-9.el9.x86_64.rpm
fde51297a49223b944285171b4beaf9f65bc329b04ee5448d3078e63dbfb7900
RLSA-2025:7076
Moderate: gnutls security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS (CVE-2024-12243)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
gnutls-c++-3.8.3-6.el9.i686.rpm
79d85d35efdbe5fc7321ccf94f311999ec3fce577b1ee7648676007f2de18838
gnutls-c++-3.8.3-6.el9.x86_64.rpm
74de7ae6c6167e56d0188609d9606de89c30466d7d88ff310e0175b076c1de10
gnutls-dane-3.8.3-6.el9.i686.rpm
dab415dc6ea14b15806280f19417975db309b32a9f158056d3ddc113965231a6
gnutls-dane-3.8.3-6.el9.x86_64.rpm
7c1ec57872b3376e1be139b9fee7e0f20e907ffbc1dd3f519501dbbdc3e06683
gnutls-devel-3.8.3-6.el9.i686.rpm
3bb2fb6a69feeb4a1d16f06653d54a77c109856a7b18c6262ffac846664800f5
gnutls-devel-3.8.3-6.el9.x86_64.rpm
9bc7c30c34863283f5a5a587ad0e7f29c849022dc2cf572b2a4fe2bd42e820ae
gnutls-utils-3.8.3-6.el9.x86_64.rpm
c9794ae476f753ea44bf4fa81ac75ee9a355f40f59303576fbb0ae13322b1d36
RLSA-2025:7163
Moderate: xorg-x11-server security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpm
5b97f86deab993c40b5a4924dbbb5d5139c2936fed9f995a889b9d9860b4cb61
xorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpm
397981748bfd773634557a5642500c946f98966b0b64d10f16a5a5edf8a83bcd
xorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpm
26a3d014df4460f655eaa443285cce2c27af1daf462bb6a59d4224b2053c3f8f
xorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpm
648e4718ca32face9c3b4b01b84e0c060c98ef1ddbd168d10985e9fe05d0dfb7
xorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpm
c0204962bd9f553b33028b914e45d38ba6f36bd9a11f58d13de2ff00f669b234
xorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpm
bc04f88b5c63e04e976171593cdf4bd2117be58e771a8e70bf6e713820799ea7
RLSA-2025:7067
Moderate: krb5 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: overflow when calculating ulog block size (CVE-2025-24528)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
krb5-devel-1.21.1-6.el9.i686.rpm
b355e41e4eae37577669371a8fad5a2b63fb92eacf8c617a21f165c4c6374b79
krb5-devel-1.21.1-6.el9.x86_64.rpm
0058720d254abb5c868d488cde201f5215399250c1d19a47987646b1a1d7a030
RLSA-2025:7165
Moderate: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpm
24e0157d86220f9e783ed5c724615b37f0968d17a2bf42a299a64e2ec3536919
RLSA-2025:6977
Moderate: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: URL parser allowed square brackets in domain names (CVE-2025-0938)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.21-2.el9.i686.rpm
e678a716ae60cb489ba7a64dd8e9a42aa8b82b82a9a16e2d073e4a4507488044
python3-devel-3.9.21-2.el9.x86_64.rpm
d85a2d35693e97b4741e65d5cb971d5f88c05bbbd7d10bb20d5c78b22af225a8
python3-tkinter-3.9.21-2.el9.x86_64.rpm
677bd6cc2cc9b941824b1ee77762eb2594dc409785679ce3631acc489278ffba
python-unversioned-command-3.9.21-2.el9.noarch.rpm
f53ddbcf3b02464750b46878a0e5787807515b1726febaface13243dac8cfb8c
RLSA-2025:7107
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: cpython: URL parser allowed square brackets in domain names (CVE-2025-0938)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.9-1.el9.x86_64.rpm
46567eee64b69d1f5228f9aa0240b21fb2b8541d226d14b2139920e3f8c4596b
python3.12-devel-3.12.9-1.el9.i686.rpm
ce9327b9153149cb43257ffe9a3cadd52a5bd0bd39a9c3fb0f56d9f3488f1f0b
python3.12-devel-3.12.9-1.el9.x86_64.rpm
fb43153ec85425475304c6a8791d168e478b29121b8285b757a3e49a72c605da
python3.12-libs-3.12.9-1.el9.i686.rpm
6f440096aa5ffbc82c0a4b1cc5be7c4419eb6922c7af9dbe4d4d17b3a2f328b1
python3.12-libs-3.12.9-1.el9.x86_64.rpm
70d7b3ac34753523cab0fa2bd897f4690b9fb42ca897e69db60d8135db809d58
python3.12-tkinter-3.12.9-1.el9.x86_64.rpm
0db348ccfcc1972eade0f73b4f594491a3d9d12b677290b539744468b066d048
RLSA-2025:7241
Moderate: rust-bootupd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rust-bootupd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bootloader updater
Security Fix(es):
* rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bootupd-0.2.27-3.el9.x86_64.rpm
2812fa3a3aa43237353354f7202a07606c111ea0915ab3163b622f4bcfc0a9d2
RLSA-2025:7160
Moderate: bootc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for bootc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bootable container system
Security Fix(es):
* rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
bootc-1.1.6-3.el9_6.x86_64.rpm
2004789cd8876b291d35a29633bb2c2acb442f494fe84482a53be324993cda56
system-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpm
680ab520331d87a96b6533886782ff1f27180075b43acde9554b2c6a9616ad5b
RLSA-2025:6993
Moderate: openssh security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
openssh-askpass-8.7p1-45.el9.x86_64.rpm
6940d5d9dc815cb14b79815e60723a5e9aaaee7cfb9663297c31021f2495f659
pam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm
2e837222f2e6bb09785e1cd7e72ea240403eed0bf4006d59cda146ab03c32bdc
RLSA-2025:7094
Moderate: aardvark-dns security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for aardvark-dns.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`.
Security Fix(es):
* containers/aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service (CVE-2024-8418)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
aardvark-dns-1.14.0-1.el9.x86_64.rpm
a49baaa7862d078170ef08583b46a9244b9f987359075f78dec7c781fba65725
RLSA-2025:7317
Moderate: python3.12-cryptography security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12-cryptography.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-cryptography-41.0.7-2.el9.x86_64.rpm
df0b50f851ec8acaab5138d2d101b911eb221a50a260c9431895a2b8bde06a59
RLSA-2025:7256
Moderate: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)
* golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)
* golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
* golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)
* net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
* golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.6.1-1.el9.x86_64.rpm
8c976775f343f6627dc0b9e0896369363542868edb83f29e9d6d7a08796f216f
RLSA-2025:7313
Moderate: keylime-agent-rust security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for keylime-agent-rust.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rust agent for Keylime
Security Fix(es):
* rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
keylime-agent-rust-0.2.2-2.el9.x86_64.rpm
4d15a8c588e5dbadbf272760ad2d7ee8e1e3f9d31297d1389c446b0206b02da0
RLSA-2025:7050
Moderate: rsync security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for rsync.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: Path traversal vulnerability in rsync (CVE-2024-12087)
* rsync: --safe-links option bypass leads to path traversal (CVE-2024-12088)
* rsync: Race Condition in rsync Handling Symbolic Links (CVE-2024-12747)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
rsync-daemon-3.2.5-3.el9.noarch.rpm
d187bec77343c6f42d5e8ca9a531ada5257af93568f5ef566422fbfe320a6042
rsync-rrsync-3.2.5-3.el9.noarch.rpm
4288612d9592f29a6107c0ad7d286a2f5a8630528354117b166dbeb8c8d6a3db
RLSA-2025:7049
Moderate: python-requests security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests+security-2.25.1-9.el9.noarch.rpm
839054184519b72e8b58ec993450ea64067d5e097224a718da25991b228afcd2
python3-requests+socks-2.25.1-9.el9.noarch.rpm
54766683c0d9da34bda92655471634ecc02aa1e9d0e8f01089598e1b8399ca59
RLSA-2025:7389
Moderate: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.39.4-1.el9_6.x86_64.rpm
53ed8d67b30a35c6c1d70b6e1d4813cd153c76e92b173c810b4ff2626a5f12dc
buildah-tests-1.39.4-1.el9_6.x86_64.rpm
e3cdacc8c0422f9b1201aba5a9fe40979f766b1bf2fc0193d8454a9dfb23c629
RLSA-2025:7391
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.4.0-9.el9_6.x86_64.rpm
bf2053180fa5de5755b346127ad1496f1045c38b5b0e78adc9d6a6a677a6eef6
podman-docker-5.4.0-9.el9_6.noarch.rpm
2b7093b6dcfeeb06ddbe2b484d84c35cb67a9f6b48f12c5745f4d39151c74ea6
podman-plugins-5.4.0-9.el9_6.x86_64.rpm
2ec4740b6573fffa970b7335456d15bdefc8b8245a21fb301c7c8bc83d870abb
podman-remote-5.4.0-9.el9_6.x86_64.rpm
d7166be291e63e75828df6a16f1bd6ab896cc04fe1286cb734630133a7390364
podman-tests-5.4.0-9.el9_6.x86_64.rpm
11d45ceb2bdfb320fb3ea3a3b194dd49566f51689445d793d6b4a2ee57f77890
RLSA-2025:7397
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.18.1-1.el9_6.x86_64.rpm
90981d481fc16948f172f870d604cac5c6271222b1b911ae3390b34bfea88b15
skopeo-tests-1.18.1-1.el9_6.x86_64.rpm
682147078e10ad68e6b2cc5015b0ffe7a649f0e2933313a73035d9396f84f0a4
RLSA-2025:7395
Moderate: 389-ds-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.6.1-8.el9_6.x86_64.rpm
d5a6bad7819d852d6cf1d1d4105e650a97cf0281e99b90e84ce38f328e53fc4f
389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpm
dbbe44e334a20d10cb5fddf2454a0cdc97d52e3b09050a53a62e8e9c26b6e8d7
389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm
150d842db41487796830b76969c68338fb8829cf39d308b495ddeded02522fd7
python3-lib389-2.6.1-8.el9_6.noarch.rpm
4c60ff7f12ddf5a79b6794123f735791073c793a3ace57d605e268a565d96883
RLSA-2025:7409
Moderate: git security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-2.47.1-2.el9_6.x86_64.rpm
810cbc1763b89adeeb8fde8c1d2d142e89414aac5691e9f8c25dda34b22e995e
git-all-2.47.1-2.el9_6.noarch.rpm
6c324ea3223ae18108ab5944f562abe180e1dad7a060b96e6bab98f974fe9de6
git-core-2.47.1-2.el9_6.x86_64.rpm
b558f272f374af74d9616e3dafd50dd996fc67160f6e104a3cfe3a943f14516f
git-core-doc-2.47.1-2.el9_6.noarch.rpm
88f8059b8ccdd2afef5b54e3c963e8e65168e6169d8ec773e8cf65c7ac85d531
git-credential-libsecret-2.47.1-2.el9_6.x86_64.rpm
ad6ebd1593cecfece5116dd435419bae71de7acc5ec79fcb7b546d90903d6a63
git-daemon-2.47.1-2.el9_6.x86_64.rpm
9aaaa87fb9aaed5d6eaea61038c3fc896e161d8dfe595e4603aaff259035d591
git-email-2.47.1-2.el9_6.noarch.rpm
b5c36b560183cfe5fbdd7e9e6b77eaa4f9de31951a69555f17e3833a6f174fa5
git-gui-2.47.1-2.el9_6.noarch.rpm
1070fbcce6fe26d13db6073c65b2c7910501964abda2b6ad6ed91d3d82d2da1c
git-instaweb-2.47.1-2.el9_6.noarch.rpm
5565e46719957806d44ed7c42fbb64edc773316443561b818e8383b8a0ceba51
gitk-2.47.1-2.el9_6.noarch.rpm
c2c3a93bff206ce28174d270147ab11ffc3b659084520ec23a009f9a9bb2a05a
git-subtree-2.47.1-2.el9_6.x86_64.rpm
fbf6f103b36e4ad47b0c495c138af72160623bb0e0c1fa1cdc13b537ee83340a
git-svn-2.47.1-2.el9_6.noarch.rpm
5b0cc4473feb3004041da93dfe75a9b380a627c032b2e150c4c684f626b595cb
gitweb-2.47.1-2.el9_6.noarch.rpm
2c5e94e76afca7c19ecab749a1628427e4f69b24ca83bb38117c5d5852d228fa
perl-Git-2.47.1-2.el9_6.noarch.rpm
7e1c645311df4597c1d40dd416d718954e6861844fc1cbfb531782f331929480
perl-Git-SVN-2.47.1-2.el9_6.noarch.rpm
82c293d1849db01f97b88953a5c5a6d83f7061ed168c9cb5852c805f91b604a2
RLSA-2025:7417
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: dds buffer overflow RCE (CVE-2023-44441)
* gimp: PSD buffer overflow RCE (CVE-2023-44442)
* gimp: psp integer overflow RCE (CVE-2023-44443)
* gimp: psp off-by-one RCE (CVE-2023-44444)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-2.99.8-4.el9_6.x86_64.rpm
e60d5a3d2bf267eeac8e126983400d89c70c6682d292ac764ddae73ee133582f
gimp-libs-2.99.8-4.el9_6.i686.rpm
ba8b56877f3843a76746a5c75beb59b44d759331f9aa79a654323a05a091b81a
gimp-libs-2.99.8-4.el9_6.x86_64.rpm
0048ba8e7864961c3a88a296acafc9844854e9ce8d1b79700f99423dd0813964
RLSA-2025:7427
Low: xterm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for xterm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: code execution via OSC 50 input sequences (CVE-2022-45063)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xterm-366-10.el9_6.x86_64.rpm
700461d7688b89f864eee5b2f7cbc36bc87d1c76245fe3ab210d2610411d72da
xterm-resize-366-10.el9_6.x86_64.rpm
98ddfcf012d0083c1d934b25a881581f6f9a9ef3825716bd62afb52f1a82fc72
RLSA-2025:7416
Important: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gvisor-tap-vsock-0.8.5-1.el9_6.x86_64.rpm
b9dee5d9cf2be3289905256a1074d29277538e429f3d1886e20e9f8423146d26
gvisor-tap-vsock-gvforwarder-0.8.5-1.el9_6.x86_64.rpm
74f8c65431575a68ecef18193d79c8012ee6ee5d6b5a2767bde443cc202608f9
RLSA-2025:7418
Important: php:8.3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php, php-pecl-redis6, module.php-pecl-xdebug3, php-pecl-rrd, php, module.php-pecl-zip, php-pecl-apcu, module.php-pecl-redis6, module.php-pecl-rrd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
* php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm
323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b
apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm
48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1
php-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
eee2b4e7a7bb1535029ec737787f0c1f3b043a0f5c1da9e1ec91ae672a42c2db
php-bcmath-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
a166dd965a3d599acefcab141c86178c348a2220a73f2560557297b5c0db5c7c
php-cli-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
c69cd41dd94aaf2112aa138fe17f7c4763b72146ff7466da7161359ad14ead31
php-common-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
fe3fc719f7c6e941f0ee343de09aff44b231805b4de63ec5aa8525adc5af3a5b
php-dba-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
05b1a701d13d094823037da19a8577b3d3a6f04f25c9c56e405d89047b6f2da0
php-dbg-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
5eeac6d0e3689f456f37acbdd40f65c1b780f4f4fddff95a452bbf12b16b8882
php-devel-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
4b94955eeadb9ff73677c3e2aa9c4e1ca9991ceaf5a40e60cbfdc5cc92b8038b
php-embedded-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
bdb6699411b13b0818042fcff466a7dacd6b35d11612596206eaf97e89d3cf65
php-enchant-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
30d2308b4317cb20d409a6a7e10d4fdc3bb571b9586347e5088615f2be6d249f
php-ffi-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
1206e272b83384d3477b946ce6752b88d8b2fdde1178bc0e2392b70daca2382c
php-fpm-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
4adfd246de88da96ce016366d39306b106e696d6cb2d38f2c63da3b4948f4562
php-gd-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
5d97e3a04839d7c349b58e71ea18b12157d7423e3b193c0342df65e30db92354
php-gmp-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
2294ce80aaae4e44597d96e8e7acf2d339601ac6ec8ff8cedd28ba904b593724
php-intl-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
15410ba37ad44cd4c58ad3513926586d1e11a34d6e4ef5c93f3c66ad460ba1c5
php-ldap-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
6ce1f41725d968cc78b972eac79c4700af1dada02bf2a538d02b128832e20350
php-mbstring-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
7606bc6257f28dad608a84c1ac23923fcb73702ac97849a4febc7689dfb4c744
php-mysqlnd-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
880bdb569fca3102e417102ddd12322a20deb406acf24e6cb535e5525c38ae06
php-odbc-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
029d4e29b5f8689fce5c8b300ed9a03aa6d08ad9362897faa239722153bee577
php-opcache-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
59207da1386337dcd0f9f335ce278a5be75ecc9ebaee87428e5e4d3e4c936db5
php-pdo-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
7bd9159572e3e688872bc50c3bc32c7eb15c0df2a083cd3458b6a2c0dac3983c
php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4
php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5
php-pecl-redis6-6.1.0-2.module+el9.6.0+32042+808943ae.x86_64.rpm
641f7573c9981d315ace5db110678d9ff1fd71527c55e349d24c150a6e366713
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.3.1-1.module+el9.6.0+32042+808943ae.x86_64.rpm
39e9e6d7d1376cd4e0094385fb062df08a0d689ccb85f09af50617ad6001f6c1
php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d
php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm
cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22
php-soap-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
2d7d32cf6b4353f0c2472f571f4829dd3a2b60b21ffce966d82a77c802bd2b67
php-pgsql-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
8330d7a5da6aaf09fae972e95ba33feaffb8d0541a116205ca41c988f81b31d2
php-process-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
b6d1401a28237a020167462247e2b67a5cb99168d5868dd5c6666cd0e5dc19aa
php-snmp-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
61ef5c1414b1380bff1b4d3cfa23371b940cde70cbcd7988b81b21caac997bb3
php-xml-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm
dc1742dc7cb8f1a04f342d8265ceaa98a85d6e71ec88520f062d4f7c06ccc7f7
RLSA-2025:7431
Moderate: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
php-8.0.30-3.el9_6.x86_64.rpm
9e127cf5ee5ab7f9dccac567e9a952ae822b0b641657667d9bf2875c2529db8d
php-bcmath-8.0.30-3.el9_6.x86_64.rpm
795014cb930c175fa04303ef68ff8db0664224514480d3bcf0a5e37dad394a01
php-cli-8.0.30-3.el9_6.x86_64.rpm
417d461598b08a064b83714e2b53c7c23bd053162002c2db6e6af4b599d43511
php-common-8.0.30-3.el9_6.x86_64.rpm
5f471cde766113cfcef2eaef3b2af016f62091fefe4852657a50266734a5bac0
php-dba-8.0.30-3.el9_6.x86_64.rpm
354739d8fa1f3ed3484deab5993365e856a0d7b5793a1302a00b1e443da34fbb
php-dbg-8.0.30-3.el9_6.x86_64.rpm
ece2ad43c8deb96e5dfbe2febb93adea127b3c2fa2448f477c874bcae732f16e
php-devel-8.0.30-3.el9_6.x86_64.rpm
abf6dee421160bafb15f9bad9ac5346550c07156fbffb23ba77687179692ac3d
php-embedded-8.0.30-3.el9_6.x86_64.rpm
00217e2aedad36517dd2874aebe57fc44540421548d8dee5f53b6a758b7137ea
php-enchant-8.0.30-3.el9_6.x86_64.rpm
30d0b0c509060f73cd0902fd89d8d0f1c6f222319ceb9d6211d1b8cb0cc2752f
php-ffi-8.0.30-3.el9_6.x86_64.rpm
664187aa7a76f92f2cd04102d5910de2766b25dcabb5ae86eecc17f6e456ac5b
php-fpm-8.0.30-3.el9_6.x86_64.rpm
1f4d5628264a1373e75032bdd9a852dcb663ae0b305b1e9d07f3ed7c51d3c402
php-gd-8.0.30-3.el9_6.x86_64.rpm
ed5849b98006ac37bb9034da50e554d0a9c3b1f89460d2ee3167e0bf615beed1
php-gmp-8.0.30-3.el9_6.x86_64.rpm
89492578c23d2bccc01dcf9033dede0f1f5f004f091570a4a2878975720ad8b4
php-intl-8.0.30-3.el9_6.x86_64.rpm
5bb642011ad3a6e47c42fe13a56b3851ee1bd005111fddb0a2075c3404957b8c
php-ldap-8.0.30-3.el9_6.x86_64.rpm
b9b21e89574155ab9135075327797bacc3d6b1caae129b8c0025974fb008f390
php-mbstring-8.0.30-3.el9_6.x86_64.rpm
e0f3480021fc1c995a6d4db0c72091f92fcb400a0a42b126e90377d0c55c5f29
php-mysqlnd-8.0.30-3.el9_6.x86_64.rpm
f353413c4276ad3ac999ea475f9466478bcf2af4f5b8e138345008a2a7ea3d12
php-odbc-8.0.30-3.el9_6.x86_64.rpm
7e5fd4ec8f8518b4a8e05d67ff351edd67c53de953b9621d69b9505142e477f1
php-opcache-8.0.30-3.el9_6.x86_64.rpm
01f22d17566442881db4573a475de7ae314404ec278f8f45eacc4975c6443436
php-pdo-8.0.30-3.el9_6.x86_64.rpm
be4e08a4438841a2936e2e355c14a75bf2ec41dd79e7a2bfd43d1b0fbef0ef3e
php-pgsql-8.0.30-3.el9_6.x86_64.rpm
37b243c151685dcc2802cf5b5b168ede8c77f90a5afe6e9f2fb74e8c6ad4d604
php-process-8.0.30-3.el9_6.x86_64.rpm
bab23db76dfd63ee47e1a414931731c267ea6908bd26f5dee0fcb9fd56add22f
php-snmp-8.0.30-3.el9_6.x86_64.rpm
b4f5751efa5edf3eeb445a22a171c85e5fcd905cd8343b4c728bc57448ee123e
php-soap-8.0.30-3.el9_6.x86_64.rpm
8e428cf96947275d73022ccb713d9e72dc299876a85de4dd20300c44a27fbac4
php-xml-8.0.30-3.el9_6.x86_64.rpm
0de63e55df5e362d21bfe8e20257bfbe170bd48aeb443b2b83f6ba92e76fedf2
RLSA-2025:7419
Important: mod_auth_openidc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for mod_auth_openidc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm
1f6d8205742bc89726991c82420a0bde1c4528844cc22b38268ed06612432df3
RLSA-2025:7432
Moderate: php:8.2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php, module.php-pecl-xdebug3, php-pecl-rrd, php, module.php-pecl-zip, php-pecl-apcu, module.php-pecl-rrd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Leak partial content of the heap through heap buffer over-read in mysqlnd (CVE-2024-8929)
* php: Single byte overread with convert.quoted-printable-decode filter (CVE-2024-11233)
* php: Configuring a proxy in a stream context might allow for CRLF injection in URIs (CVE-2024-11234)
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm
323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b
apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm
48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1
php-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
ff9fe09b930d7f3e67e849ef3c29eb0b1906d21ef319e4dca957335e6b6ef1d0
php-bcmath-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
cd11c86536b950c3d72a7a5c61bbd2d31d7d7b69c67608587505fb9ceca6b4d4
php-cli-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
0b848050e680941c0b404cf3d9e14c9ef2f76d7bc2630ce0a8b8c445f19688a1
php-common-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
652d3a8d062adb6ff1c4f43f708cd9f729ef9842275642d80df6dd913d7c7aea
php-dba-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
0102e474d50268c234d96b8abf2f11583f1f997c653c41bdc41ea91dee20246f
php-dbg-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
4699e3e9f890d3f5ee00f3c7ab87b471e605771e85a1790bab70d170b3c16076
php-devel-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
58e39877564b9c6a8162f7bfc233da789bb5acf55106ee96deecf2c204277b65
php-embedded-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
001c57dad7dbc6b6a3dd034db70e6515a2cb1be83b228b4ebe6651016fdcd073
php-enchant-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
5d92d1782be607a3573e4457f7c6d0539ff41bce7ef8595a264c8df75d3d8d5c
php-ffi-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8e5c1e95dc0a7e0c04d60dd45eee3b0dbab3b76d9dc307d9e64b48c2567f6a97
php-fpm-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
07f37a604751e288e46272dc602d0e7c2f94ff798a3618bb706446b8656c304f
php-gd-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
7af38fcf4060b821ce25ac7fe18c105b0865e8e0cf994b310678635e8c54e7af
php-gmp-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
086e6fc0763e91a53a8c00f99c5cc29b093145c62975b107598c7de50d9196de
php-intl-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
ffb36426c7e0028c3348382cceacaac1a47edb2fbd71ebfce9fbc6e05f25f50b
php-ldap-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
ffd89b240be9f303615ea41f81632de8791436ea092e6e19c7f9de33b8434473
php-mbstring-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
a1b73bb6d5d1d367db77387ac751ff437b06de3ba536a05725173405cb5e9288
php-mysqlnd-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
4a9608026a30600a73095cba316693b4785171177c6853bb4fb77eb028edafd3
php-odbc-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
860b0e5d2d7ad45483ea41fff04cd580bb2e841aa13bf54ffbda5a6a047daadd
php-opcache-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
18a05571049d910a3d98a1f7bc531e8d9347920dd219bc413b603008462fa4d3
php-pdo-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
0ed3f795c3798bfc5082757aa399ed38bccadafc0d2a9879e538a0cfa4e7421e
php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4
php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21
php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm
6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5
php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm
eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0
php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm
6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2
php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm
bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f
php-pecl-xdebug3-3.2.2-2.module+el9.6.0+32041+66e66fb7.x86_64.rpm
8efbd8cea37b667dcafbfdfb0de2bf8d1150dabd06bf52e31719ef7af1ee6071
php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d
php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm
cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22
php-pgsql-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
98e04c9e4de5f1c8532e6049c54a5b8f50c1b60f326a1a175eb6b0b603fcf927
php-process-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
03b811af1fb6db298965081945fceaad9bfc1e1d7427b7dcac28d562b059ba91
php-snmp-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
521c62bfae1460db4553d8bdb3e7c61146d20245ababde0b0dfc6f8023ce74ca
php-soap-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
4731e15b59d9379a852b3c317a649111acb0eb8053ba92a369fef48dd3743fe1
php-xml-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm
94383561c564f65f6f0cc990023a056c9a2d6b190a089641acbd5b9c4f86d250
RLSA-2025:7402
Moderate: nginx security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Memory corruption in the ngx_http_mp4_module (CVE-2022-41741)
* nginx: Memory disclosure in the ngx_http_mp4_module (CVE-2022-41742)
* nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
nginx-1.20.1-22.el9_6.2.x86_64.rpm
3bccbb21e1471801c4c6f76521f15847e7e9df3c7c5316f9fa1cc32bb72392d9
nginx-all-modules-1.20.1-22.el9_6.2.noarch.rpm
fe20fc3e0e757b6c6de79c00b2ea04a210c03ceea31d6bd5d250bcbc1871d5ce
nginx-core-1.20.1-22.el9_6.2.x86_64.rpm
b72c725d0857da6bfd74352057a535f4874752a06b649590d7a7b8f9218e1743
nginx-filesystem-1.20.1-22.el9_6.2.noarch.rpm
f3d4c1b78f18db23f01c9af761032a7f66f209b22f6e38e9e35d8cb68094b8e9
nginx-mod-http-image-filter-1.20.1-22.el9_6.2.x86_64.rpm
63d0faccbdc18528b0f380adfd90dfdf1a4c428d0a47cdc3e8d1a4c03804edc3
nginx-mod-http-perl-1.20.1-22.el9_6.2.x86_64.rpm
cb627f638afedb3a53de3ba0af052a0379c69575ada60b7a4d468b0f646db9c1
nginx-mod-http-xslt-filter-1.20.1-22.el9_6.2.x86_64.rpm
17a4769f7129de707b24a7c60d780c372d377429b0e05f2baeb60c6341474e11
nginx-mod-mail-1.20.1-22.el9_6.2.x86_64.rpm
57798de365a38c0b77612105b1099c10b168143a05848daea3b920ac055c8ec2
nginx-mod-stream-1.20.1-22.el9_6.2.x86_64.rpm
ee45a24dd03b6980316d3566cf6cd23be74a01700307deef5661418bcd52c363
RLSA-2025:7429
Important: redis:7 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.redis, redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-7.2.8-1.module+el9.6.0+32036+eb8f79e6.x86_64.rpm
eaa069258afc48e743f1123e2b8c63ff9b3129458b3b73de0721d35801acdfeb
redis-devel-7.2.8-1.module+el9.6.0+32036+eb8f79e6.x86_64.rpm
dadbcd6e757135038a5389b1e039dec8cc72744b754c1a7cb48ea6d96cc88536
redis-doc-7.2.8-1.module+el9.6.0+32036+eb8f79e6.noarch.rpm
21cea4f84cdf4afa437c615224fd2e6686c545b3382e6dbe86271152be40b4f5
RLSA-2025:7438
Important: redis security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.18-1.el9_6.x86_64.rpm
ffd6da2532960fde762bbf2cb102bdb396187d4709f0a264ae23907ee818e99b
redis-devel-6.2.18-1.el9_6.i686.rpm
b84336226326db111a74e545103132a09edfa5f784b1f499a0e3fb003bb5c521
redis-devel-6.2.18-1.el9_6.x86_64.rpm
c62a7045d0a68873f39d55e68f936d2f8d3cfefd3c57015384629e1fc6ff48a4
redis-doc-6.2.18-1.el9_6.noarch.rpm
714b9d7f8701e5a51e5cbda1a4fa89707ff55c0c1a6ce496f09e846461e24d83
RLSA-2025:7430
Important: yelp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for yelp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Yelp is the help browser for the GNOME desktop. It is designed to help you browse all the documentation on your system in one central tool, including traditional man pages, info pages and documentation written in DocBook.
Security Fix(es):
* yelp: Arbitrary file read (CVE-2025-3155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
yelp-40.3-2.el9_6.1.x86_64.rpm
0ed1a073efbf09f530273153be5423a4a178177f6bc30c239c918251b2757804
yelp-libs-40.3-2.el9_6.1.i686.rpm
ae1c557b8eb6e0cfe40dacce9c826ac678dbeabaaf4a879612a54678cdc0ce42
yelp-libs-40.3-2.el9_6.1.x86_64.rpm
8659466234f34abb304f4c2aa043c00fc14e16efc75d3f255dfffbdc6220d952
RLSA-2025:7437
Moderate: avahi security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Predictable Transaction IDs (CVE-2024-52616)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
avahi-autoipd-0.8-22.el9_6.x86_64.rpm
381b457634b545b06627f9fc4ba949e14681965cfaf6d0c3636742e5e662f565
avahi-glib-0.8-22.el9_6.i686.rpm
d0fc2a256204d1035809d2fbe2cb1ba2671e9dab1fa7b5f2260e5b0959c87470
avahi-glib-0.8-22.el9_6.x86_64.rpm
1220add6fe0d21f399f3138a2eec892ef73757109f85a5c1217d7283d6b2a895
avahi-tools-0.8-22.el9_6.x86_64.rpm
3a98f2f168f501518365daf2e3ea5e405c9f94423e996564dc7e00f428629ec8
RLSA-2025:7440
Low: vim security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for vim.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: use-after-free in function ins_compl_get_exp in vim/vim (CVE-2023-4752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
vim-common-8.2.2637-22.el9_6.x86_64.rpm
7e65d7d519720417b9bc9cdc40975a6153d146723ece172ec4fcf785d29bdb94
vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm
98ce55936a1b5bf13f386e0c0f90eb6f3c77f503c2df9fa71acaaff72e043d27
vim-X11-8.2.2637-22.el9_6.x86_64.rpm
62fb1737dad1fcc6e83a2de8e00072d457e5ecc5606a7dad5db172af0ec1d100
RLSA-2025:7598
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm
540655508a0a8fedb047d85feb1373c6c7f76461f5c12a099777d97889aacee3
aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm
5523bf135851276625be8ae2b9b0f53b958063a05fc679babb2ca17429b75736
aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm
7ae92ded32286cb77bec330a89f3904db9015e47f4d3321cb680695126622797
dotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpm
a79e8e00c660fda0476b829604c1907ecd0d32b044c28f42134e9220823961cd
dotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm
0a4c5567bd4779dc023298e5a7abdafff2a8f4a74dd6cdaaf8fd488f888a15f2
dotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm
61291d6f52c7d9c4b3874071aac2474141abd3c0ca2fcf3c3d7505da1a4aebd1
dotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm
a3f246f8115726df1f084cc1ea5acfb99835907bc2dd44b8fd0ca84aef3766c1
dotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpm
52076cd2610dde3f1be04106b52f5da5bf3d4c0a75361c79d72a3a3f9b6a438d
dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm
a59f1be4be9e5099307c3c46a82410be9ea2b2df9460ad16c21903b46ebd3c3f
dotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm
88b61e2d1d4eb97b84009899dbcb03f366daa78a73b77716e2e108edb0f0144a
dotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm
7233a4d9998ff5ded7ff662192569b294b3d3ce6d0d009f534e5b7b28159c674
RLSA-2025:7600
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm
197207d56a6cb6781b5c4f9bb763452a6caa27439cbf235ea13b9d00fa4e5c82
aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm
912760800b82c7e592d13c2be6e11f7fad5e7ba29f914e8dab0037b822a20318
aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm
975d4a13214a74ef2903ac28cb7fea6aa7f3e0dad9532eb8b537689904e3dafa
dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm
b227672bd916759b2fd2ed2b3cee9755e996e6b6c8729a9a5b2981def614cc98
dotnet-host-9.0.5-1.el9_6.x86_64.rpm
00fb0470ffef68a6eeadb04f49971bfe7680dc82410de57ce866b865ecb5d0b6
dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm
cb67c23b8244e130c06c39169ed15d8e10fd5726aaf97f0e3b031b70b0ae2ff6
dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm
8e601689fd15ab45eb0f6d7e3e7c351faa3ff687ad8cd13d5d17a4aed0d3eda8
dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm
fa300cf2be9cbebcd1e5efdf8a550de0f602e8a98355ae9391819ade8a7fa871
dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm
942e8fae562e966deceb5c327f54f867255bdb6446cf234424d6f6b4846e3458
dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm
8f58ace8c89e5bd5eb1a5dad5113f502c72695da15fcfbf158b04a24ff660c20
dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm
2b1d85e87ea4b667c84924ffb1989eb12b34bcd663ba8f1b7ee231cfbf58de10
dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm
a5d3d89318e0141870ccb645316a9605c7567c90347acd3a9fe54f983b758ff8
dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm
3e61d4faf1b0801c567f0d7435b31d8ae9f9514bd24f43448fdce4d70e082b3e
netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm
69374861feb2890004a684a4cd3d7a8ba11ef99bc83ccbb902ca9ebef0125e56
RLSA-2025:7672
Moderate: xdg-utils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xdg-utils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xdg-utils package is a set of simple scripts that provide basic desktop integration functions for any Free Desktop.
