RLBA-2022:7404 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-9-x86-64-appstream-rpms tzdata-java-2022f-1.el8.noarch.rpm 0a7ca48030df3fda59da01d6e365550ff67b508a4583d00d2f348b9a50550984 tzdata-java-2022f-1.el9_0.noarch.rpm 70571d1a7150ad2243e4fde1a8cde3212f8639b272e663d385883efcc15d8fdb RLBA-2022:8785 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-9-x86-64-appstream-rpms tzdata-java-2022g-1.el8.noarch.rpm d5799859d5ae6af11f34b5c55e385e2f26daa17a9b635a9a9446f134e31d707d tzdata-java-2022g-1.el9_1.noarch.rpm ff69047c3082c3e0a940ee04ef561126d256c588b86fc17cca3a5da1f7b8851a RLBA-2022:2682 new packages: protobuf-c Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for protobuf-c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-c-1.3.3-12.el9.i686.rpm dfb9eb68cb6b22eda56763f7856d2b74b93ee03ce762c9ec020f7ed82688c49c protobuf-c-1.3.3-12.el9.x86_64.rpm f82bae4489cf7e438599ceb47eb215634feb0d276b244f2001d8cea4ca692a8c RLBA-2022:3894 new packages: glib-networking Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib-networking. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glib-networking-2.68.3-3.el9.i686.rpm 2a7824f80e9ef343a8467dab9edd5624a6f1adaeed8dc64b05de686e987dade0 RLBA-2022:3908 new packages: python-pip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pip-21.2.3-6.el9.noarch.rpm 3e404af67d56c37dcb4e519a6e5e8c7c08a5234d5a184503690f3f021f7f05b9 RLBA-2022:3916 new packages: fonts-rpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fonts-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fonts-srpm-macros-2.0.5-7.el9.1.noarch.rpm 01b6088fbed339508161744f5d79e64c2fcf49e1ce119964e684f7d95806c3ac RLBA-2022:3921 new packages: libsemanage Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.3-2.el9.x86_64.rpm 82135ac117d5d550e8474a6b83da64f8b2d6ab6bccfceb992c93d316b8dfcb15 RLBA-2022:3928 new packages: libssh Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libssh-devel-0.9.6-3.el9.i686.rpm 1d795800662081cceade0a562111d27ef5ef4348e159b424ee76a23686150ab2 libssh-devel-0.9.6-3.el9.x86_64.rpm 70d5b1c223ec3b36545177bfaf43922ca75013cefefc07e8e3130ec62a8e6a8f RLBA-2022:3931 new packages: glib2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-5.el9.i686.rpm 63928a4f52f3b6ea0df47b1f026cf43cdcaf8167e41e2034adb9bad1b7c85413 glib2-devel-2.68.4-5.el9.x86_64.rpm c6cbd7a6cff049d075f0212b821db23b2094b5cbc796d74ac7fb9613e0e66b9c glib2-doc-2.68.4-5.el9.noarch.rpm b37e357f080d497842142df3397395a863828be611181985cb3c20011e59359d glib2-tests-2.68.4-5.el9.x86_64.rpm 84fc4ebde3e071c9b762faa1f6ace122578ba8f74a967dfa301f885da3a50cac RLBA-2022:3946 new packages: groff Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for groff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms groff-1.22.4-10.el9.x86_64.rpm a8a502bc353debca7041c3cebd95398e13ea114caeb7e27d6cd6efcda45ddf9e RLEA-2022:3950 new packages: RDMA stack Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms eth-tools-basic-11.1.0.1-5.el9.x86_64.rpm b3947161a1d1162c3f27bffbeb9472ec2abc8c386c997872f37323a6531cfa1b eth-tools-fastfabric-11.1.0.1-5.el9.x86_64.rpm 7872f68e71a82b74f5603c0e9f0a63868832ec53eeb60cb41a9b2d9807b71268 fabtests-1.14.0-1.el9.x86_64.rpm e36d032b782179581f433cff38d232daf452a337798af29fcf6b3e936b91589a ibacm-37.2-1.el9.i686.rpm 6a69b04b9c7a3c94399e55ad97b39d0e20a69ac00f17dd1d9dd4b2f2db18d713 infiniband-diags-37.2-1.el9.i686.rpm 89f1741f43d8c376ce0e353852f18acf2b30ea2b9c016bceeb7a87ea987713a9 infiniband-diags-37.2-1.el9.x86_64.rpm e387e0def15ac5f0cbbf74c7a9f3a25d32eafad9dfef3ea72b7398f74542545c libfabric-1.14.0-1.el9.i686.rpm c777ff4b8bcc42ae00182e6af9ecab707a1001373ed3811ee633d47fe1f4e1ee libfabric-1.14.0-1.el9.x86_64.rpm 9473b58a3d979c7141e046aa7cbca4598b973da241ca99d796be6d43251112ff libpsm2-11.2.206-1.el9.x86_64.rpm e65a451d7a78719b25ad9c730afa210cfc44956ac8d2d97feb6c40a79fb018e1 libvma-9.4.0-1.el9.x86_64.rpm b7e04dc525fd75a6ec736c1c4853ec4fd6f1e29769257fa296d88f0917337c4a libvma-utils-9.4.0-1.el9.x86_64.rpm cc4748b09d50fbc4ebcc5099c10993fdce11be40a78b14994329a2c1c1508381 mpich-3.4.2-1.el9.x86_64.rpm b60d94fd74a6bfe91e1a3a74170774e25945ebdf6ea828cc05117222047245a4 mpich-autoload-3.4.2-1.el9.x86_64.rpm 51d692478cc61a31eba09cb88730260fb6ba81a1ea721aad1ae57cc870873025 mpich-devel-3.4.2-1.el9.i686.rpm fd870cbc4bc676b47a37e9893db9d4579b0f321c8baa83f994fa0471df204404 mpich-devel-3.4.2-1.el9.x86_64.rpm d023ba5cb9206c515345e5595a0373befad066e56b068ffd2864ac0fb8b122ab mpich-doc-3.4.2-1.el9.noarch.rpm b025053e55946fdf789176649ee4f331793a620c640fbda8cff4a54fe76548ec mpitests-mpich-5.8-1.el9.x86_64.rpm 4f31eb15208ffcccb18e1bfb312bf0f6b40285c39ed349eb16220ed8b9e3d4b9 mpitests-mvapich2-5.8-1.el9.x86_64.rpm 0b7f8502ce42b151752d23622306ed591c20b7982cf783fb341c9c62e0313fc0 mpitests-mvapich2-psm2-5.8-1.el9.x86_64.rpm c1907a192e9447972df78a7c356dc4c28ceb7890bcd7cd1fa7c5b3e3a58100be mpitests-openmpi-5.8-1.el9.x86_64.rpm c6847c7723b2dea3f956be8723efb77538c3189122b57b1130ffbfb35c1fda43 mstflint-4.18.0-1.el9.x86_64.rpm 669111c557f49a8208c19962e8523613986545c2dcb0f81a78562e9b72422729 openmpi-4.1.1-5.el9.i686.rpm 180d5296f48865d9f1f85c10bdf1acd0c4976ec4888b0a6a42133309c5f4b8d9 openmpi-4.1.1-5.el9.x86_64.rpm 6d98dfc5deb5cdee88d704a6ba526b854fbb08c8253b117891590046d19286dd openmpi-devel-4.1.1-5.el9.i686.rpm 79905bf68d0439027ee7f581be90e82acb356671d3bb67af53c0cba2c73d82a3 openmpi-devel-4.1.1-5.el9.x86_64.rpm 9ca324456cdae9bd9fa14940ff9c90fd240bb689fea648a543090b1244ce6603 openmpi-java-4.1.1-5.el9.x86_64.rpm df37f53ba819a9037b8dbf5b8658df1be40086b2a8b5dcf25d1f908dda26a4d4 python3-pyverbs-37.2-1.el9.x86_64.rpm cb4e9ef1cd360eafbce1631b1efe76473884fd1181277322dcc564645d2f0c2b rdma-core-devel-37.2-1.el9.i686.rpm 9e1fa6d5eb9191f1a7999b850675cd9da5cada37b545883fdc54986bfac7056e rdma-core-devel-37.2-1.el9.x86_64.rpm 96b0911acb5814f53af4e3195d4ecc485fc835a5d3003d03bf6d8246f0a42db1 ucx-1.11.2-2.el9.x86_64.rpm be20b63e48fe26f31e24c4132db903257cc7ee9d1e44a31d2f38784c6e0f4a7e ucx-cma-1.11.2-2.el9.x86_64.rpm d41a61b2e51c14840b6ebc8eaf3479270d90dec0755efc5dab0afbebc0938a2c ucx-devel-1.11.2-2.el9.x86_64.rpm aca32173ee7235095a7eb0c5d39d719360d5ffb035d6550e6dee694161ef36ed ucx-ib-1.11.2-2.el9.x86_64.rpm 2f9b7c87dcc52886e20eb586ca358c02ca451b7d7ff911db16c2d1fecb56647c ucx-rdmacm-1.11.2-2.el9.x86_64.rpm 88afcca9cf164c115de4ba7d7eee2e72723f006f521ec2589e71eb9e222f6a7f RLBA-2022:3956 new packages: iscsi-initiator-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-iscsi-initiator-utils-6.2.1.4-2.git2a8f9d8.el9.x86_64.rpm 32755b2602b0989fa38de34d87060e35ad9a90f583623ecdb72ac6a0300600fd RLBA-2022:3968 new packages: efi-rpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for efi-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms efi-srpm-macros-6-2.el9_0.noarch.rpm 11dbca455e5a30f6f278303c890fecc67b372e5a084336024bddf44345512d43 RLEA-2022:3969 new packages: libseccomp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libseccomp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libseccomp-devel-2.5.2-2.el9.i686.rpm 226f07334575c8af3cf492b0ddbab94747059fb4a8d50e16fc3a01325365f42c libseccomp-devel-2.5.2-2.el9.x86_64.rpm 923325d8fa25deaac76a43b50294dbe8c9868dbde73f7006a00eb338062ac552 RLBA-2022:3982 new packages: setools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setools-4.4.0-4.el9.x86_64.rpm e5a7bc31764c0261350955c6010dd995c2267ee8eab3cc92777f3d6a667d16e2 setools-console-analyses-4.4.0-4.el9.x86_64.rpm 7a8298a24ce341ddfd009ccdcf47c276e14e87c2b7babb617faa35df6965c708 setools-gui-4.4.0-4.el9.x86_64.rpm f8f880d18af0d93914037bb9aa5106b65fca75b3d66d78420f739fee59a11cdb RLEA-2022:3986 new packages: ipset Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-6.el9.noarch.rpm 57b994484586d4f7196380cb86cb83a15f562fc48b4bef594fd32f153c0a15e8 RLBA-2022:3987 new packages: libdb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdb-devel-5.3.28-53.el9.i686.rpm 5f1be48c4284e2191519e592eede060a44f4b1b141dc687ffd09cfb8770bd648 libdb-devel-5.3.28-53.el9.x86_64.rpm db690e17ebc3759381360d8e8c1c9939f09e57c48de61e50d8fa401720c4fe11 libdb-utils-5.3.28-53.el9.x86_64.rpm 9f3362e0ba9fe4940301e3950c8228305b25def103d583002921190c3a341d34 RLBA-2022:3992 new packages: c-ares Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms c-ares-devel-1.17.1-5.el9.i686.rpm c1204b9ec075bef1acaaef12df761bc9cb64ff7293f92adfbb54ab9b05a67759 c-ares-devel-1.17.1-5.el9.x86_64.rpm 707bd78d129e9754ece7b04e353c7b37bb0428686fec8b745783f9dd203e146f RLBA-2022:4009 new packages: libgpg-error Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgpg-error. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgpg-error-devel-1.42-5.el9.i686.rpm 7f098351b4ab1c42fcc07bb704b2de85f646f94e6f655310a899d504c4ffe92d libgpg-error-devel-1.42-5.el9.x86_64.rpm 622691193f93c323eee79bfdb9e7a82dbee9d46f82ad32f93a5899489210c557 RLBA-2022:4020 new packages: numactl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numactl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms numactl-devel-2.0.14-8.el9.i686.rpm 82b2294bfa9c891e341eafcc64028e6bb22ae315041d816293aa93b0f190709b numactl-devel-2.0.14-8.el9.x86_64.rpm f955c12565a56bdf727c801c92351732c53860f92dbdad7dc04b629881e874b0 RLBA-2022:4022 new packages: xfsprogs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xfsprogs-devel-5.14.2-1.el9.i686.rpm 64c38dbb4e436a4a68322cadb9d49a8e8bffd7f79b6c09a6cdf3d29cd900501c xfsprogs-devel-5.14.2-1.el9.x86_64.rpm e1a92c9d69daaf2e8de548f72856b1da6e3e54e932d57cd3121fba43361c0ddb xfsprogs-xfs_scrub-5.14.2-1.el9.x86_64.rpm 9a47df0519b1965a11a5b787de963332bb478f126370d928a3116c00e03ce22f RLBA-2022:4032 new packages: p11-kit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for p11-kit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms p11-kit-devel-0.24.1-2.el9.i686.rpm 062f26d1babfa7d408d710a82b4881e0961dc1d7d12e441b7f65b83a1ba10909 p11-kit-devel-0.24.1-2.el9.x86_64.rpm 30ca13a104f0a8b67dee566d82ec08ae344bcabb87d9354a9ec144ed01badd5c p11-kit-server-0.24.1-2.el9.x86_64.rpm a39969b4096f36e87f25280b985eb7c8d6819a20a3cac497dea6aca0ce1c8162 p11-kit-trust-0.24.1-2.el9.i686.rpm 2b80808eee9b0299c721b172e4a91a7852969da69e9269eaf1e2292a1acc691c p11-kit-trust-0.24.1-2.el9.x86_64.rpm f3323fd8f94b5590ce6b8a191db48315eee46e1f4c5b1902b1c0b14982dc4b34 RLBA-2022:4033 new packages: kbd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kbd-legacy-2.4.0-8.el9.noarch.rpm 2bc13a805f8c4145d6693e0481a7313e1ae346ecb627e09e72430bc6021222c2 RLBA-2022:4035 new packages: lshw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lshw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lshw-gui-B.02.19.2-7.el9.x86_64.rpm 62fb52db5c4c7271d53fde49007b28d1eec8f43aa45dd06ba6eca081b273976f RLBA-2022:4038 new packages: sysfsutil Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sysfsutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sysfsutils-2.1.1-10.el9.x86_64.rpm 9cd1061690ea2e3a9de39b71a0eded891d0e507078ec4b6cde768315f94d997b RLBA-2022:4039 new packages: polkit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for polkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms polkit-devel-0.117-10.el9_0.i686.rpm 383b75374020d5c8bf6f080911a5faa2532dfa9bb6c81d633947ae1a8e566f14 polkit-devel-0.117-10.el9_0.x86_64.rpm d3dc2e8d81b8586d2d4b68ca95d73ed3fad8c01239572f8d121eca84f4a7f5d8 polkit-docs-0.117-10.el9_0.noarch.rpm 3a5c83e3d08befb5d41a078ee28c777881f4067f6e85264a307e1c4b44e21aee RLBA-2022:4040 new packages: libcap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcap-devel-2.48-8.el9.i686.rpm 0a075cc82b171e68fe5d5b1584f63c57ba7e3dca91e7e31ee0c93e3b51ca0ef7 libcap-devel-2.48-8.el9.x86_64.rpm 5d066c25c05f9075e7c763954866165e46f0a239cc0f1016a083b407ef28ee68 RLBA-2022:4049 new packages: cyrus-sasl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-sasl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-sasl-2.1.27-20.el9.i686.rpm eedec6699b4a87940eb27e13cf5bca837b15e073b0788829a856a2331e678a0c cyrus-sasl-devel-2.1.27-20.el9.i686.rpm 10c3248b56b1ac3d38db1e3bd17cd9a2d16aeae2a8e82588261d47b84fb185a8 cyrus-sasl-devel-2.1.27-20.el9.x86_64.rpm 5a8440c999fb6e405a29785458fa646f1902d2a8545c8d61bb9b14370f9f2a2b cyrus-sasl-gs2-2.1.27-20.el9.i686.rpm 49dea261834af58a68b3e82430eb93190d7826b03eae92ecb24a8957adde0ae7 cyrus-sasl-gs2-2.1.27-20.el9.x86_64.rpm 5f238d01f48a594277543e887f9c1c301730bbe880e8c6fccf8819ab2111313b cyrus-sasl-ldap-2.1.27-20.el9.i686.rpm b746d31320349dcd467205e1fa2e98ddf62d3235200593c017d9bf3c15ffdf3f cyrus-sasl-ldap-2.1.27-20.el9.x86_64.rpm 06a011c6de8eb68bd9ce70060ebf6c8b388b79502f37ff2e9696b7d24e32ed81 cyrus-sasl-ntlm-2.1.27-20.el9.x86_64.rpm dd155c50d07d3819f4f061efd58857df832baf536278bcb5d737f96e86b8213d cyrus-sasl-md5-2.1.27-20.el9.i686.rpm 25e561bc616df3ffe123b17f76c5973a66a284eab37eeb9ba471b29345bdc9eb cyrus-sasl-md5-2.1.27-20.el9.x86_64.rpm 42bd81a06a4719ab244d9950cfc767fcd94e9470fa69db24eb682d2426b671eb cyrus-sasl-ntlm-2.1.27-20.el9.i686.rpm cdc34e8611c29037c1fb7a9262a7474dadada8a483155d2a1617b16f45e02b8f cyrus-sasl-sql-2.1.27-20.el9.i686.rpm aa6268bb36578bfe503bb4a3c1a99afbfef50df55800ddb8c9c869f8e82cdc8c cyrus-sasl-sql-2.1.27-20.el9.x86_64.rpm 37c941278aa99eaeb440d6d331c1b0c2168487c7a8bc440c61ea31948324480e RLBA-2022:4050 new packages: efivar Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for efivar. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms efivar-38-2.el9.x86_64.rpm 2e839c03faaca01ee8835b836fce605fbae26898df180335e1b4a4a841182676 RLBA-2022:4052 new packages: zstd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zstd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libzstd-devel-1.5.1-2.el9.i686.rpm b33c2948b4410afbce53f17cd91e31e6c19b02aa55e56d18e7aa1cca152c0c68 libzstd-devel-1.5.1-2.el9.x86_64.rpm 34e5189a8b7d9dee4bf217254d8f76e0ace425f917779a1e976440f58269ddef RLBA-2022:4058 new packages: python-requests Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests+security-2.25.1-6.el9.noarch.rpm d172bfe1816a15e4e766bc21e11422dea8fc1cd29810cb61b69697aec377d4cd python3-requests+socks-2.25.1-6.el9.noarch.rpm d505149056986611de68458a3b88b7261e75366ce76f6d88333eb1e884ba205c RLBA-2022:4061 new packages: cifs-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cifs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pam_cifscreds-6.14-1.el9.x86_64.rpm 210199b9ba33f606b7b83f22408c9813e883d2662aee9026eb4bb767fad82eea RLBA-2022:4065 new packages: gawk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gawk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gawk-all-langpacks-5.1.0-6.el9.x86_64.rpm 6c30bc197b6bd129d814a55a107fd783377f056deab292bb3563865834513533 RLBA-2022:4068 new packages: gpgme Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gpgme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gpgmepp-1.15.1-6.el9.i686.rpm 3dbeb35df73334d7d05402aa1bce9473583ddb9c6a78641990d8138241f3eed1 gpgmepp-1.15.1-6.el9.x86_64.rpm 16fd1dca041d4c7ee76e06a3f2dc1dfcf7d6762a7ecd22d5187f1f7c78c81e46 RLBA-2022:4069 new packages: publicsuffix-list Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for publicsuffix-list. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms publicsuffix-list-20210518-3.el9.noarch.rpm 4c0910feefb71ccd2a292fc92e49a0f77e9e22e0cde2ef4d8c74a664c75c0f93 RLBA-2022:4076 new packages: usermode Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usermode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usermode-gtk-1.114-4.el9.x86_64.rpm 65a1b5743d0412834136835eb400eebcc8db9b380a657cc9fdabb9740928777e RLBA-2022:4077 new packages: lz4 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lz4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lz4-devel-1.9.3-5.el9.i686.rpm e76780f346fa6d3ac47e81220c19f0e93fd3d3344549f5fbc345be1b3c0a1f79 lz4-devel-1.9.3-5.el9.x86_64.rpm f5c1d382ad8c2f35bd0b6a973c6d6ba5b3381c0bb2ac9f60c2f1f917a692e3d5 RLBA-2022:4079 new packages: libcap-ng Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcap-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcap-ng-devel-0.8.2-7.el9.i686.rpm 3f58f98f95c7a355210ca73135689561db1c0a2caf008c97ed5f2d31d4e25679 libcap-ng-devel-0.8.2-7.el9.x86_64.rpm f92105c304b9fd5c6eb23b7925e4fcc9fa3e7259e2f75c0684a2cf150c5e1312 libcap-ng-python3-0.8.2-7.el9.x86_64.rpm a922e5f570adf9aa5ba03c4599df0993faaf1780150534f5224f770aaad7f1e6 RLBA-2022:4084 new packages: acl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for acl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libacl-devel-2.3.1-3.el9.i686.rpm 853fed957a66ff600ceda2e04d9e2e5bcc539b3189846f11eb468e732658bca0 libacl-devel-2.3.1-3.el9.x86_64.rpm c946708c4375c1971de4b99a21a768b528af9abd7ee3e808dd2911299f1baf49 RLBA-2022:4088 new packages: atlas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for atlas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atlas-devel-3.10.3-17.el9.i686.rpm 0f180b123aea7334f1f67d35f0569ee3493271c5f509b623b5f27f45b603bc6b atlas-devel-3.10.3-17.el9.x86_64.rpm bb7e1ffa9fd5df75804b55fe8ccb0e57a56d0f9420bfec5b2f312e1a99cc514d RLBA-2022:4089 new packages: attr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for attr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libattr-devel-2.5.1-3.el9.i686.rpm 5e2a332c0dca69df37b66a181fe72336d929965acb419e0eaaa7ef46cfd58d99 libattr-devel-2.5.1-3.el9.x86_64.rpm 8f7feec7090619a6b265ea4d0b7c3c94912e96438f53fa97c6a55dc913d0b3c1 RLBA-2022:4091 new packages: avahi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms avahi-glib-0.8-12.el9.i686.rpm 0e7084f12873a09279f6e8978c0e69e8a9583eb3d628a89aa420ef6b6772c207 avahi-glib-0.8-12.el9.x86_64.rpm 05a41794edc799618f3be6cfc4892fa4e49a011dfce6840a36a87509456dc1fa RLBA-2022:4097 new packages: brotli Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for brotli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms brotli-1.0.9-6.el9.i686.rpm 6e07d1422b30b1bf21d45b46c7fdb313bdf5088e4e11193c80f372f371eebec4 brotli-1.0.9-6.el9.x86_64.rpm d147c8d7be3e36ccb810e32fc65829b174fca7ed258352ab4136b2118d383e54 brotli-devel-1.0.9-6.el9.i686.rpm 45f31796c96e13733d804d74770ffce33bbd94389a6389657f941494520c330d brotli-devel-1.0.9-6.el9.x86_64.rpm f1aa9ca48d6d54da1c06dbceec119e7a13a990b50da380d78f3ecc3136b323f8 python3-brotli-1.0.9-6.el9.x86_64.rpm 5ee5dcf967aed040f2c5236b51f6b6e745e1e8a3feeeb8436ffd312196d092cb RLBA-2022:4099 new packages: bzip2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bzip2-devel-1.0.8-8.el9.i686.rpm 48702379ff945dab1188b0d3571018925bc89c78ff5598b543f110f2f755a33c bzip2-devel-1.0.8-8.el9.x86_64.rpm 3986a67c447cae27f863c6982fdb511ad003975e958cd56b6606edb3608e3210 RLBA-2022:4101 new packages: chkconfig Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chkconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ntsysv-1.20-2.el9.x86_64.rpm a074b13ec70d70e0afb4bb5f82ce010dd957ed3348c7110442f2b072a027b868 RLBA-2022:4110 new packages: dejavu-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dejavu-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dejavu-lgc-sans-fonts-2.37-18.el9.noarch.rpm 53d2eb9de0c77556dccb6e43d06d6cffaf9b5187d82695742df5659a0665d9eb dejavu-lgc-sans-mono-fonts-2.37-18.el9.noarch.rpm f9f9314e994257d630ff5bde9b574cde7e7579579a77b16fb072b02a7835bc2a dejavu-lgc-serif-fonts-2.37-18.el9.noarch.rpm 35ee3a398ca3fa855a4725a63228c006a10117b5d7b90c9b16b8a196880a0fd2 RLBA-2022:4122 new packages: freetype Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freetype. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freetype-devel-2.10.4-6.el9.i686.rpm 34442079078f80e704b80004f1ad0d0dc1e77220146f1fbf685feba6df6770ab freetype-devel-2.10.4-6.el9.x86_64.rpm a70bac8ad9c4dc1253b79ecfe21c96d8a48e643fb1f5ce9d138c84b433e20ab2 RLBA-2022:4123 new packages: fwupd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fwupd-plugin-flashrom-1.7.4-2.el9_0.x86_64.rpm 418edc05b4e9986cdf9f90e01c31241232c14af10bf00f1c0125b62d4ba1720a RLBA-2022:4126 new packages: gettext Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gettext. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gettext-common-devel-0.21-7.el9.noarch.rpm c0f131aa3b848f5b6997b52659f94c124cfc1971d94b12d287e4b316b619ef06 gettext-devel-0.21-7.el9.i686.rpm f9508b155bfd75c0ed9e9d409daae562261f4309940ddaae3f1aad93f1f4c430 gettext-devel-0.21-7.el9.x86_64.rpm 5505ea0617e9abcad1f8ffb4c00ea3098fcec16315715de8584d77a5431f4966 RLBA-2022:4127 new packages: gmp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gmp-c++-6.2.0-10.el9.i686.rpm e1c5e6c893e286d3b9cc7ebfc18169bd9e74e5a8f46c7cde5416eddac5bf0cee gmp-c++-6.2.0-10.el9.x86_64.rpm 9b8a1315442ba1b544bc2a522d43fd44771a4471956f3520c3be6ba3467cf6aa gmp-devel-6.2.0-10.el9.i686.rpm 307e7e607e4cb0fe422f6dc740ad2c4d583e3cd9efac121613e4f879e92ce7d6 gmp-devel-6.2.0-10.el9.x86_64.rpm 088450bd84c84d133c5439b35f9d4df30a0971b620d958e34d930a46b86d3d3d RLBA-2022:4128 new packages: graphite2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for graphite2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms graphite2-devel-1.3.14-9.el9.i686.rpm 72655d066b0c05de8eb60a82e71187195c109a67d9b64f3a15d88694f1518ca4 graphite2-devel-1.3.14-9.el9.x86_64.rpm 17ea3e3cc3b81fedd2e1762eb75286de5530618b42145eac3a421232873fc409 RLBA-2022:4130 new packages: gsettings-desktop-schemas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsettings-desktop-schemas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gsettings-desktop-schemas-40.0-4.el9.i686.rpm 0adb071be44cbc290e730c64f75067b46a09d9b6aeb4c9bd6665ac64cde75d7d gsettings-desktop-schemas-devel-40.0-4.el9.i686.rpm d38e472b89c1deefa03c4cad33329d179e7d406994409b21bf173c680ca13d44 gsettings-desktop-schemas-devel-40.0-4.el9.x86_64.rpm 1e80da98893bba3557998dba42a1334536cbd97751d4ac14eb07b4519a7cb508 RLBA-2022:4133 new packages: harfbuzz Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for harfbuzz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms harfbuzz-devel-2.7.4-5.el9.i686.rpm b590bd5d776972d96c80c73149138f3c1361553a929a4c2405e75b495517724f harfbuzz-devel-2.7.4-5.el9.x86_64.rpm 6b35ce049e2c6858ca7371bb9e6a3cc7e97b9de7f753245a289f5753827aa37b harfbuzz-icu-2.7.4-5.el9.i686.rpm af9cab3e056e7073a495e0c43377808cc0940a2ff3092d3ae2adf1182cab5adc harfbuzz-icu-2.7.4-5.el9.x86_64.rpm 98b9f7a9e2a286610d5a46dc61d50b4bb8ad61768028e064c9a69433df62032b RLBA-2022:4136 new packages: hwloc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hwloc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hwloc-devel-2.4.1-5.el9.i686.rpm 081ece85635adf581a939519a90965374ef34cef3820e927fc7855c9b5b6e43e hwloc-devel-2.4.1-5.el9.x86_64.rpm 2c767fa817d3bb821398592db94281adcec166aa9bcf29a193a464b224850564 hwloc-gui-2.4.1-5.el9.x86_64.rpm ae7cb9a25c86f9d0171fa690d6726f7c59dac1772a4b402302316cd6452be6c1 RLBA-2022:4137 new packages: icu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for icu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms icu-67.1-9.el9.x86_64.rpm e3caf7726874774401126f4828b39f73d8067a9dcaa2d1568df08189604ab644 libicu-devel-67.1-9.el9.i686.rpm 85e83293a0ef9f62cd394da45435cdd52f21e87b219c38c0852ca36023710b3f libicu-devel-67.1-9.el9.x86_64.rpm 6e84a1b2aeb8f20a1af1433f6e64a34b5df281fc068486c90a6739aaa0dad413 RLBA-2022:4146 new packages: json-glib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for json-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms json-glib-devel-1.6.6-1.el9.i686.rpm dd8a5d4238643c675fae02941f3da0e67386b37a954d88171216d446fac806a4 json-glib-devel-1.6.6-1.el9.x86_64.rpm 0cf8e07500254e88f602677a89117d1d1151ecc221fc74823ce8884ac8dc613e RLBA-2022:4147 new packages: keyutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keyutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keyutils-libs-devel-1.6.1-4.el9.i686.rpm 723f7cb475df87a9cfe09348ea1961fe1c90b3889f41e50aff94eed25610e5ee keyutils-libs-devel-1.6.1-4.el9.x86_64.rpm c2a9a022d38a29484dadbc6411c41804b3be6e66e32f8edb6be96b96d2d50269 RLBA-2022:4150 new packages: libaio Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libaio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libaio-devel-0.3.111-13.el9.i686.rpm 41c3de05f219a97077582b20f7c74cdbd5021e59b34d0074f81c159a0e012091 libaio-devel-0.3.111-13.el9.x86_64.rpm de69c506b7bd9db88fd96d2776ce396c8926d1489b44148dbfba92d5fc1d73ca RLBA-2022:4156 new packages: libedit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libedit-devel-3.1-37.20210216cvs.el9.i686.rpm 257c4f1afd26c21969543104abf45593a58242d5d1cde3a2dfeefc9c962692bf libedit-devel-3.1-37.20210216cvs.el9.x86_64.rpm 969c06e17148cffc6b4602a8ce31d44b48b2dc9f6c495453e47e607f15b4e944 RLBA-2022:4158 new packages: libevent Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libevent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libevent-devel-2.1.12-6.el9.i686.rpm 529e60f7c26e4470b471750b8dd92368e10112701bc66c48d02dec0665d4a31d libevent-devel-2.1.12-6.el9.x86_64.rpm 29d0135870149906f72062952fb84ab97423c7eaa1c3ef7aeaa4d3599d790086 libevent-doc-2.1.12-6.el9.noarch.rpm b5e85ca5c20132b4aa8e354a6ae80f154b66e468a4617de0872d398a557320bc RLBA-2022:4159 new packages: libffi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libffi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libffi-devel-3.4.2-7.el9.i686.rpm 408bc68d34b8006ef407f80afd76c082700b7d720172ca3de9d6eb13e69c5300 libffi-devel-3.4.2-7.el9.x86_64.rpm 34334e854639f104a07a7a46dc93ce0a5bf69fafa3e329f3899f0c75350f1733 RLBA-2022:4162 new packages: libidn2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libidn2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idn2-2.3.0-7.el9.x86_64.rpm 040ff4b3435d8c4d22081ac68e063cfc136ddfa9bc600f3d5e2f8a9bd71d6202 libidn2-devel-2.3.0-7.el9.i686.rpm 245985daac087a8cc5066f636b4f461551193594ef8b69f726896e7d1729014d libidn2-devel-2.3.0-7.el9.x86_64.rpm 69b96e13160cc133c146ec603aa5ba2ed520eb102f46f9ed4f7807bc6f877189 RLBA-2022:4167 new packages: libmodulemd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmodulemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libmodulemd-2.13.0-2.el9.x86_64.rpm ac936afebfeb0d4b88bd80facc137185431903962b63f500cf995a8cec785c61 RLBA-2022:4174 new packages: libpciaccess Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpciaccess. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpciaccess-devel-0.16-6.el9.i686.rpm aa1f440707f64a57e452df3f8a6dcaf8c4dbb139bb18352d1e842a4c273cb82a libpciaccess-devel-0.16-6.el9.x86_64.rpm 94bdaccdafebf95c387ff75fc945a0cb88594a0de94670ed56287b8e6f0d43c6 RLBA-2022:4175 new packages: libpeas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpeas-gtk-1.30.0-4.el9.i686.rpm 489d7bfc7164e5658658db3876e4e4670b1485d43fc4832c459363d7b5b8ed70 libpeas-gtk-1.30.0-4.el9.x86_64.rpm f2acb41b3edf0c015894a7edc15a4c8dca4f5376e44f969bc4a14059613205e5 libpeas-loader-python3-1.30.0-4.el9.x86_64.rpm 0fac490793e9e48716d6f78885267ff75b058df06e8ddd71e0dfd614fa2ebadb RLBA-2022:4177 new packages: libpng Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpng-devel-1.6.37-12.el9.i686.rpm 163dfef49c3bbbe0346750954b63200450c11e32cac0d8bfffa42eaab7b17f83 libpng-devel-1.6.37-12.el9.x86_64.rpm e37d649f37c0add6bbda9abe9d1a85ef833d0ebf695425698d611b99e787b81c RLBA-2022:4178 new packages: libproxy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libproxy-bin-0.4.15-35.el9.x86_64.rpm f65d66ed9bead0368c237c8f13e67fdf42a84330b8ff043ba15a6a00a2ce81f5 libproxy-gnome-0.4.15-35.el9.x86_64.rpm ec762072cfb2689fd427f1758bf3e26cc0615fb8ffb4b69ec7a266a9b944f98d libproxy-webkitgtk4-0.4.15-35.el9.x86_64.rpm 755dfff3ff2a66f42ef357387dc38428d222c7170f20e446dc8cdfd461441ac9 python3-libproxy-0.4.15-35.el9.noarch.rpm 68597798a5b04c44887ba9a0687c79b9d19012c9ded9b4ee3a7c52196cbecffe RLBA-2022:4179 new packages: libpsl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpsl-devel-0.21.1-5.el9.i686.rpm 7df7c8c0ffcdbf2d9295e65180f1e85d4bc081a96572d1223c962965756d3a3a libpsl-devel-0.21.1-5.el9.x86_64.rpm 576fee409bb894368b3ddeb462d0d8180dbe52804f9f29df280d020800dacdf6 RLBA-2022:4180 new packages: libpwquality Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpwquality. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pwquality-1.4.4-8.el9.x86_64.rpm deb49c4f6065e4e766f7d16d9cb364891e5c383482dbacaf7038d4857468f67f RLBA-2022:4190 new packages: libverto Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libverto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libverto-devel-0.3.2-3.el9.i686.rpm 9ac866008f26426c6037813ccf31b0a5b6ccec1a2b1772d1af0ed92dc242adef libverto-devel-0.3.2-3.el9.x86_64.rpm 32695a7dfc51f733feaa2c605e7685354994de1ec422efb5a19211699ee4df26 RLBA-2022:4192 new packages: libxcrypt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxcrypt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxcrypt-compat-4.4.18-3.el9.i686.rpm 4802eca3fa9e428aaaeaa58b6ea6b9c13a06e1911ddbb4c3b95c8e72b7829953 libxcrypt-compat-4.4.18-3.el9.x86_64.rpm b4c7367dfae8a3d43b33c8bc098d77931e15df21c4cde0f3727c4e5478c37829 libxcrypt-devel-4.4.18-3.el9.i686.rpm d4b6720500ea645cbb8a5037c665a7ad1ba259fdbe0b5b87a89bf60077e4f3d8 libxcrypt-devel-4.4.18-3.el9.x86_64.rpm f98951be16cb84133ac14201348a202c9884f8958f908b6040fb5db12e4dba81 RLBA-2022:4204 new packages: lzo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lzo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lzo-devel-2.10-7.el9.i686.rpm 9f02f1371fba386918c3543801d7eb158a59625f83827afdcd956dc7a49d0cf6 lzo-devel-2.10-7.el9.x86_64.rpm ff14dedc918fc41bf757ab7e55ea75bc9738ef5a47db8f13ddee0ed2acf5cbad lzo-minilzo-2.10-7.el9.i686.rpm 6218200a2edd49f6f89d479f8357638afd536a5861772bcfa6161e6aec6571a8 lzo-minilzo-2.10-7.el9.x86_64.rpm 0ad9a41d1dbe8c3a4bc58d698cf6e4d386bc7b716b5e5fed5d5320e41d672f2a RLBA-2022:4215 new packages: mpfr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpfr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mpfr-devel-4.1.0-7.el9.i686.rpm f851d487e751a4a03462b0db6f4630755c9c4b3975a2c97710022d3ff7a7212a mpfr-devel-4.1.0-7.el9.x86_64.rpm eea43e9b44351c15baff56704d53ebb3a198470d044996ea889309a366f058dd RLBA-2022:4217 new packages: mtr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mtr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mtr-gtk-0.94-4.el9.x86_64.rpm 439085e0873cdba8da6b235e194bf2dd689d45ca3f4bf11038bae6654afb4435 RLBA-2022:4219 new packages: ncurses Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ncurses. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ncurses-c++-libs-6.2-8.20210508.el9.i686.rpm 0365dc00649bb26a79b07e87798ab4a1abcc03e2bccdda968fe72636cd98063a ncurses-c++-libs-6.2-8.20210508.el9.x86_64.rpm 8112f05b88f021cd8f3dfe78cfebcf186afc31189630cbb40d695e8d4562d863 ncurses-devel-6.2-8.20210508.el9.i686.rpm bdc0e90483a60d93dd057c675825e7059d1450255f085429a9cbf570550a9d95 ncurses-devel-6.2-8.20210508.el9.x86_64.rpm 63e3cd6be1a424be25b5e871404d52c7d605cfea919336661bb77fc6f32ba8e0 ncurses-term-6.2-8.20210508.el9.noarch.rpm 217c19dc88977c1f773fee0eaff42a6c2052770b2136f2490f3415e670a400af RLBA-2022:4223 new packages: newt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for newt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms newt-devel-0.52.21-11.el9.i686.rpm aea727d28dd07c381c74cfd5947ac57f903b6c13b6b33a12a35141269a6bb376 newt-devel-0.52.21-11.el9.x86_64.rpm 7fcc61f797422d886c77f45db47bbb3249ab29ea4d318e515497816aa64b6f1c python3-newt-0.52.21-11.el9.x86_64.rpm 862b9e810decea876a98c1ed3179455d57853442d100708ef8de1343afc661f5 RLBA-2022:4234 new packages: pciutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pciutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pciutils-3.7.0-5.el9.i686.rpm 8b5c556ea438ff458082e94a36087fd5c232df06e7a20e01aaed4bcb6c03b6b3 pciutils-devel-3.7.0-5.el9.i686.rpm 624fe3d13ff71f01e6ad67c3e6efa32a83f94080ed0915eda1d7ec85e14d0561 pciutils-devel-3.7.0-5.el9.x86_64.rpm 8f8189aa3dbbf3b7586dfe1ff3202cbbeb8c20cea379107f273148c4a792385e RLBA-2022:4235 new packages: pcre Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcre-cpp-8.44-3.el9.3.i686.rpm f70d9908607890bc0f12af3adba36d84b65acde59f50f9b548c78b13715f5084 pcre-cpp-8.44-3.el9.3.x86_64.rpm c12408f0e43550f4e640ece977e1b763dcfbf7c90448ab916f4ea5b7e3540544 pcre-devel-8.44-3.el9.3.i686.rpm 070b5b27f5cd306f98e99ce0b25c57f36ed85588b1cbb1d4c8bd3627802ccb62 pcre-devel-8.44-3.el9.3.x86_64.rpm 011952dc9f39d8731f4ca1fcaa804b61f1c4616dc0fcd36c9fbc713974c224d5 pcre-utf16-8.44-3.el9.3.i686.rpm 5e11193a141f4b8c3989f0cc10ae2ced4c718785d71039211f268cb5ffcff9f7 pcre-utf16-8.44-3.el9.3.x86_64.rpm fe2e4389e7a6080148b183b067df833a44a134f942c8e4dc16d2220da7a0d636 pcre-utf32-8.44-3.el9.3.i686.rpm 9c1760f39ed6c5914e02fca8a27d4597c3add8bc2285d78aac8f4804fc3f8d2f pcre-utf32-8.44-3.el9.3.x86_64.rpm 1c711ec504e06c279911e0afa4893a904e77876ec7dff6bbfa40afed6045b6b4 RLBA-2022:4237 new packages: pkgconf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pkgconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pkgconf-1.7.3-9.el9.i686.rpm 5671e332e50ec388f06236f69271439d116f6966660a78139c45ef2f36900ac1 RLBA-2022:4239 new packages: popt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for popt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms popt-devel-1.18-8.el9.i686.rpm 4b33b035aaae97485448ce63d94e0029fddbf6898212f9cd00e46b3f7f933a51 popt-devel-1.18-8.el9.x86_64.rpm b4de7de69bea4232ab94124eac2a284137f4028eba51e91bf00a6ded180d0caf RLBA-2022:4258 new packages: quota Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for quota. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms quota-doc-4.06-6.el9.noarch.rpm de1ef75b66431c1e60095a048f68565d0fe05cf7fc669793e624a1fd82760688 quota-nld-4.06-6.el9.x86_64.rpm 06edf0df42f576f1b6c85b70cbed0fcf4d2eafa3654b7b8adbc0707bd2d91321 quota-rpc-4.06-6.el9.x86_64.rpm 7ea1d96674070491506802db9cec44ca05b96ebc77ee7bf69ebb58ec4d06f769 quota-warnquota-4.06-6.el9.x86_64.rpm 6d1c1a505c3b6f34978d0f863ea8f2e5745baca1b0c041fd5c4f4261a3b1179e RLBA-2022:4259 new packages: readline Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for readline. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms readline-devel-8.1-4.el9.i686.rpm 0cb3978d70bd6dd5cab5793b25c16d2035057fb6b83dada9a7ba97f0769b6f61 readline-devel-8.1-4.el9.x86_64.rpm 3257da5d4eb475604960d2367170f9f84919ca861d8f063ca8becd64ed23b896 RLBA-2022:4268 new packages: slang Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slang-devel-2.3.2-11.el9.i686.rpm b465a78378e3b8ce1dab6602cc86cb6f7363431e205f0d39c36394139bcb62bf slang-devel-2.3.2-11.el9.x86_64.rpm 8fbf158144d530cf1cd09210f0f6e9d49b0de86b159409c365f3673976eb152c RLBA-2022:4286 new packages: x3270 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for x3270. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms x3270-x11-4.0ga14-2.el9.x86_64.rpm b5b2c551a78e1c98af011025d71b844346c6efdd4b82cf239d07dc560a6092b1 RLEA-2022:4570 new packages: libreoffice:flatpak Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, libreoffice, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-6.el9.noarch.rpm ce6c8cfe56c662ff871191c0c476b4dfa6823ca3ac58bc3b904d977c30543316 autocorr-bg-7.1.8.1-6.el9.noarch.rpm 28fab974520eacf9d0130af30335078520fb51616cf313904eaca6e1211ff23b autocorr-ca-7.1.8.1-6.el9.noarch.rpm b889e9e02d5853027bd61b3f7e295bedc630368a331d0d55c061aedeae14488e autocorr-cs-7.1.8.1-6.el9.noarch.rpm 1b725a63b3f5fa4260a951bd63e01c85e38075697b522e4a1563f5a6a8525358 autocorr-da-7.1.8.1-6.el9.noarch.rpm aeaa8ce31a842666d12eda8a63f645d600e8652ca21f187c55ece831911d73e9 autocorr-de-7.1.8.1-6.el9.noarch.rpm 1ac5c3b48f94c8b97de1177a068586d0dab742786557b05aa790999be7a1708c autocorr-dsb-7.1.8.1-6.el9.noarch.rpm 43b54401851942f774d923d607ee6b92ce40e00bdc1051998686d8f352682f57 autocorr-el-7.1.8.1-6.el9.noarch.rpm 900d00fded7e50386e958bb396b4be2e7c29ce78b383a4939718bbd80d9e9f62 autocorr-en-7.1.8.1-6.el9.noarch.rpm b3c03d814f6e3edf030d439a1cd3980c7e53566b43a90c2df7256cfaf91c2611 autocorr-es-7.1.8.1-6.el9.noarch.rpm f1b3fd91f1064175699d7e398ae4f21c172ac45515b443903bec44249f29fbfa autocorr-fa-7.1.8.1-6.el9.noarch.rpm 0eb87f687c4e0585f2d482acbd714a487056db80ac59fa38311e8712ed012a11 autocorr-fi-7.1.8.1-6.el9.noarch.rpm 4504fc8d0eec2047273b5ebf412d560de62f969aab5c67121ad4dad14057e5ac autocorr-fr-7.1.8.1-6.el9.noarch.rpm 7aab41753920e827cc4832f78cd7905f32b6a9cfe81c8fa89c4277d44e1a7f58 autocorr-ga-7.1.8.1-6.el9.noarch.rpm b5077af0f4d902fdbd6a6008cc2eeaf5592692c7175cb6c9227fd128fca4925e autocorr-hr-7.1.8.1-6.el9.noarch.rpm 52c8d2ad1cc9842297e1a93acb9b1066dd0402f1d099ea530af4b07e01971020 autocorr-hsb-7.1.8.1-6.el9.noarch.rpm c07c724703f2cd035bf9a1b839fbcd0fec273b4f21b347b4e878abe1e1d706af autocorr-hu-7.1.8.1-6.el9.noarch.rpm d40741030523e38dff12d89a10fdc64a5132dbe0e1683047406bfa2e4bbd9b55 autocorr-is-7.1.8.1-6.el9.noarch.rpm 1ee2f74d722a494cad6d435aade3825268f70ee256d035cab287102e75b9ac5c autocorr-it-7.1.8.1-6.el9.noarch.rpm a15599e5f11db53fbc6ace60202b298c03ef6424363d7baa5681f6b047b9bc4a autocorr-ja-7.1.8.1-6.el9.noarch.rpm 29547f61deff86c925ad72f843b67ca6d1eb040de9f73f3a210facb5c96f3e95 autocorr-ko-7.1.8.1-6.el9.noarch.rpm e159b5ec70c8118e87045dda6645a5897dcd5735149d4d291b612cf3fafbd0d5 autocorr-lb-7.1.8.1-6.el9.noarch.rpm 524ce66158c00417e70ba19446da5cfa6d7e1892f29d80ac47da207e44a7c87c autocorr-lt-7.1.8.1-6.el9.noarch.rpm 87bfe485c58614f76bcb8a20f7d286cf0afae4cc29827489ecde479f190a3d4d autocorr-mn-7.1.8.1-6.el9.noarch.rpm db036528d533236eb2aa3950411aa3131a9ca25bf5fa84a978a835789c44629f autocorr-nl-7.1.8.1-6.el9.noarch.rpm daca88d9841c620164f31c68fcd3ebe4c37687bb623b25ab8e6841140e43f87a autocorr-pl-7.1.8.1-6.el9.noarch.rpm 1bfb188c4a25ff488cb548972a8e0053688172317bba5095865edfef3cab33e4 autocorr-pt-7.1.8.1-6.el9.noarch.rpm bb1115db8698f28f6d38193b72577db144bf297f2da6175dfeb12f92c4034eb6 autocorr-ro-7.1.8.1-6.el9.noarch.rpm 7b50841787247cc293b4f00308e946484d9e59ad71a2fd27693c818c7b3c9a82 autocorr-ru-7.1.8.1-6.el9.noarch.rpm 9af6af92a8f32328d8447fe48de4e4d13bb303fa41b232f4caa3906b8d5128bd autocorr-sk-7.1.8.1-6.el9.noarch.rpm 3f99a962dc8bc96871740e05d381d3d3dba1e20d3327a312f123627dd74f3b63 autocorr-sl-7.1.8.1-6.el9.noarch.rpm c542950738c2c8daa577d76c6221f59ff0832afadd3144d4665721262d7e108a autocorr-sr-7.1.8.1-6.el9.noarch.rpm 0e259d47e12c980e44e37c6650568dc6075fa542dbbe3f001373b7ba6ba66770 autocorr-sv-7.1.8.1-6.el9.noarch.rpm d45ba6db0215cce8f1014c64d6beda6284a34c9bd23ebf5f9e90357afb8a8b75 autocorr-tr-7.1.8.1-6.el9.noarch.rpm 16bbdc62d5e1377c4572d6bb113223cad4300bda44c0e9abbb9b9a44d81437fb autocorr-vi-7.1.8.1-6.el9.noarch.rpm c4e88e37bbb1c11ad934ab4b0ab3173225f7ae74ca7cbbc9e985bc0b8af419d4 autocorr-vro-7.1.8.1-6.el9.noarch.rpm 5355d79794575a6d1b616f1281bb3586ab47a9299e54e26c16b950029f136fb6 autocorr-zh-7.1.8.1-6.el9.noarch.rpm 3ddf6101b213b342dadf290dda051310f37698a9519f6090043c0c796ecda969 bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad boost-1.75.0-6.el9.x86_64.rpm c980fd99d6755fa033e45454fbe8111b00ac00fdc437eb4e071aa92a43fa3098 boost-atomic-1.75.0-6.el9.x86_64.rpm 4372ac3d5a355c212358b9345d90ddaad6896bac8cdb9234e934247031f740c4 boost-chrono-1.75.0-6.el9.x86_64.rpm 2c26ea8079bda4a745cbad97ee87b2882a03297d0b01266fc06494c3a4876a8a boost-container-1.75.0-6.el9.x86_64.rpm bb7d7f527256fe4c8d93ae80d47d7a793309177e2eb3e52741e299c802bcef72 boost-context-1.75.0-6.el9.x86_64.rpm e0bcc5077175e2d7077c20866e9c8b065c08d1f55788c4c32de21a5e3262b6f5 boost-contract-1.75.0-6.el9.x86_64.rpm 21b24563f15737dbb5497ca5e572de9c51483c90ae11963a5cd4b8ea0af68587 boost-coroutine-1.75.0-6.el9.x86_64.rpm 12012fe3b323dab4f683f503e08fca1193bee9cf5ad6fcc9924d5d028c6dae6d boost-date-time-1.75.0-6.el9.x86_64.rpm 18ddbc20be8652d959ce5d1f06d0c645b75c34c09bb8aba7a9b6bb32c2fd1bc1 boost-devel-1.75.0-6.el9.x86_64.rpm b14adc76c98872dedcd96cfccad972a6fe5a9c5db334ee9267e2090063251715 boost-fiber-1.75.0-6.el9.x86_64.rpm b0878675b810a788a1c34c07d49c8bbe49b7c0d1d02f5288643d7c4305f3c491 boost-filesystem-1.75.0-6.el9.x86_64.rpm 4fe4177f0f3f2bd3bf50c3161056823f57788ac9186ba50099df8019f9ebdf3a boost-graph-1.75.0-6.el9.x86_64.rpm 7f28d3b2cc3f7c66e3a37111324bfb877ce42fcdd08ae0e87b0ef3c33d75496b boost-iostreams-1.75.0-6.el9.x86_64.rpm 8e9d08ce0594d78c8e6eefc6b6de258250273b5dcede7e199b8a9c7ac3fe0fb0 boost-json-1.75.0-6.el9.x86_64.rpm d67e8476feef99fa5ee178784ed8418f411836f4ed9e8badbf3390a8f9ecaa79 boost-locale-1.75.0-6.el9.x86_64.rpm 8f1f9467ddc9f49321e645acd6c31b4eb930bead9bd78420afa7352c61b90b8a boost-log-1.75.0-6.el9.x86_64.rpm 1212dd390ddaf727e2faeb3b145ab59db1ee57832310665b578daf42434784f7 boost-math-1.75.0-6.el9.x86_64.rpm d336f6077834cade56425cc9f04909d8d82bcd0d77d74f47b38301fa121000e7 boost-nowide-1.75.0-6.el9.x86_64.rpm 312db07b99e0ad39438e54e111005c478abdedb21ed564d1cc206164c43b27f1 boost-numpy3-1.75.0-6.el9.x86_64.rpm a832772d13a38a30ea84b1d7cfb57dc5ec33fb0dc6edcdca6c26a22c81fe0c75 boost-program-options-1.75.0-6.el9.x86_64.rpm df80db04ccfd08c74981997300540572feb9d79f0affa0b69db4f6a632c56c80 boost-python3-1.75.0-6.el9.x86_64.rpm dbe9985e8e7433d20e7e57fc1a77d0c17501a98b7ee1c0e76a0667a89c42b7ee boost-random-1.75.0-6.el9.x86_64.rpm 99aad0758f7f84eb8e009eba615ad162d5e7e7af1095fedeebb81cb5ebea117c boost-regex-1.75.0-6.el9.x86_64.rpm f58b5ae42ff2300ee3679819d77d65cacf838a25661e37e9768e769e7188ac18 boost-serialization-1.75.0-6.el9.x86_64.rpm 5adea712f121e760b4ec9e2ef335083adb2ef9d12331dc0b6a2283986d0fb903 boost-stacktrace-1.75.0-6.el9.x86_64.rpm 5ae12107e09f9633df90a93a993365ba0c34203f1d859e1b1445063584e5198a boost-system-1.75.0-6.el9.x86_64.rpm 032af5ac0b10bd82ac1333fa9f3d22757d8bb3979526e65c82049a084eddce66 boost-test-1.75.0-6.el9.x86_64.rpm b0934c46c347f905ef9d26cd00febc3b91b1e2b680915d06fe144ccc1d8b494f boost-thread-1.75.0-6.el9.x86_64.rpm 89a7082a9cff82d5c258e52f50147b3a4b420e4309973f64c7d8a3b776ae0ddf boost-timer-1.75.0-6.el9.x86_64.rpm 4950d0ac1601c6b6734048c892c66771bfb841b5cfe6beb9809d9f44858367e2 boost-type_erasure-1.75.0-6.el9.x86_64.rpm 0d0a34110e0f172c1d127c23daa2f90520f092437d98f1a7e7dc7d5cb5112d2e boost-wave-1.75.0-6.el9.x86_64.rpm f4b0508f404566a66345dd49ea2cec48221aa23cf2b75e5ea55b502fb6c9701f Box2D-2.4.1-7.el9.x86_64.rpm 20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm 37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c dconf-0.40.0-6.el9.x86_64.rpm 094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f flute-1.3.0-27.OOo31.el9.noarch.rpm 59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308 google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4 google-noto-fonts-common-20201206-3.el9.noarch.rpm a8bfb90be7ea0f2612987cba93ff5852aad702a58294bfc625a1ef60504c64c8 google-noto-sans-armenian-fonts-20201206-3.el9.noarch.rpm a1e9e24034a98e9389e29d2591e69543b47a52e44de70ce611112e9969a2c313 google-noto-sans-avestan-fonts-20201206-3.el9.noarch.rpm e4be3b09dccada97318a64eb389f012000bd34b709e3bb411987f6ccf9d6809d google-noto-sans-bengali-fonts-20201206-3.el9.noarch.rpm 0e953e28bb61285dbd891243d5f980a041f5f71aa1e46a18cf4531d4b4f702b3 google-noto-sans-bengali-ui-fonts-20201206-3.el9.noarch.rpm 5e743aae45dd1c43f41c1b43a8c37ddd12c02e41a53131b5f5821acc95d659d8 google-noto-sans-brahmi-fonts-20201206-3.el9.noarch.rpm 1bbca7fdac53c6b5dd939861b45acc50f7b8f6fb34f43dc4311dec232e422098 google-noto-sans-carian-fonts-20201206-3.el9.noarch.rpm ae0817cd06e41eb6b182ba6f333e219318072cea66c5cecb9239c78837dedbc7 google-noto-sans-cherokee-fonts-20201206-3.el9.noarch.rpm ce89d4d0e275de48af732082a3cb86c2c31d4a25f337b74310ba6d06c2965275 google-noto-sans-coptic-fonts-20201206-3.el9.noarch.rpm 915df0c4645a4a867a0d257ff79f3ecacd396465cfd1ef7854819ef79b28c5de google-noto-sans-deseret-fonts-20201206-3.el9.noarch.rpm 0e0108d974f556c848033c27eec5c49cb426c4dc3e310642030fb26139c41466 google-noto-sans-devanagari-fonts-20201206-3.el9.noarch.rpm 7305c8e243de0bf2eb56b3a1385efb8464cc691dca0b21833841f614a00d5d38 google-noto-sans-devanagari-ui-fonts-20201206-3.el9.noarch.rpm ec83d97316b4d9817a248a1219e172f3c9faf389e8f0e8eaaf8123dfa3e29660 google-noto-sans-egyptian-hieroglyphs-fonts-20201206-3.el9.noarch.rpm c3e2763c9c403b0e79746efc4dc33ea57c27b1dec4acf0a7e6403a2cbe7b40fe google-noto-sans-ethiopic-fonts-20201206-3.el9.noarch.rpm 546d7fe7463d0648d93468508ff21ccf24b7ae84345801a76f7d4fcfe744be07 google-noto-sans-fonts-20201206-3.el9.noarch.rpm ae9f99e70fc15fb601ab08fff4297c8cd6455fa7645702115122a63289ded908 google-noto-sans-georgian-fonts-20201206-3.el9.noarch.rpm a5a354ac019d2fdfee9d937fd68858f13bc4d6e69336942a7e5e0aab2c74db44 google-noto-sans-glagolitic-fonts-20201206-3.el9.noarch.rpm df4914f52bdbf8728408894af9e17354ad342441f422b2f5c80f7349d9e1f88e google-noto-sans-gujarati-fonts-20201206-3.el9.noarch.rpm 2fdcfebbd955cf0bfa65253ac364471e75f61276d384906247460df6d8eed1c0 google-noto-sans-gujarati-ui-fonts-20201206-3.el9.noarch.rpm 0e6b4e2eb28ac886eaf311fca7886115ad6c97e4810360664c8a5cc237d7d839 google-noto-sans-gurmukhi-fonts-20201206-3.el9.noarch.rpm 6ff96e2a6ba9c64b5784cf3cb973aba36f686551a46e7cc87ffb055475cd7bd0 google-noto-sans-hebrew-fonts-20201206-3.el9.noarch.rpm 48f2448c34b9b89ca6aebec68de557dcb0d8a66ecc26315a48549a8ac3d4234e google-noto-sans-imperial-aramaic-fonts-20201206-3.el9.noarch.rpm cb129b006c95141da79db043dbe8a94d9adb5370e50c6dd81657fe092011184f google-noto-sans-kaithi-fonts-20201206-3.el9.noarch.rpm 1a49de7f49b147618e999c002c4ddb90de7c1a2d04f863b152736764876e6865 google-noto-sans-kannada-fonts-20201206-3.el9.noarch.rpm d09f2cca441def1c7191f72f09641b11549dadc9b91790c38a27730ebaeb9a5c google-noto-sans-kannada-ui-fonts-20201206-3.el9.noarch.rpm 9cb1090e24906794744b8fbd61085cbb15f4bad5402d107edfb66a7ee14c6e81 google-noto-sans-kayah-li-fonts-20201206-3.el9.noarch.rpm d15e6ddb5dddfca706282a102d6a2c6f783845498c228074b79f6d48607a44cf google-noto-sans-kharoshthi-fonts-20201206-3.el9.noarch.rpm e6eec1c838bec1a16c8741c94561fac58196c1f5b8855bf6c822bb8cfb543743 google-noto-sans-khmer-fonts-20201206-3.el9.noarch.rpm 4e376d907081e1492838ecbd77dc7db6fc93fbfbeefb61be3426578c8d247680 google-noto-sans-khmer-ui-fonts-20201206-3.el9.noarch.rpm 39693e6301bbcb50bdf0205f3f012448c1108abca4621629865b58e55ee10278 google-noto-sans-lao-fonts-20201206-3.el9.noarch.rpm 6811b3f83f25db4b8b3b8b016b81e859baa03a21af9d87a6713a769b33f522d8 google-noto-sans-lao-ui-fonts-20201206-3.el9.noarch.rpm d838265869cf8c907b1eaff6f0c84911220259b01e0f5801dafcfe5deddd68c4 google-noto-sans-lycian-fonts-20201206-3.el9.noarch.rpm 76f326ffea0bb5ca8789d08f9b4b47c70c5d627b18864fe6124a87a1b1fbc0c0 google-noto-sans-lydian-fonts-20201206-3.el9.noarch.rpm db3d946ebb39d58c56642d7dd95431109e805adbb653edc8d648ffe309ece517 google-noto-sans-malayalam-fonts-20201206-3.el9.noarch.rpm 5ca53d6023225c51964a9ffdd91e82f1368b6e483a0a1e95dc7040bb5c707254 google-noto-sans-malayalam-ui-fonts-20201206-3.el9.noarch.rpm 5a7e8ca26caa958ff76b5e2c45b1aee17e14a227f99c111510dd3fdd2b40761a google-noto-sans-mono-fonts-20201206-3.el9.noarch.rpm 59620b099a0c697039e30d078109305bfd693471f98f1277acda6e6bb3fa43d1 google-noto-sans-nko-fonts-20201206-3.el9.noarch.rpm ea4de34806aaa6e42ae581ca812d69cb00b9f66eadd1debbc4ea824683ee2f2f google-noto-sans-old-south-arabian-fonts-20201206-3.el9.noarch.rpm 54c9834c3ff8ab8ac7d6815f65786da0df1cf6e87a1fbcfef8c016a9f8fce7ca google-noto-sans-old-turkic-fonts-20201206-3.el9.noarch.rpm c1655e72c7bd03c7d5217c527c485cc3854a596df83f3859e08e0a1786b891a3 google-noto-sans-osmanya-fonts-20201206-3.el9.noarch.rpm 64de7cf019a1a3847c0d9b6c3e3405216848875e07c936efaa5a026c7556132e google-noto-sans-phoenician-fonts-20201206-3.el9.noarch.rpm 1cc279f4df79d26b8bca443bfab6278cdf8c7e48f47232cb9d93650508742e59 google-noto-sans-shavian-fonts-20201206-3.el9.noarch.rpm 158a4b65483866ab052b0e9b2e0ec395f5f2f57d6e9d82513b511426392fba1b google-noto-sans-sinhala-fonts-20201206-3.el9.noarch.rpm dcf0b96e190fedb11c7562ad122e270ec5e20f549cb1f046477022db037eb172 google-noto-sans-sinhala-vf-fonts-20201206-3.el9.noarch.rpm d16d66225be0e0d43bace67f09a282d9abe7ee73bbb4c7d645029ead12d15779 google-noto-sans-symbols-fonts-20201206-3.el9.noarch.rpm 3b41a01546208a27d619fa2d6d111e0c696f39a1af9ebffa1aee849b3a8b12d8 google-noto-sans-tamil-fonts-20201206-3.el9.noarch.rpm 00c802ecc667f1d3cff4c72fdd33fee15b4c730830eba3f6697046ef3e78b843 google-noto-sans-tamil-ui-fonts-20201206-3.el9.noarch.rpm f03a2b22d6a059ad493706a65d198ccd68aaa6c8b4013236e526087cc2a21ef3 google-noto-sans-telugu-fonts-20201206-3.el9.noarch.rpm 4e04909028d4254b90effa51545bbd001e43a0246b0dbf0ec73eb194a96d7306 google-noto-sans-telugu-ui-fonts-20201206-3.el9.noarch.rpm 