Security Fix(es):
* xdg-utils: improper parse of mailto URIs allows bypass of Thunderbird security mechanism for attachments (CVE-2022-4055)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xdg-utils-1.1.3-13.el9_6.noarch.rpm
88fd1dd093667c22fd345fed86c4d0062aa85d5531a737e6c666be712aba1b3e
RLSA-2025:7893
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123)
* grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect [rhel-9.6.z] (CVE-2025-4123)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-13.el9_6.x86_64.rpm
bb83f67a0a096111964fd205282aa9dfd73c013a31b761f6f3e3c025afaa4272
grafana-selinux-10.2.6-13.el9_6.x86_64.rpm
67519aa35b21d9312d32bcedb95567f21bb9d9765cc20a4a4e38dcd73a4855e6
RLSA-2025:7995
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.48.2-1.el9_6.i686.rpm
665c0e5f4dbf10174eaef453a0180bab185d3feb656ca795b3f9e8a5359689e2
webkit2gtk3-2.48.2-1.el9_6.x86_64.rpm
b70f2a4b9e00ead20a9deac3ed201ef50ab8c2a8cc51c64c04d372bd3fde9eae
webkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm
97cb8a0faa885ac2dddf2b718b9db14383aa63f2b5ea1032da6b57c4cebd3948
webkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm
cbc26603b1d132937cacc9c25f6c486513d1fd91a76616430e5e45ea43137ab0
webkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm
83d34faec9f1cde0f0dd446e70003cafcb387a0f221985bbc4303170144bbd15
webkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm
e8b580d9922ce82523d4f1daa1179e60a275a783c0e3272068cacdd74e93f88e
webkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm
c75294655bbca8c246d70d067b3538f2e7826b182dfea501fc734d7e8a3b8da1
webkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm
9f6f3fb577ff29424f9782c77597642752ae4e786d242afe8daba90e5f93ded5
RLSA-2025:8126
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content (CVE-2025-2784)
* libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
* libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914)
* libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-10.el9_6.2.i686.rpm
c49556dc9c67ece4fe4142815068ddcbfabe175cb0e015a5482a49199e0b2f57
libsoup-2.72.0-10.el9_6.2.x86_64.rpm
5a18681d01127ba2c0e251fbc4dcf4eb62685601a8aae20e3930d7137510af10
libsoup-devel-2.72.0-10.el9_6.2.i686.rpm
64014d16011ce7c82638f5608b84f12d16e87407c9fd03c789b4a65435c76c54
libsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm
091196e1ff77740ae9b46a9fac0e8825b26c76f9f2d9ea96948fd64a895edb66
RLSA-2025:8142
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm
d791fc23ff6b0563f1f7975ef6780d31f144b4305d49d54fc7cf02971215f4c6
kernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm
6340a3a145eb29df334f629125893f29645d94cb2fe57231a89d302fe0941b7d
kernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm
f97ac2c71c37de1f3d09f55a5ea08097bd175b8967bb22ed3225e971583d0682
kernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm
03947cb9ac1d49fc96bbc336f89709216dd53460640449562ea6df731b4a5e31
kernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm
a27b7dd196e7e2a84fcb36732c26eaebfae4f5fa290a619804e2715e2ee8eaa5
kernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm
4bed3fe55c11631e84c7660fd6cf760e182cb10028118b054818efe940c40ba9
perf-5.14.0-570.18.1.el9_6.x86_64.rpm
b1714b49913989f59478c87a0935b52a1f5e36e7b4358b74a1f2c4c0484c9566
python3-perf-5.14.0-570.18.1.el9_6.x86_64.rpm
32210800500c100056a16e3e50804807921240c92edbd57ac2198249a245c71b
rtla-5.14.0-570.18.1.el9_6.x86_64.rpm
ddb21f79237b43039baac13b734814b24e0d17bed858905cdb6b44e1e2b6fcf5
rv-5.14.0-570.18.1.el9_6.x86_64.rpm
9a79a86d5aeba51f8dcc31b40b0584cb42327e0879bacc0ff7bb51aa1f112a9d
RLSA-2025:8197
Moderate: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-unbound-1.16.2-18.el9_6.x86_64.rpm
453c6891d7a1a5bcf0644c159459d37e3c1de12851b803455902289bd5e93ff6
unbound-1.16.2-18.el9_6.x86_64.rpm
ad810e43d0e43800d62311401e5029e21f4059ee7400b36f5b52d7b8045464e4
unbound-dracut-1.16.2-18.el9_6.x86_64.rpm
eb3ba8e7e9705f5462344f51f8b025c36a3d8328c7d91e041276cf57729f9be9
unbound-libs-1.16.2-18.el9_6.i686.rpm
6e34135c62cef1783b8cd21e9e778722cdb69cbfb67d246e59352f200e715c1a
unbound-libs-1.16.2-18.el9_6.x86_64.rpm
b635ee035f1a16fc0649e12f048f1bc551d151b4fb6db45675d6e3bae37aeec3
RLSA-2025:8203
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909)
* thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875)
* thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877)
* thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.10.1-1.el9_6.x86_64.rpm
eaa54b2fc5994461ff4d671149c02a75309d58e6db5b104ec04d9f66a9f79f17
RLSA-2025:8293
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)
* firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)
* firefox: thunderbird: Memory safety bugs (CVE-2025-5268)
* firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)
* firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)
* firefox: thunderbird: Memory safety bug (CVE-2025-5269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.11.0-1.el9_6.x86_64.rpm
dae04996a94b23cc0c7821429bd57e1bfccac9a7adfcb19c9b6413905220b521
firefox-x11-128.11.0-1.el9_6.x86_64.rpm
2e8ba5157a80d57ef8d870016d00dbb934b6fb7003942cd58746597cf384c9a1
RLSA-2025:8333
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Use after Free in gru_set_context_option leading to kernel panic (CVE-2022-3424)
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm
fb21d16b48db469aa0efbb4b30302e5340138185b331c19dd3a225b317535f0b
kernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm
d0e1570a448dbc55b9ce13c7e7d5fc3ff8300a73e20b26e3f351cda1ff0e2811
kernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm
46231b7f84b51524c46a66f829f92d548301a012981d0c4ca27bc1c4d8504bc2
kernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm
14c6042ec8a15e9569058c66f9a46bdf2e3bdbd560a872fd2db86dc2c023892b
kernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm
3927df22a7befacdbef60f98cf4879a6c067d3b83dd0eb40098082cb1b21669c
kernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm
0a0f9aa7d7f21f3d690234ae4f2032e3e1af5ed766898c2d2762e33851c737f3
perf-5.14.0-570.19.1.el9_6.x86_64.rpm
250472896cbefb92188cdfc13f7258ad348fb371d3da29a3e27d0e98ab66d3d6
python3-perf-5.14.0-570.19.1.el9_6.x86_64.rpm
b6408416ba9f5ba5ecac4825863ebd1be6f6ca86937bc0b5f4e5811d3b3aca0d
rtla-5.14.0-570.19.1.el9_6.x86_64.rpm
e718712f3b151de12d90b9f4da924c7b0b330ed83ef50a15e6aa99a13bfb2039
rv-5.14.0-570.19.1.el9_6.x86_64.rpm
48db394864c3576a0c3bf6f362478e25350d97b1e42ba080afd6073ce4c94ae1
RLSA-2025:8337
Important: varnish security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for varnish.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: request smuggling attacks (CVE-2025-47905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
varnish-6.6.2-6.el9_6.1.i686.rpm
7a89e9c020f78ebe8c5429536a0c4b2c64200a98b509537dfec36cf9140265dd
varnish-6.6.2-6.el9_6.1.x86_64.rpm
dfc000680acc8df338c7554404396e91d8bf2c805843032b470b45585fed03c4
varnish-docs-6.6.2-6.el9_6.1.x86_64.rpm
4065bfb44471b09d80ec90665cefadb70eabd409a03f03f0031d8f29df05e7e0
RLSA-2025:23109
Moderate: mysql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040)
* mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mysql-8.0.44-1.el9_7.x86_64.rpm
8d723cc2197436de4bcdac227b85b45f79157d81d2b91758605b40c0e03d1472
mysql-common-8.0.44-1.el9_7.x86_64.rpm
50a21ac7134c69b038b1e185d0ea968b2514805fc5f6f19f030df3de43841e86
mysql-errmsg-8.0.44-1.el9_7.x86_64.rpm
fa638b25cb676282f28cbeeb87b6733178273de8259a9f48d6a526cc64150256
mysql-libs-8.0.44-1.el9_7.x86_64.rpm
87cea8ec195e5041f8e028e4c75e61b1b20a65ff8b3300e04d580f971345063d
mysql-server-8.0.44-1.el9_7.x86_64.rpm
196e7b74d9e1685f595b5c52f8c629e0433d115151983619ffc83ec398aa8941
RLSA-2025:8476
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.23.9-1.el9_6.x86_64.rpm
79a2060f47b08bcb871a8c43c9f181ff3c4f299517adfda12199822795a0ea71
golang-bin-1.23.9-1.el9_6.x86_64.rpm
12d0b4303e6dc34cf9b0ef897460e8f262f4d2ed3333f9e1b0a94cfc0e629c83
golang-docs-1.23.9-1.el9_6.noarch.rpm
86dee1ab0a20590e3580133b5d64e3c92bf1e32d63caa5e4493a41ccfc0ce241
golang-misc-1.23.9-1.el9_6.noarch.rpm
f61f26fbbf2bd1700b40ce5bdb9ac3fd012a87b091a1ba88c70b94d44ce807fa
golang-race-1.23.9-1.el9_6.x86_64.rpm
997a8eb13c5b3e861ee8068199477a78ee52ec85f65ddcec6112312bea6cf009
golang-src-1.23.9-1.el9_6.noarch.rpm
255d3d8626907554ab88a0e67023003d23f0d255cc473760bcbc838e94027bf2
golang-tests-1.23.9-1.el9_6.noarch.rpm
53381ab1a1152bfe7e1cd16a13303bb9c4fb3ad167a30657ad66b11c3305345c
go-toolset-1.23.9-1.el9_6.x86_64.rpm
147627a726152cd9a743188a509ee0f75d39612e450a1decc2e31b22186b82f2
RLSA-2025:8607
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918)
* firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919)
* firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)
* firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)
* firefox: thunderbird: Memory safety bugs (CVE-2025-5268)
* firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)
* firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)
* firefox: thunderbird: Memory safety bug (CVE-2025-5269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.11.0-1.el9_6.x86_64.rpm
c137a404de3fe4203d9b679e22f1b8e1bc86b896c21606b9c519317cd0f140de
RLSA-2025:8635
Important: perl-FCGI security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for perl-FCGI.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FastCGI Perl bindings.
Security Fix(es):
* perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-FCGI-0.79-8.1.el9_6.x86_64.rpm
96d7a71f7eee69620474b05dd1ce15163f7cf0bd588c847b6ce5e7d89bd0a14b
RLSA-2025:8643
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: vlan: enforce underlying device type (CVE-2025-21920)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
b769d3e409775561a2f8c5d4681556237759572d73905f44dcb53793b9acd165
kernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm
b4c424efe7efc677ca9a1764bf13019188941960ef974c18801633f9c74e1395
kernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
d6d044124f44b87cb287e30c04e973ce0dac42abd8e1a18d3c9a282034caf353
kernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm
33aedfb435b0dd47805c410667aaa182dcf7cdb440dd2b9d3b4a3029e235baf2
kernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm
69a36765d96b628852e8a5c68e6ec54271c3cf7fdd455e868a7fb3629a3863d3
kernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm
28034cc5908ef5cd30e8ccf0a9dff111d62b79a0d9728174ec936cf98147bcb4
perf-5.14.0-570.21.1.el9_6.x86_64.rpm
b8810dbb99d0b2cf37be42625d957043148179741442a4a316b4e0d537373398
python3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm
55b6cbb63690ac1615fee0762c8e00a8004c4db078503779c043e2cdbb9d762a
rtla-5.14.0-570.21.1.el9_6.x86_64.rpm
9dbbb93b2f9aa848f625ddf9a41c8078827ecf0d782d284d125c2292ff4b37a9
rv-5.14.0-570.21.1.el9_6.x86_64.rpm
6db77740ca3c829a33ee7c3ffcfa133e7bd64ad18d9aa0629e828c9e10685585
RLSA-2025:8655
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH (CVE-2025-4802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-168.el9_6.19.i686.rpm
f396e2e1ec13fe70714486a95bac6d459cb35c29f8cae19d39cd6d4f1a074056
glibc-devel-2.34-168.el9_6.19.x86_64.rpm
f61941a35a6f31960205f49ad7d68f0b9f0c912266412d55c419d99daeb4eb59
glibc-doc-2.34-168.el9_6.19.noarch.rpm
6819981fb1382dbe3f89143084641d3efc7f8694a161fed13d13f80858b701d3
glibc-headers-2.34-168.el9_6.19.x86_64.rpm
cf7cfa0b639909058eaac80e7aadf9680f928ebc6b341189d5abbcd3b2d73652
glibc-locale-source-2.34-168.el9_6.19.x86_64.rpm
218e734092291e8129ae42ba30d97173b73a0c9a598408410be40cea4dcf692f
glibc-utils-2.34-168.el9_6.19.x86_64.rpm
70fa71278caf6c501c7a903f3a7ec92f913ecf704f5bf2dd7d6e665eb7e0e257
RLSA-2025:8682
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-14.el9_6.x86_64.rpm
dac96c0d4b337344ea3178e9558ab5784c828503df685abef6d864011501fd58
grafana-selinux-10.2.6-14.el9_6.x86_64.rpm
f2125fd611945f608ca16c242e084bd70a4b27e594791a3b3d3c7c9d052af8d7
RLSA-2025:8813
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm
77e034a1c5c5eda5f6d71c8b80508230283aba19d7c1847a8fbbb72689cb5457
aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm
f567bc4ff922129ef20dd95084f99bc35d78bd62a254e7009cffe618411d6997
aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm
18f8b2f50a58ed7e65bb792684049e88aa4521ce5a637378d86b62b136866b0b
dotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm
ca5dfe7643f0ead9ca56c87d00e425dc8b10d12f741e23a11a9145b3c5e306e9
dotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpm
93d3de549a2a50d3c0248913bca06a49a18be09ff7559c1d2bf08751ef98ede9
dotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm
457d8c94f1d19a3fa13b288e1018a95700f6f4d1df24c9cadf9c68ec85f72056
dotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm
ae61ac401383b20c86378bb3af9bbbee7b5bae220c656382abdbfc5be25840b6
dotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm
cfa2e17b69335a327a39370cb6c87e1276fe2bc6a33196bc5e41aacc29afca38
dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpm
db8b7079ce002144ade3c64dc77f9edbdbaaae8cd4dba9a039e9fe0d82f4bf58
dotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm
14615323b469e392998e718d42a9d39949681dede1b872dcc22f97913e73cbd9
dotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm
95c2cdb574afcf55f7d5403c493db56388ebdb616729cba128120be6904c29bd
RLSA-2025:8817
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm
a67c36b9bf049a8deeb74f24d634105df5efb22094da4f31b0f50b93c7b2fbcb
aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm
aff7b340e820570c9435daf2382363679fdf9606114a1b17baf3cf072bf42c29
aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm
cb9d2c4053e6e3dce24b25f08edc4d736b3effb34bab580dba46dbffb3e48fb8
dotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm
710dbb0b16e1b6f770aac7c1f6d686c1ec80e070f8aaf2fff95f8cb922a40c54
dotnet-host-9.0.6-1.el9_6.x86_64.rpm
abaf4a0fc840ba627f8015a3f35c35a903bc8707b115d056d4790cf2bc2cf507
dotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm
6a627751f5ec0b16bb1b198ba3a701503e502cd92a776f1e7b20dac24ca68ff4
dotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm
f80b1dd8af6d44895cfbd45746cec26274d4444e629c1d097bb4a7274c2e538d
dotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm
a6ab5f0d9b7b4c51c2066696ea2b2ada20ba86545127b9cd5b34c7fa36c581cf
dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm
d602983480f3d307236305f1acbdeac77081ecf50af2f55cf8f3450d107b126a
dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpm
fe57d9af3eb1ce6e921d6688fc0e7d77da3ac867acfe402a84edd3bd02a18063
dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm
41410fcf56b0722494f17b201772a5e14df51c592165edeef044ef01d27afa72
dotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm
19e623e122ae426edc4988eaddd3e6766b91958eb7274f9974b11d34a84aae48
dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm
9e3ed1356288ba862d543eb5447716af0c1a8f8d037b6961db7a1932cb030271
netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm
5b365b860ce0631c93429b5e4d32498c98158b42ef2fbfaaf9b191f09681da39
RLSA-2025:8837
Important: mod_security security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for mod_security.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
ModSecurity is an open source intrusion detection and prevention engine for web applications.
Security Fix(es):
* modsecurity: ModSecurity Has Possible DoS Vulnerability (CVE-2025-47947)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_security-2.9.6-2.el9_6.x86_64.rpm
899d04b91281d125d5629d7fa1816ccfc4069c95883b9de46b07d5898656c38c
mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpm
d7a7eb175cb0f44c2377b3985e7b451cc54f3a64aa0440938f2ecfbf35301216
RLSA-2025:8916
Moderate: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-11.el9_6.x86_64.rpm
24b75d049a044e2c7594ace021e39eea6f9d80ceaa0e3fe03c10c756a735b64b
RLSA-2025:9080
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: eth: bnxt: fix truesize for mb-xdp-pass case (CVE-2025-21961)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm
4e6e58a7fdcab4a30da4415a1d045b766ba5cb247a110018568b8ad5da12a2a9
kernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm
e7d660b7454eb370f7d1051de50d9262072ca8cc03b15c17f2760ed29b5fdb87
kernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm
4b387eb7c01b6fb7aa0e1aeb0caf2c73aabd056dc900359310f2786c776a0f7a
kernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm
a47ac8c5d31bea68cce803c135b8f292130582c2e4a39eb413b949ea1a561033
kernel-doc-5.14.0-570.22.1.el9_6.noarch.rpm
8adfed581b361206feda0e3c645f75e7862d2693a9ef78aaccdb480652653368
kernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm
ee09614cf00133cf2e1d7304026984f28015dda7c8dea35680432e8f23b09f6a
perf-5.14.0-570.22.1.el9_6.x86_64.rpm
f59ff349d45cb32eb89c5dca5c2b34c1b9f9925c04506a4521245e5e4af530f1
python3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm
3615d1e019ca18fe38cb5369942421471e70c791d3636a29d9698cc21e6c8f42
rtla-5.14.0-570.22.1.el9_6.x86_64.rpm
8f81454c56f792df6c6dddbdab30fa9bcc41db420d85a189acca2533e5dfc241
rv-5.14.0-570.22.1.el9_6.x86_64.rpm
37c54f9b2afad73bc1f9f7ff28627f1577b5bb8a139cb699db97d3f1ffb04218
RLSA-2025:9106
Moderate: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.6.1-2.el9_6.x86_64.rpm
3a3d1de1d6fbb121cd2f64f8cc84795cda9a39c30183ed9e88a22df3522339f7
RLSA-2025:9143
Moderate: containernetworking-plugins security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
containernetworking-plugins-1.6.2-2.el9_6.x86_64.rpm
de6ae579b12f3425dd89aaa04d7a4dc2a3e64d8ec7f7cde9b2ebf2e67e51981a
RLSA-2025:9145
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.18.1-2.el9_6.x86_64.rpm
691a5b08379567654a6223a609f25c0ee76fbeab01199f30fd5313ae5b1a6528
skopeo-tests-1.18.1-2.el9_6.x86_64.rpm
b074e2a215b4854726bb67f778ecb46fb6b461909f05b8fc71cb4081657c8e34
RLSA-2025:9150
Moderate: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpm
c35b3f5f224142c1939653e450f43fcb916c00819ba39674fc1b9ab17e0dc4c6
gvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpm
79e5ede43b27522d778d2568518ad1feb260fc5120b74520f13d0f45a5633842
RLSA-2025:9147
Moderate: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.39.4-2.el9_6.x86_64.rpm
5a07ff0e380a3845ee1015e50b46dcd0b6a8d129f4bebefc9040e8772fccde2d
buildah-tests-1.39.4-2.el9_6.x86_64.rpm
a66e63e88f83a56e15e25c08b76493c7bbe89aae1d554b01ae0e09894e030482
RLSA-2025:9144
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.4.0-10.el9_6.x86_64.rpm
570e0e9a0635b37989f1afdb9119bd93a9b97e335a0f122b5894a05147ae74e0
podman-docker-5.4.0-10.el9_6.noarch.rpm
7003ebbc1e72a96cf3f163e19dbc3ae5a200795ec0531d26938e9a5c90c11088
podman-plugins-5.4.0-10.el9_6.x86_64.rpm
3fc2a6694b5f0e57794a8c90fa6a0dc6a1f0c66ac49eff8a2e72db9215f2b902
podman-remote-5.4.0-10.el9_6.x86_64.rpm
f09b5663efc8d7c5cd717ed1513076c55bcfc7ac16b47af8e62a6cf67892e2c7
podman-tests-5.4.0-10.el9_6.x86_64.rpm
9e6af7a86f5ad6bd3af98fab98084eaa49e007bbc169c6892bd40be41c270acc
RLSA-2025:9162
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: Multiple use after free in XCF parser (CVE-2025-48798)
* gimp: Multiple heap buffer overflows in TGA parser (CVE-2025-48797)
* gimp: GIMP ICO File Parsing Integer Overflow (CVE-2025-5473)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-2.99.8-4.el9_6.2.x86_64.rpm
6db2a015dc2236f3dec2d23d97e0cb0f5d0b2a72d9db569a8b08dd60733461f5
gimp-libs-2.99.8-4.el9_6.2.i686.rpm
eb35e98219cb3c95e417624824190b8f2fb15b3762e0a5f4b22e165bbe91760d
gimp-libs-2.99.8-4.el9_6.2.x86_64.rpm
df1676bb7610e86372de2f18ca06a0424c703bf211e91406160eff5c987e916f
RLSA-2025:9184
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for ipa.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ipa-client-4.12.2-14.el9_6.1.x86_64.rpm
85ebc7e09825e38c9f7283b8cff4ddfcf238bcb2d43f24eb044c011e315680eb
ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm
d8b3c05421c948e6dd2df02dad879f0eee666bd9397bb677bcc2d7c7e647f16d
ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm
b98c356d550bcda49b305da4a3194cc040701362e67ac155c77673e583e750a7
ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm
6ceb5894b89e7b2cce00a51f13824cfacecf04789f5b202d83a03379bd8488dc
ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm
d3f4514f1ea0670b252b79eb7408ea1a3151d536bd0ad44e333fd0d7cd019b99
ipa-common-4.12.2-14.el9_6.1.noarch.rpm
c2b95a3cb55269394d2f4bae1a72e0f8348c3ce9702a572ee3ddaaccabbd853d
ipa-selinux-4.12.2-14.el9_6.1.noarch.rpm
72b7eca48c7d2574ba8e280121bf101d6129b13646c19f4aee4127fb47465acb
ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm
40b5bc109a50126a660ca78a0d52593c1979b308935c2c1d562328cb607fe56d
ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpm
73bc607a6a1e97d7365bd2e58e5317ff1983f5e7ba996b625049c347cc4f0076
ipa-server-4.12.2-14.el9_6.1.x86_64.rpm
3e8899ed0903aca698900c3853cf207d9e09eb95c7a10ae66ca6657e8aa9b305
ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm
4f11e2913095f8bd89fcd0fd894058e4295ba109fc4f3ff49f964028a6d9ee61
ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm
155e50ce06dd343bfab509f8cba78bc028cebbe2b8ff0eaaf372e44f3d4b51f3
ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm
6e62900adcfc331f26fdfcabc86d258b48d22bca69dbc23f8c39c8ae79bd99b9
ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm
b7a4be3bee200302de21b6324f29aa43b268469a9d49dad073d3f63c7db44946
python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm
21a66b7cb44d18012a6b387354d9cb77f4e84ed3b31d7d7b22fd50dfe3ade0aa
python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm
91bc41ba9cb9820207ed92f7b024bf6154b962037fb660dc92756c489decce51
python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm
25da636a39d13af8eaf32e557adc0ef00510b67fddef8c3471f9867e503951de
RLSA-2025:9302
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ice: Fix deinitializing VF in error path (CVE-2025-21883)
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: ibmvnic: Use kernel helpers for hex dumps (CVE-2025-22104)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm
c4ef76894d67ec5dafdaaa55aa22625f93d5a189a0057007d2e78855525a86c5
kernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm
ad1f4c9a79c1b94640a579547c80f072eb9ed24888022c0d757cfed9d504bc4c
kernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpm
dd3594be96a9e13254a8d0b265f73bf8afdc44176b1d85ced53e6c55fffcd5fa
kernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm
f67dba3b08339ac3c24940261935b83d01963b3b63fe2b540cad81bf687a93e7
kernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm
1233197b005cc8361a24551c55f28f236547542702a84b48433dd9ca6e3ff8fe
kernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm
4856966c890f7cd762d3b801466c405cdff43ffb889adb4c63e70eed4f2ea4ea
perf-5.14.0-570.23.1.el9_6.x86_64.rpm
371196c3d2ae046a13f20c430e1182fddaeab25fea0a7f9f641025487ea6f789
python3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm
1ff13b8167269dc5ee03c83f9f40a3da2d141eaf2c7071642dde97a3d8582cd7
rtla-5.14.0-570.23.1.el9_6.x86_64.rpm
3f6985e9f98ab66a027ce0623952f78e168206af1988319a8f7ec8e3d474941a
rv-5.14.0-570.23.1.el9_6.x86_64.rpm
afe3d9d93f9b97488891f0582d4f2fefbc23fa79bf2ea05e92124669254dbe80
RLSA-2025:9306
Important: tigervnc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.14.1-8.el9_6.x86_64.rpm
f82f23cbd024888908a004d8b1638afab7132626bda112fb112e7885ece23bc8
tigervnc-icons-1.14.1-8.el9_6.noarch.rpm
326a61fbcd98cc3ca3d4476798aa4b5624f3f8a0e90ee4688bdc6a44b559e0ea
tigervnc-license-1.14.1-8.el9_6.noarch.rpm
4d543b9315e054219e733ad00ae462afa4412364821eca9533f22a3033297091
tigervnc-selinux-1.14.1-8.el9_6.noarch.rpm
029df67ca1dac3b2ae587ada561edffc9baaf724ad146b35e169f98811a9da6c
tigervnc-server-1.14.1-8.el9_6.x86_64.rpm
3b05b11fde044843992e620176c66663a9bb7c9158ae275d87e2e8c7fb22813b
tigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpm
fbdcbf3986a72a468038af72d7c2407d21cacce9b31f2d9bb3a3d553a80c7f7d
tigervnc-server-module-1.14.1-8.el9_6.x86_64.rpm
7d1385a1b66bf614a157662f49e522e9f29fb9e3d0573caadb9e1a5526a2caac
RLSA-2025:9303
Important: xorg-x11-server and xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for xorg-x11-server-Xwayland, xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpm
2769194fa83c423524305cfd5dd89bee68624f98728055fa7e63da3b8c7f849c
xorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpm
d0db41470d9225f522ec2b1544c1418c0ea069ade04d121178104848093545c3
xorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm
eacb5ace4fc7f70cc9a8f84dd2bdd77274d582d8e70483759e6666ae4b1d0a11
xorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpm
0d59f3545cb3c36ff062169c5c5a8dc578e72e35c063c1ca57981def2eba42aa
xorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpm
810d836c318e882056a249bc848392b7d50445ccb7cc328fb01ff4ac1a97f064
xorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpm
f7d22c20fabbaf3991e364d795fe795838ac03145ff6f0272e6eca2a9ba030b2
xorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpm
7e3c9730f8c16bc6543b27dc4257498bbca4a7ef907e1c2e18975a0b484bb321
RLSA-2025:9396
Important: mod_auth_openidc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for mod_auth_openidc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: DoS via Empty POST in mod_auth_openidc with OIDCPreservePost Enabled (CVE-2025-3891)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpm
68a2dd347069d3c7c55d58187b645d553ec3689da0dba6ac78644d836b0c5805
RLSA-2025:9434
Moderate: mod_proxy_cluster security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality.
Security Fix(es):
* mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpm
cf832a33feb0b94fdb561a4115c2d61573bc37a68265c52437e0615979d09e87
RLSA-2025:9432
Moderate: iputils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
iputils-ninfod-20210202-11.el9_6.1.x86_64.rpm
91490360bc89fe0a0d9312122659ad354e324b2e062403694fcf00bc20967d70
RLSA-2025:9448
Moderate: emacs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
emacs-27.2-14.el9_6.2.x86_64.rpm
c04a146364338e290b0b8e9724b5d266d292a988927e2501abb4efb56deb664d
emacs-common-27.2-14.el9_6.2.x86_64.rpm
afd7622f0a6bbe1f51f1e9c05db6b4cbb6e958f0da476db415343972bc84ecf3
emacs-filesystem-27.2-14.el9_6.2.noarch.rpm
704dedbea837414169bc007e7713f1897e9438804b1bf2b04a4263a39f489ae4
emacs-lucid-27.2-14.el9_6.2.x86_64.rpm
9018fa3cf82f73380770932fbfb5b6722912f17e49b0f8956376d24fd813f5fd
emacs-nox-27.2-14.el9_6.2.x86_64.rpm
04e2be717eae1c7f4dc8d83be4a7f6802c95f5a1163f3b224e6ec04ff40b9f3d
RLSA-2025:9431
Moderate: libarchive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bsdtar-3.5.3-5.el9_6.x86_64.rpm
51d5083a3317cf84d52ad57d58c3ef51201766d3516d884925f771de9115d2d9
libarchive-devel-3.5.3-5.el9_6.i686.rpm
1a62a1d5d9b6f02af3d33c6e9df258e8cae4779d529d5f7ccfe9b24cb1608df1
libarchive-devel-3.5.3-5.el9_6.x86_64.rpm
0d5ff338951fea18d6dab939929b37465f5ca94ce9644289870900ac5e058d18
RLSA-2025:9430
Moderate: krb5 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
krb5-devel-1.21.1-8.el9_6.i686.rpm
686404a7f75f5c32dc2ef2ab7cb48321079679ce3faa23f61441c52374e568b9
krb5-devel-1.21.1-8.el9_6.x86_64.rpm
683a9d5c341d47461bef09f406bb049b802bde8aa67cf5ed819e3d7516e8d917
RLSA-2025:9526
Important: pam security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pam.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* linux-pam: Linux-pam directory Traversal (CVE-2025-6020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pam-devel-1.5.1-25.el9_6.i686.rpm
749a7442c52e6c1d8970e0987d9be442b6462279ef371a3406b3e9d036965331
pam-devel-1.5.1-25.el9_6.x86_64.rpm
099de5dbe670543d8d379e5764d711dc70da567b67818b2367985089c20e8a5d
pam-docs-1.5.1-25.el9_6.x86_64.rpm
49d11290ba29fcb4404d4431cbb27d8e951d4b84bade49e4ac5694990b0d4317
RLSA-2025:9635
Moderate: weldr-client security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for weldr-client.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Command line utility to control osbuild-composer
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
weldr-client-35.12-4.el9_6.x86_64.rpm
d42dd793c63173975f64fb605aa0592be261b16d25aa314e4107e87e596d9900
RLSA-2025:9877
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-168.el9_6.20.i686.rpm
9b6450448f80c6c24103b4e9b0b06bb49191c94dae565769195efb233001bb75
glibc-devel-2.34-168.el9_6.20.x86_64.rpm
b9970da6a798e5b4694c4c6fa3424193a7c1c8c02eb5b0065d0c4fe9f61d50c8
glibc-doc-2.34-168.el9_6.20.noarch.rpm
a8525ffd20bdee41772f4248ba8c29d5062af1d22f43baed85846b2a28dff682
glibc-headers-2.34-168.el9_6.20.x86_64.rpm
ce0c5c4c56b9c6a2aed10f02cb3ae3ef7c3e5cd6e7993c54297d746433e4bf8c
glibc-locale-source-2.34-168.el9_6.20.x86_64.rpm
41e565099ed189f9769c58880f7631da7d2e1f89d1780a976fef77c7abd6771b
glibc-utils-2.34-168.el9_6.20.x86_64.rpm
bf89e2a67d7153aefd62ef0324a1d1e2986ab5705d590b7e755c5cda77ba1fdd
RLSA-2025:9978
Important: sudo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for sudo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
sudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpm
61007814a8d11099684a061f5be354aa5ed6cd6d52d4084031d3ce3e294535bf
RLSA-2025:10136
Important: python3.9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.9.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-devel-3.9.21-2.el9_6.1.i686.rpm
54aacec5fafda54b23c118d0460d2d79d6e3e7c6052447f5942e87cf653ad911
python3-devel-3.9.21-2.el9_6.1.x86_64.rpm
bf34cfed24cc76b150d82ecfc505d3de49701e15f329f6f3a651de7124966320
python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpm
60e3f13ae064a681a71ac9e619e80845382bc1eecfcf732dfb0cbe505560e58d
python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpm
29eaeaf808f3d57bf296c7e4a27368a7d7d45e64835e867c96a998df798878f1
RLSA-2025:10148
Important: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.11-2.el9_6.1.x86_64.rpm
5f2de52518cb95a56338192de9ac0f080fce7b133299c1eb6a71d2a7de3d9da6
python3.11-devel-3.11.11-2.el9_6.1.i686.rpm
7ac37ca49000681dedaca2d1a525ef451cee57014b2723855313c1dd74512551
python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm
70ffb3182e64de41beccd5202b83be4e9611a0b9ab1a2845dc4978cc2fe9ca54
python3.11-libs-3.11.11-2.el9_6.1.i686.rpm
d453834638df39158e86ece60a90088c618c07b29f6da5105d997eab8016ec17
python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpm
a2615d82073368fc1e3527bed13f488a7886a9fd6c9274bf56a6a4d1e188d41f
python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpm
1985e3be3db3c8c9e45dfcda23e2b09754c1313c56db8fc2c810987d2d1dc6b5
RLSA-2025:10072
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430)
* firefox: Use-after-free in FontFaceSet (CVE-2025-6424)
* firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429)
* firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.12.0-1.el9_6.x86_64.rpm
082d976e8bca931d5b3c6cbe44d6690c9775d673303f3519cab1fe797a9dd921
firefox-x11-128.12.0-1.el9_6.x86_64.rpm
dba43357f957263cbbe9408c057d9f0718b98f437c3f0adc9e6911d78956f870
RLSA-2025:10189
Important: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.9-1.el9_6.1.x86_64.rpm
6a9ea6e0eba6337493f426b0e20c490aebe7e6e0973a29c6c83cc6091f373488
python3.12-devel-3.12.9-1.el9_6.1.i686.rpm
654e35496d59dabaf303c89c08e3e08b5a987093f64ec70a0179ebe900499d02
python3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm
611e230df43470830061ab4ef26a36aa1f36cdfc379e07691c70f0f2afcea8c5
python3.12-libs-3.12.9-1.el9_6.1.i686.rpm
f36ff708bf7539bb5704c0321bedfe93e7ec43495f791fb7ff3d1e9fde310fe0
python3.12-libs-3.12.9-1.el9_6.1.x86_64.rpm
019086a11177930e5017053ae0406c971aff40c390436e341a83eb38e5476e8a
python3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpm
a2ce46f29412befc3a430ef0735fdd6861e233d6e3c89625c049cde2dffdc838
RLSA-2025:10196
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.12.0-1.el9_6.x86_64.rpm
d656db9dbbd39316e7af15b9f9a9d2c0cdc7cb548ad5d6f9c49ab26d38cb49a2
RLSA-2025:10353
Moderate: socat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for socat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets.
Security Fix(es):
* socat: arbitrary file overwrite via predictable /tmp directory (CVE-2024-54661)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
socat-1.7.4.1-6.el9_6.1.x86_64.rpm
323cf41b9f1abcc46d17b4d76b53d8285b1537b99026ade9354bb40dd27d81b0
RLSA-2025:10379
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004)
* kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CVE-2022-49846)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm
72cda8c947ee1973ed8f8e0fc60308cdde4d824c198a67051626887e744364c7
kernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm
e9e3aebd0ebb91dc74de80adb474c68a7d1f424e0e8a2ce4b5799ef2b944e62a
kernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm
4e562e797f12a312a41cf32be84b338cc6d62141e5ebdb86174bd703949d3002
kernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm
ac1952c1d4295d7755731c4d16f5a6828da7b563cdd7179a4d15bca52862875e
kernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm
6b805bf162237a12c8f4bf696d8194ba26e9be0d0d13ee234a3fbf04f52f9b4c
kernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm
68179e9a95cb315d1a63ef55a692f398687fd834f594e2128d700bc1e75d10ef
perf-5.14.0-570.25.1.el9_6.x86_64.rpm
306eee4399b26abda977521f1dbec65bd90817efa80e1fc49df6ed2795a605ba
python3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm
edf66bf5483b56bc444a734447454c72f6b652af21fce55de332e2dbbd8e6f6c
rtla-5.14.0-570.25.1.el9_6.x86_64.rpm
1ccf0e6cd2c783899cc17ee5ffad20bda25c994b2ec21ea60893624b52515750
rv-5.14.0-570.25.1.el9_6.x86_64.rpm
b25e6c565e2a4c36a0659207b75eaf5928bd57213a8f0392e6407171cd22784e
RLSA-2025:10550
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: podman missing TLS verification (CVE-2025-6032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.4.0-12.el9_6.x86_64.rpm
17e796f03d6e933ac02eadb03937360a1cd00efb5229d9219ca005bc367ead32
podman-docker-5.4.0-12.el9_6.noarch.rpm
8fcf88b01200451c4486cbcae10c03b4204cd5564ce7ef1e234d357be9c1cb88
podman-plugins-5.4.0-12.el9_6.x86_64.rpm
77a911dd09ad3b0ea2c599e81126c60fd75df7114b2c8edbcc122270ab264554
podman-remote-5.4.0-12.el9_6.x86_64.rpm
ee34454869bb4ce52c009386426cb42e35a4ebdfd1bd4ed44c798e3494e581ff
podman-tests-5.4.0-12.el9_6.x86_64.rpm
02d069fc5d0848e7f6ac08a24eede5da987eb3a3c94244a8d48818c58f764d37
RLSA-2025:10631
Moderate: gnome-remote-desktop security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gnome-remote-desktop.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment.
Security Fix(es):
* gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gnome-remote-desktop-40.0-11.el9_6.x86_64.rpm
cd8d8dd63a20104315cd59d8179a8456137a8cfa3ac1263709c2c3210667d40a
RLSA-2025:10676
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.24.4-1.el9_6.x86_64.rpm
4136a1e6c91834106e3605bc482a32ece64624b2a0fe484c4ca64b51e7853363
golang-bin-1.24.4-1.el9_6.x86_64.rpm
aefc3c2b49d2326062a631a2ef2f08557e277f7806b88f4b9972e89a5b7cb572
golang-docs-1.24.4-1.el9_6.noarch.rpm
c916eabbda8a4ec8210627d97a1e336804cf1c8c138e183bd18102b564034bcc
golang-misc-1.24.4-1.el9_6.noarch.rpm
e3b2266a3d46532fdd95c24985f6da6bcb4d6db20166fcb5709ed4103c39b481
golang-race-1.24.4-1.el9_6.x86_64.rpm
28b3043e77660e9ea7bbd2b8081aaeab125c2fdf20580db7f60c66f2a30a8aad
golang-src-1.24.4-1.el9_6.noarch.rpm
fd2ee187abab1b104104649405affa5f4a869589d791035320fbe7fc1c3e00f4
golang-tests-1.24.4-1.el9_6.noarch.rpm
f9d701f27902201950a37d5db89342e2718c6c5a0ae7737ccef4aa9a8d2b2c12
go-toolset-1.24.4-1.el9_6.x86_64.rpm
820b8f2ba73052aa82f5ba9f409f04921febb3076dbe6b0db91abbb6ed36a112
RLSA-2025:10699
Important: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-10.el9_6.i686.rpm
c6637acd632a24a32f94cc4561ab3383c91ca3d3c681f86186d9fbb820ab0b2e
libxml2-devel-2.9.13-10.el9_6.x86_64.rpm
ca29633a1a0cf52f7599766a8734552791b858c7101ddae0cbfdf61ab4ccdc16
RLSA-2025:10837
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm
5b696072df243b888ef6f08952158397c254067d1b81e4f0aeb008899e897d18
kernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm
1d0b4b3758302bd07710a80cb0e330a2bf612006e94c68d9e29311c10abe4bbc
kernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm
80160a2a453f7958cb3d3091469d0395eb03857d5ad0c544866f471374ad4aae
kernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm
9ead6d2ea516d33da8c69326fee6ebaec0051610ea2a45a67b2dc34cdc07a044
kernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm
1b5869338bab22afd318e4526e9ccaf7632fd02a8d54e04c6ad8cf8cc99a4f7d
kernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm
7561d6980e3c5cfbde7f615365e40b6a99f87e6226ed06128b36116a3ffc33ee
perf-5.14.0-570.26.1.el9_6.x86_64.rpm
770464332c6e4eaee8adc40a705347b82affcb38bb42f7221dc0ef4514dac3ba
python3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm
e7ca30396634dc8b2275014949d3e9492ae07acbb3c9237dd3d0b32dc3e91517
rtla-5.14.0-570.26.1.el9_6.x86_64.rpm
d264ecb332f88880db23a7f3cea85dc4b17ea776babb41ef7c171678f42358f4
rv-5.14.0-570.26.1.el9_6.x86_64.rpm
589533a9c58cd3351b588899796c93ecf6bade610cf9dcb89ba5fcb49853b85d
RLSA-2025:11140
Moderate: glib2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glib2-devel-2.68.4-16.el9_6.2.i686.rpm
df3352e9782cc871ef40dc35848aa9afeb2fd858a5c10ab057e35d652f4c5c49
glib2-devel-2.68.4-16.el9_6.2.x86_64.rpm
e37bb02388a71e43ac7b14f0c638f136ea45a8cf15dc2a00a849be4fbbfcc42e
glib2-doc-2.68.4-16.el9_6.2.noarch.rpm
e4869797cc182ee0d95e30065f3c23bf4b4fe2a4dda2afa069978c428fe87149
glib2-tests-2.68.4-16.el9_6.2.x86_64.rpm
525fb273cda5d39fd1d2aed8992514d221c60a6aabbf8c0c5b2533bdcc756ff9
RLSA-2025:11335
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)
* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-3.el9_6.1.noarch.rpm
94de1841473269daaa3e15f4249f6a8c294ebc84c2afd58d085749baca3e196a
tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm
7fb2a559086bca4b2203b74b5b306dd52f941f6b2be91cf1b8eb733c48e8d134
tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm
0d777f2100f9146c8beb4849fb5a44d78eadc6ad19ff86552eab3fde200ab3b4
tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm
3569323f4cd7d33ec6e5badf7fb37e9a16feceefbd594a89f658080705f5ecd9
tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm
a19ab3f668dade931d7e7a47dae4e75e7eb1454009405e742ac191c91b433530
tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm
351679c4405bc7e04bc5976b4c9aefc993964e226ae18d16dd14b516a2f90094
tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm
283af920ec35aa38537737a022934cfb49afb0c44d8fef5776a85fe2e7e05c88
tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm
8a676b24296bce2a5a2bd2a5fa9f50847d1637a2d231fcc16511a7cee1c2b318
RLSA-2025:11402
Moderate: avahi security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
avahi-autoipd-0.8-22.el9_6.1.x86_64.rpm
d1913daa435327ec344181da2ba4111aa7105fe21f8564e07ab9a89ee7499a80
avahi-glib-0.8-22.el9_6.1.i686.rpm
1aff371530dccb438ad0b8c33344c9d4724c84a3ff49c3018c8369696597d5e6
avahi-glib-0.8-22.el9_6.1.x86_64.rpm
c98afa4dc365e9eaa3d771176cd5639edf1f148e3b67d00c95bfbf7bec02b750
avahi-tools-0.8-22.el9_6.1.x86_64.rpm
ae6707245ea669fcd275c90683cbd0c1e6f289bead4d6dcec288078ffb1c9475
RLSA-2025:11411
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm
178266860ffa46e3ffcc33d07fa3363301abfab2a45773c8cbbdd75d3bf3a254
kernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm
1cc05bd0360848a411aac065bf79e2b37f83bd6265e5efaa97346d9cd3ba072f
kernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpm
22284663bd205cbf8cd3b902fefdf507d2156b0a7fcba7e4c9431a42632ac0cb
kernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm
6161d6ae8a074dfa2a6633f71ba75afbf93ddf9436ae4a7df993be6436dc0dab
kernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm
3d7fbca77d14d28d79a139afa79a521ac42dca5a504f0bef5591e9ddbffe302d
kernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm
4e441edf4b481e9169052874f9fc3c4cac8fc1f31ff9b546ec5f86c7b5da53bf
perf-5.14.0-570.28.1.el9_6.x86_64.rpm
f9f838690ea7058c17714febdf6b77e9c0d6242b6bcf94320a99ae4e75b7cc19
python3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm
f17b3964fe73f4e5497d5314bdaf1191596eb30cd2e6ead88b271af8f392654a
rtla-5.14.0-570.28.1.el9_6.x86_64.rpm
12acf46f1e1dec22866a7796dc5c9c8ec5cc8dc4b9af38a9ea438098ddafae20
rv-5.14.0-570.28.1.el9_6.x86_64.rpm
22ec0de8c6aa4e6fde0498a553716bb67415e401620d6ebeb4b52bdb8d1c0a4c
RLSA-2025:11453
Important: redis security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Redis Unauthenticated Denial of Service (CVE-2025-48367)
* redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
redis-6.2.19-1.el9_6.x86_64.rpm
cef2761a456ac665c816b4941ed3166c5be32dec5ba42daa68ad6f8ae9a3bfa1
redis-devel-6.2.19-1.el9_6.i686.rpm
e2f01f6011db857142be236f1ab507c591795172f1022bd622366bcf3e9328fa
redis-devel-6.2.19-1.el9_6.x86_64.rpm
b9f857b55fe171760d1ccac7af201867efca7135e7e7f903736263ffae2039f2
redis-doc-6.2.19-1.el9_6.noarch.rpm
0ba6da97daf84f9d0dbd3ebd7b7a990b7d1c3114d4a4c0ff1323e1b37df74844
RLSA-2025:11462
Important: git security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: Git does not sanitize URLs when asking for credentials interactively (CVE-2024-50349)
* git: Newline confusion in credential helpers can lead to credential exfiltration in git (CVE-2024-52006)
* git: Git arbitrary code execution (CVE-2025-48384)
* git: Git arbitrary file writes (CVE-2025-48385)
* gitk: Git file creation flaw (CVE-2025-27613)
* gitk: git script execution flaw (CVE-2025-27614)
* git: Git GUI can create and overwrite files for which the user has write permission (CVE-2025-46835)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-2.47.3-1.el9_6.x86_64.rpm
7a05bec2fa13c56bd63ec2ded8bf370d9042373dc7143bc67ef65c9a78e10dc3
git-all-2.47.3-1.el9_6.noarch.rpm
8a548f927ef80c124804cbd8b034a48c3f87e59ee98f31020a37fbfcf420b706
git-core-2.47.3-1.el9_6.x86_64.rpm
c6b707fbd78b1a22a59bb9822171b29f150272ef82d0a508c85047246828ce32
git-core-doc-2.47.3-1.el9_6.noarch.rpm
6a1e66bd009e013b396a8d7ae7e040f1729e31d4325ba8bc7925ab6e3f9e77c6
git-credential-libsecret-2.47.3-1.el9_6.x86_64.rpm
5b28edf325f7dd24018e4b6a0aa9d04c96b73a10d012a20400161e5c14109d08
git-daemon-2.47.3-1.el9_6.x86_64.rpm
e6f3bb102756c5d25e9ef08ee41b9b3a7ad8176f6025c237d2213bd18e4f2683
git-email-2.47.3-1.el9_6.noarch.rpm
cec5c49d2b36bb1fd532d50ecacbe4c9abf4f80dd867a369466cbffda0b62141
git-gui-2.47.3-1.el9_6.noarch.rpm
b943351a56d0d7bd356cc75b6a002d5a0ab83a9a9568e3cbd48c9b81fb89fc45
git-instaweb-2.47.3-1.el9_6.noarch.rpm
cc08120a65ee9a7f94793498511ed766335cb60ee1674e7aeaa22ae05dad4cb0
gitk-2.47.3-1.el9_6.noarch.rpm
65b2dd02708ea13fef1e1bb9b41e7292d0f695b473216da57f8a8c9ba9d5a977
git-subtree-2.47.3-1.el9_6.x86_64.rpm
4860c9fc8b50660756d42f9958ffbc97b5985aaaad2d0abc8380852005df9afd
git-svn-2.47.3-1.el9_6.noarch.rpm
992c4af350d88ce3274192142d9538485c0591ec76e87c39ee604469e81bac5c
gitweb-2.47.3-1.el9_6.noarch.rpm
52734f6cf2c6be05896be49897322bb82f45d2bc1722bd0b1ac3caff514db4f6
perl-Git-2.47.3-1.el9_6.noarch.rpm
f11164530c410e28c1e60d725ee3390e4962f9ceeea77f409b1428626b6fb0a7
perl-Git-SVN-2.47.3-1.el9_6.noarch.rpm
3bd83b3d5ee41d48e414ec7e458f31e6b4349e630fd0955572d93f0cf3de0671
RLSA-2025:11463
Moderate: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpm
682662cf25655f43c52051b05f6441e283d6167eb992703ce89c05b7d97d92d5
fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm
4fb158444daa3ff93118b484382efe7e4d1dfc3e8ec268db6a9f938d014baaa7
fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpm
25331aa18388b56570fa1ac820ef5301c5332686165ab9eab0233a57f1e6a9a4
fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpm
6f66f773d437fe07d819b445c17fb646a9e9f53a47cdf640abd011f4042ebc79
fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpm
2ff63fbcc8bf684da6502351d9b7bae885b56d90b1b4fddc0b78ae0d43e544eb
fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm
78d54979617114b70481fd391b532f2aa68aa41b7110c9a1de891be64e7499b3
fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpm
476fb76ebca56a67aee55ec962adf4c6338de4195da1d505e1dfbaef423e57cc
fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpm
9d600d0ee46cb3d59716546c19666c524234853ad334ef2c803fbfba91098a3c
fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpm
23a5923ecd9f78bccda9c49e62b8b23ff51abc726377d11f2b2b1be3c8a6429f
fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpm
57f720dd4fc924f75b3381bb7c979ef6e440df3db27fc025833d749663761760
fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpm
7cb5736477cf9a59ebe517b0edae3b7fdb562c58114f7942cb64d0c1652a807f
fence-agents-common-4.10.0-86.el9_6.7.noarch.rpm
d55c1b8fa745c50060cbb397cf8cd440fe5b5d19ff7f49ed956ba8a43c69a661
fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpm
c43e5b2e2a5e72be2033b94e0db893574959468cd9036574b97768382a8862ae
fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpm
c49c1b649a0b61086c376398ae66a4d8aa024b68c250fab7149c821518ea8a6e
fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm
af87ae51f7872ed463fb1d94cc7e4384a29c3440325796bac3eb5b02bcf34abd
fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm
10188a3dab99af65c4bb69d2ae3ecc8973caca987d20442e90e2c110ca813cef
fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm
cf6adf674ff8be4c890f068eae63600b0a4d9c79711a2cc60eb38e9340ebfc83
fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpm
eeb1a9bd6e7093b3e3ddea5f48287beedb6ddc41081b0a8900ea253e9bae5efd
fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm
e1ea4693fdb872282132a6d93c7611c6ee07c34c29550544ab04c8046950c1a1
fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpm
9ffd2944fca70dd18ab3485154b59d14ce9091cd460977d5a6d6263304bfd859
fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpm
cee62c3a67d22f1816bf4f189704c3640f8c041a0442c90084b545d2b378b8b2
fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpm
56b51f45a137baa28aaa571f7643c91c7b8c3cad5b691fee96c8242e242205f4
fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm
280a3771efa18f278b88cbff4a1a3e2d460ef0be4a288e29269c67d550f58b56
fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm
8cd787bc5d7113bccb48cc88b861814d2d935c0f922906c2f4ae78b8a6085cb2
fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm
2eccc5d9afca8d3b0f418a567395c71fc5ff0b421dd9deb2a6cb0a2d36de1e32
fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpm
1eb1396ce781523b28e695cf9bdd90e2f418a636fa1a34a15131c7955e6a1898
fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpm
aa1540668af39d0a8bbf965a9f6fcba7ea48402362c96058c0d040933b031536
fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpm
bfe56111ba561a63b90af07d5e7e4da9733e96448eebbef2c06785910b7f41c1
fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm
6a401a1c950110ba43681a8d562defffc459027f0cf915121a1397dd38a776f6
fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm
30c0933d35fecaca885c12b972102d3c4dddebffa3181134a1451a7924d01590
fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm
d7aa5fc77ccf09bc75f5de4708c81c33f8df2294c46675c646a7cb8af6e07d9e
fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpm
f11fb4b05247441ef8aaf03720797289b949591906dfde85a19d10b2de5ba34e
fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm
7a587ad8ee0c4bc6289d0a5446e6ee70aeac5e99c72a7ef331628c40bb234d3f
fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpm
632522632082fd75bfdf82c589512faf56a1e46cc22e8e118b08e64bd43f7b7a
fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm
08166307003207aa39ec830a02f7c21804a1e8612b3f21a1eb4976b79687aaed
fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpm
c9d362f075d5eb39b5d6d89a58968c4abd43aeff9b2e64411cb211e1f9a267d1
fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm
ffaf78221bc1bcc68e395362aaa0cf0fe20b45fcb591d2a49068205190ffdce5
fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpm
145e20c95618d13c0cb9f04df268dfa1d9a71be4adb2c191d0e2b30d279e2d53
fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpm
c880935bd2bd030f461fa77a6907360b3fa7008655f6ef356ee0e9b1b923e38d
fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpm
ff2abd9baf2d43c4d1a00d60a5ff469aa9196353c62d2fcbb3583c738993a33a
fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm
0895ad1def945cc932bd0087bf3993239b9e5b508b4b78cc3cf9593a02d8e465
fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm
6f60b107f590be0410b5abe171439788ffdd853a47d89f783dc04119261606b6
fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm
16e588e8332ac4a226fcd40a1a3ed9f966911b61d7609ea53bfce6fa5469da28
fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm
f749878ea856056877ef5b757d7b60597425cb84b5a37d9c2fe3a71f2825c9ab
fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpm
33ac0808e243a0d8750e939dc0196a9e6a68dd6cbd6e8dad5ca93e005887601a
fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpm
5acd01c918c9b94c4f1acba04591732aa0d4a0cfb80a36a4395f890ec0a77e3b
fence-virt-4.10.0-86.el9_6.7.x86_64.rpm
3939e4e7c6162cfedad214b174b7887b7e7c5e3fb3706560da8b9dfb0d614b5d
fence-virtd-4.10.0-86.el9_6.7.x86_64.rpm
bfbaf6ca332720a910b6471802d9db9e1dfe0bf050a19f127f2d43e980d88c68
fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpm
c8a483fef393b8ed8427367a602ed76f80a80173176463fa769183f5e20925b5
fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpm
f0db55186e2f9117ea0cfa349c66bbafdb38e31b2710f9d7956c7f8749020fe4
fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpm
f8368b2d6e3beae35bc376421728a02b19f91861ac3fe627e79a215a33a36155
fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpm
1c6d4589f3514f072f76124b329c28efa03685a9045354161bcbf0dec4d56f46
fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm
60a0107114a1a82742684fc3f3722c6444f4fbc15be8bb83b4cba2748efb76ab
ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm
cf09b12657246692e43b4d1b581d0bf3f8652d9cf1f4564bf3d1ae03fde26b61
RLSA-2025:11748
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
* firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
* firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
* firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
* firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
* firefox: Memory safety bugs (CVE-2025-8034)
* firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
* firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
* firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-128.13.0-1.el9_6.x86_64.rpm
a1fc7cd608895cd2e8930a5766d4364beb87e128d91dfa3ebc104fa1d7635a45
firefox-x11-128.13.0-1.el9_6.x86_64.rpm
ddf256493805451ad80fc1d7ecd0120b35f246a811397ff586bfdda1ff4f0297
RLSA-2025:11849
Important: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for unbound.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbound Cache poisoning (CVE-2025-5994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-unbound-1.16.2-19.el9_6.1.x86_64.rpm
e6fc3a26be26397224df482cac3588a09d1d3017eefb6bf2833cbb75538d1945
unbound-1.16.2-19.el9_6.1.x86_64.rpm
95314d02bdcf675992d0e4b059ed7b374f0eeba6683ac631c851845359e2d8e0
unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpm
7336b73a354d308523231b3b0204d7000880be3ef086055872e47ebba5d9550a
unbound-libs-1.16.2-19.el9_6.1.i686.rpm
6571e7dc32cc792450ce88fefcd1ad55d15b315f5a714657aca0bd079664e009
unbound-libs-1.16.2-19.el9_6.1.x86_64.rpm
908c2c3fa087a20949fe3ebb18d981871ffd57de2a8f1e6adc9d753ee7f22ef1
RLSA-2025:11861
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpm
a7bc53b0cdf04f6703b4b2a715dcdc689761eabf7b963295184f7e5244d1bd9c
kernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm
cc62ffe1bafb53319905ed5ebffd45caacbe11b1a2657cc0ecefb70219e708df
kernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm
0ba9f27ce2ba51ce02e48794b503cd7ccec372fc76cc7e2c92686c42db310151
kernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm
cff8f57bcbe4578568dd454d0a68c565e1065d551fd2c492f66dff82d3cad4ae
kernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm
7c8965292f743b859fecd8737357ca3b235eb54fdfb89ec398a0f840b7aae2b3
kernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm
53e49b315557769b94f83d680eb57bc04b1fbb81597493113dd7d385c2f9c74d
perf-5.14.0-570.30.1.el9_6.x86_64.rpm
390694b6eea1a2e34f4a67171a8d9c97183450ff9d3d94d11b0c3270622e1e00
python3-perf-5.14.0-570.30.1.el9_6.x86_64.rpm
07a421a5ede48cfa3868e75a312cc79f3c8f4bd35c62856de4584a00a4af7f4f
rtla-5.14.0-570.30.1.el9_6.x86_64.rpm
e355afc46525109109c405a994dad2f0619c3e51a616dde3f248cb5e6eb456b1
rv-5.14.0-570.30.1.el9_6.x86_64.rpm
52df07c0a6b4a70fc041aae61e50ad5cee63e3a3738064645d3cb8419b2dcaf7
RLSA-2025:11992
Important: sqlite security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for sqlite.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
sqlite-3.34.1-8.el9_6.i686.rpm
8999f0785fa134734114c15ed0fecea4e4841530b7f1f7bd81a9212a2896d24c
sqlite-3.34.1-8.el9_6.x86_64.rpm
d34118d36ccb0b1c046648ac7b3267063bd48fb153cb0fab86ccf009c1abd95c
sqlite-devel-3.34.1-8.el9_6.i686.rpm
2aa6065ad68afd56a2225d8d9b12e6f4fd50c4fa5ba051844970faaf4ba48436
sqlite-devel-3.34.1-8.el9_6.x86_64.rpm
30251661c577109fa75112d87456b7982457897e0286bba4d04200e795f830ff
RLSA-2025:12008
Important: redis:7 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.redis, redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Redis Stack Buffer Overflow (CVE-2025-27151)
* redis: Redis Unauthenticated Denial of Service (CVE-2025-48367)
* redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__redis
redis-7.2.10-1.module+el9.6.0+32323+e27e860a.x86_64.rpm
511929d3c98635d03c1e2de186a85130badb376885c2f39d211d4191769fd1f1
redis-devel-7.2.10-1.module+el9.6.0+32323+e27e860a.x86_64.rpm
7788c34998c626212eb0a62ab48c071e2463fbb8ab8c6440f7401457aaddef70
redis-doc-7.2.10-1.module+el9.6.0+32323+e27e860a.noarch.rpm
2718000402d335cacb7da56837e469cf0f288d144e7f196cbb9f863e8a641068
RLSA-2025:12100
Moderate: libtpms security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libtpms.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines.
Security Fix(es):
* libtpms: Libtpms Out-of-Bounds Read Vulnerability (CVE-2025-49133)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm
267ef5d09887f2198b43def80b90b5b275c997d4ec47109823d59f7cdef81c51
libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm
3c55f43d5fee8b28881aed928e9f89bdfb237bd59ebd80d3e0b12826642af950
RLSA-2025:12187
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
* firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
* firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
* firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
* firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
* firefox: Memory safety bugs (CVE-2025-8034)
* firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
* firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
* firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.13.0-3.el9_6.x86_64.rpm
3c031376d802617b6779501c6a6f23a22c1bc5f4712d31f169a6cb321b36ee99
RLSA-2025:12447
Important: libxml2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libxml2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr (CVE-2025-7425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxml2-devel-2.9.13-11.el9_6.i686.rpm
613e35294246cca37892f62ca55375768545181b09d8e94b212c46a65acc7c94
libxml2-devel-2.9.13-11.el9_6.x86_64.rpm
0d240dd56b30f180bc89c7c92b4629b24882d633ba37bcf050b6aa80dcff18d2
RLSA-2025:12519
Moderate: python-requests security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-requests+security-2.25.1-10.el9_6.noarch.rpm
510f88286997a56a52ee96ffc8a01745ab8572fd52482d4239628269abfb6c8b
python3-requests+socks-2.25.1-10.el9_6.noarch.rpm
e39c48a7d41bb8939c3999673ce0bf3983d50b9f55111cbe37bdfa9c2c45f9e5
RLSA-2025:12746
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpm
d344640e039a06160ef0aec3aa483f15aaa83e6742e9fc6fae0911b87044a6f0
kernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm
6ac7ea3177bceba3d265d79bf6c8d0a595f18675b358c640c181e2a4babc4b90
kernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm
bf532030a3aedd4c2a094ae3943baff08bc3e57831a810dfdeb965c4116684fb
kernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm
ddc3f812870c4981c056996ee0e07a5f5121a847a41eda1bc1a06c1b02e10c88
kernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm
3daf6cc4889a26cb024081a6c1517eec367d14ea2e207539b661b24815c881ec
kernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm
8e3243e764e21094da46d3fbf8a8069543595e6ffce06fca51577bc4efa45151
perf-5.14.0-570.32.1.el9_6.x86_64.rpm
94262a90ce41fb9cbe328cf7af4a0c3d00c7f41332555c5a360ae81bd8dde71a
python3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm
23b90cdd94057bb6a2e91aa4f2f27fd90ec7fab09289b8f1359b7d8826b7b503
rtla-5.14.0-570.32.1.el9_6.x86_64.rpm
33874c14e13a7926942bb915dd3b620fa56e2b7c8e2419cf35aa3d09f9f75ce0
rv-5.14.0-570.32.1.el9_6.x86_64.rpm
d73b26faf4d82b32b2859871791d2ce3dc9949438cf534dd627d07c317e9932d
RLSA-2025:12748
Moderate: glibc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
glibc-devel-2.34-168.el9_6.23.i686.rpm
ac614e4bb853a33e0195ddab3bd186d14cebeff83f91d281da6c6ca6f068a12f
glibc-devel-2.34-168.el9_6.23.x86_64.rpm
3983e85ea3cc6a0f06fa7f4381206a6c03a16948d97b1acb4dcbb6aa62995e28
glibc-doc-2.34-168.el9_6.23.noarch.rpm
8c9d30c11fc44c3c4cb1dedbfe889ec91fc4197620f873a8444c2f64bdc5582b
glibc-headers-2.34-168.el9_6.23.x86_64.rpm
d2c4a0af7508b705e9b35e15676a950e906064cf57ea83204e4f10cf634a7978
glibc-locale-source-2.34-168.el9_6.23.x86_64.rpm
de90f8f34a3186ef5dee29d09d0cccfeac4e1da91b651bb93398a19fa4f34475
glibc-utils-2.34-168.el9_6.23.x86_64.rpm
21aa011a2c72c18801ea8f6686a7e3bfc7a5cc897f4a4b83e1a6ba047dbae28a
RLSA-2025:12831
Moderate: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.127.0-1.el9_6.x86_64.rpm
03e37c05945cbd3fcfe58ec2e8523ee38d81cc01f8d0451c00fe803c65b23a86
RLSA-2025:12834
Moderate: python3.12-setuptools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-setuptools-68.2.2-5.el9_6.noarch.rpm
f908cf10d4c76eca8e9a720a7a7533f9ba097a49d5bd47b096dfd98087109348
RLSA-2025:12842
Moderate: qt5-qt3d security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for qt5-qt3d.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt 3D provides functionality for near-realtime simulation systems with support for 2D and 3D rendering in both Qt C++ and Qt Quick applications).
Security Fix(es):
* assimp: Open Asset Import Library Assimp LWO File LWOAnimation.cpp UpdateAnimRangeSetup heap-based overflow (CVE-2025-3158)
* assimp: Open Asset Import Library Assimp ASE File ASEParser.cpp ParseLV4MeshBonesVertices heap-based overflow (CVE-2025-3159)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
qt5-qt3d-5.15.9-2.el9_6.i686.rpm
b9bd6c3d2ff4faddb31b8926da16f2153fb15c98ded00f5906210dc6785f333f
qt5-qt3d-5.15.9-2.el9_6.x86_64.rpm
a90a835f8cde587b32fa90be5239602c1d2494a505062aa2d4bb80389b144ebe
qt5-qt3d-devel-5.15.9-2.el9_6.i686.rpm
94478ffbc93ca6d4009453a69c82b0f8ba853fcd8a906dfbae496d9144854d7c
qt5-qt3d-devel-5.15.9-2.el9_6.x86_64.rpm
79bf258f5b07ae8830a4be66be33f60f84816eca252d8380b0b857acb2b3e085
qt5-qt3d-examples-5.15.9-2.el9_6.x86_64.rpm
9319df1369e8e12bd70d3a71981667386b6157fadc3e890094369a11707a7dc1
RLSA-2025:12838
Moderate: mod_security security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mod_security.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
ModSecurity is an open source intrusion detection and prevention engine for web applications.
Security Fix(es):
* mod_security: ModSecurity Denial of Service Vulnerability (CVE-2025-48866)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_security-2.9.6-2.el9_6.1.x86_64.rpm
12c6f3219abe349657d62593feb4cb6d0c6c27f7eb1afb421f94eb61e2b77148
mod_security-mlogc-2.9.6-2.el9_6.1.x86_64.rpm
90a2b35b16118853bfa793f294dba5cdeece715d4bf9f904af987cac64071762
RLSA-2025:12876
Low: ncurses security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Low
An update is available for ncurses.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.
Security Fix(es):
* ncurses: segfaulting OOB read (CVE-2022-29458)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
ncurses-c++-libs-6.2-10.20210508.el9_6.2.i686.rpm
6a01d50c96d864c143748b923ba13566a49290ea404814da53c712d51614d68d
ncurses-c++-libs-6.2-10.20210508.el9_6.2.x86_64.rpm
fa5a49da273abfb282b89af90d5ef351abc7836b95ac420032eaac137105b785
ncurses-devel-6.2-10.20210508.el9_6.2.i686.rpm
902c1239be46162f9b64d0baf3ab2f9063645997aed74b66071676922297b0f9
ncurses-devel-6.2-10.20210508.el9_6.2.x86_64.rpm
a905e634c2e34c88c179f0476d2a93bb7eeb22738cb3288b2607bf85657bb235
ncurses-term-6.2-10.20210508.el9_6.2.noarch.rpm
6255fb9c123d0445dd0a868a8592418dfb000a4225ac6f9ecdfeb0d07078ffbe
RLSA-2025:13578
Moderate: python3.11-setuptools security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11-setuptools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-setuptools-65.5.1-4.el9_6.noarch.rpm
d10d97c303e3dbda5c2203958f57ce5fea59496f294be48d684ee28228927d59
python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm
64253f855af60fdfe2bd3e206ff27796a6eb6512c28ac795d7f4b161b8a15d44
RLSA-2025:13602
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm
c62187dac1d80c13b7ae0f0bebf2cee2959f771dbb35f04d5aea78d3a31a6dc8
kernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm
490d28273cb22cc4cebac1fce4f6b797659b31c1ab684364837743b4f43166f5
kernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm
3448e54d964e49cf80be63f337bb7a0da59b2ea4f22b6668249525686b0c2ddf
kernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm
55d864689239671632ae1d874027363ccf74f31f308865ddb5de446c7c6e2bf8
kernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm
995470815ae7ec2f6b953bbfdb051bc604156d0fadb36be9a16a24e450d7a914
kernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm
1a59e39e099ef6530774eeff78dcff3d43de0632ff070496311d9337c72328b0
perf-5.14.0-570.33.2.el9_6.x86_64.rpm
82d0bbc952b19a3d71bedc7f56fe918a89aab02575b1d10a1e2c5334f5bbea94
python3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm
e9e411124fd69df6b7f2413092035d6f04de9c25472c38a9fbccd98ef7a1791a
rtla-5.14.0-570.33.2.el9_6.x86_64.rpm
de162832b464dfe89bdb0daedd1f66ccc5ec32afbfd4fb5213a6b61c80bf7de9
rv-5.14.0-570.33.2.el9_6.x86_64.rpm
c6e8e148261a62307c643dcffe2ab20c0f786efb5a9220fc9217b0a1cc5112b0
RLSA-2025:13782
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* angle: insufficient input validation can cause undefined behavior (CVE-2025-6558)
* webkitgtk: A download?s origin may be incorrectly associated (CVE-2025-43240)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31273)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31278)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-43211)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43212)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43216)
* webkitgtk: Processing maliciously crafted web content may disclose sensitive user information (CVE-2025-43227)
* webkitgtk: Processing maliciously crafted web content may disclose internal states of the app (CVE-2025-43265)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.48.5-1.el9_6.i686.rpm
624d40d97a4c89396c57cacc98766098f5a8efd4e1ee3af0423a1a8975f49fe3
webkit2gtk3-2.48.5-1.el9_6.x86_64.rpm
f355f1106719c3fb541f3cad33719aa8aa171824052ca4dec01cde06efbaff63
webkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm
c38b63da482bc095b50e03cf7cba45587942563eb662c8a379703df68fc330b6
webkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm
5baf99ffec9e6c7b902b5f3febd1ac92e3c9c8ae9bc2ee26b0921dbc6c8c74f4
webkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm
a778731086ed5f2e7a062ec60026add14f4b91ea1ce196e6fa560f2d3a060616
webkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm
1dfd7485757777fa11d4b723be5a8c1138f641236dd136dbf74804b913fdbb50
webkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm
88d99d3170236e6c4330379e1dd0dd00af06ba8585be7ee63d61aa4cdfc5934b
webkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm
9dff981d8a8a9936930ef5f3a1d67f7e64dc4e0cbde8925a7f6d97af9319d1ee
RLSA-2025:13935
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.24.6-1.el9_6.x86_64.rpm
5a2da676c744cd56a453f0bfbfb1cff55099ac492b70a2022fb1ec3ffd800f96
golang-bin-1.24.6-1.el9_6.x86_64.rpm
304a671fc8a1edc357efba5eb057b174e25637d62c73cd3a1e69937d5dbdfcbe
golang-docs-1.24.6-1.el9_6.noarch.rpm
46da51d2cc933e55ddf1e8facec2bc1b2b159b55198cf566b3a057b183a50da1
golang-misc-1.24.6-1.el9_6.noarch.rpm
4b6f1ff239bbc10b64e060334b1448eb7fa0c97ba224395be9a86ab761d96f0c
golang-race-1.24.6-1.el9_6.x86_64.rpm
9ca04779acaad7695f146f0b3f32a9488fee065c64adf848f4ab2b81570e97e7
golang-src-1.24.6-1.el9_6.noarch.rpm
0cc228cd37c7926aec40ab92b320b386dc6a4156e9d7d1dab94ef58de753f576
golang-tests-1.24.6-1.el9_6.noarch.rpm
414570068bd2184d7644d9835a1b903d1a25c86e2648af0daa2cfd0a05659394
go-toolset-1.24.6-1.el9_6.x86_64.rpm
f0a9c52a4f0a133004a9f928c8468cb08000d27c647e679ddf78bd1faf7f24ae
RLSA-2025:14075
Moderate: xterm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for xterm.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: Buffer overflow in set_sixel in graphics_sixel.c (CVE-2022-24130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xterm-366-12.el9_6.x86_64.rpm
4f041ee09626eaf9440437f206995606a2c176ff10e46c0bac6a83a09d3db309
xterm-resize-366-12.el9_6.x86_64.rpm
cc0df8a1862cbf3275353059014e8121b17a878a5c95bd06e1b720225ebd0c41
RLSA-2025:14130
Important: libarchive security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libarchive.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bsdtar-3.5.3-6.el9_6.x86_64.rpm
d0bd4211bf763367e0ff66df8d3299b634c7698efdb20219d7be5a1643a9ae99
libarchive-devel-3.5.3-6.el9_6.i686.rpm
93073cf957a4891be40a5a30bd3e47f8c047a35c42659d96f9ac4ce0f6ad495f
libarchive-devel-3.5.3-6.el9_6.x86_64.rpm
148aecb52f5af876b455604d87c7e392370dd396f81066b0c0086b5ea229d75e
RLSA-2025:14181
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988)
* tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
* apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976)
* tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)
* tomcat: Apache Tomcat denial of service (CVE-2025-52520)
* tomcat: Apache Tomcat denial of service (CVE-2025-52434)
* tomcat: Apache Tomcat denial of service (CVE-2025-53506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-3.el9_6.3.noarch.rpm
d670ef1257233d72c2a12c432aa9e1ed4871f8bb0f5a6ea0fb2b070482531b87
tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm
f771414760153ca0063b92be29707dceebe621b450216f02e099b7b490d782bb
tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm
86e15c3f0077c9f7c2fce9fef153a09c841b8fdc1abb7481276743ac1928f5f7
tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpm
964415d163315b2e2d096cbf8eba18a58fa807603e0308d9f6a49aa13ed9720f
tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm
6ddf4243a04a5e7a043d4431f161ae024fa38e7765c1f0be1e6c46a90a90a330
tomcat-lib-9.0.87-3.el9_6.3.noarch.rpm
77caf8e71abd59cc6a3ee57fa1322b7bb826d6dbd47956b3000868fe2f6a33e4
tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpm
bddca6d4f03f32d9c5c068d24dd30ac4603c9485ebf1a9791134e82ebdc016c1
tomcat-webapps-9.0.87-3.el9_6.3.noarch.rpm
1dfa042a8006fdcb1eb1035203b94fb339c986b5ef3f8edbb309e1511b7645ab
RLSA-2025:14420
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
kernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm
75b4ef3f758af2c5a3a6937d72040c297e35931ea5feadb70eaca0f083110b39
kernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm
bc40026aadd3a3ee2dd211db57447c3e79a7e266d572ef9de9e910c3656f21c4
kernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm
425ad56c91736ab2a520bed9f71faf36d2cbf5bd2c2e4e896557c539e07e3498
kernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm
768466fa48a0cdf04ad8f56056503c088705215a045fa6953b9b5a104633ca4e
kernel-doc-5.14.0-570.37.1.el9_6.noarch.rpm
509dfc1a26fde59da9cb11b8f5fdc20d4dfd1a35e2b4672256cb409053e0a4df
kernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm
50576d583c07f5c4ebcc4a26a7dd01ef0fc96ffe34003d49d0b06d70316d031c
perf-5.14.0-570.37.1.el9_6.x86_64.rpm
1f0ece2c38417c6be5a0806833363457576a12c7336a27cbcaec913b5f68d494
python3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm
79440605bae82da31bf4e2147887ee20231f01bff0191f1ac976973850e6311f
rtla-5.14.0-570.37.1.el9_6.x86_64.rpm
f77a2df50a908ab7d608242be7fc26482ba32b7a3ec00c9d96a4f73b672c2184
rv-5.14.0-570.37.1.el9_6.x86_64.rpm
6414810e6727ccd15d8b5cb0dc3f0e1cc044e2c79a60890c551a6189c07e1422
RLSA-2025:14493
Important: aide security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for aide.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: improper output neutralization enables bypassing (CVE-2025-54389)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aide-0.16-103.el9_6.2.x86_64.rpm
a0a33d50ea9328174713d996ed39325c0ce01fa2e6aef8d932fd41e020ae0f92
RLSA-2025:14640
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182)
* thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179)
* thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180)
* thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-128.14.0-3.el9_6.x86_64.rpm
6cb96786ebb0bba554783b5157eaa3b83e770605c864fa49ef4c1f6c362f6aaf
RLSA-2025:22005
Moderate: go-rpm-macros security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package provides build-stage rpm automation to simplify the creation of Go language (golang) packages. It does not need to be included in the default build root: go-srpm-macros will pull it in for Go packages only.