3f7fc630fdd79d6710d462307cb89e77ba4a6afde81eaa6499395d4f270c0e24 google-noto-sans-thaana-fonts-20201206-3.el9.noarch.rpm 70b6dbf450d75ac6b505b1b651c0ec77fd284a15f8038fbdae0c42b3ccd99848 google-noto-sans-thai-fonts-20201206-3.el9.noarch.rpm 0c42d390c523272b0794ff561db4b6502a10fa279827ffd1912118410f4ad3a1 google-noto-sans-thai-ui-fonts-20201206-3.el9.noarch.rpm 6ae75a4ffd514b0aa88e2c950644372e92b5ab042aa8979395d63427521f841c google-noto-sans-ugaritic-fonts-20201206-3.el9.noarch.rpm c77d845a91bba11e1c04a46064efb4cc3673564c39c8dd00c13131298f981246 google-noto-sans-vai-fonts-20201206-3.el9.noarch.rpm c32d420f22fa1b0eaac7e1ec38d19db34591e91cb259f70a2aca8f1f2a193e4f google-noto-serif-armenian-fonts-20201206-3.el9.noarch.rpm 455d5825330efcdde8a3ad3450b746b92bfab9b237747dc8fffb662ab7af906b google-noto-serif-fonts-20201206-3.el9.noarch.rpm 8f79012f90202c5120c1a180a0ef598ed1a184ca56b60491f39b5ed93a606fd2 google-noto-serif-georgian-fonts-20201206-3.el9.noarch.rpm 20f968c426daa7ccf39b76482a79644e0941130d1d965b5f3c9563bdcce2efa7 google-noto-serif-gurmukhi-vf-fonts-20201206-3.el9.noarch.rpm 58c87658ae6c10c1c3db79715bebf6a2b813cb8ee7d3c2cb50cfd3f0454758c2 google-noto-serif-khmer-fonts-20201206-3.el9.noarch.rpm ee107e896b0741e3b661e8d7ad192cb9f0340eee6e780d0472de66b2799e7d6a google-noto-serif-lao-fonts-20201206-3.el9.noarch.rpm 24505c5f02d48d18f13933899386b9abbbcb4bb51a6024ad8509ee2705da1eff google-noto-serif-sinhala-vf-fonts-20201206-3.el9.noarch.rpm 2889d33838eff3bffd3b586b4bafa72828aa8c94782d1f72b0b2168d1cdea59e google-noto-serif-thai-fonts-20201206-3.el9.noarch.rpm ada2ee6b36ce8e76f50eec3e3d655ddd0396b8ee77b7d8a65b3fcdd7a0463b12 gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm 0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4 gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457 gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1 gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm 1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13 hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c hunspell-ar-3.5-15.el9.noarch.rpm c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0 hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 hunspell-ca-2.3-19.el9.noarch.rpm 98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d hunspell-cs-20080822-16.el9.noarch.rpm d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784 hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d hunspell-de-0.20161207-9.el9.noarch.rpm 3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495 hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 hunspell-et-0.20030606-27.el9.noarch.rpm 801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90 hunspell-eu-5.1-4.el9.noarch.rpm 537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38 hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 hunspell-ga-5.0-10.el9.noarch.rpm 5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73 hunspell-gl-0.20080515-24.el9.noarch.rpm 21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28 hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 hunspell-he-1.4-15.el9.x86_64.rpm 8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45 hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f hunspell-kk-1.1-22.el9.noarch.rpm c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417 hunspell-kn-1.0.3-24.el9.noarch.rpm 57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hunspell-ml-0.1-26.el9.noarch.rpm 775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b hunspell-pl-0.20180707-9.el9.noarch.rpm bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3 hunspell-pt-0.20130125-18.el9.noarch.rpm 80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 hunspell-si-0.2.1-24.el9.noarch.rpm 1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783 hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hunspell-ss-0.20091030-22.el9.noarch.rpm f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06 hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 hunspell-th-0.20061212-25.el9.noarch.rpm 400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38 hunspell-tn-0.20150904-9.el9.noarch.rpm 34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8 hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 hunspell-uk-1.8.0-9.el9.noarch.rpm 48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc hyphen-2.8.8-17.el9.x86_64.rpm 6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994 hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b hyphen-cs-20080822-16.el9.noarch.rpm 18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 hyphen-devel-2.8.8-17.el9.x86_64.rpm c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d hyphen-el-0.20051018-25.el9.noarch.rpm ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5 hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 hyphen-es-2.3-11.el9.noarch.rpm 1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218 hyphen-et-0.20030606-27.el9.noarch.rpm 4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 hyphen-fr-3.0-10.el9.noarch.rpm ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28 hyphen-ga-0.20040220-24.el9.noarch.rpm e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc hyphen-gl-0.99-23.el9.noarch.rpm 7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1 hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 hyphen-it-0.20071127-26.el9.noarch.rpm 201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9 hyphen-kn-0.7.0-19.el9.noarch.rpm 084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41 hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa hyphen-ml-0.7.0-19.el9.noarch.rpm 963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038 hyphen-mr-0.7.0-19.el9.noarch.rpm 99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef hyphen-pt-0.20021021-25.el9.noarch.rpm 0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e hyphen-ru-0.20200325-4.el9.noarch.rpm ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6 hyphen-sk-0.20031227-26.el9.noarch.rpm 7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34 hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 hyphen-sv-1.00.1-26.el9.noarch.rpm ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94 hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 libabw-0.1.3-7.el9.x86_64.rpm 57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09 libbase-1.1.3-31.el9.noarch.rpm 0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738 libcdr-0.1.7-3.el9.x86_64.rpm 416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22 libcmis-0.5.2-12.el9.x86_64.rpm a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76 libepubgen-0.1.1-9.el9.x86_64.rpm cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398 libetonyek-0.1.10-2.el9.x86_64.rpm a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806 libexttextcat-3.4.5-11.el9.x86_64.rpm 693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245 libfontenc-1.1.3-17.el9.x86_64.rpm 867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23 libfonts-1.1.3-35.el9.noarch.rpm 6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081 libformula-1.1.3-32.el9.noarch.rpm bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b libfreehand-0.1.2-11.el9.x86_64.rpm 443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d liblayout-0.2.10-25.el9.noarch.rpm 15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291 libloader-1.1.3-32.el9.noarch.rpm 76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1 libmspub-0.1.4-17.el9.x86_64.rpm 134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e libmwaw-0.3.21-1.el9.x86_64.rpm 5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927 libnumbertext-1.0.6-4.el9.x86_64.rpm ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab libodfgen-0.1.8-4.el9.x86_64.rpm 0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2 liborcus-0.16.1-8.el9.x86_64.rpm 8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec libpagemaker-0.0.4-13.el9.x86_64.rpm aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542 libqxp-0.0.2-11.el9.x86_64.rpm 68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71 libreoffice-base-7.1.8.1-6.el9.x86_64.rpm 0da41c1a40eb779f018b7403eba3ccb954207c8e4d93a4f9d4adb8dd3a3de5d6 libreoffice-calc-7.1.8.1-6.el9.x86_64.rpm fba4229246b92703fa1d631ef453ad0d7debb6c93f46d35da440f06a0d5cf9b6 libreoffice-core-7.1.8.1-6.el9.x86_64.rpm af7f7b067da3f4ccbb6244499d5b36c51bbca26e6983d65e9622d71a29b031d6 libreoffice-data-7.1.8.1-6.el9.noarch.rpm 1a1f79694f0f1a859a0c6a929c9bd8240a056304e55a2c6f4b7956f35e64092d libreoffice-draw-7.1.8.1-6.el9.x86_64.rpm b23061bb5995566e1eab89bd7bbc767944dfa363044c60a82acaeebeacbbe553 libreoffice-emailmerge-7.1.8.1-6.el9.x86_64.rpm f5ef47f2a1c663dce8723feffa472854a2cb11132878e361ba71ad46e45cccec libreoffice-filters-7.1.8.1-6.el9.x86_64.rpm 8f656b754daaf2d662ef611e8d8e3a5daac2297acaf7648d5fe70c1604cca9bb libreoffice-gdb-debug-support-7.1.8.1-6.el9.x86_64.rpm f84ce6f2818b4f8f74968aa2ce389ebb23f0e5fbab0c9454cfff6fd3c6057817 libreoffice-graphicfilter-7.1.8.1-6.el9.x86_64.rpm 63f1876528987a5b4fe3f0a4dacc679140a69e61f25d784af7e1bdaf810b65c5 libreoffice-gtk3-7.1.8.1-6.el9.x86_64.rpm 4c70ce747569e59c7796e8fed939433a22c72ea32ab386f99876a2fa59dfa71c libreoffice-help-ar-7.1.8.1-6.el9.x86_64.rpm 1028a0ec1cb1f605bbff2a2ec9e85f8290c7a3189aa0f781bbb3c7bd2417ec2a libreoffice-help-bg-7.1.8.1-6.el9.x86_64.rpm b67177e0dd1b70b6556b61316bcae21fa271f8150983c305fbc8d16d49dc1f57 libreoffice-help-bn-7.1.8.1-6.el9.x86_64.rpm efebb408a500f8f50302495e0803c49af6d1a131eb243ef1c56b30d0803972fd libreoffice-help-ca-7.1.8.1-6.el9.x86_64.rpm 9df6fc7153eac07f85ee3aaee3a7b1505dc71fd881cd18ce2f23db6005217b10 libreoffice-help-cs-7.1.8.1-6.el9.x86_64.rpm 0fadcaa47b12fbf47523a8452fc68f715901515ac5f53a396419f0c9bf62cf7a libreoffice-help-da-7.1.8.1-6.el9.x86_64.rpm c91aa7e29f35f529feeeba57485c5bc4f6553505af42fa12fba1e8d296d6d989 libreoffice-help-de-7.1.8.1-6.el9.x86_64.rpm d8ae64b86ed54f3c7bc2d1d29d3fc0dd16a775102b5797f66f4ba82db1555673 libreoffice-help-dz-7.1.8.1-6.el9.x86_64.rpm f7f80b3ff6733a2bf9567c478eee7a99f4f699c78ee7e8a481f0447f064aaac8 libreoffice-help-el-7.1.8.1-6.el9.x86_64.rpm 766109b9f2842782fa63f77615235838ea7ced0c2e33ba9e6ae15bbd85aacd93 libreoffice-help-en-7.1.8.1-6.el9.x86_64.rpm 937547cd820f927251f854da2c05f8ee0e19ceafe8d3e4bdcae43a59e39451b2 libreoffice-help-eo-7.1.8.1-6.el9.x86_64.rpm acfbccf72a2989e68095b91b13b313301246ffb6298cd50946af7f71ab48a9f6 libreoffice-help-es-7.1.8.1-6.el9.x86_64.rpm 3635ae61677ef853dfd2693899750bdddcef7674ffab37f7b8e8f93215fff11b libreoffice-help-et-7.1.8.1-6.el9.x86_64.rpm b6990dc560c0130a60fff495633118a97737d42388b177afcb2d30dbc78df940 libreoffice-help-eu-7.1.8.1-6.el9.x86_64.rpm aeccbdf6fa75a9655304e895c6f9e2d6f3e3d98fb33af66515ba2c437fc4fbf3 libreoffice-help-fi-7.1.8.1-6.el9.x86_64.rpm 2c2851be7af1643c64b1bd6ce279e184af481d39c2d01b62df1d445aec60d4b5 libreoffice-help-fr-7.1.8.1-6.el9.x86_64.rpm 3d6939e9f991c1f2543c3373924bc5eb7463943e343f1695302518a1e4ed2618 libreoffice-help-gl-7.1.8.1-6.el9.x86_64.rpm de77dff5bf97cf345a9a119b08d6cd98c291a8b30d324ed61b48c5dbb67e3e7b libreoffice-help-gu-7.1.8.1-6.el9.x86_64.rpm ec75792443e9823eda8c70068d0cdc47de23d340fa2894a967025a5ec9813e3f libreoffice-help-he-7.1.8.1-6.el9.x86_64.rpm 6f337aeedafa57e236d3f75874fc01e43edf9aad20e8a531ce234f08c0da9538 libreoffice-help-hi-7.1.8.1-6.el9.x86_64.rpm f5cc29aa6978c90517e1d6547c10ec644706409fb379dffb6a9a389497b2cb7f libreoffice-help-hr-7.1.8.1-6.el9.x86_64.rpm 9c4f0c7fc43ae24c17460d51d9cb172e9f72188ef816ea1ca2b488f98cb364ff libreoffice-help-hu-7.1.8.1-6.el9.x86_64.rpm ddb359b2abaa08de94b4f0cd713f59c23416ae6fccf4c303183a9386dabf9dd7 libreoffice-help-id-7.1.8.1-6.el9.x86_64.rpm b4dad685e2a70c5f11afb4d030cc18477ceed175ee332287750f7009331ac113 libreoffice-help-it-7.1.8.1-6.el9.x86_64.rpm f4ea97101b45ec9739dcf46851ae45c8ea2d4539ba054bb94ab274c45a406f4e libreoffice-help-ja-7.1.8.1-6.el9.x86_64.rpm ddfca2cbe2d1535bd1398e7d1687a3f1f6c45920bb5dc7fdab21ca4d099e51ee libreoffice-help-ko-7.1.8.1-6.el9.x86_64.rpm eb08f4bb6a7d5e3a1dfeba47094afa7c993627fe76afa40d1f160eb24fb2446e libreoffice-help-lt-7.1.8.1-6.el9.x86_64.rpm e728dd68f22179fea0447fe383187851776aac62bf2c6a5f216f3ba7c33c2f19 libreoffice-help-lv-7.1.8.1-6.el9.x86_64.rpm 19912fe2ebd55c517ff4c825265593a33d5c0b032a408e1288ce0c5c1a60d2ca libreoffice-help-nb-7.1.8.1-6.el9.x86_64.rpm a7e491ae91343b31722938a7ffdd4053ce64a55df6ccf173a21863602fa0ccec libreoffice-help-nl-7.1.8.1-6.el9.x86_64.rpm 96bbf0878dc0de73405f94528ea21a92a3d935f99553e0b9c1b8dc9edb359431 libreoffice-help-nn-7.1.8.1-6.el9.x86_64.rpm 6c9dcb8f415242013ba997306c5a702138095471bcf24294963956d04aaff671 libreoffice-help-pl-7.1.8.1-6.el9.x86_64.rpm fe41abb248ba9c13cd6e223b9927566782d7492067fb58a65d9659bd3a931a71 libreoffice-help-pt-BR-7.1.8.1-6.el9.x86_64.rpm 190a04c015940d4b733ffdc6be381a854684c219ddd71d35dd5b34adfe46c500 libreoffice-help-pt-PT-7.1.8.1-6.el9.x86_64.rpm 4ec4cd694ebe836d8aba4f1a6b8a07ea7756f44b57a9a2bc32bc41de5920935c libreoffice-help-ro-7.1.8.1-6.el9.x86_64.rpm b0174d88eb87a58117e1543a2b9dbd7213d41c046d95fead5a8172c1cfd8406c libreoffice-help-ru-7.1.8.1-6.el9.x86_64.rpm f74e5ad0fcea1727d39c55bf902710c726ff268e90c8f712698d748d6bd90184 libreoffice-help-si-7.1.8.1-6.el9.x86_64.rpm 0ed3caeb7e2576ba0a46ee66f1d71a8b42cd2d24bdf4241c70b35f4636b41e9f libreoffice-help-sk-7.1.8.1-6.el9.x86_64.rpm b1103e02f23f845a2e57808b998e6c729bea2a0d5f8aaef02ef82d0a9b78d21b libreoffice-help-sl-7.1.8.1-6.el9.x86_64.rpm 63befeaaba51dea23b9ca071caa37518c1b6ec0c7c0a4f09f3b28d3be9072cbc libreoffice-help-sv-7.1.8.1-6.el9.x86_64.rpm f31b9892e469990521795d144631c4d14a3d0a7a406a74ed7ef614b8427a2a15 libreoffice-help-ta-7.1.8.1-6.el9.x86_64.rpm a1c1474c9c14493341704b507fed27364c56d50384ab849aac6f785fbd3b87b0 libreoffice-help-tr-7.1.8.1-6.el9.x86_64.rpm 230937ddaa0df35f777ed7b896a5e3db4f574c624b6b44dff7d2d8f8a050640f libreoffice-help-uk-7.1.8.1-6.el9.x86_64.rpm 3253d9dc5993f28fc858a1666592ba2c588897699994796529fb15f97fc9e8d9 libreoffice-help-zh-Hans-7.1.8.1-6.el9.x86_64.rpm 6d23c670a74f03e9be56730f5045d7512364e0343322e8efe8f9cb2dd9e058a4 libreoffice-help-zh-Hant-7.1.8.1-6.el9.x86_64.rpm 2659f235e2e9a3e8b089627bbb02537d3122541e7803f3adaeac16c5d3fff641 libreoffice-impress-7.1.8.1-6.el9.x86_64.rpm c112dcafd162e091b010df1fbd15f888f6c9eebb6458fed6cf26d74beb29ed66 libreofficekit-7.1.8.1-6.el9.x86_64.rpm 8774216ce8c3889496abada6708c411a2ec085563b8a49ce43e5cacef160838c libreoffice-langpack-af-7.1.8.1-6.el9.x86_64.rpm ebc1fbe0d26c9e6da4c7a70d2a5a57f275f3906abb0069af9aaf7d073679bb42 libreoffice-langpack-ar-7.1.8.1-6.el9.x86_64.rpm b019e3835d1cfe05c324d5b96f8756756f9a9dbf87e05c72c1a78efb3076fe92 libreoffice-langpack-as-7.1.8.1-6.el9.x86_64.rpm 202375433b8e8f1a96748b2a16fb1c8139f025335ebc53202d844c35442d7cbe libreoffice-langpack-bg-7.1.8.1-6.el9.x86_64.rpm 3e2898e0eee12437a5e39b74c63b4ae8ca9ed59bbb7987d5255d26da77b34e9f libreoffice-langpack-bn-7.1.8.1-6.el9.x86_64.rpm 32385d92a1031f3767c07f901dd58f1df9f08512bb393648fc26de70e51d7626 libreoffice-langpack-br-7.1.8.1-6.el9.x86_64.rpm 95b4463a3c9aa4cbb7fe3100ae40ca6591a747d1dd11f94e455bdd3702fa2470 libreoffice-langpack-ca-7.1.8.1-6.el9.x86_64.rpm f14114bacf794906f18be92ba7ae11b20d912da48b095ba56ea3b201c93fd919 libreoffice-langpack-cs-7.1.8.1-6.el9.x86_64.rpm 729418f64c3b3b39d40d50005998190b1631906cc633d7cff76d55b7560379c3 libreoffice-langpack-cy-7.1.8.1-6.el9.x86_64.rpm 9fdce2d9fb120f776627efdab552a5a43df377d9a75f6e78497c5f9811d5b4d6 libreoffice-langpack-da-7.1.8.1-6.el9.x86_64.rpm 1c54131cbb366eb12d32d5a4ca5ce4e3277539a3fa5b1936f861e82495ee667f libreoffice-langpack-de-7.1.8.1-6.el9.x86_64.rpm cee5f0855524fbf3d14a901ed95fef1dba61c2210b0301df0e2ff73e605e10da libreoffice-langpack-dz-7.1.8.1-6.el9.x86_64.rpm 61df884923c78ddd55897800ec68841f4084f8b9f3ead0da82080f307add7867 libreoffice-langpack-el-7.1.8.1-6.el9.x86_64.rpm defd44492179a0202b3d70a1d7f4a1d9bf1c369c97d0804efa260d499242d310 libreoffice-langpack-en-7.1.8.1-6.el9.x86_64.rpm 03a26283ed0a29793400d0f35cca7bd5aa8f04ebcee9237603264e91cd5a2e75 libreoffice-langpack-eo-7.1.8.1-6.el9.x86_64.rpm 8beeddd7718e362d6fec1b5a7cfaf13410efb8f7cd72468561bfab1c545690cb libreoffice-langpack-es-7.1.8.1-6.el9.x86_64.rpm 9d4158249f4c1ecee33f3dc600aa92a5e39f86cc545730f5098cccb8129fe8c9 libreoffice-langpack-et-7.1.8.1-6.el9.x86_64.rpm f7b8ab2054828835ea512e4d743a959ef2d3577259ebeedd0c505ae6d14051b4 libreoffice-langpack-eu-7.1.8.1-6.el9.x86_64.rpm d7b92edb57d2bcc95cc33744004a8685dc81d0cfe3469f8cac1171413fd04f20 libreoffice-langpack-fa-7.1.8.1-6.el9.x86_64.rpm bf7b98c45412206b2d16c2904d5e70c8b1948268613f4d5c5392145ca05a8de3 libreoffice-langpack-fi-7.1.8.1-6.el9.x86_64.rpm 7be022ba59d51cdfade93c023b061ae71478c2e725d1b0dd447fb98bcf3f0fbf libreoffice-langpack-fr-7.1.8.1-6.el9.x86_64.rpm a8166e32142c46b2873d3a7cec930d29946d75a5812556712b91a28b13404a49 libreoffice-langpack-fy-7.1.8.1-6.el9.x86_64.rpm 3016e83886cb427a6bf3b0247e8b5e3a3c3071ac68b0768763627e264f4ac26d libreoffice-langpack-ga-7.1.8.1-6.el9.x86_64.rpm 9dd1385b8242e4aa76fcd1b48e33179287c4e4a65c1b0ed0d740732b40209257 libreoffice-langpack-gl-7.1.8.1-6.el9.x86_64.rpm 621ff9639298753c73ba998930272f29f56a98dd609c19f707eba47717e16c86 libreoffice-langpack-gu-7.1.8.1-6.el9.x86_64.rpm d0f588cb933f9141816eff7415851382bb9a342fe85e2ce44361d8e780161bb1 libreoffice-langpack-he-7.1.8.1-6.el9.x86_64.rpm 2ddfe27dfa4b33712c59f696fd049506ede667ebb8609c629b55b79394e4587b libreoffice-langpack-hi-7.1.8.1-6.el9.x86_64.rpm fd87bb4ed66dfa4dc357ed4f9047dcd815d45ab0fdd261e4247b0e5fffaae6fd libreoffice-langpack-hr-7.1.8.1-6.el9.x86_64.rpm 728bebe6072146bca66a0b5baa55c6c57820d49a6bad1e0799f9d6a193d91008 libreoffice-langpack-hu-7.1.8.1-6.el9.x86_64.rpm e0aa64ab9e3159852635499d90f6867b31a682987d230e3b682ae0eab073f2be libreoffice-langpack-id-7.1.8.1-6.el9.x86_64.rpm 69ceb0792a5fde73c20e49ed94f820995c8a0c500edf3c4c406a03307f7f2ca9 libreoffice-langpack-it-7.1.8.1-6.el9.x86_64.rpm 4d3bc174cebba382c67f028aa4e0413a30c111fe8f8dc7945bf7299456d393c2 libreoffice-langpack-ja-7.1.8.1-6.el9.x86_64.rpm 517a1f048e527a08fdc368826b87e742b69bd005621d46a4095a621627378425 libreoffice-langpack-kk-7.1.8.1-6.el9.x86_64.rpm 658ce5d0e584ec5aed9d30001bfd069cbd27dfc479afe17562753758e228dd6b libreoffice-langpack-kn-7.1.8.1-6.el9.x86_64.rpm 60823c4a18d1d1d69258f7e272fd5ac1174cad14f055f82a2c159f79e2c01134 libreoffice-langpack-ko-7.1.8.1-6.el9.x86_64.rpm 5e7bde530f962ac16a3fad48e6d15b256ff02b8ab588b2cb84721977a4550b64 libreoffice-langpack-lt-7.1.8.1-6.el9.x86_64.rpm 54603f632a1353b02ae1789754791ebdbd5c09a864c35f21a917d4e4012bc6ba libreoffice-langpack-lv-7.1.8.1-6.el9.x86_64.rpm b2b2911611642c6188d46efa6f0bec339f971dfaae56c2ea93af01ae91037a14 libreoffice-langpack-mai-7.1.8.1-6.el9.x86_64.rpm 831f0aa8bfb7ddf17baa957dde7d59450f640fe72963f7c5ceee4017dba991f1 libreoffice-langpack-ml-7.1.8.1-6.el9.x86_64.rpm 9e354639d38be0a3186712c233d3bcfcc85d75c995287d153a9da3c1f20f55e3 libreoffice-langpack-mr-7.1.8.1-6.el9.x86_64.rpm f5694a5da01b8e95b2ea5aba1948a576eac12d1979530bb359a1ba2dd29c1e47 libreoffice-langpack-nb-7.1.8.1-6.el9.x86_64.rpm 6bbe09596667bac286a29bf0f0e9bf2ea25d47a9599d427109bb2460dd1bd1ad libreoffice-langpack-nl-7.1.8.1-6.el9.x86_64.rpm f87135d91e9dd53a735f363a3ec0dfb652549a5668cda3a2fc5c5c8f57cd9e40 libreoffice-langpack-nn-7.1.8.1-6.el9.x86_64.rpm 7d3f3fc637273aaabd8199154c0f712384e32795869da6c2eb2ca2ca6c966a90 libreoffice-langpack-nr-7.1.8.1-6.el9.x86_64.rpm 910b44b0bd09f7bbb440cae89d9f6c6f13d124f74c834471cf6e736b0cdef0d6 libreoffice-langpack-nso-7.1.8.1-6.el9.x86_64.rpm 7fa50fa5e1dc803d7b0c3c76c479ab35cd2c58d309362435c6e8af9d6575daee libreoffice-langpack-or-7.1.8.1-6.el9.x86_64.rpm 5f681411e2ced355ee339b30954729110f969b0c2ec90112ed32e2de9e824532 libreoffice-langpack-pa-7.1.8.1-6.el9.x86_64.rpm 33ae432e3be89e6e5ce7385620f022250aa8af178b9e756cbcb0abdc471337ae libreoffice-langpack-pl-7.1.8.1-6.el9.x86_64.rpm 8717940c047560765ba7f7009c496681a5419b406e97b959146340a35241b2d0 libreoffice-langpack-pt-BR-7.1.8.1-6.el9.x86_64.rpm b31c178eadc65f19d5ebd069db5d0839032f1c8ee28dba6ed9f243f59ab25c25 libreoffice-langpack-pt-PT-7.1.8.1-6.el9.x86_64.rpm e5d36e19bfd75b9de8b3593a49888bca054cfd68beeab1f86537778281299bc8 libreoffice-langpack-ro-7.1.8.1-6.el9.x86_64.rpm ef22427ad3d6bb4e0af7ebb30655e9da297fa4bc77077bd35101f8a2b6376e9f libreoffice-langpack-ru-7.1.8.1-6.el9.x86_64.rpm 418835ff9387af5016fa1f3bf13fd2df3d910ebd1f7345232c9d4f1398556189 libreoffice-langpack-si-7.1.8.1-6.el9.x86_64.rpm f568aaa270d63e11061b25773fbebd324fcb8fd541a1f375a8236e6d3896518b libreoffice-langpack-sk-7.1.8.1-6.el9.x86_64.rpm f12b3f395047f192ad772f0232eeb6d00ddbef50b9b3dca50c2aecefba81a1ad libreoffice-langpack-sl-7.1.8.1-6.el9.x86_64.rpm 2025309f1cdfad8a18abc2cac28f8635e22657212f192de7f2d0db59c949bbdd libreoffice-langpack-sr-7.1.8.1-6.el9.x86_64.rpm 9c1ac6c116f82c285ec6bae5829a464bef25fed108314712652858ddfad10e54 libreoffice-langpack-ss-7.1.8.1-6.el9.x86_64.rpm 46bae487acc7fa4d053a55c22ecf81e15e0412322bb2c1eceb702edd750f20c5 libreoffice-langpack-st-7.1.8.1-6.el9.x86_64.rpm b5d5f1570b2ee8694a7da71bc0fd878705b6e16ebd187985ef50a9c08f3596b6 libreoffice-langpack-sv-7.1.8.1-6.el9.x86_64.rpm c64ad5867474b05781ccfa239cb156fc15934f191604af7b8a099f9f3a914b3f libreoffice-langpack-ta-7.1.8.1-6.el9.x86_64.rpm 6d59fbf9a549c40c5edbcb0f4472116ce46c9132f399fada0491043d9bfd119b libreoffice-langpack-te-7.1.8.1-6.el9.x86_64.rpm f796c6ef41a8197e2a6d9792cc49ad8e34b5764611610e673489d777ba57a901 libreoffice-langpack-th-7.1.8.1-6.el9.x86_64.rpm 1a80fb4ca85c0eed58376c1e7c820c3b05495e21d8a8d2d0c38a7fa19138ec9f libreoffice-langpack-tn-7.1.8.1-6.el9.x86_64.rpm aad4a031191ae5ebb907dbeb573376665d0e95dcac335da556e3f04e16e86d69 libreoffice-langpack-tr-7.1.8.1-6.el9.x86_64.rpm a0c2bfed690bd0b99feb0cb7c527b263ce6dbfed58716e9de7f0e41fdcc213cb libreoffice-langpack-ts-7.1.8.1-6.el9.x86_64.rpm ec3c29d113a01ad9e64d28537f21804491b510e457ae4257d7368e8c41c96cfb libreoffice-langpack-uk-7.1.8.1-6.el9.x86_64.rpm 74d78a3b51319ee61deb0277d35890c00246718336dd979a799f4ec401983c2b libreoffice-langpack-ve-7.1.8.1-6.el9.x86_64.rpm 4029b8a1468f4c61d69b44a0581a418ca0aa0b6d11c07307e8e32f771f49ff9a libreoffice-langpack-xh-7.1.8.1-6.el9.x86_64.rpm cf31bd887082862b5b48bab07638ed3b2c14c68f2659d3583d325d5f785c9c92 libreoffice-langpack-zh-Hans-7.1.8.1-6.el9.x86_64.rpm 095c5693b5464726cc0165badf93e9d8ac5bfe8825f395a9c9c3dd743d26277b libreoffice-langpack-zh-Hant-7.1.8.1-6.el9.x86_64.rpm 3df50dc76fb1e789456c80b9011a3c848fa1d4edf2de08e6f7b9d1856641a8c9 libreoffice-langpack-zu-7.1.8.1-6.el9.x86_64.rpm 986c1eeeb3a90a5c07841f8649ac9406fa1635a79cd7953b257e120c7fb8c3d0 libreoffice-math-7.1.8.1-6.el9.x86_64.rpm ac357ba2009c63555fe3d82caad710d7f71e8269a9857f308160bc1491fd3b22 libreoffice-ogltrans-7.1.8.1-6.el9.x86_64.rpm 67f008f13f35ae372f776e90c201dad4a0cdede159e0dcf5abcbac0d8aec88df libreoffice-opensymbol-fonts-7.1.8.1-6.el9.noarch.rpm 4621baa5df251ff762cff293ccd830490e41d5c7c42b8863503582c2758ec4c6 libreoffice-pdfimport-7.1.8.1-6.el9.x86_64.rpm 226ce4b0a80c3adb29a2eb68c36f5178e7e81703dc615bbea950e4b1918c3e7e libreoffice-pyuno-7.1.8.1-6.el9.x86_64.rpm efa105ea3b7b4e4570adfb4af7f78715ba63aa6d932a0a32246af4567ccd6e38 libreoffice-ure-7.1.8.1-6.el9.x86_64.rpm cf9edd9a291f75913182093f7cc1cdeaae60bfc0c971310e0f9d4f2ae2eaf48d libreoffice-ure-common-7.1.8.1-6.el9.noarch.rpm 934a491fcbca660493e4accf8c6701d9a4b196eb87b101525018caa5ff072403 libreoffice-voikko-5.0-10.el9.x86_64.rpm d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0 libreoffice-wiki-publisher-7.1.8.1-6.el9.x86_64.rpm 0f3becdef37d9ea817e274b8e0415c78ee63a7a752d70fafe55d0a7a393f72e8 libreoffice-writer-7.1.8.1-6.el9.x86_64.rpm ecb1bb1fa9db8017b93066d65f72954e34a405fae867547a0d2b78bb3991b8cd libreoffice-x11-7.1.8.1-6.el9.x86_64.rpm 5d462af72341b4b1943cf4d858fa50b3b2b87016f7f1ca9fd784e1a1ad422f84 libreoffice-xsltfilter-7.1.8.1-6.el9.x86_64.rpm c7ed3a9d064e2b1e3b2e706b692d929ee0ddfaa7a89bc79335cdf02385179361 librepository-1.1.3-31.el9.noarch.rpm 7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libserializer-1.1.2-30.el9.noarch.rpm d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68 libshout-2.4.3-7.el9.x86_64.rpm 4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435 libstaroffice-0.0.7-5.el9.x86_64.rpm bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783 libv4l-1.20.0-5.el9.x86_64.rpm 959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3 libvisio-0.1.7-9.el9.x86_64.rpm ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324 libvoikko-4.3-7.el9.x86_64.rpm 700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 libwps-0.4.12-4.el9.x86_64.rpm 62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0 libzmf-0.0.2-18.el9.x86_64.rpm fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b lksctp-tools-devel-1.0.19-1.el9.x86_64.rpm bc7349d2cc90e0d56629d3a37583b7417df5b36244d241fbec309c973eb2b1ae lksctp-tools-doc-1.0.19-1.el9.x86_64.rpm 9bc4f3a52fab5c8d8237034191960ff645f08d1b07422f67a6ea63ffea36666c lpsolve-5.5.2.0-28.el9.x86_64.rpm 8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b mythes-bg-4.3-21.el9.noarch.rpm 1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb mythes-ca-1.5.0-24.el9.noarch.rpm ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b mythes-cs-0.20070926-27.el9.noarch.rpm c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e mythes-da-0.20100629.15.16-22.el9.noarch.rpm 2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233 mythes-de-0.20210302-3.el9.noarch.rpm 56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298 mythes-el-0.20070412-27.el9.noarch.rpm a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393 mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 mythes-es-2.3-10.el9.noarch.rpm 5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2 mythes-fr-2.3-19.el9.noarch.rpm c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb mythes-ga-0.20071001-27.el9.noarch.rpm ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3 mythes-hu-0.20101019-23.el9.noarch.rpm 95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967 mythes-it-2.0.9l-26.el9.noarch.rpm c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6 mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nl-0.20130131-17.el9.noarch.rpm 1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121 mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 mythes-pl-1.5-28.el9.noarch.rpm ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2 mythes-pt-0.20060817-27.el9.noarch.rpm 1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36 mythes-ro-3.3-22.el9.noarch.rpm b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7 mythes-ru-0.20070613-25.el9.noarch.rpm 9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3 mythes-sk-0.20130130-19.el9.noarch.rpm 03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed mythes-sl-0.20130130-19.el9.noarch.rpm 620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d mythes-sv-1.3-21.el9.noarch.rpm 9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3 mythes-uk-1.6.5-22.el9.noarch.rpm bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d neon-0.31.2-11.el9.x86_64.rpm 30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 openjpeg2-2.4.0-6.el9.x86_64.rpm a1ff83896899d34681e729b1cfee5f8d9c7f769f802f5b54bb9781f819957bb0 pentaho-libxml-1.1.3-30.el9.noarch.rpm d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4 pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm 561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776 poppler-21.01.0-12.el9.x86_64.rpm 18fd7f5209755b145d523d305f900ca11a393c35b711da5902fc85db39bdfe5a poppler-cpp-21.01.0-12.el9.x86_64.rpm 52c26fb209ef63a62e8399641fce4f8f87f4662d1290a173120417c1f191726d poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-12.el9.x86_64.rpm 06cf367d138624fc9f15d7803f9cda28e823aa7575f56971f01dc4b9b5677c39 poppler-utils-21.01.0-12.el9.x86_64.rpm 2be4571777d7925f19631c21d087639486260267a0d7bcaa500d49a44a5579ea postgresql-jdbc-42.2.18-5.el9.noarch.rpm e59b40159b9c5a040052f1cdccfc3abbc4491622c7fd656e0e5edf9d66ca8ae0 python3-libvoikko-4.3-7.el9.noarch.rpm 73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f raptor2-2.0.15-30.el9.x86_64.rpm e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e rasqal-0.9.33-18.el9.x86_64.rpm da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f redland-1.0.17-29.el9.x86_64.rpm 487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d sac-1.3-37.el9.noarch.rpm 4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e taglib-1.12-6.el9.x86_64.rpm cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10 ttmkfdir-3.0.9-65.el9.x86_64.rpm 6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6 twolame-0.3.13-19.el9.x86_64.rpm cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 twolame-libs-0.3.13-19.el9.x86_64.rpm d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0 xmlsec1-1.2.29-9.el9.x86_64.rpm ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a xmlsec1-nss-1.2.29-9.el9.x86_64.rpm 04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2 xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm 435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679 xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec RLSA-2022:4940 Important: xz security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for xz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xz-devel-5.2.5-8.el9_0.i686.rpm ef799ef9ecc144b00e504724125ea6febc2d34243613a9faf0b17042e733fccd xz-devel-5.2.5-8.el9_0.x86_64.rpm 36ef93c4def7a3e894cfadd92c5eeb61fb8709d55df51b21b9c1ab50ef2cda70 xz-lzma-compat-5.2.5-8.el9_0.x86_64.rpm f9daeaf6d287c9a8f5f1274454dc2f0fb2c6831b680812a69e719e02d8ff0cd2 RLSA-2022:5942 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-16.el9_0.3.x86_64.rpm 7d4461f0835fddfd186a1dc3af5aaf720131b7bc26a8a6395ec5bb3148a505ef vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm 1665fda895581e95e7e6e359620ce6628755b6395b6ce2f3bf33950d7392a47b vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm 01d684593325fb01a5fdb634b9a22e17b91f20b56a62d1e12c7f407a2f6d97bb RLSA-2022:6602 Moderate: gnupg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm 6c2ad44232aff2fd30ac354ee071d5b4f6a0c2b1c307d6f7531d5cf60b59488d RLSA-2022:6854 Moderate: gnutls and nettle security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.7.6), nettle (3.8). Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [IBM 9.1] [P10] POWER10 performance enhancements for cryptography: nettle - incremental work (BZ#2102589) * Allow enabling KTLS in Rocky Linux 9.1 (BZ#2108532) * DES-CBC bag is decryptable under FIPS (BZ#2115314) * allow signature verification using RSA keys <2k in FIPS mode (BZ#2119770) rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.7.6-12.el9_0.i686.rpm be2526de8a8d4dd9ef21fe9a0f597381ec69cbb4bdcd917557438d9ae247ddcb gnutls-c++-3.7.6-12.el9_0.x86_64.rpm 20febbb38ae61d697aea273ac9baa8261b6eb46864b4b53fb4aee219a5ffba02 gnutls-dane-3.7.6-12.el9_0.i686.rpm 7e9d81eb16299cd33aa1b9de62daad01bc082a340ebfda1e918bf5b132e0e698 gnutls-dane-3.7.6-12.el9_0.x86_64.rpm e4c0731b14a134974401231f4cd3fab1e00c24f12d2f064a6628516251d6e4c3 gnutls-devel-3.7.6-12.el9_0.i686.rpm 487808612cad7e1e8b1b6eb266ecd51b420ca68bb4767696a56288ac0914b4ff gnutls-devel-3.7.6-12.el9_0.x86_64.rpm daac6aeb6128870c69a74de09b7a0f23dbd02407ea7d65325c6db71e166081da gnutls-utils-3.7.6-12.el9_0.x86_64.rpm c7de211ad2bec144ed339b83adcd348605e1033b29a5e9319358ee1bfc8206f8 nettle-devel-3.8-3.el9_0.i686.rpm eee07fdf3036775d9f707a2b06b78086ae7b1ca88e0ce236f3ef4ad09753f9bc nettle-devel-3.8-3.el9_0.x86_64.rpm 34fa515f4fa8325e6facd6cfd0c3bd96fcfc3445c7e50b6011548360a902d52f RLSA-2022:7288 Important: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library. Security Fix(es): * OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602) * OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.0.1-43.el9_0.i686.rpm f2a45c3be46c5ac7666a6004342896721819b8f20d3239802077cb5cf70fb7ae openssl-devel-3.0.1-43.el9_0.x86_64.rpm 6ff4696b84a705c8c76c8c93d868e6180698f2172e122f8858643eb9bdfcdf05 openssl-perl-3.0.1-43.el9_0.x86_64.rpm fb2e1e3a0b4d9a8ccbfb0adb016373ba874a0095a58f2a887f0fd5ad1dceecaf RLBA-2022:7324 libgcrypt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgcrypt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Bug Fix(es) and Enhancement(s): * FIPS: getrandom & non-deterministic RSA keygen & missing lengths check for KDF, HMAC & change RSA encryption/decryption to explicit FIPS indicators. (BZ#2131208) * fips: libgcrypt SHA-3 miscomputes digests on buffers >= 4 GiB (BZ#2131209) * FIPS RSA pairwise consistency test fails for gcry_pk_genkey() with RSA if (test-parms(e ...)(p ...)(q ...)) are specified (BZ#2131210) rocky-linux-9-x86-64-appstream-rpms libgcrypt-devel-1.10.0-8.el9_0.i686.rpm ecc286cd10d6ff315cb6ca7301b3f62c9ca24018f2dc9cae1868db3c65a24be6 libgcrypt-devel-1.10.0-8.el9_0.x86_64.rpm 9c83b3811d0a7ef15ca3f62714ae2790991f2b32d2c31e4f849c464ed854238e RLSA-2022:7329 Moderate: lua security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling (CVE-2022-33099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.2-4.el9_0.3.x86_64.rpm 9b9247dd77c68e135da37e03d53c011f8d879f369a45bb7cbd275a51c6f97824 RLBA-2022:8265 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-cloud-setup-1.40.0-1.el9.x86_64.rpm ff3907b501d448e73fbe819b4071ebe0d43b8feda0136e740142b7b9f5b475cb NetworkManager-config-connectivity-redhat-1.40.0-1.el9.noarch.rpm c07e7ff6e4063f8e3cc92f257ba9e9408b8d3b7f38e956a8c51767bde737c914 NetworkManager-dispatcher-routing-rules-1.40.0-1.el9.noarch.rpm 238a8dd3a90ef20179ce71ec7a079e27e4f8e12af91e9a036cde1afed4901264 NetworkManager-ovs-1.40.0-1.el9.x86_64.rpm 53e2032c81ad6b29223716edb24af69edfe08459ca8c1470c92b5bc2a26e4c8d NetworkManager-ppp-1.40.0-1.el9.x86_64.rpm 60bf2b15ecf0f4fa3aeece1197aee58fe036a865b8f21c435bb3c7010a3f21e1 RLBA-2022:8268 audit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms audit-libs-devel-3.0.7-103.el9.i686.rpm 3d5d176759d2e720c5e85418d3d728d5ccf9248d39d1aa11d47015990b1fb6e3 audit-libs-devel-3.0.7-103.el9.x86_64.rpm e4d53cd4a6e3d2e0e6b6e6afea6e22df620553ab584610282f8631cfd2191e94 python3-audit-3.0.7-103.el9.x86_64.rpm 45107b96863c18ad3aa4f949850e861080d5047e135ea9b8e707d52f70da3ad0 RLBA-2022:8269 openldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openldap-devel-2.6.2-3.el9.i686.rpm de2ed63c0b23f0bc42686991006ec4680ed52c8da60c97b93dc6c61522bebe44 openldap-devel-2.6.2-3.el9.x86_64.rpm a2e8275b9fb7a58330ccef915bc16dcde33df32274ef73d4fa6255aee0c4907c RLBA-2022:8274 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.187-5.el9.x86_64.rpm 74d191c310368c6fe50302fe0bfcaac1c21172dab8c979cf352596d517717473 elfutils-debuginfod-client-devel-0.187-5.el9.i686.rpm b6926325d67c577f837fe8dd4a1ce70337cf11b13e5044db87bcd1cb7943ae85 elfutils-debuginfod-client-devel-0.187-5.el9.x86_64.rpm 5e0d12356ad7ff76d32724b2a7f79147c8bd6254f3c79fc728a395d997466077 elfutils-devel-0.187-5.el9.i686.rpm 5ef294d3eaafe0ce99c9ca294e087774fbb283c91912c8a81337873d315cd1c9 elfutils-devel-0.187-5.el9.x86_64.rpm 239d1c34e57a44c3572a686bbad7d6924de96fed3f401cf911f14e1ddf0a9436 elfutils-libelf-devel-0.187-5.el9.i686.rpm ea9732151e5ff5319dcb7edd7f49d39aab079cb16acb2cc2979c0ef996a1ea76 elfutils-libelf-devel-0.187-5.el9.x86_64.rpm a4241c148695dd1b6b037c2ce2f52c42c56b0f8f7f8ad938033e4b8f21b5e535 RLBA-2022:8277 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cpp-11.3.1-2.1.el9.x86_64.rpm d148f36c0ec62cac2eadd8e7c7e9eb3f3b4e18bac06331813636ec7a23e63485 gcc-11.3.1-2.1.el9.x86_64.rpm cc2aee1abcbfdb6a07d5f8be22d51ac72737f2d34978e16bdef678556ef8591f gcc-c++-11.3.1-2.1.el9.x86_64.rpm e0c4545be404df2911ab67d53f9f416872939b18087f57900f7d3b08867ba741 gcc-gfortran-11.3.1-2.1.el9.x86_64.rpm 8616099b3e02f6f9a25251fc0a906925b9b53303234d3f9086f88d9103fac6b6 gcc-offload-nvptx-11.3.1-2.1.el9.x86_64.rpm c93805d13a0253b86e949d96cbe7053fea172c2f5a5ce84a32b5970229eab8b6 gcc-plugin-annobin-11.3.1-2.1.el9.x86_64.rpm bc733c636dfe9ea76d77f3c68a4825d4027a7a55f7c832131b040052de48c40b libasan-11.3.1-2.1.el9.i686.rpm 67aaf6255c372bd93f1f869cdf2dffb5b980a65bcef1ef41f7221a6ee4ad3de5 libasan-11.3.1-2.1.el9.x86_64.rpm 10d133bc154cff2b7660bca951a2623a34a8a4d788bf9f9c99804a42b1d50f17 libgccjit-11.3.1-2.1.el9.i686.rpm 7e0b6b973c102d471ed69483ba8a93a8072c32a00041b3aee3209e20ce0acc4d libgccjit-11.3.1-2.1.el9.x86_64.rpm 033a09ed2536a1f76e4b299ed58cae088bdd43b35b444396e91c3e14cde44e1c libgccjit-devel-11.3.1-2.1.el9.i686.rpm dc4d240174b37f79d385d43a61b695d74ab3857043daf8daef74dd4c58f69f8c libgccjit-devel-11.3.1-2.1.el9.x86_64.rpm 8c4a2badd481a9b5a3d2af3e43ab112a0c540f70afa8632f10f0a54dd4b2b08b libgomp-offload-nvptx-11.3.1-2.1.el9.x86_64.rpm 8896733a6612ac5f6dd22ad4a8b2d4037e914cab47c46be84a162ff7be9c8826 libitm-11.3.1-2.1.el9.i686.rpm 4117cac369a1b8a06e231989716d7a2e6ac445be8e6f0d08191ceb15d78e9280 libitm-11.3.1-2.1.el9.x86_64.rpm 4c65e4d646a9ff46734a48e8ca53e819d203980c06463fc284ebfd9c7babe412 libitm-devel-11.3.1-2.1.el9.i686.rpm 1e3e83ecfc6d83ad90a70ed455b35a7aa5240e358dcbf56ef799d1b4e9e22f8d libitm-devel-11.3.1-2.1.el9.x86_64.rpm b21c1d29b74273714f20b8f7a8276dfad00ecc5a327cf8bcbaf4c23e4b8f9d38 liblsan-11.3.1-2.1.el9.x86_64.rpm 8b483d41a8e9b9f162047324757196bd2097a5b0a60a8061939be79275b64745 libquadmath-devel-11.3.1-2.1.el9.i686.rpm 327b22ee75d68a24d2959afd4d00c9259c8ad357e42ad96057d669748e17630e libquadmath-devel-11.3.1-2.1.el9.x86_64.rpm a228c4afd6d39e97f06ff210cb6af62d535938a50438091cd341d1575866b48e libstdc++-devel-11.3.1-2.1.el9.i686.rpm 35c72f980003d33655e58ee46b73df5bfb0f3c96a0cbd44c298890f9dd0f0d9b libstdc++-devel-11.3.1-2.1.el9.x86_64.rpm d373150cea8b186773b5fb9bc4b2dff50540886e738b41de6c94421b605e097f libstdc++-docs-11.3.1-2.1.el9.x86_64.rpm 51a1504c746bcd4ecc7cc787473b10fb7cfb1e6415e4434b832d4043f9fd6ec9 libtsan-11.3.1-2.1.el9.x86_64.rpm 42f96813abb08d24ac8d9cd03fe5b07c10dbc5b4bf3892f670ce40d3ed2ece79 libubsan-11.3.1-2.1.el9.i686.rpm 0e6b04176d5d67d1c5b035b0edcb4db155bff95ff5f87acc24a4e666703451ea libubsan-11.3.1-2.1.el9.x86_64.rpm 3e4d5935c3488090ef608ae9e708fbb01511ba574818cf2bb52b50ad950e1927 RLBA-2022:8281 binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms binutils-devel-2.35.2-24.el9.i686.rpm a7387a1c59877888e2e1b0de2902c9757311abe7afbf4a9f60c26ab2cc262312 binutils-devel-2.35.2-24.el9.x86_64.rpm d90efc204c44d0af31838476d2c102a2fc85922d9219340d20ab8be1ee186b00 RLBA-2022:8283 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.43-1.el9.noarch.rpm d6f125a446987ccf60dc6740d1d056d7517718e5aa12f56d801d53fa03b09055 RLBA-2022:8286 libnl3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnl3-devel-3.7.0-1.el9.i686.rpm da13f6502183d5d1cca4b9dbb497258cfb7d968522fc741af9c7159e233bd85c libnl3-devel-3.7.0-1.el9.x86_64.rpm 756dabb06311d203841c444259ef05eff3c638dc2a80d76f47b4c3eb53065046 RLSA-2022:8291 Moderate: rsync security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-18.el9.noarch.rpm 824879326e73ed8ae1ad7a69ccc236b5ff5456be5c333b86768178d347855027 RLBA-2022:8292 libusbx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libusbx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libusbx-devel-1.0.26-1.el9.i686.rpm 250741dd8126dfdb6fb4c8f5e7a8c58ae5f28b47b2712537e0e6993a51188152 libusbx-devel-1.0.26-1.el9.x86_64.rpm 4ef3423682b46834a85c9f9d45337d5a44ca682e76e143061a620cb20a007eca RLBA-2022:8293 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.4-2.el9.x86_64.rpm 29463431665c6085ccf87b129aa5a0b4d03bd60fe8f77747348b16e10bc4ba80 RLBA-2022:8296 dnf-plugins-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dnf-plugin-modulesync-4.1.0-3.el9.noarch.rpm 047c5006fa0ade759287c62d632b72fb5cd8e92bbb1ed85c9f011e675e07ced6 RLBA-2022:8298 libsolv bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsolv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-solv-0.7.22-1.el9.x86_64.rpm 29f8d1886f7925eb85c57d0ffb17d279f8cd5795e1ed8abe5a8b9cc839b88e87 RLBA-2022:8314 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-276.1-1.el9.noarch.rpm c79af451aee2593e9d528c03a05126e7e23a49e9888e592ffb5732925c65c577 cockpit-pcp-276.1-1.el9.x86_64.rpm d22671f5f54ebe215955076e0b7d3fb6a45e5c0a41ba6453aabb628e8019f856 cockpit-storaged-276.1-1.el9.noarch.rpm 213901645908a54a412c8a3c2f0d2c94ce1ff131761743a1e171af6aa915fdb8 RLBA-2022:8315 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-12.el9.i686.rpm 50dc7625f534c417f37880424958ab807afa732c723e58ed6f2ae45613644226 pam-devel-1.5.1-12.el9.x86_64.rpm 0083d0fbab70a97ab13129d62e368cb55a7e7e4aee30e1818ecb6c97138adaa0 pam-docs-1.5.1-12.el9.x86_64.rpm a4896059cb33cf4b864677a2fb9fda08f68c400be5e826ddfa0a93879697f4a0 RLBA-2022:8316 pcre2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcre2-devel-10.40-2.el9.i686.rpm e58fba84050103a18b9e672529133e4b787d69ea4b51a093c81455ecdd069a1e pcre2-devel-10.40-2.el9.x86_64.rpm f9e112427b5b0d9798c920f5d4f6270656ba090477add6342b2e0e7b81be04c8 pcre2-utf16-10.40-2.el9.i686.rpm c1099697afc6439124ac7367f526467d1816580175278833363fa4b5a1810111 pcre2-utf16-10.40-2.el9.x86_64.rpm 4bcb1905ee28cf81c9c273435de89ca0bc61d673513602545a388728527011c2 pcre2-utf32-10.40-2.el9.i686.rpm 2820beee5519fcad7a391e7de154a1b0632f926d08744b4b363d9d057295fcd2 pcre2-utf32-10.40-2.el9.x86_64.rpm 908174188fe078b154cd985f63e6abcd7627335c596cefbe967231b48323b929 RLSA-2022:8317 Moderate: samba security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. The following packages have been upgraded to a later upstream version: samba (4.16.4). (BZ#2077487) Security Fix(es): * samba: server memory information leak via SMB1 (CVE-2022-32742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms samba-client-4.16.4-101.el9.x86_64.rpm 269b2f991012b5fb98d7ec6790bfdd6333c7752da28de7c2c74ecbc31f55cc71 samba-krb5-printing-4.16.4-101.el9.x86_64.rpm 1b213b164924644c330236ea917bc1a38e454ff27736f19e8117a256f92b33a6 samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm 16e17079edb7614b36eeaf3dc7a97cdb2927b416c8530e085c6105806668da6f samba-winbind-clients-4.16.4-101.el9.x86_64.rpm 89f7f7078de542c68c4f8e59fb8419a4ecb9f7f25b3aedb2989a45d8152853e5 samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpm 89cb41e28112f137bd722450c38d6444fe6d3067fa86dd08af5e97f8eaf51969 samba-winexe-4.16.4-101.el9.x86_64.rpm ae286f5a98c6c83d849d64287501c959f03ef5f0bca494caca68efc380b554ad RLBA-2022:8321 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tuned-gtk-2.19.0-1.el9.noarch.rpm 1c9ddb0f97692ca12aaaab8774e9a3bd2f9c2ece51a83e6af3877d7f40e6b420 tuned-profiles-atomic-2.19.0-1.el9.noarch.rpm 45f3a2076de14cde1076d567ea4c742bcdf4940c55b8aa94c3d00da687a9e541 tuned-profiles-mssql-2.19.0-1.el9.noarch.rpm ef81a0b00fce912b74d0acd6f89c62a2c8fb9a97d0a4e9cd6ebc1bc9547dfbee tuned-profiles-oracle-2.19.0-1.el9.noarch.rpm 1f2860569d3e452cae234fdd9daa3599c569eb80720d81ac205b2ccbd88f7bb7 tuned-profiles-postgresql-2.19.0-1.el9.noarch.rpm 5e72b3d9f2f34210e8b7daf0fbfc56e296db5b5bf8c2c9f73d3e14bb2838f192 tuned-profiles-spectrumscale-2.19.0-1.el9.noarch.rpm f43fa461844b121b04d606501c6fdad5ed4879298a246e840c7f129b97fa2d95 tuned-utils-2.19.0-1.el9.noarch.rpm 5e797cef9186c9d8cf23e4939d0c121155ee39573d91221ec4112be783e2dd99 RLBA-2022:8324 lksctp-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lksctp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lksctp-tools-devel-1.0.19-2.el9.i686.rpm 1adaf0305856a05ba35c417687800b82104dbd135aee0e4907e71ddc528c98d8 lksctp-tools-devel-1.0.19-2.el9.x86_64.rpm bf2e756643f8a88569b72930c7a44ef9b1bd76826798d43bd77c11b772f2a6b7 lksctp-tools-doc-1.0.19-2.el9.x86_64.rpm b668730b3ef6fc60ff22801aa6e25e9e2c7813e3ad51109bfd987dd136cb2747 RLBA-2022:8335 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for policycoreutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms policycoreutils-dbus-3.4-4.el9.noarch.rpm 6c622e89c42463a5f91ea15d64e6ea77da6f0ff1a652ab81c0d2653a00f9be33 policycoreutils-devel-3.4-4.el9.i686.rpm a0203511190d9d5b61d16272056f6dfbd679fcaf7ab45f2d26f2552ff7f58b48 policycoreutils-devel-3.4-4.el9.x86_64.rpm dabec59ce4c4279412b09f5d1b3ee6504c4fe5384e911b30e4f199b4c345fe85 policycoreutils-gui-3.4-4.el9.noarch.rpm 62180abb4a616c3372be379dbfa9872062d6dcc5a45123f7d0f564d7854b3d8e policycoreutils-python-utils-3.4-4.el9.noarch.rpm 49fe78cc3fc417c1858ffc7a368ca19a422f6188bc56c54b09ee5831a35a8bd4 policycoreutils-sandbox-3.4-4.el9.x86_64.rpm b7e170aea02be2850de6f0c709a3b174b289c6e8b827e84de8ac4cac13e944e4 python3-policycoreutils-3.4-4.el9.noarch.rpm 430e5acf1f2dcecf99a19b766468aa113735ed360afa705f2d67538012f1256d RLBA-2022:8336 libselinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.4-3.el9.i686.rpm fd8175819491a9c460dbddfebfe1cf09d86c9a840e0d9a0c82dd9cd5a91e9a00 libselinux-devel-3.4-3.el9.x86_64.rpm 5bf91e732d37861a8069181e07e2c9c406f1a7d9c9f94f2817438ae5640bebd3 libselinux-ruby-3.4-3.el9.x86_64.rpm 90423ca8fdb79b4269929514febcbeb6ab67173754808603b15294a8bb74095e python3-libselinux-3.4-3.el9.x86_64.rpm 82504a744c65bb0497e22a97b5c5f82f61d6bfefcdd4e6d9e97810316a2357fc RLBA-2022:8337 libsepol bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.4-1.1.el9.i686.rpm 5f70ccee6c6ef01c4d30520cf151e2a140965e8eba80b8fe54e6769aafd238e2 libsepol-devel-3.4-1.1.el9.x86_64.rpm 310ec23e55c83373715a04f6d0d2772584ddda1328efd84f3c57941c37aae053 libsepol-utils-3.4-1.1.el9.x86_64.rpm 3d14da387d8ac4f4cc31cd21f3f78ede3b40835f58575ce4aa6635694951ecb6 RLSA-2022:8340 Moderate: freetype security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for freetype. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freetype-devel-2.10.4-9.el9.i686.rpm b3234e2b8c4a10a81a68fd3dda3c03c8c2088b92467a34ff55a65532e94667d6 freetype-devel-2.10.4-9.el9.x86_64.rpm 7318ee2e07a945a3604463edcdeb61175819b00326d008084c8fd2ab04ef92ba RLEA-2022:8344 libnvme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnvme-1.0-5.el9.x86_64.rpm d4cf64c80090cff21b408d28066ef47251b765f0cb7fee14ce7d7d0540cc442a RLBA-2022:8348 setools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setools-4.4.0-5.el9.x86_64.rpm 213804d0de4b30e55c0df9709a8b453271b0a9c3a8490c89743ea5a51534a214 setools-console-analyses-4.4.0-5.el9.x86_64.rpm 318f503c1d342a9d36ae213bbd1b313098c362de31df0ce5f59ca178b07dfd28 setools-gui-4.4.0-5.el9.x86_64.rpm ef8bee7b3a66ed8ec446519c04714f2731c9301bc1f239b430d3907edb4df0d2 RLBA-2022:8349 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.8-4.el9.i686.rpm 9c67a1c58563c3f2bbc918c03d709800efc48de8714061ce10c842072e50323a iptables-devel-1.8.8-4.el9.x86_64.rpm 788a79d8144d5225e8d4e22d512563b1381096bf3f0f8bc0ac43585f6b923684 iptables-nft-services-1.8.8-4.el9.noarch.rpm 740e2ff608d71b50f74a875dcd843bb1391b325e5a344d3a8115d9bff50cb33e RLBA-2022:8352 pygobject3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pygobject3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-gobject-3.40.1-6.el9.x86_64.rpm 76f8dee16b2c0ce33de8108db7be9041668ed88c8d8af8d5b7f3f824d2b6708e RLBA-2022:8357 ndctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ndctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms daxctl-71.1-7.el9.x86_64.rpm 39586bf871b5140109b1b60372858c558219240326a90a0014a40608e7487b96 daxctl-devel-71.1-7.el9.i686.rpm 64270d6abdcd45e6f8ab690bfc974267429440fc247b01d19b06b48566ff8721 daxctl-devel-71.1-7.el9.x86_64.rpm 2146c616a30188ebffa7592aef6e850adb0fa3ec061e46e71d137c60c75d01d7 ndctl-devel-71.1-7.el9.i686.rpm 06f743d9ffde417ae32134382c94c498f10aaaa285e4b1125115463529b196a5 ndctl-devel-71.1-7.el9.x86_64.rpm 32e49ebc9a46c37cf793e8067bc133205c1cc82909b213b89e325834adb08e05 RLBA-2022:8358 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.16-3.el9.noarch.rpm 3e98db639ebc15c012fbed761a3b270a3d3a4fb47fc8d9e4e15a45dff9db27aa lvm2-lockd-2.03.16-3.el9.x86_64.rpm 23b3dbe8343622f5ed9a9ee9526293de542e763f7a70261039c89b1a717635d3 RLSA-2022:8361 Moderate: e2fsprogs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms e2fsprogs-devel-1.46.5-3.el9.i686.rpm 07388b83d035f28482d7cefa81db9f31802277232ee69d1cc0b4df46fc7b37f1 e2fsprogs-devel-1.46.5-3.el9.x86_64.rpm 3aa34006224cc6715de275def35c6029b5c9a6ffc1f60bb4ef509edc73842be8 libcom_err-devel-1.46.5-3.el9.i686.rpm fe2f160e6762d3c7bf8049d188bf2f3b6870f34a9824351ff04f325601da993c libcom_err-devel-1.46.5-3.el9.x86_64.rpm 51a17ac00ef7784ab84df2d685ea05ebb759697ee231ceddecd3f77cc1258056 RLBA-2022:8367 iscsi-initiator-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-iscsi-initiator-utils-6.2.1.4-3.git2a8f9d8.el9.x86_64.rpm b83bdee93bb55251aae331c4de72992904343d8a7b09bf1a82f5101ef4fb3c7e RLBA-2022:8375 openssh bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-24.el9_1.x86_64.rpm c9ee7509274f9bf535ba0d0d31a437976e974e41f1c88d70c4cbecd79d4ff44f pam_ssh_agent_auth-0.10.4-5.24.el9_1.x86_64.rpm a99122dc4f324bc279cfc5b8e463a89a4ab7f46346fbed6401faf1e73de3a03f RLBA-2022:8376 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nfs-utils-coreos-2.5.4-15.el9.x86_64.rpm f936cd0c52c81f3d06cb803767c1619745c775feee6cd95bac46d2f948814350 nfsv4-client-utils-2.5.4-15.el9.x86_64.rpm 3055d3fabad65a7c4e3d48692a0b93169110b66772c46e052c5177e31de03548 RLBA-2022:8377 libarchive bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libarchive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bsdtar-3.5.3-3.el9.x86_64.rpm 4ded2e97cd2c07212049de76e085f931f103f82a8abefe3e7daf7f74e9557ec7 RLBA-2022:8378 tcl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tcl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tcl-devel-8.6.10-7.el9.x86_64.rpm 373bd599728b78898e1eae2ba5947c51c973abc7cbf71078d885886df4ca587f tcl-doc-8.6.10-7.el9.noarch.rpm 6b616d9c88ea5f442cee9b48f9c7c745b9eefe4a3c9bb7cf2934f71923ca3926 RLBA-2022:8379 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dracut-caps-057-13.git20220816.el9.x86_64.rpm d896ca63bb9c171ee48d99bd2829d043df4f474c41201f3060b434b9347ef739 dracut-live-057-13.git20220816.el9.x86_64.rpm ca6c6d538de824614165db28e1b9c34368079dcb77b536b94f305d01b30a6126 RLBA-2022:8382 lshw bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lshw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lshw-gui-B.02.19.2-9.el9.x86_64.rpm 438d5338c05ab109a7280ae817e5e586c74e8ccd178b24052031e52c3e13d9b2 RLBA-2022:8383 cups bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-16.el9.x86_64.rpm dba44af2e13b0ec0a5bd68a9eed4a6bcbefce317fe13d7864917d8bc91977276 cups-client-2.3.3op2-16.el9.x86_64.rpm 5ccd0545ab3ea672bcb2f408d396edfc062d7dd8e6974b0900e0299affa243d0 cups-devel-2.3.3op2-16.el9.i686.rpm f690fe106819a8f0c8cc1f3c5f8abfc534994a636249ce673fa56a47a6307b3f cups-devel-2.3.3op2-16.el9.x86_64.rpm 19cddbe902b265394e1b5dbfddd2dbfaf24e482f482918789ab370eb355d0b1b cups-filesystem-2.3.3op2-16.el9.noarch.rpm d7c395d05098b6949e66ca22cc1ba8e4799f3ca2b56a9c35e0853ff94b4c0064 cups-ipptool-2.3.3op2-16.el9.x86_64.rpm 6353be85cb23f0ac73e50f00c7aafb2dafac5e396ac560dbb24ad19d04fa4014 cups-lpd-2.3.3op2-16.el9.x86_64.rpm 6f942d8b03112fd536bc834c3c73bc284771d7043b31aa15de19bc3779d514b4 cups-printerapp-2.3.3op2-16.el9.x86_64.rpm 520f2d1cc64591bd57273ed9cdbf7d32c5f8b53c566ab59653854d65d7ddc2aa RLSA-2022:8384 Moderate: harfbuzz security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for harfbuzz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HarfBuzz is an implementation of the OpenType Layout engine. Security Fix(es): * harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc (CVE-2022-33068) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms harfbuzz-devel-2.7.4-8.el9.i686.rpm c5f1ec66bd9b88f450e60402ab5e0f69b7b5b5ea3656caf2c104f59ec1b49a66 harfbuzz-devel-2.7.4-8.el9.x86_64.rpm 10d199f02e1d51b7b9cd73b54101f5481a245703fabaae9a8b3b2c255477983c harfbuzz-icu-2.7.4-8.el9.i686.rpm 10aef92b251b1257110d8f5f2d394c61b1a6b7b8bc31feb543c6526e18c9f41a harfbuzz-icu-2.7.4-8.el9.x86_64.rpm e169468fddfbeae31d8bec6b50514a13b3cac0b98185f006a385e5fa501a4ba1 RLBA-2022:8388 bluez bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bluez-cups-5.64-2.el9.x86_64.rpm 8a8e71c10ae2f0c541e9ee8a52ea0f1143c1dd6211594aa7019bf412cabfcb73 bluez-obexd-5.64-2.el9.x86_64.rpm e18742504f5ce0356eddd3261328686ae389c9d2be991ee60f0b740fc14362fd RLBA-2022:8389 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms firewall-applet-1.1.1-3.el9.noarch.rpm 132cfd331c126e6c7f57780ddf807fbce3818c83aa80400a7b7a68ccc3ced384 firewall-config-1.1.1-3.el9.noarch.rpm 513101f93d671366a0bf846ec3dd60e79c01443b9e0dbd2d064294f7b58b4e37 RLEA-2022:8391 RDMA stack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, opa-fm, opa-ff, eth-tools, libfabric. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms eth-tools-basic-11.3.0.0-1.el9.x86_64.rpm e8fca5f6410b3cc8baed2f67126cb46c3f87f92e075fb8aa92d4d1a98b2b964b eth-tools-fastfabric-11.3.0.0-1.el9.x86_64.rpm 15a4716dfe7ebb61e8092c1cb92806bd3979d9477c308575804fffef38cfefee fabtests-1.15.1-1.el9.x86_64.rpm 1ce75ca3934c9eabaf501f1463f6eb500ab196152cf93d9cc26e90c3eaed3994 ibacm-41.0-3.el9.i686.rpm 90aac98e505537b1987a974afacb3f46678850293ddce51c091c32b5b2a758df infiniband-diags-41.0-3.el9.i686.rpm d0d4cd2b10e1e7f557861d9a123543a9656a8bf3b619ee388b76328a05f9e9c1 infiniband-diags-41.0-3.el9.x86_64.rpm b62e80e9e0e1e7718fdadcffaca96a26e752235a9a205e91aa14eaae9c608c96 libfabric-1.15.1-1.el9.i686.rpm e682db4fd862722330a4c9648d677d0a52998a5779bb9fdd92f35ca0ae5128e7 libfabric-1.15.1-1.el9.x86_64.rpm 95bcb9bdec56e40eab42bb41dcd7208a6f67def03f76d4475abb55293fdd5e87 libpsm2-11.2.229-2.el9.x86_64.rpm d7ba242dc79688fd5a9e02dfdea06c572d443fc5cb01b47e25bb0a02fdc94d4b libvma-9.6.4-1.el9.x86_64.rpm 2cbfed023436d40c56456d5874bbfc98019d5bd8acaa9a63521b501d9946bead libvma-utils-9.6.4-1.el9.x86_64.rpm 13e5b68493f9016c100305958bc1dddb204e7dd855d029705f5ce2a89696be1b mstflint-4.21.0-1.el9.x86_64.rpm eb584401fae30c96206656897be0123f26f98302c4fdc95cf71f6107873f5740 opa-address-resolution-10.11.1.3.1-1.el9.x86_64.rpm dd375db5b04de49b93593331e777fd594604130d1462e80f4b682e2d1821e107 opa-basic-tools-10.11.1.3.1-1.el9.x86_64.rpm 5904ecbe2bdf0783bda5193dfdda0e916f90b5e7244933fd72b4ffa05b02f2d4 opa-fastfabric-10.11.1.3.1-1.el9.x86_64.rpm 5e4f2ce19be5e6a8b6623c730abb332f8209bb3074e6610242c7ea8c663910e4 opa-fm-10.11.1.3.1-1.el9.x86_64.rpm ded9de152502d7ea969ed3a15f0919dc8c5a9c44c80f22041cbbbf2278a25a62 opa-libopamgt-10.11.1.3.1-1.el9.x86_64.rpm 345f3052cf46e449e31309e7180ce19ff55dd06e13315239971375876145de11 python3-pyverbs-41.0-3.el9.x86_64.rpm f07cecfa45bef993bae2d065bc79ed2d7bb8d015cdc3d497dad081806dff80ee rdma-core-devel-41.0-3.el9.i686.rpm 9059e3159391e594ceaad159dd3643e71309863a86d097b3889c32333292d93d rdma-core-devel-41.0-3.el9.x86_64.rpm 3cd681cdc42164f5672e330f421d38ba49dd5e8ca4bd28290e579e7d4201a3da ucx-1.13.0-1.el9.x86_64.rpm 68047a26615ebfe4776385591b1452f8dc9a3bb2ec5f3bc0d397bfc5d190cab7 ucx-cma-1.13.0-1.el9.x86_64.rpm 7d8aada8d71e77c77222ac71824c4681af905e00f4a2702e0155a696dcdbab4b ucx-devel-1.13.0-1.el9.x86_64.rpm 8520df00d8d8544565c82273ce686406a48185d9645614864fce13afdeb487ec ucx-ib-1.13.0-1.el9.x86_64.rpm 597c4f9d048c113de5202dd2b6503d2e0b3a7fa3c9661a63127b4b56be040fea ucx-rdmacm-1.13.0-1.el9.x86_64.rpm a3aadb00dc8dbc7504178005e9f3c1912637c02f87d1f732a771a7d86cb297d4 RLBA-2022:8395 fwupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fwupd-plugin-flashrom-1.7.9-1.el9.x86_64.rpm e6ed42e7c4f6f4a7689346ad5973c64ac82b538c8177ec166c785ea5d2750b38 RLBA-2022:8397 syslinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for syslinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms syslinux-tftpboot-6.04-0.20.el9.noarch.rpm 994537980594190c9502c844b578e6ceeb2581449cf0ddda5ae55a250d7866ae RLBA-2022:8404 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-9.el9.i686.rpm 316bf890297cbf97bb697eb2da35a687807ed48b277e7139f58597efc6102967 libblkid-devel-2.37.4-9.el9.x86_64.rpm 35441be62b604902e2b7318c28dc44d74695d9d3d710518e61fb2384c84ba4fe libmount-devel-2.37.4-9.el9.i686.rpm efc3eb9367ca28d9f11e0c5acb33b4862352bfdbf4de591e8cd1c2d3440b5ba8 libmount-devel-2.37.4-9.el9.x86_64.rpm 04f56834c1cbae3d13a9ac7bc9ff54d256ba1d782d98a58e32420f39e2007034 libuuid-devel-2.37.4-9.el9.i686.rpm bf1123b3cbbb9aa9d1df986f82e0580e6ff671cf9b08b4e01310b73e515b35f9 libuuid-devel-2.37.4-9.el9.x86_64.rpm 62d22b5a35d072dcfa99537d82490467a99acd3407edba9ae026c89726ad9da2 python3-libmount-2.37.4-9.el9.x86_64.rpm 1452fb7e7b70309dab9807d7fdbf2b27a332f1b52b91717515ebd6f615a1aaac uuidd-2.37.4-9.el9.x86_64.rpm 5817fbcd78f0bbe3f77009c6242381ab055d3db925e088bda90e630c2c361c44 RLBA-2022:8406 file bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-file-magic-5.39-10.el9.noarch.rpm eafbe173068a90394c9fe7b2d3b21b6a156c9ac4d11de3b49cd289a579b14a24 RLBA-2022:8424 libreoffice:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, mariadb-connector-c, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, yajl, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad boost-1.75.0-8.el9.x86_64.rpm 2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f boost-atomic-1.75.0-8.el9.x86_64.rpm 52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409 boost-chrono-1.75.0-8.el9.x86_64.rpm 784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f boost-container-1.75.0-8.el9.x86_64.rpm f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b boost-context-1.75.0-8.el9.x86_64.rpm 5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a boost-contract-1.75.0-8.el9.x86_64.rpm 7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434 boost-coroutine-1.75.0-8.el9.x86_64.rpm 1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75 boost-date-time-1.75.0-8.el9.x86_64.rpm d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98 boost-devel-1.75.0-8.el9.x86_64.rpm 445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd boost-fiber-1.75.0-8.el9.x86_64.rpm c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369 boost-filesystem-1.75.0-8.el9.x86_64.rpm 9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d boost-graph-1.75.0-8.el9.x86_64.rpm 0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5 boost-iostreams-1.75.0-8.el9.x86_64.rpm fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585 boost-json-1.75.0-8.el9.x86_64.rpm 4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f boost-locale-1.75.0-8.el9.x86_64.rpm 675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3 boost-log-1.75.0-8.el9.x86_64.rpm 1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720 boost-math-1.75.0-8.el9.x86_64.rpm a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161 boost-nowide-1.75.0-8.el9.x86_64.rpm 85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1 boost-numpy3-1.75.0-8.el9.x86_64.rpm 00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b boost-program-options-1.75.0-8.el9.x86_64.rpm a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e boost-python3-1.75.0-8.el9.x86_64.rpm 872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731 boost-random-1.75.0-8.el9.x86_64.rpm b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098 boost-regex-1.75.0-8.el9.x86_64.rpm 7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c boost-serialization-1.75.0-8.el9.x86_64.rpm 73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f boost-stacktrace-1.75.0-8.el9.x86_64.rpm 884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a boost-system-1.75.0-8.el9.x86_64.rpm b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f boost-test-1.75.0-8.el9.x86_64.rpm 1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487 boost-thread-1.75.0-8.el9.x86_64.rpm 55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989 boost-timer-1.75.0-8.el9.x86_64.rpm fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162 boost-type_erasure-1.75.0-8.el9.x86_64.rpm 736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383 boost-wave-1.75.0-8.el9.x86_64.rpm 555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba Box2D-2.4.1-7.el9.x86_64.rpm 20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm 37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c dconf-0.40.0-6.el9.x86_64.rpm 094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f flute-1.3.0-27.OOo31.el9.noarch.rpm 59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308 google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4 google-noto-fonts-common-20201206-4.el9.noarch.rpm 31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7 google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm 8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313 google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm 1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9 google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm 113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0 google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3 google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm 9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579 google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm 574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802 google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8 google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17 google-noto-sans-fonts-20201206-4.el9.noarch.rpm 28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm 66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48 google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm 5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm 870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6 google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953 google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm 91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91 google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm 46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm 1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm 019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3 google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761 google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm 6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899 google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902 google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3 google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm 2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420 google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm 6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm 34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137 google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm 387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3 google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm 5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35 google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm 46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730 google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm 99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm 9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7 google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm 525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51 google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm 866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334 google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm 0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911 google-noto-serif-fonts-20201206-4.el9.noarch.rpm 310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7 google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm 254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2 google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183 google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm 98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm 0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4 gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457 gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1 gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm 1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13 hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c hunspell-ar-3.5-15.el9.noarch.rpm c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0 hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 hunspell-ca-2.3-19.el9.noarch.rpm 98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d hunspell-cs-20080822-16.el9.noarch.rpm d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784 hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d hunspell-de-0.20161207-9.el9.noarch.rpm 3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495 hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 hunspell-et-0.20030606-27.el9.noarch.rpm 801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90 hunspell-eu-5.1-4.el9.noarch.rpm 537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38 hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 hunspell-ga-5.0-10.el9.noarch.rpm 5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73 hunspell-gl-0.20080515-24.el9.noarch.rpm 21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28 hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 hunspell-he-1.4-15.el9.x86_64.rpm 8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45 hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f hunspell-kk-1.1-22.el9.noarch.rpm c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417 hunspell-kn-1.0.3-24.el9.noarch.rpm 57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 hunspell-ml-0.1-26.el9.noarch.rpm 775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b hunspell-pl-0.20180707-9.el9.noarch.rpm bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3 hunspell-pt-0.20130125-18.el9.noarch.rpm 80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 hunspell-si-0.2.1-24.el9.noarch.rpm 1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783 hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hunspell-ss-0.20091030-22.el9.noarch.rpm f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06 hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 hunspell-th-0.20061212-25.el9.noarch.rpm 400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38 hunspell-tn-0.20150904-9.el9.noarch.rpm 34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8 hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 hunspell-uk-1.8.0-9.el9.noarch.rpm 48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc hyphen-2.8.8-17.el9.x86_64.rpm 6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994 hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b hyphen-cs-20080822-16.el9.noarch.rpm 18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 hyphen-devel-2.8.8-17.el9.x86_64.rpm c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d hyphen-el-0.20051018-25.el9.noarch.rpm ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5 hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 hyphen-es-2.3-11.el9.noarch.rpm 1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218 hyphen-et-0.20030606-27.el9.noarch.rpm 4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 hyphen-fr-3.0-10.el9.noarch.rpm ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28 hyphen-ga-0.20040220-24.el9.noarch.rpm e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc hyphen-gl-0.99-23.el9.noarch.rpm 7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1 hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 hyphen-it-0.20071127-26.el9.noarch.rpm 201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9 hyphen-kn-0.7.0-19.el9.noarch.rpm 084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41 hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa hyphen-ml-0.7.0-19.el9.noarch.rpm 963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038 hyphen-mr-0.7.0-19.el9.noarch.rpm 99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef hyphen-pt-0.20021021-25.el9.noarch.rpm 0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e hyphen-ru-0.20200325-4.el9.noarch.rpm ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6 hyphen-sk-0.20031227-26.el9.noarch.rpm 7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34 hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 hyphen-sv-1.00.1-26.el9.noarch.rpm ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94 hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 libabw-0.1.3-7.el9.x86_64.rpm 57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09 libbase-1.1.3-31.el9.noarch.rpm 0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738 libcdr-0.1.7-3.el9.x86_64.rpm 416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22 libcmis-0.5.2-12.el9.x86_64.rpm a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76 libepubgen-0.1.1-9.el9.x86_64.rpm cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398 libetonyek-0.1.10-2.el9.x86_64.rpm a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806 libexttextcat-3.4.5-11.el9.x86_64.rpm 693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245 libfontenc-1.1.3-17.el9.x86_64.rpm 867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23 libfonts-1.1.3-35.el9.noarch.rpm 6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081 libformula-1.1.3-32.el9.noarch.rpm bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b libfreehand-0.1.2-11.el9.x86_64.rpm 443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d liblayout-0.2.10-25.el9.noarch.rpm 15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291 libloader-1.1.3-32.el9.noarch.rpm 76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1 libmspub-0.1.4-17.el9.x86_64.rpm 134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e libmwaw-0.3.21-1.el9.x86_64.rpm 5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927 libnumbertext-1.0.6-4.el9.x86_64.rpm ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab libodfgen-0.1.8-4.el9.x86_64.rpm 0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2 liborcus-0.16.1-8.el9.x86_64.rpm 8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec libpagemaker-0.0.4-13.el9.x86_64.rpm aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542 libqxp-0.0.2-11.el9.x86_64.rpm 68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71 libreoffice-voikko-5.0-10.el9.x86_64.rpm d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0 librepository-1.1.3-31.el9.noarch.rpm 7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libserializer-1.1.2-30.el9.noarch.rpm d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68 libshout-2.4.3-7.el9.x86_64.rpm 4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435 libstaroffice-0.0.7-5.el9.x86_64.rpm bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783 libv4l-1.20.0-5.el9.x86_64.rpm 959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3 libvisio-0.1.7-9.el9.x86_64.rpm ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324 libvoikko-4.3-7.el9.x86_64.rpm 700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 libwps-0.4.12-4.el9.x86_64.rpm 62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0 libzmf-0.0.2-18.el9.x86_64.rpm fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b lksctp-tools-devel-1.0.19-2.el9.x86_64.rpm bf2e756643f8a88569b72930c7a44ef9b1bd76826798d43bd77c11b772f2a6b7 lksctp-tools-doc-1.0.19-2.el9.x86_64.rpm b668730b3ef6fc60ff22801aa6e25e9e2c7813e3ad51109bfd987dd136cb2747 lpsolve-5.5.2.0-28.el9.x86_64.rpm 8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b mariadb-connector-c-3.2.6-1.el9_0.x86_64.rpm 007d48646e32a1747734871f4169495fd04ae62b670a9a5ebcca9997329f6a8c mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm 35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f mariadb-connector-c-devel-3.2.6-1.el9_0.x86_64.rpm 2562fbfe459c902520b792ca0827024402b856c0eab28da8df59e2bcda2bbb31 mythes-bg-4.3-21.el9.noarch.rpm 1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb mythes-ca-1.5.0-24.el9.noarch.rpm ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b mythes-cs-0.20070926-27.el9.noarch.rpm c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e mythes-da-0.20100629.15.16-22.el9.noarch.rpm 2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233 mythes-de-0.20210302-3.el9.noarch.rpm 56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298 mythes-el-0.20070412-27.el9.noarch.rpm a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393 mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 mythes-es-2.3-10.el9.noarch.rpm 5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2 mythes-fr-2.3-19.el9.noarch.rpm c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb mythes-ga-0.20071001-27.el9.noarch.rpm ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3 mythes-hu-0.20101019-23.el9.noarch.rpm 95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967 mythes-it-2.0.9l-26.el9.noarch.rpm c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6 mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nl-0.20130131-17.el9.noarch.rpm 1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121 mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 mythes-pl-1.5-28.el9.noarch.rpm ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2 mythes-pt-0.20060817-27.el9.noarch.rpm 1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36 mythes-ro-3.3-22.el9.noarch.rpm b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7 mythes-ru-0.20070613-25.el9.noarch.rpm 9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3 mythes-sk-0.20130130-19.el9.noarch.rpm 03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed mythes-sl-0.20130130-19.el9.noarch.rpm 620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d mythes-sv-1.3-21.el9.noarch.rpm 9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3 mythes-uk-1.6.5-22.el9.noarch.rpm bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d neon-0.31.2-11.el9.x86_64.rpm 30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 openjpeg2-2.4.0-7.el9.x86_64.rpm 380ef2db96766ecee5e15cce67f91b5d73c721672930add64bd35de5da12c6a7 pentaho-libxml-1.1.3-30.el9.noarch.rpm d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4 pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm 561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776 poppler-21.01.0-13.el9.x86_64.rpm 15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc poppler-cpp-21.01.0-13.el9.x86_64.rpm 054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-13.el9.x86_64.rpm b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40 poppler-qt5-21.01.0-13.el9.x86_64.rpm ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163 poppler-utils-21.01.0-13.el9.x86_64.rpm 40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f postgresql-jdbc-42.2.18-5.el9.noarch.rpm e59b40159b9c5a040052f1cdccfc3abbc4491622c7fd656e0e5edf9d66ca8ae0 python3-libvoikko-4.3-7.el9.noarch.rpm 73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f raptor2-2.0.15-30.el9.x86_64.rpm e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e rasqal-0.9.33-18.el9.x86_64.rpm da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f redland-1.0.17-29.el9.x86_64.rpm 487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d sac-1.3-37.el9.noarch.rpm 4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e taglib-1.12-6.el9.x86_64.rpm cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10 ttmkfdir-3.0.9-65.el9.x86_64.rpm 6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6 twolame-0.3.13-19.el9.x86_64.rpm cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f twolame-libs-0.3.13-19.el9.x86_64.rpm d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0 voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 xmlsec1-1.2.29-9.el9.x86_64.rpm ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a xmlsec1-nss-1.2.29-9.el9.x86_64.rpm 04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2 xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm 435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679 xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec yajl-2.1.0-21.el9.x86_64.rpm 98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de yajl-2.1.0-21.el9_0.x86_64.rpm 0a66ac8a71ba35e7087fdea5f7fcab8fefbe6d5b4e0a3e3442d37c0066f5cadc RLBA-2022:8449 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2136770) rocky-linux-9-x86-64-appstream-rpms rpm-apidocs-4.16.1.3-19.el9_1.noarch.rpm f84de4b4316328f580034a4c2cf49a45e547bb106dd37248ffa57a50d9adbffd rpm-build-4.16.1.3-19.el9_1.x86_64.rpm b2cb65dcf5676b8367432c49088762a3f35a67ebdcf5b50829f8c49b529934c3 rpm-cron-4.16.1.3-19.el9_1.noarch.rpm 4c3cf15444097a08bfd5fe216283672af6024b6f756b1307ee3ba86cf2dd7fe7 rpm-devel-4.16.1.3-19.el9_1.i686.rpm 37d8f29633a662fbe8d6ba5b4126b6e8ab7eb48d5403300bd6677ab3729e24f1 rpm-devel-4.16.1.3-19.el9_1.x86_64.rpm 0159f41701a0966d15a08a218c5fadbc147f9a5178ba78e290b009a973dec9c2 rpm-plugin-fapolicyd-4.16.1.3-19.el9_1.x86_64.rpm 4598210a33576198b8bbadb493836434b5f84969f087cb1ae38d4a0d507b3338 rpm-plugin-ima-4.16.1.3-19.el9_1.x86_64.rpm 65cd73befb77706ba853afee4a338aed5cfda86e66046df728a110e960cdf813 rpm-plugin-syslog-4.16.1.3-19.el9_1.x86_64.rpm 2a7708702cc92a3ae4cdce4126b34264f8826aff95e81e3857e84fe733265bff rpm-plugin-systemd-inhibit-4.16.1.3-19.el9_1.x86_64.rpm a2dee2e1dd3cc40049a500d021858a55128774a78b4c7effc5e8fd7cc90601cb RLSA-2022:8493 Important: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.14-1.el9_1.1.i686.rpm 48fd68110090a368bf2f23454cd5fb4227ddd7e312101d3415b2868257198b9d python3-devel-3.9.14-1.el9_1.1.x86_64.rpm beabc37d468844e408deb670ef0497adc44d7a14060b9f41beb213445fbfcdff python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm b952c1061c4c06a74066ee00a44b763a940fffc7f5a7b373d45363581345b5de python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm 6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279 RLSA-2022:8637 Important: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.19.1-24.el9_1.i686.rpm e9437d87122b41e9f67a3f8625c4bec8dd9522653dcb7f8cb351648833d8c99c krb5-devel-1.19.1-24.el9_1.x86_64.rpm f9dd6b0c2ad3644a89ccb7b9a0fa736e5307a265ea6b3a6176c470b3a33d039e RLSA-2023:0282 Important: sudo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm 3c51c1e16d0fb0f70feb41a7bea3b9e142e87aca3aca6e552e75befd4761280a RLBA-2023:0332 zlib bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix: * Rocky Linux9.0 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2135745) rocky-linux-9-x86-64-appstream-rpms zlib-devel-1.2.11-35.el9_1.i686.rpm b1c1674d907c001384daf05c9fe0eff545249472c3049f19e96c247be0aad0cd zlib-devel-1.2.11-35.el9_1.x86_64.rpm dc6518b2fc127ed37aaf8e32b09159dd9db328d9de7166bb2f8f24ca602f9b97 RLSA-2023:0333 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: POST following PUT confusion (CVE-2022-32221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libcurl-devel-7.76.1-19.el9_1.1.i686.rpm 7ad05dc436af09c7642094ec4ad4eb00e84f3473b51d0bba0f55dbd7d76d1d33 libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm aec15566a0f096caa322970eb819aceae4520f8feac9ed3ec46a649bc6d7ed00 RLSA-2023:0335 Moderate: dbus security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms dbus-daemon-1.12.20-7.el9_1.x86_64.rpm e4bef9396a76a1a35f988e05cabcdbe24abba844d163e99597ae039cf500b21c dbus-devel-1.12.20-7.el9_1.i686.rpm ffd7cf2c7d3df426b4188a06c63711e1f96b15c29fbe33481eaa407cebfba01b dbus-devel-1.12.20-7.el9_1.x86_64.rpm 9d945fe9e08c6a574e23be1dbe12502e233ddb7324e250cc403fa5398a5773fc dbus-x11-1.12.20-7.el9_1.x86_64.rpm c5b74a375b87c45afdba308b0eae7bf474754c3d7ea460d600c3acb8681f7732 RLSA-2023:0336 Moderate: systemd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: buffer overrun in format_timespan() function (CVE-2022-3821) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-12.el9_1.1.i686.rpm 921151c64773074869b8df7f17977e220c78b208d5b2148198755ec8cfd9f3fd systemd-devel-250-12.el9_1.1.x86_64.rpm 9561845b251615a5715cf19ae5ac180cf2f72cfd4b93e6472db40a1663802123 systemd-journal-remote-250-12.el9_1.1.x86_64.rpm f3d437b037773dcea88ddf212091b9a55471acb33169138759be996306050b81 RLSA-2023:0337 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.4.9-1.el9_1.1.i686.rpm d56de768135c8173e1a48fd540d0d95c0e6f222c8ace97b3065c3bca57c2f615 expat-devel-2.4.9-1.el9_1.1.x86_64.rpm 442a1d6ce6f18fe5e24d2816d8781dd54885432cf72a77f0ab3945a68117049b RLSA-2023:0338 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-3.el9_1.i686.rpm 276956a8fbe2b1be327e2c1dd4357fedf3846313365a713e824d8872d988a33f libxml2-devel-2.9.13-3.el9_1.x86_64.rpm c53a522fe38db759678ab1c634127868fd516b781880dedee75aba109041fc7e RLSA-2023:0339 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sqlite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sqlite-3.34.1-6.el9_1.i686.rpm 9458e0539f8508ed7927ad6fcca5e7d84c0dda4eedfd34c8326a370f3c6c4bc6 sqlite-3.34.1-6.el9_1.x86_64.rpm b5a603b09425c50ed52067c2bd2fa866a68ac39a1b17086d6ce08fce1e37aa99 sqlite-devel-3.34.1-6.el9_1.i686.rpm b59bc71172106a4722b36a0ea4d84fdd432af6c50df42c544533d9f60b6478af sqlite-devel-3.34.1-6.el9_1.x86_64.rpm e7949f7b0eb0ff292616f0efb3044ebf2f02b49c1123df64ffb08e6d2cf2bfd1 RLBA-2023:0341 iputils bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Bug Fix: * annocheck reports that no compiled code found in /usr/bin and /usr/sbin (BZ#2147538) rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-8.el9_1.1.x86_64.rpm b968204aca3bf61196bace1dd638d5f3bd6426aa625f14d182264e9719c05463 RLBA-2023:0342 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix: * glibc: Restore IPC_64 support in sysvipc *ctl functions (BZ#2142111) rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-40.el9_1.1.i686.rpm 809dcfd1bb41816d5633c66b90ac759cbb40cdb33cff1c52bb1b114b0956e55c glibc-devel-2.34-40.el9_1.1.x86_64.rpm 7e7b8ccf16deb632f4d20b56b0a6eda9704c6255b2c04386b9d4e65ad378fe7a glibc-doc-2.34-40.el9_1.1.noarch.rpm 1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab glibc-headers-2.34-40.el9_1.1.x86_64.rpm c4edb39982fbcd3975b254a378b452ea1d73b94f8db90b01027c749c749a9e17 glibc-locale-source-2.34-40.el9_1.1.x86_64.rpm 045c95d9ff47011ee0225aea5115ddbe42fea8c3bc129b9c0d3cb2fea1a7a7e3 glibc-utils-2.34-40.el9_1.1.x86_64.rpm be083837ee6d4762cde490f3b9cce8421f1f0d2d3d79611e7ec8df1a540d0d7a RLSA-2023:0343 Moderate: libtasn1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtasn1-devel-4.16.0-8.el9_1.i686.rpm 454331c78e2a86c9bd8ddd28782a95dc8aa2e5309a9efd16d014f67c28e8aed8 libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm f38461f7aab8690eab2da2769a10e23e4f7a1b28fc457ccd5879f4c321217ead libtasn1-tools-4.16.0-8.el9_1.x86_64.rpm be199dfca1202d1be55af3d09ff746d9f408f648785e5e29c6450c0de1d7016a RLBA-2023:0345 authselect bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for authselect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix: * change the default password encryption algorithm back to sha512 (BZ#2151230) rocky-linux-9-x86-64-appstream-rpms authselect-compat-1.2.5-2.el9_1.x86_64.rpm 829b7652bdd4b2aa1d417ef8efb8a7ed3bf2d1ea114825069cef2168c8ad98ab RLBA-2023:0347 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139870) * SSS_CLIENT: fix thread unsafe access to get*ent structs. (BZ#2141830) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142960) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148988) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152884) rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.7.3-4.el9_1.3.x86_64.rpm eccbe135e9df9e1c11bb358bf5acec78bb2b12d26be98a1e013a3170e3efce1d RLBA-2022:2305 new packages: udica Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms udica-0.2.6-4.el9.noarch.rpm 54817f989f1f166523eeeae9442c1621f1e4c1452531c3a4833613442454e659 RLBA-2022:2309 new packages: python-psutil Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-psutil. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-psutil-5.8.0-12.el9.x86_64.rpm 6317c0906b95002754b3a21845df126114a8ce1b74651196e70c049f2b92826b RLBA-2022:2318 new packages: libguestfs-winsupport Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libguestfs-winsupport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libguestfs-winsupport-9.0-1.el9.x86_64.rpm 7932110c60482d36a73da0788b3e77b3e5bbbf1a3037378f5897f025fbf7d0bf RLBA-2022:2319 new packages: devhelp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for devhelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms devhelp-40.1-1.el9.x86_64.rpm e883ade9a929826906ae1808d66dc49439b2c0386c161c5c2251828ca3660a3d devhelp-libs-40.1-1.el9.i686.rpm 0d7308f54b62f65e89b203ac8bac0b5fe9c91b280b1858e09cec49a00f20d8d1 devhelp-libs-40.1-1.el9.x86_64.rpm 21f09ca3359a6d1f4d0b43bcf4c7ac605bb821675e5f025a9e2855b6194344fe RLBA-2022:2321 new packages: hivex Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hivex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hivex-1.3.21-3.el9.x86_64.rpm 419e145c2cfffc26fc6439c8042fdd7b34e39d440a93e130cefdba838dcba095 hivex-libs-1.3.21-3.el9.i686.rpm 3cc03ce54f84b8e4c49ba9dbae3ab70ef0bbb6bb4bda08764e1b7f288e2b889f hivex-libs-1.3.21-3.el9.x86_64.rpm 3204db0bf220ffa122b53cf2c9d93972f837576de92ac730eb5b119abaad7092 perl-hivex-1.3.21-3.el9.x86_64.rpm 513e23e3ee6efb64b2634e92e6cfb43fcc9fd553d959f95d9044947b73ed0772 RLBA-2022:2323 new packages: nvml Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nvml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms daxio-1.10.1-2.el9.x86_64.rpm deb874ee4297b855ab257aafaea95fab73dcff72dee467bb6d9f87d571ef8724 libpmem-1.10.1-2.el9.x86_64.rpm 594c5dfb4205afffbd250597b1867975ae660c6d088660ec1f309487815f839d libpmem2-1.10.1-2.el9.x86_64.rpm abc2a70b9d24dc8c7b93395f8d8f38fc68fee63f837407e5e47696871ead1968 libpmem2-debug-1.10.1-2.el9.x86_64.rpm 4025588361bcd871ff043b7d168027677e728e6aee7d1f892923732c2976a2b6 libpmem2-devel-1.10.1-2.el9.x86_64.rpm 6f4db16a75bdb075568a27a93bc3ef42feab20c7c70fe8a3310fdfb2e8746169 libpmemblk-1.10.1-2.el9.x86_64.rpm 268956db1650cf2107eaf852d8ebedab47a4671a1ebec5ecfa226a3bae38b5a2 libpmemblk-debug-1.10.1-2.el9.x86_64.rpm e9a0a48f73eac91ed54aa91d183bb3b517e05d6dc640e3bd8051866075eddb66 libpmemblk-devel-1.10.1-2.el9.x86_64.rpm 32268084f61346b062925d37838b816797bd240e5426ba58234ec9d1c24544ce libpmem-debug-1.10.1-2.el9.x86_64.rpm fd19262cdc9fb34195a7958ab94ff74e3975eb4e7000e1ab11d582f818bcecef libpmem-devel-1.10.1-2.el9.x86_64.rpm e054c99d8d0e7a793e25597fbd462e8b9e550424b141e8948666ec29c64fd31a libpmemlog-1.10.1-2.el9.x86_64.rpm 2ac80c20f9df80ef4f6b619f330fdd78d75574b162d2ab4451d71fe657f1ce35 libpmemlog-debug-1.10.1-2.el9.x86_64.rpm 27ac1e27b51074d83695cedd5b6d655d5142d365b47ef32a0c98480567007253 libpmemlog-devel-1.10.1-2.el9.x86_64.rpm 59bf2adbeaf4ba578aefc6f1941f62f61ac981af406cdb7ec32e9ee2c55a30d8 libpmemobj-1.10.1-2.el9.x86_64.rpm 7cbafb3c2c87692c4dff0a2b4be0baad0b8dae32e53d04b0da6cf1dbd4ba76aa libpmemobj-debug-1.10.1-2.el9.x86_64.rpm f656bc7148a9ef1a89a366c17a6df7400fdc57a31453b776f3dd8882e23f6702 libpmemobj-devel-1.10.1-2.el9.x86_64.rpm d970ae3991156e5628064aefe0b7bfe1320a1771258e2296c9d32fc55d38b215 libpmempool-1.10.1-2.el9.x86_64.rpm 69ecdf513b924c69695eb43b8bc49b46f69f79d42cd25fd7472651cafcf4622b libpmempool-debug-1.10.1-2.el9.x86_64.rpm 8d1cd134b6ea707cbcff40c39c1034fd880b9d97dc6567b129eacd93fbe30b96 libpmempool-devel-1.10.1-2.el9.x86_64.rpm 6f4231908548bff2294524bb8e49ba7eb978f0ba147c34ab4a3d0e3d87d68a07 pmempool-1.10.1-2.el9.x86_64.rpm f3edd0117b7f2815fa8b6c5314407b615bb47b648bb76eecb638fbabb6b866d9 RLBA-2022:2325 new packages: libserf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libserf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libserf-1.3.9-26.el9.i686.rpm 764d428b435c1dcfa73132faa79d4807b6a289a515a38d98d693b212f6d16ca0 libserf-1.3.9-26.el9.x86_64.rpm fc083199cfeb80e0a8afaeee5694208ea72778f43983cb676268601907c954c1 RLBA-2022:2328 new packages: pipewire Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pipewire-0.3.47-2.el9.i686.rpm 5959f4c9795565db471cb48285baa8cedb1523edb0a49a85fc24e5e0f9fdf932 pipewire-0.3.47-2.el9_0.i686.rpm 78f3a5e519b4ee96d863d9ba4b3565365f617ad5583e131ce7d5dbbf8184644f pipewire-0.3.47-2.el9.x86_64.rpm 3de3a83596a47b935d33bdc0bd66090295b02239b0cb1bea4cccf3958d3f6df8 pipewire-0.3.47-2.el9_0.x86_64.rpm adf65844a10a8cea61e41ffda9df8213438e43cfab3df9668ca83d20580c51f2 pipewire-alsa-0.3.47-2.el9.i686.rpm 306f3e302d86f97336fc3ce58c941c65156c20afc2df2053945494a6dea290ca pipewire-alsa-0.3.47-2.el9_0.i686.rpm 4bf5b7445820ea10cecdfdf0b54fb134936c73772133613d794f666c13e01fa7 pipewire-alsa-0.3.47-2.el9.x86_64.rpm fe6b1e032263d0d7c4aaaec9eeb4913b24d03794de30f40bf88e6d2d8e443f47 pipewire-alsa-0.3.47-2.el9_0.x86_64.rpm c51a21f9b6e1e029bdf7ac320e6f1e7dee4dd8aa3287a29571962df9f92f0770 pipewire-devel-0.3.47-2.el9.i686.rpm 803c0900add1cc0bdf16964d4d42a74ca9bfe1db88ba897741640618b4a30768 pipewire-devel-0.3.47-2.el9_0.i686.rpm e224d8da11ca73f586698bd63ce6cdf51412b31e935ec0734c6035163e0b9415 pipewire-devel-0.3.47-2.el9.x86_64.rpm 1b80dbba8c30cde1f574587f158a11c50815b699cbb59ec19d25b6ae34d4c781 pipewire-devel-0.3.47-2.el9_0.x86_64.rpm 8c13bff2248b69fbfadaab52829244107b7dccd5ea1ac878b3d96632d11de85c pipewire-gstreamer-0.3.47-2.el9.i686.rpm 176368d405004d1be22432a1fdd2c7856c6ac42c82d4d41646f91189c4ea16c5 pipewire-gstreamer-0.3.47-2.el9_0.i686.rpm 0fad63f51b9846aabb50705d83f295dc776c11df4e81f8f54fe6c9ef23e8db29 pipewire-gstreamer-0.3.47-2.el9.x86_64.rpm 07019486ea9968f3fcfa2436370b1065673c510f872285a5d6363cab5d9e0160 pipewire-gstreamer-0.3.47-2.el9_0.x86_64.rpm 1394fd3d4b854330d3d13858ea7b3040782eb85ae0d27fdba6a9bbbd74dd26ae pipewire-jack-audio-connection-kit-0.3.47-2.el9.i686.rpm 92c3f5ab981bc430c21102c2ff04f0dba8e8f06a3b17b899768ba6eb6b804e82 pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.i686.rpm 609b64b11edebb55cd83728158ac3baaee0e78d7b04bbbbb673f8ce6ef4534c3 pipewire-jack-audio-connection-kit-0.3.47-2.el9.x86_64.rpm aa7ea3528e16a8af6aabf7b4f300548ba25eb56c4a0ca82a9d22603e2eed029f pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.x86_64.rpm 06b057d2d6ebb8ec1d314dc0bd56eb3108dd839513253fa4942db78963ba81f2 pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.i686.rpm a501d458ae5a43c3c1c1c5a40f98cbf7d74e20b31928b158dadba80ad838ad0c pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.i686.rpm 5b392954b71927ebb460970806535bd9859a38ebbd6ced14b1f510518e3fc912 pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.x86_64.rpm 6bc6089139b156c5afa64891e6395fbf7a4d84fbb835569093ea6908e699b43c pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.x86_64.rpm 6dd8353c6bc29febe1ebdf348a02751a0268bb48a8cf687184584f42a23ba04d pipewire-libs-0.3.47-2.el9.i686.rpm 6dff526d939f72cc31545a2d83142787f555fcb7f29805160d2b16d19e7fca5a pipewire-libs-0.3.47-2.el9_0.i686.rpm 21eeb0d2776d467205bc323e3e116a0316e53aee99e57cc12cd28be957afd1e9 pipewire-libs-0.3.47-2.el9.x86_64.rpm 0c2d96713249488829737d7107396fdc566f87031931ed105623bcadd44cbcef pipewire-libs-0.3.47-2.el9_0.x86_64.rpm 556c112b74be8c56f77fd31da9fdf43a34544e973313022a4cc0e7bda37e3971 pipewire-pulseaudio-0.3.47-2.el9.x86_64.rpm 7415b8fde19ea9bb78959a7fcc30e945f07bbd05643a56efe60138c7a86ab00f pipewire-pulseaudio-0.3.47-2.el9_0.x86_64.rpm 9ff68cf2fa5df1a951bc282d64e3c48b62e0e24bd1e88bfdd6e869e1294c5b0b pipewire-utils-0.3.47-2.el9.x86_64.rpm 01de374851cb6f1989858bfba16cf220b38141da9da1e4cf9c4d54e4bdba65ee pipewire-utils-0.3.47-2.el9_0.x86_64.rpm f629232bebeccb0f15c7d5353ef38d878f91d8debcbc2debf589360e6236e412 RLBA-2022:2332 new packages: libuv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libuv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libuv-1.42.0-1.el9.i686.rpm 83559a7fc25392875981ad359bea9191ab1a57ee1b20326a21e960adb796aaa8 libuv-1.42.0-1.el9.x86_64.rpm f6410030faa3742c603bf6cb83a6c183af7f54931b7131899d27b84eba2a535d RLBA-2022:2333 new packages: google-droid-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-droid-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-droid-sans-fonts-20200215-11.el9.2.noarch.rpm b1f42ac011506010a6e1e75ad65770d6a907c4fc3ac1e240b577bf4c0ebbea8d google-droid-sans-mono-fonts-20200215-11.el9.2.noarch.rpm cd22214cbc62cfb485818bc5372b634311c21d124aed246d012b5c3a8e955d81 google-droid-serif-fonts-20200215-11.el9.2.noarch.rpm df7b2b6b8aeac1386fc2d01b49c6e09e57984eae863e72d19944142b4228ae89 RLBA-2022:2335 new packages: flatpak-builder Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak-builder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-builder-1.2.2-1.el9.x86_64.rpm 59077807b106baa7e87ac3d59807a00d64fd99748a9ff22a2a88820ad9b79e76 RLBA-2022:2337 new packages: resteasy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for resteasy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-resteasy-client-3.0.26-15.el9.noarch.rpm d40d5975d4bded909f13de9bbfb206ecda9a963e81a2148e3ef3e13f88c195cc pki-resteasy-core-3.0.26-15.el9.noarch.rpm ce9e2e9b809e5b278dae5f411c8644e5ed84ce4c95dc0deb2fc60eda48ae7383 pki-resteasy-jackson2-provider-3.0.26-15.el9.noarch.rpm 6427fc10b739350fc46f21253bbab10efc6dfe58828651598332bad6d03ed966 RLBA-2022:2346 new packages: jss Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jss-5.0.3-1.el9.x86_64.rpm 3c1cf2a2ac4aa918d80b1101abffe89c3b25b09250958ecba59f6e40b1b62098 RLBA-2022:2347 new packages: jackson-modules-base Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-modules-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-module-jaxb-annotations-2.11.4-8.el9.noarch.rpm e2553e02a8e0b5629ecf746d7831aa392412be30c7a9d9ef33698491ca39e2b0 RLEA-2022:2358 new packages: js-d3-flame-graph Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for js-d3-flame-graph. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms js-d3-flame-graph-4.0.7-1.el9.noarch.rpm 6367726243e008cc3eac71a80fc434aedf05821194d8078b703839c38cfef2a3 RLBA-2022:2366 new packages: tomcatjss Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcatjss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcatjss-8.0.0-1.el9.noarch.rpm 6aed98268ad54cbf0e771d579f2274ebcedf460eff72ba8c8d3a1a6119592e0d RLBA-2022:2367 new packages: ldapjdk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ldapjdk-5.0.0-1.el9.noarch.rpm c8ee60c5a68c25da964a182d1b0c4ee00bf617c94e05382dec38a74ca6eb8f88 RLBA-2022:2369 new packages: emacs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-6.el9.x86_64.rpm 46aad26c8380125d22978d88ab4f9fd0905f2d96acb1f8b297144c53ef558887 emacs-common-27.2-6.el9.x86_64.rpm 5632fc384ba44b82ca8ab327d6feeadf5c84036da790cca6bbf0b1840457f4f8 emacs-filesystem-27.2-6.el9.noarch.rpm 602bb41ecc4c7f0690bcf07105ebd468e3ab50c856d27bf1f02e1c3292a29a24 emacs-lucid-27.2-6.el9.x86_64.rpm 14b0d64ed26ea0ba198dc027a10c8ddf51714a488c83221a916e5f06c7a4f7f0 emacs-nox-27.2-6.el9.x86_64.rpm 3a7a89f6f63a9781cdf0bc1ec34172d0ead85a5fc6618eef2557f6dd86deefea RLBA-2022:2375 new packages: dwarves Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dwarves. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dwarves-1.22-1.el9.x86_64.rpm b2a0897bbe16d9916ab8ddb44cc14e9e3913168575e23c59b6b8c8f7d8df57a5 libdwarves1-1.22-1.el9.i686.rpm d62ca19172c762a6bcc681ce4af26bb62cca8716249659fdf027564a961f098f libdwarves1-1.22-1.el9.x86_64.rpm 2a1d8a4d51adbc3820fe07643a51f42660fc8b75624ae64532b28c3bd5e722af RLBA-2022:2377 new packages: memkind Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for memkind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms memkind-1.11.0-2.el9.x86_64.rpm 5d13c1ea03776e9d29c07dbe58aad08e106a1841ee39ac3a05a2f65a2dcef4e9 RLBA-2022:2392 new packages: libical Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libical. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libical-3.0.14-1.el9.i686.rpm b86f33ae0ea0166b1d080b95c81771f55450166c014af99d2bbeae3022b577ed libical-3.0.14-1.el9.x86_64.rpm ec973313c55795424cb8e4ad3c17cd7ae95997ec812b377d38a4963a9998ed55 libical-devel-3.0.14-1.el9.i686.rpm 8dc0d506a3f733ec58c6cf2eab0e8f81605f0694ecb88b00f89667019403f62a libical-devel-3.0.14-1.el9.x86_64.rpm 735b5b58b5bb16c540857dd80058c41100dc462e26652e1f5b21872c31d6df21 libical-glib-3.0.14-1.el9.i686.rpm 7c4c52d0413a100a69e71dabebf54bd1386c96762016ed683879b52dffa94b66 libical-glib-3.0.14-1.el9.x86_64.rpm cb9c5620c547574bec339ecf2f7184eee37133d25879a96e49e28b2fadc15e05 libical-glib-devel-3.0.14-1.el9.i686.rpm 0a63d1c0d62a9623779d67b617def1d63ff5524a00ebe1e1dfa61b9c890121ff libical-glib-devel-3.0.14-1.el9.x86_64.rpm 2a75f49a4fe9f799f8901f6fef64d37a4a5e837fe9b9d30537f2fca6dadbb28e RLBA-2022:2394 new packages: tcsh Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tcsh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tcsh-6.22.03-6.el9.x86_64.rpm a81016748a5d13df50b7271571372585873f7fa02d2545b9e5776dc7c6079173 RLBA-2022:2396 new packages: appstream Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms appstream-0.14.5-1.el9.i686.rpm c99e533591bb4d472cb4861ada7730cbdc9d510b8b9ca8abdbd634e7e74c524e appstream-0.14.5-1.el9.x86_64.rpm b9f5cae3c6406a04a1d8f208616cc018217d166c51f496a4bd08b9163a1599cd RLBA-2022:2400 new packages: libjpeg-turbo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libjpeg-turbo-2.0.90-5.el9.i686.rpm 79053792d2695935a2b95d49c7858df91734639bb991e051c48dbdae75a40396 libjpeg-turbo-2.0.90-5.el9.x86_64.rpm c48fa172b999d4101e3c3762345951f99837e98ff30ceebf1a9f0f16208847ce libjpeg-turbo-devel-2.0.90-5.el9.i686.rpm 26a689974cdc5139f86835f5c681709dcc429b710c02c6c591b1db466e7f942a libjpeg-turbo-devel-2.0.90-5.el9.x86_64.rpm 5d28b5094204d82d1ef763a42e9b77aa968e5472857b20b3e4e0445a0bd8214b libjpeg-turbo-utils-2.0.90-5.el9.x86_64.rpm e6a67414b8453cee40563f55654fc2abd9fedaf4b956c4e64ea6fda86dff01d6 RLBA-2022:2413 new packages: udisks2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udisks2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libudisks2-2.9.4-3.el9.i686.rpm c72b824b39a74d8696aeb7ec5cd907707a1fcbd754fad2cd04e06205520cb2df libudisks2-2.9.4-3.el9.x86_64.rpm ed7b91cc3fc2ac6f7cbdc0fcae5872488a6c5597d8740c8ae7754013686d200c udisks2-2.9.4-3.el9.x86_64.rpm 0338d861fb0d7c048619a27449efceafc9d0a438727b797c298ef3bcb2423376 udisks2-iscsi-2.9.4-3.el9.x86_64.rpm 5c14415b05965cc6940425ee32926cc599c52daa8821df51d84a633fcc515945 udisks2-lsm-2.9.4-3.el9.x86_64.rpm 66f35294c4983e86ebddc8becf55bb15bffaa6e438acbb4482337d8363bad7de udisks2-lvm2-2.9.4-3.el9.x86_64.rpm 4d9a9c8939b950aa0afeb37927c6ccea70c5599596e835172b58d608dd7841a9 RLBA-2022:2403 new packages: accountsservice Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for accountsservice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms accountsservice-0.6.55-10.el9.x86_64.rpm c6db19a9e8fe952630fb3c9d6cc85f69789aa289381d7770bb7aab09f6afecca accountsservice-libs-0.6.55-10.el9.i686.rpm 559c41422d74b01dd38feb83a8f550e7570c7b721b0ccae1547645804c5a71f6 accountsservice-libs-0.6.55-10.el9.x86_64.rpm a61d2ab25776e4869fad61f0bfd2e89899ee655e7828d8983e524d07cfdea8ce RLBA-2022:2407 new packages: kdump-anaconda-addon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kdump-anaconda-addon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kdump-anaconda-addon-006-13.20220128git9603258.el9.noarch.rpm cc2df17ee2e9ebf37bc36c62759af775f5247ecff042fecad731abae9a21d40c RLBA-2022:2411 new packages: libvirt-python Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-8.0.0-1.el9.x86_64.rpm cc72af92f331dcb805bcec84e08fb83d88ae24603d6ed57be6a387d31e20be82 RLBA-2022:2412 new packages: check Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for check. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms check-0.15.2-6.el9.i686.rpm 874be8db879f79a8591740c8627099923a45b226d0b1efcd383756a49325ac93 check-0.15.2-6.el9.x86_64.rpm 5b03d7999f97ab5ad09e4b47b1588d851e0db99e43c79116e785d5a12c7d058a check-devel-0.15.2-6.el9.i686.rpm bfc782d7dc6dae70cd71a3c6f173a7353164bdf373ac7ba316be8eba42098544 check-devel-0.15.2-6.el9.x86_64.rpm 5d139e9d0976f4da53eba8f8f7c8110c859c26f568631842c6573f387294551a RLBA-2022:2424 new packages: wget Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wget. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wget-1.21.1-7.el9.x86_64.rpm c2ff8ef263f7fd77f9e999cd9f35a3c04a158acc065efed413456792f8f7ffc7 RLBA-2022:2416 new packages: appstream-data Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms appstream-data-9-20220302.el9_0.1.noarch.rpm ab80b8cf5b42b71df8de8ab4bb99d46cd36ad1594e61a615b63b14164395c595 RLBA-2022:2420 new packages: createrepo_c Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for createrepo_c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms createrepo_c-0.17.7-4.el9_0.x86_64.rpm e16425dd36fd05a79db1b9e00aff464c600a8ff66d7b2fe96eefc2b623e801ac createrepo_c-libs-0.17.7-4.el9_0.i686.rpm 5d16436d83159e7affd3a31cb1686d85f437febb6dc533250c06cc2a72815141 createrepo_c-libs-0.17.7-4.el9_0.x86_64.rpm 5e874a3f33e0bc2100c735d523dafd97eee487b3de0be4c28202587636cd4c15 python3-createrepo_c-0.17.7-4.el9_0.x86_64.rpm ac15f4c0ce4d70f36af8bc8dd9a42b97209dba40062adb29dc2ae2983317f84a RLBA-2022:2422 new packages: watchdog Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for watchdog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms watchdog-5.16-2.el9.x86_64.rpm df00b993647c77b09fe54e10f45b3d5c6c3401291b34d7959fab13bfda7740f4 RLBA-2022:2423 new packages: python-rpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rpm-macros-3.9-52.el9.noarch.rpm f82b79bb8c4d24d5f038c05121f59fad10d7e6cc0fe41b5cd8a7d4413e6d09d5 python-rpm-macros-3.9-52.el9.noarch.rpm cd61fd5094890aafb8eb2b55058d0caaf0e7327cae5541479b64ca332afe472e python-srpm-macros-3.9-52.el9.noarch.rpm 507b18e7016e92b68b200102f55150747c03076d1e34a5a3ba140e1735faa9b5 RLBA-2022:2425 new packages: gdisk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdisk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdisk-1.0.7-5.el9.x86_64.rpm f0554a66524bd2e62789ec017aa3721c33893d07ffd529d43cbc842262e2f894 RLBA-2022:2426 new packages: rust-coreos-installer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms coreos-installer-0.11.0-4.el9.x86_64.rpm 5cc10733415fbd9d6d11b22e984277fb4f0262bcdf82572d90f1e9e74f96fd0d coreos-installer-bootinfra-0.11.0-4.el9.x86_64.rpm f4dd9a813b956627b39fd1c92698016f8242c8afa98f8d4480832ebe611193ab coreos-installer-dracut-0.11.0-4.el9.x86_64.rpm 088290b5c798e3e28265eaedf7146ba8748294469d3345c64a5bb9775a19a3af RLBA-2022:2433 new packages: exiv2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for exiv2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms exiv2-0.27.5-2.el9.x86_64.rpm 0ab3e8caf7eae710774468976dc4efc92a8f8284ab3b44832e438e00fb017f29 exiv2-libs-0.27.5-2.el9.i686.rpm 4f8458a1036a76f621e4cdc1be26bf508a4388fd48783bbff6be7f31940ddf38 exiv2-libs-0.27.5-2.el9.x86_64.rpm d4724e035f97ff114f7400edec23acb754b0b6586275c90bc8d501b2b995dab6 RLBA-2022:2438 new packages: exempi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for exempi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms exempi-2.6.0-0.2.20211007gite23c213.el9.i686.rpm fab9d129a3000559abc1ef9dad2498b36bda24d0833d2a9d2eac363a469075e4 exempi-2.6.0-0.2.20211007gite23c213.el9.x86_64.rpm 705b67d95bf5106f7e7a9d9b5fd8258347f2a9cd4c107bc5c30a2603c79b8ce7 RLBA-2022:2441 new packages: maven-resolver Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-resolver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms maven-resolver-1.6.1-9.el9.noarch.rpm 6d3482a7a58e801812875c73975ae80a5396613724593c82621c4f710263dadc RLBA-2022:2444 new packages: jq Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jq-1.6-12.el9.i686.rpm 0631ee92182046159a3f4341d55bf019bfffdf7e3a0e4d5f8c00845aa88d0d78 jq-1.6-12.el9.x86_64.rpm 21263379b6c4d9bf1a40acb07ccd7b42a299031bdf70387041b90b50d5f587a8 RLBA-2022:2445 new packages: maven Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for javapackages-tools, maven. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 maven-3.6.3-14.el9.noarch.rpm 927085462768f8c5324c2b514013b57ab1d4edd0824fbcf19941ad12b6146a11 maven-lib-3.6.3-14.el9.noarch.rpm a2bf639d6a73b7db1ecb51fd1e9a0b6e8f3be2cd2ac546672694b707844377b3 maven-openjdk11-3.6.3-14.el9.noarch.rpm c011fbb97732621901480150dcd2393ed34eb6a330ac2e0cffeda38b87881ce7 maven-openjdk8-3.6.3-14.el9.noarch.rpm f86e0f9eae59ffff3b747234512e7ae5c53c5cbdd43f5b8dd124f90f77820928 RLBA-2022:2446 new packages: ksmtuned Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksmtuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ksmtuned-0.1.0-1.el9.x86_64.rpm 51b081cba24111d7e2ef03c98bab8879b4373d27f0caa165973d80b6bba662ac RLBA-2022:2450 new packages: liblangtag Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblangtag. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblangtag-0.6.3-8.el9.1.i686.rpm 3443d050d0fe4f3990282d9d2c6780e3e2748e7e27f742a0e1f14ca497d0abb2 liblangtag-0.6.3-8.el9.1.x86_64.rpm 8369fcd984d95e31134d637b7893be7d414117c5719e378a764537b36a991de4 liblangtag-data-0.6.3-8.el9.1.noarch.rpm 065fac7c05d3e968bf395dfd61bfec2f173244351cd12e77461a00d7a033c71b RLEA-2022:2452 new packages: kernel-srpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kernel-rpm-macros-185-11.el9.noarch.rpm d836fc7f59884c4922b04cc663f594b91662b4276102d0a84653b6795d247b3e kernel-srpm-macros-1.0-11.el9.noarch.rpm 13756a83577da6b61f0dfae132e7a4955c672e6a323c4b977783b857f716c496 RLBA-2022:2456 new packages: adwaita-icon-theme Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adwaita-icon-theme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adwaita-cursor-theme-40.1.1-3.el9.noarch.rpm 0f83fe6dca8a97b0e7ce055aa5aa2240ef6e48cf875bdea8a938d6781da481df adwaita-icon-theme-40.1.1-3.el9.noarch.rpm fbace700527680af0efdb9606dc1ff450ccd5f61de75cc4e5f97cae434c57eb7 RLBA-2022:2457 new packages: adwaita-qt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adwaita-qt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adwaita-qt5-1.4.1-1.el9.i686.rpm b28211fbf15143458ded9614859448c2612eaaf177255de89970d527f12d5023 adwaita-qt5-1.4.1-1.el9.x86_64.rpm a57f906e7b4baacf03f7468944d899aed9073fad4bf455a696985c4db229004f libadwaita-qt5-1.4.1-1.el9.i686.rpm 45c61acad604df80d320253caaaa8b0150a2f61ecd315f8e1c8ce11cd4c06b2e libadwaita-qt5-1.4.1-1.el9.x86_64.rpm fe76b5523661dbb4eb459845548a3d90d5835f99c311f8b32f9d786c1b702d79 RLBA-2022:2458 new packages: libstoragemgmt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstoragemgmt-1.9.3-1.el9.i686.rpm 0546372061909d29d048acaa2a967fee4cfb87ff0d0ed9a2476b25d855e7a265 libstoragemgmt-1.9.3-1.el9.x86_64.rpm 6e257b5e887466f9a79f8d26502b38780f8037da4f3413a4bef1aa6ea2361eb8 libstoragemgmt-arcconf-plugin-1.9.3-1.el9.noarch.rpm ff1bd143abefa4edf2d4282647623510fbecfeaee527f04ac866a50df3a57285 libstoragemgmt-hpsa-plugin-1.9.3-1.el9.noarch.rpm 2e878f9190bdc4755b7d3942e6d22acc85bc74806826e6f4e0a79146109d2730 libstoragemgmt-local-plugin-1.9.3-1.el9.noarch.rpm 34fc303faed416d336aee8e13a0d94b3ed848a05d62dd309a8dbbc7459ee0de9 libstoragemgmt-megaraid-plugin-1.9.3-1.el9.noarch.rpm 970a5e0ad4c639317caf2c523079437df83c13cde5cbc2d99a65b1bdb6d9e456 libstoragemgmt-nfs-plugin-1.9.3-1.el9.x86_64.rpm 828a31ff417276cdc93faab9f9231fe091e835398dec5a03b7111e328f695f62 libstoragemgmt-smis-plugin-1.9.3-1.el9.noarch.rpm 1eb8a4dab5429adb7a2e15be41dd62fa78d8530e64b7d57a2ed7584029b0da8e libstoragemgmt-targetd-plugin-1.9.3-1.el9.noarch.rpm d88b517b69d2178b5e9e199b189c8fcd13175de2e742f0bcf530eeef5898fdf6 libstoragemgmt-udev-1.9.3-1.el9.x86_64.rpm d1fffa96caefa03640ca0cf7ea8d138c1cc61a2256c6f005b9cd947977461bfa python3-libstoragemgmt-1.9.3-1.el9.i686.rpm de493de47939478c2d770e3579ddcbf3202fcbb04e263a2d2a92466ebe435e1a python3-libstoragemgmt-1.9.3-1.el9.x86_64.rpm ab95ada794564bb369cab180ab912e57d6755f24be902ebe390c3de6a0ea9a87 RLBA-2022:2460 new packages: wireplumber Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireplumber. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireplumber-0.4.8-1.el9.x86_64.rpm adcf205fb635d08933179b35b045f4dc31a31b31b166ad13e4b5ab5e73319934 wireplumber-libs-0.4.8-1.el9.i686.rpm e35832342cf238538f5d3667b1b9b6f38ce2a3168c03abb83ec266bc9ab1606a wireplumber-libs-0.4.8-1.el9.x86_64.rpm 52d86f8c1b70a33db928845cdc13d54734b79f4e5ca3133a5629e60be56f3b8d RLBA-2022:2462 new packages: gnome-terminal Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-terminal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-terminal-3.40.3-1.el9.x86_64.rpm a0cefb89fdb9bbed21dffb4caa4b19ea1eaaf157c707571bc28559ccbe694fd0 gnome-terminal-nautilus-3.40.3-1.el9.x86_64.rpm d2136bf6a067ec4337f74d2ff48685cb7e2ef8c041a53bc44f74f365a7734e1b RLBA-2022:2463 new packages: kernelshark Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernelshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kernelshark-1.2-9.el9.x86_64.rpm c413be58954f425f7e8d6ae4fc2a87872014e8658c744f4471ef5b12b4d73f5c RLBA-2022:2464 new packages: vsftpd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vsftpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms vsftpd-3.0.3-49.el9.x86_64.rpm ce2527df2f94c34359f495732051c205461028c979725a4fb2a1488cc0bc8546 RLBA-2022:2465 new packages: papi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for papi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms papi-6.0.0-11.el9.i686.rpm 2aac5c156882065c543fd392821f25313046906b4bfbf337591d0cf204181fa9 papi-6.0.0-11.el9.x86_64.rpm 0f9f908ef115104702f3f299412b3295f614c328535be833048db08fe989e1ba papi-devel-6.0.0-11.el9.i686.rpm 26499511f7f716a87a0f093ad95bd7307a85884dbb3cb8667bd3c4c589abd510 papi-devel-6.0.0-11.el9.x86_64.rpm 30753d3dd15e694c3b00b4e01f6ea208ff7e80b8d957a4a8725bde49f930c4af papi-libs-6.0.0-11.el9.i686.rpm 2c5d78e8777a5af149ac8724b0a87d10ac722a70cc4694c60fc3e1fcfc095faf papi-libs-6.0.0-11.el9.x86_64.rpm 4a46b827120e761cf65e9695b02fc650c4272520d1dfdfea665a49e4519809b8 RLBA-2022:2466 new packages: libecpg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libecpg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libecpg-13.5-1.el9.x86_64.rpm 827d780680f2275fe5e9ab67d3d602b2d105af00239a55cb1d777e53583dbbd9 libpgtypes-13.5-1.el9.x86_64.rpm 24cbec009eddcfc7076367ed6522f2e691fb7bacbdb93df120ca9de695a25076 RLBA-2022:2467 new packages: libglvnd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libglvnd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libglvnd-1.3.4-1.el9.i686.rpm b4d03065053102daa3ac1d014e34a4186ad02f58ab77e455812c8faa89de7072 libglvnd-1.3.4-1.el9.x86_64.rpm 0c8ad9eb89bed8a7b2452298c588e3bddb153eaf6f84e208dd1c9c5744d3a4d9 libglvnd-core-devel-1.3.4-1.el9.i686.rpm ed6c35132517b2cec19390bfe8b516def1ef7fc4ba9b58d4647aef4b77afc3f3 libglvnd-core-devel-1.3.4-1.el9.x86_64.rpm a2f93de8ac1df81255058347afcb88cf83107f656fa4bb8f00a3740da8ddce5c libglvnd-devel-1.3.4-1.el9.i686.rpm 4d86fa3d235a6f638f00d679e10d56b01b6f15ad8f2339ee2755d2252ab04229 libglvnd-devel-1.3.4-1.el9.x86_64.rpm c492f1394210560fe483a7dc3ee414014791b02ed191971577665d25221d8e40 libglvnd-egl-1.3.4-1.el9.i686.rpm 1a4035ecd5b2ccffd12abe0503b7874fa0db730d87345e797938763a2a6b0bb8 libglvnd-egl-1.3.4-1.el9.x86_64.rpm 6962b3c3c943981a9ab8a3eacbedd35b9f32e6ce50b5e071857b34e4b8c6082a libglvnd-gles-1.3.4-1.el9.i686.rpm a2f05eacce009ab51e54558f7c952e640fb6a24d233b2aa124a1ec01c4a88f70 libglvnd-gles-1.3.4-1.el9.x86_64.rpm 326af5eedd78fe96abb148dbb07ee48f443abe35673876716bd1eecb4b25382a libglvnd-glx-1.3.4-1.el9.i686.rpm e4aab2ee7593f84011104627ed85ce7954408fc239aa998b5f35da4243ab292e libglvnd-glx-1.3.4-1.el9.x86_64.rpm 5cce5da3a7f1e6bcdfaf2be93a63dd4a2d1fa343c50079e4c69b045d8549fce0 libglvnd-opengl-1.3.4-1.el9.i686.rpm 9828f8b742b59b38a7c50a9e646afe61a3820f95cf47f59117e971c3bb94bb88 libglvnd-opengl-1.3.4-1.el9.x86_64.rpm d49582ba0be32a420d30b95ad6e35d4b1e5b61c87c74f28f6cb82668e54d27bb RLBA-2022:2477 new packages: totem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for totem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms totem-3.38.2-1.el9.x86_64.rpm 7d46f365675aceec166e48262915ede9d32e89f78172d23b3a3252f8a8af2de3 totem-video-thumbnailer-3.38.2-1.el9.x86_64.rpm f8f38a481e269c3efc5d096c305628fe0a4d8d69e4373c30fba0c92b3fa96003 RLBA-2022:2480 new packages: texlive Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for texlive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms texlive-20200406-25.el9.x86_64.rpm 837a54a5cc06c9fbc84b0a1c2208b9c50c9b22b2061b300021fa47edb028635e texlive-adjustbox-20200406-25.el9.noarch.rpm 23986ac559b8a930cea51afeefc45693c1f52f3ec61ec8decd7121fa37a39371 texlive-ae-20200406-25.el9.noarch.rpm 67dbe8589fe1279d7e0eb69e74d398f98723b6c5c4553fbee9d3b580997055ca texlive-algorithms-20200406-25.el9.noarch.rpm ecfbee5ee927ed4a5f4bcbc59b96b9f2984495392cd55072463e1abb26fdbffb texlive-alphalph-20200406-25.el9.noarch.rpm 92a182f81eb744da3555b91b709e0a83f0806266e0487e8fd53fcbd3bae7cfeb texlive-amscls-20200406-25.el9.noarch.rpm d07a868d557c286fa763d87c51b029942703218810da8777ad597fef9d88b3a6 texlive-amsfonts-20200406-25.el9.noarch.rpm eaaf57ef9a79e796e70cfa004aec5e88ff30b5ea8ee01a6b828ed7f25cc13f00 texlive-amsmath-20200406-25.el9.noarch.rpm 4cd3814d72aaeb03bbfbb29070ef69dd3e6f73d2c1ede68163b56c02ef3ace3e texlive-anyfontsize-20200406-25.el9.noarch.rpm 38efa1236c4cdce4086b04814eac594cb6761be22757665314c80e16f559fa60 texlive-anysize-20200406-25.el9.noarch.rpm 9e44abf02a32f415b678813f77f48025a78285ca520a13afd0daedd3b6c96e02 texlive-appendix-20200406-25.el9.noarch.rpm 19ffa63b7f3b9480edb919fa4681237726d8d8b9fe8f3b4acbf76a0cb44f57b8 texlive-arabxetex-20200406-25.el9.noarch.rpm 50531935361743f2a10cffc17f072dfd4b945a98290b97e5355118d9c2441eff texlive-arphic-20200406-25.el9.noarch.rpm 1e6e4c8699a3320f4b1dfc47640a5677cda047dc455ec7752672f7fe2affb111 texlive-atbegshi-20200406-25.el9.noarch.rpm 426f80b252c6768c59de4119b06d8ca53c178fe2e391e9d39eec1ed74c061681 texlive-attachfile-20200406-25.el9.noarch.rpm 2d5811e84279a70a355ed937b90d90154b72f111bf9cb5f215ca50d6be3d2916 texlive-attachfile2-20200406-25.el9.noarch.rpm 61f392911c9d355d48c3a7dcc5ffe595bc071f2728cd222893bf2bff95f363b0 texlive-atveryend-20200406-25.el9.noarch.rpm 5caffd52e1c44edb146c3d022bc7c157941b6010a19931934107feec92a971a1 texlive-auxhook-20200406-25.el9.noarch.rpm b8aaa92a5fe9da0f51588cc06fd485230fdae231a2231b3545248eac89ced0c7 texlive-avantgar-20200406-25.el9.noarch.rpm 0826f7b6bf012527612f1b85260656ed9fbcba8a3cd53f67d89161c8848dfe80 texlive-awesomebox-20200406-25.el9.noarch.rpm 8e7653afd6a2a38af116d14f4d54cf3b53455f669dde540066f2bb03bc438ec8 texlive-babel-20200406-25.el9.noarch.rpm 5be9822084cc127b43e513f0efb9a8e46dd9e9fd0cbccc540a0a00ea14fa20bb texlive-babelbib-20200406-25.el9.noarch.rpm ea1ffa5c9b6ee670e44fbd2a71aee7907c87bd68aab2b5e5a8a516060762ba7d texlive-babel-english-20200406-25.el9.noarch.rpm f50470c5ff5a09b5ebcbf32546dd8be46de1a910840388e4154a64d16a5120ac texlive-base-20200406-25.el9.noarch.rpm e9888fe78a25175ab1b60d871dbaa178f8832d46cdd2ec636d2c441361f761f2 texlive-beamer-20200406-25.el9.noarch.rpm 82a80262cba453c83c873b7763d54bb3df53ee37fe031c2cc4643ee5cf19e4f0 texlive-bera-20200406-25.el9.noarch.rpm a7df84d164ebe2609db6e1885dc9c994a85b81bce9bf22a588c1eb337a59c051 texlive-beton-20200406-25.el9.noarch.rpm d6052d826ee2a1107d1d5915ed8a7d00528d3a1d60d95b42b2f17f7aa5602ed8 texlive-bibtex-20200406-25.el9.x86_64.rpm 53ed42f4c7a3a487f95c9dc9f40c98374f55940e2758f7452a169e7fde6a2610 texlive-bibtopic-20200406-25.el9.noarch.rpm 8cb74c5eeb22f097f0292bd21d822e89f0e7c87035682f64f714052b52f8b11b texlive-bidi-20200406-25.el9.noarch.rpm e8513731892093bcdfeb92e160019ac12d7a206ef6a9a347a30d1913dcece1f7 texlive-bigfoot-20200406-25.el9.noarch.rpm 05f1b753b6f8b98ea18a985e1185d400bb52ad36fa09d86f31dd98f783b99217 texlive-bigintcalc-20200406-25.el9.noarch.rpm 1b93279ecd762db12fbae6471a5871373fbdf0e087fd90a647e6d8b4b1193948 texlive-bitset-20200406-25.el9.noarch.rpm 6a6e98448af522c41ac187a7e08b4d705e7b7dce5fe7ff38d7007804bafec845 texlive-bookman-20200406-25.el9.noarch.rpm cde8fc4d040bf79a99f509ac741aafc191ab2d653120c9a961db8853d32ba8c2 texlive-bookmark-20200406-25.el9.noarch.rpm 76bc6cf466907ed85d86f4b7be09bbb61c4c9526c08f93504b2713d13765ac5a texlive-booktabs-20200406-25.el9.noarch.rpm c15ad22c2f99309b8dceeff2adcdb3e91a02ccf508b637fa21c9c16291ec222c texlive-breakurl-20200406-25.el9.noarch.rpm 40a305d18e457aaa7b0e35490cdddd5a2e4e886a755940a297ed5341eb5d3348 texlive-breqn-20200406-25.el9.noarch.rpm 20ef84afe747e30c445ff8510e98164904a1a98b035cbfa6b2d6ad47cf773960 texlive-caption-20200406-25.el9.noarch.rpm 3af05f99f997f13f5f089f0d51079ad3314a4c3e9388c1c292fa50b000107e9b texlive-capt-of-20200406-25.el9.noarch.rpm 0bf59ff906dc33ce60efe158818faebdf673c0f72b3c6b00f5f16f68be6e0688 texlive-carlisle-20200406-25.el9.noarch.rpm 93a6c357f517cd0d4a13dfbb9efa80dbc3c0d1775da75ec6628d805b47d58452 texlive-catchfile-20200406-25.el9.noarch.rpm 2d9703c560956ad8eb8d4df38463098133ea802cca5a2740e82500238f57e5f5 texlive-changebar-20200406-25.el9.noarch.rpm 4ba7ce4338aff5e83c7e19761329d3987593d62c49ec9f9e4380a6f09adc8914 texlive-changepage-20200406-25.el9.noarch.rpm d2b5d6b49959ca70a749fcb46c2702572c6a74a99ad390dd49ef35f048e8290d texlive-charter-20200406-25.el9.noarch.rpm 6af22d6463efd8db26e3f9811efbc603865cca00db81601536acab1306a7afc2 texlive-chngcntr-20200406-25.el9.noarch.rpm c6ea0ae1cdd3f1a093605346734a17d8536f8da4032797be97cdc6a11d03d2f0 texlive-cite-20200406-25.el9.noarch.rpm c5b7ac2bc24456796dea1f22b10e1fc379e41171b38f08f140e683e401c30785 texlive-cjk-20200406-25.el9.noarch.rpm 574c427c93450cf5b0d31f48bcaebdaf1c3b6796bd02b0ecc3dfda146711ad9d texlive-classpack-20200406-25.el9.noarch.rpm d03c425e78d02f77c4bd6e9540253ac80e2d25b236ba1686484d82c0b4344d14 texlive-cm-20200406-25.el9.noarch.rpm 5bc610d26cc86c52dbe924c936d0170d8e324a229991b5e281bf8f31161cec5e texlive-cmap-20200406-25.el9.noarch.rpm 4078d0d604008cbcb92eccebf235ae7f27ff6dd5918c04eae6e2abf465873efd texlive-cmextra-20200406-25.el9.noarch.rpm 553dd883223d85c53104fc1c8478f80cd4ad9ca6f6797ba9ee89945098e845a6 texlive-cm-lgc-20200406-25.el9.noarch.rpm 243cb790c082db01380d1b47baf622bced06f0fb095caded509810af51112a52 texlive-cm-super-20200406-25.el9.noarch.rpm 545582ac9cf1e191e71ee111467fd4c2f4c931cf5e33992e3d5f1ffb40a97799 texlive-cns-20200406-25.el9.noarch.rpm 38dcc549680c69fc71e7379b4170fedd46a890a38b68b99696c3d6d8b67363c5 texlive-collectbox-20200406-25.el9.noarch.rpm 3d814cff7b9bee0b3bea8a368e81d08afedb7fba7a632b112dd389bb7f22b1e4 texlive-collection-basic-20200406-25.el9.noarch.rpm 741f64f4eb99e6e93637957e6f731eb57e3772a362fed6ab6693f9e1bdef4e93 texlive-collection-fontsrecommended-20200406-25.el9.noarch.rpm a0d3b69578a582e3a781c70c745581657c519550b11819bc801cff1e1eb3d0e4 texlive-collection-htmlxml-20200406-25.el9.noarch.rpm 3b21bf473604f3a49327752f3a469d56fb8450f523dec2274c7df878bfead59e texlive-colortbl-20200406-25.el9.noarch.rpm 639db372d27d02efb0dbcceeff5157535652ca9078f117fadd8ef7fc1da1cae1 texlive-collection-latex-20200406-25.el9.noarch.rpm c85e9fe109f3bdec6e6cf3dd1ecf1e2193e8196987cd32875f83860e3abc7809 texlive-collection-latexrecommended-20200406-25.el9.noarch.rpm b3bb4918d2242e6949e11890d0ba7578f84a88bc500cbc4b4e584f492e4ffd62 texlive-collection-xetex-20200406-25.el9.noarch.rpm 21d612c87d033640430f4b0c3f0cdc15ede733d7d860fc91ee8f7e6df4cf7fe8 texlive-colorprofiles-20200406-25.el9.noarch.rpm bae084b4179948804595581fa5704309ea56409dc525ff4448b1f2146e514c37 texlive-context-20200406-25.el9.noarch.rpm 6add123fdb48ed0e1992f91a80852d6145879bae1c746d57286e2d7dda6ee44c texlive-courier-20200406-25.el9.noarch.rpm ddcc817b45352ed31d6af3ca35d8f6a053815de62f29b8d39e7b02ae1c022ba7 texlive-crop-20200406-25.el9.noarch.rpm f831ed203a3c4abf147f28cd16316a36996dbf4fed70014e2691fee1aa4e5144 texlive-csquotes-20200406-25.el9.noarch.rpm 330f17438e14ec7c149aae6a488ce6e5d6b89cd7c55df24a71a479f9b4e9a49b texlive-ctable-20200406-25.el9.noarch.rpm 0461b2cd916f7047f724fd015bc2fe50bbb32ef1be36e6e2e0f9044c7431fb82 texlive-ctablestack-20200406-25.el9.noarch.rpm 438151a5e204296eafe25c63f57fde1b664a3c08c3b6519a11f2eb0bdaef85ea texlive-currfile-20200406-25.el9.noarch.rpm fa7cc430ddef9dd5cc8a14d73eec2bdd30e9345645309aafb90b5a81c340d3ec texlive-datetime-20200406-25.el9.noarch.rpm e5028b027d09e30e0b2c6bc470f154a23ae525fbfe376c469dc21a6e684b1c2f texlive-dehyph-20200406-25.el9.noarch.rpm ec9d231ab6cb646d2138cf81c3344856c87eb53176c9c9bf38c54a6c4202bcdf texlive-dvipdfmx-20200406-25.el9.x86_64.rpm cf6aa93a0a5f87cf7c9c3828a449474120d2289897ae322600d8ae8226270017 texlive-dvipng-20200406-25.el9.x86_64.rpm d60b3300b838f9ebb4ce6e6de9207250abcdd8be7e529073eebaba036f8f8a07 texlive-dvips-20200406-25.el9.x86_64.rpm 743fe301c9609ab05799d0aa31909584524d700d95bc9ea5d21e7fc00dc34db1 texlive-dvisvgm-20200406-25.el9.x86_64.rpm 4c0c4020c59c9deec513ca41c3a17ecc53fbaf7fa5a97739a1af6e2f3bb239ba texlive-ec-20200406-25.el9.noarch.rpm 7fd5581aaa471e3febf104ff74077d35c629198077719dabf6a9161d77a647df texlive-eepic-20200406-25.el9.noarch.rpm 507b98fbcea6788b82e0e099b67e68354845f58f727d2f4b451439233a283460 texlive-enctex-20200406-25.el9.noarch.rpm e52242e8715e403a7949d205d130827fad0b782e6e042e7c951b5b45aadc538a texlive-enumitem-20200406-25.el9.noarch.rpm 3b2aa3b72090a3b2bd74478fb282a7f4186d9a9e4fe0388be812167430526bfc texlive-environ-20200406-25.el9.noarch.rpm 01673ba34feaeb303b6710f307bbc9b45aca8e57fd3ae2412b2461e42c542ce8 texlive-epsf-20200406-25.el9.noarch.rpm 0d5cf870c5b572f330f14d65d9f787b061c02a029c145746374898babc93eb2d texlive-epstopdf-20200406-25.el9.noarch.rpm bfef6b55fdf5948a7111e6e2598361c062e726e16c1c011ee6cc6338b3f2d526 texlive-epstopdf-pkg-20200406-25.el9.noarch.rpm 3c45ce18cd79225bebb8a54a31863db712d4d607fe561deddbe36477d585c868 texlive-eqparbox-20200406-25.el9.noarch.rpm 9134929c5b0fab7c07feb44a49468467a55069c83985618ae9ead709128d41f1 texlive-eso-pic-20200406-25.el9.noarch.rpm c55d3fa12a85b7f3e163312a1d1b437f3b8deaf25ffdf1e8a50997c44eb4d7cf texlive-etex-20200406-25.el9.noarch.rpm f42611b17fc617a782d28e39c6760fe6e857e68cb93ebffec44a0efe08b492e0 texlive-etexcmds-20200406-25.el9.noarch.rpm be7efee598e9993843c2dec643e529638a4c44044e17dd3d872fec276768f302 texlive-etex-pkg-20200406-25.el9.noarch.rpm 29f3745eee6f4d29cfa8dba912a0eacc512524c44bd5642d789fdcaff25d5d27 texlive-etoc-20200406-25.el9.noarch.rpm c8cdf4279fd6cff6bf12e59f0aef2810c25f05089b88710e4d6d59a56ecc7388 texlive-etoolbox-20200406-25.el9.noarch.rpm ac213fe16f7ec576253a083a1649f99fe748535062e768e80aad66c71d3893db texlive-euenc-20200406-25.el9.noarch.rpm 5faea46824f4fa276a5a580a2167a13e747ccef32766df3969eb5d100b2412f3 texlive-euler-20200406-25.el9.noarch.rpm 74eceb479639454e6d23f8eca496b0054e113a0defab1f944d98c79694397cc8 texlive-euro-20200406-25.el9.noarch.rpm 3780438bf0cf8f357d0f8c05633574675468a12ceb4812b42c6a7fc617e65c5b texlive-eurosym-20200406-25.el9.noarch.rpm 6291ba90c0149b3341aa330a2a768761c536607488fa53b2613a5e65bdf7bca7 texlive-extsizes-20200406-25.el9.noarch.rpm 70fc0395d91e9c89dc6b9c348dc8e5a779a6d5daa11245939b82ee798d6a39a0 texlive-fancybox-20200406-25.el9.noarch.rpm 1ee8d299fe06743f27c8c9c8d8e44d884d503773c41741136ac7dc25b41c10f7 texlive-fancyhdr-20200406-25.el9.noarch.rpm 2a52c662c54e9c6f88e9a31b7bbeb2f2577a759ca8d32f335c8f4f078700eb96 texlive-fancyref-20200406-25.el9.noarch.rpm eaf7309d1318e93b33ece081bfa80c03da5498bfce7f9ace692162deab8db0fd texlive-fancyvrb-20200406-25.el9.noarch.rpm fcc2b9ce9fa84d1549af47b78300642ccf96cf42add1c115e727801cfed9c053 texlive-filecontents-20200406-25.el9.noarch.rpm 170059d0db85f126aded1e9db5326e83a6b647e88331a68658a860215545ae16 texlive-filehook-20200406-25.el9.noarch.rpm 780b601a9a006523553e41a934b77d4758cca21c4db034cd7ffeebbb1d7fc1b4 texlive-finstrut-20200406-25.el9.noarch.rpm 63509d82a725cdf89df8b907d74b396002e2cbe0355d910617b2c3bfefe62cb6 texlive-fix2col-20200406-25.el9.noarch.rpm 9c72079f34640dbb57c0c7409ca3dd4ee3e1d336f2cad68a8aa40b0f4dcc4eb8 texlive-fixlatvian-20200406-25.el9.noarch.rpm 1ffa2b1d4cbffd299538823f484f122d1ccb5bb013fac751398e3498a11643dd texlive-float-20200406-25.el9.noarch.rpm a03edf1f974a74f15798f3ecdebebe1aad3d64f6a46a7bb71185099d9fd2a877 texlive-fmtcount-20200406-25.el9.noarch.rpm ad57a3a2efb8a0053260da2b81c0eee925df3c21e328bac88625d44222872b75 texlive-fncychap-20200406-25.el9.noarch.rpm b33f6ee4889205ad8bc96d4a0ed62ef17ed95c1610c607a114a6d88b88bf5bd1 texlive-fontawesome-20200406-25.el9.noarch.rpm b046ae3235dd28f2db3c4570bf6cd7fbf9ea0147f2b01f4cf1b009eaa1540ab8 texlive-fontbook-20200406-25.el9.noarch.rpm 63e960f45617067b2ba7b44ee64f94cb1f621a4117d9e8b2b04b142b56efc5f1 texlive-fontspec-20200406-25.el9.noarch.rpm 26dd4bc3f6f39083606cd0305850245adb4dc8435cf121a11d900b2d5131d5b9 texlive-fonts-tlwg-20200406-25.el9.noarch.rpm 6a6456c95c6446fdb155c1c63412afae827076bf1c29aa43e259c55276482962 texlive-fontware-20200406-25.el9.x86_64.rpm ce2c0ef28202e54dd8713d3f5c6ad28fd287e5be8c33d3c3d1b46e15eaa1b254 texlive-fontwrap-20200406-25.el9.noarch.rpm 2419044f529cf2f2f28a6c58b14553c6060cf7d8c8eff4e28036e9a20134d6b0 texlive-footmisc-20200406-25.el9.noarch.rpm fa91900e08750f06ca6010d2f40ad994572a1f466113e448d039e763e76f8e13 texlive-footnotehyper-20200406-25.el9.noarch.rpm ab3ef46a0f83b66db99177eb1ceb2aba0c569637528e6c652708d2bf5fad20be texlive-fp-20200406-25.el9.noarch.rpm 9d736c64c28c6415acb64d87efd9f8f56414b769c7d0df8600542970b245d5ad texlive-fpl-20200406-25.el9.noarch.rpm f972dcfee22a919a58c0f04444616dbbecd82eee32f8ab9bb55052cbf0d9e0ae texlive-framed-20200406-25.el9.noarch.rpm 17f11a898b718c2109b84ca933a15937d38b97d1e3fa510ffbbcb6c1123a2b62 texlive-garuda-c90-20200406-25.el9.noarch.rpm 25500083a9740ad8588207d892a41b2f6e9ee2c0b5a49294c00f8550455e3565 texlive-geometry-20200406-25.el9.noarch.rpm 9f61e8c972e291783370ffc03960bd130e80b997a72db451eb54477cdcfb8a9a texlive-gettitlestring-20200406-25.el9.noarch.rpm 16d520d8dc94551dfe06602ac2cb2165e580a71b611b300dfe170452c4fbf23f texlive-glyphlist-20200406-25.el9.noarch.rpm 543535f55f96dc5e9749c87c54456e4fd92985225860c95ad42cc690eb6f47a0 texlive-graphics-20200406-25.el9.noarch.rpm 171020277bb76ff37ea37ff4cb614d2eed99be9ef38c6479942716de26e45342 texlive-graphics-cfg-20200406-25.el9.noarch.rpm 91b088357f1991f40a46aa2dcac0d584089cb9f48ac417877f935aa9d7b621ae texlive-graphics-def-20200406-25.el9.noarch.rpm 913a2a729d7bed63b31f783db16882e2c8580ef4f6b4392f2c0db7e3e8245579 texlive-grfext-20200406-25.el9.noarch.rpm fd0726cdd44c54cc3de496aad0a4b62320f07e1e6e9ce143b7fe8da4695f6130 texlive-grffile-20200406-25.el9.noarch.rpm 5a4943947e30942b0ce97551a3568ee70835c0c2c3690da133e23d603e968a3e texlive-gsftopk-20200406-25.el9.x86_64.rpm b662ecdcc75d7ea8bc661c3feedae0aef5032e3c83f72fbdeea649a2f2f48d1a texlive-hanging-20200406-25.el9.noarch.rpm b6a32be3292055d832506536925a027bb8ec0dea76feef62bf19dad7e4aa1b23 texlive-helvetic-20200406-25.el9.noarch.rpm c31516bb0f86bc98aec447d4926ed31b25bdf7e669f321969e45286b0873532f texlive-hobsub-20200406-25.el9.noarch.rpm 3cddfae64b6d2cc5fa09459282d53b414fb401b5d2290453dbea277ee50302b3 texlive-hologo-20200406-25.el9.noarch.rpm 65d86d0c1c8dbac8504d0c115462f3062300832cfab0afdae8054a7ee827b716 texlive-hycolor-20200406-25.el9.noarch.rpm 62113811f56673efed936b202936a1a81d6610ace5dfd015e219c45ce8f6c3c8 texlive-hyperref-20200406-25.el9.noarch.rpm 446ad06e02b81baeb1aecc3dc8fffad403131e232e2026936fdd37a18f0c8ae4 texlive-hyphenat-20200406-25.el9.noarch.rpm af6ee67b4bfd13d1203cf4406d7cf58d60f6dd43461558a26e96633d37840daa texlive-hyphen-base-20200406-25.el9.noarch.rpm 16db2ea263a4ead5386d8fb8638926981aed67a1b4c0ef217a2cd5478566abc4 texlive-hyphenex-20200406-25.el9.noarch.rpm 34517cc2b31232e5db1de5764d52815cf1d96ab25209270a22b637e0bfd8fd76 texlive-hyph-utf8-20200406-25.el9.noarch.rpm 856bb855cc46e20dddbfe3cfe06fd7718ba26cb448ff1c68db27a60fd3d6275f texlive-ifmtarg-20200406-25.el9.noarch.rpm 82ded51e4f5cc888917eb675c8e0bc317f67aef0f2edc9bf8a122c662dd8b3c4 texlive-ifoddpage-20200406-25.el9.noarch.rpm 17697b642b7f994fcb8e278809505d25146d52b28363ff931a4cbc195cbfdc8f texlive-ifplatform-20200406-25.el9.noarch.rpm b55df9029314aec1477b0e1065dbffaf682e3bc8039880bdb11bd54645f3b4cc texlive-iftex-20200406-25.el9.noarch.rpm 23a72034abc547bbf4dcc7a3180093ccf1e69ef6c9b6fce59a87648814e0891f texlive-import-20200406-25.el9.noarch.rpm 1ce6711af9a8de0866c60a143062a654c35d4f842f9412fbd412353a253a17b1 texlive-index-20200406-25.el9.noarch.rpm 89acaec879f1aa593fbdfe86e873feed411c08ee01346b7093c83f498eeb84fc texlive-infwarerr-20200406-25.el9.noarch.rpm 09599e7a8b70f7b2992de3f140089d3942fac23a26f3002c630ffdb8826cee76 texlive-intcalc-20200406-25.el9.noarch.rpm 485e10c2061d44e5abe72b53f882de43a28ca20dfa23b66e4ab51a73873f622f texlive-jadetex-20200406-25.el9.noarch.rpm 8704abeed3d8a057516a511a60153b4904ef968383d55280067dada0e1dec0d2 texlive-jknapltx-20200406-25.el9.noarch.rpm 8839f070a6630692f26d836ee44b8f4ef49bc26119ee32a3565d8de33cdcdad5 texlive-kastrup-20200406-25.el9.noarch.rpm 5395025b30aeffe738ad59be5a4c29a65c8100455d6eee54c8762c0aa34752d0 texlive-kerkis-20200406-25.el9.noarch.rpm 93b4bf5bf9fa698b52359875d8ee334599651c702cf81b2d3f746e8907b0eafa texlive-knuth-lib-20200406-25.el9.noarch.rpm dae531d9b9073c5b6c5cf349a64a954bfb87066bbb92ec99a79ca694579c7473 texlive-knuth-local-20200406-25.el9.noarch.rpm c1a285c30a7a105b647cef0c146e1aebe4f6087203e43eb311ab063e586f4812 texlive-koma-script-20200406-25.el9.noarch.rpm d73fdb442093c26ac30398a5b5b41ca9d9fced776ffe273e61b5ce152eda5322 texlive-kpathsea-20200406-25.el9.x86_64.rpm 8461f5b8d21a068ef87ec095073498fba40189e2b0766fdf761caf7a5fcc9f5e texlive-kvdefinekeys-20200406-25.el9.noarch.rpm 351d028ded3217656df56a77b16d20dc3b96dbb4b2fc6d8bb365f1371ffe6d3e texlive-kvoptions-20200406-25.el9.noarch.rpm f17ea1e7870d0eb34f66e12e787915c7da84c86b25e4463b4cb34b07995189cb texlive-kvsetkeys-20200406-25.el9.noarch.rpm 525c8cb4a6dd0365f4c072fa04d8d9b29276d882e0da0e14697c25aa84ee996a texlive-l3backend-20200406-25.el9.noarch.rpm 0953725fa1adaf10ce87c8ae26949261340f5a614238112105fade39ed5051d5 texlive-l3experimental-20200406-25.el9.noarch.rpm 4dd0e8e848312d24fdac74797f786b7e3b738790bcf885de289d748ca431d4db texlive-l3kernel-20200406-25.el9.noarch.rpm d0178ba34b1bede7f17d43f79ad54a7cd3b254da6895d65a616c22894f74f116 texlive-l3packages-20200406-25.el9.noarch.rpm d307bbe382bdfff6e01bee4ec179602ac2c83e591c66d6c2f5bb6d5ad99f8953 texlive-lastpage-20200406-25.el9.noarch.rpm 423f90503f8835fb912fd56efc0b3b69cf3dd1c620d12f7ce7f4d43ace16d54c texlive-latex-20200406-25.el9.noarch.rpm 9da4f0e77b12a1269d6f37b3c4e1177fc62bc902bea4d433332d78728817a562 texlive-latex2man-20200406-25.el9.noarch.rpm 3df9b50d9cf28409df035bf2aee40f54d5d768078f8d647987fb05a32bfa65df texlive-latexbug-20200406-25.el9.noarch.rpm 193ecf4b3d5a5775f298e31b8e5f2db345e62f345bd25b24850d6b02046f0eb6 texlive-latexconfig-20200406-25.el9.noarch.rpm 38ee316fe6276d64f43dfd376c475af88976c4f4144ce9e9fe9720b92bb005f6 texlive-latex-fonts-20200406-25.el9.noarch.rpm 89fc2b97ed8d1f2b5bd1597d0eaf956f2cf9afcacdf08f3dc30ff6becdbf4900 texlive-letltxmacro-20200406-25.el9.noarch.rpm 1d2fd51cdb742e957af3c89f0c2ba001cf607f5e67ee8e363a117ad7f5b2271e texlive-lettrine-20200406-25.el9.noarch.rpm b7cc0e257cec45cbf38b406d2a9a07cc8baff369630a70d4481a97a65286d905 texlive-lib-20200406-25.el9.i686.rpm 5cb9f285421261df4c8cb55c0e9c2a08a81b39b8998abde14528855540352bf4 texlive-lib-20200406-25.el9.x86_64.rpm 2a124e50d9db2a68c45c034cbecdfc8a7eb33efc4cf30d44ee2d477837cec813 texlive-linegoal-20200406-25.el9.noarch.rpm 30df149db842ffd1782eab6f3aa5a49852a7dafcf46ab890bbe421fff5f55a50 texlive-lineno-20200406-25.el9.noarch.rpm 1b0efd7c2420f6ef413c8144ed626f7e6ac00b3ad6565ec2b394f4122909a977 texlive-listings-20200406-25.el9.noarch.rpm b8ba763edb88516b961ffe8defdef4392353d4200a6b9336bf6356bdccbe559a texlive-listofitems-20200406-25.el9.noarch.rpm 47a01e02af9dc420e258ae1733ca2c74ec3b9980bfc9c025e1132f0dc4b28425 texlive-lm-20200406-25.el9.noarch.rpm 3792db1db193c08828bac9add69d9d4d1c578d21471588516792c56e602497f6 texlive-lm-math-20200406-25.el9.noarch.rpm 95270a15e0e434ad69ecf292263b5b96845a4b8cbe2847e0f6fe300421b7f4dc texlive-ltabptch-20200406-25.el9.noarch.rpm 60bea50e637e6f2475eb1fb0ad72f574f48eb2671513dccff549d600ba182667 texlive-ltxcmds-20200406-25.el9.noarch.rpm f6992f0513512647d2416904e95c754ed4eea5ca13ae85fd577ec96a38b3b109 texlive-ltxmisc-20200406-25.el9.noarch.rpm bc64226524092303b70ded56960d6a97a1325b7384546b6245c0041ad1a5cf50 texlive-lua-alt-getopt-20200406-25.el9.noarch.rpm b0065dd35f9b4eaff7da4a6d1ddc0f605de82b265f75d88da8d004cfbbe73dc6 texlive-luahbtex-20200406-25.el9.x86_64.rpm d91ae8a8c1a7ae8a641fadc3c24553d841af638a4c51b78dd549951c2fb29c0f texlive-lualatex-math-20200406-25.el9.noarch.rpm 9c5e76878035b327e3bfd934a36bc1ecd2f60c1d9b87eac446db8dca73a7d07d texlive-lualibs-20200406-25.el9.noarch.rpm bba0a43a389742c435d139181a98c5b3b7c37c03a6e087d01eaa4a1b5f0e96e7 texlive-luaotfload-20200406-25.el9.noarch.rpm 01f73a8ff7e29329bccdadb8d7a9d1e25dd520875a9d89e1503b031ef5d44120 texlive-mflogo-20200406-25.el9.noarch.rpm 1afc6f046d9812521c2636fc385522ae02ef4ca8d5bd0fa5fb7e5cf50aab99b2 texlive-luatex-20200406-25.el9.x86_64.rpm 87b6db33d2b51feb6ca29488b2428d766232938ab2235bfe2f131693269a2d07 texlive-luatex85-20200406-25.el9.noarch.rpm 05b0fdfbea60ca8ea7785088cfd02a902092fe7c8b8e0bb24021afe66976e03d texlive-luatexbase-20200406-25.el9.noarch.rpm 513c16c6a87af15a12b9efe129b81474d0b350f641809b5d723ebde474ee3e94 texlive-lwarp-20200406-25.el9.noarch.rpm e4fff295be0b11e774a3e0bdff9207765536a18bbf6e434a02adf8c2578221d8 texlive-makecmds-20200406-25.el9.noarch.rpm 0036f630755d753612f9cb00524a0b1ed63633d690e6d74c5d47173182562ec1 texlive-makeindex-20200406-25.el9.x86_64.rpm cc236137949733f0d49227af50a5e4d41d42fef05c3d1022391cb05fec7cf910 texlive-manfnt-font-20200406-25.el9.noarch.rpm de180eceaaf8d889af7574330d49c9d6262dee26663e62c7b3b33b97cef60bbe texlive-marginnote-20200406-25.el9.noarch.rpm 864359c8c3712ace44f0eec16b4bced44421f3334b61e581f87da22964b049c9 texlive-marvosym-20200406-25.el9.noarch.rpm 5e9ef272397b6cfddb11dcabe69a00d5f7455fc2c5d25ede85f5280e8eedacd7 texlive-mathpazo-20200406-25.el9.noarch.rpm 58c5790696bcc4a76daf58d3cf86041286ae5dea0b463e2fd19ff760afc7d9d6 texlive-mathspec-20200406-25.el9.noarch.rpm 2e51a33f36543a8d5545b6dfd83f0397b1ec9322a30776bfe61c480e50a802aa texlive-mathtools-20200406-25.el9.noarch.rpm 81d014b6f9c1d1255ae3b3dab3ad7ae862fe6b47796f182b9945c696eefbe271 texlive-mdwtools-20200406-25.el9.noarch.rpm efc50baa870fdd49e732ba54982b319027c165352f5c01e040ca5ec4a3d2fc57 texlive-memoir-20200406-25.el9.noarch.rpm eff39127d155c52bed0e44b897df30bdfb76471cbc459e2d7db5af215b349c7d texlive-metafont-20200406-25.el9.x86_64.rpm ace3a3594b1b16a06c69f0244122dbefc74184aa91d4fadaa333d08e85ef8e46 texlive-metalogo-20200406-25.el9.noarch.rpm fd95b8abd702f3473ed7e80b0d9702345693b89ba1a175d8c939f87a1baec501 texlive-metapost-20200406-25.el9.x86_64.rpm 6fbb79f6e587ee777483734c1e5226ce2c4cf3698283adc66c1db84b7f586cc1 texlive-mflogo-font-20200406-25.el9.noarch.rpm fb2fac571c04d381cfb61752f63fcb57d30089b09dca7cbdcc20427a5b8484c0 texlive-mfnfss-20200406-25.el9.noarch.rpm dda66b977ade784044923c3af0999c676bb3f33f75b30347794708e247e8469c texlive-mfware-20200406-25.el9.x86_64.rpm 58da28904d9ba7afec00aef0981f5e734dcf1e89177f3487d3eca4200245a588 texlive-microtype-20200406-25.el9.noarch.rpm bf6a25abc838c067acf1fa19ea4a0b8a7047cf27a84206b5b31b29a928b5b51b texlive-minitoc-20200406-25.el9.noarch.rpm 3c9d58f4b4001f0b1639b4306719fe82009ed4cd4bf64b2bcc2d31a6d5660160 texlive-mnsymbol-20200406-25.el9.noarch.rpm 119ce08b739c292ff2c8e92ad17d13e5dbb9ec50566b585b1646f5ff4c307e91 texlive-modes-20200406-25.el9.noarch.rpm 2b6b01563fc9dae1b7a1c69dc5564462bcbf26fc2e06b1664f99e1cfe6199c56 texlive-mparhack-20200406-25.el9.noarch.rpm 4497f869676d6e90593e23b626ea1a1888a9fe1a5f0cfecb37f496b8539d2dfc texlive-mptopdf-20200406-25.el9.noarch.rpm 5c2f4670cec9e8aa28153bb426af3c6235ef429e864d9a52d9f07be8bbf8cc88 texlive-ms-20200406-25.el9.noarch.rpm b10b0154d0376a4610cde1e27a99c68701833548575015060e1c9bfb10958ac2 texlive-multido-20200406-25.el9.noarch.rpm 2ceb75c3b03e832f68bb44cec37c53399ddbc013efb93337bea92ae39a91c1a3 texlive-multirow-20200406-25.el9.noarch.rpm d8e9725313e1b5b33b69120ac5f3783249338603c963106a301f4c23411ba41f texlive-natbib-20200406-25.el9.noarch.rpm 994862a0c3432b57cf428fde7d44a946b7a5e28b8db97f36e797220ff8c0c83f texlive-ncctools-20200406-25.el9.noarch.rpm 978ced7b787affae5cfcefe29a78b05837600ab6b7204d9db01ef59db368b1f3 texlive-ncntrsbk-20200406-25.el9.noarch.rpm e1247220e2d528dfb8a923f956630b0a7964500950ac5269f9a18fc76791ac43 texlive-needspace-20200406-25.el9.noarch.rpm cfb8cfd5679c9f8bd87004994b9d49f8c92d3da38cb4d00395cab7cad476e2bc texlive-newfloat-20200406-25.el9.noarch.rpm 95c0f2f163c39301b5cd52148f96d006ec21ee7aeb8e002cae9d3100f1029941 texlive-newunicodechar-20200406-25.el9.noarch.rpm 400ec7f4812690f8e721e876570b2b9cb0bfe9e5b83487c76d6c00a09d81ddb4 texlive-norasi-c90-20200406-25.el9.noarch.rpm 2cf0fb88ad2f3ade78f77971dc7395801ac75ea84040cf517f373a0a6ea3b129 texlive-notoccite-20200406-25.el9.noarch.rpm e6ade9f118f2f4526fc2f4512bf2a3893fe06f47053a29acf986d6d220870f92 texlive-pdfpages-20200406-25.el9.noarch.rpm 5484b413c0b52c7ea09da03e8aff7be9791460b86b202f23a8ab8fc19941405b texlive-ntgclass-20200406-25.el9.noarch.rpm 020362c734bd55750242017ec8f18debaae8cf90041c3b5d2be8d08c5dbecb70 texlive-oberdiek-20200406-25.el9.noarch.rpm b1ab557ba78c19e427dab7dc6b4672a4c032dac197f2b6f55fcf53ba9987f85f texlive-obsolete-20200406-25.el9.noarch.rpm d06c3883791f9b892acb1d45d1a458a896bcd13c428cd985f57f5069b7432a94 texlive-overpic-20200406-25.el9.noarch.rpm f5549641883ce8a04da34562d93d49567fec38c8b86c940ff7b85f05b38b6111 texlive-palatino-20200406-25.el9.noarch.rpm f2bf49c285378767dd4278029ddd4c109abf2b4595f8872d0c8e0c0758f82b72 texlive-paralist-20200406-25.el9.noarch.rpm 7b9550d3578d2799a6df4cad660261d170f7cda3d5ce8349c768fbf7d6e92172 texlive-parallel-20200406-25.el9.noarch.rpm 48f06a46cb8a65328f274ba4f574bb748d0ea4e5aad0a6dc08b72894195915a5 texlive-parskip-20200406-25.el9.noarch.rpm 46a6ed23bcec5539cabdb67e2864ce5b88f2c8183e185073b1ad891c39536218 texlive-passivetex-20200406-25.el9.noarch.rpm 67ce13efdff507306be4ae126121cd035215cfc5f71c5cf77c2cb027a703ede9 texlive-pdfcolmk-20200406-25.el9.noarch.rpm 3b3544ceb75d7f9d0569766ec9909e13787267b8f8df4c9c9bf84c448c9bf40b texlive-pdfescape-20200406-25.el9.noarch.rpm cc47f90869fe4af51dd17368f6a91291a8e050abc8224afe56e64bdf2c1768cf texlive-pdflscape-20200406-25.el9.noarch.rpm e2337ea4964520c8f97109d1181f475157459e6eae5307f0015edb646efbb3c6 texlive-pdftex-20200406-25.el9.x86_64.rpm 91f33963e4364395001058d317100753cf1e1162ae79f87c230238cc289536e8 texlive-pdftexcmds-20200406-25.el9.noarch.rpm 73227e722a6ba1314d0f35cdbd070571cf657fb84a5bdb4d35baa415fe9e9e17 texlive-pgf-20200406-25.el9.noarch.rpm 96c9488dad4eef71ac8c88f4b0892c6783cf79cddb79ec93a2d494db09e6068f texlive-philokalia-20200406-25.el9.noarch.rpm 0128da4b085b239b266abd80a540cdf13cfccbbbd083ed1dad150750638200bd texlive-placeins-20200406-25.el9.noarch.rpm 698a46cc7eb8759bebfb3ac156f8fbc24d88c455af179b37c1cbc2f30c98bffe texlive-plain-20200406-25.el9.noarch.rpm 81f92c89d121442717cc8a4ad13ce1fb63b2cc286e7a6e33479b211d83a408ca texlive-polyglossia-20200406-25.el9.noarch.rpm a95d9f25375e4936ce0b6ddc2d72bc180b8c77eca8c18e5ba32b06cbc78e8d7d texlive-powerdot-20200406-25.el9.noarch.rpm 952942fde6dc86db4f9ed1f24051b79828f64d0bd87b9610be4eaae00b491d1d texlive-preprint-20200406-25.el9.noarch.rpm 2686e593feb6ecf2269bd5282c6be63b2c3451fafcd22026a9a6235b5d675d05 texlive-psfrag-20200406-25.el9.noarch.rpm c5afecfd2f68354ea4f6744b6030fc7f6e443ece2107b0937f1d164bbf98965e texlive-pslatex-20200406-25.el9.noarch.rpm 9847409bd94e3a7f855c66e2826fd1570f73c7980488a021d3b1e99282be5a22 texlive-psnfss-20200406-25.el9.noarch.rpm 03c3544608a35082d9dd549f575c627a3b5906d03ea4b2d2bdc1c9aadcaf0ba0 texlive-pspicture-20200406-25.el9.noarch.rpm 9e3fbb29e121a5211af3e9f4031bce0753cf8f2a6bcbfec7c30560b2108a63b1 texlive-pst-3d-20200406-25.el9.noarch.rpm aeec938b535b25f3b00e9ee113eaae486ac37cf8a21b8ab61124baec2fb9924b texlive-pst-arrow-20200406-25.el9.noarch.rpm 25491cceff03df8b1c5ebafc20a952b9b962cc90ccdf871f3f95a19da2eea0ca texlive-pst-blur-20200406-25.el9.noarch.rpm 19c0a11ebc89ee46c6ed39f08e10dcb937fd3f1d9f797ec0d3ca26825c58f8e8 texlive-pst-coil-20200406-25.el9.noarch.rpm 12826590e1af92e8d56c5a98ef2cca6f8331657b808e3708ae9edd45c64d4058 texlive-pst-eps-20200406-25.el9.noarch.rpm 09c6bebce66f7bd561f42317b5360064620af3b1d17e6b629e3052d5d39a520c texlive-pst-fill-20200406-25.el9.noarch.rpm ba011dcde9e06229ac41639779481721fbc605c5ef3f563a7c933cdbb69097ea texlive-pst-grad-20200406-25.el9.noarch.rpm 9c4de4b759085b0ed7723e8fc8a9a2e8df38dc5d4d68a53122cfd98741412d23 texlive-pst-math-20200406-25.el9.noarch.rpm a6fecef207a39605788c1c888809ab0334cb2d335b04908e4ccf75376128bcd9 texlive-pst-node-20200406-25.el9.noarch.rpm 3e074a82e14f18d17f2fbef4be40882de6cbef844deac006f6b523e3a0cfb494 texlive-pst-plot-20200406-25.el9.noarch.rpm da752da70547dd8ef6a4f017d4d3a22b704c5596fec1eee25b00ec34b53df804 texlive-pstricks-20200406-25.el9.noarch.rpm d89780e5aebd796b75bd64a13619c213ad49dcc0289b91eb0a2da817c1b69848 texlive-pstricks-add-20200406-25.el9.noarch.rpm 70379c9017efd66105b522958d22d60b024e7d7f3914b5c46eafa3cbb70ec6b1 texlive-pst-slpe-20200406-25.el9.noarch.rpm a4e795690600c2bb92c414e341b8a013d6d19befc6cdaf4a64182d5d395f2942 texlive-pst-text-20200406-25.el9.noarch.rpm fcf4bdc9a22207aa25a452782f7d5366f73582f5e67eb3f0aa2986fceb89ed73 texlive-pst-tools-20200406-25.el9.noarch.rpm 4c61633afdbfbab31599ab4ffa3f1000819ac02c785b3fae0c2a754da9da6d45 texlive-pst-tree-20200406-25.el9.noarch.rpm 1bc668a2085cd4e07573f31b7b60613fe17b49d2f60c7af0f700ad66897d70b2 texlive-ptext-20200406-25.el9.noarch.rpm 5b5af1a9486ae25908d5973449c9330c62b35a3c5d403541b4ccce72cfb62a15 texlive-pxfonts-20200406-25.el9.noarch.rpm 20ba00aca9571b4b88db8c97f3bb6d041106071e86081b2ebfe2c8bdbee234a2 texlive-qstest-20200406-25.el9.noarch.rpm 6b3eabb90ae5d1e42a54dc54d50c77f22ad00de3e1fc75813ae8f98f011d7c76 texlive-ragged2e-20200406-25.el9.noarch.rpm ccc1663424a7d7e8c9b2e09bc27ef8fecbf2feeb681830f90fb527150af59b91 texlive-rcs-20200406-25.el9.noarch.rpm 290386a22b1faee86362be1b64a8c871a1d172d15e36890bc2970b1792914b74 texlive-realscripts-20200406-25.el9.noarch.rpm 508bb1c9454ce09edc17806e4df3f6bef0582659fdcd8ee58c464b43032bf094 texlive-refcount-20200406-25.el9.noarch.rpm d4836ac7c8c8507c9ba52f8f3995e2be0425fb842bee9e27a27a1fc07998c34b texlive-rerunfilecheck-20200406-25.el9.noarch.rpm 5b125749deca9f4c08273eec2a012bc22ddd0c21d27d41c173ff193bad357999 texlive-rsfs-20200406-25.el9.noarch.rpm 9438a38e43d2a936ca88fd7b96ea3e5618ae87847c1d9e5e1d3d6e9158ba782f texlive-sansmath-20200406-25.el9.noarch.rpm 0b54104e3a155dff625ec906ccdcd17ab1a9d7b254d89296dd22bb03e9ee7292 texlive-sansmathaccent-20200406-25.el9.noarch.rpm f017d679e4cf2bf97481d5c4e6c754803aa774570e8146b57dbd26694685affa texlive-sauerj-20200406-25.el9.noarch.rpm c2384124bdcc29adba71a86e29a4c1fb126144cec8a9a274a309513449f71025 texlive-scheme-basic-20200406-25.el9.noarch.rpm 604e33cb408eab81c83492aa71778866326d0c39823ff9af142462ed56dc69be texlive-section-20200406-25.el9.noarch.rpm c9e8b1953ce2c61e1ad2dd200b9409c37a9435c088b60b1b4c5cb0b53d651313 texlive-sectsty-20200406-25.el9.noarch.rpm 65deaf5972533b9c7c7e56a96906a4e64c1e1963b7f261274cf1aed31c8c59fb texlive-seminar-20200406-25.el9.noarch.rpm ede79a44a35fc1ed7bc5cb3b1ec66edaafb18a7396909a5b26c8a79d0f8e9101 texlive-sepnum-20200406-25.el9.noarch.rpm bea445e926a419a00c9dd5f9e64e4c384f84fd0e3c5943ff08a46e1e60bfb551 texlive-setspace-20200406-25.el9.noarch.rpm b9375ee1fa009ca226ba030dd30f8edbf2c2756f89f12a5c78506675d173921d texlive-showexpl-20200406-25.el9.noarch.rpm 0dcc1a6adadcd5f66282d3f1c44f91fc540b22a3a55c3b6439b7fb682a4627e6 texlive-soul-20200406-25.el9.noarch.rpm df4a2daf964c19791725b1b51855270882be78a13139404aa5b77e23552099e5 texlive-stackengine-20200406-25.el9.noarch.rpm 4522def90f5d7d345cc7d666dd5efc92d84ca1a9c60eafa7cccf6ba034eb6b48 texlive-stmaryrd-20200406-25.el9.noarch.rpm 6f215f784a976c907f6cbb5dca1b593a304c34c6c7625d310375baaa8073acc4 texlive-stringenc-20200406-25.el9.noarch.rpm c92239d5cd9b940b2b1d839fc5e3ed33c92bd9a2a5534724174791ed0a9c9b66 texlive-subfig-20200406-25.el9.noarch.rpm 09b41a872644f0f859d687baf48319317e326a4f57dd8b8815d0690acc75def3 texlive-subfigure-20200406-25.el9.noarch.rpm a2f6acaef7c3289ca357cda490ab9dbc758434897d5a6faa7409880ab7d64353 texlive-svn-prov-20200406-25.el9.noarch.rpm cddf69d3ff8db867b22e1f143e37407a9b22167722d83d5ef1c1a59f7812d89c texlive-symbol-20200406-25.el9.noarch.rpm 55e6709574343018182bdc912c3d9beb9890eaae2a3faf617fcef013ea61d84b texlive-t2-20200406-25.el9.noarch.rpm fa2e2003f8380f601cc0d1caf549336dc65768f07b03e601241d9f68a2ab61aa texlive-tabu-20200406-25.el9.noarch.rpm 7a2d58c069ab1fa324bb1f6ce4bade227944d8e95782a3bac76c8ea480ca4695 texlive-tabulary-20200406-25.el9.noarch.rpm f92d6e1af56c2ed6b81ea6078398494028d7ab7b52b007f273f5459ed302e529 texlive-tex-20200406-25.el9.x86_64.rpm 6d07476bd9ae8b9ff2a69a9dfb98640f21725edb4d27470ba215e64487a7e43d texlive-tex4ht-20200406-25.el9.x86_64.rpm 7f370d30eb1b283b19d9499c3f96bbea23ef2d5f1359b5bdc4eb8b88192a7d4e texlive-tex-gyre-20200406-25.el9.noarch.rpm ec064b3921ff28eade93c13b11ae2930a86a0c0b7feb2cf0818b1a8d6212d326 texlive-tex-gyre-math-20200406-25.el9.noarch.rpm