Security Fix(es):
* os/exec: Unexpected paths returned from LookPath in os/exec (CVE-2025-47906)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
go-filesystem-3.6.0-12.el9_7.x86_64.rpm
65a99ba8da3428b4670ad9736bde9ffcd607f39d5152bf8c5bf3b308d7b585a6
go-rpm-macros-3.6.0-12.el9_7.x86_64.rpm
abf898c6c1649395578a6f3e9e9ea902de0a4b92eac34cd8058260be6f508df9
go-rpm-templates-3.6.0-12.el9_7.noarch.rpm
b0b3460dae4be0b22ea453a0b8ad78b6616e7fa04b6c2e24f15c62b0097364b5
go-srpm-macros-3.6.0-12.el9_7.noarch.rpm
deeb0d7e59b0512d9113a18826512d33050a63a81cb8ff33cee64333e39d2c9e
RLSA-2025:22011
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.41.6-1.el9_7.x86_64.rpm
0220d4c0f34bc8d78f3f1bcb829a36b9962bf822197e3c61cec9c3b9a1d9bd16
buildah-tests-1.41.6-1.el9_7.x86_64.rpm
f96009dbec4b9df59b2571dbad9b522433d4179fb8786d01849497e99171ed5c
RLSA-2025:22790
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS (CVE-2025-13502)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2023-43000)
* webkitgtk: A website may exfiltrate image data cross-origin (CVE-2025-43392)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43419)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43425)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43427)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43429)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43430)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43431)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43432)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43434)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43440)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43443)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-43480)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43421)
* webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop (CVE-2025-13947)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43458)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-66287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.50.3-1.el9_7.x86_64.rpm
bd7e6ea9cb64ea7a2311d79a14f55d9b1b09fbeb99c5f98d1a18ac5f27b55cbf
webkit2gtk3-2.50.3-1.el9_7.i686.rpm
517d35db1dca00d18834653dee4b9698cf39be182c1daea42a630683b3806f16
webkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm
22f91ceae53b0e1e0be8a0996bc7a605b8dcf0d9077f2a6896b6dd38ca24e2c3
webkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm
6681936bf2ad92cc85651f2f947a0259c0557e1003e823e2bc7fe3526a2bd0f2
webkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm
3544318966cba0b98b644f0736b342b81f957cad2c29d2d2a8d662c4a055e440
webkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm
d0b5e7bd1785c2be7e26f453e96ebd100fddc0325c41c600e417d326dfb176c9
webkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm
d16b0baafdace162ff95cccec45dfbf7d916aea01e19a595cef2dd46e8f2957b
webkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm
83ffde1430bb39e7d6ec11c6d50dec396b79035ed822c96a76fdab716eab409c
RLSA-2025:19345
Important: redis:7 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.redis, redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__redis
redis-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm
a8140f5aee16aefdfe9f9171b480710e8d242b5e9513634dffcdd29ffdf66de1
redis-devel-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm
0d3671460a711e0e07066da1e051f5f2e1a3d61f9ed95bde711edd89e2b961a6
redis-doc-7.2.11-1.module+el9.7.0+40013+17379f63.noarch.rpm
edfb30c3ab26ceb7c9f4460ddd8bbeb5021b9ba468e7b5947e915fe9b1a954ce
RLSA-2025:20955
Important: redis:7 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.redis, redis.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__redis
redis-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm
a8140f5aee16aefdfe9f9171b480710e8d242b5e9513634dffcdd29ffdf66de1
redis-devel-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm
0d3671460a711e0e07066da1e051f5f2e1a3d61f9ed95bde711edd89e2b961a6
redis-doc-7.2.11-1.module+el9.7.0+40013+17379f63.noarch.rpm
edfb30c3ab26ceb7c9f4460ddd8bbeb5021b9ba468e7b5947e915fe9b1a954ce
RLSA-2025:23210
Important: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Keylime: Registrar allows identity takeover via duplicate UUID registration (CVE-2025-13609)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
keylime-7.12.1-11.el9_7.3.x86_64.rpm
9e0be30dcc4952003bd2f8ed76a41a6fec9a974708ae5b9d6c99dabf285e464b
keylime-base-7.12.1-11.el9_7.3.x86_64.rpm
77dc6aae65fcea47789b3a40a55553b9d5c6998eaa63cf629f61d136c19bdfe1
keylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm
d46d05bd8ab48b4bb6be9ecce23c1a3a2841ada6750a101b8422f53b87b2fc7a
keylime-selinux-7.12.1-11.el9_7.3.noarch.rpm
171548e63967ca90a9ca511c31fd827de11cc5288bd9030d00f19dd0b01d5e2c
keylime-tenant-7.12.1-11.el9_7.3.x86_64.rpm
d6de5d1a7fbef6783bcc46950ed4e263d663a63cb8585523d40cadff19604dea
keylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm
f1406989aea9670d3cefd5a4d69755e755634412ceee30e79b0de476a42b92f3
python3-keylime-7.12.1-11.el9_7.3.x86_64.rpm
9b5461b92e3a04fa9c1b66b8b23a7bcef6984c7ee224bf92250ddc9012c73cff
RLSA-2023:5363
Important: nodejs:18 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs-packaging, module.nodejs-nodemon, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2223313, BZ#2234404)
Security Fix(es):
* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
* nodejs-semver: Regular expression denial of service (CVE-2022-25883)
* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm
f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c
nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm
0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51
nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm
40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a
nodejs-packaging-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm
5626e9cdfd52cb85c80c45769f9fa7b5eb16feb5435d2749cb086502a6c50e07
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm
59a2214e1f16626ac268cb5d580550f3d2a44f26c23c2785e67d7cf0f33a572f
nodejs-packaging-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm
ea42bb2f12765d4f8f354dbaf9d20d4062d9c1a72c27bd9ff962b4351627899d
nodejs-packaging-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm
a447ffa0379481e069fb443c82c02fbb64f0645b0e323bf354782e61b90672e1
nodejs-packaging-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
f91999deba64a358c90f9339915613787dec19d739d82a9faa813225d0d40529
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm
db6615e33bfe6f5b78bd377d6bec39e7cbc880a431ab3773ba86a902d12ab378
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
299690af05d31bf16750d1df4e97458b1a6a2fbf8b47d9c1e2a81fac32f89d16
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm
fcdd43a53c6fe19580ed1ed9516359cc3c2147297aebd066e34f56ad07d6a3f0
RLSA-2023:2258
Moderate: python-mako security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python-mako.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mako is a template library written in Python. It provides a familiar, non-XML syntax which compiles into Python modules for maximum performance.
Security Fix(es):
* python-mako: REDoS in Lexer class (CVE-2022-40023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-mako-1.1.4-6.el9.noarch.rpm
2e6b0ef2eb5be41f982be6010d44cfd7d313763c4ef79041a2fc72122bd69683
RLSA-2023:2654
Moderate: nodejs:18 security, bug fix, and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for nodejs-packaging, module.nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (18.14.2).
Security Fix(es):
* glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
* c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
* http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
* Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
* Node.js: OpenSSL error handling issues in nodejs crypto library (CVE-2023-23919)
* Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)
* Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
* Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-packaging-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm
a447ffa0379481e069fb443c82c02fbb64f0645b0e323bf354782e61b90672e1
nodejs-packaging-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm
ea42bb2f12765d4f8f354dbaf9d20d4062d9c1a72c27bd9ff962b4351627899d
nodejs-packaging-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm
5626e9cdfd52cb85c80c45769f9fa7b5eb16feb5435d2749cb086502a6c50e07
nodejs-packaging-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
f91999deba64a358c90f9339915613787dec19d739d82a9faa813225d0d40529
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm
59a2214e1f16626ac268cb5d580550f3d2a44f26c23c2785e67d7cf0f33a572f
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm
fcdd43a53c6fe19580ed1ed9516359cc3c2147297aebd066e34f56ad07d6a3f0
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
299690af05d31bf16750d1df4e97458b1a6a2fbf8b47d9c1e2a81fac32f89d16
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm
db6615e33bfe6f5b78bd377d6bec39e7cbc880a431ab3773ba86a902d12ab378
RLSA-2023:5849
Important: nodejs:18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs-packaging, module.nodejs-nodemon, module.nodejs-packaging, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
* nodejs: integrity checks according to policies can be circumvented (CVE-2023-38552)
* nodejs: code injection via WebAssembly export names (CVE-2023-39333)
* node-undici: cookie leakage (CVE-2023-45143)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm
40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a
nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm
f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c
nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm
0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51
nodejs-packaging-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
f91999deba64a358c90f9339915613787dec19d739d82a9faa813225d0d40529
nodejs-packaging-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm
a447ffa0379481e069fb443c82c02fbb64f0645b0e323bf354782e61b90672e1
nodejs-packaging-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm
5626e9cdfd52cb85c80c45769f9fa7b5eb16feb5435d2749cb086502a6c50e07
nodejs-packaging-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm
ea42bb2f12765d4f8f354dbaf9d20d4062d9c1a72c27bd9ff962b4351627899d
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm
db6615e33bfe6f5b78bd377d6bec39e7cbc880a431ab3773ba86a902d12ab378
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm
fcdd43a53c6fe19580ed1ed9516359cc3c2147297aebd066e34f56ad07d6a3f0
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm
59a2214e1f16626ac268cb5d580550f3d2a44f26c23c2785e67d7cf0f33a572f
nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
299690af05d31bf16750d1df4e97458b1a6a2fbf8b47d9c1e2a81fac32f89d16
RLSA-2025:23049
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tomcat.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tomcat-9.0.87-6.el9_7.1.noarch.rpm
2e1c372e9e3f58fd7b54aa4b1d96eb6141a2235bd4358ad80177e61991b22a27
tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpm
1b6a93a698ddc18d27a2f73466c3b385b24d79eab4d2a993c316c483a2ba8b47
tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm
afdd45d89b71f159e26f9d197cc11b020857b4e7bb3015d2a57b781f23a72562
tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm
fddf41cd32bab216681d497e3f66d1c9df5defe14a50f44e7dabfd6610fb3918
tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpm
3d6c323d1bb69b12cd165701c801633b8bea22d620dbeb756b3850790866fc5c
tomcat-lib-9.0.87-6.el9_7.1.noarch.rpm
9177770ab9b0d9ba0f47a3fa0d929c380266a9fcd64f0189577e3404cdcd5d1c
tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpm
33e1821ed771524308e21bb81d6a3185b1fd65e2c9966a004d392810a023127b
tomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm
0cd0b8e9c548904ae9936ed1b71fc86d804bfa5eebc8eb4aace9cfea30a237ca
RLSA-2025:23087
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-17.el9_7.x86_64.rpm
26995445f31c4cbd1c555f17c73c0fab6342afb92d141e4b6b75f3857f3fd8b9
grafana-selinux-10.2.6-17.el9_7.x86_64.rpm
c49b6a922f18d230702ff22afdabc33fa5c9e4d63714685036737d653cefeea6
RLSA-2025:23111
Moderate: mysql:8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mecab-ipadic, module.rapidjson, mecab, module.mecab, module.mysql, mysql, rapidjson, module.mecab-ipadic.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040)
* mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__mysql
mecab-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm
355af28fc740c2f9bd77e40daf39253b621b83defb0e47516246e5e2222ca44b
mecab-devel-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm
97981caf9383f3546c68e18c5465ddc1b65a194bdf0bcf2d725e276a058b71e5
mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
7366b9dd824100c2130f78e43d9ef9b799f61934961736e3e1456abef4a3bf09
mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
3f2d04c54ece7fe5e19ac3bb076b4614722e37c476b38c80b3a6f1924325d9f9
mysql-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm
6faff4076091816ba68fc1bca98b46ee3fc234903bc6a2a00879f4ead04a8fb5
mysql-common-8.4.7-1.module+el9.7.0+40041+63d6250e.noarch.rpm
06b3f5a3ebcf6720f7448996ec95367fe1ab980c66d6d87ff6e2b3e2e32e81e5
mysql-devel-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm
09ffa96373d47c20280f7fd8d3fb7c99c638f7e4ddf0753ce602c8ce55e7eff3
mysql-errmsg-8.4.7-1.module+el9.7.0+40041+63d6250e.noarch.rpm
0f369aeacdb7198d858ba095e1e7bc1b25b1fdbe80777b333cd5b0adf17fa605
mysql-libs-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm
c27bb017249ee5214db45e3c992b62b749afca2e41a37c4dc03d512215227e79
mysql-server-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm
d946f69c0df75cd34c0d648c4819139c1b345327301f888a9adc9fe4621bec32
mysql-test-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm
e03ea1e49e06a617830c65214b7e1a4b72f9255c572098f416a45fa19fcc3444
mysql-test-data-8.4.7-1.module+el9.7.0+40041+63d6250e.noarch.rpm
a0217bd26e45b189628929a7571ce491cc3ba84a9a6af673d825b4b524df5eae
rapidjson-devel-1.1.0-19.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
6401561c10fdd4e51de5661b88bac12d5a9e20e2f738f90c429c73eb3c4fdf32
rapidjson-doc-1.1.0-19.module+el9.7.0+40027+0df0d4e0.noarch.rpm
558fcd49446a50ffea6aa4b19088b8320790c540f80e469ff9a170af7e1f2a34
RLSA-2025:23142
Important: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for wireshark.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: Access of Uninitialized Pointer in Wireshark (CVE-2025-13499)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
wireshark-3.4.10-8.el9_7.1.x86_64.rpm
4237d8be67b7b83ca2bb4a360db98e5af624ed82ae39b87d4aa9eb68625a1874
wireshark-cli-3.4.10-8.el9_7.1.i686.rpm
89600eb3af0b682db091daa14f1c49f6f930dc279f64f451b68e2e69f7d9be39
wireshark-cli-3.4.10-8.el9_7.1.x86_64.rpm
31f831d8bf18c654d63e0167d3d768ba4a14fb04e7336e1a9199678ea83de6ac
RLSA-2025:23326
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.20.0-2.el9_7.x86_64.rpm
81a14f8fb44af4aa8b78a3cdb67e5a1b514aeb90fb6d79f7f6b52825dd88881b
skopeo-tests-1.20.0-2.el9_7.x86_64.rpm
5f46770365a8088ff60ec31979577608a036b46192fe500792d86f8d027db4cc
RLSA-2025:23323
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked (CVE-2025-8291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.12-1.el9_7.x86_64.rpm
2f1258a877e1bc4f1606b35479e1e736a5e98a2e6c61ce70bf2b5c3b3c8932e5
python3.12-devel-3.12.12-1.el9_7.i686.rpm
3143950b2d7a94a075fe6f16ec10cc08cfc7755f46f3120c45dc4f100be20065
python3.12-devel-3.12.12-1.el9_7.x86_64.rpm
7ba0ef6180c604f3a7e4fc19999877abd59e1aa9c46547871cac95e87424e172
python3.12-libs-3.12.12-1.el9_7.i686.rpm
c3c6be8cab40058904d84e33471226c8f4be885d82401c3e6d362392ce884163
python3.12-libs-3.12.12-1.el9_7.x86_64.rpm
c1626894a82a6f33a1ac082541ade1a6ddf10cc68edceb79e4eaa910b0700e48
python3.12-tkinter-3.12.12-1.el9_7.x86_64.rpm
ba285256d52e48998ad61ce5618de18336b74111982d6b13b5cb4e148fe1845c
RLSA-2025:23336
Moderate: gcc-toolset-13-binutils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-13-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line).
Security Fix(es):
* binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpm
6fcae1fa9fd414e040379b30f81556e97a9bfd78d8cfa7e4f6690a5e2d9d4f86
gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpm
b2ece3fbcc4bc1d3975bce3787694ccaeef5e0ead06e42956fb92dfc86b0c91f
gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpm
f5009d61246d83e82773b0d99a0c7e8d0b1ba70c6de148d4eb99ba1aac9beecc
gcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpm
11a8f1b8cae839516dce437646188eef75f4bab215efab68915055692f7bf089
RLSA-2025:23309
Moderate: php:8.3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.php-pecl-redis6, module.php, php-pecl-redis6, module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, php, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: pgsql extension does not check for errors during escaping (CVE-2025-1735)
* php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix (CVE-2025-6491)
* php: PHP Hostname Null Character Vulnerability (CVE-2025-1220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.7.0+40004+bf50a568.noarch.rpm
23fbb9f304bbf6e02897a8e614ed3cac76c8f8e18250a388284d9235ab90d674
apcu-panel-5.1.23-1.module+el9.7.0+40005+715283ec.noarch.rpm
7dd1ac343924f8c124aad5ea866231a2ff6b85bfd557fbd5468607e6de705b78
php-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
9c65d2cfc54b72c4c48fde09ae78c51a648e2955c7ea3dd37992f8670c183cc0
php-bcmath-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
efe73e62d7397c8baa1a283bb1febc515af00e942ce53ece21759234dec0353c
php-cli-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
ebc881801efe86b2be589bc95e6ffce08bf45d702389b6174054e2d9dc83e365
php-common-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
50705dc0b7c765f19ca677f32d00e9ad946975ee3b8b0e4d19c5817b6658fec5
php-dba-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
bfc5e433a49e8841330c55c4176982cf1a708700442df8c3ed7f2be2d53860de
php-dbg-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
82b9f55ab865b32512d694976bd9e2bd006cd7ea1d40813bac25dfefb8ce0382
php-devel-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
018e47070f497311bc1fbc5ef3a3d0b2398e7179f578771e88b1644e015f7fc8
php-embedded-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
aca6835cbbfad4b04bf08d73f0f994840d7ec266cbccda70d6b6c7f08760612f
php-enchant-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
128b3933570d8d7bb0c99eeac042dbc67c0406cdbb11a136e68d61f55d703130
php-ffi-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
4e264e2cac7c360fb8b2e40f3380549d6df5f11b456b4db384c059ff6c645137
php-fpm-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
baa1fc78268a4ad353b93755bb7be99e8b4dcdcb848955f6895ef7d0a448c65a
php-gd-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
b09093d8c74fa84360d35bc6cf118ef87f397988486fd163e65f69526121f7d1
php-gmp-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
748b271e1501b92f94c554f465bdb4a1fa677ec8f647b69c9b24fedfcc83e641
php-intl-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
c67234ddb299520eb19b65ecbfcb66e23ca7a8641649d1770a53bf9eaf84570f
php-ldap-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
5e688eb0c66a2913e46124d3d31350d7bbfd0784dd1224a3e2ec1de041e5d246
php-mbstring-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
3638a91c97e9b4fcc767b87da6e4b65f83975e496fb30098bf2d284a34407b64
php-mysqlnd-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
b2611c30d6f083dc317a888a68a16f12dff9c7450a1972ef21720d9af358ab69
php-odbc-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
f5f7792dbddc8768932c7dddb239fd1bda2f41a84802f0aeca9c18f4c7cca985
php-opcache-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
fab409a1b901d335d02833208d87bc19d094c9cec84eb471a688dc99105c2611
php-pdo-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
b22d081d9f017682fc7bddf93c7b4555e0c948f6e201e7120c2b18ae9c10b346
php-pecl-apcu-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm
dcfdd569de5e6ddad19e451d0bdeead0f30f500aafa4dd4d9e164b4170deeb88
php-pecl-apcu-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
c677509dddb11e0bd88160e9d3bc0e5c3a5c95eef153f2efae02fe2a74fbc173
php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm
18128edfe8947247823712735e2bf08347870ad4686fe37fe574a54060883e86
php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
ce6d8eb9d636d1a7d25f77eebab9bc34b0803050a8dca008f336718adeb35000
php-pecl-redis6-6.1.0-2.module+el9.7.0+40005+715283ec.x86_64.rpm
565e9e2ffbb1116355432195069ac83ebabeb146bb7609a5bb8cec4c1f999bcb
php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm
969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee
php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm
547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e
php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm
0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f
php-pecl-xdebug3-3.3.1-1.module+el9.7.0+40005+715283ec.x86_64.rpm
9284eb822657efa12e6fd0d10ee620810bcee59eb84954ecd598093bcb6276f3
php-pecl-zip-1.22.3-1.module+el9.7.0+40005+715283ec.x86_64.rpm
69d6cf54bbae7dfe848217065300e013f3d68f4a675214f32ade0362ecee5164
php-pecl-zip-1.22.3-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
3d22b91542f7cf9f28440dc6c850ddbd39f76fdbe4c7a8ba3736e0f384c85ee8
php-pgsql-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
89e907403fdc52ee873c441a6c769f37e88a9856f8d4c658e3ca607122fc68a4
php-process-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
70e76a107d24bffbf3cd0c11dd1f63b401eb6b21303034b809253f168c2ac8e8
php-snmp-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
05559f469dc0e3c453e89996c8ff5a1aa4853491e7da913365858345d111855b
php-soap-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
d83f877510d48551779a24baa7a43de3ddb83da438d2005ddb112629889c4dae
php-xml-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm
06b223358fdc813f1072501d27b567215b03b5439cd745ef3b807af4859596f2
RLSA-2025:23325
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.6.0-9.el9_7.x86_64.rpm
b283d59875591ad11c45e8b66023ab80c024f15de2dfead559186accff721ad5
podman-docker-5.6.0-9.el9_7.noarch.rpm
f6e960d20d072677301ae8c6ba6b80f8ef6e52852ab68865fe3abece40dbbcc5
podman-plugins-5.6.0-9.el9_7.x86_64.rpm
dc65be949012a481ae131526dfccb2e67d60d838eedd8b5ef7f7965d9866f86a
podman-remote-5.6.0-9.el9_7.x86_64.rpm
8ea56c4c609bbf3878758461882d22dfe0da89530413cd6acfe485ca9b61798f
podman-tests-5.6.0-9.el9_7.x86_64.rpm
2eac3b3e910335244f73ec463bac7f546fb6635504028ad0a3d409aa938f0d7d
RLSA-2025:23700
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: webkitgtk: Use-after-free due to improper memory management (CVE-2025-43529)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43501)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43531)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43535)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43536)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.50.4-1.el9_7.i686.rpm
aab0522cc03db92c2fa1995d5a1f4a1db01f4be611baec37d7f2bb7aea462896
webkit2gtk3-2.50.4-1.el9_7.x86_64.rpm
fb69cfcd7f9e4429d7eff887d8e108789eeffa8e9546ac721133058118fa85de
webkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm
6ae871ddc2b886f1e16584cf77f1c45f0b42b587063f5d87756a14613267cb8f
webkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm
03554a96a8bca14bbbb220d06d453c63a49fe00308b96780f0a6e34c10af0c9b
webkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm
72f7762c8238e8385ea81728d10783e5fe8054d9b83157dedae2092ca68b1419
webkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm
8eb5ad0d6dca21a198e09d50b198dc378970d1030925308b8d61cf1da7261b24
webkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm
a56f3a8ecaf76fe217b02dc64117891376f624f1f2e5a4472abab410fbb3b0e4
webkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm
3a3b96272ca39f82ec5dd9a0bd2264ea43af39f71716ddcf50ac0f7ef7eeaf1f
RLSA-2025:23729
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation (CVE-2025-68156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.135.0-2.el9_7.x86_64.rpm
f5d190b6e2853dbcf70ca3083f6f4a9badbf30f2dcd1c962e207052b2cbb19f6
RLSA-2025:23739
Important: mod_md security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for mod_md.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.
Security Fix(es):
* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mod_md-2.4.26-1.el9_7.1.x86_64.rpm
5d15fde88f25f14bdb80be64d31d9298ab3626c096119f63004267a9e88c6b69
RLSA-2025:23744
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* git-lfs: Git LFS may write to arbitrary files via crafted symlinks (CVE-2025-26625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.6.1-4.el9_7.x86_64.rpm
d427a953ceb943302d824138d55e043138d03a426523a2e1ca944d0dc93b6298
RLSA-2025:23856
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
* firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
* firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
* firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.6.0-1.el9_7.x86_64.rpm
913e02e42e0e668b09cb4213811ffa9a3b2c9866268e6fd4db9aada77ae382f6
RLSA-2026:0126
Moderate: poppler security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for poppler.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince.
Security Fix(es):
* poppler: Out-of-Bounds Read in Poppler (CVE-2025-32365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
poppler-21.01.0-23.el9_7.i686.rpm
0401d4d46c722824d87eb868e948bd8cca870290b7efb64bc25ea86000b05f5d
poppler-21.01.0-23.el9_7.x86_64.rpm
95f8683f0fa3b6310840970e7e69eba25e8199b6dbefa07c8065400b50dfd570
poppler-cpp-21.01.0-23.el9_7.i686.rpm
c7778eb62133c778b16164a7822cd3b196621678289bdc5176ae1aae98fb8964
poppler-cpp-21.01.0-23.el9_7.x86_64.rpm
4f8d10c78980bea2db7dfbfd3917c267ad20d882d9f5c65b495e5350bbdc665f
poppler-glib-21.01.0-23.el9_7.i686.rpm
23d9b2efac4f94a62f14757c7cab5cd8bf5995ecd57db546e875dea9ab37ffb2
poppler-glib-21.01.0-23.el9_7.x86_64.rpm
5533c31b939ddb30a6b2e06560a4184433b981e5b0fad1cf7bb0b321c0c552b4
poppler-qt5-21.01.0-23.el9_7.i686.rpm
cb5144b6f562f43563672aed9d16e8f813fa67c95887d420af25b7a2992f8c85
poppler-qt5-21.01.0-23.el9_7.x86_64.rpm
b6ac5124fb80fe5c35dc7f983aee81008e019167493f257d4fc8fa5a921e5b99
poppler-utils-21.01.0-23.el9_7.x86_64.rpm
33eb74c32bf84c503dcef3068a71548a16fc6d9a041e1e19328dedc33edb16f2
RLSA-2026:0914
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422)
* gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425)
* gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424)
* gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-libs-3.0.4-1.el9_7.2.i686.rpm
f20d74b8b473bd5ce2c1a7a5924440f1f05a6978dde56a7da0b715b673f38031
gimp-3.0.4-1.el9_7.2.x86_64.rpm
3e18579b40c8e08db126d7846b49f91e82ff88f845220069aafa16c20a6d0103
gimp-libs-3.0.4-1.el9_7.2.x86_64.rpm
048df70f5df3a0eb1c0d0fe2227a8914f6f847401c9cd3fccc984d9b201177fa
RLSA-2026:0137
Important: mariadb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for mariadb.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Security Fix(es):
* mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mariadb-10.5.29-3.el9_7.x86_64.rpm
0d0fe87b514f27658e3c31eb08144a52a0d3cc5b7d836acb5296114face1d1a0
mariadb-backup-10.5.29-3.el9_7.x86_64.rpm
da6f5b12a6f47b395595f748fa7ba7ac6eda0d6ac27176a0ac94be04f8a773dc
mariadb-common-10.5.29-3.el9_7.x86_64.rpm
4cb95a5cacae7780a81499988c5026009b133ac497e05b9349eca7881dda749b
mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm
0d3049bac4c83495e73f2fb69606fbaae03fd10764f858ce02bd7bfbf5872d7d
mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm
d5fd5ccb1e6cabb86083de52201ec7f1e54355dd052248e7194980c1a7e17801
mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm
4ba5c9f6b1850ec89990d5e667c52909103721302c20ef331145119415c8e009
mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm
fc97005f22eeea8cb22cd5885e5620ba8608e072852b7fa7b055b97d3c06a119
mariadb-pam-10.5.29-3.el9_7.x86_64.rpm
b0bdd7c79a6d78c21f3304142a0df57b4311e73737546d1a9feb02812c27abaa
mariadb-server-10.5.29-3.el9_7.x86_64.rpm
6268685c1bc569794c076d6ab9b9d5ebc0895b956ab73c50dee17b47bae5822f
mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm
775e23e9f288db751316971a6d4a26cb87161b6a395c126443d6085d3710ef12
mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm
7cd3d291e7ce8a0b4ccdef53f66145b82b5d17a815eac2c37bbf22baa9b84b43
RLSA-2023:2417
Moderate: php:8.1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
The following packages have been upgraded to a later upstream version: php (8.1.14).
Security Fix(es):
* XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454)
* php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications (CVE-2022-31629)
* php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630)
* php: PDO::quote() may return unquoted string due to an integer overflow (CVE-2022-31631)
* php: phar: infinite loop when decompressing quine gzip file (CVE-2022-31628)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.21-1.module+el9.7.0+40003+454ed3c4.noarch.rpm
7c802657f1b3292682e1d46e6d450d4922d17e7d76ef6ce9aba262ca6dfc4fd0
php-pecl-apcu-5.1.21-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm
64fbae80ffd07556f8b53b0a3a03e122eb34f0387eef2ba25f3cc7bae8ff2ce7
php-pecl-apcu-devel-5.1.21-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm
d1dd9b8a344eba72b234331beed4b30c8385609cbd4ee22162f73350f3c89b2f
php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm
969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee
php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm
547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e
php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm
0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f
php-pecl-xdebug3-3.1.4-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm
10bc41548d43575a5f6e4fb9c78582e39d0d86b5ce785a71c1a7e2e595347c21
php-pecl-zip-1.20.1-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm
ae888f9f20b7dd17983e81c3afbeb2a851be93674f4020afd7d67aab1ef5d4dd
RLSA-2025:23063
Moderate: ruby:3.3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for ruby, rubygem-mysql2, rubygem-pg, module.ruby, module.rubygem-pg, module.rubygem-mysql2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* resolv: Denial of Service in resolv gem (CVE-2025-24294)
* rexml: REXML denial of service (CVE-2025-58767)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__ruby
ruby-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm
725991658a3e5545842cd58960ddb77571a3b85c014b2c779c089bf73c91afe2
ruby-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
54ea7839963519f9a8649bdc1445cef61cc86407addb279a51fb9bb82bd1cedb
ruby-bundled-gems-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm
c04cdce582e6b61090c8c09c69dd478dbf27af3f8ceb05fbeb5ffc36d0db88be
ruby-bundled-gems-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
184ec7db88968aaddea8e48462ed3e165bf73bd42f15114c589d74406fe2b1a4
ruby-default-gems-3.3.10-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
7df76c08c224b7347c48c2b916bc0039ba7398fbc31ba19bf3284293cbe13614
ruby-devel-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm
18ce670faab7aa5fa5bb234c53fe71f398e74dd5f3b8a3d346f17458755a281d
ruby-devel-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
6da1957d1f033e4a3c0ed17a25415619faa830c8a1cfa3ca6da63af055a33812
ruby-doc-3.3.10-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
e0d57fbf2f78f0c5813efb593b37feb71eeed02924090d943bcdba9e4c826d10
rubygem-bigdecimal-3.1.5-5.module+el9.7.0+40039+300ba1ed.i686.rpm
fea8b4ca63fbf54e9bbd99a39628aa020edae02d76a564ee4967b68aa2134af1
rubygem-bigdecimal-3.1.5-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
66c8b15f2d0e3059deebfd9f66b627635d5bfb051da4535cbfcb1e658eb514b5
rubygem-bundler-2.5.22-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
0fcc2ff3c331a73bcd32398efde6adae340b2d6230fa98c4cea4ce6a81d90f1c
rubygem-io-console-0.7.1-5.module+el9.7.0+40039+300ba1ed.i686.rpm
c7dfc5bc4cfaf5297d21743f38eb58638484915da450689ee95c8453761d4726
rubygem-io-console-0.7.1-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
2403dd51f43a136d774e658fc3352239e17acd805a2d3275b703b78e9b8e0021
rubygem-irb-1.13.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
182be9c2b74e19f2df8cfedb2f38cffae6aca5cca95bb89e96d25a676f4d5315
rubygem-json-2.7.2-5.module+el9.7.0+40039+300ba1ed.i686.rpm
3b4180137d9788cf0ea86f06bb4e07bbe19e8598ac0134a2a3d6163d1ccc4b4b
rubygem-json-2.7.2-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
16ac55e8f2f537d827bc0ff4c29a41a98cc48fc70338e457987f467cfee394a5
rubygem-minitest-5.20.0-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
cde14a425aa8eab123ca7d761bee612e4e445ffbb95c75425c2da15ba38c849d
rubygem-mysql2-0.5.5-3.module+el9.7.0+40032+36e56d0d.x86_64.rpm
12386cd4087a36ccae44d254d83be0174df90108fb328fcda17aefc2da4dda1e
rubygem-mysql2-doc-0.5.5-3.module+el9.7.0+40032+36e56d0d.noarch.rpm
27dee8ffe3e20f1f7dfeecb399e59d76f682202ed4ffdc6741098ba31eae8607
rubygem-pg-1.5.4-1.module+el9.7.0+40032+36e56d0d.0.1.x86_64.rpm
e3fc4c8e40def16c01ef2052af6586bfe4fd31d73db3bc2656ef5d60817d1854
rubygem-pg-doc-1.5.4-1.module+el9.7.0+40032+36e56d0d.0.1.noarch.rpm
2a7b022ee1658df67fecb3a796730677aaceb1842bf2ebe5201669492eace93e
rubygem-power_assert-2.0.3-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
a466103aa14797b8da97c36ff5b5efc0c35e526282f72391cff508f6caabff80
rubygem-psych-5.1.2-5.module+el9.7.0+40039+300ba1ed.i686.rpm
bb0342748e688fcbb9880da5aef6ce794a2ffedbc9374dda9889b760abf1b4be
rubygem-psych-5.1.2-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
4b7faccb739f679fd2c4c6b745e624c539689a72a05f70e6359408974ef1c7af
rubygem-racc-1.7.3-5.module+el9.7.0+40039+300ba1ed.i686.rpm
debaa2531cf2916d377d62560709461611dd172d5ed631c3edc857ae83951cee
rubygem-racc-1.7.3-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
df9c0af4f601a7840e393d105f17be92b6cdc36a983a6a9babedeb6d5c8f53e6
rubygem-rake-13.1.0-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
72dd9b5227f5b84e524be0100897530b0dc5e7313eed2414d7f470cd43109e77
rubygem-rbs-3.4.0-5.module+el9.7.0+40039+300ba1ed.i686.rpm
983461c616de81af559751fe5312a5a0d8bc48404495ffca9abff30b1a289e76
rubygem-rbs-3.4.0-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
cd0274b31e6533dbd559133d75d7d94d48228bb71e5a895ca8172ea125c54cf5
rubygem-rdoc-6.6.3.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
b82c762c45b07aa110e025ff42eb3949e4fc9edca71629059655cc5c16d63554
rubygem-rexml-3.4.4-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
505d232176f1e30efe7134c20443962a4536c4cbd9c13b91774554de77b7e469
rubygem-rss-0.3.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
aea8a6a4fd886d348804f5c98a1109b6be29e09acd49c9ae79ee89d683eec0ae
rubygems-3.5.22-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
271cc2bc55f170a98d1135ccdf5cfa873ac913e84fd78eae35c7ca4a4be2e886
rubygems-devel-3.5.22-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
ab871e63da4d1acbcf2e543e38a0cb7a2420c7391d26da0a882e7b31b17b38e0
rubygem-test-unit-3.6.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
28338e000f466ffbbf3c4d9f6ca1f2c043c8fe79f517c65cadb4814463970c8d
rubygem-typeprof-0.21.9-5.module+el9.7.0+40039+300ba1ed.noarch.rpm
dd6b8a9cc8bf4415532868b26aed244c1962662a696f29482ad11f41b05f5f97
ruby-libs-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm
ee6204e6b75a8eb1c0c56a3f9b8e4ca6892924dd642a9f87908bc80c815ab8e1
ruby-libs-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm
ebfa6a99e73f92920465f0e154891abe27512d81af857d08b44663a42c2d1be1
RLSA-2026:0493
Moderate: postgresql:16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for pg_repack, module.postgresql, module.pgaudit, postgresql, postgres-decoderbufs, module.pg_repack, module.postgis, module.postgres-decoderbufs, module.pgvector, pgaudit, postgis, pgvector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: CREATE STATISTICS does not check for schema CREATE privilege (CVE-2025-12817)
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.7.0+40060+39463e08.x86_64.rpm
822c0217f4859f176536174381a77f70256fa03addb007e2f7f8b1a06449aa44
pg_repack-1.5.1-1.module+el9.7.0+40060+39463e08.x86_64.rpm
b257288f674866e98d3a51f36b1c2c7641078c321d05515de1a74e8e8c64c66a
pgvector-0.6.2-2.module+el9.7.0+40060+39463e08.x86_64.rpm
617caa27b190da601e71ebd674d9403e3e112b1379b37a795f8e8e31d3cde5a8
postgis-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
7d37d2a8e9e856f000017bb0a1b9fa6feed9a411fb24e6affa4ae5e8dc920353
postgis-client-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
710413b03fa76c0bb57d5ed8185917ccc11852f62219a86397a42859f6aee6be
postgis-docs-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
e7db05b35b8295ea9d81b9c733707e74d0538f3fcc4ce7a80a0d3bd12d7bee5a
postgis-upgrade-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
6d698de214d3c65c0c91e5b5c69dcd90ecc08e70c39c4553f5fce339b1dafa60
postgis-utils-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
d882dc5c12703b89e2335d3c9f423fb964a029feedf583da2b92b0d34ac83e56
postgresql-docs-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
1ab34fafe2f199b91bc6ee1111692c0323094b5875bcd7f12200461f6a987b7e
postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40060+39463e08.x86_64.rpm
0b5ee7debecd0595b42fd91c745ba4f5b4ffbf63040e76681352abfb033fc6e0
postgresql-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
b76751d58a7a9549e9bf86e5fbd28f0149eb319a6254ec7c941948728bc3fb3a
postgresql-contrib-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
31c02b9686df4383b1eb03605194f7e0ee4c0e210b2b940ce893ce0c34157398
postgresql-plperl-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
6fbebfabc134c868b789cd7ac8d2a6ae2f8fc63cf28f36c6a308aa708097a880
postgresql-plpython3-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
cfa0acc04fdcff4e6dc75edb79ba56cd4e52cddd1ac4054386c7a627e760458e
postgresql-pltcl-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
866a6f1274fabf5281f7ec4a2a9da1663d9e7c018ec4ea0d50c4ad69553a116b
postgresql-private-devel-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
9016e05798c3184095cff1bb8c008374acf0e5fa0d7fd9867ff10209f3f305a6
postgresql-private-libs-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
731821a8c5569ba6a9f3b0e44646e4a9ab958680b048fe6dfb005d191592fd98
postgresql-server-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
3e59e36fd1653281433c4db514d59b506656544622cbc3267d8731d9a6f39cdd
postgresql-server-devel-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
0451f3f062d6cd0a28a2be635f46fcfeed20b943fee6085a4d8f5c7601646b9d
postgresql-static-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
c65f5bf7bbb1f0c5a8c482e5c292a4b0852cd169d1b541e9c96b842f1a34d8eb
postgresql-test-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
be96de7348c05324263c3f0a03fa94b5a56a55a8500bef75f08c59c46256e9fa
postgresql-test-rpm-macros-16.11-1.module+el9.7.0+40060+39463e08.noarch.rpm
13b96d4f943f1c7a7be39f9fd7875f52173e2f9e2b6d579e5803df1d455afc7d
postgresql-upgrade-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
a370abfa243294996aeaa2540a7c6325bf263149fb3d9bd5764c033ac8d4c52e
postgresql-upgrade-devel-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm
54a0d9fff984124d255477fcdd7e322d57078acd40f5d2eeca86f0114839be50
pgaudit-16.0-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm
f8d8902f9a66ca3e78f9609bad96fdf9cf11fcd3684e647c7a6db64e24c0213c
pg_repack-1.5.1-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm
2fd23517b22a8b850c899be9f0f50ecdde832d436a7702d111901ad9c59bee1c
pgvector-0.6.2-2.module+el9.7.0+40012+a654bbaa.x86_64.rpm
3ba39c238c4bf8e75e202f2a8b70b4e6b37715caa82a964354dbce25ceadffff
postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40012+a654bbaa.x86_64.rpm
d10bb7f8708c09b3807d91aa3e96db887acbced1fed2264fceca9841587ed0b7
RLSA-2026:0052
Moderate: gcc-toolset-14-binutils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-14-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line).
Security Fix(es):
* binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpm
2226f2bf8753b55a571027d606a91a21b95cb0cf3e5a06e37bd30ad07d94168c
gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm
7b9142fd5e835789c47cedd45473ec76f0f2054edb8c9526309f63a02a86d51f
gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm
47af15ab433a2b15859bf20fd9f103d97dc5b60f033896dc47b9b25a4334be32
gcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm
0db14aba30122e17fda5e745d0044b9130d50961256a9688bebda4e0f9968cc2
gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpm
aee09fbcf5d8d78b1312a379e3305e50831d8000ed77ad470fdb42a3ac229062
RLSA-2026:0247
Important: mariadb:10.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for galera, mariadb, module.mariadb, module.galera.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.
Security Fix(es):
* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
* mariadb: MariaDB Server Crash Due to Empty Backtrace Log (CVE-2023-52969)
* mariadb: MariaDB Server Crash (CVE-2023-52971)
* mariadb: MariaDB Server Crash via Item_direct_view_ref (CVE-2023-52970)
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
* mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__mariadb
galera-26.4.20-1.module+el9.7.0+40024+12a6f3b4.x86_64.rpm
7ac8b612b2ea912fb156950f821328cfcd02691db72681ce0fe2fdfb39ff9276
mariadb-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
b777256d355fce3028035099817285f4cf2be6d5f4a46bb4819071b05b740d40
mariadb-backup-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
50d01493e3e33f387ec0a3a4b4d190387a71fa3278e47cbfeb81b5ac40b0dc13
mariadb-common-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
374fe0c18eee7c4236dba5304744b15e3e1d23831c45c5d525267261dc13567c
mariadb-devel-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
2941d780a5897d466fbb87561a0e7121e89884dbcbf6d1a80895a1970a93f404
mariadb-embedded-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
e43b03967b49a764bfb220e830c280345778b41f5b9e1c251807e2f5d9e5773e
mariadb-embedded-devel-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
3102d31fc7cd0c98e1828f9cf95a81e07dbab4074f7747cdbabe8000b97b1c42
mariadb-errmsg-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
845eee4d2fea3695598cc8c086c64689620d3b8fc2ab07fc595ab4301cb6be97
mariadb-gssapi-server-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
2716017edcde2142f828ffb02f66457ad7688650e50cfa860d1840b0123d02ff
mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
61838a65419eb4b0f6d1034d1950b60fa08c9b38524e02ec4ec4275aaf42fea6
mariadb-pam-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
89cf0ee14ed41cefe39e989d2e5c433060e22ad39e01f308fecf8e59d279ec22
mariadb-server-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
40ee1dc6600db7ebeecbb2d6c5cf47922629503f1a5b51e202a6779681ef6aff
mariadb-server-galera-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
0aed8fdda11df4b68a5e117f6634adbf744d061b6324ddf375ca7a222a88eece
mariadb-server-utils-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
d470b3a9484276b14659b03ba05681b05f4c640a3e19e31c8ff896fd43a372c3
mariadb-test-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm
eb35f598f97f09efd992d9c0e6f55b90d54d6a3ad24c1b8622d34a8c516422d3
RLSA-2026:1408
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Excessive read buffering DoS in http.client (CVE-2025-13836)
* cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service (CVE-2025-12084)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.12-4.el9_7.x86_64.rpm
7af307052e8ad69a86faf3d6e514a43697ec87ad709b9fc940e36950f27affa0
python3.12-devel-3.12.12-4.el9_7.i686.rpm
3e2a541de80ef11a0a4b9371ede66c692fce82e5adde1eb7aced6694f1d748ac
python3.12-devel-3.12.12-4.el9_7.x86_64.rpm
d767aacce88fe81febf3e96425d59311cf66d378532491de3496cf59687377e0
python3.12-libs-3.12.12-4.el9_7.i686.rpm
4c51948cab3c5519be9e2e18f7afd564cfb993d8e544757169fbc991cf104c0c
python3.12-libs-3.12.12-4.el9_7.x86_64.rpm
d23037cc9f83afb96dcdfa38aab8821db56bf5c2f1839a649c531e8a357bba33
python3.12-tkinter-3.12.12-4.el9_7.x86_64.rpm
33d17990b26a897645467f585b56eb6ee84ed9440be625766cc592aa35c2508a
RLSA-2026:0458
Moderate: libpq security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libpq.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers.
Security Fix(es):
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libpq-13.23-1.el9_7.i686.rpm
f8a2cbcb4874c37864ce2e85357662c5b55a35268c133d8c6da157446b5590fc
libpq-13.23-1.el9_7.x86_64.rpm
bf7276f8bfac30163a0c98e859e5bcb865210a18f36db6fef19226c59edc2cd9
libpq-devel-13.23-1.el9_7.i686.rpm
584062f6d6d25fccf34c599feb636c13aeeb947a75fd42e0c25d429b2774831b
libpq-devel-13.23-1.el9_7.x86_64.rpm
dada86ad5065d5061be148c9dcf96a239ec6e0543c0ce8f8fbc0f04f35188f39
RLSA-2026:0491
Moderate: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: CREATE STATISTICS does not check for schema CREATE privilege (CVE-2025-12817)
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.23-1.el9_7.x86_64.rpm
abd36076103c90282a51135e5f64aaa2af53a5b80df0f75f963517e9e387892c
postgresql-contrib-13.23-1.el9_7.x86_64.rpm
8dd26be023f645fad5f05d087c1879433983074538312d6e1d1a50bec2accb21
postgresql-plperl-13.23-1.el9_7.x86_64.rpm
0468de1ea77d56da00c04ce8432ca30a95e766b1beb2c86cccfb1a5b0102c200
postgresql-plpython3-13.23-1.el9_7.x86_64.rpm
dd8bf7704158133a7cd172bb8a8761adbd627c41bf0fdbf8c5164fb704a5bab5
postgresql-pltcl-13.23-1.el9_7.x86_64.rpm
47c916b92f19dd1501b4d8c26de3ede3863bf46c6eec666898254ae7623bfd0a
postgresql-private-libs-13.23-1.el9_7.x86_64.rpm
b43178b3ed0ac521fae8bb1833a281bb125bca7791baf85879d7a2c0932cad22
postgresql-server-13.23-1.el9_7.x86_64.rpm
8e089bd24801f1f42854ecf6698784f54310c961ec95f3c308ca284da7f4c434
postgresql-upgrade-13.23-1.el9_7.x86_64.rpm
221c2ccdd11ea374518251210771bc7b86831bed8cf41013110b1381cf9d9e15
RLSA-2026:0492
Moderate: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for pg_repack, module.postgresql, module.pgaudit, postgresql, postgres-decoderbufs, module.pg_repack, module.postgres-decoderbufs, pgaudit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: CREATE STATISTICS does not check for schema CREATE privilege (CVE-2025-12817)
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.7.0+40011+28af63c9.x86_64.rpm
5088cc0af53acfb7d832ab49b383c3516d5527c426be7868dadeba97a2e938a1
pg_repack-1.4.8-2.module+el9.7.0+40011+28af63c9.x86_64.rpm
402ca1980510592c3053e6e17a21fa52fa2ac89a2e7e467e240575d853ec611e
postgres-decoderbufs-1.9.7-1.Final.module+el9.7.0+40011+28af63c9.x86_64.rpm
6cc1441002d2afeda2f6fb121bdb894076e43d024171f41407d0eaf1dc0b0950
postgresql-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
806f6fbad4558b73738b175bfbd366c5b98116b69225812f5224bfce33f22c02
postgresql-contrib-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
816af419e74c280fd1a6886722e2748e12a77f2d7b038b11f99f41e9f15face1
postgresql-docs-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
e6e94a9160a81e9ab4179686894f52172c62e3c6a529c623053ed166d265db79
postgresql-plperl-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
0f6f8367096e3019d191fc90138e547fea7076e57a8668ce3b3e5cf393751fa4
postgresql-plpython3-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
993df50b8697e9301869cad27cfc20e3d52b977c3c97779c0ca237d939c65d94
postgresql-pltcl-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
1ad6011ef97b9a07c7cca392ab1e444fe9219a337742bf1b112fd06bb9de469b
postgresql-private-devel-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
b8e38cfecdcfbccad25c60bf7b0dc989ae2935d73d4a21be4f030d92e6f9be02
postgresql-private-libs-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
9a7a3d6407c1f4b64bb6f9bbf383297cc33cafec8579b2ac64d662129692b9dc
postgresql-server-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
28c5854e085cfa00a0b6848e34834a54d0a65597257d372ad8f82d4b72999ad4
postgresql-server-devel-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
587dc9c17fd3e685c01aeb52b8df83de57df6dc4634e46574689e045d32467ba
postgresql-static-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
0727f1f199ec2270e1a84413c16e74ccf19f581fbb73004e780653e1fdcdc06e
postgresql-test-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
feb8b4382226451532b6802436d23fbed88680195602fe1164394a6486dcecfa
postgresql-test-rpm-macros-15.15-2.module+el9.7.0+40058+d9f04599.noarch.rpm
c91f0c132f1d1d80dbf9866ed0fb7c0c30cea17a01c1e021eb75eab9d9d69a4e
postgresql-upgrade-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
ee247980cf65c46c8b07aacfafbaeec29aafe026d7c95d6351cd0559d164ad4e
postgresql-upgrade-devel-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm
636f74e81611648b4dd12e1fe3cffa04351f3b9629d9110c2ebb975d8a90090c
RLSA-2026:0422
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins) (CVE-2025-14523)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-12.el9_7.3.i686.rpm
405f29bb3235a186f500d9bf4d85dfadea7476df451fe341347cfca0475729aa
libsoup-2.72.0-12.el9_7.3.x86_64.rpm
e28a4b6e2dfcc0ac0f0633adf14f7211271429bcf72aade68efce5e4aca4113a
libsoup-devel-2.72.0-12.el9_7.3.i686.rpm
744404027f88611cffe6aa80478be1afd77964a2b3853dd24f24bc6a50f057be
libsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm
1f9be395d9cae5183fb86d57674ff5431aba6733ce1504787d30cc57b01a935b
RLSA-2026:0437
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.41.8-1.el9_7.x86_64.rpm
27c1889babf8132433f95ff15d75ee3bd1d9bd54717b37a79b839943c9c1fc65
buildah-tests-1.41.8-1.el9_7.x86_64.rpm
bedb91170e3aa7e8431a1229e1d4a9e7b9ccd53c14f1da1754798b9977f62311
RLSA-2026:1410
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Excessive read buffering DoS in http.client (CVE-2025-13836)
* cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service (CVE-2025-12084)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.13-5.el9_7.x86_64.rpm
29f7746b9db0be04e0a0e95b86d7aa10615e413e264048c0bc2dbb8e83993eaf
python3.11-devel-3.11.13-5.el9_7.i686.rpm
08dc8454e80d4ab331df7e43e89e1eb1af42d5e6554157e9385f2d2a8357b868
python3.11-devel-3.11.13-5.el9_7.x86_64.rpm
effe65293cd6edf8786a86988496b264ffdbc551c3814c2a98925ae57c8fac94
python3.11-libs-3.11.13-5.el9_7.i686.rpm
111967afc5d692f2703f166b263ba632da9f3f395a192a1c9a14f0e9e924f978
python3.11-libs-3.11.13-5.el9_7.x86_64.rpm
839718aaa9464ac960402f83915ffcef29139af889b3013f5150e54d5a59dfd7
python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm
82e1b8fe5dc5e973c6b8c733748dade0bfa39e352a8f3dd94ed01466a8b9d16f
RLSA-2026:0694
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Spoofing issue in the Downloads Panel component (CVE-2025-14327)
* firefox: Use-after-free in the JavaScript: GC component (CVE-2026-0885)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 (CVE-2026-0891)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2026-0878)
* firefox: Use-after-free in the IPC component (CVE-2026-0882)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-0884)
* firefox: Information disclosure in the Networking component (CVE-2026-0883)
* firefox: Mitigation bypass in the DOM: Security component (CVE-2026-0877)
* firefox: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component (CVE-2026-0890)
* firefox: Clickjacking issue, information disclosure in the PDF Viewer component (CVE-2026-0887)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics component (CVE-2026-0879)
* firefox: Sandbox escape due to integer overflow in the Graphics component (CVE-2026-0880)
* firefox: Incorrect boundary conditions in the Graphics component (CVE-2026-0886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.7.0-1.el9_7.x86_64.rpm
6af171b0d6ff2a02ebb821186d94a4eab49f4f4b1a6319f51816c91883a39d40
firefox-x11-140.7.0-1.el9_7.x86_64.rpm
2c37f18ecd178d77294167e53e0db196d9b4cb482c48c31423b41c9b83a5ec48
RLSA-2026:1409
Important: php:8.2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.php, module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, php, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: pgsql extension does not check for errors during escaping (CVE-2025-1735)
* php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix (CVE-2025-6491)
* php: PHP Hostname Null Character Vulnerability (CVE-2025-1220)
* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)
* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)
* php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.7.0+40005+715283ec.noarch.rpm
7dd1ac343924f8c124aad5ea866231a2ff6b85bfd557fbd5468607e6de705b78
apcu-panel-5.1.23-1.module+el9.7.0+40004+bf50a568.noarch.rpm
23fbb9f304bbf6e02897a8e614ed3cac76c8f8e18250a388284d9235ab90d674
php-pecl-apcu-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm
dcfdd569de5e6ddad19e451d0bdeead0f30f500aafa4dd4d9e164b4170deeb88
php-pecl-apcu-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
c677509dddb11e0bd88160e9d3bc0e5c3a5c95eef153f2efae02fe2a74fbc173
php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
ce6d8eb9d636d1a7d25f77eebab9bc34b0803050a8dca008f336718adeb35000
php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm
18128edfe8947247823712735e2bf08347870ad4686fe37fe574a54060883e86
php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm
547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e
php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm
0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f
php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm
969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee
php-pecl-xdebug3-3.2.2-2.module+el9.7.0+40004+bf50a568.x86_64.rpm
e4557b9c462239b1f5b436e15e1c50f94c482c98af43153f03216624541886ef
php-pecl-zip-1.22.3-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
3d22b91542f7cf9f28440dc6c850ddbd39f76fdbe4c7a8ba3736e0f384c85ee8
php-pecl-zip-1.22.3-1.module+el9.7.0+40005+715283ec.x86_64.rpm
69d6cf54bbae7dfe848217065300e013f3d68f4a675214f32ade0362ecee5164
php-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
0f06cccc181c2fa278e6087c422747daa1cea0b536f96bc9354155b154bd732a
php-bcmath-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
c619f90b778fe6ecbb50a2b731ba40bf865a67e79c06d74218561d40e1fd44f8
php-cli-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
3f721b196bebfea7792079937ed909fe3b16aebc1973a9591c6e65cf636b9807
php-common-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
69f076c48492252f957b556a411993439c1593cf5f5c0b6ac11a2db2d9556dc6
php-dba-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
ae666bb392e66e6c55e0b1f6e6a775cbd2bfb1bc4aa1895155051b65ceb7e29a
php-dbg-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
35ba5ae55781df72d0169d43fe3ab4241f6c516839c075a2294fbd51215a8d64
php-devel-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
10c1139fe0195e7505fa08d7c708b411fd2ee5abf004dd349af552bda14f12c7
php-embedded-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
0ce46539ee1edebc734d2bd47e39cfe55c68c1169e367a5143debfdd1019cbd0
php-enchant-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
4136d27fd0b46246b4d64817f2aa9f5f8a6c72f21b3d60e3c1d0b4067c18ce43
php-ffi-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
98bacbd6be30840e664502bbfc44eb7dd49673914e4643fc6004ab1b2ed975a2
php-fpm-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
739211fa75cb83cf334b48fdf497259a06ca09853f91ceb59b445253ba331184
php-gd-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
ac4344b76a325ff71cf70ce3fdeb9c103941883ca3a7f55912cd37f66bdcaf25
php-gmp-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
afcd04103f4a73ad71c6b5036fdbc9f2e3fce3309833976510f8fefb795fe8b3
php-intl-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
fe7235d935c3da4883076214789a6d600b89617136ec5b88b29b02e1ba2cba1c
php-ldap-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
30e45703b060ef4d4f69d3506bd4ab8f0555565b335355905fe368f3a1be8b33
php-mbstring-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
275e9711857c18bb6ba853c769cffc6c961b82e9e11b350624a75879a0f46d8a
php-mysqlnd-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
4bc4ad5642cf68ea9bd022ec888d7e2a4333e3ba4bf64c013aaf4dcc69a243c6
php-odbc-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
30ea8852ff02983ab4b2288f9287dc842ce41b7222715af5a92e1ec571eff6bc
php-opcache-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
bada7ae47cc21e44432dd302661d72cd614bbf54d5409f641f46bfed2f1da3d5
php-pdo-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
e4af8b8f17889b8770ae9a4ef331cc6801690d3bfc10b082a71fb7a1e244ed0c
php-pgsql-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
b5284202051fcedb21f10f857a04a9c38dc544f2d64fcd7b01142986af104f74
php-process-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
5bfdec068a41fa16a98c473f421c4dc6785c2a5e36e552faa34a9a329b162fac
php-snmp-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
79517e259569ea1dcc9045ebc7cd6a1deacb4eb566f891155b5f7254efa48c99
php-soap-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
df8e6f376e798b8588ab81ea8bfd81c09c83331b0882c833ab2c67e726208508
php-xml-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm
217931c363bd792ff998ac7b466d7ab0967a394a46d25225d149573a8036c5f5
RLSA-2026:0470
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.6.0-11.el9_7.x86_64.rpm
58d1da0a7882e6155f28bbabbc1013beb3ee0062d464d0754bff03316e46406d
podman-docker-5.6.0-11.el9_7.noarch.rpm
bf563f980800c77313d2201aefefbdc59452c926edda286b252ab16d6690ba72
podman-plugins-5.6.0-11.el9_7.x86_64.rpm
aa6916840929ed2cbc6055331ca730d53559c900252d1e30cafc8908171be82c
podman-remote-5.6.0-11.el9_7.x86_64.rpm
ee43ba8d1a4e5e2696c37e7b70afaac093a70cc5607ecd27166e369cc58f18a0
podman-tests-5.6.0-11.el9_7.x86_64.rpm
c04e30d13ecaa53a24789cf7e64f4046b77b719a542eec0e44a92be85a0b844a
RLSA-2026:0605
Moderate: vsftpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for vsftpd.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The vsftpd packages include a Very Secure File Transfer Protocol (FTP) daemon, which is used to serve files over a network.
Security Fix(es):
* vsftpd: vsftpd: Denial of service via integer overflow in ls command parameter parsing (CVE-2025-14242)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
vsftpd-3.0.5-6.el9_7.2.x86_64.rpm
f47a9fc19052432dabc49e603001da7359b306f81d28815124c16ebd6af03bb3
RLSA-2026:0696
Important: net-snmp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for net-snmp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Security Fix(es):
* net-snmp: buffer overflow via a specially crafted packet can cause a crash in snmptrapd (CVE-2025-68615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
net-snmp-5.9.1-17.el9_7.1.x86_64.rpm
da5c896b83640dd58026eb3c4a6e90721b701ee6bec542b82445a2d1a32c2246
net-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpm
f34fecaf46cf8274562f8004bc6e9d664d500553f26b71f38659a02a315f7902
net-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpm
cfd14eaddaf8c32efa971cf4145908fa5f26227c219c1235ca92f24f7d0da1f4
net-snmp-devel-5.9.1-17.el9_7.1.i686.rpm
489dafe847202d6636b0df9486ae74ce1d09ecec1212215ba5c5f34c26314075
net-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm
27988c921179b9b9cfb8996fb56056a2b83535377a64c8e86146ed28b0bdbdd6
net-snmp-libs-5.9.1-17.el9_7.1.i686.rpm
f0096739dcbdd0d78745a500226233e0a648a27df7e947de3692fe4536d534c7
net-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpm
ac8322e8fbb93c3613b1a6252f024bb8efd371841ea3ab22fc25889d2006c0e7
net-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpm
3ec0fe9a59b47de7911668dbc2ee44eae5624dc01c15d7fa7e43ab6fc6046ea6
net-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpm
009daeb6cced01d3184b0a7e8a2f3aabd839b6d4f960a99b5c17a33c963f8e71
python3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpm
2e14fd6c19deb2aabe30a3ba9dca66699571a0025ac114918d3bf93b2b82c0fe
RLSA-2026:1429
Important: php:8.3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.php-pecl-redis6, module.php, php-pecl-redis6, module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, php, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)
* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)
* php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__php
apcu-panel-5.1.23-1.module+el9.7.0+40005+715283ec.noarch.rpm
7dd1ac343924f8c124aad5ea866231a2ff6b85bfd557fbd5468607e6de705b78
apcu-panel-5.1.23-1.module+el9.7.0+40004+bf50a568.noarch.rpm
23fbb9f304bbf6e02897a8e614ed3cac76c8f8e18250a388284d9235ab90d674
php-pecl-apcu-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm
dcfdd569de5e6ddad19e451d0bdeead0f30f500aafa4dd4d9e164b4170deeb88
php-pecl-apcu-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
c677509dddb11e0bd88160e9d3bc0e5c3a5c95eef153f2efae02fe2a74fbc173
php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
ce6d8eb9d636d1a7d25f77eebab9bc34b0803050a8dca008f336718adeb35000
php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm
18128edfe8947247823712735e2bf08347870ad4686fe37fe574a54060883e86
php-pecl-redis6-6.1.0-2.module+el9.7.0+40005+715283ec.x86_64.rpm
565e9e2ffbb1116355432195069ac83ebabeb146bb7609a5bb8cec4c1f999bcb
php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm
547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e
php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm
0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f
php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm
969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee
php-pecl-xdebug3-3.3.1-1.module+el9.7.0+40005+715283ec.x86_64.rpm
9284eb822657efa12e6fd0d10ee620810bcee59eb84954ecd598093bcb6276f3
php-pecl-zip-1.22.3-1.module+el9.7.0+40004+bf50a568.x86_64.rpm
3d22b91542f7cf9f28440dc6c850ddbd39f76fdbe4c7a8ba3736e0f384c85ee8
php-pecl-zip-1.22.3-1.module+el9.7.0+40005+715283ec.x86_64.rpm
69d6cf54bbae7dfe848217065300e013f3d68f4a675214f32ade0362ecee5164
php-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
ce3a7a79118112b7b7a03054fb3985c755cc55578cdc94ae3a0618e7bc3985b3
php-bcmath-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
5d5e84f01466c7714ff2212cfee62baac39e65cd7b618b85732e1e03dd99191d
php-cli-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
8c2b5947476e7ff99bde3a015d489e4389f2a35f518e01b2ddb280247a249136
php-common-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
7a6b4326f0730ef9e5637b3f19b74f0aacca9c045974ef2a63c5c83871e43c82
php-dba-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
416c33f19821b940a952d6f0595e1113dac7330a7866dd9d46a7e06721fa7a6a
php-dbg-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
35d40015059f4d444375c4872281665b42ed63a7c4c7e0afbdc95b0ae937ad94
php-devel-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
5487acaaf440b723b7556ab2adba5d2bcc5c4fed1ff55cb18cdcd08e28312d21
php-embedded-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
a5de5d5e0da58617f3c3ef1ef88fc727166f41ec75b3db1cbccdedf07a7b5801
php-enchant-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
5d7becf6cd85d7a44d5c542b7872926d9fe8e5e4f6e83d42fa2420bdb2d95c5e
php-ffi-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
903b0cada73f72787d1586f30ad70c73e23e4aa3776a27098edb47255d7aae47
php-fpm-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
9638b2cf43659b945e69db7446fbd95216fdeee8d6ac97b5a8d36a6dc87a0e3d
php-gd-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
6e6976912bf39057bf23cc5deed615c6912f967830fc96049ea74ed8ca95b9f9
php-gmp-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
07f7dd0c3285a124c973fbc47bcc0f786678b1c160255a6eda882739b405075e
php-intl-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
82d861126e44ea959e33508ddc3a4fbe594b28f88fe289820805c0b081ad5680
php-ldap-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
996f04f605f0c4f20ef28b896c1f07c44f0fddfa84c581b4d411321b75eed449
php-mbstring-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
4d4bce8029b20cc0373af3cc74c19664a37851e27df623bd58aab7cd1a74a944
php-mysqlnd-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
dc740c0d9b791a7a28f9546bcf1c3d05a42fd303577ce62ef71599ca4b9162c4
php-odbc-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
391a0a71591dcd8605224add780b251a5ab32abbc16ea0417c865bec992ca615
php-opcache-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
e125eb461dcdbc5060537aa168598d161e17749e8e6ec6ecaf763f31f07b6987
php-pdo-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
ec4459a808997fb06e3ac5a492ca4471ab2a3dd311879e785d8e99ab4774db57
php-pgsql-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
596c1b8f97b9f1ac3620a22dd0e2013ecde96e57269aa26eae87f450f669b898
php-process-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
ab559a1aca0043da4779a4108e1c4308e2d807f0013f9f627e037cb1839386a4
php-snmp-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
d213c4486b6d83d1986d59d4e48b22ef8d8cd07692d0ca49284131cf8e7e0e36
php-soap-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
1e6aa7c53caf050965be3f62d4c6c0f18d8fb83a0112bf49f8b3f240dbdbf360
php-xml-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm
e8cc76374f72cc84bca4f5100395c2c69641694da74bc77c4f684226383af2c4
RLSA-2026:0771
Important: gpsd-minimal security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gpsd-minimal.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. The Rocky Enterprise Software Foundation support for this package is limited. See https://access.redhat.com/support/policy/gpsd-support for more details.
Security Fix(es):
* gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing (CVE-2025-67269)
* gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling (CVE-2025-67268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpm
9e666857b0663c152c9dff8209f7e91459370ad561131c5cdbbb39fb7882e040
gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm
750ffc9ce431d234c3e2a081e0be80a1c57f0e247a70eb9150bda96a4baafba4
RLSA-2026:0924
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Spoofing issue in the Downloads Panel component (CVE-2025-14327)
* firefox: Use-after-free in the JavaScript: GC component (CVE-2026-0885)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 (CVE-2026-0891)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2026-0878)
* firefox: Use-after-free in the IPC component (CVE-2026-0882)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-0884)
* firefox: Information disclosure in the Networking component (CVE-2026-0883)
* firefox: Mitigation bypass in the DOM: Security component (CVE-2026-0877)
* firefox: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component (CVE-2026-0890)
* firefox: Clickjacking issue, information disclosure in the PDF Viewer component (CVE-2026-0887)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics component (CVE-2026-0879)
* firefox: Sandbox escape due to integer overflow in the Graphics component (CVE-2026-0880)
* firefox: Incorrect boundary conditions in the Graphics component (CVE-2026-0886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.7.0-1.el9_7.x86_64.rpm
a6a93fbeae1e4c2d67663b0473eb85c4d68395becff9f99f729892761971990e
RLSA-2026:0923
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.25.5-2.el9_7.x86_64.rpm
beb6328cf10ba6159fd42aff1ff168f38bc3038c791722214e762bf6dad663cd
golang-bin-1.25.5-2.el9_7.x86_64.rpm
56bcda5227ca341f1b22f2df4571eaf4df28c47045e41429acd105a6e00098eb
golang-docs-1.25.5-2.el9_7.noarch.rpm
461f8f29ab2902556657f237bb2e6ff84cece0d9ac0bfcfcb105f751571af21a
golang-misc-1.25.5-2.el9_7.noarch.rpm
1b95eb3ed57dd9ccf9b51ffcc780399d75b708bd97ae0dc6a37ad131c55206bf
golang-race-1.25.5-2.el9_7.x86_64.rpm
4a03ef23d29c4da495ac3d11fdc5200cbedcfdd6f8e83933c40a461c96f1a3d1
golang-src-1.25.5-2.el9_7.noarch.rpm
692b0411259cb272d46e2dee6007c54bbbe72ff627351aa486ca1704370aa87f
golang-tests-1.25.5-2.el9_7.noarch.rpm
e0eee6749bad98c6b10a10bf785c1751c219d7729972eb457d93825692fe4026
go-toolset-1.25.5-2.el9_7.x86_64.rpm
37853441dda7f2d8889c888c9aa0af09df30cff93128f75e1832fc67dfe850eb
RLBA-2025:20841
Moderate:open-vm-tools bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for open-vm-tools.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.
rocky-linux-9-x86-64-appstream-rpms
open-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm
c28999ad465424f51cc07b8a0b0657228a3a11604623303e138770ec26dc368f
open-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpm
d5c8a6a55922d6a7dd2b2caccf329599133071a591a400a33173d6398f1df6d2
open-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm
35f0bdf34da212b320ecd8b15320e4779144b290624606b7bda102224ae053ae
open-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm
2cf9319f0d15fd583ed3e734c8784cb7cf92690d6db6bc0e3bd7dc41693fb4eb
open-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm
a6b679a54f8b9312db75e9cd97e52976e5a3b7bfb39ece539710816fb21e06fd
RLSA-2026:2707
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: heap-based buffer overflow via specially crafted PSP file (CVE-2025-15059)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-3.0.4-1.el9_7.3.x86_64.rpm
ecd54fd1809bce922a245b06c3de8530c3e536086f1703e713a32c093a1eade8
gimp-libs-3.0.4-1.el9_7.3.i686.rpm
c73afcb346b8652e85535ff99271b5ea1361f230e48d34c516c073cb52820aed
gimp-libs-3.0.4-1.el9_7.3.x86_64.rpm
f3bd79325550463e58dfccd03b452f514e3093188dafdf5886c4cb8798106da3
RLSA-2026:2783
Important: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs, nodejs-nodemon, module.nodejs-packaging, nodejs-packaging, module.nodejs, module.nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm
f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c
nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm
40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a
nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm
0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51
nodejs-packaging-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm
255a5c340e26e8b83b187f5e9d668ab4cba7b3d7598ba7e0a4ff45cedf91b935
nodejs-packaging-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm
80650f49e762c304da81c274cecc66a56e02896ac1616490231088900821f4fd
nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm
343373af76dee4288e6f64388a4c80efe40c6001b68ee4ae9360c354fee8e948
nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm
ac36ad2443091780af81a7233a23d632b9b28ddad8c7170960d2aa44a0d8a8eb
nodejs-20.20.0-1.module+el9.7.0+40082+4e93191d.x86_64.rpm
6e9221c52f6ae3cf409915599797de85e9b8ed9b139e2ff9bd1b1cca55596790
nodejs-devel-20.20.0-1.module+el9.7.0+40082+4e93191d.x86_64.rpm
cd653c068b7bafb451d63f8670a23d091ab15cee229c26b89ef9fb2d7acf49aa
nodejs-docs-20.20.0-1.module+el9.7.0+40082+4e93191d.noarch.rpm
e68a70cb77c5a629ed13451b29456570e2224743a31d1b0cbb99fc3470e67882
nodejs-full-i18n-20.20.0-1.module+el9.7.0+40082+4e93191d.x86_64.rpm
0770bfb1c0882ede4ff949b85660703b78e05b2754af54aec026e01a79ca2d73
npm-10.8.2-1.20.20.0.1.module+el9.7.0+40082+4e93191d.x86_64.rpm
d920b0bd3c1a3b2cd5fbb58232d6e99ecb7030ab37c683a56c18305ce136f6a8
RLSA-2026:3359
Important: python-pyasn1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python-pyasn1.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-pyasn1-0.4.8-7.el9_7.noarch.rpm
f3c67a571ed2da4ee8277db5bb1177107b80c3fc0f34abc14f1bcd708a8cad5e
python3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpm
a425ffcef8f8f3d596c5723654e187e92291082a5dfad0c2a68d5a4373cce34d
RLSA-2026:0933
Important: java-25-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-25-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit.
Security Fix(es):
* JDK: Improve JMX connections (CVE-2026-21925)
* JDK: Improve HttpServer Request handling (CVE-2026-21933)
* JDK: Enhance Certificate Checking (CVE-2026-21945)
* libpng: LIBPNG buffer overflow (CVE-2025-64720)
* libpng: LIBPNG heap buffer overflow (CVE-2025-65018)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-25-openjdk-25.0.2.0.10-1.el9.x86_64.rpm
21201d6a9ec6960d0e0228e793dc581e37a1047a4af89e54fa8ef85ffe20db9a
java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.x86_64.rpm
cba6feb49eec1c31a4e9a4bf02e0ae1b20186d5b198dd778cbaf3db0d05d7d3c
java-25-openjdk-demo-25.0.2.0.10-1.el9.x86_64.rpm
039e60e5f7bd8491b76a418e49f8003d6f7b22b022c5799892320f6a24d29c3c
java-25-openjdk-devel-25.0.2.0.10-1.el9.x86_64.rpm
09698e31bf8ff62b4cdfee7b2b09c01e5e29f071a363c0ded6804a1a7e0437c4
java-25-openjdk-headless-25.0.2.0.10-1.el9.x86_64.rpm
1b6e3a0057d1cdfe08210a191906255be399f864ab987620e202606132c0bd11
java-25-openjdk-javadoc-25.0.2.0.10-1.el9.x86_64.rpm
222f3ecbda21beb14feaa3a4c6447a9125008248dd030b66f71d283157ace358
java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.x86_64.rpm
df56a0fc121e95b67934f10482f2da7f86dc7b89bf1a695438efa9770ef166b0
java-25-openjdk-jmods-25.0.2.0.10-1.el9.x86_64.rpm
00d7cc24e55c092ffb3c8d7af5227e18976fd91ed8bf9df19bd53534e3d69633
java-25-openjdk-src-25.0.2.0.10-1.el9.x86_64.rpm
2fba126cc7cf936fed28e6df45a7cc665be9303607e1b9a26dd9c16230e03b78
java-25-openjdk-static-libs-25.0.2.0.10-1.el9.x86_64.rpm
068de8b4949a1d1d6ba460b79bdcc3ece086cfb7ac4046309b9d8a23a4892f85
RLSA-2026:1359
Moderate: gcc-toolset-15-binutils security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for gcc-toolset-15-binutils.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line).
Security Fix(es):
* binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm
e7f58796434c30f4eb41b293b358fd839da234fff91bb1ffe512f78ec504b6a3
gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm
0a83cd8149984e3baa285be872d0da4f949246ca3ebfdff4d9497f93eff72c83
gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm
be1b22938335d62c52b86c22f16ccc0d0e844f4c12c210d316e76f005d13552f
gcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpm
625619d289c73f0dd6e5ac1a406464d6687ea418b84c328832a40768ad420ce7
gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpm
face2442e125ebaf342743d04f2b0ee7e6969ba707eb8734ffa95220fdbaa859
RLSA-2026:2224
Critical: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Critical
An update is available for keylime.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
keylime-base-7.12.1-11.el9_7.4.x86_64.rpm
8d13ca46d72a747c4575f88dbd6277257e402d0db82572d164262d710118bc7a
keylime-7.12.1-11.el9_7.4.x86_64.rpm
b463e6eb77d5dede4a6a73b362dc187f8313a0158466fb86e992a102e96a00eb
keylime-registrar-7.12.1-11.el9_7.4.x86_64.rpm
1d786edea903e6ad8c5d54cc435738d2c9f9873fa14f2c6f9748642de399f1f6
keylime-selinux-7.12.1-11.el9_7.4.noarch.rpm
75ad166dcc796295752f25bb16e9e901357ee2d8e79d7907e33ab3d481592084
keylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm
449eb629031a8a8d2e9ebd329b0b19c6647fe55a106485712bff9a4c17e1414f
keylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm
29971817ba6c3d00d5953fa54dd6138c4cad7161fb673742eb36dfa28c660cbe
python3-keylime-7.12.1-11.el9_7.4.x86_64.rpm
3081241968015cdd31fad415cabf6d0cd2cb05d5756a8ad7c2b9a95d4218bf25
RLSA-2023:7785
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgres-decoderbufs, module.pgaudit, module.postgres-decoderbufs, pgaudit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869)
* postgresql: Memory disclosure in aggregate function calls (CVE-2023-5868)
* postgresql: extension script @substitutions@ within quoting allow SQL injection (CVE-2023-39417)
* postgresql: Role pg_signal_backend can signal certain superuser processes. (CVE-2023-5870)
* postgresql: MERGE fails to enforce UPDATE or SELECT row security policies (CVE-2023-39418)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.7.0+40011+28af63c9.x86_64.rpm
5088cc0af53acfb7d832ab49b383c3516d5527c426be7868dadeba97a2e938a1
postgres-decoderbufs-1.9.7-1.Final.module+el9.7.0+40011+28af63c9.x86_64.rpm
6cc1441002d2afeda2f6fb121bdb894076e43d024171f41407d0eaf1dc0b0950
RLSA-2026:1595
Moderate: iperf3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for iperf3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: iperf Heap Buffer Overflow (CVE-2025-54349)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
iperf3-3.9-14.el9_7.1.i686.rpm
b0e2bd149bf666c20d6ee4d9f8047aa365a3a488e653282d05bdc61f192e36c4
iperf3-3.9-14.el9_7.1.x86_64.rpm
b06eb31f9ab54aaf22d93f77c9fe81771d701661bf3583b60c6de7bd28233103
RLSA-2026:1908
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.135.0-3.el9.x86_64.rpm
8da1372e69ec67cc8b1ae2f5eb03c2c1b0fe45a3308f641b227ea8ba92d29952
RLSA-2026:1903
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpm
d218238ebe7d9ffef9b9d5814bc2aa168a0acb2fe5421fddcaea9219f43d5d2e
fence-agents-all-4.10.0-98.el9_7.5.x86_64.rpm
ae616bc4c3dd34d10294fa1d9ff77ab8c59e1c88d33b23656f92249f185e8122
fence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpm
9eb777ee4473755de438831bf2b19e1d295be66d4bc59d1e905216addff5c5d2
fence-agents-apc-4.10.0-98.el9_7.5.noarch.rpm
cdfae68ad618d008f3dd50f3b0b4f310405653f4ae87a29ef573cb8b50c09e1f
fence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpm
715b0d832981bd30145d9191e82d4dd6cca2d28116574f6d3af553583f6c8e21
fence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm
1c5110d822f0fc45470972f9aa591d125d6b6b2df60c42c6e97e1e23ad5b5818
fence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpm
f45c0496cc8f62b38a607bc1eb905aaee8059ada05ce25f2edd97767da108feb
fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpm
9554ae3db67375e8a8fba69e98c7618184a797eeffdb368096770f802e54764c
fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpm
8cc1d95468c6695e09a24bb44a722d7967bf68684374369298f3d69f25b8519b
fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpm
4b5e760e49a5b4b5938b360a33a567bccc5174725e31305dea94379115cb39d3
fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm
e3588d13c40ca0a5f02aec0f4bd6cd11d603780319e2f6e0124dad250694296f
fence-agents-common-4.10.0-98.el9_7.5.noarch.rpm
8a1438852f44871dad2cd10e37b792b000b8da88a9610a20935f203b76ba88d3
fence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpm
9210d74ce43cba899feab5f150c8796bfa1a21c36f8c4ad682f55026acdb5834
fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpm
b1cc25a319a76b7a5532dcd89e51d3ffb29b5773e8d00e87c164915681ea5954
fence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm
a603ce21cc4d583a7d2cf3514bfa86b87df276245286a45357a44fb0645ac40b
fence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpm
1cb2f60753c0921f6b4d583447ebbabd2f060ae432c0c05e94047289b0cc36f3
fence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm
c6d4b5827307bd294be5d3b5db514c8339b7a5019518002ea5a9e2731f2180c2
fence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpm
adf029fc8261dd4e80bb7613ffb39bfdd6d97675867c2cb66f2df1bd420c956b
fence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm
b29c62b9a86bddf93d8007335899e527c2245196f6a5525ff9d1329920ce056d
fence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpm
50b9a3e0dcaab3382fd60e3c9946d001f5bddb2e4922ea4c47b1c8f36313cfc4
fence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpm
839782b875bafb9851f5380265467fd8cb59d04337d0afb7e719bf398aae1753
fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm
595824e5824541b93db068c307618721117e83d79fa0955eff00b9a83e2e5810
fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpm
98823c1ea2340328ea1126ba5e07a4fa6c41f0ab0106a338c7a9111a3a0aff3c
fence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpm
beadc5eda302d3d4d3cfc77b4e606f157f0dfd8b227682ec657403280c0306b7
fence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpm
2c8c7516ae7a1e6dc7f75c84cae211ae8175dff636609367bb3e505608b7e7a2
fence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpm
6f6da1a9a57f3e8d173b3a707066ce1a464240a22ec8d7412840bef80ea147c6
fence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpm
cbfc3a61596bc3cb727fb3637a7fad462399cf9a99ed8d2c3cbbc2bb55a705b9
fence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm
81942605fe379e5fb693f4a0a3fc901b7da475ae7e80efb2c69902d5c4ac9b17
fence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpm
a4c1a40efc54723dd3a8d9864f225342fafccbc2adce1297671de62a1ddd2ee3
fence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpm
d9131eb9a85446a0300d293063ffd560d5842574a38ab5fa5a086a015e335c8c
fence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpm
a2ce4f896abf0c1ba0c8d8a91250d2d93e4fe6c329a440a28845ad8a47e5584f
fence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm
e04840d57fb53b52116e5def506dc15b259738bf9c6a5e217cab7a9734ed3417
fence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm
bad04313debdfd0fba572af71ffcaf0b44bce6cdc5b27abd336bb04b21e4cc03
fence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpm
fb3c263b403bf48f085abc974eeada8577ee3627a77772777e5400fb4c1a1a7a
fence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpm
64ca962c637ec094297c24179ef70b3439727b58d61da96ff3d3aa3a5eb1b4b4
fence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm
e5446cb9eba94b7a18d8f34c36191e2ad2a9ee2454ac1b97b402069638693ba4
fence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm
fea3b006e38f4755fd9ad51bedfe24e066f2039578a716d1966503a7918caa9d
fence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpm
6cd5358c5eb9b91d6405655fdc1f5f50407c2aecc670bab43c1343efb1764013
fence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpm
1beff4da321ce3c6ef49bd72965360bdffa4999a4484082512f8f76c5215c255
fence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpm
cc5fb5b61a1137042d81467b9d84297888e0f8db41196e92ee1565b92b6e7b97
fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpm
ae9a55b99ff7c03ab7475361b4f091d59ff3f0371c99720ea2e1f17a1cdf1fea
fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm
13a30870a30c9a155796feb07ab16603dc12ba2f35120b5a20d73c17d894be62
fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm
2913f2b8e391db7ca3719a116ac18856fb3831f9c57a5e9ff410386d882feed0
fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpm
363e48e2d3508b7871d480a2879e36ed770d87c15ebd5656ba60761156c73a3d
fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpm
5a9d811070edfc6000cf30a45840c255a1838037cf7aea2315d3bff4db1ea575
fence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpm
8cd42adfccebf7e32ba3da108b9c7123f5a85a82526877f28f7ba67e0368368f
fence-agents-wti-4.10.0-98.el9_7.5.noarch.rpm
6f2b223b32c50ae3fda6d1827d1e33ab274f8fe2a2580938080fcb1248f89758
fence-virt-4.10.0-98.el9_7.5.x86_64.rpm
8e1577b2a9e7ffb43d7958ee6b5a36aeb8314cb524fe1138c0dccb44f5cf8d34
fence-virtd-4.10.0-98.el9_7.5.x86_64.rpm
373d8f2d8ab4b7097960a617698176892e1524a954ab7469a71fbd6a9e1e5cba
fence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpm
e1910b67cae9b6c129e52e400b00ead560f30b85b6d8949993d1dd3e5f37434a
fence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm
6e783fbbafe8401939f7502b5e4c1639ed7a2253e1148666b6065b5090f67e28
fence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpm
c0f9204d052dd95917204fbbc7508d502d25bcfdee053bff6cf6572c2e319ab7
fence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpm
dd2c2a4a90635ee3a4f328be60f78c7fcbb517eaacce9b7954c60d71a76da226
fence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpm
9bdac3f09b92c245846a3960d92a239aa369a6366d1d0372ebf1497be1b10e4b
ha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpm
54b3fb738e231edfeaa7fe8e1b85796ea2593931e70fdeae82dd49a249657abe
RLSA-2026:1939
Important: python3.12-wheel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12-wheel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking (CVE-2026-24049)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-wheel-0.41.2-3.el9_7.1.noarch.rpm
cd591ef9b5412bbeb7d12f2efc69214d5b9e465f9953e1f70048981584ce5087
RLSA-2026:2048
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. (CVE-2026-23530)
* freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability (CVE-2026-23884)
* freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server (CVE-2026-23883)
* freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution (CVE-2026-23533)
* freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. (CVE-2026-23531)
* freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow (CVE-2026-23534)
* freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow (CVE-2026-23532)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.11.7-1.el9_7.1.x86_64.rpm
f06c06654cd4ca21aeb77e97e399dd1509782e9610a6ebcc1f14d78c2fe47fff
freerdp-libs-2.11.7-1.el9_7.1.i686.rpm
5d54045e173c873222f5e5b62573a17321fca1a835031fd79c719b9f5df68a10
freerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm
de51a2013e330909eac59480df5fdd5fe900a40689b5d77c838031102f22f3e9
libwinpr-2.11.7-1.el9_7.1.i686.rpm
097f4696902aac5238d854672e1e5372f12e0b595604492e89a833068451db48
libwinpr-2.11.7-1.el9_7.1.x86_64.rpm
64c5fdcec137a3217b3f377f2e4cfd178e81e967d95453a650268b605e31eef5
RLSA-2026:1089
Important: python3.11-urllib3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11-urllib3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418)
* urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)
* urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm
2a3ad1265cc45045ed81590f35ea039c05eff892ab7328a5d67e6fbdc8decc36
RLSA-2026:1088
Important: python3.12-urllib3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12-urllib3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418)
* urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)
* urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm
65184dbc29697269e3774d97ccf3202cb20b991b4561eacf620a5019fb4f9dfc
RLSA-2026:1239
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418)
* urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471)
* urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
fence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm
ab9922e7d341b989357fdedd8f1ffde276877c36e9e2004346e5313f64fd1b5c
fence-agents-all-4.10.0-98.el9_7.4.x86_64.rpm
84c183062490396e98df2ed6f0d96efee1375c1980cef79ff248be29ebdbe345
fence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpm
5e565902ed078f61f9a32577fc346548bef755f73b58bb0526ecfdbea66d1b22
fence-agents-apc-4.10.0-98.el9_7.4.noarch.rpm
6b371e624bbc6da963b17fd393a74bfe2625c5c6213b85e647b549f621098457
fence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpm
52c510f27e278feb07f73c3801effe63b69e33534dcd77ee49d84162bae4a48d
fence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm
aa595b9ba94f3d83df291f994b5ecb44913ac6061cdeebb869959662758f180b
fence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpm
5b7c490680e6079a8d83aaa380bf24e2ebfaa217cc93125197bc08146620c741
fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpm
d40660a9554f0fd81f1989398026ab08ee8bb3c60313ab3f01ab59f2573e0c87
fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpm
dddf9d3612a3c4043d263f4f72999ca829e5a332353bf6f25185917dc1f4689a
fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm
a0a32c875c248d178be3c2d0449784d9b0784071d08c75f04f0250138f3473ec
fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpm
1936bd6758468bfb0a3a14c10592cd6795cc8384f882872aa56a894518c32b6c
fence-agents-common-4.10.0-98.el9_7.4.noarch.rpm
548de028f6b49572f405823815540cec6c781fdacec06000fd83b00341aaa1ee
fence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpm
7c9528adc575a3b2c18c0ea8473751d875d6bcdc7d9baf62b642542668b9424c
fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpm
e25a5cb9bc7a9afb3083d84c13c007a5f9aeccc6bd7cd744046ffc0445a7e4d6
fence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpm
8a07e71bb2d383dfa698edf80659d8c20732039290fa6d8fd3176411580d0cec
fence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpm
b372a60153d9ef486f007e3cdf8c7963946fa85ced6830e2a1cccca63e1abda7
fence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm
086c7ff86c7b4d94d36ed5b68e1a9420be5d76477c349a76f18da30c5f9fca5c
fence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpm
69545c3e79987bdb7f08d048ce90d4816e99b82591e94c6f9b07a086feba42be
fence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpm
90e9390d2027183922c24332e442528be8ece638296c3627d70f8afcf11e4d93
fence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpm
1aa542d407acdab2d98f0adb70c6fdf7be6f5ab74b386dbb85ba29a4617e90b8
fence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpm
fbb951dfe47196fd2d95be695df063d3dd9767d0a3ee4e564eb761a9246a3880
fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpm
5c6bc3c3e4125f78ae73705417d80e5b580c60948b129e41ce517a431f5dd4b2
fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpm
c8c1628a6373568b0fc444d88b0bdc12f81e18c0416639ff0199d189ed37f0f0
fence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm
9bb562d6046667f3e077029a1fa0cd145e3b07300e931a89cd4c99e65851207a
fence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpm
292e16f00ce349af27bf77263a760afdac0134a3a73ace6cef298cc6fb882874
fence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm
1bc0c77f3c147f08b8c597939b6178f12621e490952d8e42b896fa09be2151b8
fence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpm
f65a84be93649ca03fd77a6f348531b65a7282fd102baf8dd245028903408b4b
fence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm
c69bdf1a378530674bb1eb6cdce034b09aafeb6b59b2fcae1eb829589f35e31a
fence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpm
0faa3293c3ceee279ce5cf5cfa3d05f9f621d669e37c375d31d4fa4d1eb39499
fence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpm
1cfbb7cbfc5073827fbabb0909a032094a07279ff3683e898e48110311cbf385
fence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpm
7a02e67847c828fbc43ec707e13ebece96fef4f22ea7aa8072837db03686dbc0
fence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpm
61daf0e82ade2c6dc0bd1c888d553a35bd27f9371dabe8f4e423224b6249e53f
fence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpm
b3f320d7a1d7e949065bb69345ae81312511d0ff0a699e9e2921b9357b72a081
fence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpm
772bc0bbd283e58cdf390a29c69283548e928e41000a845ecec0b0a874b9aa3a
fence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpm
271a1751a94e265a23415e6884133e54338058b0255eb0d153c17c49f041a2e3
fence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm
a0b8e7e5cdc6a1d4c304648e7ced0369f17cd9ed472f19d27cace1504a263157
fence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpm
68f09b9b19797ffae806ea5acf1c5811db0409af39097c3bfe4b63293ebb0526
fence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpm
e6f2e85cbb41fb6b04b76fe2afd6caa2cb059fc8600c6f50a4bfeaee3b657171
fence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm
b7941dc05b94201f9079e56da27fbcb565ae2916dbb77dcc35969352fcab0eba
fence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpm
22753141f4f93fa77515765106bd81a7f4bb53669018c23051369b5dccb2508f
fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpm
62eece770ac7fc570db7ea1603389415df3221a9a852ebbb0aa839817353fe48
fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpm
55609cbf6845f08f9bdaad3fbc2015045e9bd2ed2de70bdabcc2f673a37be64d
fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpm
6386a3bf0d2ba71fe0e8f4bf0cea50225343fb248b381b701bb51a5e1f279beb
fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpm
34f89127f617d461081f24afe8d5e72603372736e6b391ca07d1628f32c71d77
fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpm
dfb87266104c817a14e641c7123bf8a6bc79d26b4d09f9aacf5b454d4c8004fe
fence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm
bfa6dbec28f9695dc8ffdf3c355f096154c3abd4156b621b9931d7651498c490
fence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm
6c1f6484ea13ed229faf331971f56c4a7c472b17f985038b99d5cddc1cdb54aa
fence-virt-4.10.0-98.el9_7.4.x86_64.rpm
625f9e46dab14d7407a9272111dc472f80b4031db8f738730a530ac165d05539
fence-virtd-4.10.0-98.el9_7.4.x86_64.rpm
f6910350c4660f158511b5c9f5ab3101fdd6191cef3b8e5dc3c1d5a25020d29f
fence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpm
56c0678f7eb28f2523bf2cec416413c4086a3ead4e7880f50d77984f44c949a3
fence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpm
802badbd1dda867aba64b661eb67a9f647eb9ec360fedb39f824dc19430e5d1a
fence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm
9d10ccbe4bec286f70266ed55c840396699cff8497e43f8ec35da1f330b80e06
fence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpm
b36f92d463bdb61c0517d99373d69a5bfbf153973727b4133166c8e892142426
fence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpm
d61fd7b0709c8db6cc64bcd496a482a15adcdb88437db2b303b3431a4d5e9dd5
ha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpm
7d1b6c55c66d2317ca3091fa153631f78f72dc85b9932712539c7ad34f5fbb5d
RLSA-2026:2216
Important: libsoup security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libsoup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (CVE-2026-0719)
* libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libsoup-2.72.0-12.el9_7.5.i686.rpm
c7ba857ee2c88453bca5f2756ff8563611f612a57190e4335ac274e5373018f2
libsoup-2.72.0-12.el9_7.5.x86_64.rpm
15b00ca2c84c416373bbeb47c2d8f8203bd266ad7120605fcd4d871448e88eac
libsoup-devel-2.72.0-12.el9_7.5.i686.rpm
e40ab9b690388a71e55bc5a63d9f63ec764edd497025f91de5afc11ae4c7c795
libsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm
de1b00ca70e4b419e48f3a624dd49a473dde91482144c305d742d5f1e7fb9e71
RLSA-2026:2781
Important: nodejs:24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs, nodejs-nodemon, module.nodejs-packaging, nodejs-packaging, module.nodejs, module.nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.3-3.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
6312725fb2193283d8b2d99e7a2ce84778cfa3a4388bf460f0dbf4bffba5225d
nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e
nodejs-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm
760e58c29fb30f648896b393044d687876461ce5ff7ad7a3e5cfdfde1f023889
nodejs-devel-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm
bc4d9ef0e3fa80b4c8aa1c794a270e5a26c7bfa7c107abd9567c2abdb219a0c4
nodejs-docs-24.13.0-1.module+el9.7.0+40084+5fab4181.noarch.rpm
262fb41a8a2e03b262228efcf2efeeb77e8f3552b112464305fe196ef0ccc97f
nodejs-full-i18n-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm
ff2c2ee13e5037e6431bfb788df7e2c4db0d07463bebc3c4811d152db98eab03
nodejs-libs-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm
d675287b49336223ce825d90b91ad57e915d9b1efa63372adea82b124de8473b
npm-11.6.2-1.24.13.0.1.module+el9.7.0+40084+5fab4181.noarch.rpm
85071c2cdfde7616bf448b61d895ee90753366293896b7b28373fd278a5c7282
v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+40084+5fab4181.x86_64.rpm
e5a05f26a79bb25eb65750b99b67fb00f101ed17e577786c557dae8a2d77c287
RLSA-2026:2782
Important: nodejs:22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs, nodejs-nodemon, module.nodejs-packaging, nodejs-packaging, module.nodejs, module.nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm
f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c
nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm
40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a
nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm
0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51
nodejs-packaging-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm
255a5c340e26e8b83b187f5e9d668ab4cba7b3d7598ba7e0a4ff45cedf91b935
nodejs-packaging-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm
80650f49e762c304da81c274cecc66a56e02896ac1616490231088900821f4fd
nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm
343373af76dee4288e6f64388a4c80efe40c6001b68ee4ae9360c354fee8e948
nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm
ac36ad2443091780af81a7233a23d632b9b28ddad8c7170960d2aa44a0d8a8eb
nodejs-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm
4bb62decd08c0fe50e6478ac4cb86e27577c804720d794f78f43fe512399505b
nodejs-devel-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm
3c6e3c41695922e57ab87f034e6e238490c3015b8d1e2d5930f925c376d7a365
nodejs-docs-22.22.0-1.module+el9.7.0+40083+285810cf.noarch.rpm
fd1b5646826cbfd02d524d1e0ff306db1b49ea2d204e038d82ea5c0739429020
nodejs-full-i18n-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm
c8b726ee22dadc1059a7c71b41bb7b483b329112b72e77f2ccfcb4ddbabfe43c
nodejs-libs-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm
fc71e77ebcf8153ac6b964ad5cb71e8bcb7fd6ff30ce332789f4337ff5f1b6fb
npm-10.9.4-1.22.22.0.1.module+el9.7.0+40083+285810cf.x86_64.rpm
ac3d94a89e9d8e03eb61d86cd9822257a1ef0a2d46fce8ac1d6e49b5f9e88956
v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+40083+285810cf.x86_64.rpm
aed18ac62bf045edc0e6632b0c0a14429e81001a17b078be23709c7d0df23a29
RLSA-2026:3516
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* libvpx: Heap buffer overflow in libvpx (CVE-2026-2447)
* firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785)
* firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793)
* firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771)
* firefox: Integer overflow in the Audio/Video component (CVE-2026-2774)
* firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776)
* firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781)
* firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766)
* firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769)
* firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787)
* firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768)
* firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783)
* firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788)
* firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784)
* firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759)
* firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762)
* firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761)
* firefox: Privilege escalation in the Messaging System component (CVE-2026-2777)
* firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790)
* firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763)
* firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792)
* firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786)
* firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789)
* firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760)
* firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772)
* firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779)
* firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767)
* firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764)
* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765)
* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780)
* firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778)
* firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758)
* firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791)
* firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.8.0-1.el9_7.x86_64.rpm
799cd72a37efc6816a344e6217aa4ba515a45c4d7a28f46ee0be1e0c21cedb39
RLSA-2026:3507
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for valkey.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* Valkey: Valkey: Data tampering and denial of service via improper null character handling in Lua scripts (CVE-2025-67733)
* valkey: Valkey: Denial of Service via invalid clusterbus packet (CVE-2026-21863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
valkey-8.0.7-1.el9_7.x86_64.rpm
945663d68e4393712583d3bb5851a02bc3781a734d7274ea13f8fbeeceb412a2
valkey-devel-8.0.7-1.el9_7.x86_64.rpm
efda3938458b415353a9ab7862827b9a293d87f12af88d6bc8c91e2929c92e74
RLSA-2026:3638
Moderate: nginx:1.24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nginx, nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied connections (CVE-2026-1642)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
2ead91879a97e7313476e065e332f55b4f568948be8668495b711f12d802e7d3
nginx-all-modules-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm
4bfbd54a55ccfd6122590d6622f17a4b20d755fe672451bd07fdbbaa1eb141d8
nginx-core-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
35c6aefd449cbc497e82203ecf4340eced4acb8e0311c3a51789a946cac93af6
nginx-filesystem-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm
91e78a263a9a39bb2cdb77cf05eb463ada7a1704c875f1abf39f3d46f2c54770
nginx-mod-devel-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
90782c83e70099d51f328b436b2697b1d7c15d454f1032dbf7676908e288c594
nginx-mod-http-image-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
347756de538c5c34ccb8d4a5b2650b86c680c11060174ff8c8897c02da0ced6f
nginx-mod-http-perl-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
3d3528c490fa82a1840d8c05603972715550f6e9349ab5bf4d329b7e56d7b89b
nginx-mod-http-xslt-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
39ed4fc5eef4c94fcf030fbc910783c06c9c1c99f5f3275b41e88aa0d4411dca
nginx-mod-mail-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
5c42710e27529ea5533f1e367ab04f325499f6e8b4268d2c5f18c491347f9cc5
nginx-mod-stream-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm
6fac18b9f06d8855aad7371c3b47b86f0205149462b67dc3d8cb8170ea7167b3
RLSA-2026:3668
Important: go-rpm-macros security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package provides build-stage rpm automation to simplify the creation of Go language (golang) packages. It does not need to be included in the default build root: go-srpm-macros will pull it in for Go packages only.
Security Fix(es):
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
go-filesystem-3.6.0-13.el9_7.x86_64.rpm
8c3730cee4a141eda3955a4c99ee52bfcb9ddd6d1b4ee5968927be6a2b385356
go-rpm-macros-3.6.0-13.el9_7.x86_64.rpm
40db52421de7795136dd18aea239085c6aeb0c7becc6a42e59c56cf5ff2fa405
go-rpm-templates-3.6.0-13.el9_7.noarch.rpm
4c65ae7e4a0ae8c517256ed279983832ff683bd98ee0849a74d73a025b87cb92
go-srpm-macros-3.6.0-13.el9_7.noarch.rpm
25cb1a88500e8b092244047b6272c1c9a4ea252443794926e8d52e1553aeaf66
RLSA-2026:3730
Important: postgresql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006)
* postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004)
* postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
postgresql-13.23-2.el9_7.x86_64.rpm
2061fca87cb5070d743fe42ad2f6a7342f2571803d392ff8b0858530abda5013
postgresql-contrib-13.23-2.el9_7.x86_64.rpm
fa6fea01ead0ec59d8e3364fadd80e9614625283d5fe917d40b3c727a6662833
postgresql-plperl-13.23-2.el9_7.x86_64.rpm
6d18c99d5936d9ec787e5a959fb6a3e8b321282e2960679d274594dce178a299
postgresql-plpython3-13.23-2.el9_7.x86_64.rpm
998bf1e2d997af8e230f91dd8c30dc99acddd36e1052a22bb04d6b302daf9731
postgresql-pltcl-13.23-2.el9_7.x86_64.rpm
f8ccd3a767f4d8626a0005569081cecd0dcc41c99532a5c4a3f6b0f3c6479f2c
postgresql-private-libs-13.23-2.el9_7.x86_64.rpm
efb98a2bd46d9b10e7ee546bb1ac08e07c84c7c51b88092cbfc3745eb7fc0757
postgresql-server-13.23-2.el9_7.x86_64.rpm
fde4be53a8e3cdc9cefb4304f6e9a8376fb5f1e5ac70785c8cf5185d44319894
postgresql-upgrade-13.23-2.el9_7.x86_64.rpm
5a306c0b0a50f944d2a80dfba2615eda014c2af5a02481484ff21bbbd819000d
RLSA-2026:2709
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-src-1.25.7-1.el9_7.noarch.rpm
06ff7fc9c1fadcb3eb19d879c7ffd776fbd6b5978fe30de6d1324fb79d9acd09
golang-1.25.7-1.el9_7.x86_64.rpm
5b9a10f137881f64aea92eed46fd1a5fd45ef46fcd583824c290f8b65dd4ed1f
golang-bin-1.25.7-1.el9_7.x86_64.rpm
bfcd35c72cdca1091979065bae72314f5a2dbcf7b7eda06f85c6ef4809de9bf8
golang-docs-1.25.7-1.el9_7.noarch.rpm
1779eb695fb202791468ecf02defd75f912cb552dbd95e701c8d6d8bff9e57f2
golang-misc-1.25.7-1.el9_7.noarch.rpm
8da00c2ca11732ae0aef6d86d8a98179aa166dee9e5b2a1864295735478be037
golang-race-1.25.7-1.el9_7.x86_64.rpm
e32bbc409139ad2b596b0df2b438433c2265ef3b92a7d4e50a556b3d7b44348c
golang-tests-1.25.7-1.el9_7.noarch.rpm
3b4242ecbb0611261f5b7ca2bd1709d493240244344012e48fd196ba40b7ea92
go-toolset-1.25.7-1.el9_7.x86_64.rpm
57dc9b357be58f99b59b3849cf63f0e12f263cbc2a4fd8efda41aea65318e100
RLSA-2026:3896
Important: postgresql:15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pg_repack, pgaudit, module.postgres-decoderbufs, module.pgaudit, postgresql, module.pg_repack, postgres-decoderbufs, module.postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006)
* postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004)
* postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-1.7.0-1.module+el9.7.0+40011+28af63c9.x86_64.rpm
5088cc0af53acfb7d832ab49b383c3516d5527c426be7868dadeba97a2e938a1
pg_repack-1.4.8-2.module+el9.7.0+40011+28af63c9.x86_64.rpm
402ca1980510592c3053e6e17a21fa52fa2ac89a2e7e467e240575d853ec611e
postgres-decoderbufs-1.9.7-1.Final.module+el9.7.0+40011+28af63c9.x86_64.rpm
6cc1441002d2afeda2f6fb121bdb894076e43d024171f41407d0eaf1dc0b0950
postgresql-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
f1edb1f23045ddb5f42e59b03c799d253542cb96fbc9cbc9242026231709f11a
postgresql-contrib-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
8bcb20aaead86efb35bd4ee2e78ca6c7f546ecf93625173414300f93677f0610
postgresql-docs-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
f6cb451b8ab9c771f3016aecd351ef322c2e10adbff6deb61b580dea9bcffb9d
postgresql-plperl-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
5ac373aeb61d782fee070440ac8e0aa3ede6b20edc7267610b85b7d12f9986d2
postgresql-plpython3-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
4a5f8b685d22a56bec4a2028650c2d2cc149d186ee335bc8ea1ecd3f1490365a
postgresql-pltcl-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
c933bc473a13e1fa6afc4da116c3db2e6f923c9b2c989a5d4dd06370cc7617ca
postgresql-private-devel-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
f8d0a8a04395b11b9a5c3fa2cf0b383f09170323e5bd63453faa289b86583ebc
postgresql-private-libs-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
013db3c5b41705a08064dcf057529b5034c3e9c8d1ef3a4fbc3ee107b153fe5b
postgresql-server-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
c6d875e9631a9bcc5220a9d258eb61a05f517930896af065a2d697bfd30c2e51
postgresql-server-devel-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
ab9af0f5be083615001c8ecbdc0848dc17b3bd492a56b236665faf0aec5ec04a
postgresql-static-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
817dd4a1d3a348f52a2a1841c6781abbfb4b6384d6d38f2bc8f3b7f01063ed08
postgresql-test-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
78b0ac3375baf6deab3cb378880179f31dc1f4968f5cb8b5bca4d95067fd6359
postgresql-test-rpm-macros-15.17-1.module+el9.7.0+40097+c6c51561.noarch.rpm
1e93069c3eccde2f7333ad6f530ff68e1198933bcd5a64fdbdc8215ed6b9f052
postgresql-upgrade-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
bfd5985c7983e7e5220951d51ff757d1a148e90267096ef69f9acbc1c2de2c74
postgresql-upgrade-devel-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm
c13d428bf2529405cfbed285996fbaa27460f5ce167476d45b10483e58516d91
RLSA-2026:2776
Moderate: edk2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for edk2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
edk2-aarch64-20241117-4.el9_7.3.noarch.rpm
7598c3b0dc0c66f987205371d48cc54584e58364f86e14702b59b841581cf6ba
edk2-ovmf-20241117-4.el9_7.3.noarch.rpm
f317610a87f37e44bb0609184a7b0aa765ff9477f1f8d9172c7f353d998ab4fe
RLSA-2026:2799
Moderate: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for php.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)
* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
php-8.0.30-5.el9_7.x86_64.rpm
bebeeadb2660a30c2a725f1b9fe55214d109fa1bb9cf086dda2281c1807cd49a
php-bcmath-8.0.30-5.el9_7.x86_64.rpm
44b58d93cc01574a211473f81b477d6213dde9f227d81df608ee7d4897f19335
php-cli-8.0.30-5.el9_7.x86_64.rpm
6f1b44044ae977c3c741ccc57a69b3df94c79b4ff58fda955c109e1ff76b19fc
php-common-8.0.30-5.el9_7.x86_64.rpm
6e8a47aeefaa6f079f302e0eb561351e9a35379fa43fd29e8cc9caa10ada9fc0
php-dba-8.0.30-5.el9_7.x86_64.rpm
ad12359077d47c2077bdc51a5f5f8d8b7d56b2ee64f64f4e439c391fcfc59ab2
php-dbg-8.0.30-5.el9_7.x86_64.rpm
ca5f8bda1a32f5afcca721ba5e7cccec1215c6531041bab2f85354a552c0ac94
php-devel-8.0.30-5.el9_7.x86_64.rpm
42e54ee181dc78197dccc7512fd30daafb8818014b08eb70af83002ec7e08bfd
php-embedded-8.0.30-5.el9_7.x86_64.rpm
6069e3a4098137d11210398d81d3525476fd43381ebbc6fd01b13f1385f230bd
php-enchant-8.0.30-5.el9_7.x86_64.rpm
159b47fb0c9ae9bec92aac7e447a4e037d5b3287e806398e24aba3d0b04e9262
php-ffi-8.0.30-5.el9_7.x86_64.rpm
4626415df9ee573b4787e3148530d4cc4688a23fd224d2bfabc6b991a89d9a02
php-fpm-8.0.30-5.el9_7.x86_64.rpm
ef7e325da11faf77512dcdbca4ccc33417e77b8e5ec69b4531b033bdcd20a598
php-gd-8.0.30-5.el9_7.x86_64.rpm
19c7339f568635bce5ea97c2cb837ad171d3e33b1845140d2e1f47e3cfd75e56
php-gmp-8.0.30-5.el9_7.x86_64.rpm
3a71bc66e0359d28571b3d0c782682e29f5f6b7d2d1f0dce76cb8b5dcfc4e9fa
php-intl-8.0.30-5.el9_7.x86_64.rpm
0172ca035d7913348024ebcaa070d3aa80c3ea313354587c72b1198683b7d420
php-ldap-8.0.30-5.el9_7.x86_64.rpm
f65d4ef0291b077c9ab9491446fb86bb1ec152c24bc0b279acf5ddfbfd6d01bc
php-mbstring-8.0.30-5.el9_7.x86_64.rpm
c106f1248bd838d6ba9ecc629654820999f04a28e6d50e05ff53a37024771d39
php-mysqlnd-8.0.30-5.el9_7.x86_64.rpm
1e64b4122a9c89fa1f5ef9d133cdf5c933f341a2871ebe42ecc24db8427dd397
php-odbc-8.0.30-5.el9_7.x86_64.rpm
9f34c46ee18e554163c23d8f7fa9f4a786569913c25208488956b5d952029ebe
php-opcache-8.0.30-5.el9_7.x86_64.rpm
f09ace68c1bc6537119210ab0f6d5d03b234c76facd9ee2581a6e18153694d10
php-pdo-8.0.30-5.el9_7.x86_64.rpm
55caab0afb198eccdb3455623525cf8a25adf59d34bbb7e53e65f711a29cca45
php-pgsql-8.0.30-5.el9_7.x86_64.rpm
87afb99a59d0dd1a723193c5f126a84432b845ae46c55c2b30687b4d462a335f
php-process-8.0.30-5.el9_7.x86_64.rpm
00a67acf302ec93f5c14e204c4748855d066dbaa0628a2a191d36c1eaf715702
php-snmp-8.0.30-5.el9_7.x86_64.rpm
707562cf317d97efcd7bc5d1dae93c4a3089e877913eefb5784b5f27062ed1a8
php-soap-8.0.30-5.el9_7.x86_64.rpm
62c1e92029f2aaee59d00873d9b7a612de771c54271f0a9e6de9d1d075985f71
php-xml-8.0.30-5.el9_7.x86_64.rpm
354ac92a315770e01fa2271195c8d32bcfd6092b48d0e7f0aa3b640d8b247437
RLSA-2026:2920
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-18.el9_7.x86_64.rpm
de0d719513721cb091fa824070c1f06eba87e98d48b784f542afa1643b867d52
grafana-selinux-10.2.6-18.el9_7.x86_64.rpm
b3b767fa64ebbbf72e39c8740e8846b0d0691e146dc09a50b36e1f39288ee345
RLSA-2026:3031
Important: libpng15 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libpng15.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libpng15 package provides libpng 1.5, an older version of the libpng. library for manipulating PNG (Portable Network Graphics) image format files. This version should be used only if you are unable to use the current version of libpng.
Security Fix(es):
* libpng: LIBPNG has a heap buffer overflow in png_set_quantize (CVE-2026-25646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libpng15-1.5.30-14.el9_7.1.i686.rpm
8ee8d6df67a501fe60a55804060886be26a4d6567556595c9716a6f102353a88
libpng15-1.5.30-14.el9_7.1.x86_64.rpm
9260c7546d05538e6acd75378d86b2df6be91207ef5aa4c0693aebdead423b3b
RLSA-2026:3040
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-12.el9_7.x86_64.rpm
a1f3f7985a4672a80cee798002964421e72d303dcdd734ddacace54555cc41ae
RLSA-2026:3034
Important: munge security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for munge.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.
Security Fix(es):
* MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
munge-0.5.13-14.el9_7.x86_64.rpm
7015cfb275ac6dce1847fc96c8f824d56ab6d81d145bcc33f2903a0544da9ef9
munge-libs-0.5.13-14.el9_7.i686.rpm
25e40f5c3e4c4733655a36f0d2b1eb6514add9a1942c65aa0b10f44d93a62d8f
munge-libs-0.5.13-14.el9_7.x86_64.rpm
aca9c8a5dd6714cace763ce2f80b8f919fb3f4a34e2cf038a8692abaa118ea0d
RLSA-2026:3067
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22855)
* freerdp: FreeRDP global-buffer-overflow (CVE-2026-22858)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22859)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.11.7-1.el9_7.2.x86_64.rpm
b0555de57c4b4b1f488ab28e19b6cc426feb8127e58fa6861ea1c969ae8d563e
freerdp-libs-2.11.7-1.el9_7.2.i686.rpm
c2c1e64bc66ea945469eed78124de14c05efcd3df12bd525a3a62c63d6120ebc
freerdp-libs-2.11.7-1.el9_7.2.x86_64.rpm
005527f100fd1cee9a379d9cae1534f90b50465e09904b74a2cad6d99c75bb76
libwinpr-2.11.7-1.el9_7.2.i686.rpm
3aba08d3c68ad8040bf436001cfa08dc3e98a3a52ec4fedc7fb4448b474bc447
libwinpr-2.11.7-1.el9_7.2.x86_64.rpm
c867689f278fd267cb0196a29292c9cd1931d3ae66901e4f165f01915e34a69a
RLSA-2026:3095
Important: protobuf security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for protobuf.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* python: protobuf: Protobuf: Denial of Service due to recursion depth bypass (CVE-2026-0994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
protobuf-3.14.0-17.el9_7.i686.rpm
39a29e4b6c35101db574127a3b44c47b5c1dd9fbf5051e896439a217ef4e55c4
protobuf-3.14.0-17.el9_7.x86_64.rpm
fa56a95f91886936b60bbf3264f2374ffe991efa16963c63eb6be949ee5c552f
protobuf-lite-3.14.0-17.el9_7.i686.rpm
20f3e09fc0245959cf7fc182fc5177d27cd6421a79bf1c23c82d8566c338a827
protobuf-lite-3.14.0-17.el9_7.x86_64.rpm
24a5afb7f79d66d8b18fbbcfa9152ed717ca13b31a58d2141c7fc48c11a5008b
python3-protobuf-3.14.0-17.el9_7.noarch.rpm
6390cb4e53898aa27737bd0bb6a100cd8d3526bc77b074a8faa9f31b9bff2477
RLSA-2026:8075
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3-bind-9.16.23-34.el9_7.2.noarch.rpm
d67ce0025d0f5f48cd9a23433f07d274494e770850edb9b7e312c6ec80804ad5
bind-9.16.23-34.el9_7.2.x86_64.rpm
52458bd214f2a70075611c59b9d99ee8ffde1deb52f07f5b3f7563701d57eb48
bind-chroot-9.16.23-34.el9_7.2.x86_64.rpm
1dff3308c92a82179a8fd055d4c196b7d57032915ff1c441d4d75ae5e5f2cfa9
bind-dnssec-doc-9.16.23-34.el9_7.2.noarch.rpm
715b41a7a1b831e76960778cc72f0de2d063fd2e3c3fe19de36d4ad1fd64d286
bind-dnssec-utils-9.16.23-34.el9_7.2.x86_64.rpm
37c4abfff5723d22b662cd5920e92ae19023fdb069c7474bd1e2cd0f99909373
bind-libs-9.16.23-34.el9_7.2.x86_64.rpm
622e8fd2477ce8b63d67b2209254e3242276effabfceecb6602e96b4848bab60
bind-license-9.16.23-34.el9_7.2.noarch.rpm
c4fd090abb54f2b0076777e75dcd4d80d6c35b6b58de4ada914882e0f1dfe0a9
bind-utils-9.16.23-34.el9_7.2.x86_64.rpm
0a14fa9abcc9614dfea379f3dda6feee72defc6d9aa59f60c3a5a3d52571a659
RLSA-2026:3189
Moderate: 389-ds-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
389-ds-base-2.7.0-10.el9_7.x86_64.rpm
5c643865cedb47feca303aa4c11b05cc8aa3a91d8df77e1a54e9199f23b97332
389-ds-base-libs-2.7.0-10.el9_7.x86_64.rpm
d4e7fe55f0f97b6da746b1918f5563b28d25c06866e62676306dd6427895080c
389-ds-base-snmp-2.7.0-10.el9_7.x86_64.rpm
966dd4eb329829841172729e1873dd16d51046f737b5b949826e7cdc063ec794
python3-lib389-2.7.0-10.el9_7.noarch.rpm
2e4c7567887474b9bab1c38712037c56128d991adc562ae9e27e92bf5367e67e
RLSA-2026:3291
Important: runc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for runc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
runc-1.4.0-2.el9_7.x86_64.rpm
7d573a74cd04a450c27d850d2c9955f06c105b4272e4d7cbb36800e0085626fa
RLSA-2026:3298
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.41.8-2.el9_7.x86_64.rpm
07a23cab0c4d9706786fcbb74a63f4775b565bea4cdeffa879f7b7ad716bfa36
buildah-tests-1.41.8-2.el9_7.x86_64.rpm
447b066463113299f85afac87fbe52418441053ff6913897720639c4e8e11de8
RLSA-2026:3337
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for podman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
podman-5.6.0-14.el9_7.x86_64.rpm
ee01974251eadc0dfa0c6c80ec935677d4af3e6f8a828d1fcca14efd4e1c6b99
podman-docker-5.6.0-14.el9_7.noarch.rpm
30f99a762aef333e1818f88b93de7fb87446b9d2d90b85d4d6fd0ff442d1235e
podman-plugins-5.6.0-14.el9_7.x86_64.rpm
9079894aba7c83204be6a49c751656a8877363f4e64a77f2124c9928d44971ff
podman-remote-5.6.0-14.el9_7.x86_64.rpm
b82ba25771440ca7bae3eba1d3582864dd675084488eb1ed405efeb4d5519abd
podman-tests-5.6.0-14.el9_7.x86_64.rpm
2c0920a4aa311d605bedf312cb740aeb7886637c1eef8c11a8347831570f8648
RLSA-2026:3339
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* libvpx: Heap buffer overflow in libvpx (CVE-2026-2447)
* firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785)
* firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793)
* firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771)
* firefox: Integer overflow in the Audio/Video component (CVE-2026-2774)
* firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776)
* firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781)
* firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766)
* firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769)
* firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787)
* firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768)
* firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783)
* firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788)
* firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784)
* firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759)
* firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762)
* firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761)
* firefox: Privilege escalation in the Messaging System component (CVE-2026-2777)
* firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790)
* firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763)
* firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792)
* firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786)
* firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789)
* firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760)
* firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772)
* firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779)
* firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767)
* firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764)
* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765)
* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780)
* firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778)
* firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758)
* firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791)
* firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.8.0-2.el9_7.x86_64.rpm
548efd2c777b9055ba52370f6ef04b6d755b67c01d8b709083f4fa64eed31049
firefox-x11-140.8.0-2.el9_7.x86_64.rpm
d929124a2a10925d529d07460834e25ca615cc921fc8277219954fc1cf84876d
RLSA-2026:3341
Important: containernetworking-plugins security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for containernetworking-plugins.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
containernetworking-plugins-1.7.1-3.el9_7.x86_64.rpm
c2b2ba502c8162141bf8086b1ce8fef0b187db94dc81567fa71393139a13c44d
RLSA-2026:3340
Important: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for skopeo.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
skopeo-1.20.0-3.el9_7.x86_64.rpm
28d876fb9d666f766bedef4afddf13ad145e954391e64fe446320bdd357ae16b
skopeo-tests-1.20.0-3.el9_7.x86_64.rpm
2069dfc0fb3f5965b29496875084bb9bfd0a062fc3c026e037acba949a3e08ff
RLSA-2026:7896
Important: nodejs:20 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs, module.nodejs-packaging, nodejs-packaging, module.nodejs, nodejs-nodemon, module.nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)
* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm
f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c
nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm
40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a
nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm
0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51
nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e
nodejs-20.20.2-1.module+el9.7.0+40153+4d595597.x86_64.rpm
3076698797d0b6e29edd0818759588fd3b85842c4ac4504c5a90d23084afd782
nodejs-devel-20.20.2-1.module+el9.7.0+40153+4d595597.x86_64.rpm
34790350ceea244d20538777c681c2848125639f09e1b69ad1ce77939356c3e0
nodejs-docs-20.20.2-1.module+el9.7.0+40153+4d595597.noarch.rpm
c29f6670692e97844abe4340c855b1a64ecf75f83da4cc4854bbdd60b5006b0a
nodejs-full-i18n-20.20.2-1.module+el9.7.0+40153+4d595597.x86_64.rpm
426700954e7985a5305dadfd8663c739cba1e0b1ea98277224e611764cf11b29
nodejs-nodemon-3.0.1-1.module+el9.7.0+40153+4d595597.noarch.rpm
60089165d5593049f992eaa6af8f75d538c9c13734cc8dd7b8f7b57554397865
nodejs-packaging-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm
b633e5ce4d8240ae950189fff640804ffd62eb882aa7bd24eddb152a9f460d6d
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm
712c40786611b05cb031ef7a0d7464a3cc2cc78a26e19886e5631caa7aeacc68
npm-10.8.2-1.20.20.2.1.module+el9.7.0+40153+4d595597.x86_64.rpm
008a2ab33deb8b388f7de14ce6601f32dcf6cf9bc2f2d9f22f80dd38390d79a9
nodejs-nodemon-3.0.1-1.module+el9.7.0+40165+d075e3f2.noarch.rpm
170b1ba1b9cc18f2f714e0014963f8ac742aa4495c6031949a5567f6f6497eb6
nodejs-packaging-2021.06-6.module+el9.7.0+40165+d075e3f2.noarch.rpm
e2c6fef43f1c606b5c1314138077954ab7d8bc935b66d7f0ed8d2aab5f7e37be
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40165+d075e3f2.noarch.rpm
31d2c7e734bed698052fa8c43d3736faf12902d85a8f85c0a378242bf7b645dc
RLSA-2026:4110
Important: postgresql:16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for pg_repack, module.pgvector, pgaudit, module.postgis, postgis, pgvector, module.postgres-decoderbufs, module.pgaudit, postgresql, module.pg_repack, postgres-decoderbufs, module.postgresql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006)
* postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004)
* postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__postgresql
pgaudit-16.0-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm
f8d8902f9a66ca3e78f9609bad96fdf9cf11fcd3684e647c7a6db64e24c0213c
pgaudit-16.0-1.module+el9.7.0+40060+39463e08.x86_64.rpm
822c0217f4859f176536174381a77f70256fa03addb007e2f7f8b1a06449aa44
pg_repack-1.5.1-1.module+el9.7.0+40060+39463e08.x86_64.rpm
b257288f674866e98d3a51f36b1c2c7641078c321d05515de1a74e8e8c64c66a
pg_repack-1.5.1-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm
2fd23517b22a8b850c899be9f0f50ecdde832d436a7702d111901ad9c59bee1c
pgvector-0.6.2-2.module+el9.7.0+40012+a654bbaa.x86_64.rpm
3ba39c238c4bf8e75e202f2a8b70b4e6b37715caa82a964354dbce25ceadffff
pgvector-0.6.2-2.module+el9.7.0+40060+39463e08.x86_64.rpm
617caa27b190da601e71ebd674d9403e3e112b1379b37a795f8e8e31d3cde5a8
postgis-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
7d37d2a8e9e856f000017bb0a1b9fa6feed9a411fb24e6affa4ae5e8dc920353
postgis-client-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
710413b03fa76c0bb57d5ed8185917ccc11852f62219a86397a42859f6aee6be
postgis-docs-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
e7db05b35b8295ea9d81b9c733707e74d0538f3fcc4ce7a80a0d3bd12d7bee5a
postgis-upgrade-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
6d698de214d3c65c0c91e5b5c69dcd90ecc08e70c39c4553f5fce339b1dafa60
postgis-utils-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm
d882dc5c12703b89e2335d3c9f423fb964a029feedf583da2b92b0d34ac83e56
postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40012+a654bbaa.x86_64.rpm
d10bb7f8708c09b3807d91aa3e96db887acbced1fed2264fceca9841587ed0b7
postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40060+39463e08.x86_64.rpm
0b5ee7debecd0595b42fd91c745ba4f5b4ffbf63040e76681352abfb033fc6e0
postgresql-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
9ab2f8f52379685bc94967df14f4f18636a7038b1f6c15c18f3f0318e18ac9cc
postgresql-contrib-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
4e1dcbdba3b5b6d518017a574eded4ed93d6c06c39eca872f3971f33a8f12e1a
postgresql-docs-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
162a38aabaeb269e91e0b08dc5c4fa29b152cff5f2e560b27a17d8cceede73f3
postgresql-plperl-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
c5eed429adda0a1f3a9ab863a31023f69bad772b1053803f4cf6dc7f3f7862d9
postgresql-plpython3-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
83812a62f6e9fd3dd39965ee7533252b91048d525203c8cfc3579542ba14c3f4
postgresql-pltcl-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
1daa07cec68b0e3f2b9206fb7caae473e3b4482985be10e2292b89f8d9274c04
postgresql-private-devel-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
7fa6022204e48ffdccd07b04fdfbb4e8a4c7d51f1a13a4bafd72fd1852fb0082
postgresql-private-libs-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
033605f276176b547774ce7d178e69e2f9cc4b5ab2dcbef760acab1a6d234747
postgresql-server-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
ddb0fda0519db7981ee6bf35e6bbdfd34fae33ff1395cd615c9a81abef8dff83
postgresql-server-devel-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
6f2d1b8d7630ccd6628459fed427aad87251393ef087523640bbc429466678d0
postgresql-static-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
82db01d96c798180a6dd10bdeb82e0fee67bca2d77e1b3eb94fea93eb83c6590
postgresql-test-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
a9d6c8457f082e1cc9fbd364c70c8f0786dae12a4eff6a4ea65f66f40a950552
postgresql-test-rpm-macros-16.13-1.module+el9.7.0+40102+9b5cec96.noarch.rpm
c42662f38031051da5e50811dda2d5c9be6af131075e4c167fec6d56d3a31480
postgresql-upgrade-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
ddf6e4f284efef2711eac8cefd74865db5b8e26cb5a7a53760414e6b0949fed8
postgresql-upgrade-devel-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm
5d2a23306f6cc3016051b93c7a70a4eac3b38929b08c18011d71745a3f011cc0
RLSA-2026:3842
Moderate: delve security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for delve.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible.
Security Fix(es):
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
delve-1.25.2-2.el9_7.x86_64.rpm
84718d7c620e3173883b74f1a3d6aa690e02dc0079614ddc55dcbd9f45b9489a
RLSA-2026:3928
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.6.1-7.el9_7.x86_64.rpm
61494272819381b3d566e29dd885dffdde9114af78f781a039e99332ac26a43a
RLSA-2026:4165
Moderate: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: IMAP command injection in user-controlled commands (CVE-2025-15366)
* cpython: POP3 command injection in user-controlled commands (CVE-2025-15367)
* cpython: email header injection due to unquoted newlines (CVE-2026-1299)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.12-4.el9_7.1.x86_64.rpm
b32e4ec9b1b42cd85f52888055771caf67594641c2eb29cb6902f8bccfa7723b
python3.12-devel-3.12.12-4.el9_7.1.i686.rpm
1d87a0d43b3c99df19b93d39da683c4be83720fc07f25ed817f20c01e3c10db9
python3.12-devel-3.12.12-4.el9_7.1.x86_64.rpm
40c1cf6dfc29f1150761fa48267b3f11ef5080a5829818d6c2f68231b28c9dc4
python3.12-libs-3.12.12-4.el9_7.1.i686.rpm
1a802674c22bca2715215f7e185010210fbe336ed59ba547c9ce14415236381e
python3.12-libs-3.12.12-4.el9_7.1.x86_64.rpm
64a413b08aa06237c62eb55aeb5e24b40ca20c270009b2a5e65e4a7f21f64d4a
python3.12-tkinter-3.12.12-4.el9_7.1.x86_64.rpm
32cd3e6fd1a3ac3e968d691658b17b79ec05dd7c2cb885ebf7de9324df5a2007
RLSA-2026:4173
Important: gimp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gimp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo.
Security Fix(es):
* gimp: GIMP: Remote code execution via heap-based buffer overflow in ICNS file parsing (CVE-2026-2047)
* gimp: GIMP: Remote Code Execution via uninitialized memory in PGM file parsing (CVE-2026-2044)
* gimp: GIMP: Remote Code Execution via out-of-bounds write in XWD file parsing (CVE-2026-2045)
* gimp: GIMP: Remote Code Execution via ICO File Parsing Vulnerability (CVE-2026-0797)
* gimp: GIMP: Remote Code Execution via XWD file parsing vulnerability (CVE-2026-2048)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gimp-3.0.4-1.el9_7.4.x86_64.rpm
6df40fe93a3b7ad7628b6ac4a4d4efe64d24470d55dd2c70eaf4c0bd774e366f
gimp-libs-3.0.4-1.el9_7.4.i686.rpm
95bab8dba35ae37f0a4d543e2d2656829c7ada0e00e2b68845a62223501a025a
gimp-libs-3.0.4-1.el9_7.4.x86_64.rpm
0ad8ed57473d7bcefa175bc70bac2868b2d934d089ca083ced545401405582a0
RLSA-2026:4177
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
opentelemetry-collector-0.144.0-1.el9.x86_64.rpm
f3eb4f53b8b2a2343ab314cc6ef3e988789031e97aad0420774f320a3647094b
RLSA-2026:4216
Moderate: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: IMAP command injection in user-controlled commands (CVE-2025-15366)
* cpython: POP3 command injection in user-controlled commands (CVE-2025-15367)
* cpython: email header injection due to unquoted newlines (CVE-2026-1299)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.13-5.1.el9_7.x86_64.rpm
a2f1a11334508312a7aeb4be4bb4a52637a2ee3a7a44392696256e44c50ec9eb
python3.11-devel-3.11.13-5.1.el9_7.i686.rpm
7848e3323f864491b2d6ff614eaad5a4923edef2b87fb55b85a7d62ff4f4fcbc
python3.11-devel-3.11.13-5.1.el9_7.x86_64.rpm
14f65be547a3dffef600381010ec5ccff2357cb261fbdcaf2e726b6de2127340
python3.11-libs-3.11.13-5.1.el9_7.i686.rpm
0960a9975324dbb396402f88e3a42ac1c80e09f37e832d82474751df869f0b8f
python3.11-libs-3.11.13-5.1.el9_7.x86_64.rpm
6cbaeec0373fe8720cb56b84b4a278be603c672f9b734137ad4480f446faccef
python3.11-tkinter-3.11.13-5.1.el9_7.x86_64.rpm
c8ee488db230953fe164db0cf52be3a4dbc8173ca06f661c5ed10d183406e2e0
RLSA-2026:4898
Important: capstone security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for capstone.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community.
Security Fix(es):
* capstone: Capstone: Memory corruption via unchecked vsnprintf return (CVE-2025-68114)
* capstone: Capstone: Heap buffer overflow via skipdata callback allows denial of service or arbitrary code execution. (CVE-2025-67873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
capstone-4.0.2-11.el9_7.i686.rpm
e2d9d78dfae378306f4e895f8d6723ad484ab5ed31481b870ae8c8bd8996ab74
capstone-4.0.2-11.el9_7.x86_64.rpm
c5da1894eba1669e4f04e154ed38a4bce18a3528d59359407fb7f4623117b1aa
RLSA-2026:4235
Moderate: nginx:1.26 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for module.nginx, nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied connections (CVE-2026-1642)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
cf37218cad07b24969db2dc31636854c596a158d900c519d101cb3b2ac726d5d
nginx-all-modules-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm
847f42c0b2c16c17cc1f1256ea848eb7f547164ba05012794998d1b2c255b0c4
nginx-core-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
55da29e93e75239f969f4f375e74f3bf89a2bc660930594df54302a632beba05
nginx-filesystem-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm
bf738af891694faa7da0a8922d7ad38443048b0d8eae316aa5af99466ab68507
nginx-mod-devel-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
b1965bae0989798cb595a1f50ea84bb817cbc806ec3eb318f3e8d9d234f1b9cb
nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
018e2c04fec3e81540955e96d387d56556772439094f09cf2695e7deab010e0b
nginx-mod-http-perl-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
b14673b032b343472dc9594e7775a33973a82ea81bac005af13d50f6f0ddad3c
nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
83b558dc165d43a90b5e1fd66077cc6ddc36eff431dcb5b1738faed148f740ab
nginx-mod-mail-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
0cfb8031baffb999a97731c70095ee8c8b698dc2c3da75bb2da4b232425f11ca
nginx-mod-stream-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
75b684c6da0521a37ce133660bc5e7ebdb1c7be0bf6ef588773b16a983876090
RLSA-2026:4472
Moderate: compat-openssl11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for compat-openssl11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSSL toolkit provides support for secure communications between machines. This version of OpenSSL package contains only the libraries from the 1.1.1 version and is provided for compatibility with previous releases.
Security Fix(es):
* openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing (CVE-2025-69419)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm
3392695869abf2bea47b8239c00697a11bbf9d00fc0a852e88ac4a928c0f6f91
compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm
2305692961df47a4a61a3b76c3af8ac980fe005ff7a80b3a72c4ce95aa835b82
RLSA-2026:4447
Important: libvpx security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libvpx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Heap buffer overflow in libvpx (CVE-2026-2447)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libvpx-1.9.0-10.el9_7.i686.rpm
4ac0c7d7dd7a8efe7ab15038aac0c2bc414fd2d140e4fca530f9f9ebba9168d8
libvpx-1.9.0-10.el9_7.x86_64.rpm
861eee36f9ff99ec5bb8e4ba013804cb20f661e8bb3e31ad4e8955e633510e40
RLSA-2026:4454
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.125 and .NET Runtime 8.0.25.Security Fix(es):
* asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm
5d8c025829b8bb7eb0c32de9b08d391ea4d21b957a0fddd51b440c36527eb40a
aspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm
ff1c34bc3b0a7eba48d52d746f46982de2af1fd68c4ad466e8e18a6c72f33fb3
aspnetcore-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm
a50e7b4909018a97248c578f7e1de9d95a47f5e5b420ecce64e97d9319145fa0
dotnet-apphost-pack-8.0-8.0.25-1.el9_7.x86_64.rpm
401371057de18762863d6f47647c7b2ec63449ad9be92c91d9901f8511bd58aa
dotnet-hostfxr-8.0-8.0.25-1.el9_7.x86_64.rpm
1767b8e0445877960f8bbd58d2782753f0271699dbd4140eeebfea7e3eef3b65
dotnet-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm
79fe0d08ad03186e44a02ca0fc43420d6dbb8bc6d9681f831429972c6fde7ab8
dotnet-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm
b5908e525555cb9429a6afc7e2544b289055238e75db189e8e9c8d5e5040226e
dotnet-sdk-8.0-8.0.125-1.el9_7.x86_64.rpm
1cf9ef88d678082135a7a7a649185d867683e27e88428290449ded832af18c64
dotnet-sdk-dbg-8.0-8.0.125-1.el9_7.x86_64.rpm
11a5cce1d3a562ba5266cfcc28d7b56713247c56cda41969d9020b8489a610f2
dotnet-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm
e6500b85bdb2c0eaed8be0bbde0ad9c3ebf0d1c6d8953a606b5d76a38ca8bf0d
dotnet-templates-8.0-8.0.125-1.el9_7.x86_64.rpm
31f5f8b1044c43274e7355259e7f2db81580c24dd5bfd725ab03ca70a6741836
RLSA-2026:4445
Important: .NET 10.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet10.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 10.0.104 and .NET Runtime 10.0.4.Security Fix(es):
* .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)
* asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm
661028cd2c6cf6276eb2df6d8680c05f7bec9b139222e714b7f0db19eca1e48e
aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm
33da80182871b085c5223cf758ec54e8ec95997e37d6c8aa5086c4cc4fc60966
aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm
0fb3109cc085a80340f738ec7d33ff9c46dd03d3e28fcec11d59a1ae54db3298
dotnet-apphost-pack-10.0-10.0.4-1.el9_7.x86_64.rpm
6fde6448d31e905770ac6c263226fab3b8c7e70f6fac7cbff84f295efcdd95a4
dotnet-host-10.0.4-1.el9_7.x86_64.rpm
70648b0611a3f5f33e5f6527155d7fb52abeafd35f3111b2913794d671c01d4c
dotnet-hostfxr-10.0-10.0.4-1.el9_7.x86_64.rpm
dfabdc59449822aea4318cc31ff22a8fd7cd6a84d65e8ad113e02563d61f4cc6
dotnet-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm
4387e79cca5785dee1083a9275140f3e24db58f5eb310d229d74f8c93cd5ac0e
dotnet-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm
54621e7f75a5796d7cdec2f5034fc331eee82bfc48e7e2694762379371df78d0
dotnet-sdk-10.0-10.0.104-1.el9_7.x86_64.rpm
cb4b6057a1c22c385b5c3e1b29a03396b6215ae598ca2bbc4c4c0cd4fb8889c7
dotnet-sdk-aot-10.0-10.0.104-1.el9_7.x86_64.rpm
54dddc39827d2560566758ef59f01c96a7b9dacfc1cfd34642d50b2a25f265a2
dotnet-sdk-dbg-10.0-10.0.104-1.el9_7.x86_64.rpm
3c1a64180f83bca425a90fa1a2b4bb8ee9de5e3f28a2a4abdd255a1a2c85c821
dotnet-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm
a87b3a430b965539d4cd065a0f591cd2d63e2a28c45ada4b0821207eac9d63de
dotnet-templates-10.0-10.0.104-1.el9_7.x86_64.rpm
b932eb050946aeb15ed97c78206ed3853c7381c21fc2a88ddc34cc5763ee5169
RLSA-2026:4456
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.115 and .NET Runtime 9.0.14.Security Fix(es):
* .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)
* asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm
d8823ccc05139aba2986999b6576c2c6f5dde8dcc9f83b03fe56ef983746ce28
aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm
cb093bbe7c1c1dfb9100f26dc4568f857582cffa53d0ce929a79a493b53c01be
aspnetcore-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm
5f57117bf04c2eb0e3faee0409dfb2e070924b6cb970a73aaf40af110dac5ca1
dotnet-apphost-pack-9.0-9.0.14-1.el9_7.x86_64.rpm
65ed1d8273a61fa45846fbe9b49668fc8b3fc47908c096e2774f78fd04cb09fe
dotnet-hostfxr-9.0-9.0.14-1.el9_7.x86_64.rpm
a6b5a8d39139e330f6cc8877e17642928d04cf9357b7ba5a664fac5680476037
dotnet-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm
59b0561950f6d8991a0cad84b3e0a1f5d9b66c386d913cc405e9e2e8214d4d57
dotnet-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm
3872b63d5e20ab9d283747b3842660b7294bf55ffe2719e0c046374740acfaf0
dotnet-sdk-9.0-9.0.115-1.el9_7.x86_64.rpm
12e55425fc65cea56f7331ec30ea52884a92c4e15be11cb24cf47e884f741fe2
dotnet-sdk-aot-9.0-9.0.115-1.el9_7.x86_64.rpm
9b41eebec8b4bc4e1804bcb06dd0a67ecdab0ed8a02f9ec608a66b8df5da8db1
dotnet-sdk-dbg-9.0-9.0.115-1.el9_7.x86_64.rpm
4b9de38d9535c7825f87ede800f2522dff7bb6d6768605e2ddbdd11091b3a697
dotnet-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm
387a7bda5f588a24bb33f2070da0e5fbb43576ff4802d19c05dc8133f41c0b2c
dotnet-templates-9.0-9.0.115-1.el9_7.x86_64.rpm
cfb43619a4ada9002e384f9ab4d1e1f221fabd5d7ccc57ad879ef7f41a1a781e
netstandard-targeting-pack-2.1-9.0.115-1.el9_7.x86_64.rpm
b8ca51eb458b9b56c1a310900cca6efac9e5a8f6608b87ded44dacf6105ec57a
RLSA-2023:7754
Moderate: pixman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for pixman.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pixman is a pixel manipulation library for the X Window System and Cairo.
Security Fix(es):
* pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (CVE-2022-44638)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
pixman-0.40.0-6.el9_3.i686.rpm
da487fd3e58203be67933398e63c88a0cf584b78e29870f178a0419e1903d30b
pixman-0.40.0-6.el9_3.x86_64.rpm
f90f7b61c355aae65c1c94ab19a6538212ba4f64236457fee42793710331321c
pixman-devel-0.40.0-6.el9_3.i686.rpm
033ada248bb6ae729bef27027af04e91c8f9ce6f4ca5d229125dcc17301dd41b
pixman-devel-0.40.0-6.el9_3.x86_64.rpm
c156955e73d9edf4b78c13a26a44dcc1970a15f82c070d20b704f266fce9f9c8
RLSA-2026:6621
Moderate: crun security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for crun.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
crun is a OCI runtime
Security Fix(es):
* crun: crun: Privilege escalation due to incorrect parsing of the `--user` option (CVE-2026-30892)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
crun-1.27-1.el9_7.x86_64.rpm
cd6f649d64489e9424eb65e2b6104a5af47e18e283cb86c8404b9e4e645c0a9d
RLSA-2026:7259
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
git-lfs-3.6.1-8.el9_7.x86_64.rpm
9148ce9046010148679bb1d0a9059ef8dc89c48a4a680e8dfa2566a51dbce096
RLSA-2026:5930
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)
* firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)
* firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695)
* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689)
* firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)
* firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716)
* firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684)
* firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)
* firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)
* firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)
* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690)
* firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)
* firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)
* firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699)
* firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693)
* firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)
* firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)
* firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694)
* firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720)
* firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)
* firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)
* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.9.0-1.el9_7.x86_64.rpm
2fdd178898a8771b5ae1472c4d22ca058d49c141bb254582b545ff1520450b4c
firefox-x11-140.9.0-1.el9_7.x86_64.rpm
4aeaba135afa189d42bbc9467fa1f65b900ae5a1e458e2abc865679f710057b9
RLSA-2026:5942
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for golang.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)
* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
golang-1.25.8-1.el9_7.x86_64.rpm
ad3275ca3d6003da5239b775d91d0923c0eb698be58409c770f3fa9786d623cf
golang-bin-1.25.8-1.el9_7.x86_64.rpm
1595d35beb583df2b5e0b3f2fa023cc4a8aa5609ff2f16971165c6a4f0fb92a6
golang-docs-1.25.8-1.el9_7.noarch.rpm
5cbedfe3de06872b04868a912aa94e76c4ae69adf5a90d378327467b005f5432
golang-misc-1.25.8-1.el9_7.noarch.rpm
6e23247c2b919e0578e01807b69b8d5577d5c5bdc28d720e508eba8d967d2fb4
golang-race-1.25.8-1.el9_7.x86_64.rpm
dc727e2da1ea8cb984f20967ffabd04fae4600ca75a9685b11429c666f6f7584
golang-src-1.25.8-1.el9_7.noarch.rpm
dfbc268ece632fcaed1da74be97b34e4e691d83861ee4a3a360a2da14b0aeab8
golang-tests-1.25.8-1.el9_7.noarch.rpm
33a45eea88b0ee22cbd2e578089bfbf8e892ca04cf6f2d815b2aa85f16206b84
go-toolset-1.25.8-1.el9_7.x86_64.rpm
facaef8f3f433859fc4b1e68dc0e3d6ca4d2f03a42a04ca8522043b4ef9329f8
RLSA-2026:6188
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)
* firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)
* firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695)
* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689)
* firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)
* firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716)
* firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684)
* firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)
* firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)
* firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)
* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690)
* firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)
* firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)
* firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699)
* firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)
* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693)
* firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)
* firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)
* firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694)
* firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720)
* firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)
* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)
* firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)
* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687)
* thunderbird: Out of bounds read in IMAP parsing (CVE-2026-4371)
* thunderbird: Spoofing issue in Thunderbird (CVE-2026-3889)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.9.0-1.el9_7.x86_64.rpm
381c039c75325bddcc883423d2041507a03aec3c8178e66aef7c92b42cb9a4b5
RLSA-2026:6266
Moderate: libxslt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for libxslt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism.
Security Fix(es):
* libxslt: Processing web content may disclose sensitive information (CVE-2023-40403)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libxslt-1.1.34-14.el9_7.1.i686.rpm
47cfd3e89c1c3dd4eaa70a403d8a4518a0c8ec61864d998d29d2a82c389d27cf
libxslt-1.1.34-14.el9_7.1.x86_64.rpm
c9dce3b7ada520a554cd54d436971fda680fea7f9ee1b33f958dbcf3b33a112c
libxslt-devel-1.1.34-14.el9_7.1.i686.rpm
efd975c433461fc081ff7f567fe5a6deb22195d6a1ed6b8e31cad746dc7a5061
libxslt-devel-1.1.34-14.el9_7.1.x86_64.rpm
ad77afc0fb88d761484951c331f4802f8d4469a33d8a684d0a75b43227e55b21
RLSA-2026:4828
Moderate: mysql security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mysql.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21941)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21948)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2026) (CVE-2026-21936)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21968)
* mysql: DDL unspecified vulnerability (CPU Jan 2026) (CVE-2026-21937)
* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2026) (CVE-2026-21964)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
mysql-8.0.45-1.el9_7.x86_64.rpm
f85c8ae89b75be221811a19efa3f7821fd9546a13348aadac2de6c3403ee490c
mysql-common-8.0.45-1.el9_7.x86_64.rpm
180cfb20cf3346e0ff88568ab97e2425aae0a98ad1b17955bb84644fa9ba6b59
mysql-errmsg-8.0.45-1.el9_7.x86_64.rpm
5f660fce8be51812f5a06fecb189f5cd3fa405f5ed48675597ea8abbc24c0884
mysql-libs-8.0.45-1.el9_7.x86_64.rpm
fbdc4f8b39acf0191d349a68a99140b4d708777992fa0c78baf5f2a97a900df3
mysql-server-8.0.45-1.el9_7.x86_64.rpm
f9457f78d1936fc1e7a4780f671b55ab1289601c793c9d83973be345fce3c241
RLSA-2026:6286
Important: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.13-5.2.el9_7.x86_64.rpm
d435f267c79dcf4b2087fbf752f1df0edbac0f2ea932bb90f1501542274ac576
python3.11-devel-3.11.13-5.2.el9_7.i686.rpm
49cee3c7bb16065de0bbddaaf1b7aa96e01b89a5f98079381ff8650e2f65c29a
python3.11-devel-3.11.13-5.2.el9_7.x86_64.rpm
e218fa892ffe40f0eef757e9832ac0ece5deb71fa39dfa48e35fff91a748290a
python3.11-libs-3.11.13-5.2.el9_7.i686.rpm
a31103df17da04e16326f371dfdbf577fb476c472c2f2235cec97b744ea38e19
python3.11-libs-3.11.13-5.2.el9_7.x86_64.rpm
9fcf2f2bb024115dfd7b76729e35a39c9f1df01abca3bf3ce3a9f31d07da941b
python3.11-tkinter-3.11.13-5.2.el9_7.x86_64.rpm
35d089cbcf3604612b3c5e6c472678165f15b2c1e7bcc0922ef851744bfb8003
RLSA-2026:6285
Important: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.12-4.el9_7.2.x86_64.rpm
453c795fecffc0a0a75e1ad047a8e258408759a5659c336d5a11d90455b2d912
python3.12-devel-3.12.12-4.el9_7.2.i686.rpm
b62db4ace9a1dffa1667bcc5ea085d4b6caf9d0e88cdc12e53a0399ef5a9b475
python3.12-devel-3.12.12-4.el9_7.2.x86_64.rpm
cfd2224ec31ef4142579d4f05cac1c9465d49ebc88498df3effb15b8e105fdc8
python3.12-libs-3.12.12-4.el9_7.2.i686.rpm
67ef230104bde735ae30efbdb6ec7e91f28297484870ba3c518847cb8a898a86
python3.12-libs-3.12.12-4.el9_7.2.x86_64.rpm
a78ca3ddbbfda3703d2820b502589e00ea8866e7e381e4edbae893ac7cf242c9
python3.12-tkinter-3.12.12-4.el9_7.2.x86_64.rpm
da463cf2a25ebb71679e82e7c843a5455566da794cdabf0a5faf3bf03f93644c
RLSA-2026:6300
Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gstreamer1-plugins-bad-free, gstreamer1-plugins-good, gstreamer1-plugins-ugly-free, gstreamer1-plugins-base.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* GStreamer: GStreamer: Arbitrary code execution via ASF file processing (CVE-2026-2920)
* GStreamer: GStreamer: Remote Code Execution via heap-based buffer overflow in JPEG parser (CVE-2026-3082)
* GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay (CVE-2026-3085)
* GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling (CVE-2026-2921)
* GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay (CVE-2026-3083)
* GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in RealMedia Demuxer (CVE-2026-2922)
* GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in DVB Subtitles handling (CVE-2026-2923)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gstreamer1-plugins-bad-free-1.22.12-5.el9_7.i686.rpm
ca44040a12cd1a6acfad28a5afade40ba6ad3365f88c2d040b491a72ca38f211
gstreamer1-plugins-bad-free-1.22.12-5.el9_7.x86_64.rpm
fc325893a66d707dfc6d787d789ff5fd2ce1035820732d32ade85649defaedc5
gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.i686.rpm
79564212b373a481e0eb03bf24006c0dd96f5c3bb4e2cb1e054f6e8d92970826
gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.x86_64.rpm
c8e3bd12798bc00d9c7bb82935ad15781c1f2396e30c3bf8974089be808c838b
gstreamer1-plugins-base-1.22.12-5.el9_7.i686.rpm
34fc78812301771390777e1106c076963342ce737334c833bdde5160e1004557
gstreamer1-plugins-base-1.22.12-5.el9_7.x86_64.rpm
06f28bc1141264909c59e803a0dcdc2ce32bd2b4f10b62a8bcce00f60972bce7
gstreamer1-plugins-base-devel-1.22.12-5.el9_7.i686.rpm
1edadd04054283917a982eec941c7e91ac9d3fdb1bfb5063f3a0fddb72a78644
gstreamer1-plugins-base-devel-1.22.12-5.el9_7.x86_64.rpm
491cd2c47b245be441d0c0cff86091436ecf26c9690827d52db9b3fbc4bbf1f6
gstreamer1-plugins-base-tools-1.22.12-5.el9_7.x86_64.rpm
b467df67f653ba5a583345cae374362c30d30fa08e895391a82e56c40978e106
gstreamer1-plugins-good-1.22.12-5.el9_7.i686.rpm
c948a709b269f87579577c43d6b638cc680fe0fd1d718c38b017b057ede6f068
gstreamer1-plugins-good-1.22.12-5.el9_7.x86_64.rpm
22fec0097910b90bf9037a785b19beb720a2c216050ec1ae621b3455eea9f0c4
gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.i686.rpm
5e7569521858894bf215a061b088e396a70a424adf85ccc121fe3386810d295c
gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.x86_64.rpm
7294d924832de8cac49ee3c2c40b62cc4513ce9b83d5815d3835cea641f8fe84
gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.i686.rpm
31751af0c88ac321fe7a4a861069378cae30564a82a86ef1df26589f1a4d5c6d
gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.x86_64.rpm
7041beb7ce69d0a3b74ad18e2f9130f464d889df5a225123582efc1a0cab8315
RLSA-2026:6301
Important: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for squid.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects.
Security Fix(es):
* squid: Squid: Denial of Service via heap Use-After-Free vulnerability in ICP handling (CVE-2026-33526)
* Squid: Squid: Denial of Service via crafted ICP traffic (CVE-2026-32748)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
squid-5.5-22.el9_7.4.x86_64.rpm
60f108ca4bbb2647ed09b661e4575531eaad2449d4ff100b5aea3ac26a359b0c
RLSA-2026:6340
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP heap-use-after-free (CVE-2026-22856)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22854)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22852)
* freerdp: FreeRDP: Denial of Service via FastGlyph parsing buffer overflow (CVE-2026-23732)
* freerdp: FreeRDP: Denial of Service via use-after-free in AUDIN format renegotiation (CVE-2026-24676)
* freerdp: FreeRDP has a heap-use-after-free in video_timer (CVE-2026-24491)
* freerdp: FreeRDP has a NULL Pointer Dereference in rdp_write_logon_info_v2() (CVE-2026-23948)
* freerdp: FreeRDP has a Heap-use-after-free in play_thread (CVE-2026-24684)
* freerdp: FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb (CVE-2026-24681)
* freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event (CVE-2026-24683)
* freerdp: FreeRDP has a heap-buffer-overflow in urb_select_interface (CVE-2026-24679)
* freerdp: FreeRDP has a Heap-use-after-free in urb_select_interface (CVE-2026-24675)
* freerdp: FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages (CVE-2026-31806)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.11.7-1.el9_7.5.x86_64.rpm
d66c79efd9c0ba0539f760ee10065ec949b81ffde51e19972dd8d4a64c02a74a
freerdp-libs-2.11.7-1.el9_7.5.i686.rpm
772d2c049403d826b9a99f3de9e3ee44d096ab607376215e4902d3f48c240b53
freerdp-libs-2.11.7-1.el9_7.5.x86_64.rpm
73111aaf8fef0b5ec1ee1e82e179b9b81b4ff8f54190b5f90eaaa706d25f64fe
libwinpr-2.11.7-1.el9_7.5.i686.rpm
f96f276e2c58dc8a25666038a95763fc95e523d597891c492d3b80228319861c
libwinpr-2.11.7-1.el9_7.5.x86_64.rpm
7985760a23762ac892d8060afc8fe7aaeca0912bc85f036141e5e6dd62ab1389
RLSA-2026:6382
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-19.el9_7.x86_64.rpm
821dd4ad1069ddda49b853cbac731ba625d97c7fb7ac79f33f2ac9d010a6fba8
grafana-selinux-10.2.6-19.el9_7.x86_64.rpm
a4c3f4bb8ee79170ed31273e20d744c32d3d2c6f12d883505fac5b0d4460164d
RLSA-2026:6383
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-pcp-5.1.1-13.el9_7.x86_64.rpm
eaeed36a13171a93ca106dd1cb4327dde36dd2c88d313519d8bb2eaa0b72b149
RLSA-2026:7302
Important: nodejs:22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs, module.nodejs-packaging, nodejs-packaging, module.nodejs, nodejs-nodemon, module.nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
* minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904)
* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm
f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c
nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm
40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a
nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm
0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51
nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e
v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+40150+8a155d8a.x86_64.rpm
0f7e18c67ae01ecec66391184d837e86652c3e80d0d4795a632dedbffa87490e
nodejs-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm
8c6efdd211c4d2c831c3d318c03d307a41b7164c77a19865c64ccb308cc917ab
nodejs-devel-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm
0bc4d8cb1665f8540f864a05d175773f74dec4ef47d2450af6c737921f5eb28a
nodejs-docs-22.22.2-1.module+el9.7.0+40150+8a155d8a.noarch.rpm
2879470802d8c9bdd749462dfed2066651da53f84a7692b84c14c096c8e2aaec
nodejs-full-i18n-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm
205b11310b4a6d02623c87a4fcff66daf29266d4c57e0a5404fa59e1dfdcda7e
nodejs-libs-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm
5df5fc3d84b0559a61b0d6a0c470954a6e03212395c3d638101f991d3520aa73
npm-10.9.7-1.22.22.2.1.module+el9.7.0+40150+8a155d8a.x86_64.rpm
86870ccc00e4ac63684188ebc653ae46a1e868971cbc59949a8eba7084499646
nodejs-nodemon-3.0.1-1.module+el9.7.0+40153+4d595597.noarch.rpm
60089165d5593049f992eaa6af8f75d538c9c13734cc8dd7b8f7b57554397865
nodejs-packaging-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm
b633e5ce4d8240ae950189fff640804ffd62eb882aa7bd24eddb152a9f460d6d
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm
712c40786611b05cb031ef7a0d7464a3cc2cc78a26e19886e5631caa7aeacc68
RLSA-2026:7343
Important: nginx:1.26 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for module.nginx, nginx.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)
* NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654)
* NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)
* NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nginx
nginx-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
cf37218cad07b24969db2dc31636854c596a158d900c519d101cb3b2ac726d5d
nginx-all-modules-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm
847f42c0b2c16c17cc1f1256ea848eb7f547164ba05012794998d1b2c255b0c4
nginx-core-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
55da29e93e75239f969f4f375e74f3bf89a2bc660930594df54302a632beba05
nginx-filesystem-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm
bf738af891694faa7da0a8922d7ad38443048b0d8eae316aa5af99466ab68507
nginx-mod-devel-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
b1965bae0989798cb595a1f50ea84bb817cbc806ec3eb318f3e8d9d234f1b9cb
nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
018e2c04fec3e81540955e96d387d56556772439094f09cf2695e7deab010e0b
nginx-mod-http-perl-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
b14673b032b343472dc9594e7775a33973a82ea81bac005af13d50f6f0ddad3c
nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
83b558dc165d43a90b5e1fd66077cc6ddc36eff431dcb5b1738faed148f740ab
nginx-mod-mail-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
0cfb8031baffb999a97731c70095ee8c8b698dc2c3da75bb2da4b232425f11ca
nginx-mod-stream-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm
75b684c6da0521a37ce133660bc5e7ebdb1c7be0bf6ef588773b16a983876090
nginx-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
df9675d7155fc3e98a5b3929f45e1c7bdea49753ffae65b4686b8f7e6f2c68e2
nginx-all-modules-1.26.3-2.module+el9.7.0+40149+41197f3a.1.noarch.rpm
d756e41df2dd4476f9ba99033b9b0ac7c5df925b82f2c044856efc693a5a79eb
nginx-core-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
b1518b215276b6db453764ea74e75b216075762bdf32ef748b9aaf3797c40ea1
nginx-filesystem-1.26.3-2.module+el9.7.0+40149+41197f3a.1.noarch.rpm
c2050935001a97e732596e59dd290e6a732cab203e25fa72cbb36191e6c39194
nginx-mod-devel-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
38d6681c70e033638c065f848f18a94d069a602d2d5c1b2664a4c6321b756d68
nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
39727a60a2f877abee128599546ebeff24fac23a2551b10f8422e032a0df2c01
nginx-mod-http-perl-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
40ad88ec966cfc114d24b55117bb8479d7bd806919bab28859762c613d419822
nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
dc205038cb20c6e73b5eda60b7aaaa3987862c59e0487245ddf2cc8276f2b592
nginx-mod-mail-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
7c5ec9241e59d79df6a3af2a9dd84ed52e493ebd9da13dff792ad7a1274582c0
nginx-mod-stream-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm
faf03e6036756a4b03fe5a68f8a0cf60a32f616fc5e200f9bb344c2d60eb4bd9
RLSA-2026:7350
Important: nodejs:24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for nodejs, module.nodejs-packaging, nodejs-packaging, module.nodejs, nodejs-nodemon, module.nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* nodejs: Nodejs denial of service (CVE-2026-21637)
* brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547)
* minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996)
* undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581)
* undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527)
* undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526)
* undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229)
* undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525)
* undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528)
* nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135)
* Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712)
* Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710)
* Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715)
* nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716)
* Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711)
* Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713)
* Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714)
* nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__nodejs
nodejs-nodemon-3.0.3-3.module+el9.7.0+40025+0e0cf6b2.noarch.rpm
6312725fb2193283d8b2d99e7a2ce84778cfa3a4388bf460f0dbf4bffba5225d
nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm
36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e
nodejs-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm
fcd296b571ceaef4255bc43cff56201796bc3e44a6a606881836ef99fbf7e6a5
nodejs-devel-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm
d625d2160b3235dcde4859ca029b7129996e80a3c9ab25a49f01712e71e276cd
nodejs-docs-24.14.1-2.module+el9.7.0+40151+7a588b37.noarch.rpm
8b70dc2ed5433e9c9495253197acac3002cb79279b26eb6d66e496f9bd1137cd
nodejs-full-i18n-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm
823de588593d7e938edc94a66d377ff70c1d23b97248d4379bd4af18b472091d
nodejs-libs-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm
a602bd54b8eafa7e26d7a5a932b21bd2698cbf63ae36aba61222b257536c65a2
npm-11.11.0-1.24.14.1.2.module+el9.7.0+40151+7a588b37.noarch.rpm
5bceb73b366545d8b7741137200243e825937d96ea90436ecca1f817e7c97d46
v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+40151+7a588b37.x86_64.rpm
b2d5b39ba8be9ab7350e019bf3320019cfc5bd8b9868cd0d4acea7252365e203
nodejs-packaging-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm
b633e5ce4d8240ae950189fff640804ffd62eb882aa7bd24eddb152a9f460d6d
nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm
712c40786611b05cb031ef7a0d7464a3cc2cc78a26e19886e5631caa7aeacc68
RLSA-2026:5640
Moderate: mysql:8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for mecab-ipadic, rapidjson, module.rapidjson, module.mecab-ipadic, module.mecab, mecab.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
* mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21941)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21948)
* mysql: InnoDB unspecified vulnerability (CPU Jan 2026) (CVE-2026-21936)
* mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21968)
* mysql: DDL unspecified vulnerability (CPU Jan 2026) (CVE-2026-21937)
* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2026) (CVE-2026-21964)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms__mysql
mecab-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm
355af28fc740c2f9bd77e40daf39253b621b83defb0e47516246e5e2222ca44b
mecab-devel-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm
97981caf9383f3546c68e18c5465ddc1b65a194bdf0bcf2d725e276a058b71e5
mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
7366b9dd824100c2130f78e43d9ef9b799f61934961736e3e1456abef4a3bf09
mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
3f2d04c54ece7fe5e19ac3bb076b4614722e37c476b38c80b3a6f1924325d9f9
rapidjson-devel-1.1.0-19.module+el9.7.0+40027+0df0d4e0.x86_64.rpm
6401561c10fdd4e51de5661b88bac12d5a9e20e2f738f90c429c73eb3c4fdf32
rapidjson-doc-1.1.0-19.module+el9.7.0+40027+0df0d4e0.noarch.rpm
558fcd49446a50ffea6aa4b19088b8320790c540f80e469ff9a170af7e1f2a34
RLSA-2026:9692
Important: webkit2gtk3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for webkit2gtk3.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43213)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43214)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43457)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43511)
* webkitgtk: Processing maliciously crafted web content may disclose internal states of the app (CVE-2025-46299)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20608)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20635)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20636)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20644)
* webkitgtk: A remote attacker may be able to cause a denial-of-service (CVE-2026-20652)
* webkitgtk: A website may be able to track users through Safari web extensions (CVE-2026-20676)
* webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy (CVE-2026-20643)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20664)
* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2026-20665)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2026-20691)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-28857)
* webkitgtk: A malicious website may be able to process restricted web content outside the sandbox (CVE-2026-28859)
* webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack (CVE-2026-28871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
webkit2gtk3-2.52.3-0.el9_7.1.x86_64.rpm
8b43c3f4117c7d5af7147f827a269d10ec11d993ed31ba11e36561dafde6dbe3
webkit2gtk3-devel-2.52.3-0.el9_7.1.i686.rpm
0640d9a0a711a6aea80ccf1076b954748e6dbf404e5a8307899535cdf727419d
webkit2gtk3-devel-2.52.3-0.el9_7.1.x86_64.rpm
7da68edbe53140a43a082e9e026e86808828fc3b156f386bdbec0c86d4666fd6
webkit2gtk3-jsc-2.52.3-0.el9_7.1.i686.rpm
8506d7e56fa0d37fb23bd7f61e134293fe75d66564ce2ada239300a955c04534
webkit2gtk3-jsc-2.52.3-0.el9_7.1.x86_64.rpm
0ea56e8449332fd1298b3fe277e5b8a08f98dd60b7c5b2497118932f6188a783
webkit2gtk3-2.52.3-0.el9_7.1.i686.rpm
f21808baceaf0311ef03b41e63081d2a0abccc6cebc8147cb71de522f5587be8
webkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.i686.rpm
34bfa44075ef6773898934dc1b3fb072adc4d6885ece0ed7731df168b702e232
webkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.x86_64.rpm
4071b42ae017b7853f52e7fab1e4579ddc34b4197d84207000496ad1ad80eebc
RLSA-2026:11360
Important: LibRaw security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for LibRaw.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).
Security Fix(es):
* LibRaw: LibRaw: Arbitrary code execution via a specially crafted malicious file (CVE-2026-24450)
* LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading (CVE-2026-21413)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
LibRaw-0.21.1-2.el9_7.i686.rpm
fcdf8037282015d49bf1e5325ebd27868405996678fa5a8949b830be1c1ef402
LibRaw-0.21.1-2.el9_7.x86_64.rpm
36dc163d7ce20a2ced93b53b4639deba0d2a79cf8448a98c1c5dd0e480291d7e
RLSA-2026:10757
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6772)
* firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-6754)
* firefox: thunderbird: Spoofing issue in the DOM: Core & HTML component (CVE-2026-6762)
* firefox: thunderbird: Incorrect boundary conditions in the WebRTC component (CVE-2026-6752)
* firefox: thunderbird: Other issue in the Storage: IndexedDB component (CVE-2026-6770)
* firefox: thunderbird: Invalid pointer in the JavaScript: WebAssembly component (CVE-2026-6757)
* firefox: thunderbird: Other issue in the Libraries component in NSS (CVE-2026-6767)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150 (CVE-2026-6786)
* firefox: thunderbird: Incorrect boundary conditions in the WebRTC component (CVE-2026-6753)
* firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-6759)
* firefox: thunderbird: Use-after-free in the WebRTC component (CVE-2026-6747)
* firefox: thunderbird: Information disclosure due to uninitialized memory in the Graphics: Canvas2D component (CVE-2026-6749)
* firefox: thunderbird: Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6766)
* firefox: thunderbird: Privilege escalation in the Networking component (CVE-2026-6761)
* firefox: thunderbird: Mitigation bypass in the File Handling component (CVE-2026-6763)
* firefox: thunderbird: Privilege escalation in the Graphics: WebRender component (CVE-2026-6750)
* firefox: thunderbird: Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6748)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150 (CVE-2026-6785)
* firefox: thunderbird: Mitigation bypass in the DOM: Security component (CVE-2026-6771)
* firefox: thunderbird: Incorrect boundary conditions in the DOM: Device Interfaces component (CVE-2026-6764)
* firefox: thunderbird: Information disclosure in the Form Autofill component (CVE-2026-6765)
* firefox: thunderbird: Privilege escalation in the Debugger component (CVE-2026-6769)
* firefox: thunderbird: Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6751)
* firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Networking component (CVE-2026-6776)
* firefox: thunderbird: Use-after-free in the DOM: Core & HTML component (CVE-2026-6746)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.10.0-1.el9_7.x86_64.rpm
11687fca62b7bcf2110510bdcc4998941189f73e25d92f295d67bf5d4f291c69
firefox-x11-140.10.0-1.el9_7.x86_64.rpm
4a5eff2a8ed231302c42e2459059dae9cf6241345a6656c380236557a4070f3d
RLSA-2026:7671
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for firefox.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* libpng: libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)
* libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5734)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5731)
* firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics: Text component (CVE-2026-5732)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
firefox-140.9.1-1.el9_7.x86_64.rpm
a1f89641d3fc79f5f9e46b96b4fb3b94161851691ce01d4df562b6528b2a9a84
firefox-x11-140.9.1-1.el9_7.x86_64.rpm
4555b27e53404f2091dda32d1bf9eb6432dcfe7c8d56492f0502671337686fca
RLSA-2026:7679
Important: perl-XML-Parser security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for perl-XML-Parser.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This module provides ways to parse XML documents. It is built on top of XML::Parser::Expat, which is a lower level interface to James Clark's expat library. Each call to one of the parsing methods creates a new instance of XML::Parser::Expat which is then used to parse the document. Expat options may be provided when the XML::Parser object is created. These options are then passed on to the Expat object on each parse call. They can also be given as extra arguments to the parse methods, in which case they override options given at XML::Parser creation time.
Security Fix(es):
* perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files (CVE-2006-10003)
* perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input (CVE-2006-10002)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
perl-XML-Parser-2.46-9.1.el9_7.x86_64.rpm
3f2e4d12afac603c15b1cd8ed6e2e4b1a6976761bbef76ccbe87378fe1558601
RLSA-2026:7915
Important: bind9.18 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for bind9.18.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Security Fix(es):
* bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
bind9.18-9.18.29-5.el9_7.4.x86_64.rpm
6f4f48e61da186206191326b03bb2fd05b7306d59d021d629cada18209a7c72b
bind9.18-chroot-9.18.29-5.el9_7.4.x86_64.rpm
d2c8b79dcda087074599b9a4682c1f754ca676cc3d9dbe3a57f339b507b2689f
bind9.18-dnssec-utils-9.18.29-5.el9_7.4.x86_64.rpm
b94880386e49e0ecadc6f2ac915d6c67b2e17b6dceeb278a142a57adb1b2c351
bind9.18-libs-9.18.29-5.el9_7.4.x86_64.rpm
d9115b980e3035faec0dd24fed2fef4315f1f329bc86e1901f0f4831b3fae952
bind9.18-utils-9.18.29-5.el9_7.4.x86_64.rpm
ba0290a76587497ed81fbc0382e32273129720083153df423d6a79e23f6b30a9
RLSA-2026:8459
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* libpng: libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)
* libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5734)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5731)
* firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics: Text component (CVE-2026-5732)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
thunderbird-140.9.1-1.el9_7.x86_64.rpm
680b7c61a0a92b526324fef0fb884624b677c3803d5cdac1316856b48166c50a
RLSA-2026:8457
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for freerdp.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* FreeRDP: FreeRDP: Heap buffer overflow allows arbitrary code execution via crafted pixel data (CVE-2026-33984)
* FreeRDP: FreeRDP: Denial of Service via specially crafted Remote Desktop Protocol messages (CVE-2026-33983)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
freerdp-2.11.7-1.el9_7.6.x86_64.rpm
b126544c4016efc0bc9ff0285b7b0c56bdd1406418fa8576e01852f2f53f96b4
freerdp-libs-2.11.7-1.el9_7.6.i686.rpm
0e6242bdd980984236d413cfe333f2c9d57b468fa82f69139918ef02a6d91720
freerdp-libs-2.11.7-1.el9_7.6.x86_64.rpm
404fcbf4965d434a2e64030db13b3caf6a1d3e7be28e7d03be1a3ce1fd4aabae
libwinpr-2.11.7-1.el9_7.6.i686.rpm
c7b54140dab98c903abe5008331ec871a5b704a78eba574569c0999db4b59e8e
libwinpr-2.11.7-1.el9_7.6.x86_64.rpm
98bacee5651597ce5a9be11dac63a0e7bb95e0d575b7e0aa29d58d181a422591
RLSA-2026:8469
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.126 and .NET Runtime 8.0.26.Security Fix(es):
* dotnet: .NET: Security Bypass and Denial of Service Vulnerability (CVE-2026-26171)
* dotnet: .NET: Denial of Service via stack overflow (CVE-2026-32203)
* dotnet: .NET: Denial of Service via Infinite Recursion in XmlDecryptionTransform (CVE-2026-33116)
* dotnet: Dotnet: SMTP Command Injection and Header Injection via MailAddress parsing flaw (CVE-2026-32178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm
b45c607b64f6169bdc0b612243b06d5f1f66b38ef9b6b443a56e6844c3cefd31
aspnetcore-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm
2c62400379bb0e8ced1c931df885645540734995f4754ca5a6135faea7b34bea
aspnetcore-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm
7529bfec9507b2794eabb40aa6a49b5d7cfbba57fe39ab48f0f908f099b435cd
dotnet-apphost-pack-8.0-8.0.26-1.el9_7.x86_64.rpm
2592c4468d731dd5e99585908332c0f3ff31a85457bdb8cad4c6465e375fd2c0
dotnet-hostfxr-8.0-8.0.26-1.el9_7.x86_64.rpm
10ecb7ef1facbd97d54b328f83addacb6738a248c8b7bd2238fab5b64e00138e
dotnet-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm
716a34e8db4a1151f9b5f0a829d7512dea8981a6fb753c43aeab4fe3791c986e
dotnet-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm
b26d853aaf79cc8a22cc96326389b686f03b5f56aa571aa3f2ddfeafc8b2013d
dotnet-sdk-8.0-8.0.126-1.el9_7.x86_64.rpm
3485bb18dfc5ceda90c4b86f7c604f01125e11c0fcf3cd43e22b6d108dcf6440
dotnet-sdk-dbg-8.0-8.0.126-1.el9_7.x86_64.rpm
4cadedcce9b6973ec08edd6eddab1833357f88167999867f184195ee0509beff
dotnet-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm
ea7602c332a06c3d323ee0fd35a8bceb243ff33623eef2c9dc7166114d9d60bd
dotnet-templates-8.0-8.0.126-1.el9_7.x86_64.rpm
ecfb74d91db3579bce8af9ddbccc7e459b61beae5eb21f502b309ecf29cf4744
RLSA-2026:8471
Important: .NET 10.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet10.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 10.0.106 and .NET Runtime 10.0.6.Security Fix(es):
* dotnet: .NET: Security Bypass and Denial of Service Vulnerability (CVE-2026-26171)
* dotnet: .NET: Denial of Service via stack overflow (CVE-2026-32203)
* dotnet: .NET: Denial of Service via Infinite Recursion in XmlDecryptionTransform (CVE-2026-33116)
* dotnet: Dotnet: SMTP Command Injection and Header Injection via MailAddress parsing flaw (CVE-2026-32178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-10.0-10.0.6-1.el9_7.x86_64.rpm
26a8d886458a8fe6daad26093f05d25e5de0e9f2d7eb9fecaa39e41d699cc93e
aspnetcore-runtime-dbg-10.0-10.0.6-1.el9_7.x86_64.rpm
c3650dc257b5d8a15b4aacafb0a6d386cb92bb5e97d085e8d22513c3d684c1c0
aspnetcore-targeting-pack-10.0-10.0.6-1.el9_7.x86_64.rpm
2906d1806ff0640233e220dfdd88c9fc4286e4c4b9790bbdec7f944f1f9a202d
dotnet-apphost-pack-10.0-10.0.6-1.el9_7.x86_64.rpm
8b7c0168f7a2d4c12240b87476717de7ed805785ef1343fe4763814b59983c97
dotnet-host-10.0.6-1.el9_7.x86_64.rpm
f857e9bec746639571f9bed39256e52e831721d7cf8939e0a1f9407b919045d0
dotnet-hostfxr-10.0-10.0.6-1.el9_7.x86_64.rpm
88bc27072efdd561849bf2cb1b05c339de52f9058384517e8d09d0359d9ffd9b
dotnet-runtime-10.0-10.0.6-1.el9_7.x86_64.rpm
289c0149d28228affca90c9e578911bb0220c8a69b42b0e5cae8dd0c4f215d9f
dotnet-runtime-dbg-10.0-10.0.6-1.el9_7.x86_64.rpm
175dcb51bdef33bcd93e19e8dbf35da21588c7757a6631fa1f2113137543e0de
dotnet-sdk-10.0-10.0.106-1.el9_7.x86_64.rpm
7771b0973f8c06b35f13a56c3786863f2413c59857c7faf78457ea3198a3c9bb
dotnet-sdk-aot-10.0-10.0.106-1.el9_7.x86_64.rpm
b471914707263f25838c2c1b0284da3661a0e24eb408256a923582b8a32ac104
dotnet-sdk-dbg-10.0-10.0.106-1.el9_7.x86_64.rpm
6d34bc6c47409828eb843545add53958a1423170356e68bdb9ab0f2befe53a9e
dotnet-targeting-pack-10.0-10.0.6-1.el9_7.x86_64.rpm
3eb414ade4aa4661591c75424213650b5c23f7c2bd725fd1cd9a3824daa3e46f
dotnet-templates-10.0-10.0.106-1.el9_7.x86_64.rpm
af9844bc2ef9d58a0a5499a61d3f70b405594802c6c5e22e80f17c5caf376e0b
RLSA-2026:8859
Important: giflib security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for giflib.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
giflib is a library for reading and writing gif images.
Security Fix(es):
* giflib: Giflib: Double-free vulnerability leading to memory corruption (CVE-2026-23868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
giflib-5.2.1-9.el9_7.1.i686.rpm
64a412a96bbff18264e9f81f0374e99eea7d2295b563e41936a59af588964232
giflib-5.2.1-9.el9_7.1.x86_64.rpm
dbff0606f6971a56aaf0836c94afc2f4219bbd29db639fca2bd214c07438fe9b
RLSA-2026:8474
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.116 and .NET Runtime 9.0.15.Security Fix(es):
* dotnet: .NET: Security Bypass and Denial of Service Vulnerability (CVE-2026-26171)
* dotnet: .NET: Denial of Service via stack overflow (CVE-2026-32203)
* dotnet: .NET: Denial of Service via Infinite Recursion in XmlDecryptionTransform (CVE-2026-33116)
* dotnet: Dotnet: SMTP Command Injection and Header Injection via MailAddress parsing flaw (CVE-2026-32178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
aspnetcore-runtime-9.0-9.0.15-1.el9_7.x86_64.rpm
38f69113b7c8ee3e6067b77648880a3c1d034de8cb27ab1e963f228f04d99540
aspnetcore-runtime-dbg-9.0-9.0.15-1.el9_7.x86_64.rpm
fb7b8b6eb508b5cb37a6ecb0c3208be1501c1f35beca3af241b01112b63de3f5
aspnetcore-targeting-pack-9.0-9.0.15-1.el9_7.x86_64.rpm
b7dba2cea507e0d1527e0aab041ef9ff8dc9b33266a1b8c93df5fc6acc486f16
dotnet-apphost-pack-9.0-9.0.15-1.el9_7.x86_64.rpm
8657d871c3c8a5fe308af9ee52fc3f3b2ab6547ada8845862286f1a6865f202c
dotnet-hostfxr-9.0-9.0.15-1.el9_7.x86_64.rpm
18e675620d0c87886d474bbe2c799c721a2a4a07ecd48d4af417b5f97c5abddc
dotnet-runtime-9.0-9.0.15-1.el9_7.x86_64.rpm
6493c3b5879a4c7cd08c6e46ab8a6966657e1a25dc00dd72dbf80744dc56d467
dotnet-runtime-dbg-9.0-9.0.15-1.el9_7.x86_64.rpm
6fac297f1e3cc83fb39ca1f471736cd836eb913c64f044c742f897dda22a5665
dotnet-sdk-9.0-9.0.116-1.el9_7.x86_64.rpm
c207e6b667ee9082ffbfb1cb8ab38162c1c98cdad3eb4764c54e512fdc87dafd
dotnet-sdk-aot-9.0-9.0.116-1.el9_7.x86_64.rpm
6b23d5442da9c73445528ca6db01039a4a15f0a7182737ea3cbe240224e592f5
dotnet-sdk-dbg-9.0-9.0.116-1.el9_7.x86_64.rpm
1f61c438657c8f08f0ae7caad6bf41df8e50e96fd3042902d605babdedb01bd9
dotnet-targeting-pack-9.0-9.0.15-1.el9_7.x86_64.rpm
103728f9d3e5710a524cc9e2bdd9172ffb201a9115735acb6cb260bb1c3e4e16
dotnet-templates-9.0-9.0.116-1.el9_7.x86_64.rpm
bda0cc3e967de32d88cb5b7b6875ab60bdfc83049db42e9549553239d72b4143
netstandard-targeting-pack-2.1-9.0.116-1.el9_7.x86_64.rpm
dbd96b0972a08434e0dc2e787297ee7011ce9bcb1883a5d5ac53914c6bfb3feb
RLSA-2026:8841
Important: go-rpm-macros security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for go-rpm-macros.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This package provides build-stage rpm automation to simplify the creation of Go language (golang) packages. It does not need to be included in the default build root: go-srpm-macros will pull it in for Go packages only.
Security Fix(es):
* net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
go-filesystem-3.6.0-14.el9_7.x86_64.rpm
f34d40fb1cbd8b195a3c7001c019f3283b7133586ad22c761c497350c83c3edd
go-rpm-macros-3.6.0-14.el9_7.x86_64.rpm
2ddc46e30631719cfd7f82f42fe833d75978ce79089171bad0236bb1a2534874
go-rpm-templates-3.6.0-14.el9_7.noarch.rpm
eab05d8edbf316e30c5071c113f3bdd1c68a0e4c155aad295536edb6a84883ba
go-srpm-macros-3.6.0-14.el9_7.noarch.rpm
2c720e81e35aceedc3a0d93bca82799afdd3cf8615cccbbe50e0129c19681992
RLSA-2026:8888
Important: openexr security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for openexr.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR.
Security Fix(es):
* openexr: OpenEXR: Arbitrary code execution via integer overflow in EXR file processing (CVE-2026-27622)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
openexr-3.1.1-3.el9_7.1.x86_64.rpm
8a3a642294206bb479b7999fb8ff730363336f7e99d7c41a09ccfe60d2c8cd9e
openexr-libs-3.1.1-3.el9_7.1.i686.rpm
5edfde3b13ab5243cd20f7f55c76710de7a7a8da8d43821a8deef39fa06cc949
openexr-libs-3.1.1-3.el9_7.1.x86_64.rpm
5738709277211f05d46745fc3df6d12936ed0861341d58b44d2276320f48c1ee
RLSA-2026:10135
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for buildah.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object (CVE-2026-34986)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
buildah-1.41.8-3.el9_7.x86_64.rpm
76c274f2bc3619cb93801b6eb36d9c2fc3a1d71c78e66dd81f999173ad2e460f
buildah-tests-1.41.8-3.el9_7.x86_64.rpm
93597a3b033743a5155e99d4476d45f8e605439b59276c413acb8433ad0597ef
RLSA-2026:10226
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for grafana.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: Grafana: Information disclosure of data-source passwords via public dashboards (CVE-2026-27877)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
grafana-10.2.6-20.el9_7.x86_64.rpm
3e342bfe33d8d7861099d0b67b0f9d6c28ec2f0612da98afccd1ba5e53e5ef13
grafana-selinux-10.2.6-20.el9_7.x86_64.rpm
90ddbfa30b1c4c5f2b33ec1336c44bb5f85f31d619572cea3785449db93eb4bb
RLSA-2026:9689
Important: java-21-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for java-21-openjdk.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* JDK: Enhance crypto algorithm support (CVE-2026-22007)
* JDK: Improve Kerberos credentialing (CVE-2026-22013)
* JDK: Enhance Path Factories Redux (CVE-2026-22016)
* JDK: Enhance Zip file reading (CVE-2026-22018)
* JDK: Enhance certificate chain validation (CVE-2026-22021)
* JDK: Updating FreeType 2.14.1 (CVE-2026-23865)
* JDK: Enhance TLS connection handling (CVE-2026-34282)
* JDK: Enhance key generation (CVE-2026-34268)
Bug Fix(es):
* When copying files, OpenJDK 21 prefers to use the copy_file_range native function for performance reasons, only falling back to sendfile when this fails. However, in previous OpenJDK 21 releases, a response of EOPNOTSUPP (operation not supported) did not cause the JDK to fall back to sendfile. This is rectified in this release. (Rocky Linux-169617, Rocky Linux-169951, Rocky Linux-169952, Rocky Linux-169942, Rocky Linux-169953, Rocky Linux-169945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
java-21-openjdk-21.0.11.0.10-2.el9_7.x86_64.rpm
73b5d179130eba7d641bc2749c64fe2b65f79fa4d9bde12f461b002924e24856
java-21-openjdk-demo-21.0.11.0.10-2.el9_7.x86_64.rpm
5d65b603ab7b789be1689c9abf8614fc77642fe1d4dad5f8601d9b73a687ccfd
java-21-openjdk-devel-21.0.11.0.10-2.el9_7.x86_64.rpm
fce4f7df7f57fbba5984c5649ab730abfdeff58034eb42cf3982b0f9def0e63f
java-21-openjdk-headless-21.0.11.0.10-2.el9_7.x86_64.rpm
aae25c96dc9c1849efe46636a805c67cc99aa0a926edbc8b933bac46a2ec9ab6
java-21-openjdk-javadoc-21.0.11.0.10-2.el9_7.x86_64.rpm
b51a0b98a93b81e81fbe48953aa04d3c49ff9066ef5474ec381753e618cc02c2
java-21-openjdk-javadoc-zip-21.0.11.0.10-2.el9_7.x86_64.rpm
a7c1946276adae4b076c9db30ed03547bc3b7bf43f366055393b4faadb7be196
java-21-openjdk-jmods-21.0.11.0.10-2.el9_7.x86_64.rpm
cdde6fc1cc16a714ad60b8d3e880c484e91260d16f728931ccbfb5def704b22b
java-21-openjdk-src-21.0.11.0.10-2.el9_7.x86_64.rpm
489447d7361626688eeee44f7c5f2c320861aebf7e22d025aa4e1a62d2705fd5
java-21-openjdk-static-libs-21.0.11.0.10-2.el9_7.x86_64.rpm
51a0dbc67555233b101d8b77b27ab93f9f984be63c9a4e52cf34b12b3eeab35d
RLSA-2026:10708
Important: gdk-pixbuf2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.
Security Fix(es):
* gdk-pixbuf: gdk-pixbuf: Denial of Service via heap-based buffer overflow when processing a specially crafted JPEG image (CVE-2026-5201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
gdk-pixbuf2-2.42.6-6.el9_7.1.i686.rpm
ecce17b32faa333e841f07fecfd42a16e127add4bfb23fef9096963186f53349
gdk-pixbuf2-2.42.6-6.el9_7.1.x86_64.rpm
f4563cc6f9bdcc40a912bb43813d887d454af8f5e9d911dd92a62287019232eb
gdk-pixbuf2-devel-2.42.6-6.el9_7.1.i686.rpm
12c25ca7b647350886d159e0df66a2fb8cece10c10dd90e1b974ec116f24bf3e
gdk-pixbuf2-devel-2.42.6-6.el9_7.1.x86_64.rpm
40c894bc33e55353fa6e2dfdcfebdae34e2527c0f344e046e253365d0235ce07
gdk-pixbuf2-modules-2.42.6-6.el9_7.1.i686.rpm
9b8d5033c4c324eeaa8aaf5d04a1578cbeda21f06cdc829085d170dd24c60fab
gdk-pixbuf2-modules-2.42.6-6.el9_7.1.x86_64.rpm
fddd9fd1aab56b504f9df8f9b724e0959609b58cd901dcbcfff9522d8eb88159
RLSA-2026:10739
Important: tigervnc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tigervnc.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
* TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions (CVE-2026-34352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
tigervnc-1.15.0-6.el9_7.1.x86_64.rpm
77add555e1f75d079a06e54fb8fe05eba8b6a501f4f672c387b75b0d6fb65a8c
tigervnc-icons-1.15.0-6.el9_7.1.noarch.rpm
5730b5f0292b5b69f2e9d8168ff570486bc2d00dc385538036b86a1043dcea9f
tigervnc-license-1.15.0-6.el9_7.1.noarch.rpm
dc50bf5d0b2242352e43604f2c7f2239bafbb030478f41686ab0edd16f171e31
tigervnc-selinux-1.15.0-6.el9_7.1.noarch.rpm
94fe2eddbdfacb1d5c52362f6df6fe3e19405cf93f2cd389d378603179ee43eb
tigervnc-server-1.15.0-6.el9_7.1.x86_64.rpm
f86071723b0d69e6f66ef92c5695b88f4f6cc9a989fa7490470ec7a3aad409f6
tigervnc-server-minimal-1.15.0-6.el9_7.1.x86_64.rpm
2b559e3cc3f1db26948f974607d2799b88b0b2f06605fa775b4dc3dbddc8427f
tigervnc-server-module-1.15.0-6.el9_7.1.x86_64.rpm
a424c3b984070d0bed0efafab3554f070553051408cf807ccffb688491fdea23
RLSA-2026:10745
Important: python3.12 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.12.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100)
* python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.12-3.12.12-4.el9_7.3.x86_64.rpm
75007c0da836adc5ab46254a24d1501286fab84b8eaf3bab0bdfedea281d6331
python3.12-devel-3.12.12-4.el9_7.3.i686.rpm
42acc78ee6c60aedd0ac31cdd2447dda4c00197972520bcc8db6477ea3c7cf43
python3.12-devel-3.12.12-4.el9_7.3.x86_64.rpm
cbcb9e1285a7a72cea349f83e0fb42e7f2d52e6c3b7bf0a28328b47549865cbd
python3.12-libs-3.12.12-4.el9_7.3.i686.rpm
77cf8c97bcd3513ddbb350fda401cb9c87f00cea7735afda0b3ada6704a421d3
python3.12-libs-3.12.12-4.el9_7.3.x86_64.rpm
42ceb83963557ab9e12391b868e09c6651973b6fd154d84ebe675df543d8558e
python3.12-tkinter-3.12.12-4.el9_7.3.x86_64.rpm
318f7a144b72f94864e7ed683a3bab15ca2beb9eafc8b244cf07bc9b92b07ed7
RLSA-2026:10774
Important: python3.11 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for python3.11.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100)
* python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
python3.11-3.11.13-5.3.el9_7.x86_64.rpm
072abf1b97352362a6025758a1de0197591a794ab98e70c951971e35f13b95f4
python3.11-devel-3.11.13-5.3.el9_7.i686.rpm
577c67ef2ba886983705c75f51079c1c948e65aa3c37a371a0e3f4168825caa4
python3.11-devel-3.11.13-5.3.el9_7.x86_64.rpm
f3bada0864ba11ca525bc8659b4347c1d8b4bf40219f37f22a09e47fdf726856
python3.11-libs-3.11.13-5.3.el9_7.i686.rpm
672d256219b2c89c7630ddb0924e434e20d3a3c33d983d35ca4ae02a5316b27e
python3.11-libs-3.11.13-5.3.el9_7.x86_64.rpm
abd532871f40a52a9f18d67dce17c95832163d4bfee8ebeb6c66c45b04b422c3
python3.11-tkinter-3.11.13-5.3.el9_7.x86_64.rpm
a61719ee958d74ad3e842d02fdcc5f7456e468bd93fe6fd81579b4b52dab8c00
RLSA-2026:11369
Important: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-Xwayland-23.2.7-6.el9_7.x86_64.rpm
7e16b41b3b44428e34b4b87c4e61b3ce25ac07c464000ac453bf7e5b3f264d79
RLSA-2026:11388
Important: xorg-x11-server security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for xorg-x11-server.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999)
* xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001)
* xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
xorg-x11-server-common-1.20.11-33.el9_7.x86_64.rpm
3d7049f753c9ef527dbed3462ad6a11bae61ab60cfe94dc834335cc80883244e
xorg-x11-server-Xdmx-1.20.11-33.el9_7.x86_64.rpm
1b63ce87ed18d05f12e1554d304acf3e66f5f7deec532f32c3b3d1188798ecf1
xorg-x11-server-Xephyr-1.20.11-33.el9_7.x86_64.rpm
4cbd0b3196870e4381ce28440dca275fd5129cf6b8e8dcaf8ebab6de825793c7
xorg-x11-server-Xnest-1.20.11-33.el9_7.x86_64.rpm
3137ec15c088f1f2701d4776a7fb1f45de57f154539cbe233081019f1dd712f6
xorg-x11-server-Xorg-1.20.11-33.el9_7.x86_64.rpm
50538db44d826d9e6ce633be005198ac0965744d036d6e4eb945aef1cfe58f62
xorg-x11-server-Xvfb-1.20.11-33.el9_7.x86_64.rpm
5f1fe230e2adb9dc49533d09b6f5709a6f7d2eab17c140721a4c192a22a2dbe1
RLSA-2026:11504
Important: PackageKit security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for PackageKit.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PackageKit is a D-Bus abstraction layer that allows the session user to manage packages in a secure way using a cross-distribution, cross-architecture API.
Security Fix(es):
* PackageKit: race condition vulnerability leads to arbitrary package installation as root (CVE-2026-41651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
PackageKit-1.2.6-2.el9_7.x86_64.rpm
58f3309a573aad3dff2051f7647ca64dc6fa8e025e5dc7b16bb7d95dd9e7d620
PackageKit-command-not-found-1.2.6-2.el9_7.x86_64.rpm
758671e0623a215e8cdce2da4c1df0e86eed1c841a6132846b3bb91a08f27df7
PackageKit-glib-1.2.6-2.el9_7.i686.rpm
d3723b1e36a0c6c74b5a625b7c7ebfe0a3deff730ffa0ac849d08a6c4e7052ad
PackageKit-glib-1.2.6-2.el9_7.x86_64.rpm
4617b7b4d4b422044793983d40585b0b074b17ffb733aa7c70a700131b750e03
PackageKit-gstreamer-plugin-1.2.6-2.el9_7.x86_64.rpm
8683ab95290d24c1a1c3834d913e8c75f8334b80f2cbab558fff1412e079b054
PackageKit-gtk3-module-1.2.6-2.el9_7.x86_64.rpm
45a65b120a29c62088ece9ec80c99d7f9328d0d0b29eff14b4f50d5fe141f952
RLSA-2026:12271
Important: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for libtiff.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: libtiff: Arbitrary code execution or denial of service via signed integer overflow in TIFF file processing (CVE-2026-4775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-9-x86-64-appstream-rpms
libtiff-4.4.0-15.el9_7.3.i686.rpm
17d3865b0d5b31dd2d41f69a1fcfe9a910e19f032e64e8be5ead75a13455a323
libtiff-4.4.0-15.el9_7.3.x86_64.rpm
bcd33bd2363e10dd279f9ecd688777b0f7378893391fedfd048ae9719f097919
libtiff-devel-4.4.0-15.el9_7.3.i686.rpm
c1853e8392ebd87a4f4eb298891de46d8be6503abe6c4474581528dc1d20b1ef
libtiff-devel-4.4.0-15.el9_7.3.x86_64.rpm
18112c0162828c36a6eb129acb1bb23c4f9dde6e95be6583f4af4549e5d81fb4