bed88e6700ddd69e5e76d6adb07bb122fb5308e114fa70eb6e981f5ef26587b4 texlive-tex-ini-files-20200406-25.el9.noarch.rpm a02992283c6bdf768fce09cbfe8b3d0412ce84cf1cc6eac44f45c0cabcc53ecf texlive-texlive-common-doc-20200406-25.el9.noarch.rpm ea28ab74687d1a6bea0b7753a83d39b053e76784d144690b4ab297da1a28d296 texlive-texlive-docindex-20200406-25.el9.noarch.rpm a9f5c9644b7f95e11e138e8379d5b57fa6bcc571bd4fbee734eb0835982b6028 texlive-texlive-en-20200406-25.el9.noarch.rpm cad82513b5f8592a37c96806903976ee30e3218c9cd1c5bb685eba8ca8b0fc56 texlive-texlive.infra-20200406-25.el9.noarch.rpm da72db9c7460fab1f640b319784d9474d58c9f216516c1842d81d1c7f4ea48d2 texlive-texlive-msg-translations-20200406-25.el9.noarch.rpm 175e43bc21f4eaa81524094fcd09b7edb5667a9b173ca6525e1ee604a2a7217a texlive-texlive-scripts-20200406-25.el9.noarch.rpm c6d1c66776c030852e1b02e1a72f29a686d074062043fd8151e281f4fdf093d8 texlive-texlive-scripts-extra-20200406-25.el9.noarch.rpm 40d8136ad92b59cab6cf045478fd45cb79ae0ae9c31de9be40c8c7a7bfb5c693 texlive-textcase-20200406-25.el9.noarch.rpm 2f8cfadf73e9aed6b6276d0be3995289fe3291acdad2dce168decf56532787f5 texlive-textpos-20200406-25.el9.noarch.rpm bfb0186e8e9d3a61e3ac74de1abb4c64127e7fe7decf8f7bf1c5ab1a12e5a897 texlive-threeparttable-20200406-25.el9.noarch.rpm 0f255d8e626a80f347b783ce81f1b978119b1e9c900b3e6cdb43e23a8770fbf3 texlive-thumbpdf-20200406-25.el9.noarch.rpm 5a130b14b45b5614f577a922e1e4fc432996aa8791f52537b2482964e13243e5 texlive-times-20200406-25.el9.noarch.rpm 9418deacde7a5d618fd85ef263542d4d609838e34db4ec6cd339440f5ae8f45c texlive-tipa-20200406-25.el9.noarch.rpm a8f19dc804f7ac6b1d292271b724e73777143b2868fb438e314ca0c95837fd6e texlive-titlesec-20200406-25.el9.noarch.rpm 12e0c3b29f9cdf7a89c2bb2bd46dd0d02d6ab1ccc481f9b2a9daf860e1f0345e texlive-titling-20200406-25.el9.noarch.rpm b28121941b4e5bc05ef3770f0012bed289b593586ec25370ae1d0762fac8ce76 texlive-tocloft-20200406-25.el9.noarch.rpm 57d2ead533c7a2ea4dee00173ee5066133063c87e0dd8f841e5fa40c1e4782e7 texlive-tools-20200406-25.el9.noarch.rpm 7666ea34c5c50cd3ce19c622a7aca644e3d277ec17498e6097c8e7d3213c9fc3 texlive-translator-20200406-25.el9.noarch.rpm ed25ee47a6d497b9da17971b90688c6ecce05c2d4043e8c0868dc21d6292fe3e texlive-trimspaces-20200406-25.el9.noarch.rpm bf180a21bed6370d0d22495ce8a380da4eb85092d81a43b804744367c2f7b002 texlive-txfonts-20200406-25.el9.noarch.rpm 98c4cfc3718fe4d4ff33708fcf8e07f5c0db260d0b31912ca21c8086d04ef10b texlive-type1cm-20200406-25.el9.noarch.rpm a689773174410205b40e55c5b457cf317e25bb84a595c9e76033a39f84e4222e texlive-typehtml-20200406-25.el9.noarch.rpm 0c50cd800ce54a83c376adfa2f3d67be4a982494f9c70acf884bafb188740f2e texlive-ucharcat-20200406-25.el9.noarch.rpm 28c0785063de63a0cfc6f3f00bb65141a9763c40a6452bd8b80cc59268b9bf48 texlive-ucharclasses-20200406-25.el9.noarch.rpm 9e7d1246c59514b05ae5534dc6e7fd3d325dba2c43e5d7b4562482dd828fa1be texlive-ucs-20200406-25.el9.noarch.rpm ace272d52430f78f859b44bdd14d3779a1ff144720608d86d35fe5dfbae99099 texlive-uhc-20200406-25.el9.noarch.rpm f273a8b8dffde6f41ea5157905fbc5322b3fa7f5587f3331b7bf7c45892a56ac texlive-ulem-20200406-25.el9.noarch.rpm 3b703fe1545e3b1848376cd61d9c58a3943b584a8cfb5c7cebe500145deae22b texlive-underscore-20200406-25.el9.noarch.rpm c48c3f6077ce0138eb519383de45241574a83a187372f64ca24823989b70de2a texlive-unicode-data-20200406-25.el9.noarch.rpm 9bd29b49c438c6691ee10688a50e692a61f1ba623e643fd0b5dfc3085fd3abd8 texlive-unicode-math-20200406-25.el9.noarch.rpm cef2e2188f6bcb94fdc5590a435d29e50bb6976445658ef196292b062e9f9dba texlive-uniquecounter-20200406-25.el9.noarch.rpm f5352e9fd14eb60534a040b4a949ec90193aac2755a882b4a525000856c5bcf0 texlive-unisugar-20200406-25.el9.noarch.rpm 2f860da9e67bcb21961011ddd5638044e3058b0d2a875161c09c06f87af38c0c texlive-updmap-map-20200406-25.el9.noarch.rpm 99dddb855aba0cf9837f2441edac725dbaff64099543552914a84785d7788722 texlive-upquote-20200406-25.el9.noarch.rpm 2094b7f5526adf652180cf09f09e0798ee878a9c46bd0f8e7db04d453a11ca21 texlive-url-20200406-25.el9.noarch.rpm c12dca17f89b388b5e544b56cd7c24222e6dbd83ef02680200221b1f3fca5cff texlive-utopia-20200406-25.el9.noarch.rpm 77797f6c90fd67eb9a81e71ad643167571d0048b816dc31d7ecf1bccc1bde398 texlive-varwidth-20200406-25.el9.noarch.rpm 8db316c8fe0e7e3d285a4f43f3fe31a3f14eb03928c82223a22da31d08b95832 texlive-wadalab-20200406-25.el9.noarch.rpm 3be9c56baf2205cc7213aa15db773a377cbc55397f365aaca74eaa1610433dc9 texlive-was-20200406-25.el9.noarch.rpm a1045da1c6443180b525e021f298be9b98c8d73d651eef627c65288e946c504b texlive-wasy-20200406-25.el9.noarch.rpm b70c8baa98f5450279e409c6abc4346d406925e9e508e58c449894035f6bec40 texlive-wasysym-20200406-25.el9.noarch.rpm 353a4132d0325d49776fecba86dfd6302c83f795d6c882d17cf3f4f9eacf3327 texlive-wasy-type1-20200406-25.el9.noarch.rpm f86fc46d1db9da44cf24e094e8ad945154c470db4db4e4590bc416e5d05790f7 texlive-wrapfig-20200406-25.el9.noarch.rpm 653dcd2b0cdd00d465f35e6804001895c330002e351b2b0666c5bedf69113efa texlive-xcolor-20200406-25.el9.noarch.rpm 45d29bd70c364ac048caca925267806bc7b398c0c92cb833f57a958458a33d10 texlive-xdvi-20200406-25.el9.x86_64.rpm 26c636cdce22e66c30cfcc71f1cf5abade583e879d3643408171f1ac559af2df texlive-xecjk-20200406-25.el9.noarch.rpm a1feeaa1aca990dcc540f3c3864c834156bf26490f32359d23e2612cc8adf4ea texlive-xecolor-20200406-25.el9.noarch.rpm cb7e4673d45370bf7d6294f896f13986cc571b002edbddc797d0c03d060b79fa texlive-xecyr-20200406-25.el9.noarch.rpm d1d46638c81432a9d1ad2906d655e979e028c71e76b183f4c861f5e7e8c5b1cc texlive-xeindex-20200406-25.el9.noarch.rpm c90a43536e43c4ee8d0e5971384d0244892302264dd2b7c01789440953bcac8f texlive-xepersian-20200406-25.el9.noarch.rpm 364504a4d63aadab975d2f52a0d022c575ff64b4b474f2fad7aa2dd3bdbcf509 texlive-xesearch-20200406-25.el9.noarch.rpm 771e205e39f0621e3f7446e2f8b97c372970300c1205bbc5d7b5be27019cea4d texlive-xetex-20200406-25.el9.x86_64.rpm 0779e9e75452f4e827b3017a71946bb2568730fb954d3f856ddb40e39e4b8067 texlive-xetexconfig-20200406-25.el9.noarch.rpm dd2da96c08a88f5f32598e6c07c78e86728eeb3aea12430f5d58bf8e2aadbac2 texlive-xetexfontinfo-20200406-25.el9.noarch.rpm 71e286ef82c45745606f448f8c233a4a78d60ef57038fadd452724dd5ca65589 texlive-xetex-itrans-20200406-25.el9.noarch.rpm 2599a967b0e400d6530083659d8bfe199a01bf888bd451e30cf8182a754847ac texlive-xetex-pstricks-20200406-25.el9.noarch.rpm 5f01f0b999a680c40bb464e10cba4297f25bb42ae4f219b9a16f7eb02afaeadb texlive-xetex-tibetan-20200406-25.el9.noarch.rpm 4178bebb0541ffe4cac350e7b41a7810fbe1fcfbcad79f11a87c21242f5bba26 texlive-xifthen-20200406-25.el9.noarch.rpm 6a25652f0272f64ccb4df17d223439e2d2c78fcec55a9d0a6816ead7192ffed2 texlive-xkeyval-20200406-25.el9.noarch.rpm 288ba1407d18f0c156c31a78894851c80dbab1225d27ea4b4bacb022d02d1b42 texlive-xltxtra-20200406-25.el9.noarch.rpm d4840248317ae32aa5ad710ae9717726dd2d47b931be59594e377155495135a1 texlive-xmltex-20200406-25.el9.noarch.rpm 78bbd46acb7cc5ec1763302e0f22a92b07b1dd003cf27e6e8cc4e65e72a1a83b texlive-xmltexconfig-20200406-25.el9.noarch.rpm 5664b151f49581412039305093784e35ae431e095a35ffd4e2e36ccddc96ce5a texlive-xstring-20200406-25.el9.noarch.rpm 2f16884e0c906beea2e2f97ba9639789df25c709759c31a59871d94f3835b4ba texlive-xtab-20200406-25.el9.noarch.rpm 054d5dab6ab73edfbd43499c42c8e6810fd16b5b79901b45d4754dd9dad77db8 texlive-xunicode-20200406-25.el9.noarch.rpm ba063ce789a9d57258cafb4e6fb0cdfc1b6e0e32730269118053749f4a5ce749 texlive-zapfchan-20200406-25.el9.noarch.rpm 41b83a458ffd2e359e3a0cfdd44aa7bec199f44642c36c56e5558aab0b19c19b texlive-zapfding-20200406-25.el9.noarch.rpm 913ab45b626cd7a60b0fec8506263a882c1a9e63f766e619fc46e8414183516b texlive-zref-20200406-25.el9.noarch.rpm 501847890309386d5549e72547b5df278d430d6a0532cf6d0070a7ad2a34f586 RLBA-2022:2482 new packages: gnome-remote-desktop Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-remote-desktop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-remote-desktop-40.0-7.el9.x86_64.rpm 1bb548a4b0df9716372c983b5e61a13d19df6c8c1f83b200fadb836975061a02 RLBA-2022:2484 new packages: mod_auth_openidc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_openidc-2.4.9.4-1.el9.x86_64.rpm d8e146dcd658eb59cd20c82e56a1759fe8a5e019e1f4f2da41be2c9ef1e3b0e7 RLBA-2022:2486 new packages: setroubleshoot-plugins Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setroubleshoot-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setroubleshoot-plugins-3.3.14-4.el9.noarch.rpm 67e197f8149cfeb09ae0fe8e0f4ad3dd041c317a81fe73e8f0d7cf26b6b362f5 RLBA-2022:2490 new packages: libosinfo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libosinfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libosinfo-1.9.0-5.el9.i686.rpm 325c1a1383a155bd68f8ef9663a0e63799fa7e01ad6675a7d085ea866d461f52 libosinfo-1.9.0-5.el9.x86_64.rpm 69eaf3333428c449d54851af95245a88b6399df1f30915f89bd6f68a59a3a127 RLBA-2022:2491 new packages: dlm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dlm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dlm-lib-4.1.1-2.el9.i686.rpm 6835ff7cd963c6822dd7c19e8c7f48b32faa0b36484a047a74eb5d6a38995c89 dlm-lib-4.1.1-2.el9.x86_64.rpm a564dbe1861dc4092b61b3399f97a001e73f3ae87dba4f15e9d260fe9de13b0c RLBA-2022:2495 new packages: xdg-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-utils-1.1.3-11.el9.noarch.rpm 220b2000ec1a08d98897ba2f14e1d115376d9b31057936d8fc35a11e94a83cc2 RLBA-2022:2499 new packages: pcm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcm-202107-5.el9.x86_64.rpm 58e3876c6aab62f467ad1581ca7500d8530a0139e0431528509ddd52b773f32c RLBA-2022:2500 new packages: scap-workbench Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-workbench. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-workbench-1.2.1-13.el9.x86_64.rpm 11625817e9cbdb59a92b21b19530e2d248a887ee1d2adcb03d92a54e9cfb8b5e RLBA-2022:2504 new packages: qt5-qtquickcontrols2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtquickcontrols2-5.15.2-7.el9.i686.rpm 858bb664e4004634b2756ace5422ae9f824de8458817951d55fbe1c9a2936f38 qt5-qtquickcontrols2-5.15.2-7.el9.x86_64.rpm e1e1cefb0eb33cf8458c96133346d40d29ecbdd6dd097dd5d70eb250571edefb qt5-qtquickcontrols2-devel-5.15.2-7.el9.i686.rpm 289b0cb7e47f0bb60d827a991885aaad809d49e99f009b15c5a2a10f81748712 qt5-qtquickcontrols2-devel-5.15.2-7.el9.x86_64.rpm 8cef7bc144bc7a07317159d58e45298bb3e5b2d549e348a437a5ae447d92c360 qt5-qtquickcontrols2-examples-5.15.2-7.el9.x86_64.rpm 4e430442669604c1367f502c07b10ab574b083e79473d8f7532d74ecf2bb8503 RLBA-2022:2506 new packages: libpq Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpq-13.5-1.el9.i686.rpm 79963f26b44799709f05b55ba3633f8b2d39b4b8c07bfd380247b2d9edec7469 libpq-13.5-1.el9.x86_64.rpm 4599a7ea3ee60dfdbc124bfd3fe8cb05fc52bae1d6edefb363c324f0daec1b6b libpq-devel-13.5-1.el9.i686.rpm e3267862ab1c7b049f5829816ddc7218ba33d20724708182a236b83574d3d981 libpq-devel-13.5-1.el9.x86_64.rpm 7b15c9c7aca79e4f7b5939517db22b9ab806b9dbc79ec600a81bc34932417834 RLBA-2022:2508 new packages: php-pecl-xdebug3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pecl-xdebug3-3.1.2-1.el9.x86_64.rpm 82c9b726e9eece6677886d0f70fbed226494bb85fa1d5416d5478a774dea99b8 RLBA-2022:2509 new packages: apr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apr-1.7.0-11.el9.i686.rpm 90b5907faadb1e7878a8dc968762c3c91884c382628850aaa7c27e778811411c apr-1.7.0-11.el9.x86_64.rpm 24e25d0caf0c4ff47d4fb15cfe717dbb7b7912fced684a5d1ec67b92d2f1499a apr-devel-1.7.0-11.el9.i686.rpm 3022936af26e8c56bba13c8984582a3950316d245610fd1723f547607e93a726 apr-devel-1.7.0-11.el9.x86_64.rpm 8e923160015c8c6253546ec6c5930da36b0c7a5eb7df2ae1baeda82d3cb36f98 RLBA-2022:2510 new packages: crash-trace-command Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-trace-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-trace-command-3.0-6.el9.x86_64.rpm 5ddad5528d3cdc46dc47db43ad858944325cd70e6e251bd18e21bead821420d4 RLBA-2022:2511 new packages: crash-gcore-command Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-gcore-command-1.6.3-1.el9.x86_64.rpm 01ee46cd4550b25297cee37e722b3a37ca5a2c24ba79e227546aa275f668844d RLBA-2022:2512 new packages: gtk-vnc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk-vnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk-vnc2-1.3.0-1.el9.i686.rpm a07efff961dae5dda1a58f66c8d059670ba659f9bda8058579c103d688bf5851 gtk-vnc2-1.3.0-1.el9.x86_64.rpm 493893f13f97a88cb99e9ac929dca31e5e5d8b8b10e119b3869dd9e6ecf0c807 gvnc-1.3.0-1.el9.i686.rpm e057326de068707e25070236ba953426cf6bc4fe390fbe45552f870d110d5585 gvnc-1.3.0-1.el9.x86_64.rpm 94d3b3c4ebcd1be8155da7b1a0983ab260ddf378f40929c142b54b3d8785efe3 RLBA-2022:2513 new packages: clevis-pin-tpm2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis-pin-tpm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-pin-tpm2-0.5.1-2.el9.x86_64.rpm 2ae38133a9315ba94a9c53aba8e79418838626beb2eb26c142b06abb5858e193 RLBA-2022:2516 new packages: brasero Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for brasero. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms brasero-3.12.2-19.el9.x86_64.rpm 4e1db2914b8c92ff97a498a15de8275b2bdd3bd0b6c51dc9c2c257c66b7f9d0d brasero-libs-3.12.2-19.el9.i686.rpm 262097853d1f8570d56d915334efa5cf9e83550c554473e60cd5080413148788 brasero-libs-3.12.2-19.el9.x86_64.rpm 3664ec33617ef364a10deb355b2a0571beef62a9f7b6d4c45305610f18e9fdae brasero-nautilus-3.12.2-19.el9.x86_64.rpm f3d90f87b674b79883afed64e9c75ded11564533f3a70bb5c40404abe5259730 RLBA-2022:2518 new packages: libmwaw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmwaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmwaw-0.3.21-1.el9.x86_64.rpm 5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927 libmwaw-0.3.21-1.el9.i686.rpm c4deef75449986c9f70a0bd378d924b381a1d07224681ac8aea2855d0d48957b RLBA-2022:2517 new packages: rpmdevtools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpmdevtools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpmdevtools-9.5-1.el9.noarch.rpm b8feb33ed5e7d18a34d192e496eb4b49cdbd84747cf60ea994cacd7f70a5393c RLBA-2022:2519 new packages: tang Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tang-11-1.el9.x86_64.rpm 20961a1f20a4ed4830ad87cc7a0d5ad47acc305dfbc097d1fa65cebdaf768783 RLBA-2022:2521 new packages: LibRaw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for LibRaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms LibRaw-0.20.2-5.el9.i686.rpm d8b1559627995de547f4717d1a4d66e012768d3677e9e21e7af1a58d49c06c45 LibRaw-0.20.2-5.el9.x86_64.rpm e6bdf330e3a585687dbba3f343d2d4afa49b4f1c66c33d30b6b7f2cd85bfcdfb RLBA-2022:2524 new packages: libnotify Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnotify. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnotify-0.7.9-8.el9.i686.rpm c713d40cb363897c0b5bf7d933e0717fc932b42d05d091f895ae3bfe254a21f0 libnotify-0.7.9-8.el9.x86_64.rpm 938b1ea95bce0a2fa203dc2b737c18be7ec48f2c9547cff0a26678979490e7c5 libnotify-devel-0.7.9-8.el9.i686.rpm 06d7976260a04810fa0cd30ef00a01480cbc5560898f85de65d9b5c10172efef libnotify-devel-0.7.9-8.el9.x86_64.rpm 81328305de5968cbe36822cff5bc50808f310d5b4718e57ceaadb9bbf31b95cd RLBA-2022:2525 new packages: libspectre Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libspectre. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libspectre-0.2.9-6.el9.i686.rpm 2b155fc5fd4c6ebc39cf6eccfe55ffa7a9af310ea6579a4e55e92a35aea4da52 libspectre-0.2.9-6.el9.x86_64.rpm a4af95836f5a61a35574fbe8f4069ee7b52118183dec3b3c253696c6e5a0f0c2 RLBA-2022:2528 new packages: gnome-connections Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-connections. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-connections-41.2-1.el9.x86_64.rpm c8dfa4da28c4c5b266457647887ea577d50251850ab2b6439ac4eb6d550b3adc RLBA-2022:2529 new packages: fltk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fltk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fltk-1.3.8-1.el9.i686.rpm 3ba2ccb0a83d922ed3770fb000769c0b4992146c070c3623538b559b3081a4ca fltk-1.3.8-1.el9.x86_64.rpm 59fddccf1f17cc343668dbaa01f003727cff5de229e65c87c109d2fe3a15e4dd RLBA-2022:2532 new packages: libdecor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdecor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdecor-0.1.0-3.el9.i686.rpm 51144a547d76e0f18690d22a5903b1e0fd56262112ad8cbf2d884e350121fcbc libdecor-0.1.0-3.el9.x86_64.rpm dcbe03cc019c6f35fb17457c6bc3892e221d3f0e85542c06731d56df862564da RLBA-2022:2533 new packages: gnome-autoar Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-autoar. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-autoar-0.4.1-2.el9.i686.rpm 0fb6184dc20a645ba558d7175204ad042b1929c42cbe7f944af8ff622b267257 gnome-autoar-0.4.1-2.el9.x86_64.rpm 3cf8f13c53e8f94f68dca737be23a3959ceb4e947a3f523179378381f5b84b77 RLBA-2022:2534 new packages: hexchat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hexchat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hexchat-2.16.0-1.el9.x86_64.rpm bf3551a9442b1635087966f7c1ec82c16109bf1cb49a3b8286a5e18c497abbd7 RLBA-2022:2536 new packages: virt-viewer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-viewer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-viewer-11.0-1.el9.x86_64.rpm c913309a0abb066c29178f161f4e90e571f4a1fde6693bf725ede713f1d443b9 RLBA-2022:2537 new packages: gtk4 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk4-4.4.1-1.el9.i686.rpm a2d453941d6d8f8499ef1c117bf20bbaf7bf81d1a0bd1171484db042dcfd8d3b gtk4-4.4.1-1.el9.x86_64.rpm c89fa110e5ec31e2e3b74dc3d1386f68a7fef8a80e34c2fd0c30249650c36380 gtk4-devel-4.4.1-1.el9.i686.rpm 58b646256315735b97d6df33174942a9b91df5e5eaf25631067b57c55d28dc61 gtk4-devel-4.4.1-1.el9.x86_64.rpm ddd09cae4157c81c77a2b3f82ffae50cfb690ee7d54e71b0d57450251629d68c RLBA-2022:2539 new packages: spice-vdagent Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spice-vdagent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms spice-vdagent-0.21.0-4.el9.x86_64.rpm 55fa9ca090e47aad3fb379c604ccf29619abbf7ef797a8ce3d32c092a6fa6c46 RLBA-2022:2540 new packages: php-pear Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pear-1.10.13-1.el9.noarch.rpm 2eb530f9ebc42a1821c95cbc4ce649443262714e836dfcedfbf869bf29d83be0 RLBA-2022:2543 new packages: alsa-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-utils-1.2.6-1.el9.x86_64.rpm 3cb428e56df9d340c1ee7886616f2cd840f3f125b673362c4adbd062d4304c0a RLBA-2022:2545 new packages: satyr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for satyr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms satyr-0.38-3.el9.i686.rpm 2ef329a5d798d863416a2474c5101d1f63f509e459a0a641678c51cb6e89e47e satyr-0.38-3.el9.x86_64.rpm a84144e3ea38d97c05f4ed73ec0ed951e40c077ef963ddb21dab697fded79f53 RLBA-2022:2546 new packages: perl-IO-Socket-SSL Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Socket-SSL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Socket-SSL-2.073-1.el9.noarch.rpm 2382ad1e09c5c221da1147bebdb35f98cd895dc8575f9be9901b6dce9071664d RLBA-2022:2547 new packages: SDL2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for SDL2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms SDL2-2.0.20-2.el9.i686.rpm 6d7d24c4f07598c82efa9980f99a27fb6dd0e3a68a9cc930a6c3f597472f3838 SDL2-2.0.20-2.el9.x86_64.rpm 3b76b222e49e134e9526a621a64ee05cd46d45269df2c8974381fe3c905ed106 SDL2-devel-2.0.20-2.el9.i686.rpm 893879268d2622db009aba39080599a42c3d4bae1f9268e6afbff10e6976198d SDL2-devel-2.0.20-2.el9.x86_64.rpm efc14fd51ce5f071335802903aa15821e33b5dc5b12b6fbbb8f4ada66fd10135 RLBA-2022:2549 new packages: wireshark Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireshark-3.4.10-1.el9.x86_64.rpm 340fc5ccc766ac99ab350c3cf95b531ba160c7ce48838215bf5701fe002ab3b5 wireshark-cli-3.4.10-1.el9.i686.rpm 230a17aabdf30bc03154b1386952243a0a53b8265c4751e73db0090085120e9b wireshark-cli-3.4.10-1.el9.x86_64.rpm 54fc2fe4a29d3ebaef62d47d23d76ca5bb9f76914f76967c065372f8200fd899 RLBA-2022:2550 new packages: oniguruma Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oniguruma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oniguruma-6.9.6-1.el9.5.i686.rpm e8a525cd43c96c1f220b14befd7a38f81eff2485d9ad1af547d894e52d26cf4d oniguruma-6.9.6-1.el9.5.x86_64.rpm 6db5037eeddf4108851a44f08e71f54b397647e5ad5593c5889714400088bedb RLBA-2022:2551 new packages: libnetfilter_cthelper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnetfilter_cthelper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnetfilter_cthelper-1.0.0-22.el9.i686.rpm 3217312d80a462edbb3311738dd7d52d8a20f62c07ff0eba910c604ed661c723 libnetfilter_cthelper-1.0.0-22.el9.x86_64.rpm ff948c3da8285c7c46643a5543b7423336b34857979eb8006596d013cf105aa3 RLBA-2022:2554 new packages: evolution-mapi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-mapi-3.40.1-3.el9.x86_64.rpm 33bdb7cfe32c168fa052266d0b47758596c747e5a85ee4a6f53ca260ce537249 evolution-mapi-langpacks-3.40.1-3.el9.noarch.rpm f9fb374d5c7f32b2c64552141dd4ca3cb5b7b296828d9d789b4ab686b9e4c318 openchange-2.3-38.el9.i686.rpm 79fc1f6c946547f390785171e8bb848d41d79333674011b4f23cac058b2fb642 openchange-2.3-38.el9.x86_64.rpm fa317bf77b0f276f5e1684ba467c320a2b5ff5d999ff17c87f63ffe880a204d3 RLBA-2022:2556 new packages: qt5-qtsvg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtsvg-5.15.2-8.el9.i686.rpm 11657cad1b0710db8b0d0152316f63e6ca8de6063312ee40957786f7ca19b677 qt5-qtsvg-5.15.2-8.el9.x86_64.rpm 5c34148ed3de890cee4766f790d907a71af8146d2476e8d8ac3b54f31f3bc9a9 qt5-qtsvg-devel-5.15.2-8.el9.i686.rpm e4e26eb6a556c78d00dfa59556910f7e89e84ca15309fcff0eff158d80ebc1a1 qt5-qtsvg-devel-5.15.2-8.el9.x86_64.rpm 983e24391fe0f74bb89db8b304fff3c43c0e2740e93e77631c245c75d16fff13 qt5-qtsvg-examples-5.15.2-8.el9.x86_64.rpm f10ee33448ef899524d3f2eb154625e545047a6c893af91c9293f66ba2a03fa4 RLBA-2022:2562 new packages: fetchmail Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fetchmail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fetchmail-6.4.24-1.el9.x86_64.rpm bc1e561d8d71a50160d6f729b80b989a1c37c85e1f74bcb0202f5095ff587478 RLBA-2022:2563 mdevctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mdevctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdevctl package provides a utility for managing and persisting devices in the mediated device framework of the Linux kernel. rocky-linux-9-x86-64-appstream-rpms mdevctl-1.1.0-4.el9.x86_64.rpm cfa9daf2c1bf68578f018a8150117b28a057055513d0583090aa60b1bdfc23e2 RLBA-2022:2564 new packages: ghostscript Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-7.el9.x86_64.rpm fccb7c011bf7fb1071590b2745cfd3b30c7621686645f12be44f69870c4e806f ghostscript-doc-9.54.0-7.el9.noarch.rpm 8daee07013356a24e5ade282169f7857546d7a6fa60abe29696b82b480489a30 ghostscript-tools-dvipdf-9.54.0-7.el9.x86_64.rpm f33eec32a66a8922c5a8187eaba0cd7e87d7280ff54360b34acd9ec01b217fb3 ghostscript-tools-fonts-9.54.0-7.el9.x86_64.rpm 6856b83bd33e53ae2d9dab3c4495ae829e7f388803787ceae2cbbbe946a4f1d1 ghostscript-tools-printing-9.54.0-7.el9.x86_64.rpm 8d1fdaf25b0e573fb9ae7b0656033c4b6aa23ea839844ef456a75a3f1cf96df2 ghostscript-x11-9.54.0-7.el9.x86_64.rpm 0d1587d3f31a7faf21ff5d5ab9e7e9128bf4b72e414942fd8f950291a2e8e3f1 libgs-9.54.0-7.el9.i686.rpm e17c5d163ec3bdb4696ad25a39ee7c6f3e33a6ad49f021f69d0ff39d735ef810 libgs-9.54.0-7.el9.x86_64.rpm de7f605d8a4d167d0ff06812335caccbcdcbd7e1f0dff072576f15b2211087f9 RLBA-2022:2567 new packages: fido-device-onboard Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fdo-admin-cli-0.4.5-1.el9_0.x86_64.rpm 7911001cda26bee37a0e48d613021e9285624f160da716b11d51bbff21a0b144 fdo-client-0.4.5-1.el9_0.x86_64.rpm 7d8869d88ddb181dccdcf4f8c355c3555056f507f19a0fbf33484b078563e5c6 fdo-init-0.4.5-1.el9_0.x86_64.rpm 580da2589395d71de58e27ce11991ebb1ab69c69ecd7883a43a7b04ac2b8911c fdo-manufacturing-server-0.4.5-1.el9_0.x86_64.rpm 41ead387e384ae239a1e12b1f394f2d7258f5987f362500a2ad97884f42dcb4e fdo-owner-cli-0.4.5-1.el9_0.x86_64.rpm f1d7df9b9912131169cef6e1454b7af100e0f53a6fb64b2863a7113bbe48485c fdo-owner-onboarding-server-0.4.5-1.el9_0.x86_64.rpm 51eef5558ca8859d3536536f99b482a6797cc5f40c83f29ff8c375beb70d3136 fdo-rendezvous-server-0.4.5-1.el9_0.x86_64.rpm 4200d0bae9acb9e2f92ad1ba467b7e5b58c53f8c959038ab540d0ad1d3cb389b RLBA-2022:2570 new packages: spamassassin Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spamassassin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms spamassassin-3.4.6-5.el9.x86_64.rpm 6b9030200c7133f63bd3a434ffe8f421edf28634173c6738de5afadfa74d8b8e RLBA-2022:2569 new packages: rpmlint Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpmlint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpmlint-1.11-19.el9.noarch.rpm 4abe2e64806b4ca6404086a9b7d795c3527ebadcda9cf24c294805c0b5488edc RLBA-2022:2571 new packages: geoclue2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for geoclue2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms geoclue2-2.5.7-5.el9.i686.rpm bc74a47fec7e7d46dfe5b2f6ee745b2ce1822b523bfd3f45ec6407845aa494ed geoclue2-2.5.7-5.el9.x86_64.rpm c90750340fd35f6fe572151c7764fb1a377e4a74a98b400fe8a49729c5d2a094 geoclue2-libs-2.5.7-5.el9.i686.rpm ef8cb7c7cab6e85c4ff5488d4eeaddb7335327d8a927c37820c96d2d6a5b2bcf geoclue2-libs-2.5.7-5.el9.x86_64.rpm 3f07e6523055281b4f3c3683f3b3a0a440d69531783783166129a925bc9f5175 RLBA-2022:2572 new packages: gstreamer1-plugins-base Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.18.4-5.el9.i686.rpm c7cdbfd3525abc08017ac27e4506b3662bb888767960b4cc081962f2ff89b29c gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm 0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4 gstreamer1-plugins-base-devel-1.18.4-5.el9.i686.rpm e08ead4412cc6897576fd860009a7eef9042b1c758afc4d7438638ff0f42ac89 gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457 RLBA-2022:2573 new packages: libdrm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdrm-2.4.108-1.el9.i686.rpm f486aed96cbf9332bc2e7d9b4fcc6625a7347e4550028f3ea137c95c97eb686c libdrm-2.4.108-1.el9.x86_64.rpm 530c0374df7de9d40f10d0aab812be385c5433d3a72daacab6d4578e5e097a69 libdrm-devel-2.4.108-1.el9.i686.rpm 175a0a42c11434ae056dcd1f048b121ab337ef86e62fd139211217afa25d07c8 libdrm-devel-2.4.108-1.el9.x86_64.rpm 7bb6beeaa81ace3edf91168494667fc1da1e1c3a352e1cbaf897b5534e67daed RLBA-2022:2575 new packages: libreswan Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.6-3.el9.x86_64.rpm 39d3491df69d8917a67c3ba6e6dec852e55cd80e9f4988c8cafe4bbb8fe862f9 RLBA-2022:2576 new packages: inkscape Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for inkscape. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms inkscape-1.1.1-6.el9.x86_64.rpm f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171 inkscape-docs-1.1.1-6.el9.x86_64.rpm 084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4 inkscape-view-1.1.1-6.el9.x86_64.rpm 75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4 RLBA-2022:2578 new packages: graphviz Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for graphviz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms graphviz-2.44.0-25.el9.i686.rpm 1d9f2dd7f408ee121faddb3cfb75766606331c79e55e9abebaf8f121535f9ba0 graphviz-2.44.0-25.el9.x86_64.rpm 032a47e02640242c70e014e27fd662e4bd5ba5c559657d848910a988b7769cde graphviz-doc-2.44.0-25.el9.x86_64.rpm 8eda93357e9e14354697152b7ef95324dabcac98bbebb01242ef79f3591df31f graphviz-gd-2.44.0-25.el9.x86_64.rpm f0e6d9e100c47fa5e4170812ac440e92abefa253f4b9d153bde3c796b686ca58 graphviz-python3-2.44.0-25.el9.x86_64.rpm a02e44db1ca835a797f775e18624970a058825ba35df9d25d11110a7e34fdb26 RLBA-2022:2579 new packages: libnsl2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slapi-nis, libnsl2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnsl2-2.0.0-1.el9.x86_64.rpm f167e9ccc69ac4000940a4bcdc7e3b2b5bb4c74030d10e5151b0b28257d1e355 slapi-nis-0.56.7-4.el9.x86_64.rpm 590a5afdf48fd56554c5577fa6811bb4c2b127810139789f4211af932c0eefa0 RLBA-2022:2580 new packages: python-cryptography Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cryptography-36.0.1-1.el9_0.x86_64.rpm ac0312a995704e5480948a1511872da9fab54e9c08c997bb7b1cf51f44256c35 RLBA-2022:2581 new packages: perl-Module-Signature Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-Signature. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-Signature-0.88-1.el9.noarch.rpm 31bef567113daf1a2d95519042c7d138ff308f24be5ce506facd8884abdf887e RLBA-2022:2582 new packages: go-rpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.0.9-9.el9.x86_64.rpm 5227d232121281c39301f81bda168f6fdc3c736229e5d8b173a6a129ff622271 go-rpm-macros-3.0.9-9.el9.x86_64.rpm e9aab999cad301bf14cc9792f0d0628e744bb6a6d9030ec93f906c6b06a427d8 go-rpm-templates-3.0.9-9.el9.noarch.rpm d5546eae726d51c84d8e27d0fefa3770e317a32b5b4feb4f5b12d520c60815cd go-srpm-macros-3.0.9-9.el9.noarch.rpm cdc2015013f127552e107ccad833a17ad37a222a99e65cf0766c97cd3ca7d443 RLBA-2022:2586 new packages: libmtp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmtp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmtp-1.1.18-6.el9.i686.rpm 1b5b0832655ae5efc98170f7ee8767090c5f0e146fb7111b073989307526978f libmtp-1.1.18-6.el9.x86_64.rpm 45ad1fbef857cba6b190d304c036a152323e9f3e9d40224de555d2cdf45e29bd RLBA-2022:2585 new packages: python-pyghmi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pyghmi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyghmi-1.5.34-2.el9.noarch.rpm 3886531c09999de149da7b7ddcad4e0ba56c9e259cb6f18f72f81e93fb079b8f RLBA-2022:2587 new packages: aide Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms aide-0.16-100.el9.x86_64.rpm 6fcaa1dc4c67715770486b52d6f282c4fad0ba052dacb200beb85bf31e42ecac RLBA-2022:2588 new packages: libpmemobj-cpp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpmemobj-cpp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpmemobj++-devel-1.12-8.el9.x86_64.rpm 2c76c09583c12fcad6bcab4a23e219920948a546f5c95727ce8368e70ac57057 libpmemobj++-doc-1.12-8.el9.x86_64.rpm 97f1c0d060bb1f1402a4afc5dac29794f3953d46b6568688965c31870ed5fc3b RLBA-2022:2589 new packages: libtool Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtool-2.4.6-45.el9.x86_64.rpm 2b234d758f3b10c9c0a5f1527abad8a2b70a28616c1425f4b5b6fd494c316017 libtool-ltdl-2.4.6-45.el9.i686.rpm ad1a7003fcea82d251ed54e61f22668f5eb2bd73449caea99af6b2ca4eed7539 libtool-ltdl-2.4.6-45.el9.x86_64.rpm 39031cdd1458c857211736b88cef8c9eb60ef7802cc2e9155f0dd8cadc2eeb8a RLBA-2022:2590 new packages: hostapd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hostapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hostapd-2.10-1.el9.x86_64.rpm 679c0ea8a9eaf5e197c56be4628a3dbbd12b9cb905f81ce82887b0102679d3b8 RLBA-2022:2593 new packages: compat-libgfortran-48 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for compat-libgfortran-48. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms compat-libgfortran-48-4.8.5-36.5.el9.i686.rpm c0d92d9d3ff6b5f81122672a3775103d72d0e32890b50be39eb67c1e31f5b12e compat-libgfortran-48-4.8.5-36.5.el9.x86_64.rpm da0422baf995a6fcbc92c2a42ce89d47f929036c41a8532bfeea99a6a783b92b RLBA-2022:2594 new packages: flite Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flite-1.3-40.el9.i686.rpm c31a03001b871e2a8eb8e62869f6abfebe4ee4e2177be1a400f4bc39734c8582 flite-1.3-40.el9.x86_64.rpm 702aaa1634f1ffe04cd6cd3728c34e24b38e6c8926aad131a41478299183f8b0 RLBA-2022:2595 new packages: festival Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for festival. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms festival-2.5.0-17.el9.x86_64.rpm 71d12571f32e1567b2ec8dbd90ad8f17156ea6e7bb309a8772780d90a00d3aa0 festival-data-2.5.0-17.el9.noarch.rpm 5d3c9cce4e93c2e35570f4326083af0dcc972a1ad485e08fdc0482444059b06a festvox-slt-arctic-hts-2.5.0-17.el9.noarch.rpm a100049ed3d6be6f84fdf13f7daefaf4bf02ad1e8919eabc43de32263172cee2 RLBA-2022:2597 new packages: speech-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for speech-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms speech-tools-libs-2.5-18.el9.i686.rpm 26b282e26fd84fc9a281e606de7ef1ab55ae45735cd1903863bae3ea7981c768 speech-tools-libs-2.5-18.el9.x86_64.rpm d5b0526768e9c1ff74914a522a467e59d39cffd277d5e72efeb44cfab3790ff5 RLBA-2022:2600 new packages: OpenIPMI Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms OpenIPMI-2.0.32-3.el9.i686.rpm 16e22a1ff7698c5169b32f9766e2a1028ee664b75246c1775466fd26cccc5ccd OpenIPMI-2.0.32-3.el9.x86_64.rpm 642e651edcca1752588cf8ab70c02953c72cae2cd7f56e2e3b2549bd634c8b6d OpenIPMI-lanserv-2.0.32-3.el9.i686.rpm 62bc9ed20b29427116999e51ceaeb1297c02daeeb9e94517ec379aa00293b311 OpenIPMI-lanserv-2.0.32-3.el9.x86_64.rpm 4c82eae23043750ff749e31b010e791bb6c347b844c4048e73007251f71b9362 OpenIPMI-libs-2.0.32-3.el9.i686.rpm 4dcc708af9c28a522899aabac9299a9798175ab75f19ea8e798dab438e0c1d93 OpenIPMI-libs-2.0.32-3.el9.x86_64.rpm 7dd3d958a07e83ae829727dfa59358f9a0caed0202ea4368c927eeb9331b6e88 RLBA-2022:2601 new packages: greenboot Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms greenboot-0.14.0-3.el9.x86_64.rpm 73ceffc59748060cf4cdb4d25aaa4671fc22054e4072ccb3972e040b6205fa57 RLBA-2022:2603 new packages: plymouth Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plymouth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plymouth-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 5491632f8f97666a2d8db6715f089aa34c1fa4557acd2a619858b06f06ae2335 plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.i686.rpm 8d844837cec8aafe906ccb0bd0c8d39a33469aa5b58a6837d76464ca0a1cdecb plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 79819dedc5e635493b3fc70224a728645e12deaaa31d6916dc49d92ad5195a7a plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.i686.rpm e91ea56f94b329a71c5ff9c018d8ac21f640f2a06c93d987edb5e8383ee834ca plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 7ac51de1c3a54cacfc42c96dc86f12499b0dd49c2599da1f621aa4c2c5daa821 plymouth-plugin-fade-throbber-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 1c0750db912a3a914905b78bf514606b1f0049eca0f8bcb34ce27172d0ca0aab plymouth-plugin-label-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 6f93469c6ae998f16c38b78139bfaf0eba7f642657695f81581b142a19d67904 plymouth-plugin-script-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 29ea9329990c59b0c722377eb346b777a464d2687ab52359666bf4575681e835 plymouth-plugin-space-flares-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 3cfce895e646e6b9b100a4a550d3166c45f08c3a06987d230939a642029bec80 plymouth-plugin-two-step-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 96f0ef9badf547abf621e6848563c2a5b27c4a0c6468e7f86443a21519fff7a0 plymouth-scripts-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 602a1ec404b2c8f5e4cb66835e235830a8622aeea6c9836c67e7542d1b1b554e plymouth-system-theme-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 0a5bf089d1b06b26b9f5c5c95a9dbc94df3f7e24451110c64b6ef310bcff6998 plymouth-theme-charge-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 3be601b895d6a5104ed8b21bf4a5d828077c07f5b936ed928d1572f333b8433c plymouth-theme-fade-in-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm b813d1539feebc7eccd430e049644e46ed002ef97b9aae4ccbb20ee1ff358c40 plymouth-theme-script-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm be94478da75dea04db4a55b4d156faf6365397bac4c96160177a878d55046eb2 plymouth-theme-solar-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 57eb49f0b879c736f94791c8262f6cab04f0aa7ba5c2d2453c7a913df737ee04 plymouth-theme-spinfinity-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 4410d6b71b994f022cc0f7799e22b319789c724918d1a7de4eb26c0b857ff336 plymouth-theme-spinner-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm a3ba2794c84a6be4e6dfd2f4f19798331e4dd3b9b1c82401280b4c38babd350a RLBA-2022:2604 new packages: libxslt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxslt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxslt-1.1.34-9.el9.i686.rpm a5db9d7a0a47d8089ba2e0a3b77503fd671205e1de43d9101f11f72a7a548a6d libxslt-1.1.34-9.el9.x86_64.rpm 0127ecfbfb6b1f3bafccb4057e882b9f5f39123fdb55d33e64a5f0fb943810d6 libxslt-devel-1.1.34-9.el9.i686.rpm e515a2b825e91144ddeba22f857312b0e76ad7bd75fd06391c90f39eaa53c433 libxslt-devel-1.1.34-9.el9.x86_64.rpm adf4aa40236c34a439ccd85d66b2ce9b00dfd066300a138e426dcc8d59aa0795 RLBA-2022:2605 new packages: m4 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for m4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms m4-1.4.19-1.el9.x86_64.rpm 6cc4fdba2bd8de8300ac0ed0917598fe178f56e7a26b05b8ee5a26b7e5e7a860 RLBA-2022:2606 new packages: python-rpm-generators Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rpm-generators-12-8.el9.noarch.rpm 0cfa5a242e5b68eb6efee236b3569e76c61287d76ac36f495eb08fef9800528f RLBA-2022:2607 new packages: gegl04 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gegl04. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gegl04-0.4.34-1.el9.i686.rpm d4d2f6b32f0b603a8fb0bb9863fdd15986dffe6d571f7fddbdd1889c6e8444db gegl04-0.4.34-1.el9.x86_64.rpm f82f5fac1c1f0833648a03ee2e1e017a742e226ef08f7781b97e08df2427c0d6 gegl04-devel-docs-0.4.34-1.el9.x86_64.rpm caa1a7534d4eb7d0287b210582b008a79fdd31fcac40a44671c7824daf1d0092 gegl04-tools-0.4.34-1.el9.x86_64.rpm 4cde242dde4c14f647b68a78aafbc31137c3a74991cd1eeafd636fca544d0953 RLBA-2022:2608 new packages: gtk3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk3-3.24.31-2.el9.i686.rpm 5c8523beaaed9688950fc210e62a010f703df18310d3af6964181390792f7af9 gtk3-3.24.31-2.el9.x86_64.rpm 93e0f50705292497b818bb5f49939e5f14565130ccbf4268f68f3b6980f6b976 gtk3-devel-3.24.31-2.el9.i686.rpm 987ea7c3ecf3a3f6140b6f00361dc6deea407f1c427227579c4bc04532d8846d gtk3-devel-3.24.31-2.el9.x86_64.rpm 131f36505eae9d1aa1e192cf80505b9268d0fe40ff262353eaf08d816aa07c65 gtk3-immodule-xim-3.24.31-2.el9.x86_64.rpm 202312c784b3fbd7f296af76f29d761067e9499fcf33bdcddd95af153d01aef3 gtk-update-icon-cache-3.24.31-2.el9.x86_64.rpm 4be87b4d18af9db3941f10257790a763cf6be8238d100eaba7590b530931d640 RLBA-2022:2609 new packages: ps_mem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ps_mem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ps_mem-3.6-16.el9.noarch.rpm 705f3d49c2cdf0bb8d9b1735956a00f1330e0e6c7fdc4222fa1ca5a708845780 RLBA-2022:2611 new packages: libwacom Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwacom-1.12.1-2.el9.i686.rpm 3c356caaefae99a28ef2ac0d9a7aaef52dbe398ae79a0a4ae645b9e2aa55eaf4 libwacom-1.12.1-2.el9.x86_64.rpm 60d405a6a845c91e1c7e0b0ba4855f039a3b2b6e57a0371e76d6407e9fd890af libwacom-data-1.12.1-2.el9.noarch.rpm 7b674d89e0eeaf2c1e28fa58ec7d9a5e3ac085c97ac70d36c01a9a4efb6bbf60 RLBA-2022:2614 new packages: clutter-gtk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clutter-gtk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clutter-gtk-1.8.4-13.el9.i686.rpm f374aa9f68ccf7e2f433f703b89966c4f9fac191ae125aa4443f144ae8ae95c7 clutter-gtk-1.8.4-13.el9.x86_64.rpm 499f337a616734ae28a9a854bc035be3631d004e5770c4dbba5e43033ca90396 RLBA-2022:2616 new packages: gsl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gsl-2.6-7.el9.i686.rpm 89a3f11169512610c938e5f0ba3e6d60e8387674b844d3cf463ee924eefa7e6b gsl-2.6-7.el9.x86_64.rpm 6ad7c0869388e9fa92edb51cf895cffdda934117bb65031d182f782020281aa5 RLBA-2022:2617 new packages: clutter Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clutter-1.26.4-7.el9.i686.rpm 7385b695d3bdca3aa5202d99b3ebc911716d0e918f1c64fe0e54c66ab99ae410 clutter-1.26.4-7.el9.x86_64.rpm 8103be0ca89ae9ca5b42e49cc24e8b8be3f1d0a78b8e124f0f983cb329eae44a RLBA-2022:2618 new packages: mariadb-java-client Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mariadb-java-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mariadb-java-client-3.0.3-1.el9.noarch.rpm 455b468597daf38912a6df0a9de83a5939593f3f9d3f2c2fcb2113a6bca83b42 RLBA-2022:2620 new packages: librdkafka Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librdkafka. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librdkafka-1.6.1-102.el9.i686.rpm 3467bf92cbfca59511a78f68d7c259e1185f1de31945d81f3a6d6c9e3ffde92d librdkafka-1.6.1-102.el9.x86_64.rpm 10fbf5baefe4958673bbf7cd4f91945ea4fca115a184b7012161edb10af8fd61 RLBA-2022:2623 new packages: python-cffi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-cffi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cffi-1.14.5-5.el9.x86_64.rpm acacc0db828d1c799ce2eb01b83f2799627976c40d2ba803f4a84fb4a8bfef84 RLBA-2022:2624 new packages: freeipmi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeipmi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeipmi-1.6.9-1.el9.x86_64.rpm 9ac36fa6cf7185ca85b45645ed841a64252047bdfcca502561ffdd40a5a2d8eb freeipmi-bmc-watchdog-1.6.9-1.el9.x86_64.rpm 02d8d90ae839d968ae0908576d200340373b258c3955ddaa5301eb7193b378ca freeipmi-ipmidetectd-1.6.9-1.el9.x86_64.rpm 6a4157ee20f5218a3146cbbd15a55dd4aeb391a4ac6ee56de9bc1ab1524edc53 freeipmi-ipmiseld-1.6.9-1.el9.x86_64.rpm a086017d77150d4bc0fb78653ff651ecb27b2e95be8bed7d64c91134068b444f RLBA-2022:2625 new packages: ipmitool Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipmitool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bmc-snmp-proxy-1.8.18-25.el9.noarch.rpm fa3e5c3e8a69d6f3d01886923818eb4c150aecebf5f44943ae4a61add8d4af43 exchange-bmc-os-info-1.8.18-25.el9.noarch.rpm 3229d11156343ab7aca8103e8b73ecbda1ba5c8f5da2593dfb6ead7d83ffe1fc ipmievd-1.8.18-25.el9.x86_64.rpm c3dc44a53e1a1553885e85a16f30771fbb2ba9a8b2e70eb9db20687b8fc76493 ipmitool-1.8.18-25.el9.x86_64.rpm 7772feb2165d59ac339b9a4f65a0c58a61b3fe4d8a6d1c616e76cd2c4d0c9c44 RLBA-2022:2626 new packages: xterm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xterm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xterm-366-8.el9.x86_64.rpm 752a66e66837c536800810d245cdf2ef74a287fb98ed53e993635c6c788e562f xterm-resize-366-8.el9.x86_64.rpm 47a505aa55a2e9eaeb4fa24327044c80a9cd24aec2c87a8fb2bc1e6a34feb014 RLBA-2022:2627 new packages: ibus-table-chinese Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-table-chinese. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-table-chinese-1.8.3-10.el9.noarch.rpm a65d68f0135625f83ab23f896aaa88b449be009eada562b5356b5ed0b7f03982 ibus-table-chinese-array-1.8.3-10.el9.noarch.rpm d29bee74ef836fa547a4fb52606760fb3906a855f65291f796fe82aa04f65226 ibus-table-chinese-cangjie-1.8.3-10.el9.noarch.rpm 258c81ed4178ac52675ef692b00ffeca159db6c294d8f554a02f6ce8d62cbfb9 ibus-table-chinese-cantonese-1.8.3-10.el9.noarch.rpm 07d34a2d1cb4a35774e7db61e8ee72451c2c0954e1c92dbd40d1010f4802cb82 ibus-table-chinese-easy-1.8.3-10.el9.noarch.rpm 1fad6ccf75b5f0dfaacf9879342a676136acb525bb772886e589b901608f6062 ibus-table-chinese-erbi-1.8.3-10.el9.noarch.rpm 324940da5636347c6e116f8b7201203ee5dd023ca2d21d51de35c9b1c25b91bd ibus-table-chinese-quick-1.8.3-10.el9.noarch.rpm 7ae64f3fa83f1bd696ca42989f4d2ec87104e4d8a28f4a0c3c7801f101df0bc4 ibus-table-chinese-scj-1.8.3-10.el9.noarch.rpm 3f33a6de68305ec3e987ec7882a49a669e9882baac5e286829c251b28db193a9 ibus-table-chinese-stroke5-1.8.3-10.el9.noarch.rpm 44d54a48bccf0848d72e21aea4d6ff3a50b844f055b74b2c131c614216ae235f ibus-table-chinese-wu-1.8.3-10.el9.noarch.rpm 636186dc35f0c4682b50d3274d9f03619754ff5715f6f870aa519f6cfaa8365b ibus-table-chinese-wubi-haifeng-1.8.3-10.el9.noarch.rpm d9170f96e94adece7c97300e2f5c695f6e66f3410ce5a39a24f44318c4e1b7b5 ibus-table-chinese-wubi-jidian-1.8.3-10.el9.noarch.rpm 2440c7fc3e4b50d9125546af4ddc69c3377a11fb17ba9e5fb38f34a19fc18ab0 ibus-table-chinese-yong-1.8.3-10.el9.noarch.rpm 600477f4796899a827c5207755df9e375d809c3bf443514da356194ec8ee3f6c RLBA-2022:2628 new packages: perl-CPAN Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-2.29-2.el9.noarch.rpm 0154c44a893525c8e2d0943ee129f3b6a1abbfaf31677b756d7be0bd1dea0016 RLBA-2022:2629 new packages: xorg-x11-drv-evdev Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-evdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-evdev-2.10.6-12.el9.x86_64.rpm 0d069fc6f457d3ae13c3930845c3cfd10b719de03ceabecbe04498bd60ce24c7 RLBA-2022:2631 new packages: libburn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cdrskin-1.5.4-4.el9.x86_64.rpm 864312cf79bb2ca5f7b8e61cf100c9d9a8ea82b57aa3d5270de47b504e6a65cb libburn-1.5.4-4.el9.i686.rpm 242e6a78e9e854e9343512d6c63bf385f06678770f431ea006a1a170f91bac69 libburn-1.5.4-4.el9.x86_64.rpm 9e09c60e46163d003b03f397578ebbb0a43d4e372e426df617ff9eb71ea7336c libburn-doc-1.5.4-4.el9.noarch.rpm f69119c079ee8482dbbf70590080437b9c1bb9f42b584061c2c4d0fb87b1a625 RLBA-2022:2632 new packages: libslirp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libslirp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libslirp-4.4.0-7.el9.i686.rpm 4ea8040d110efcf2c2026862525ce29d33828fe308b1c0b9f74330feae27c32a libslirp-4.4.0-7.el9.x86_64.rpm 9e139bea16fc979b10db9af8c6f29cd205f50450d09db2a1dd6744512193a4ae RLBA-2022:2636 new packages: libisoburn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libisoburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libisoburn-1.5.4-4.el9.i686.rpm cb87162006bd27c1dcf4787287a5d6a8780f78f62187214fdb44e6939f6f61ab libisoburn-1.5.4-4.el9.x86_64.rpm 4f9ec7761f21fc7aba9c684e1b8a8bee935fc1c3b0aed21928de898360ce0705 libisoburn-doc-1.5.4-4.el9.noarch.rpm 337df7150e276ff90caf232869662b5ffe137f8aa639b114dd64a9cf9d77c507 xorriso-1.5.4-4.el9.x86_64.rpm 39a01394ae4e16a5a469881e5f4febf78a9811afdd95f4ca03b2a104958ad85d RLBA-2022:2638 new packages: bacula Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bacula. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bacula-client-11.0.1-5.el9.x86_64.rpm 0fa3abc0c689d766467121ea71c833b1f03536806cb776763bed62591b4f19f6 bacula-common-11.0.1-5.el9.x86_64.rpm 991659744ec8da5f4b3a5f2ce8c578b299e669a2e254bfee6f106761a22ba99c bacula-console-11.0.1-5.el9.x86_64.rpm f843450b820e3424ade117b46b4ac0681ef930e0ed9b477c35d9edcc9b3dfe7a bacula-director-11.0.1-5.el9.x86_64.rpm 80ca9d0f90dd4d88140522c1bb03f648f0517ab417dc8221de4130248ebe0839 bacula-libs-11.0.1-5.el9.x86_64.rpm 89b9674fc054a135e11b48da5dc0fa4ce6defa6ce264121ada634de5dc58286f bacula-libs-sql-11.0.1-5.el9.x86_64.rpm f7e9fa77342ea78fdcef4b532728e0f1a172270949671141734afabb71675a10 bacula-logwatch-11.0.1-5.el9.noarch.rpm 3c881a83280c8a82a631d46a7848b22b60f30dfa4ad1cc467d2756f7e4ef6075 bacula-storage-11.0.1-5.el9.x86_64.rpm b3d43e82a6b27a6568df5ca9018556f6a8d7887931dca1bfcb3261ba26e39f46 RLBA-2022:2639 new packages: python-packaging Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-packaging-20.9-5.el9.noarch.rpm b532d7fbe4a6adbd7b1587d12d7b1e986a49bec02211768889f21e83a8e18674 RLBA-2022:2640 new packages: python-pycparser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pycparser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pycparser-2.20-6.el9.noarch.rpm 00fdae103ab01bb3fe514ae1599920153f4a9f304c194daf3991f68d48ae7eec RLBA-2022:2642 new packages: tinycdb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tinycdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tinycdb-0.78-18.el9.i686.rpm c1ef91199807f82745ef0027a3921e260cf69d9e3d43f5c42593b5aa262f802c tinycdb-0.78-18.el9.x86_64.rpm 008abd579e52e8c38a4565332db611ef1e4bdfafd5a45ee48d28b907dcc703d9 RLBA-2022:2643 new packages: python-toml Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-toml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-toml-0.10.2-6.el9.noarch.rpm 3256db4571395f5fa69ace9bf280b624fadcb4054a7c5a7536be24a2bc91cbcc RLBA-2022:2644 new packages: libisofs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libisofs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libisofs-1.5.4-4.el9.i686.rpm 6522f79975a7e4cb26cd2b9d75993a5a48255cf5743398a32795f3b97ef9fb85 libisofs-1.5.4-4.el9.x86_64.rpm 725117022cf12d2d090cbaafa47e1402b3f43b699e6ab87ed4e9c890e09dc86d libisofs-doc-1.5.4-4.el9.noarch.rpm 7d0ca0766359a3e3c8dc221bbdb8075ca73e667acaef61e066d7db0a1f92a782 RLBA-2022:2646 new packages: python-psycopg2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-psycopg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-psycopg2-2.8.6-6.el9.x86_64.rpm cff5bae0b0d5f8dea4cf1b3c496b223c5cfc3fdebd0317ce8a13d26940f59a16 RLBA-2022:2648 new packages: libmng Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmng-2.0.3-17.el9.i686.rpm 2611115d93e775a5930ebd904dd730e31cbe28b4d098fad42ca99043846c0ff9 libmng-2.0.3-17.el9.x86_64.rpm 1c88d1fecb1dd89a328666336e309ed0e804228db2fb74107792bbaf3da745c9 RLBA-2022:2649 new packages: tog-pegasus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tog-pegasus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tog-pegasus-2.14.1-64.el9.x86_64.rpm 1b703490768c8d00ed91f0a759efb50ae6e0956b45f2719bed0ec6985302edc1 tog-pegasus-libs-2.14.1-64.el9.i686.rpm 4f4f9d2cc30c2ac1139f65802f94178c606a91629d3500bca48570fff7d52941 tog-pegasus-libs-2.14.1-64.el9.x86_64.rpm c2535c5705b2c81ef78d58ced6b5f94e12c380728e59babe38d26c80944c9755 RLBA-2022:2650 new packages: lua-posix Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lua-posix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lua-posix-35.0-8.el9.x86_64.rpm 9cd617ef1552226282137887520254fcfb96340ce5b7c1b4725fa6f70d415285 RLBA-2022:2655 new packages: sblim-sfcb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-sfcb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-sfcb-1.4.9-25.el9.x86_64.rpm d5a8864e80c863f72ebb435a46ecefba6914e288759ae656fc6e1900d5fc75db RLBA-2022:2657 new packages: python-ply Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ply. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-ply-3.11-14.el9.noarch.rpm 668d21e24211e4080c65b67f184afe59dd22b98814d11583c65bbb2897516b7a RLBA-2022:2658 new packages: numpy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-numpy-1.20.1-5.el9.x86_64.rpm 634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm 939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6 RLBA-2022:2659 new packages: fio Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fio-3.27-7.el9.x86_64.rpm 857aa63abe2da0fad40d53fcf47b8882489d21c98d802efec1477c30ca010298 fio-engine-dev-dax-3.27-7.el9.x86_64.rpm 56a06543591a112c038684dab3092af15298f4f06895139fda30dbf7d42578b5 fio-engine-http-3.27-7.el9.x86_64.rpm 2021b900bdb515e9d1c7134678dae87f65210d090cd1e8d50b9980bf338a633a fio-engine-libaio-3.27-7.el9.x86_64.rpm db94c1f50fc2823ec254ef0742458e96f8780105e9c71429f543adc998786f5d fio-engine-libpmem-3.27-7.el9.x86_64.rpm 194d011d90a18e1249e7ae97c04c3f93e01c293c6e034a1899c7d37462e54dae fio-engine-nbd-3.27-7.el9.x86_64.rpm 99e1dec81f9f794dc3b348300f2563798e2061237067bb6fa80fcc3bfebbbf29 fio-engine-pmemblk-3.27-7.el9.x86_64.rpm b312a069beda94d481e7c251a91c4c786a28cb1490d4f6855c294a08f43be7b7 fio-engine-rados-3.27-7.el9.x86_64.rpm d92834a0e6f7b7584e10cf971198414139d285c757c8d7e601d53a47dccf13f4 fio-engine-rbd-3.27-7.el9.x86_64.rpm ba3e345ae89340f6074b0dbc0aebaf31a236a04f6752c2ba2127f27032448ed0 fio-engine-rdma-3.27-7.el9.x86_64.rpm 9320c89427683b1a56b70510c6a83e5414290d63210a8cc5d491ec510b384eb1 RLBA-2022:2660 new packages: disruptor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for disruptor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms disruptor-3.4.4-2.el9.noarch.rpm e039c6a3c42bad8931b5e8d122389effd25bb1b413d3aacbff011d7f1deb2d26 RLBA-2022:2661 new packages: jctools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jctools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jctools-3.3.0-3.el9.noarch.rpm 4fdae1657a770b34b120784f56a7486f623a99705cdcf0b29e7005a7ae44d542 RLBA-2022:2662 new packages: python-PyMySQL Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-PyMySQL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-PyMySQL-0.10.1-6.el9.noarch.rpm 04765e503f47476a6fd4dd880cec4261e13ffbcdf1d09c762f3eef21a62da74c RLBA-2022:2663 new packages: plotnetcfg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plotnetcfg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plotnetcfg-0.4.1-18.el9.x86_64.rpm ab5c886f643c24f90077400fa5e9f8bb4c7ab0657c6fe19a09cd27efd9753359 RLBA-2022:2664 new packages: scipy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scipy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-scipy-1.6.2-8.el9.x86_64.rpm 1103fbcc787606536866b7cffa5d11b2ad54ffd11909b68af51152508a24f5af RLEA-2022:2666 new packages: mypaint-brushes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mypaint-brushes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mypaint-brushes-1.3.1-6.el9.noarch.rpm 4a7e96357c07e5d64d00af31685a9f86bfa2c1c73a062194b7428255b0ce7dc4 RLBA-2022:2668 new packages: gnome-shell-extension-background-logo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell-extension-background-logo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-shell-extension-background-logo-40.0~rc-4.el9.noarch.rpm e30bbb75b4e2a9452ae521abc4c324eb10e55199aeb3686f383dae838b185c70 RLBA-2022:2669 new packages: python-attrs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-attrs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-attrs-20.3.0-7.el9.noarch.rpm 26083f3193386d6e1cb3beaa863482642b0193e2a87bed2f6652169f347689d3 RLBA-2022:2670 new packages: cairo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cairo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cairo-1.17.4-7.el9.i686.rpm 2a980f4d03d5a363f76f7862f44c97012b12d946760cf435a18495947a3e9e49 cairo-1.17.4-7.el9.x86_64.rpm 9ea8622b018a10ce3d932e1675f0785138971b6564ddb721511f1aaaaf6489d7 cairo-devel-1.17.4-7.el9.i686.rpm 40ecd612d83bc558617c58305e9f576d56ac8740c08de799090e53161ebe5e06 cairo-devel-1.17.4-7.el9.x86_64.rpm 53cd0368605ed546b5b60db46f2ce4788578a3c00e2a2490f36d62655733411e cairo-gobject-1.17.4-7.el9.i686.rpm b255bebc224e792afad348f4d257c205a205664fb71ea7f6c1fbd3d5989a455b cairo-gobject-1.17.4-7.el9.x86_64.rpm 3f7fa4c94811af3f3ffe49dc0683baee19eeead684f6cab809cd115a89da5982 cairo-gobject-devel-1.17.4-7.el9.i686.rpm 4afe98e2f6ffcbe0bba504c978fc45342dea1639cba2b6e12589ebd39722ea94 cairo-gobject-devel-1.17.4-7.el9.x86_64.rpm c88a6f00db33fd6d07604f4786502f59c694ba001c872f833fe35e025e7ee5b9 RLBA-2022:2673 new packages: varnish-modules Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish-modules. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-modules-0.18.0-1.el9.x86_64.rpm 15cc227d17bbb7938fb8e7608e309ce6d38e530776d079f05204f18da8ebcf38 RLBA-2022:2675 new packages: xorg-x11-drv-v4l Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-v4l. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-v4l-0.3.0-10.el9.x86_64.rpm dea6e59dc9ab95bff0bd4958852d8a8d2ff038beb33d4ba8745cbef4b15773a3 RLBA-2022:2676 new packages: protobuf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for protobuf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-3.14.0-9.el9.i686.rpm 0585098bfc29b493c94c5b8a89ac6aeb807827cc07cf1a4d6447145e8913b90b protobuf-3.14.0-9.el9.x86_64.rpm 9b275a54e71b490da335b8b3092ff1137056768cfaeeb014a6b10733f13f8aeb protobuf-lite-3.14.0-9.el9.i686.rpm 01cbb259b9ebf25b2b37695d0b4a3c5554dea114ef53896567b7b49c13f5099f protobuf-lite-3.14.0-9.el9.x86_64.rpm c9a8a6814b1b3ce6115e6c93798de90cde692139e5440a996329ee9c5d55ec4b python3-protobuf-3.14.0-9.el9.noarch.rpm 4f5a870ac52b5f0cacfa0bdd291998e3e9309a5c044151eaa9edea7adab71e59 RLBA-2022:2678 new packages: xorg-x11-drv-dummy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-dummy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-dummy-0.3.7-17.el9.x86_64.rpm 9344619db03c82ece7fd269fe344cca85e2a1ca252b6a73f558e935e49f3c0e5 RLBA-2022:2679 new packages: xorg-x11-drv-fbdev Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-fbdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-fbdev-0.5.0-11.el9.x86_64.rpm 994c0c700a566e95a02ae039f7b27c5ac87dfbef5e5df37f1e1bf2773a166be6 RLBA-2022:2680 new packages: xorg-x11-drv-vmware Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-vmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-vmware-13.2.1-18.el9.x86_64.rpm 404edc6f2ec6df2a7617bbd88426f48667d491dfc5f44b1330f627af8c000414 RLBA-2022:2681 new packages: zziplib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zziplib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zziplib-0.13.71-9.el9.i686.rpm 9ab7a8be4608f6b4982a8874f58677beaec8a28ed6c3f85e22d4078d8230835d zziplib-0.13.71-9.el9.x86_64.rpm 3f8f9fb3ba71e761f50e96baccbe839b377c05d9f6e390ddb65f5cb6c52f0265 zziplib-utils-0.13.71-9.el9.x86_64.rpm f3734d71b45db8836784f81d4d7cf4ca91b871196de58590cc72afcb31e96109 RLBA-2022:2684 new packages: flexiblas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flexiblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flexiblas-3.0.4-8.el9.i686.rpm f336e1a423300a77afb38c3a626c8e476fe7b1e535efa7e5357bb430305434d6 flexiblas-3.0.4-8.el9.x86_64.rpm 297fc04bbc8d672d056339f8d7b46812877cf2472f144b6045861701a4a57afc flexiblas-netlib-3.0.4-8.el9.i686.rpm daf8edcd71de545ad8feb844dcbb1aa2a64c7dfd45e27617cbe1fe6922fc20b4 flexiblas-netlib-3.0.4-8.el9.x86_64.rpm d1aa224e759b5f752c2cfe7bce002f3a3ea184d175296b6cc749db2ad302b253 flexiblas-openblas-openmp-3.0.4-8.el9.i686.rpm dc1921db8c601f4fe01f341017aee3c1ffbb3b5025b54e218741d3c2c3674d02 flexiblas-openblas-openmp-3.0.4-8.el9.x86_64.rpm a6d92eff898f6e8d7162a52e52d1b554cb0d9785d6ee1e83c9418060c97c3df3 RLBA-2022:2685 new packages: suitesparse Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for suitesparse. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms suitesparse-5.4.0-10.el9.i686.rpm 3d588e17a43321e1203efa3064ba5d987d615e0cabb764bf00eff3a1dee683dc suitesparse-5.4.0-10.el9.x86_64.rpm 88b14a30958a781f6cb2e37cd2e37c8f70c5fef52d9481bb5d1cca95df9bd71d RLBA-2022:2686 new packages: uuid Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for uuid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms uuid-1.6.2-55.el9.i686.rpm 7d776a0ab76bb28cd7124a2ebee07eeb28639e95b95e28c5fd57f1c4d3071dd7 uuid-1.6.2-55.el9.x86_64.rpm 7fb172ed1e52daa4e13c9fc20600c3acc0588dd56e0b00c228ab8d38051f1ef3 uuid-c++-1.6.2-55.el9.i686.rpm efbc685b44ef484856cf184d529fa9b140c407fcb36246b2b73dfa7bdbbdd05d uuid-c++-1.6.2-55.el9.x86_64.rpm 7b0ad4180ccd5175e533d0762c58547d6a740a1d28fe3c531d833526843d63fa uuid-dce-1.6.2-55.el9.i686.rpm fa16c9a63e4793307c5c9d69ae495b037f4a882bd24dda8cdd1537c5db2df891 uuid-dce-1.6.2-55.el9.x86_64.rpm c177b0711108792ab0a43af26c37829ce78b19e6db0accaef2d4c71a1ab416ba RLBA-2022:2687 new packages: xorg-x11-drv-wacom Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-wacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-wacom-1.0.0-1.el9.x86_64.rpm bbece39942bcdacf9a7ca991333a4984a50e718a4334a41637a10649ff7273e3 xorg-x11-drv-wacom-serial-support-1.0.0-1.el9.x86_64.rpm 573678790ccc3929cf3c65356d75ec3bab380eab5c58bb438d8a3d60cb9b51a8 RLBA-2022:2688 new packages: openblas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openblas-0.3.15-3.el9.x86_64.rpm 47461d2fa724b1437330f2fb5cc45073a4c3f598d02880af488ed6e8199c2bdb openblas-openmp-0.3.15-3.el9.i686.rpm 3e98a4008a4c5c7f43940cabd9ed43469c563fd2274b9c805b256570d5b80f9a openblas-openmp-0.3.15-3.el9.x86_64.rpm 9fb2ca11be237ff5e3aa5ebcf1466ca5c10389c4a94dd35b01a8ac6a70d98a49 openblas-serial-0.3.15-3.el9.i686.rpm dd7a77530dd942f00efed08900d22a192ceabfaaba16176ce2a820e231e69a93 openblas-serial-0.3.15-3.el9.x86_64.rpm 774951fbb53756cc9e4d40a3a7cb34ca962ea4986bf8cf7deba3fdcb85703682 RLBA-2022:2690 new packages: gtk2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk2-2.24.33-7.el9.i686.rpm fef13bd3676631d3fe0151287a9d5ef0919e4f7021f1e40d9d5fdc8e04b645ab gtk2-2.24.33-7.el9.x86_64.rpm a5ff6d0a4ea4884492ee43ff851813c5193fac8bb9614fd03e3ccb6f4a0b218c gtk2-devel-2.24.33-7.el9.i686.rpm 17f22be6035c4cc3cd0608b40b2e51adf1f6e5f5e35967d61b349144840b27dd gtk2-devel-2.24.33-7.el9.x86_64.rpm 7204ab2db2e5bae2f15c40cabac32655feacb3e60228ba39346cdc69047c4d1e gtk2-devel-docs-2.24.33-7.el9.x86_64.rpm e9f9e832c10ab97f63acd590ab86e3f52492040a77e8f1cd85904ce92f1c2d0c gtk2-immodules-2.24.33-7.el9.i686.rpm 6fa9af22762f243f54736e73221ad7e06582d51ab35480a6dbf0f273c47cf886 gtk2-immodules-2.24.33-7.el9.x86_64.rpm 248dcf74777dd09228718ee69fad6f9e53e4f03741a98e6cb59488bc501da5b4 gtk2-immodule-xim-2.24.33-7.el9.i686.rpm c60aa6b938b01c3e73e226f681aae51814b181a94976ad4ce4144e7484b3fe3b gtk2-immodule-xim-2.24.33-7.el9.x86_64.rpm 3d436bcab671daac47b6e3140e19c4dc19f057299d2102fcd635adff36192c18 RLBA-2022:2694 new packages: sysstat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sysstat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sysstat-12.5.4-3.el9.x86_64.rpm cdf8e58038036a4c049075d2dc89e84379fdc7b3eaecb9df8dd65a7e8c7d55ff RLBA-2022:2695 new packages: libsndfile Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsndfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsndfile-1.0.31-7.el9.i686.rpm a9557dfcd6cf92348d40660d30b33e147463f19df3008b2278db48d25ffa79e1 libsndfile-1.0.31-7.el9.x86_64.rpm 5ea30db5acfda545cd737faba2198a359895727129ecba6a6cda1cbc5a7725da libsndfile-utils-1.0.31-7.el9.x86_64.rpm f29ff3b04a0e71df22c71fa31e38ecf3ef2a19e3a540172975f60ad12c4fb0f9 RLBA-2022:2696 new packages: weldr-client Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for weldr-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms weldr-client-35.5-2.el9.x86_64.rpm c45d57bd242d72287d967ddafa7d9032fcdc0edc85f84c5e06b230d3ea5bfd21 RLBA-2022:2698 new packages: butane Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for butane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms butane-0.13.1-1.el9.x86_64.rpm b8b27afaaf88085738ba5ab2198aa130de9c3d5b9016f664c9d07b650622f933 RLBA-2022:2701 new packages: rust-ssh-key-dir Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-ssh-key-dir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ssh-key-dir-0.1.3-2.el9.x86_64.rpm 21e8becf78429865faefecff1e0ff2dfc16c6a05789c61374af718ae7b0d1294 ssh-key-dir-0.1.3-2.el9_0.x86_64.rpm 32bf841a986c157d264cfef35f136a1507cae5b1f9ef98ae10b3e6215c9c7466 RLBA-2022:2705 new packages: Box2D Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for Box2D. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms Box2D-2.4.1-7.el9.i686.rpm 98fa11430a32180eabdc114015fe4d23c58307b2f89277d7f618b7a2d8680aff Box2D-2.4.1-7.el9.x86_64.rpm 20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567 RLBA-2022:2706 new packages: CUnit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for CUnit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms CUnit-2.1.3-25.el9.i686.rpm 2ebe084123d4aa2c6a4f58bdb6909ef4b0de3584cd28219e01cbc6924e0aae62 CUnit-2.1.3-25.el9.x86_64.rpm 793f55b77ddd5001e6a3cc03a7eb574ae50059cb1f99c0396fb31c91d67870bd RLBA-2022:2707 new packages: HdrHistogram_c Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for HdrHistogram_c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms HdrHistogram_c-0.11.0-6.el9.i686.rpm ac7c25f4a3a030b3e81c36c130312e6198708bd5889cca3afef774d8aeac409e HdrHistogram_c-0.11.0-6.el9.x86_64.rpm ef8389d7975655aed21532a2d8c2077dc406bd74289a3543eb75ebd62d973b4f RLBA-2022:2708 new packages: Judy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for Judy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms Judy-1.0.5-28.el9.i686.rpm 40ab0948fe2e2f86fef945716a95c1b34ffa57b67818db37e1244103bdac9ace Judy-1.0.5-28.el9.x86_64.rpm 4c0bd77f043014b45412d5536a33d370fb00b3a729edff70b0717dfed25fc2ca RLBA-2022:2709 new packages: NetworkManager-libreswan Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.14-1.el9.3.x86_64.rpm 47c47547035bca999e6708032737f4b6102a0c07ab6df79a95be0bb9831283ad NetworkManager-libreswan-gnome-1.2.14-1.el9.3.x86_64.rpm 697d1dab309b66468b78607688384b872fb598051c781d273a11b751a189702a RLBA-2022:2710 new packages: PackageKit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for PackageKit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms PackageKit-1.2.4-2.el9.x86_64.rpm 9439d096cda6783d255252f9ce40300dd325201e3f2ad0f97e609a39983a336a PackageKit-command-not-found-1.2.4-2.el9.x86_64.rpm f9a7bb3aff8f47f8026cb8c820f3df2230c51e52084deacadadd47f596553df4 PackageKit-glib-1.2.4-2.el9.i686.rpm 81bd6fdf75c9fd76bdf08a6e2cf8474bb79063a87dc9ccbe7c64aba2c5ca9f3e PackageKit-glib-1.2.4-2.el9.x86_64.rpm 617b3455a255169b99c525ed4907530d6bab052e88d337ffd6ce9d5534b7fd9c PackageKit-gstreamer-plugin-1.2.4-2.el9.x86_64.rpm 907e151fbd020e2339e6afc731c8f287898b3b53eb9dd64061500c2b783c967a PackageKit-gtk3-module-1.2.4-2.el9.x86_64.rpm 42cc8cf15e4ecdd43efb85b03dd75704b68e6aff5865aa38bd264a458d475199 RLBA-2022:2712 new packages: Xaw3d Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for Xaw3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms Xaw3d-1.6.3-7.el9.i686.rpm c946d10af6a5830b969f6ae935b636b0f106d179fff1fcfb777b6e8282e2e941 Xaw3d-1.6.3-7.el9.x86_64.rpm d413224e63d8185e43cc5809097442238174a8c11180b6a7176cadc0b895673a RLBA-2022:2713 new packages: a52dec Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for a52dec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms a52dec-0.7.4-42.el9.x86_64.rpm 84b6c7212fa2341c59a44952a29634b2549f007adc9a258771b15f834a3bbdcc liba52-0.7.4-42.el9.i686.rpm 4b577d1249eaa60effac276f94fe03204989c665c97833f8a5786f8b672502fe liba52-0.7.4-42.el9.x86_64.rpm 5d6de658fd3f6df004db282f83e5e8a5e16861971c62cef73df357fabc4bf28f RLBA-2022:2714 new packages: aajohan-comfortaa-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aajohan-comfortaa-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms aajohan-comfortaa-fonts-3.001-10.el9.noarch.rpm 92831bc2b516e0205a93040b899fdb15882ff7f7c908b239ccd7853f43eaabfd RLBA-2022:2715 new packages: abattis-cantarell-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for abattis-cantarell-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms abattis-cantarell-fonts-0.301-4.el9.noarch.rpm 18353db7e5a97b5ecb4d646394a5a93986fb7682bd90baafc7769be1e2175d6b RLBA-2022:2716 new packages: acpid Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for acpid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms acpid-2.0.32-6.el9.x86_64.rpm e450fab884c5db92d4fe42c61f4f6ca078a2e425a1a228259c9ff30502fc3663 RLBA-2022:2717 new packages: adobe-mappings-cmap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adobe-mappings-cmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adobe-mappings-cmap-20171205-12.el9.noarch.rpm 15b236b019ad562117fdb96405e51328dc83a5f09e942313c0867a13aa70f6ab adobe-mappings-cmap-deprecated-20171205-12.el9.noarch.rpm b8e6cce53070612a81458ecdaf1461ddee01fbbcde04feb31868b4096c11ac65 RLBA-2022:2718 new packages: adobe-mappings-pdf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adobe-mappings-pdf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adobe-mappings-pdf-20180407-10.el9.noarch.rpm 4db4ce331381545cf7af7a25e7031820483c51847bcaa7c99f8da45fce6d24ef RLBA-2022:2719 new packages: alsa-firmware Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-firmware-1.2.4-6.el9.noarch.rpm 3dda98070c296819261db7257d39fefd3d0293caa86af3c05ab530c2fd23c150 RLBA-2022:2721 new packages: alsa-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-tools-firmware-1.2.2-6.el9.x86_64.rpm 348d84384cd8e7dbb90f0725c017a87636b9c3559b16b37f39af948c48cbbcf4 RLBA-2022:2722 new packages: ant Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ant. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ant-1.10.9-7.el9.noarch.rpm 5dd82a5473e28d529a8e024f97172316293df4c6a1c1869c937a5292aaa8dbe8 ant-antlr-1.10.9-7.el9.noarch.rpm ce891388e9a881eee29fa94658980e0013e5f42ddc053b1e03f4165603a36582 ant-apache-bcel-1.10.9-7.el9.noarch.rpm 5e2f32d22f215e315f39668bbd0b1f695e58f0035e8d31a0d8cd52c301b7497c ant-apache-bsf-1.10.9-7.el9.noarch.rpm 7f2897d381309c6b008f6c34af14923110d8be5c85bc7c4397a2b2515e8906f9 ant-apache-oro-1.10.9-7.el9.noarch.rpm 5257ee162956358ff32dbd5b3a60fe7565512bd7d9e6d3c21d4a9386ac3039eb ant-apache-regexp-1.10.9-7.el9.noarch.rpm fed33d36d798aae884b36af109a0a7b331688c3dbb635dea72162aedb015f88d ant-apache-resolver-1.10.9-7.el9.noarch.rpm 5bb7ba30aaafa875f36179a3f9dec063a07e51f8a80bfda050d06cf12b8c29fd ant-apache-xalan2-1.10.9-7.el9.noarch.rpm d106e75933c0afbd6411b4bd44815b8b994f271bd411e4dc7626e23912772ead ant-commons-logging-1.10.9-7.el9.noarch.rpm a4c55a42c65f20bcf848f65195b80ce22839383b86394323bcef5a7bbc5ec9bc ant-commons-net-1.10.9-7.el9.noarch.rpm 3122d26c8967ba9ca689cb8cc62678f5e3c7f49220f0759415dda9976294441e ant-javamail-1.10.9-7.el9.noarch.rpm 2dd935ae72844e6485473c6dc08413225d8feec03a3fd803dfdfb023108e6710 ant-jdepend-1.10.9-7.el9.noarch.rpm 187e9172164bb6e65da61bb12e5e7c09af167d046523099d6c3c77722f30daef ant-jmf-1.10.9-7.el9.noarch.rpm 512cb607a1ba59c686132cba975af89ed80cbed860ece7d3f0485d6e5a6f5323 ant-jsch-1.10.9-7.el9.noarch.rpm cc6a0f89caf58bce281d5ee57acccc827aa9e54b7f9f124c8f92e9f0c8a093b4 ant-junit-1.10.9-7.el9.noarch.rpm 00005d6682fcec33368b40c79136be51cb7fb07811cd8a89dc542b8046f703b1 ant-junit5-1.10.9-7.el9.noarch.rpm 7c35b7ec77937fcd32499896663378f030f1c166f9fd917d70d21f9ca9f2af4a ant-lib-1.10.9-7.el9.noarch.rpm 29e8c79cbe0a1eca4757ce5874a6d5e1a96a908567c92c6882486d0af5d4000e ant-swing-1.10.9-7.el9.noarch.rpm b1d663c9043321e40fb912dd87ac3d83699bfe479f5a45b8b0c7ed612801bd62 ant-testutil-1.10.9-7.el9.noarch.rpm 0847f9bddb7026114f3c4dbe144de6d4f0234f68d3355767ec41583787be223f ant-xz-1.10.9-7.el9.noarch.rpm e88547e3ccde8c3d3a52c1d4d5275a1dfdcb2878e833185a2afdb4be6e437adf RLBA-2022:2724 new packages: antlr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for antlr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms antlr-tool-2.7.7-68.el9.noarch.rpm ee5331d966b70ce98f207f6ce35c0606bc1267c1336dab3a9835099c0d3851c9 RLBA-2022:2725 new packages: apache-commons-cli Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-cli-1.4-16.el9.noarch.rpm e4bced660157e7d0e00ab919c581c0027942f15da682b072cb273b4bf13e71c8 RLBA-2022:2726 new packages: apache-commons-codec Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-codec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-codec-1.15-6.el9.noarch.rpm b90a08c48f3a4fbd2818f5eac8c5d8c929f750c7cfc4ef9b4f05cbc99308f2d2 RLBA-2022:2727 new packages: apache-commons-io Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-io. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-io-2.8.0-7.el9.noarch.rpm d4b463881cdcf11c963a2554e9d7e61b942748d7b239b25597037a820dc36322 RLBA-2022:2728 new packages: apache-commons-lang3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-lang3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-lang3-3.12.0-5.el9.noarch.rpm 4a62f2bf3193773ea81bb59b1af12ba79c0e709cdf4db04213d3852914cea56b RLBA-2022:2729 new packages: apache-commons-logging Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-logging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-logging-1.2-29.el9.noarch.rpm d200953d49f68c73614e68207574dcaac866c0f86544dde92431695323b1cde8 RLBA-2022:2730 new packages: apache-commons-net Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-net. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-net-3.6-14.el9.noarch.rpm b03b7f1ba91383c647420193e5c30d1a5379c96d33e15cd80d319b71e571c4d7 RLBA-2022:2731 new packages: apr-util Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apr-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apr-util-1.6.1-20.el9.i686.rpm db39e48e07695bb1509dfecc43fd4050c86a8f9d1a02f2fcbf90e4d552cd0d77 apr-util-1.6.1-20.el9.x86_64.rpm 4df3aca6bee14682fbbd835dbaf77e11f6853e1a4a3c0ed61bd8ae8d7b58a233 apr-util-bdb-1.6.1-20.el9.i686.rpm ecc683ed3cd6d694f464f5ce31cb7e3eba10b5351b4dc1bac11049fc26540f39 apr-util-bdb-1.6.1-20.el9.x86_64.rpm 7a9f7b7d8012e2d5227edb90d7ffe3154039952680d6e6dff50117b5869e2763 apr-util-devel-1.6.1-20.el9.i686.rpm f963f7fa2a4598df9dbbe892c9a558bf5afe35491d85e448603dab2ed76846e1 apr-util-devel-1.6.1-20.el9.x86_64.rpm d5edb3c184182ea22e0b4d56e67083387e0c4b07f1f527efb53cdecd9e99567c apr-util-ldap-1.6.1-20.el9.x86_64.rpm 414345d067ebba19c20b7ed1e81b5c5cac1973b6fd4cc457e26118c9a991b1af apr-util-mysql-1.6.1-20.el9.x86_64.rpm 7b4b167157717d62ee175c17c986030451f4af7ed1a212dc7917067cce59b584 apr-util-odbc-1.6.1-20.el9.x86_64.rpm 7b6ee924b4baf61f5d7a1f0ca2914936b3227e60d9be0344690a27a810d4e51c apr-util-openssl-1.6.1-20.el9.x86_64.rpm 293cd825b42b9b69ade16c217162fc3c2a60718142e77a3cdac2d9a21233d696 apr-util-pgsql-1.6.1-20.el9.x86_64.rpm 0a943b5ac371dec132740cb408b03fbac00826a3ed375021f2925ccc483d12f7 apr-util-sqlite-1.6.1-20.el9.x86_64.rpm 2b9494fcb1df01da25dd538cbaac4d5f299b9175b3fe9460c1aa5b91fa723178 RLBA-2022:2732 new packages: asciidoc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for asciidoc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms asciidoc-9.1.0-3.el9.noarch.rpm 2e09e2b0c612860433104af56f9708b2732ae024d37f48386be76f1d66512816 RLBA-2022:2733 new packages: assertj-core Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for assertj-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms assertj-core-3.19.0-5.el9.noarch.rpm b0ecb801853f69851e15c77175df15a66090a114e187a626696aa4772832e920 RLBA-2022:2734 new packages: at-spi2-atk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for at-spi2-atk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms at-spi2-atk-2.38.0-4.el9.i686.rpm 3f822d11b011f1c904e79743e20ccabb7baf88943654ee3967d95c2380e704fc at-spi2-atk-2.38.0-4.el9.x86_64.rpm 1b12b3fae8815a0e310a4a9b5e9d2d68264e7d700e50a796078b389966f6c4b8 at-spi2-atk-devel-2.38.0-4.el9.i686.rpm f8155fa14b8178d18377a2d66a5790c2bfbef9cf15c368892f4bad5ef3828e00 at-spi2-atk-devel-2.38.0-4.el9.x86_64.rpm b52368b8e0e9288f41e38da8a61669758d37914a85240609398c764de5660125 RLBA-2022:2735 new packages: at-spi2-core Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for at-spi2-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms at-spi2-core-2.40.3-1.el9.i686.rpm c5befbf6f0306211c228fe795f6db2711b8cd2fdf4dc96a753e88d150738b0b3 at-spi2-core-2.40.3-1.el9.x86_64.rpm 0a3f8604b65c5eaf898777fe01c449a86c7dd55b09c94ee91b538149d89a543e at-spi2-core-devel-2.40.3-1.el9.i686.rpm e23ff22711e46bf790cd26139b6976945424281cba97eaa0f359237b3da2c9b7 at-spi2-core-devel-2.40.3-1.el9.x86_64.rpm 1aae527da23a433041fc48f1c947157aac468e84d9577045ccb2c6fd4ead4633 RLBA-2022:2736 new packages: atinject Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for atinject. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atinject-1.0.3-5.el9.noarch.rpm 6dedd2de396871c941848b4b20d03d421c1c96c22acb0e0ac640f4a15bce3b54 RLBA-2022:2737 new packages: atk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for atk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atk-2.36.0-5.el9.i686.rpm c63b6896943d7eccdaea252e4414f832e065a1c0e8cce49d2dc9e2fd9c226933 atk-2.36.0-5.el9.x86_64.rpm a6d2249e02a7e2b0a8e11963744b677de3573a6f127e788c677fcd7ddfd3d92c atk-devel-2.36.0-5.el9.i686.rpm 3e7e915488f53f146d83ebfc9895637275b32b44588487d6e5c2bc7ed396070a atk-devel-2.36.0-5.el9.x86_64.rpm 68c989df1861d3a5e54862413fe25d95be50cfa31189d05e7518ec4e4c08a93c RLBA-2022:2738 new packages: atkmm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for atkmm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atkmm-2.28.2-2.el9.i686.rpm a3283c8a9926f00c86218e7f3117bf7ae9075f60dcb4c6fb01d66ef9f0af3e04 atkmm-2.28.2-2.el9.x86_64.rpm 996adf691e2f558ee1915a6a801bbb8aa13192da905e3799f2489caa00de73a9 RLBA-2022:2739 new packages: autoconf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for autoconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autoconf-2.69-38.el9.noarch.rpm e470bf76ef876897ed2ce1ee703a4ef973a12fc51a27d33d545a63dbe704fa76 RLBA-2022:2740 new packages: autoconf-archive Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for autoconf-archive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autoconf-archive-2019.01.06-9.el9.noarch.rpm 9e922ad7ef8ff4809583ac89c6fb37e0b25f68f336f03bc3fd1850261922b5cd RLBA-2022:2741 new packages: automake Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for automake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms automake-1.16.2-6.el9.noarch.rpm bf4d3d82d35a393a8c9c087ffa6c47b2a5b7a6c284958b3847300dd080b2267c RLBA-2022:2742 new packages: babel Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for babel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms babel-2.9.1-2.el9.noarch.rpm f3accd9dddd30161650e9e28f99b7186e98801d90d58acc05615ffe30bc01b92 python3-babel-2.9.1-2.el9.noarch.rpm c55826bfc863379eb10d24d0c587c7e194af00d30a51f7968c52c229a66e4ac8 RLBA-2022:2745 new packages: baobab Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for baobab. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms baobab-40.0-3.el9.x86_64.rpm 87e2e00e6e93eb0622067741a6602b5aec3636497b96241dbd12a6e80db3172a RLBA-2022:2747 new packages: bison Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bison. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bison-3.7.4-5.el9.x86_64.rpm e8417ab812872ee138f8a74543964f3c06e6bcc12531aefd3fe0a3f2ffb96637 bison-runtime-3.7.4-5.el9.x86_64.rpm 7a9f7bec8b3b2ae7bb94bd3cf95f21ecb916ac57024ba0d9b843c05bd48d659f RLBA-2022:2748 new packages: bitmap-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bitmap-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad RLBA-2022:2749 new packages: blktrace Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for blktrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blktrace-1.2.0-19.el9.x86_64.rpm 2de11c2efdc662820a967b26c5b7e842f9cf9ab6702414e99f4a8d3d8ea580c9 iowatcher-1.2.0-19.el9.x86_64.rpm 2507b85e1d1b2bbb1e57b0d720395eea1ceab4cdfd27993446ba82b35d3e65e9 RLBA-2022:2750 new packages: bogofilter Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bogofilter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bogofilter-1.2.5-8.el9.x86_64.rpm ae16e0981b814e71fde10f570b23003ce42427ae7532539965aea074991c6388 RLBA-2022:2751 new packages: boom-boot Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.3-3.el9.noarch.rpm 4e377cd05de07063587ce5348ad804829f6994eca0e0ad24dd359662f86b8b8e boom-boot-conf-1.3-3.el9.noarch.rpm 69577d2692f75fb821ac342f7960293ad6570249a7c9608df9baff1f8e7083e5 boom-boot-grub2-1.3-3.el9.noarch.rpm b87cdfbcc5fe206e7018276fe3ec0f03ebb8ec4026834b445a2f4f3e7919a307 python3-boom-1.3-3.el9.noarch.rpm 8cbd7653ea62af9e4375a1968bea4d2b0a30ffc55b8c16c565c2258fa60190c5 RLBA-2022:2753 new packages: brltty Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for brltty. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms brlapi-0.8.2-4.el9.i686.rpm 4f58e4734101da0ec4a4a69d30556a08ca5d61d2e8dc031f6d4e6b9351f43db1 brlapi-0.8.2-4.el9.x86_64.rpm 2e1893c8d0320d9a7468b83cc004358dc21b3006333b204f22e89b23c396ee87 brltty-6.3-4.el9.x86_64.rpm c92737eb21fe4ef4ac3a934cfde2f972c0660fa457f381f66feaa7d894c06b8f brltty-at-spi2-6.3-4.el9.x86_64.rpm 803c487acac17226150166a33690a017402d207b813730610b1eee9403a8e5ba brltty-docs-6.3-4.el9.noarch.rpm bd3f6a056e9c6f2344f2e9da7a8af704742ce43246b95920b7a5d28c15dc29eb brltty-dracut-6.3-4.el9.x86_64.rpm 283ecca9cd5317079b6f7205b358fc22035692b383800cc33d70a054803e753c brltty-espeak-ng-6.3-4.el9.x86_64.rpm 4284e3168009e5620a55463081bf23bb65cca2a1a9969593be4ec5cf4c0da50d brltty-xw-6.3-4.el9.x86_64.rpm ecfaf4e783016f12e3a174926654172cbd103c88f1d3bb16e6c94239d5cb97ff python3-brlapi-0.8.2-4.el9.x86_64.rpm c8ae0204e61bb181d491a5e606f9b9fd3b3f34d4c16274983a9eeba3f7dd7e68 RLBA-2022:2754 new packages: bsf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bsf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bsf-2.4.0-43.el9.noarch.rpm b9f7e00bf8070255a3438cd9ce423a05056e884aa10486b7c705344c7692ae6e RLBA-2022:2755 new packages: byacc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byacc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms byacc-2.0.20210109-4.el9.x86_64.rpm 60eadd40d143f481682507bc0a31c9aca44e3c87939053b983932571b30d12b8 RLBA-2022:2756 new packages: byte-buddy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byte-buddy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms byte-buddy-1.10.20-5.el9.noarch.rpm 1f8f8d3fdf7fb9864ae4b7e1bb0ccef1b2d85f8406f29ee6e751305e5122e952 RLBA-2022:2757 new packages: byteman Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byteman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms byteman-4.0.16-2.el9.noarch.rpm 674e1bab462bf187003ce0796c5d9194eedabb42bcd90eb417da65c8b83fc2fd byteman-bmunit-4.0.16-2.el9.noarch.rpm 756ed9a5337fe28227f0a6dac11f3a592f4d2427797d45d126c6815a0c5be0e3 byteman-javadoc-4.0.16-2.el9.noarch.rpm afaf1b76f4ea594b6b196b918ffa3c7580abf5e143136d75ed51f3626b9c6250 RLBA-2022:2758 new packages: c2esp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for c2esp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms c2esp-2.7-24.el9.x86_64.rpm 8f2d7128704d404cc3d8223830bccc84fc4cf70b9227fa4e4b4d2bff272436f7 RLBA-2022:2759 new packages: cairomm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cairomm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cairomm-1.14.2-10.el9.i686.rpm e1a04d0a759d803f26e2c2c06cea3611b3da6760ed7abbe979bbf9528d4b7149 cairomm-1.14.2-10.el9.x86_64.rpm 74216e92ac5d1452d6d8fde90970c1769ebfebb0bfaf86610070221a008851b2 RLBA-2022:2760 new packages: cdi-api Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cdi-api. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cdi-api-2.0.2-5.el9.noarch.rpm 47c872a8badb47fd59604af059267200281f516d1a5e3c1ea0f31ee62e483e95 RLBA-2022:2761 new packages: ceph Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ceph. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librados2-16.2.4-5.el9.x86_64.rpm e59213c6429466f265fb8bc48811413c25d0766b86229a654ff874593f2bd66b librbd1-16.2.4-5.el9.x86_64.rpm ec4fe5aa004e38a1f162f3b5b0cd520766bfd3686064f4733bfe4c271e207902 RLBA-2022:2762 new packages: chan Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms chan-0.0.4-6.el9.i686.rpm 51d10380210c94afa8e1ae35bd1b3395783a1afc45505fddfee5e41a564709f7 chan-0.0.4-6.el9.x86_64.rpm 7fe938841d6ddb01c3437de71f55b1e700c42cafae857666184e007244ec9e5e RLBA-2022:2763 new packages: cheese Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cheese. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cheese-3.38.0-6.el9.x86_64.rpm 4f3d318b65fbeab7711191605495ca327930c80921c2271ca7ad604b67728acc cheese-libs-3.38.0-6.el9.i686.rpm fc54a5149a39b4aa8becbcd349add1b3a2450d1a27fd811319847f05a5abbbf6 cheese-libs-3.38.0-6.el9.x86_64.rpm fa0642643e7ccf6af406af7b966dc63ac723372b7ec9596a058802cce4afd141 RLBA-2022:2764 new packages: chrome-gnome-shell Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chrome-gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms chrome-gnome-shell-10.1-14.el9.x86_64.rpm 6dc5c5e9ac162ed887442252180b73e150747ec267dbf725d477e0198363112c RLBA-2022:2765 new packages: cim-schema Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cim-schema. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cim-schema-2.43.0-14.el9.noarch.rpm fcdc10383b4d308dcda9a61d3b6a45d8a63f2cf7abbec06ee1773d82eeea6cc0 RLBA-2022:2766 new packages: cjose Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cjose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cjose-0.6.1-12.el9.i686.rpm a2e35185bca9628a39aa2be64c5c557aa4b1cf3660ef0e3a2a68d52533b97582 cjose-0.6.1-12.el9.x86_64.rpm 33e80558b78a36a3b42ef08dd455ffcf53ae5651805849f63f4c9789b24bafe8 RLBA-2022:2767 new packages: cldr-emoji-annotation Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cldr-emoji-annotation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cldr-emoji-annotation-39-2.el9.noarch.rpm e1894ecbeeae87956621a41e53e866cb7e2e38fde92baa824b81d7a99e54f360 cldr-emoji-annotation-dtd-39-2.el9.noarch.rpm d17597c0b485a385e09cfa136c441cb19b3b11ba6b525f991c124f53ef18fc23 RLBA-2022:2768 new packages: cloud-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cloud-utils-growpart-0.31-10.el9.x86_64.rpm a87779012026b5a6875875690291b7c222b6c38e4f9e1a0a091ff207f061e907 RLBA-2022:2769 new packages: clucene Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clucene. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.i686.rpm 970e8147a2c48661553ab681a235dc8b1190cfd613938315dcdce7061cae1e12 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm 37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.i686.rpm 3653af34451e04e59e1557457b7f7086c2e9743b8c1aca4ba09de5ed0e7bf704 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c RLBA-2022:2772 new packages: cmake Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cmake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cmake-3.20.2-7.el9.x86_64.rpm 1a66674b62288319c001b776e9d899a99a7137ff2274c3a5a33f59d37af58771 cmake-data-3.20.2-7.el9.noarch.rpm 0ff25e58986c65b2d412516476ef690bd8d0285ac05b5ed0c1c1d9ade597a09d cmake-doc-3.20.2-7.el9.noarch.rpm a049cf081975f91a4175682e4586cab51ecd4daf5884a86956f36e07960fe209 cmake-filesystem-3.20.2-7.el9.i686.rpm f0c7140e1f4b6d0a99301ee55a0307bc8d278f91116c10154075be92c85552d8 cmake-filesystem-3.20.2-7.el9.x86_64.rpm 08777ad8dddfbd07fe838ed879eebffaa3d5d9daf381efaeae4514a496034e86 cmake-gui-3.20.2-7.el9.x86_64.rpm 91c78667cffb30ab94aaf450bba3a2d6ab91678202aefeddc23e77d00dab2feb cmake-rpm-macros-3.20.2-7.el9.noarch.rpm 46e1833802525aecdf3d4b3aba944e86beba8fdd0b5704dd2ed3f9fe23fb9133 RLBA-2022:2770 new packages: clutter-gst3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clutter-gst3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clutter-gst3-3.0.27-7.el9.i686.rpm 95c10e7aa0df49781d0cf4974b4212a7603e5db7727c7285b05a7e5f3db6eaea clutter-gst3-3.0.27-7.el9.x86_64.rpm 554022c3f21c07521446278aee967f203afcf49e660ce2eaac3751eea3625f5f RLBA-2022:2771 new packages: xmlrpc-c Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlrpc-c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xmlrpc-c-1.51.0-16.el9.i686.rpm 5a81a5c0e5d75cbb5ce0fe9dca46e9dee9f4caf1067e6780b315ec4a335bd13c xmlrpc-c-1.51.0-16.el9.x86_64.rpm 868d74bba6ca7ed13ab726f0896386c1b9686fa8cafc8efa2b933750be3bffac xmlrpc-c-client-1.51.0-16.el9.i686.rpm 7eab73cd2c6f4fa2b1bfaa79b6329f4bb1744ee845efcd72e6ccd10b1a8e9f04 xmlrpc-c-client-1.51.0-16.el9.x86_64.rpm ca2049bf5a67878490aa43cc1090edec7522e9c6edf3d369a99cd6a0b92b2eb6 RLBA-2022:2773 new packages: cogl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cogl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cogl-1.22.8-5.el9.i686.rpm 2534b8318ce9cf1ec3b6b042ef3d768f06bd5e94646ebe05c0c028ccf2ce5d91 cogl-1.22.8-5.el9.x86_64.rpm 947147d22024780ffeaf42960ccbcaa7874fd5b9235b3647d00d5d4224bdbda7 RLBA-2022:2774 new packages: color-filesystem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for color-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms color-filesystem-1-28.el9.noarch.rpm 83d1c78a4a69e98511c0a6e265bfece24eefeaddf24b3c0e159a5d8d83f65c5e RLBA-2022:2775 new packages: colord Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for colord. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms colord-1.4.5-4.el9.x86_64.rpm d7c5c64892db81088deea94b081cb75427dc2644c8b0667d97f099bd63af0dd0 colord-libs-1.4.5-4.el9.i686.rpm 8abbb5d71189e7e24cae54c7978aa736bdeaeff35305c30edbd101faf1c5c18d colord-libs-1.4.5-4.el9.x86_64.rpm 09c659915ffc516d047be14b1e4b57df743052a69f8430e2d2fc0f37d2660f97 RLBA-2022:2776 new packages: colord-gtk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for colord-gtk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms colord-gtk-0.2.0-7.el9.i686.rpm 1ac08299a4d797c479add475812d3a4a2d0902ffb1c474ef1e5dcfca2804ebe2 colord-gtk-0.2.0-7.el9.x86_64.rpm ae066554d51f28833860765c9985c3d86fb1ce903fb43a1950c152d6d5c3080f RLBA-2022:2778 new packages: console-setup Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for console-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms console-setup-1.200-4.el9.noarch.rpm d71ad7656545fb081782542f0a5b2e00e46928cd42b06f336674d459fb358b58 RLBA-2022:2779 new packages: convmv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for convmv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms convmv-2.05-11.el9.noarch.rpm d7121fe742d0f06597b3f4c3489e8c5ecee9789ec0caf5c240e3638889412f6b RLBA-2022:2780 new packages: copy-jdk-configs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for copy-jdk-configs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms copy-jdk-configs-4.0-3.el9.noarch.rpm 9c02c174900a75f569fc872b5edbe44a57efa1663e5255da56d184f753f14a85 RLBA-2022:2782 new packages: culmus-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for culmus-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms culmus-aharoni-clm-fonts-0.130-20.el9.noarch.rpm 9d9afb92b5b945c8c7da175f1f28ed8aaed0a9c285728ae70f2e29749746fe3e culmus-caladings-clm-fonts-0.130-20.el9.noarch.rpm 41f81f3abe9bfcea7ebffe5a74d18ce999acf6390e804acab3dd8e65e05752a7 culmus-david-clm-fonts-0.130-20.el9.noarch.rpm b130fccab53aab8af537bf7f85b6132f9a43be365ecb08abe28c0187b7125e18 culmus-drugulin-clm-fonts-0.130-20.el9.noarch.rpm 76593ff514f755db0da042adbe65b542b6673f725d183f8959dd6ab62a7d8f04 culmus-ellinia-clm-fonts-0.130-20.el9.noarch.rpm d97e54abd4ae1a3bec72fba9abd343de87bd86ce1c52bdee1a4a5fe85a6d9aae culmus-fonts-common-0.130-20.el9.noarch.rpm efe74c04e14ad32b34c39298a43d7f6a5529e63042ae7910070a5a2c85ae0187 culmus-frank-ruehl-clm-fonts-0.130-20.el9.noarch.rpm 0475c30eb17dce8a7419e1467e723094a8b791c0621e8a211c5826fc7202ffa2 culmus-hadasim-clm-fonts-0.130-20.el9.noarch.rpm e66dfe3e57c617e283cde75967871c5348229d51ecf72f36c1e29ed75f8d43d7 culmus-miriam-clm-fonts-0.130-20.el9.noarch.rpm 6d2f826ce8ccddbc3686b5d94052b5553a7639d3be7a637cf54185964d8e5ec3 culmus-miriam-mono-clm-fonts-0.130-20.el9.noarch.rpm ee634b8ca0e15423e41ace9664a52a8c5520549f19966c38bbacc9e6fb683cb2 culmus-nachlieli-clm-fonts-0.130-20.el9.noarch.rpm 0adad41f3cc1aa6e30b955a8518b7335fa1ec6934b05de7d6d66f22c8a5f95ea culmus-simple-clm-fonts-0.130-20.el9.noarch.rpm 5c6fe02cfb06c456e49bc5e72b48020b52cd8896eed1a384fa8659519184782d culmus-stamashkenaz-clm-fonts-0.130-20.el9.noarch.rpm 84591be035ba54339313fd44b2074474981d44fd34d2f3acb9a51ec19b810598 culmus-stamsefarad-clm-fonts-0.130-20.el9.noarch.rpm 463ba512a8d6a3363710c22945d20ba198b38681a63a83684b604673074fcdaf culmus-yehuda-clm-fonts-0.130-20.el9.noarch.rpm cb46c5dafa21ffdeb147fac155df69a9165ab4660178e56233e7e471e095d010 RLBA-2022:2785 new packages: dbus-glib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-0.110-13.el9.i686.rpm f9aa849366180eba292a8140215a4ff9b1e84e3f582ab8b84d70a528dad31fd4 dbus-glib-devel-0.110-13.el9.i686.rpm ccd4bf66b10b72f2720022147bc48a5ea5306fc1ba32d2bcdb2727edfc9dc1c0 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 RLBA-2022:2783 new packages: cups-filters Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-10.el9.x86_64.rpm 822a67d58c1fb35bea6f385daf76cf6a64588f316f681a46e6fc5711480f1567 cups-filters-libs-1.28.7-10.el9.i686.rpm 44660e330435eb3a969556c44daf710bf97e2d0ea30091643e708737d5e6d1b2 cups-filters-libs-1.28.7-10.el9.x86_64.rpm 41f1d3d844c6b480af9417bda4ecfb6c1eedd70d0f2faa66223b28723ca1f53a RLBA-2022:2784 new packages: cups-pk-helper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-pk-helper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-pk-helper-0.2.6-14.el9.x86_64.rpm 5711c16516695d77ae4267870d8774311ce65365fcc765679bdd81b6de977452 RLBA-2022:2788 new packages: dcraw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dcraw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dcraw-9.28.0-13.el9.x86_64.rpm 3945723f7d02c91aae93134e5aaa5aa294668dcc3d86db61fb6dfdbb8e5044eb RLBA-2022:2786 new packages: dconf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dconf-0.40.0-6.el9.i686.rpm f860c1fa4ff7178ab91831ebdd73fb6f64de1ad170d3f2162b5ae9c848a5ea83 dconf-0.40.0-6.el9.x86_64.rpm 094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f RLBA-2022:2787 new packages: dconf-editor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dconf-editor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dconf-editor-3.38.3-3.el9.x86_64.rpm 8edf61647d6a87000844bd8e0582b9c8a112acb81813893e79ee8f7160d31dd8 RLBA-2022:2789 new packages: debugedit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for debugedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms debugedit-5.0-3.el9.x86_64.rpm fbf01d928226d8b1e18edcf15ddc7520791661f637ac1a5db410e9a58517a12f RLBA-2022:2791 new packages: dialog Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dialog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dialog-1.3-32.20210117.el9.x86_64.rpm 4fdb03442000fedf51cba70f413a0b002c3e4ec72b306153f9c91b548e05ff1d RLBA-2022:2792 new packages: diffstat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for diffstat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms diffstat-1.64-6.el9.x86_64.rpm 2e3add93be2417a8f94e6763891b7807bb480da5041432ee8c36b20b08d9cb92 RLBA-2022:2793 new packages: docbook-dtds Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for docbook-dtds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms docbook-dtds-1.0-79.el9.noarch.rpm b8bdacafd4506c393438dda55fea36adb755d05fc35c99c839e641aef79c2414 RLBA-2022:2794 new packages: docbook-style-xsl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for docbook-style-xsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms docbook-style-xsl-1.79.2-16.el9.noarch.rpm ad433be83a77c2d83afceb7b21f012a4d34a965dc0a776ff49f396f787f18894 RLBA-2022:2795 new packages: docbook5-style-xsl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for docbook5-style-xsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms docbook5-style-xsl-1.79.2-13.el9.noarch.rpm 1a0b26de25a2b14cb4d4dc09f589848baab7145c1d5541572e3e719dd043fa5f docbook5-style-xsl-extensions-1.79.2-13.el9.noarch.rpm 7ae3e64d30b464dada89bc72c33b157d96057eb5415f3ab5e4c3774b9448e7ad RLBA-2022:2796 new packages: dotconf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dotconf-1.3-28.el9.i686.rpm 577963b3f5ffc5b96a7b0fe97f5262eba3c3d4ca6673b44d7c3f153f86f9f599 dotconf-1.3-28.el9.x86_64.rpm 38bd484ae88051ef3aea8738f0fe000ed6689a82626ab8b566e989112f7dadb6 RLBA-2022:2797 new packages: double-conversion Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for double-conversion. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms double-conversion-3.1.5-6.el9.i686.rpm 3f130dc129debba21a67aca0c5966c036f4a223d9e579a2bf49c7e7ca006b01e double-conversion-3.1.5-6.el9.x86_64.rpm 1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977 RLBA-2022:2798 new packages: driverctl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for driverctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms driverctl-0.111-2.el9.noarch.rpm e77dd4061be1384ba336ef3dd2ba144e51776fa8c2c47ca16fe41a7ddfee0d66 RLBA-2022:2799 new packages: dtc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dtc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dtc-1.6.0-7.el9.x86_64.rpm 55952eeccaec6ed26b033ceb1cfa678e20181ee3db74f147e23c4343989aa79b libfdt-1.6.0-7.el9.i686.rpm d4b7dcdf9bc5f77ae4398acbfb455bf4e860ff7da0632ca03f2b310c11c88962 libfdt-1.6.0-7.el9.x86_64.rpm f42aef8f779f79c3fdf5767a93e6949e77af7108e6afcd0da9a3dc8596a67366 RLBA-2022:2800 new packages: dwz Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dwz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dwz-0.14-3.el9.x86_64.rpm 4cf8e5643393772d34196405ee8843da1c00c156b3b1b76805c2e7f22a911d87 RLBA-2022:2801 new packages: emacs-auctex Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for emacs-auctex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms emacs-auctex-12.3-2.el9.noarch.rpm 86ab115b6c2fb8b35cd2706326da2a7574872c3b9b86c2e7b9e37f0838045836 tex-preview-12.3-2.el9.noarch.rpm c84194090a3c8bcff55bdc57aa2afd91f91c04d5b2844b28e33e7f987b133a98 RLBA-2022:2802 new packages: enchant Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for enchant. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms enchant-1.6.0-30.el9.i686.rpm 58f587b655325a44884be6182e1942abfd4b73b9089fbb52fd1d76dab25db171 enchant-1.6.0-30.el9.x86_64.rpm 9856037a6491beb254a0e3d460ff52c232cdaf205064cfd2d3871af683a3b009 RLBA-2022:2803 new packages: enchant2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for enchant2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms enchant2-2.2.15-6.el9.i686.rpm d65d036c48523257678eda1071cbfd79a827e15924cf8c295e3bc227d010c0d5 enchant2-2.2.15-6.el9.x86_64.rpm f0ac2534a1dd08b82840623a8472d5c88e12d830df402ba7300421667a1c4be9 RLBA-2022:2804 new packages: enscript Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for enscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms enscript-1.6.6-28.el9.x86_64.rpm cc7f6cb185faf4e77817c127f22181c1aa9990829635fde12a6c0be7f645214d RLBA-2022:2805 new packages: eog Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for eog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms eog-40.3-2.el9.x86_64.rpm 327a435f70240b998b544ae52d88500c186c786876b9f03c8fc243b634b536fa RLBA-2022:2806 new packages: espeak-ng Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for espeak-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms espeak-ng-1.50-7.el9.i686.rpm 303cff5af8450fa62e4ca56dc96e2b3ba87f0d329fa614a4d513ec5451c0eb0a espeak-ng-1.50-7.el9.x86_64.rpm 2063ab95d5f7fb821d29ddf7fa7ea89be880dd2d46ec1d49113509cd437ace45 RLBA-2022:2807 new packages: evolution-ews Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-ews. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-ews-3.40.4-1.el9.x86_64.rpm 086f243bfd6e5f2d5bbcff154412f04b497dd3b11e4a6066026b8f71c4060e7c evolution-ews-langpacks-3.40.4-1.el9.noarch.rpm 4b31c7ec19f5faa7b9bbff90cff988f0cc593e4c376bbd9526d0b0cf300f6499 RLBA-2022:2808 new packages: expect Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expect-5.45.4-15.el9.x86_64.rpm e890a6d145e259cca893006ab1694d3ade888eea110db6acd5b7eecdfa03682c RLBA-2022:2809 new packages: fdk-aac-free Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fdk-aac-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fdk-aac-free-2.0.0-8.el9.i686.rpm fb4ac77f03e71594b02f3c4dd5669e24ae5d68ba5e2570a90632250df4f7eaf8 fdk-aac-free-2.0.0-8.el9.x86_64.rpm fd2889679e75a7fb50fca56f56f802fc5114af9b24dcc53af8b621ffd579156f RLBA-2022:2810 new packages: fftw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fftw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fftw-3.3.8-12.el9.i686.rpm a874d81e852854fa1f69e4c6ad5202e5d0f27a034990c3809d5a169d01d68128 fftw-3.3.8-12.el9.x86_64.rpm 761d5c76f0b417f53fdd27fec6e51748d47cfae543de1c0cdf75a26d68d88051 fftw-devel-3.3.8-12.el9.i686.rpm d8c48a040b19ec49608b3513142b4e3156c06ff6761a18167ec1c37df308e455 fftw-devel-3.3.8-12.el9.x86_64.rpm ae33de7c8d47953bdacd0a0e2a17bcb8cfc1efb015f52b40a9f09390f27ecbc6 fftw-libs-3.3.8-12.el9.i686.rpm cdc05bb0c089fdf43167fd04636d00f241f2e87ae27734d1f8d98afe43800519 fftw-libs-3.3.8-12.el9.x86_64.rpm 2f84faa5aafca04d4a3833ff201e5212d9ba03366a343c242f2779d6a906a8e8 fftw-libs-double-3.3.8-12.el9.i686.rpm ff634ae36b5a85c7fbedb07b1753db9a2d431c9065654213e533c6b7bf0ac65b fftw-libs-double-3.3.8-12.el9.x86_64.rpm f2abe9068f5662f29fd5bdabea1189154519f4bd926d6103a590f1fcce9ab249 fftw-libs-long-3.3.8-12.el9.i686.rpm 21c699b766311aef915ed641d29fb6726f865b3f76f516f59e59aae8daf0ab72 fftw-libs-long-3.3.8-12.el9.x86_64.rpm 8bf5ec47fdd06e32574813af31c7a279b60ffbfce8b57b0e65aa3e7db845a582 fftw-libs-quad-3.3.8-12.el9.i686.rpm 97ac3c93517c4f8a17a76e68ff586bbbf589942b5c3e2bb37dc5587a616b555b fftw-libs-quad-3.3.8-12.el9.x86_64.rpm cdb5f2159787bb36f0ae9f4c6c7bb3f2847f37986496920914f346fced958903 fftw-libs-single-3.3.8-12.el9.i686.rpm 6eeed678747c0122928b8046ede45388ba88077c27b949a98321176ee1f1e20b fftw-libs-single-3.3.8-12.el9.x86_64.rpm eeb531a232788956f7e8be19fc4e1fddea929cfeb470b533ad89dcc79874578d fftw-static-3.3.8-12.el9.i686.rpm 23fe76ecad1ca04517f3c94609a8d09f7fc2ddc5f3e855bc127e396c4cd7e1c1 fftw-static-3.3.8-12.el9.x86_64.rpm bdc8eaeca6d1f4e541316cef152f5492a51937d5e0c9b5426a313703aefb120d RLBA-2022:2811 new packages: flac Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flac. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flac-libs-1.3.3-9.el9.i686.rpm 36e1f3d2361fc21cfbffad997e7b785132bd8b1b49a2ded5744e28aafee5cb30 flac-libs-1.3.3-9.el9.x86_64.rpm de6a904c5e61c6584df04ec88cef318b0308e5afe3fafdc32c491dba683d0987 RLBA-2022:2812 new packages: flashrom Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flashrom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flashrom-1.2-10.el9.i686.rpm dd4952acf55651e128d987bf01a426988de3de3b56a8519ede2e7944f05b236a flashrom-1.2-10.el9.x86_64.rpm bf5164e953876885ed31fd913b17314b9a37dee1e0b6285a4b45ee2ee346577f RLBA-2022:2814 new packages: flex Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flex-2.6.4-9.el9.x86_64.rpm 4a2a543e1419723dc825cfef657802f99ab3b8e231843d34c0c822b16339a78b flex-doc-2.6.4-9.el9.x86_64.rpm 71377f54b9e6064c34f31eed1270fa519781adc6126b4215d0f477235e1803d3 RLBA-2022:2815 new packages: flute Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flute. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flute-1.3.0-27.OOo31.el9.noarch.rpm 59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308 RLBA-2022:2816 new packages: fontawesome-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fontawesome-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fontawesome-fonts-4.7.0-13.el9.noarch.rpm bb42bd81ccab839dad5ea9bda83a0269ab630e7939fb5d43ea21d7a3dc7168a2 RLBA-2022:2817 new packages: foomatic Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for foomatic. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms foomatic-4.0.13-19.el9.x86_64.rpm 32803af6154bd2891ae0678b51e24fb52e4cb838094f59b714e2e351ca82d5ff RLBA-2022:2818 new packages: foomatic-db Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for foomatic-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms foomatic-db-4.0-72.20210209.el9.noarch.rpm 8a0621fa5bc6c38e0b0a469dadbf92e8ffba91ef2d5fd4325550159a760550cf foomatic-db-filesystem-4.0-72.20210209.el9.noarch.rpm f6cf92515c2f66117a30571048681e63b2b3c8d48018f6ca19a39a6ff759642d foomatic-db-ppds-4.0-72.20210209.el9.noarch.rpm 8e9f9fa2ca5d6813c578afe9d2c3bb76650b44ff572640b5bceb6fdfc288fed9 RLBA-2022:2819 new packages: fprintd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fprintd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fprintd-1.94.0-3.el9.x86_64.rpm 57af6bb5cca318f01c7d63ac8733a0ed2cd28df809091438bf4828509913de70 fprintd-pam-1.94.0-3.el9.x86_64.rpm 954c0cba8e61774f02aa24c6954c53cdb2fcd5007a99ad634782fff178f0aca5 RLBA-2022:2820 new packages: freeglut Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeglut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeglut-3.2.1-9.el9.i686.rpm 323b5e56cc72d0c9f83df1e64f1ef86c18a4f5566e8b2011213a7f93f81026ec freeglut-3.2.1-9.el9.x86_64.rpm 401261f14c32a69cf59b80ef5d6288f2a78a96830f7de1eb5d0ea7b15043c812 RLBA-2022:2822 new packages: fstrm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fstrm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fstrm-0.6.1-3.el9.i686.rpm 73a245018de5e2c0574f06c3d51288f5ad6edeefcd64fe6a7a990c4028b10e3a fstrm-0.6.1-3.el9.x86_64.rpm 631c5c264a5d22eb4be9d03afe491f5534d8af9176a03806772f047e6fd53eab RLBA-2022:2823 new packages: ftp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ftp-0.17-89.el9.x86_64.rpm 38fd7d19e35afc0890b093d9a0cec1e823743140edd86929e8d4adc425c3e90d RLBA-2022:2824 new packages: fxload Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fxload. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fxload-2008_10_13-21.el9.x86_64.rpm ee0b3e24f82e608d604ae92106ffb6a3129a9bc2021b97655639f3f97752b0d5 RLBA-2022:2825 new packages: gc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gc-8.0.4-7.el9.i686.rpm b801d760125d4a65dd69c00840825bbdf49436924772f5846129f7c8984176ff gc-8.0.4-7.el9.x86_64.rpm d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d RLBA-2022:2826 new packages: gcr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcr-3.40.0-3.el9.i686.rpm 7c49d62269121f860049e503a033709bdfcd3ce85fdeb69a7e700c8fda07b8b6 gcr-3.40.0-3.el9.x86_64.rpm 315df43169c7b5a97b097179cc8cafe0e02ce36ac5befeb1aa34735f81f646b0 gcr-base-3.40.0-3.el9.i686.rpm be9a856938a88a9ed05ab6e8dc4115a9e26113ec8219cb9857eb50b0293d577c gcr-base-3.40.0-3.el9.x86_64.rpm a180e148356b8477746c7dac1091e08b6b4067b9edf5e04b4238510cc8ed4a27 gcr-devel-3.40.0-3.el9.i686.rpm b4c2b7dbb3e15dbc58e67cb3d9aa9abca8150c84e11e2ae6e98f8b55b2705cf5 gcr-devel-3.40.0-3.el9.x86_64.rpm 69d17212f6fe401d0433562609c45226989ce6b4a2dbd056badc0ce4bdc6f3ae RLBA-2022:2827 new packages: gd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gd-2.3.2-3.el9.i686.rpm d99035f196badf515afd15fcb314b758bb9407482ac83748a0bc2608b6bf62c1 gd-2.3.2-3.el9.x86_64.rpm 9291c9f9c183e58b48d25bfeb4d6bc19f281fc53ceb0a99ebb7044a925fd8b0d gd-devel-2.3.2-3.el9.i686.rpm 7fb6d68e7f7abf24e84b129d39f2b9ba682ccef5980bf22d5ffd24f2626e81b3 gd-devel-2.3.2-3.el9.x86_64.rpm a6d1645f145aeba8dab2fd1c8fd279aad0c3947ac0d3812aa70f109f0ead22af RLBA-2022:2828 new packages: gdk-pixbuf2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdk-pixbuf2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdk-pixbuf2-2.42.6-2.el9.i686.rpm 1f821cf3440c3dbd0921eaaf1d78600884768b143c19799cccc9d08f66c12fa9 gdk-pixbuf2-2.42.6-2.el9.x86_64.rpm c49e2787cb1125c68ada0d454294b784eafcc7f0c5f2bde350a8aa5e4c06fff7 gdk-pixbuf2-devel-2.42.6-2.el9.i686.rpm a8c89b82c1b36f1d4e916057c7d48ba6d0d4897f63e6de1d56dd4f055a2284fd gdk-pixbuf2-devel-2.42.6-2.el9.x86_64.rpm 9175e8153149bc62821444f8b4238668f7dce9336663a05c52366ed0295845f5 gdk-pixbuf2-modules-2.42.6-2.el9.i686.rpm 8b7b6c33ff5d89e6d640955ff597615ec46c0bec82a2ab4d2977a2a812ee5c31 gdk-pixbuf2-modules-2.42.6-2.el9.x86_64.rpm 708eeff086a38b98320d9e64a58d4f66514d38c504e59b52a12640ed5e3f2b71 RLBA-2022:2829 new packages: gedit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gedit-40.0-6.el9.x86_64.rpm 46e14906bb99cf95c07a93190ab35c29ec61a4d88b5b6fd9df71bb2a11a26aaf RLBA-2022:2830 new packages: gedit-plugins Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gedit-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gedit-plugin-bookmarks-40.1-2.el9.x86_64.rpm 2a04de639aa9d9ab01e30380db89d744c22ead784eb50cdbba897121e7f90b2b gedit-plugin-bracketcompletion-40.1-2.el9.x86_64.rpm b1ef2f9d30a594e0dcfa144d767e4819630c23326b9bd9580f9750fb3d7a86a0 gedit-plugin-codecomment-40.1-2.el9.x86_64.rpm 54db8f81d99f6f5fea6554e3b3b944b0c6649df384c8e3346758c037744ed9b8 gedit-plugin-colorpicker-40.1-2.el9.x86_64.rpm 0633b0d18c7754e0a552f65e26dd92ccf1b1f34fb9f65ddaf28f8478b90b0c42 gedit-plugin-colorschemer-40.1-2.el9.x86_64.rpm 03898007e64bdbf725f1893fb7c17670f0e72fb84340917249ddd54de1e0b697 gedit-plugin-commander-40.1-2.el9.x86_64.rpm bdebc34f6300fca4404aff1171cb4ae18ff6ce263490621f2ee7f85328e31119 gedit-plugin-drawspaces-40.1-2.el9.x86_64.rpm de9028c4a6743c8e74ae8a6cbd01863c7b431802f093100f806d54d8632141ce gedit-plugin-findinfiles-40.1-2.el9.x86_64.rpm 04780acaed8cb8557f92e30645f280dea734958cb0f14c905edfbea15410f400 gedit-plugin-joinlines-40.1-2.el9.x86_64.rpm a5b1c1cc32f67d34e51491e7d4e272476926804e180977cb56ccc20662bd7e3f gedit-plugin-multiedit-40.1-2.el9.x86_64.rpm 7f0a5a49587932c2a636e46bb9a6a7927636a51cf4a852f5cf3647cfe1393a9d gedit-plugins-40.1-2.el9.x86_64.rpm d6351d3d71a3ee599d2f0459a1bf9473de5edf292ff71cf26783c0ff6b4b7776 gedit-plugins-data-40.1-2.el9.x86_64.rpm 3bc616a477efa7d2edfca86d4d9b34344cec94d382fcd0fdd195fe21602568ed gedit-plugin-sessionsaver-40.1-2.el9.x86_64.rpm dcb46c0d2e947ffdc982409ec0fe666cd0cd12c3a1dc0157a2268cc9ea14974b gedit-plugin-smartspaces-40.1-2.el9.x86_64.rpm fb5f463c01ee046cf266d683cecaf947889938a8672f3ee28a56be21f49693c7 gedit-plugin-synctex-40.1-2.el9.x86_64.rpm 6995bc8005f398221e5c31021523a312362ff6cf4984eb59398e4b9282357b2d gedit-plugin-terminal-40.1-2.el9.x86_64.rpm e09d8268880f3ae823adcb6dde982dd9ac94c17b441cea3d38803882206b855d gedit-plugin-textsize-40.1-2.el9.x86_64.rpm dd3082a04e8a87051b02a1e59168a98703dcb60f186ff114ea2fccebb94d5f7b gedit-plugin-translate-40.1-2.el9.x86_64.rpm c3e77e4bf5ba8484f387fdbe90738d7efb60c45e946f4f3457b18c38334e9a15 gedit-plugin-wordcompletion-40.1-2.el9.x86_64.rpm 8a736a19b456318aa331fc0b7f161e31dcd52647c19dfb272d74fbc76be64cc0 RLBA-2022:2832 new packages: geolite2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for geolite2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms geolite2-city-20191217-6.el9.noarch.rpm ad26fa3b94cdf6332f303f3456ef46aa133c020a528cee6642850411e0695f34 geolite2-country-20191217-6.el9.noarch.rpm 624b1f89debfa315a6141c861aca66bb3b4df44034b75be0b2a4b31e89ec3e2b RLBA-2022:2831 new packages: geocode-glib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for geocode-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms geocode-glib-3.26.2-5.el9.i686.rpm 5b902cd41e3ce44ba4997a633980a794cc75dcf0e66d86f5ad32a82fd5a31100 geocode-glib-3.26.2-5.el9.x86_64.rpm 7231dcb73cadb06a7aa057b9274d9b2343edea98444a1f96e6ce13bc2c884b23 geocode-glib-devel-3.26.2-5.el9.i686.rpm ad29a1c1507e7e401871d2f70465042196a502d067fc3f0ff0ce028b835bfbb0 geocode-glib-devel-3.26.2-5.el9.x86_64.rpm 7d4723076498d340c5f36acd59f790a864dbc7be4cd1635f8e9ee45bc620e4f0 RLBA-2022:2833 new packages: ghc-srpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ghc-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ghc-srpm-macros-1.5.0-6.el9.noarch.rpm b0a7d5bc94309feb1b4284e81d1905bcfa4ea1be6e4281e2ce4f2a81037bbdc5 RLBA-2022:2834 new packages: giflib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for giflib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms giflib-5.2.1-9.el9.i686.rpm 30254d1ef5dea01cecefb885d0ca1d594c75f3b5b95d3e2aa80282ca85638b59 giflib-5.2.1-9.el9.x86_64.rpm 2bf958b7910eec4acbbd05a50988ec73ab469f95b4ecb66fd94e6fcda5ce3050 RLBA-2022:2835 new packages: git Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-2.31.1-2.el9.2.x86_64.rpm 92e2638e66d5251fb60041118ddef480cad39cf8a63c2cd74c6178f855b70793 git-all-2.31.1-2.el9.2.noarch.rpm d72122ad692b5aa2e211fd4f967963a090705c0b2aa732e62f258d59a83a29d5 git-core-2.31.1-2.el9.2.x86_64.rpm f0cf85dc06e6a011d1260a49eb0413186a21b10eb3994d0d6f7be1557ec03d3a git-core-doc-2.31.1-2.el9.2.noarch.rpm 00661514e7725bf4c3aa4f6eb9320afa68fc0f5b6696b9aa2c91c71f350098bf git-credential-libsecret-2.31.1-2.el9.2.x86_64.rpm 44ad06011dae10d2d0a9bdd499925bde235c8f747e3815709f6a28caa0dd5067 git-daemon-2.31.1-2.el9.2.x86_64.rpm 2f9182b76717a630d914080e34cbcfa636b66e926500500f869c6550381ed1dd git-email-2.31.1-2.el9.2.noarch.rpm bd4b553254ee70914e3503d32af1fb6d5f9787fb8142092e02b415c152b1fdd0 git-gui-2.31.1-2.el9.2.noarch.rpm 2c5741b7bb2abfb1f70b0b4c6917af6ff128dfb4a0c06aaec63e1a512dcb5cb7 git-instaweb-2.31.1-2.el9.2.noarch.rpm 890c167d4cb6f097094e709bbc20c78a0feb5da712cdbd059a4ed4d99dd01b95 gitk-2.31.1-2.el9.2.noarch.rpm f92063b5fa6b5af42aee0aff0546f1d6ecffe07447855c62b5e15b43295bd920 git-subtree-2.31.1-2.el9.2.x86_64.rpm 758b315dc0ee1f620d5aa26a018ee64fa8a008989424fe80a953fe10ae0c7e41 git-svn-2.31.1-2.el9.2.noarch.rpm 09d939d6c20a4125e3c58b57ef501f30592b50957adbc4cc4d17d1db92393f4e gitweb-2.31.1-2.el9.2.noarch.rpm 6a3afef85437a58ecaaca470c69de3641c40318b175dd612ebc2b210493e3268 perl-Git-2.31.1-2.el9.2.noarch.rpm 29bea815d1845882343874a2772945877209a4f17634f5dfc3723872f9dcf57b perl-Git-SVN-2.31.1-2.el9.2.noarch.rpm dbe6a04aec1b67299448716cc566ac8f66f513415991b1411649bce667b0b3a1 RLBA-2022:2836 new packages: git-lfs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-2.13.3-5.el9_0.x86_64.rpm 63cf1802904a33fc7648d6348b4ad13b16f614bf07bbca937c524c9204928ba0 RLBA-2022:2837 new packages: gl-manpages Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gl-manpages. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gl-manpages-1.1-24.20190306.el9.noarch.rpm 734c22cba6a7c4701be92a9be1ace7ae88ce884359e4a92b7b67973a9ad9165b RLBA-2022:2838 new packages: glade Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glade. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glade-3.38.2-4.el9.x86_64.rpm d655d360c8f7d84ca894f9412edc66bec57589abb33cf758ffccc004db66dd9d glade-libs-3.38.2-4.el9.i686.rpm 5e51150a7b3f44789f5bfe69596427461f86dfe540bb8a865f09e96c1ab1e741 glade-libs-3.38.2-4.el9.x86_64.rpm e5dc8b4c72d7f5bd9b4f3fa43285e227748a8257d08191eb7ea17e5869e1ed81 RLBA-2022:2839 new packages: glibmm24 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibmm24. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glibmm24-2.66.1-1.el9.i686.rpm 76904f186a31bc1f18d0506c9b92c752b62668edc885f95807dd00485f06fc79 glibmm24-2.66.1-1.el9.x86_64.rpm a9c054a0e3ef1f92748658b37f9d31f8681aa0462d39606fda704eacbec262e4 RLBA-2022:2840 new packages: glusterfs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glusterfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glusterfs-6.0-57.4.el9.x86_64.rpm fb1aa921fa0e5cb8f2f0b8a74c7eb6d7ff2b7fd2397009acc77dc23a63b07a90 glusterfs-api-6.0-57.4.el9.x86_64.rpm d29b493ad331af375925be7c5c2985b0244d7e0f6247359254344bf2b86010b6 glusterfs-cli-6.0-57.4.el9.x86_64.rpm 19c92fc959ebc32bc35ada0cfdfc171959955641f95ea415c29e922225e6051f glusterfs-client-xlators-6.0-57.4.el9.x86_64.rpm f1b289cf13a9e52182eb6df4b4ea5c565a768645175a0dc4e13c043629cfe8ee glusterfs-cloudsync-plugins-6.0-57.4.el9.x86_64.rpm 11d1929b17484a7d11d80648baf2dd0bf4d8bfd299359a3126e430c755640ea0 glusterfs-fuse-6.0-57.4.el9.x86_64.rpm 3103c9a8f3c2e3e258a029afbb561770dd3c30b1479f9a02a7c7027620ce4e77 glusterfs-libs-6.0-57.4.el9.x86_64.rpm 28763675d65a9edee8eee41023b658e2c1fdecf7858960710113b9ba5ad8c46f glusterfs-rdma-6.0-57.4.el9.x86_64.rpm af2fb2b1f58b0d43f38088af1c355b474accb52843ba4c84a0366a3500c41473 python3-gluster-6.0-57.4.el9.x86_64.rpm 2fe0c4617ea091c03b77b987069c59a293ba2b30686bc1b0cfc7daefd9a6568d RLBA-2022:2841 new packages: gnome-backgrounds Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-backgrounds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-backgrounds-40.1-2.el9.noarch.rpm 8672bb678675c011a1746bfc0e30380728139e0d813ad33ba9c11f9b81bde6e5 gnome-backgrounds-extras-40.1-2.el9.noarch.rpm f3f95fdde45e61ac2fbf5d87f50c1eb9ed33a91f8661934a816205a178ef4800 RLBA-2022:2842 new packages: gnome-bluetooth Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-bluetooth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-bluetooth-3.34.5-3.el9.x86_64.rpm 32d9d9d8416830e1c782dc2ab237780b52bcda1f7cbaed13546340850c24b702 gnome-bluetooth-libs-3.34.5-3.el9.i686.rpm 51aa8f36c36d0f35636c2aba605987cec0afb891213c0bf8db3ae835d23bc7b4 gnome-bluetooth-libs-3.34.5-3.el9.x86_64.rpm e2664fed2264e854636b55fc54e8cfdc35f4573c9f191451fd6e0101bc6f7e2a RLBA-2022:2843 new packages: gnome-calculator Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-calculator. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-calculator-40.1-2.el9.i686.rpm 8c696235a147866563bd307e5803928bb752724655d0d8c0b69079f26af12eaa gnome-calculator-40.1-2.el9.x86_64.rpm 2c7b1bef8ffa7fb33ee9026c1894aece7fc1705723289a2133166f09943153e1 RLBA-2022:2844 new packages: gnome-characters Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-characters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-characters-40.0-3.el9.x86_64.rpm a6a8afd02be61f99489628b6262d1fd381ba27abf20a461a16f0fe645c832f97 RLBA-2022:2845 new packages: gnome-color-manager Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-color-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-color-manager-3.36.0-7.el9.x86_64.rpm 4f9712c2835f961a880d82b1f2da229f87c838eb56e772194714ca39dd317617 RLBA-2022:2846 new packages: gnome-common Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-common-3.18.0-13.el9.noarch.rpm 344cd16a517f8780b7e2417fbe74f28f037bd2ce75907f943a295e07c5b77af6 RLBA-2022:2847 new packages: gnome-desktop3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-desktop3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-desktop3-40.4-1.el9.i686.rpm 64e027523c9c72ea4788670f2b078b7cb976bae845dd225ce407a2262fa8bc9d gnome-desktop3-40.4-1.el9.x86_64.rpm 7f3906f5643216d14633968c60319bdb9aa99523a2595aaa8666b6255756790c gnome-desktop3-devel-40.4-1.el9.i686.rpm 45ede6bbebc009359f1646df24bd7636ee325b2d7e28a0c71e123cfa248665bb gnome-desktop3-devel-40.4-1.el9.x86_64.rpm e56202fd8215e18e13fae1e82fdd4ca0230e8e35f07ffd20717b93a3c1c8c6bf RLBA-2022:2848 new packages: gnome-devel-docs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-devel-docs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-devel-docs-40.3-2.el9.noarch.rpm 513028d6269f94524e57076af20c25adeb907e5f269999022cddac870263ba45 RLBA-2022:2849 new packages: gnome-disk-utility Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-disk-utility. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-disk-utility-40.2-2.el9.x86_64.rpm 8fd3621d0f10f47818f0c246ade4131a3a928d31236c2695abc951be1a09b87b RLBA-2022:2850 new packages: gnome-extensions-app Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-extensions-app. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-extensions-app-40.0-3.el9.x86_64.rpm 4b59d569c2d49d906055526a5eca0c0cac250ce1658435d135085256839675be RLBA-2022:2851 new packages: gnome-font-viewer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-font-viewer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-font-viewer-40.0-3.el9.x86_64.rpm 85d0f1e2e677d2eda076cbbf439e9a96eeb445c9cb4740eeeaca8dac9cce2438 RLBA-2022:2853 new packages: gnome-keyring Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-keyring. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-keyring-40.0-3.el9.x86_64.rpm 9d0f45f353391acca405b382844e5cb5bf296a3012f893da5eae12b7590664af gnome-keyring-pam-40.0-3.el9.x86_64.rpm 00933fa1c62c7dd9bb840ffb45fc952366bf2ff6e2f86b3f7295e34b3f2d3e1a RLBA-2022:2855 new packages: gnome-logs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-logs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-logs-3.36.0-6.el9.x86_64.rpm 688fe03b5fb957f9f5ea67b848cfcab2c63534d96a6b47f776df8c609ed320e5 RLBA-2022:2857 new packages: gnome-online-accounts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-online-accounts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-online-accounts-3.40.0-2.el9.i686.rpm 33b9bf8ef37add4b3bf9944bd20a70c57d9f57b3d819370a6b8b82ef50352b7b gnome-online-accounts-3.40.0-2.el9.x86_64.rpm 964dcbe239ef892246568ca063ef610a88fb2c9b386d604810d79af1aaa7fca3 gnome-online-accounts-devel-3.40.0-2.el9.i686.rpm 6ea4d506ffa66474522091cf9f72f8d74e1b02d184ab686aeadfb105ff0ba1d7 gnome-online-accounts-devel-3.40.0-2.el9.x86_64.rpm 4141e75f821415d728058027f3e13cb6997ea4e33b3a18c34ce43e875de693de RLBA-2022:2858 new packages: gnome-photos Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-photos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-photos-40.0-4.el9.x86_64.rpm 5a9c0d1dbb22f8a6941c62009ca5db066bcdd02452e17d0dc9d9b5d605d3f93a gnome-photos-tests-40.0-4.el9.x86_64.rpm e4b7f28c062cce283fe353ae0a5e17dd737bf0ba7ea761edea8a5a7052fa93eb RLBA-2022:2861 new packages: gnome-themes-extra Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-themes-extra. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adwaita-gtk2-theme-3.28-14.el9.i686.rpm 4bdd952c99fc450ecb8b81d814f38a43f7733ac18b789fc3145debf6a6f6aa26 adwaita-gtk2-theme-3.28-14.el9.x86_64.rpm 3e5a07db4d49ad384dfc66751676c6e612012f276be54fc63d65f0cb6068b74b gnome-themes-extra-3.28-14.el9.x86_64.rpm 6b59aee877850f99ca99b2d9ce93d47cc814507b4be54fcb66fac235c7717f56 highcontrast-icon-theme-3.28-14.el9.noarch.rpm 7b64e07c748d2121bca76d1e8a0ceab5b166e88e56a285a4efc52ff062424fbb RLBA-2022:2863 new packages: gnome-user-docs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-user-docs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-user-docs-40.0-3.el9.noarch.rpm 45e2806211f0c60ebd20d6f0a27b57b2b6f018ba2ce80793d59f2f017b9e68f9 RLBA-2022:2864 new packages: gnome-video-effects Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-video-effects. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-video-effects-0.5.0-7.el9.noarch.rpm e7c3ac2ff0e8f39233961bc7799cb614677c68b88e3e63503a505cbdd5b28801 RLBA-2022:2865 new packages: gnu-efi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnu-efi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnu-efi-3.0.11-8.el9.x86_64.rpm 77562b902143902037054582b389e011a6ca588d2d0c338c8f48a8b57d41f10b RLBA-2022:2866 new packages: gom Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gom-0.4-6.el9.i686.rpm cf13deb56e11566ffe1c2a888eacd410a7aedb0f4db8130cfd6e922e0a825a1a gom-0.4-6.el9.x86_64.rpm c21b08763cfd46987d2754bcd21ac91fa63b80d25ca03dfbed00a01a25827910 RLBA-2022:2867 new packages: google-carlito-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-carlito-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4 RLBA-2022:2868 new packages: google-guice Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-guice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-guice-4.2.3-8.el9.noarch.rpm 227b36966c2d5f5bb32099845b30eaf4d7efbe1e6c0c7646447b09e911de9f78 RLBA-2022:2869 new packages: google-noto-cjk-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-cjk-fonts-common-20201206-4.el9.noarch.rpm 77e6ccf7598f49e26fad88fe958204f63afb68747bb8a8268ef5ebe7433eb463 google-noto-sans-cjk-ttc-fonts-20201206-4.el9.noarch.rpm 5684559192ca1ce0c04c74f24bea09734b634370ccc16205f6cdb24adf5b3caf google-noto-serif-cjk-ttc-fonts-20201206-4.el9.noarch.rpm be6aa71a448e9074af2651ab4e8ab890a6d3d623c49b9477e17fbf03f7591850 RLBA-2022:2870 new packages: google-noto-emoji-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-emoji-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-emoji-color-fonts-20200916-4.el9.noarch.rpm 2037b162cb3560d93289fa41d45af22afc6370183def183fd1932a433ac14625 google-noto-emoji-fonts-20200916-4.el9.noarch.rpm 8e65582822fcd3933a3dd3d1b476ac44edab76d0823bd45fdafc95bc531a9cbe RLBA-2022:2872 new packages: google-roboto-slab-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-roboto-slab-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-roboto-slab-fonts-1.100263-0.17.20150923git.el9.noarch.rpm bb4bc3df4180d3bfec185477da05294a9de19ef9b800cabd7ed5cb74fc5d0d77 RLBA-2022:2873 new packages: gperf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gperf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gperf-3.1-13.el9.x86_64.rpm 40769b94f00249f6bf833e5b054365ca9fed848ec92d7fed0c34df5572846692 RLBA-2022:2874 new packages: gpm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gpm-1.20.7-29.el9.x86_64.rpm bf3321babffdc82846b674dba6d17604ae5976a3c61e0d384402f77f8daa11d1 gpm-devel-1.20.7-29.el9.i686.rpm a9d8cd849c41b73f303a377e1b0e08f137e0622577e7f27af25fb067a45ea643 gpm-devel-1.20.7-29.el9.x86_64.rpm de3e7ff8bcfe4c443b71f2c0e276ac72ecdd714b782d7e009348ecb75658bb2e gpm-libs-1.20.7-29.el9.i686.rpm 0f8768e74d33b13935940e8f193af6aa8bab1be739f1f863df3903f85ba6fcfa gpm-libs-1.20.7-29.el9.x86_64.rpm d3d16ddd48bf55f086e6c324d67bc2fb4e9bdae14fddb56840ae53487c920ecb RLBA-2022:2875 new packages: graphene Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for graphene. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms graphene-1.10.6-2.el9.i686.rpm fccb8a52929bfef3d48cc190a4a74d7e14052d978ed2860f3c856c1719eee53a graphene-1.10.6-2.el9.x86_64.rpm fd99d16e7fb06b79d6d3adbe5a656e44112b37aa478a6151a23f0a3e2aa4fc63 graphene-devel-1.10.6-2.el9.i686.rpm 960c3c9bed2dc3aa8a823cfcff0b24d32b6ecd644b82bc6f6a498087249dda62 graphene-devel-1.10.6-2.el9.x86_64.rpm 570fbe9263e2fef3e94965e3b0e2c53b4a069b5eb9c25d00d43e17b0c9608112 RLBA-2022:2876 new packages: grilo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for grilo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grilo-0.3.13-7.el9.i686.rpm 7ec02e80f4e7de0bdc9b19f692402aa9b4a1f53a0d9e7b16529c34352d28d139 grilo-0.3.13-7.el9.x86_64.rpm d4babfac25650071f258a4c6203e50ac33cbfe494356599f929c0b1f62183527 RLBA-2022:2877 new packages: grilo-plugins Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for grilo-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grilo-plugins-0.3.13-6.el9.x86_64.rpm d18586f8604435a5d407ee8644cbd248a20e1eeb2af2f70990e634ba1492dfe0 RLBA-2022:2878 new packages: gsm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gsm-1.0.19-6.el9.i686.rpm ba0398d8afdc072c359bd393dd945eadf26d0e12a4093984c924b0e147c7cd32 gsm-1.0.19-6.el9.x86_64.rpm a5ff96d8d96d8fb89d6febcff7b0615448984be8d2fa18960a7d05351aea69b7 RLBA-2022:2879 new packages: gsound Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gsound-1.0.2-15.el9.i686.rpm 4144c3311786ad3f883104fd9fe0eef552e6332a6b0a2e5591070d2cd2d3a927 gsound-1.0.2-15.el9.x86_64.rpm f7e0df19cccfb6c735fba8155ae84494d4415956fc4d4685e1b3f84862a08b85 RLBA-2022:2880 new packages: gspell Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gspell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gspell-1.9.1-3.el9.i686.rpm 2912bd96e0bc2f9afaca635a046b241ea43255eac2f2342176266b79406e3373 gspell-1.9.1-3.el9.x86_64.rpm c1a520e082ae470c3134508db102a390f5ffd09105ca56bc944d82b4c1cf4cbe RLBA-2022:2881 new packages: gstreamer1 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-1.18.4-4.el9.i686.rpm 8712974a333df308cc1ff8b86cbbc17c0c9c7d16fbdefdd2d8daf285ce7ff084 gstreamer1-1.18.4-4.el9.x86_64.rpm 1f42c80d0c92269ab5d21f36bf4929067ffa160e601bf8338dcc4cf9676704f5 gstreamer1-devel-1.18.4-4.el9.i686.rpm dc7ca6cce3528a206d2d3c61213a8266c51ccb345102f14aafe80d8e4f69ba03 gstreamer1-devel-1.18.4-4.el9.x86_64.rpm 09542d576034247bc7dfa2c35c594dc252191c0c743c80a86ab710ce8e4c6679 RLBA-2022:2882 new packages: gstreamer1-plugins-bad-free Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-bad-free-1.18.4-5.el9.i686.rpm 85265e248cbc46f1a417b19608d070396598de4c7b196a7e43466a2c6e66b75a gstreamer1-plugins-bad-free-1.18.4-5.el9.x86_64.rpm 9e9563da7d22b5944b83e33ca46352b7904a900fd6b94401ba5118d4b2e41823 RLBA-2022:2883 new packages: gstreamer1-plugins-good Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-good-1.18.4-5.el9.i686.rpm dc3c2e83c583937a399043bbb255ae3f8b9a1b15a2eac6be16d99c04ce4b34a0 gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1 gstreamer1-plugins-good-gtk-1.18.4-5.el9.i686.rpm 2c4039d6d99f9cf631fbec97f0a0b02cfcc4a90e17755f40c8926eb0af0e42bb gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm 1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13 RLBA-2022:2884 new packages: gstreamer1-plugins-ugly-free Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-ugly-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-ugly-free-1.18.4-3.el9.i686.rpm 02caa0fe5a4f3e05892c14a25f817588e34bf57fe90c38f46b6c347685f9c8b9 gstreamer1-plugins-ugly-free-1.18.4-3.el9.x86_64.rpm 9c2424fa970f3f8784edf6be058a403d75d5e74d02e949cc09edcb275308357d RLBA-2022:2885 new packages: gtkmm30 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtkmm30. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtkmm30-3.24.5-1.el9.i686.rpm 09cbe824cc75e411f24988e64c62afcf6c8ae1500a7136cc2dac7bb3a449ecb5 gtkmm30-3.24.5-1.el9.x86_64.rpm 2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a RLBA-2022:2886 new packages: gtksourceview4 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtksourceview4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtksourceview4-4.8.1-3.el9.i686.rpm 37e80b2c99ebd7fe2aecfde032d4a46c43f156dce88e63d1773ea6efc2d1dce7 gtksourceview4-4.8.1-3.el9.x86_64.rpm d08ef82031b8dfa8a8d047e20656819c1964188b515a117d2c76ee64309cd907 RLBA-2022:2887 new packages: guava Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for guava. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guava-30.1-5.el9.noarch.rpm 219085b48874b4ec87431af3388cb61a9ca40dd6eab82e590b37d8b91d37c285 RLBA-2022:2888 new packages: gubbi-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gubbi-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gubbi-fonts-1.3-10.el9.noarch.rpm c432bf9494b195068ef28895a4431576f845e00ba3770587485029956baeda6c RLBA-2022:2889 new packages: gutenprint Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gutenprint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gutenprint-5.3.4-4.el9.x86_64.rpm 611eeca70013ecb228a977149085bb999181ea93b2445612c90aef2bcc9d3a10 gutenprint-cups-5.3.4-4.el9.x86_64.rpm 4951b4e992fd3fe0fdb18d64d317e2fa5e83e0efe65f7a6431b8374dc155afdf gutenprint-doc-5.3.4-4.el9.x86_64.rpm 00224971ff625563c8a21fc869de88774dc0c46efa42cf37d1ec70861d31495d gutenprint-libs-5.3.4-4.el9.i686.rpm 5bbc90a938c8de875ba924f3f3bd59534ce8f5edb6e9c09987c369ad5f2bba9f gutenprint-libs-5.3.4-4.el9.x86_64.rpm 3edd40f0b32147da05c1f751a170090eb98cfe26b6dec9085287cdfae33eee02 RLBA-2022:2891 new packages: hamcrest Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hamcrest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hamcrest-2.2-7.el9.noarch.rpm df9f44dcf80056602fc9555da3d4b098ab33e407a36901f472e89f9f4a34b2c5 RLBA-2022:2892 new packages: hesiod Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hesiod. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms compat-hesiod-3.2.1-16.el9.i686.rpm 34c435d77f4dd01cfa849b4df2805a4ada1074ca0bedb63df55d3609e9d47788 compat-hesiod-3.2.1-16.el9.x86_64.rpm 683c784ebb749a027c494cb306c0660bbc6cbee997e4e7d8da9d3a94684bb1b0 RLBA-2022:2895 new packages: highlight Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for highlight. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms highlight-3.60-5.el9.x86_64.rpm 7674e2f36faaf9eb1b419f54e0303f6fc77b59db75c1c08c95d35309fa8a5b7c RLBA-2022:2896 new packages: hplip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hplip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hplip-3.21.2-6.el9.x86_64.rpm 43a2f679f0b7f451f29a6aedde5696de76c6af8d9af7fb47ea9022dc1339f6ce hplip-common-3.21.2-6.el9.i686.rpm 27294a5c93522dde8cf449435403520715816edfd6e184f6cfadffc3781475a8 hplip-common-3.21.2-6.el9.x86_64.rpm 578a3344565e32295f03a7ea6eebe4681f68ab7216272101f9c6d6c374cf5325 hplip-libs-3.21.2-6.el9.i686.rpm c38ee2756b67a4d24d42bf34fe0c15b2200c03c73d91f68b12c382e7f5ef4e88 hplip-libs-3.21.2-6.el9.x86_64.rpm 344713541c4f54f365548056b02bb5e53848844c51c8350267fc4b3df1fbe28a libsane-hpaio-3.21.2-6.el9.i686.rpm abb7d9f5c0cdbf7512e6b8f24a978da0d6212587ef19aae834248dfd2fe0c316 libsane-hpaio-3.21.2-6.el9.x86_64.rpm 9603711e8af3d97528dc3aa12db4105eaf289deac4bdf25db651f72a0bdce692 RLBA-2022:2897 new packages: hspell Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hspell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-he-1.4-15.el9.x86_64.rpm 8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45 RLBA-2022:2899 new packages: http-parser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for http-parser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms http-parser-2.9.4-6.el9.i686.rpm 65b4f6a663f4fd7392477fe6f2629a715a9a85e90852c878fa46fac418d06c6a http-parser-2.9.4-6.el9.x86_64.rpm e77cbe1ec76e3aaf209b9cffd6372fd02db1efebd94d344b5509b77ba5b21d8a RLBA-2022:2900 new packages: httpcomponents-client Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpcomponents-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpcomponents-client-4.5.13-2.el9.noarch.rpm aa9bd4932146ffdcce0042433570a1a9308419488f43d8ec12040cb1110ff7a8 RLBA-2022:2901 new packages: httpcomponents-core Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpcomponents-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpcomponents-core-4.4.13-6.el9.noarch.rpm 6a5be7b8a5732e3a9da091b4be0ee6cc6de95d3129df00643c9c7204bf63b111 RLBA-2022:2902 new packages: hunspell Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-1.7.0-11.el9.i686.rpm 4be5731128ad451d513d88067ed271f8a7b2e6b3cd654356a700d01586442ddf hunspell-1.7.0-11.el9.x86_64.rpm 192d276b99a211ac8a32d11cdd38fae940ba7cce7cd4552ac4a3471dfb7941c8 hunspell-devel-1.7.0-11.el9.i686.rpm c06037767a8dee8ac3a82a21a413ea240eb5d4fa930ad3b19803df37d7c3113d hunspell-devel-1.7.0-11.el9.x86_64.rpm 2f5a70da8d774c2e867692584703ae338593f78046365a2980177f3a9c2338dc hunspell-filesystem-1.7.0-11.el9.x86_64.rpm dbe33c0b7e160306d3b0fa6e6c8e1c7e1b58ed655541a5f673a51b83fe54f710 RLBA-2022:2903 new packages: hunspell-af Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-af. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c RLBA-2022:2904 new packages: hunspell-ak Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ak-0.9.1-10.el9.noarch.rpm 57ee4c195da06e23defcabc0b0bf07c672527b8e39682a25e96274d779996d85 RLBA-2022:2905 new packages: hunspell-am Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-am. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-am-0.20090704-22.el9.noarch.rpm 7767f5e28e51f6008303819daaa4c4e13f576caa25f37e0697864154fe99e682 RLBA-2022:2906 new packages: hunspell-ar Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ar. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ar-3.5-15.el9.noarch.rpm c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0 RLBA-2022:2907 new packages: hunspell-as Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-as. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 RLBA-2022:2909 new packages: hunspell-az Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-az. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-az-0.20040827-26.el9.noarch.rpm b71b00abd18e20134a39cd511571e4b0a2b0f7a97742f064d454354349086716 RLBA-2022:2908 new packages: hunspell-ast Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ast. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ast-2.0-7.el9.noarch.rpm 5b4419c03a50591cfed5f9c02c81ece564649d20a58d99abacd804c0fa83881d RLBA-2022:2910 new packages: hunspell-be Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-be. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-be-1.1-23.el9.noarch.rpm 8d0061e0a50c475297b5e5b2d32617eed40116c3242ca9957b250278039342b3 hyphen-be-1.1-23.el9.noarch.rpm 66eb397cbb264b99a5f69f7eed9a1f09a22c571da616330ffff3969ea7b9b895 RLBA-2022:2911 new packages: hunspell-ber Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ber. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ber-0.20080210-23.el9.noarch.rpm 84992758cbc66349ef2feb283be4d725eafc4a39d7a68d90fc23abee7748baf6 RLBA-2022:2912 new packages: hunspell-bg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-bg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 RLBA-2022:2913 new packages: hunspell-bn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-bn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e RLBA-2022:2915 new packages: hunspell-ca Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ca. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ca-2.3-19.el9.noarch.rpm 98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d RLBA-2022:2914 new packages: hunspell-br Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-br. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 RLBA-2022:2916 new packages: hunspell-cop Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-cop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-cop-0.3-21.el9.noarch.rpm b5365fb78d385167fcc261b408bb36f1ed06906339910907274eea9c84777f88 RLBA-2022:2917 new packages: hunspell-csb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-csb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-csb-0.20050311-25.el9.noarch.rpm 9759bc89de0385d48fc2254d5ae24ce303c30416ab497ff58c36da76271991e1 RLBA-2022:2918 new packages: hunspell-cv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-cv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-cv-1.06-9.el9.noarch.rpm 68db95b419ef15007b38771ebb2d44b1955405ff6fb6aa582a80fd67f97685ee RLBA-2022:2919 new packages: hunspell-cy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-cy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 RLBA-2022:2920 new packages: hunspell-da Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-da. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d RLBA-2022:2921 new packages: hunspell-de Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-de. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-de-0.20161207-9.el9.noarch.rpm 3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495 RLBA-2022:2922 new packages: hunspell-dsb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-dsb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-dsb-1.4.8-9.el9.noarch.rpm 12f43ea8f41447db9595956817c26c09abce0807358445e5bd617ac807ee5226 RLBA-2022:2923 new packages: hunspell-el Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-el. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 RLBA-2022:2924 new packages: hunspell-en Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-en. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-en-0.20140811.1-20.el9.noarch.rpm 2344e1c4e53457de1ea59abe7295363a65ebcc777f87f0e1b40408fdbadf1b99 hunspell-en-GB-0.20140811.1-20.el9.noarch.rpm f5e9b7e2d2ddd82070bbaacf15a1c285249cd7fd7834545fbc067b4d14149a91 hunspell-en-US-0.20140811.1-20.el9.noarch.rpm 77b40af385edc4dcd9118c5d58e595a6dff5735c263c066bdb93f2cc21bc182d RLBA-2022:2925 new packages: hunspell-eo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-eo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-eo-0.20100218-8.el9.noarch.rpm a547315ecca1f52d4855880d0ca6edffbcf86989ea6267250ac2b1354fcc589c RLBA-2022:2926 new packages: hunspell-es Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-es. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 RLBA-2022:2927 new packages: hunspell-et Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-et. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-et-0.20030606-27.el9.noarch.rpm 801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90 hyphen-et-0.20030606-27.el9.noarch.rpm 4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab RLBA-2022:2928 new packages: hunspell-eu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-eu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-eu-5.1-4.el9.noarch.rpm 537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38 RLBA-2022:2929 new packages: hunspell-fa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-fa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c RLBA-2022:2933 new packages: hunspell-fur Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-fur. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-fur-0.20050912-24.el9.noarch.rpm 2861dad40134e36a5171610672698daae5ed03d4fdf7e95e392b94896148a0c1 RLBA-2022:2930 new packages: hunspell-fj Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-fj. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-fj-1.2-23.el9.noarch.rpm 329dd11b662d286d35435095d3a5ef2eca7a5de06e0c4986cacf29c2018ef406 RLBA-2022:2931 new packages: hunspell-fo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-fo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-fo-0.4.2-16.el9.noarch.rpm 9a10a443dc3a7300312aaabfda7030755a406b8da3e17f8ddf7339eb05a9af5e RLBA-2022:2932 new packages: hunspell-fr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-fr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 RLBA-2022:2934 new packages: hunspell-fy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-fy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-fy-3.0.0-10.el9.noarch.rpm 8910d36a64de74647b3db225432d8b12a6bcabbf9c1b466f0a64c95f77853577 RLBA-2022:2935 new packages: hunspell-ga Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ga. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ga-5.0-10.el9.noarch.rpm 5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73 RLBA-2022:2936 new packages: hunspell-gd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-gd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-gd-2.6-18.el9.noarch.rpm cc1ef13aaddebf19ce008b66194308d814a569cc977c1cc665691d24e0fb7197 RLBA-2022:2937 new packages: hunspell-gl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-gl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-gl-0.20080515-24.el9.noarch.rpm 21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28 RLBA-2022:2938 new packages: hunspell-grc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-grc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-grc-2.1.5-24.el9.noarch.rpm 653603dc75aa09b2a5012f20dfbd5e176a90435ee5bea0c3e048130d9d6657ec RLBA-2022:2939 new packages: hunspell-gu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-gu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 RLBA-2022:2940 new packages: hunspell-gv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-gv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-gv-0.20040505-25.el9.noarch.rpm 7b30fa2954f2740bed478ed50a8b599ab3875799add5d8ff8cdde741c05921f7 RLBA-2022:2941 new packages: hunspell-haw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-haw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-haw-0.03-9.el9.noarch.rpm 4d953b9e7c0e401bc5ab653e245036ba2d542b99bcc9feb912e3afbd47c998be RLBA-2022:2942 new packages: hunspell-hi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-hi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 RLBA-2022:2943 new packages: hunspell-hil Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-hil. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-hil-0.14-22.el9.noarch.rpm 124a244d928483ab2780f3fabf95ae7c527c7ec6b255e5af5a289c00ba7b56f0 RLBA-2022:2944 new packages: hunspell-hr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-hr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f RLBA-2022:2945 new packages: hunspell-hsb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-hsb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-hsb-0.20060327.3-20.el9.noarch.rpm 4621d2beb7900024f0b9b1660f41cabcb86fc0f789bc61cf672beebac4e635f2 RLBA-2022:2946 new packages: hunspell-ht Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ht. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ht-0.06-21.el9.noarch.rpm 00fc65193b4d027fb27ced0c8385c9cabc5f7820bb381589dadcdb4d3397c53e RLBA-2022:2947 new packages: hunspell-hu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-hu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca RLBA-2022:2948 new packages: hunspell-hy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-hy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-hy-0.20.0-21.el9.noarch.rpm e2d990454959473ed576f26af1db6d0af8b866ca6ce9253d15814944d513b0d6 RLBA-2022:2949 new packages: hunspell-ia Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ia. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ia-0.20050226-24.el9.noarch.rpm 7a4530aeb72bf593ca31a5baa1735a05af38c87f157248f755ec2e5fba466b06 RLBA-2022:2950 new packages: hunspell-id Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-id. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 RLBA-2022:2951 new packages: hunspell-is Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-is. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-is-0.20090823-22.el9.noarch.rpm f71821769833f2cea0459ac21d1bf837af2a6a8f577158adf6a28533f144be85 RLBA-2022:2952 new packages: hunspell-it Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-it. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f RLBA-2022:2953 new packages: hunspell-kk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-kk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-kk-1.1-22.el9.noarch.rpm c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417 RLBA-2022:2954 new packages: hunspell-km Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-km. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-km-1.82-9.el9.noarch.rpm 45256a87e25d2491d526a0061c927624e85973113d33eb39bfbdcbd3d1daa3fe RLBA-2022:2955 new packages: hunspell-kn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-kn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-kn-1.0.3-24.el9.noarch.rpm 57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab RLBA-2022:2956 new packages: hunspell-ko Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ko. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 RLBA-2022:2957 new packages: hunspell-ku Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ku. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ku-0.21-26.el9.noarch.rpm c4304b21c9e1e0920784f2658805b670ef588efa3a44bedbf8bc7aa6c0ded5c6 RLBA-2022:2958 new packages: hunspell-ky Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ky. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ky-0.20090415-24.el9.noarch.rpm be593c9259cbcf14d251ddd5da8d4d0970b6c322f0f1de2a925810b6b403f6cc RLBA-2022:2959 new packages: hunspell-la Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-la. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-la-0.20130331-19.el9.noarch.rpm 039e36a149132e2a6c0ec4eebacc12cdcbbaaba909d29a1dd7781089553aec74 RLBA-2022:2960 new packages: hunspell-lb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-lb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-lb-0.20121128-17.el9.noarch.rpm f49cae2b8801453c6d91649066231a603a54785041f5d6b9de43017ee4adbd70 RLBA-2022:2961 new packages: hunspell-ln Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ln. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ln-0.02-22.el9.noarch.rpm 23eeaae0067c01be61c6ebdb2bde09b070e77f0dac26238a78cb6bda756be376 RLBA-2022:2962 new packages: hunspell-lt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-lt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 RLBA-2022:2963 new packages: hunspell-mai Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mai. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mai-1.0.1-23.el9.noarch.rpm 151ae1c7202de3569d075dc01f4ca08a9793a49ff65aa8b58f13ebd1b21d3df6 RLBA-2022:2964 new packages: hunspell-mg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mg-0.20050109-26.el9.noarch.rpm e384657f05eb9179575e991dbab798de33e0d15faeec3fb88a3c1919e6d251f7 RLBA-2022:2965 new packages: hunspell-mi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mi-0.20080630-24.el9.noarch.rpm 74289457e7ad5e6fd6446b7d1e521fe80ecd1f9391ef47602c4a097bcbaa4adb RLBA-2022:2966 new packages: hunspell-mk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mk-0.20051126-25.el9.noarch.rpm 5569f02499ffe408afa292e4ee61d9193bbb488cab4661f262214ac38ff95135 RLBA-2022:2967 new packages: hunspell-ml Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ml-0.1-26.el9.noarch.rpm 775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff RLBA-2022:2968 new packages: hunspell-mn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mn-0.20080709-24.el9.noarch.rpm 22cefac062a6a42b7389ccfb41715cad7d9ee9a1f43d77aae74aaeae80695511 RLBA-2022:2969 new packages: hunspell-mos Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mos-0.20101130-21.el9.noarch.rpm 80a965199a80b9c5ff865d89ff88369c8913ac5c9b53f50ccbd77204e9957e2e RLBA-2022:2970 new packages: hunspell-mr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 RLBA-2022:2971 new packages: hunspell-ms Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ms-0.20050117-25.el9.noarch.rpm f477493176679dab1c77a7032dedac2f54df556150c5e479b9b163deb9e77434 RLBA-2022:2972 new packages: hunspell-mt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-mt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-mt-0.20110414-9.el9.noarch.rpm 897b5583817f113f6148fe58a17326fdd62610a8f0ab7d16980fa1f03253f4e2 RLBA-2022:2973 new packages: hunspell-nds Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-nds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-nds-0.1-23.el9.noarch.rpm 9d48b316391b180266434307129549a4b54ebebf84a8037a3ab93c13a712ac5d RLBA-2022:2974 new packages: hunspell-ne Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ne. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ne-20080425-25.el9.noarch.rpm 30945f0cc3b1e5431e881a89cf4ad082155aeb02ea011a2ffef1c638dcb30cd6 RLBA-2022:2975 new packages: hunspell-nl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-nl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 RLBA-2022:2976 new packages: hunspell-no Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-no. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 RLBA-2022:2977 new packages: hunspell-nr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-nr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 RLBA-2022:2978 new packages: hunspell-nso Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-nso. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 RLBA-2022:2979 new packages: hunspell-ny Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ny-0.01-21.el9.noarch.rpm d09adcd6c721b35a31016d5f33fddbbde760f07f9e19ec3295f1ea19f2015b91 RLBA-2022:2980 new packages: hunspell-oc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-oc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-oc-0.6.2-10.el9.noarch.rpm 459925b9906ef7ce69d6fd23543b1cbbb54a4b372aa26406554de4dd8f1c315d RLBA-2022:2981 new packages: hunspell-om Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-om. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-om-0.04-23.el9.noarch.rpm 5b62280873908eae7f96a44e341a39e489cf11918b0ca8de5ea2840fd46d0f13 RLBA-2022:2982 new packages: hunspell-or Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-or. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f RLBA-2022:2983 new packages: hunspell-pa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-pa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b RLBA-2022:2984 new packages: hunspell-pl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-pl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-pl-0.20180707-9.el9.noarch.rpm bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3 RLBA-2022:2985 new packages: hunspell-pt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-pt-0.20130125-18.el9.noarch.rpm 80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b RLBA-2022:2986 new packages: hunspell-qu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-qu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-qu-0.9-21.el9.noarch.rpm d6dd888ae20712e0eee43aaffe08f718c975baa709da43b8fc39856a25d72ad7 RLBA-2022:2987 new packages: hunspell-quh Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-quh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-quh-0.20110816-21.el9.noarch.rpm 02e16dd7c3c8cbd93f0ede166414d490199bfcabd29a98339e33303564c182cf RLBA-2022:2988 new packages: hunspell-ro Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f RLBA-2022:2989 new packages: hunspell-ru Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ru. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 RLBA-2022:2990 new packages: hunspell-rw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-rw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-rw-0.20050109-24.el9.noarch.rpm eb12e129ac81d2c3bed39f9c94b20fddf1a978b8bedf65dda8f34f3277579c62 RLBA-2022:2991 new packages: hunspell-sc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sc-0.20081101-27.el9.noarch.rpm 1c625cf1bee1e80fae5aab483b649d76fdc13826d68ec8553f0ae8698df7a098 RLBA-2022:2992 new packages: hunspell-se Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-se. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-se-1.0-0.22.beta7.el9.noarch.rpm 729f47a9d4869140be87012022d5f3b9fc19ea00c6fda552faca004f1b880a43 RLBA-2022:2993 new packages: hunspell-shs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-shs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-shs-0.20090828-21.el9.noarch.rpm aa49d357410a48e937eb95eb94991a26501f8e9f8894ea67bf4dabeebe92123e RLBA-2022:2994 new packages: hunspell-si Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-si. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-si-0.2.1-24.el9.noarch.rpm 1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783 RLBA-2022:2995 new packages: hunspell-sk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 RLBA-2022:2996 new packages: hunspell-sl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd RLBA-2022:2997 new packages: hunspell-smj Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-smj. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-smj-1.0-0.22.beta7.el9.noarch.rpm 6bb30c3b01e151c582097f9153d0f779e14a35d51b04a02331044abd550b823c RLBA-2022:2998 new packages: hunspell-so Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-so. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-so-1.0.2-21.el9.noarch.rpm 4379c84abab98ed36569ec4a2959bd371c7eb9da322986a3cb6b421de2deb36f RLBA-2022:2999 new packages: hunspell-sq Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sq-1.6.4-20.el9.noarch.rpm 3efd854bc8df94fa6d1986422ef5b4d8faf838f36f03d8fb3783219dd6a863bf RLBA-2022:3000 new packages: hunspell-sr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 RLBA-2022:3001 new packages: hunspell-ss Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ss-0.20091030-22.el9.noarch.rpm f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06 RLBA-2022:3002 new packages: hunspell-st Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-st. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 RLBA-2022:3003 new packages: hunspell-sv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe RLBA-2022:3004 new packages: hunspell-sw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-sw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-sw-0.20050819-25.el9.noarch.rpm c40ae091e04f5f41304c2e3d4ca2c76ab92663a0ee361ae1f3df0a2c2a4f0031 RLBA-2022:3005 new packages: hunspell-ta Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ta. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 RLBA-2022:3006 new packages: hunspell-te Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-te. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 RLBA-2022:3007 new packages: hunspell-tet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-tet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-tet-0.20050108-26.el9.noarch.rpm 02c19c18ae5ef509754474acd042391fcbe32211df64465a521dc0e5f8b99e0c RLBA-2022:3008 new packages: hunspell-th Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-th. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-th-0.20061212-25.el9.noarch.rpm 400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38 RLBA-2022:3009 new packages: hunspell-ti Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ti. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ti-0.20090911-21.el9.noarch.rpm 763e96f82e72c63a4b9eb93e22c968534fdce2386be02caf9959434398ca94cf RLBA-2022:3010 new packages: hunspell-tk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-tk-0.02-20.el9.noarch.rpm 5b3227f1ab5732d30e645ae6f9d11bafcff74666d55e7ca107a467cae7d57810 RLBA-2022:3011 new packages: hunspell-tl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-tl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-tl-0.20050109-25.el9.noarch.rpm 5cc5f6f0eaf7f364e1ea775e9807a1a28832712253cf1ba253bdc249dab4163a RLBA-2022:3012 new packages: hunspell-tn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-tn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-tn-0.20150904-9.el9.noarch.rpm 34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8 RLBA-2022:3013 new packages: hunspell-tpi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-tpi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-tpi-0.07-18.el9.noarch.rpm 3df934fb77f7d9cec84a6767abdeba181072e486a6bcee76d375c052fc27ed93 RLBA-2022:3014 new packages: hunspell-ts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 RLBA-2022:3015 new packages: hunspell-uk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-uk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-uk-1.8.0-9.el9.noarch.rpm 48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f RLBA-2022:3016 new packages: hunspell-ur Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ur. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ur-0.64-23.el9.noarch.rpm 2c2e1be2a85662c2ca94867d187d597efcf4962d08f1074cea1c0b9abe407862 RLBA-2022:3017 new packages: hunspell-uz Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-uz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-uz-0.6-24.el9.noarch.rpm 53976e6887ae89d9054665faf484383cd18f79420515330fc5f9cc2699692459 RLBA-2022:3018 new packages: hunspell-ve Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-ve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 RLBA-2022:3019 new packages: hunspell-vi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-vi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-vi-0.20120418-9.el9.noarch.rpm 7f7b937fd4adbe0bbe57f086c8344479229dc19f14d983da0a04bc74d2ffe2aa RLBA-2022:3020 new packages: hunspell-wa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-wa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-wa-0.4.17-17.el9.noarch.rpm bdb9a267757c7e86564c2390915b5a0fe71f298697c77c0095212f749d7130a5 RLBA-2022:3021 new packages: hunspell-xh Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-xh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf RLBA-2022:3022 new packages: hunspell-yi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-yi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-yi-1.1-23.el9.noarch.rpm ed1aaf0ee4e1ab4518a68697ab6d3f85436d12fb40b4cbec2952d2339f8353aa RLBA-2022:3023 new packages: hunspell-zu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hunspell-zu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc RLBA-2022:3024 new packages: hyphen Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-2.8.8-17.el9.i686.rpm 3b5cdc851a6e1e758c0e58635fd029174f6d8af79becbdad05e61dbfaa5ef274 hyphen-2.8.8-17.el9.x86_64.rpm 6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994 hyphen-devel-2.8.8-17.el9.i686.rpm d6517907a100c574e4e88db0b0fca2098563b5658becac6630f10a9e94a4831c hyphen-devel-2.8.8-17.el9.x86_64.rpm c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 RLBA-2022:3025 new packages: hyphen-as Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-as. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 RLBA-2022:3026 new packages: hyphen-bg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-bg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 RLBA-2022:3027 new packages: hyphen-bn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-bn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed RLBA-2022:3028 new packages: hyphen-ca Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-ca. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b RLBA-2022:3029 new packages: hyphen-cy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-cy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 RLBA-2022:3030 new packages: hyphen-da Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-da. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 RLBA-2022:3031 new packages: hyphen-de Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-de. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 RLBA-2022:3032 new packages: hyphen-el Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-el. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-el-0.20051018-25.el9.noarch.rpm ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5 RLBA-2022:3033 new packages: hyphen-es Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-es. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-es-2.3-11.el9.noarch.rpm 1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218 RLBA-2022:3034 new packages: hyphen-eu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-eu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 RLBA-2022:3035 new packages: hyphen-fa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-fa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 RLBA-2022:3036 new packages: hyphen-fr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-fr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-fr-3.0-10.el9.noarch.rpm ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28 RLBA-2022:3037 new packages: hyphen-ga Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-ga. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-ga-0.20040220-24.el9.noarch.rpm e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc RLBA-2022:3038 new packages: hyphen-gl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-gl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-gl-0.99-23.el9.noarch.rpm 7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1 RLBA-2022:3039 new packages: hyphen-gu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-gu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 RLBA-2022:3040 new packages: hyphen-hi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-hi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 RLBA-2022:3041 new packages: hyphen-hu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-hu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b RLBA-2022:3042 new packages: hyphen-id Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-id. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 RLBA-2022:3043 new packages: hyphen-it Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-it. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-it-0.20071127-26.el9.noarch.rpm 201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9 RLBA-2022:3044 new packages: hyphen-kn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-kn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-kn-0.7.0-19.el9.noarch.rpm 084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41 RLBA-2022:3045 new packages: hyphen-lt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-lt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 RLBA-2022:3046 new packages: hyphen-ml Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-ml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-ml-0.7.0-19.el9.noarch.rpm 963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038 RLBA-2022:3047 new packages: hyphen-mr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-mr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-mr-0.7.0-19.el9.noarch.rpm 99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0 RLBA-2022:3048 new packages: hyphen-nl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-nl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f RLBA-2022:3049 new packages: hyphen-or Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-or. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d RLBA-2022:3050 new packages: hyphen-pa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-pa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 RLBA-2022:3051 new packages: hyphen-pl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-pl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef RLBA-2022:3052 new packages: hyphen-pt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-pt-0.20021021-25.el9.noarch.rpm 0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a RLBA-2022:3053 new packages: hyphen-ro Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-ro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e RLBA-2022:3054 new packages: hyphen-ru Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-ru. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-ru-0.20200325-4.el9.noarch.rpm ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6 RLBA-2022:3055 new packages: hyphen-sk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-sk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-sk-0.20031227-26.el9.noarch.rpm 7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34 RLBA-2022:3056 new packages: hyphen-sl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-sl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a RLBA-2022:3057 new packages: hyphen-sv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-sv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-sv-1.00.1-26.el9.noarch.rpm ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94 RLBA-2022:3058 new packages: hyphen-ta Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-ta. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 RLBA-2022:3059 new packages: hyphen-te Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-te. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df RLBA-2022:3060 new packages: hyphen-uk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyphen-uk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 RLBA-2022:3062 new packages: ibus-anthy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-anthy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-anthy-1.5.13-1.el9.i686.rpm ab986ab8f658ff1ba64716d3da86c11cd270660c91b08e9e0ba028b38d365dc7 ibus-anthy-1.5.13-1.el9.x86_64.rpm 92d132f11def65d48538222cf5ab69c20c007e4ae1b08bf34ab4b77784f22652 ibus-anthy-python-1.5.13-1.el9.noarch.rpm 69afbf81a7b99beb4ac74227259299f19beceb55ce57a222ef4dc00de56e4716 RLBA-2022:3063 new packages: ibus-hangul Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-hangul. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-hangul-1.5.4-7.el9.x86_64.rpm 31bcd082d993cb409cdc13d552a2dee47eaf7e365f62a5955c68156e77613868 RLBA-2022:3064 new packages: ibus-libpinyin Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-libpinyin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-libpinyin-1.12.0-5.el9.x86_64.rpm 181fb2dff669c9ad378b5080f45a6a9a64f8f3f1f8c3665051390213ceb65ba3 RLBA-2022:3065 new packages: ibus-libzhuyin Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-libzhuyin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-libzhuyin-1.10.0-4.el9.x86_64.rpm 08fbd180a939b28e77a7cce82573719503b3b16a39787cbd2d7b421cebc88ba9 RLBA-2022:3066 new packages: ibus-m17n Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-m17n. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-m17n-1.4.4-3.el9.x86_64.rpm 16568902162c583ac8680d24f1e0d49d6cdc35563de867e937e3f1acb3992224 RLBA-2022:3067 new packages: ibus-table Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-table. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-table-1.12.5-5.el9.noarch.rpm ce57c2ceb025d2e128c5f6c3c63be2ab14076b190391ecd690f094d8a7257c32 RLBA-2022:3068 new packages: ibus-typing-booster Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-typing-booster. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-typing-booster-2.11.0-5.el9.noarch.rpm 7d483c8521d18de4ff7b3c0312598ab185647a2904106820bc14fbaf85b7ef79 RLBA-2022:3069 new packages: icoutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for icoutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms icoutils-0.32.3-10.el9.x86_64.rpm 5f1532879a57df9e6076c9858658ccda3ef551f231d4e1f3481b3855a999766d RLBA-2022:3070 new packages: iio-sensor-proxy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iio-sensor-proxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iio-sensor-proxy-3.3-1.el9.x86_64.rpm 60614565fc39e7c45c3ccd45751830c8483796ff813215d87ae36c0c83e73b7a RLBA-2022:3071 new packages: imath Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for imath. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms imath-3.1.2-1.el9.i686.rpm 578ecc7035a230aae06ab295f0f39bd947828be94907d8ce9ce6fb884292db69 imath-3.1.2-1.el9.x86_64.rpm 4911dfe3104edd6b5fb8b3ca8afdd9eb9e00b74f228c2fd6987c30c99418cac4 python3-imath-3.1.2-1.el9.i686.rpm 98e587201e6cb9a036894f0bdfc8e3672ffc1b8221d0586ec53d24ecd798a421 python3-imath-3.1.2-1.el9.x86_64.rpm 65ec1d3e0b854473eafe6283dae7b1ac63731799bcc8986002de9af65a3c5425 RLBA-2022:3072 new packages: initial-setup Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for initial-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms initial-setup-0.3.90.2-2.el9.x86_64.rpm dd44707c68c222aa61a239140e144ab6d564791c1a1a28a27dc4bf968299eb37 initial-setup-gui-0.3.90.2-2.el9.x86_64.rpm 64c09af1b243a4abb335679614070ce243673b52f8f7dcfb499f963b5a518824 RLBA-2022:3073 new packages: intltool Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for intltool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms intltool-0.51.0-20.el9.noarch.rpm a31eb92a2aeb87418a2cbfa6328e1b37c72b3709e56a0d493cc4459941a1da72 RLBA-2022:3074 new packages: iperf3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-9.el9.i686.rpm 45339f8aae668338987f12c480c270708b4f1aee3530aee753268451e2f54cc7 iperf3-3.9-9.el9.x86_64.rpm aa1f19863a7b9f94a97eda4d8d55ab4e914f519ad109802ae42962eecc9bd9cd RLBA-2022:3075 new packages: ipxe / bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipxe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipxe-bootimgs-aarch64-20200823-9.git4bd064de.el9.noarch.rpm 025ba259d2f55592d92d5a46d421b9ce7c2a91adb2e8e07fe757b9d74bcb5c75 ipxe-bootimgs-x86-20200823-9.git4bd064de.el9.noarch.rpm 00192a333bae22063d4782365c916aad980288d7e2db31a24cc4fb9d7a1e58ee ipxe-roms-20200823-9.git4bd064de.el9.noarch.rpm 790a3f2840fcca13eb25fee64b11ccfa199084a66b317607bea6ad57d9e558a0 ipxe-roms-qemu-20200823-9.git4bd064de.el9.noarch.rpm 571c22893e831cd0b2f5b79611684a4a9b2d7443444188a8b3d24d2f01115f38 RLBA-2022:3076 new packages: irssi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for irssi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms irssi-1.2.2-12.el9.x86_64.rpm c561884727973df3f7a069688703c91c04ddfe1b167325a97a1707d3efdf1ab7 RLBA-2022:3077 new packages: iso-codes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iso-codes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iso-codes-4.6.0-3.el9.noarch.rpm dd178957227a5c9f831f17ba4f98a93261c919355df79c4a0b45e99e9082deae iso-codes-devel-4.6.0-3.el9.noarch.rpm a55808c96a7f7db4039952663c1c04be83e7623d0d67399c1cba824d055251d9 RLBA-2022:3078 new packages: isomd5sum Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for isomd5sum. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms isomd5sum-1.2.3-14.el9.x86_64.rpm 981e8444193ca2c8a6b91b35f20ce1bb124afcacb93962e1d28d6a80ceaafc57 RLBA-2022:3079 new packages: itstool Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for itstool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms itstool-2.0.6-7.el9.noarch.rpm c192f5bb9959a762f7e3cb6e86dbfa63709de34064baaba9ed24b299f0d77b20 RLBA-2022:3080 new packages: jackson-annotations Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-annotations-2.11.4-6.el9.noarch.rpm 662d7fe507e8a64eade7537774cc99fd6bcf6be71d4e6dfe43d0cc1b69268a46 RLBA-2022:3081 new packages: jackson-core Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-core-2.11.4-6.el9.noarch.rpm 66c0b0d69ea90a1b91d53d00d7a22abe42a9fb404c2f3f314e95ee9847cebbb9 RLBA-2022:3082 new packages: jackson-databind Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-databind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-databind-2.11.4-6.el9.noarch.rpm f69b9e4a0c7ceaf8dee7a3bae27921bf79a1d137c4bbd7eb8ada3823f3190627 RLBA-2022:3083 new packages: jackson-jaxrs-providers Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-jaxrs-providers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-jaxrs-json-provider-2.11.4-7.el9.noarch.rpm 77f9dd898572ff59bb1eba50a7c93d45763dd42588d48fc84608726044f1d1b0 pki-jackson-jaxrs-providers-2.11.4-7.el9.noarch.rpm b858f61f38495669ffe780b50150ec8b13c071c622a157705bd4edb1b3beb1ae RLBA-2022:3084 new packages: jakarta-activation Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-activation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-activation-1.2.2-5.el9.noarch.rpm dfaf539666f4713dafdc08c7edfcb410bf7f811293bb5e262eaa9a0d4874ed4e RLBA-2022:3085 new packages: jakarta-annotations Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-annotations-1.3.5-12.el9.noarch.rpm a7f70d6dfdb497888d71179e7c0a723c4654f76acf7712956d8412c550ddde62 RLBA-2022:3086 new packages: jakarta-mail Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-mail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-mail-1.6.5-5.el9.noarch.rpm 5103d1786163af1b0f7757ae9e7274a896f83f95ee2d343ae84c53ec9ad527d5 RLBA-2022:3087 new packages: jakarta-oro Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-oro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-oro-2.0.8-34.el9.noarch.rpm 8704e29366500c7dfcf348a6a0780a668a7c8646d22f078b80d853199dc32ea5 RLBA-2022:3088 new packages: jansi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jansi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jansi-2.3.3-5.el9.x86_64.rpm 7b9d644b0ad13aa9c0f7708124e5af593693913e54e605512f58d71459a5d0b5 RLBA-2022:3089 new packages: jasper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jasper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jasper-2.0.28-3.el9.x86_64.rpm dc1799540a58860b46cfbb4abf1b08609a50a28fe9b226a2cd65167b7254268a jasper-libs-2.0.28-3.el9.i686.rpm 852130e71f05ec3fb892a4f35d59eeff105511a9f80c699c6a388d1e07b9ce7f jasper-libs-2.0.28-3.el9.x86_64.rpm 5eaa7bbe8f855eaa302766cd16d4222b8c54e2ae2937d8a5db506e1048bf58bb jasper-utils-2.0.28-3.el9.x86_64.rpm 5bd386eb121fa827cc9f65c0aeeb7599d2404bc1f6bfe0268715321f4335a039 RLBA-2022:3090 new packages: jaxb-api Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jaxb-api. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jaxb-api-2.3.3-5.el9.noarch.rpm 65f8f9705433b38b111f843813270812f5273b98a57e2ed4be072449ccbc3986 RLBA-2022:3091 new packages: jbig2dec Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jbig2dec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jbig2dec-libs-0.19-6.el9.i686.rpm 7de44052a2b5e537ecd15df068f89ad9264df5b0f292b5007be82d8a3a104751 jbig2dec-libs-0.19-6.el9.x86_64.rpm 8d8ec9c50784f2b98a9ac2f0d120b116a388c852933b41d34a096bd7e49d5f0f RLBA-2022:3092 new packages: jbigkit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jbigkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jbigkit-2.1-23.el9.x86_64.rpm 9596d19d3d486ed3dd8cda76e0267be01554b79ba212d5372593db25d1d31599 jbigkit-libs-2.1-23.el9.i686.rpm 67184db9070f6c8cc1b563d7f1e085423daacef26f3d86d65c6dff6f9ae39935 jbigkit-libs-2.1-23.el9.x86_64.rpm 2b605d8fb73df260c14dafb1bc7a742a0586fbadfecae113315230bf19979a56 RLBA-2022:3093 new packages: jboss-jaxrs-2.0-api Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jboss-jaxrs-2.0-api. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jboss-jaxrs-2.0-api-1.0.0-16.el9.noarch.rpm dd1b3386910657a1e71d18dbd09c54805e1e8bcd3dd2b51dddef506eb55135af RLBA-2022:3094 new packages: jboss-logging Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jboss-logging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jboss-logging-3.4.1-9.el9.noarch.rpm c61be8972f14bace66620885a8026fecc64f44901665273470dd0ae88de66e9b RLBA-2022:3095 new packages: jboss-logging-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jboss-logging-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jboss-logging-tools-2.2.1-7.el9.noarch.rpm 61d08c5c1d3edfd8d40b126f47ad9e17cc4c49f3bb2347ec8dd87555f04f2066 RLBA-2022:3096 new packages: jdeparser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jdeparser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jdeparser-2.0.3-12.el9.noarch.rpm 09cf5076b842aa6bcecf984ed3cf554575bd9456d889add8b13f2578235fe2a7 RLBA-2022:3097 new packages: jdepend Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jdepend. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jdepend-2.9.1-28.el9.noarch.rpm f7577a1506f4f0232dc6ffcb35902f1f53a5852b3e894c7e2e4b89f2db132248 RLBA-2022:3098 new packages: jmc-core Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jmc-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jmc-core-7.1.1-5.el9.2.noarch.rpm 28cefe2d6b069fd39dc5b9fe938ddcceb02ebf97c4fefb3e2cad84a10883c12f RLBA-2022:3099 new packages: jna Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jna. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jna-5.6.0-6.el9.x86_64.rpm 5de6706a2bc1154dd3571a92e295b3e4237e51903a06df5447ec524a4607e40a jna-contrib-5.6.0-6.el9.noarch.rpm 96f77846701b3b6cb271a77f4c719511f43934c99040518b1e98def7f15f8714 RLBA-2022:3100 new packages: jomolhari-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jomolhari-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jomolhari-fonts-0.003-34.el9.noarch.rpm c947d398959f60be15eeea68f4e1bbc32d10aa29fcad04152d80b92b31fc2c3d RLBA-2022:3101 new packages: jose Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jose-11-3.el9.x86_64.rpm 405cd1c00aecd1d9bb7ca085e4af0bf4023725754df9a6096df36ea086e98a8b libjose-11-3.el9.i686.rpm 4b0adc4191384d191fb8f03726574460445a54a1c08fdc2c32f931d9bc274518 libjose-11-3.el9.x86_64.rpm 28c04463df72fc361a1f83d9ed5ec5fed641df902847b7e5039ebfbcfa6e135d RLBA-2022:3102 new packages: jsch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jsch-0.1.55-5.el9.noarch.rpm 123a345d955d756e5ff7d599bb983ff955bb2d0ee60cc10344040790a843362e RLBA-2022:3103 new packages: jsoup Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jsoup-1.13.1-9.el9.noarch.rpm 75e744b58b0b413fb4f05ca0aba036e416ddd9c5ec1579a928ed477661e455bb RLBA-2022:3104 new packages: jsr-305 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsr-305. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jsr-305-3.0.2-5.el9.noarch.rpm 7199bc454e427504c7084b5c75529b6150f1e4cab9fc7e4e2621ce8c7de1a6bc RLBA-2022:3105 new packages: julietaula-montserrat-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for julietaula-montserrat-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms julietaula-montserrat-fonts-7.210-6.el9.noarch.rpm db387c7748ebc066e0fae2880329b8177b47e8f5f4fc04b4b9f9e8c6a8e0e674 RLBA-2022:3106 new packages: junit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for junit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms junit-4.13.1-5.el9.noarch.rpm 2a5753590012ed5d6b51f8cef92c821b34fa316695f7a710f5d057d42b745e17 RLBA-2022:3107 new packages: junit5 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for junit5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms junit5-5.7.1-5.el9.noarch.rpm 3228a66f87bfc070cacfe4985abefc458d84bffb6686bf0ecdc2d7178a955f92 RLBA-2022:3108 new packages: jzlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jzlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jzlib-1.1.3-19.el9.noarch.rpm a50e904363f5577889b04605528cc9bf12adf554d669e077909c336bda94f7f8 RLBA-2022:3109 new packages: kacst-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kacst-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kacst-art-fonts-2.0-27.el9.noarch.rpm e791687a3c5e9e837d797f71601095ed9022b8c6f6e21219cbb55519048538b6 kacst-book-fonts-2.0-27.el9.noarch.rpm 99440d6f3c6ff76b10757c3506caebfd4bb3804009b938dcfca2f7147693ec16 kacst-decorative-fonts-2.0-27.el9.noarch.rpm b2178fced875cfdeeede82fdaca5395453eeddf5913e8c372a5b96de53d6f827 kacst-digital-fonts-2.0-27.el9.noarch.rpm 02efb071e20fa55c57c16a60485cea7fce2afe0b6e4f3e3081abee711a42aa48 kacst-farsi-fonts-2.0-27.el9.noarch.rpm e32523fa43a0a14dfd9f06d799c53533083c2ddfd2cb5c5e4362a273ebe2032c kacst-fonts-common-2.0-27.el9.noarch.rpm 10cdf717a7acee1e51ebaa8f70aa9b45a53f9828fda1532ddf25add9ea6acadc kacst-letter-fonts-2.0-27.el9.noarch.rpm da05dc4a4baf91b1f6c849c86a595ae83442ee09f028ef4f24c3fa03fa0aaf3d kacst-naskh-fonts-2.0-27.el9.noarch.rpm 049cf317c791790b9c25c8e6f6d001efef71fa62c4e0558f942261027e329fbe kacst-office-fonts-2.0-27.el9.noarch.rpm 7b83333654b5162bb2148df28822ef0899e42328a7145a0db9cf5c136b32bc4b kacst-one-fonts-2.0-27.el9.noarch.rpm 5c70024db77c8948b707e8787db54aeb1e1cb4e13e5adb3b6df1c42dc75f4c86 kacst-pen-fonts-2.0-27.el9.noarch.rpm cc8fd86dec4148915dd87484e0cdf8ee4224c54c30feda1cec49e2ce0dcc31fe kacst-poster-fonts-2.0-27.el9.noarch.rpm fbadd674df8c15a90c4b2a3b65a12941b8233c2ff3603a442639d9bfe59cfe41 kacst-qurn-fonts-2.0-27.el9.noarch.rpm 8ee6642be2458987a6c1628992ec4c3a4ef7ae91243d6d843859ac552285a194 kacst-screen-fonts-2.0-27.el9.noarch.rpm f15c0ece7a160ccd896a352d553fe47b6447b35a1931d3fb75fdd71bc46b52a0 kacst-title-fonts-2.0-27.el9.noarch.rpm 96720a93abafc5eab36790b30651d8f7ac775320da5c2692adc923d713fbc3f5 kacst-titlel-fonts-2.0-27.el9.noarch.rpm a69307c6a8786fe5b10f6c67de962be6701bc919c5a01ef9e08b3aa4c16b817c RLBA-2022:3110 new packages: kasumi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kasumi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kasumi-common-2.5-36.el9.noarch.rpm 76d48f5f5b94470188d190ed35c0c4e5fff81e2e848abd41b198f463f5a7efb6 kasumi-unicode-2.5-36.el9.x86_64.rpm b1330860800ba7cf3953360189482c1ece37b8f76fce4709013ee6a03413c7fa RLBA-2022:3111 new packages: keepalived Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keepalived. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keepalived-2.2.4-2.el9.x86_64.rpm 3b7219363a88cc76fd7e985df0c88c7e0a4fade103b357f7752e969832c558da RLBA-2022:3112 new packages: keybinder3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keybinder3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keybinder3-0.3.2-13.el9.i686.rpm cac5227ed6e7082fe098d6fa05041df2863efc8c05704b720d6cb88e14a64380 keybinder3-0.3.2-13.el9.x86_64.rpm 0bdbd7ed5bb46e7dd780b3797cbbae1bc68f5a0a110639ebe59bf5a4719ad1e2 RLBA-2022:3113 new packages: keycloak-httpd-client-install Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keycloak-httpd-client-install. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keycloak-httpd-client-install-1.1-10.el9.noarch.rpm dc472168d12c000d18a7f680047f8be1a5dafb88eca1dcec8569daa1ba97af66 python3-keycloak-httpd-client-install-1.1-10.el9.noarch.rpm d90658e7cb4110d8a43bc32db1d16be5a1e31fb6caff3ab993bf887d308b5a66 RLBA-2022:3114 new packages: khmer-os-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for khmer-os-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms khmer-os-battambang-fonts-5.0-36.el9.noarch.rpm 9fb75792babbdb8e68965ba28a35817e76f993cf833f43b2df417f535e69c286 khmer-os-bokor-fonts-5.0-36.el9.noarch.rpm 9b3b3426481e224df7021299d3c58cb05f44f596cdc6e86b45b29355c6afb73c khmer-os-content-fonts-5.0-36.el9.noarch.rpm e1ad432ba58d8ffe219203f40c8087af4c4b205f74cd3c1547608442000dbb44 khmer-os-fasthand-fonts-5.0-36.el9.noarch.rpm d804a9eb0aa6151ff7a99bddbc42947a3a0a6075cac9e05a2cc57eb87402ded1 khmer-os-freehand-fonts-5.0-36.el9.noarch.rpm bf4ffd911101f6675639abbd7c20b9a1802a06f436e1a5d6350bcc647f73be07 khmer-os-handwritten-fonts-5.0-36.el9.noarch.rpm c00faa39dcb95c521c7383c023145739d7675461c432a3357acfba7a5f9a002a khmer-os-metal-chrieng-fonts-5.0-36.el9.noarch.rpm 705fdb3d2ab2999001c023b453051c14496822a86bf250a7a269b1fa82b22da7 khmer-os-muol-fonts-5.0-36.el9.noarch.rpm 5a28752970fb0b450808f10b8e1481c91572e38a11c898b974e1829d579a5e58 khmer-os-muol-fonts-all-5.0-36.el9.noarch.rpm c3b1707f7290e2ac274ac263b7de187c41c8e8aff08150a9dae7ec436af923b9 khmer-os-muol-pali-fonts-5.0-36.el9.noarch.rpm d2de0ed0cddc9b6dacb9ead6718797124d490af65540f0957ab664581992e95e khmer-os-siemreap-fonts-5.0-36.el9.noarch.rpm 34530de9d239459edaa96468448bdde6a30681c9177d71633910a659610446af khmer-os-system-fonts-5.0-36.el9.noarch.rpm 8272088d3c878c34647a46c2a4323652996ac739b201b528904597c02986365d RLBA-2022:3116 new packages: lame Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lame. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lame-3.100-12.el9.x86_64.rpm 417e6c51e7a8cc97bb320e53cbca62048c8e7713e33cee0b041d1af079584c64 lame-libs-3.100-12.el9.i686.rpm 370751aa6422f52e351e03f76aa3af12bbd1cb13b378555256d199855ffda8b0 lame-libs-3.100-12.el9.x86_64.rpm f4aac40d2863cd00268479ad7ae30a88947f41ad218c9c3b6b794fb3c80b8363 RLBA-2022:3115 new packages: ksh Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ksh-1.0.0~beta.1-2.el9.x86_64.rpm 3ce230e14c4ed81c488c76be78b90603d4441fafe173a1062828c53084222896 RLBA-2022:3117 new packages: langpacks Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for langpacks. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms langpacks-af-3.0-16.el9.noarch.rpm 295fcda4e6d88cd132f4012a57668b3779f20ed1b195ab2600f10796e82bcbb9 langpacks-am-3.0-16.el9.noarch.rpm 188143cc2e2af204ea2f74640ed6fa7149d7c0a08bc2691b964ba400703570dd langpacks-ar-3.0-16.el9.noarch.rpm 88289da083feb7a05aebb64c139dbf8d33b05f76466b8b88e14f5b0a1c71e841 langpacks-as-3.0-16.el9.noarch.rpm 050889c2eddbe8b0b223be8e9b4d83e18522a5732fefd675d26a9b2d0a5d232a langpacks-ast-3.0-16.el9.noarch.rpm af89bca555089f5da59dcbb67842fe469c06f49cbb220b123d8e12639bb3ca24 langpacks-be-3.0-16.el9.noarch.rpm 7c9c0829fee599d5e69f93c86d34f4d8fd9a4c02614f07a7c3123bc8bbae8234 langpacks-bg-3.0-16.el9.noarch.rpm 97a424686ce05071b620b3753d3953c05ef0348a428085c31920991f30a8d46b langpacks-bn-3.0-16.el9.noarch.rpm 5c2872dbfc0f8932c88d511a0d119c0b52670bf0ea77765017d91542693c0499 langpacks-bo-3.0-16.el9.noarch.rpm 9201f2c51487a9bce84379cabdefe7c98cd6ee56b3aedf5848eced50b931c782 langpacks-br-3.0-16.el9.noarch.rpm 837150c444feeae9fa588acfa123eb3b8110454422b2591461b3d742d997ee2d langpacks-bs-3.0-16.el9.noarch.rpm d5bdc6fb7a1a694bb94807069005d4e64b661789863043ad83dba1df5391719b langpacks-ca-3.0-16.el9.noarch.rpm f68f6bbcaa9ea7a97439572176b46127f45f346a68eb32f8bffc20f3eba36916 langpacks-core-af-3.0-16.el9.noarch.rpm 3908d85ca204e138d86b3b26032a72b3c6443e66dc0b18c3862315f9e2f0ed24 langpacks-core-am-3.0-16.el9.noarch.rpm 0f4e280707751c664d51afe63a8840610ec1fe54d0d2fbcbc70cb96ca00ad78e langpacks-core-ar-3.0-16.el9.noarch.rpm bc3f877f0d21d75e377e24c9267a01a114128e972e4acebe8d1380776dbb7636 langpacks-core-as-3.0-16.el9.noarch.rpm 6beb3adefa6f35e664aa84fd9f257354e2a6801268e7ef023e29c163ddc8fdf4 langpacks-core-ast-3.0-16.el9.noarch.rpm 2e5f1f781c8ded1caee8e85f5cc3696ae85de1765cf52526ec77a7e3bac1af85 langpacks-core-be-3.0-16.el9.noarch.rpm a1af1284ac0c5870b5df09af0cdfdefe21cd8b90efeada420645fce715b36ef2 langpacks-core-bg-3.0-16.el9.noarch.rpm 2fbb4fd341069f6e4a61c4d8c73cc6b3f0746dcb8446465bbf5e77f2a1d7e2ac langpacks-core-bn-3.0-16.el9.noarch.rpm e8c7e4e7fead44dd96c7028b88e2f8cf52edc71eee9677826a03d0d10d1b641d langpacks-core-bo-3.0-16.el9.noarch.rpm c6c58a21a9af4add306f81792beb147a7ed6f74458d934d37540465705e4389b langpacks-core-br-3.0-16.el9.noarch.rpm 486ff4df2b01de13647c3377b84c5b1f3abb591ac7458b55a1b1e1c2a158b131 langpacks-core-bs-3.0-16.el9.noarch.rpm 2f3b7cdbf9856afd8467ec7eefb9186de9698355d4c7918a2155220a38997e79 langpacks-core-ca-3.0-16.el9.noarch.rpm 193aa70f96e7a9567aa580ba852906802c5a86e9c1fcc817fb4961a8409455eb langpacks-core-cs-3.0-16.el9.noarch.rpm 1d2ee55a82a6c5ecee350fbd2cbda44418d2ea3f1b7aabb76c4eb65f5baa9da8 langpacks-core-cy-3.0-16.el9.noarch.rpm 02b6b81adbd76754ab2caa52df8789e46eba30fc779cd87c880324977e08be6f langpacks-core-da-3.0-16.el9.noarch.rpm 549f3e5cc6cd3ca9d37a14c1bd69d9ec4d348fef7f80351132cd41df80c95f37 langpacks-core-de-3.0-16.el9.noarch.rpm 39b5118e7319eb3671f2f3899000fe933379e7c495e9fc14cd967e03c4176452 langpacks-core-dz-3.0-16.el9.noarch.rpm 7179ba1726ccff8d93115aba95fe12446e0e757db7734ecffa23340de3c4182a langpacks-core-el-3.0-16.el9.noarch.rpm e9924c60499aac5b88fdece983917c6852ed3e10a796577a5815451d2c36047f langpacks-core-en-3.0-16.el9.noarch.rpm 39a119cf4213eec89145959cecf5fb600e4ea55c13d8b3f530a493505a6a766a langpacks-core-en_GB-3.0-16.el9.noarch.rpm 1c2b2e44d7022da3c7aa5d42ba33278d6b72e040d483c2ff0f7437082d092a84 langpacks-core-eo-3.0-16.el9.noarch.rpm 245627298986208933bd04ac9becba2803035b88f9ff9b4f2feed7608cedd42c langpacks-core-es-3.0-16.el9.noarch.rpm ca2144b44cf5396bb043d6f737b277e8425eb4403bb57287cac796dda9d7154c langpacks-core-et-3.0-16.el9.noarch.rpm 282ccbb9288b1772c37dd040aed8fd25de7a980e223931df7245bcd9eabc6b4a langpacks-core-eu-3.0-16.el9.noarch.rpm f599e55dc9de31fe327165f7874c70c04228334f42a1bf22b3d55728baee4769 langpacks-core-fa-3.0-16.el9.noarch.rpm 5d66acf8f9c0523ac43ef10959d71b1ca83fca139ae58357b87481a4c6b32598 langpacks-core-fi-3.0-16.el9.noarch.rpm 0ce25b4e4828a6cbfb0c86f023d66054268157c2ab17621d20755fee397ec7cc langpacks-core-font-af-3.0-16.el9.noarch.rpm e68c21fd77b63c83c75cddd6c72ce531ad8f51864a66e9c379679b2ecbe05553 langpacks-core-font-am-3.0-16.el9.noarch.rpm 706d300c017646cd23b42b76a604ad06767923958a5ab604928badad4e6b77db langpacks-core-font-ar-3.0-16.el9.noarch.rpm 0f6f7b10f65e78d3bbd9fadd91ade3eef9c54e402146bfcb3b2091ad9e924f7a langpacks-core-font-as-3.0-16.el9.noarch.rpm ce12a4fb9db44e91fd9814d6cd124ae02073fd7f5f63dab309bdec6bb9aff562 langpacks-core-font-ast-3.0-16.el9.noarch.rpm 8c84c03a5c7d9f100f734842923560ec40bc9ab4872369cf9c63d631428df442 langpacks-core-font-be-3.0-16.el9.noarch.rpm c3869d62ab0111df32560d915e237027f977d01512af20aab16dd1994f0205ce langpacks-core-font-bg-3.0-16.el9.noarch.rpm 5d9e5f2a371fde432868d81692be2c18efd33c8f00449a5e27cd51408bc46850 langpacks-core-font-bn-3.0-16.el9.noarch.rpm 557a3559b818f904bd73fbcb45f22f9867d423f1172940002b51bfb09e41efb3 langpacks-core-font-bo-3.0-16.el9.noarch.rpm bf57b250c471100e240f0929fa35fc50a1560af713b009c7e612062075b4636d langpacks-core-font-br-3.0-16.el9.noarch.rpm 2a13cf6f80771b095ed03ec494e83904aa5635cdc11e7ca59e597e2364f6f452 langpacks-core-font-bs-3.0-16.el9.noarch.rpm a49eeaecd8a46d9a805a7b743ac06f67be93db5d118d0e4565433457fef38560 langpacks-core-font-ca-3.0-16.el9.noarch.rpm da8ab4b3598baa703bb4ae2776a2841bf64a38355ef9d3ada935cae1f7752b0d langpacks-core-font-cs-3.0-16.el9.noarch.rpm 184019c02da3cac743879cd8f1174de956ee1c78954604277d6af8c9b7d34e53 langpacks-core-font-cy-3.0-16.el9.noarch.rpm ed768a4c763371e09716949ab4b16c20a318200178df5ae4c404ba8091120697 langpacks-core-font-da-3.0-16.el9.noarch.rpm 7d7c0d3512dd78bb9f2bb3966ce751b89e8e16686746d4d340ed5f1e6312e64a langpacks-core-font-de-3.0-16.el9.noarch.rpm ad8f6110a0ddec04f0424c5683970d44b93605daf476879159b5a753ac2288e7 langpacks-core-font-dz-3.0-16.el9.noarch.rpm 1db865fc8b8d72e625a2dd1d1f9dc1f0419fc685ce0cac68053098b74507232a langpacks-core-font-el-3.0-16.el9.noarch.rpm 833bdaf0b84f6ee4ddd676b2747fe39e7d5d7556412c7f430289a8cb52c29eb4 langpacks-core-font-en-3.0-16.el9.noarch.rpm 509ab15479020654e24c0dab1e39fd98c144eed8cc50e0cc3b1ac612bdf82e36 langpacks-core-font-eo-3.0-16.el9.noarch.rpm ebbb160a0415263f61a03a423cc771c167610b7c39baf2fcac942c833e805ea8 langpacks-core-font-es-3.0-16.el9.noarch.rpm 051889a3d435cc399aeb89e3580e4064fa8e484a77337bd10af0772d2b44e5b4 langpacks-core-font-et-3.0-16.el9.noarch.rpm af510c8803e8f6dc3aa348914ebb73dfffb23ade56763d4ff6a0c3f6715396c6 langpacks-core-font-eu-3.0-16.el9.noarch.rpm 7f7e9dd733b185b057a4cc760cfe59aeb0223e581c163379e78816f7bd152468 langpacks-core-font-fa-3.0-16.el9.noarch.rpm 3d5c9a74191e92ec67554602a77d6b86db9024e89494b154b2ae6f807c9563cb langpacks-core-font-fi-3.0-16.el9.noarch.rpm 78f51e4a9ff3729f9b54c388524f745e09849cef5fc40f16608509e9227c4042 langpacks-core-font-fr-3.0-16.el9.noarch.rpm 69c79a55aaaf2f810e3645d9c1572572630ea7d38fbf88e84e9b48e90bdb1e4a langpacks-core-font-ga-3.0-16.el9.noarch.rpm ff3fd8f711fec36fa980d135370605636c855b15ee4c8cfdef4d0863b2c49727 langpacks-core-font-gl-3.0-16.el9.noarch.rpm a1145d419c991b9528f85e1ece16ef334a8c0c323d453d1f1583b77e980bb0ee langpacks-core-font-gu-3.0-16.el9.noarch.rpm 4b2f78ca7b935e31ae03ca86282474db16bcb724f8a010396eafe5b913536d96 langpacks-core-font-he-3.0-16.el9.noarch.rpm c4c23d1bba3e7d9626546b8b350b59840a8e3f6490d441b28cfd69af6274a492 langpacks-core-font-hi-3.0-16.el9.noarch.rpm f6ed2c37a0fb42beb96b47959890adb519027592d7e03e07b1b75fb131152a19 langpacks-core-font-hr-3.0-16.el9.noarch.rpm 23e04e0f4d8c9e81360693a9d7b364c87eadbbf0574937a1148186a985e7b300 langpacks-core-font-hu-3.0-16.el9.noarch.rpm 9c9e2097e53b8637bce20f8245b48e2c228ef48bf06e34553ac7feece9e6ba13 langpacks-core-font-ia-3.0-16.el9.noarch.rpm 8f6e92d5d5766d47e46ff2d36949883ab666dd605de32947899168f898ebae39 langpacks-core-font-id-3.0-16.el9.noarch.rpm f3b959f7ad54b518ebff77dffa872bde9f88436592f77298d14c0cae5970b1db langpacks-core-font-is-3.0-16.el9.noarch.rpm df1cdfea39bdd905ad76cc56c4228533c07692eeb76645da4acecc7ab7778513 langpacks-core-font-it-3.0-16.el9.noarch.rpm c2b7b96e1e41db6b031ae12de79cce5ad0a1290dcebbbf8f4f03b4695790cce5 langpacks-core-font-ja-3.0-16.el9.noarch.rpm f5814ca3a3df35e3e9e7cdddf61a5bdee2d214c50b0dce33056926e1bed26056 langpacks-core-font-ka-3.0-16.el9.noarch.rpm a4416a14e46059dfdf21d9b7f72995ecc38f87d093101b7998f190c97e624572 langpacks-core-font-kk-3.0-16.el9.noarch.rpm a309bd3c05585daa011fd5568012b0df9da2ca5728cca14178e249f4e228cd69 langpacks-core-font-km-3.0-16.el9.noarch.rpm c2dd2624f5f7ca87d7c7834a871d0d96a5f934b33dd64443e4917c3712818947 langpacks-core-font-kn-3.0-16.el9.noarch.rpm 769716696358cb82433fc04df1517ac2d617971f9bde63984ecf1222072157ea langpacks-core-font-ko-3.0-16.el9.noarch.rpm 5bb002a794c420f30c5853fd8a96bb1aa6457d5b3a6a53ad9ce04a8f249d2c3b langpacks-core-font-ku-3.0-16.el9.noarch.rpm 04015a1899875bba22fc6da6bc8240867b8f86e3ec9e4344707986c2bb577e86 langpacks-core-font-lt-3.0-16.el9.noarch.rpm 542029a20ef425373ada7d0a3beceef1aff1a7f768ff843c681ffa3dcb58f39f langpacks-core-font-lv-3.0-16.el9.noarch.rpm 0df50751d75ffa7696c310531bdd16e1afe6c14078e5d1d510370dec2fdeea10 langpacks-core-font-mai-3.0-16.el9.noarch.rpm b734fe5773826de334999530c689caf31078092a66e1e3f1c666bd2c587b85fe langpacks-core-font-mk-3.0-16.el9.noarch.rpm bfe066433462146158d4faedc0a6988cbfe97c5b0354163c8832afc4caadb088 langpacks-core-font-ml-3.0-16.el9.noarch.rpm 5aab937ef43cf560f02835b2875b5bcd20a0fc460bcc174b009741e884435a25 langpacks-core-font-mr-3.0-16.el9.noarch.rpm 390b662eb4fdf647d797ef331be1137536aa9f33e5cac6dec435926ffef9fbb0 langpacks-core-font-ms-3.0-16.el9.noarch.rpm ea55c03fae3e8020b4f6fa45c66b81a8370ff16eaa79be9a09b6323e8889db7f langpacks-core-font-my-3.0-16.el9.noarch.rpm 4d565e23de47a98e38065561ec2769cc60da1720ca9c35a3879fe52d489a9a4e langpacks-core-font-nb-3.0-16.el9.noarch.rpm 26b2cd59f7c66107fdcec4dac1c27fe56981ab2457cc8bfbc9cc7c5424491a48 langpacks-core-font-ne-3.0-16.el9.noarch.rpm 7236e9c05cad09e68a89a55bd596d480028ff961b13b171a79df90fcf079ef70 langpacks-core-font-nl-3.0-16.el9.noarch.rpm 5f164a23a03f23c6774874f99e449599a7f6d74448a0938b4714cd7601a6c086 langpacks-core-font-nn-3.0-16.el9.noarch.rpm 1de52a965fea14255181370d6702134f093e95fb93c7a3e91b70535c2b4983a0 langpacks-core-font-nr-3.0-16.el9.noarch.rpm 99ff1a33aea5ea995bb1aaa7bdc84a8303bda9d99ed4caa446d90236cc5874c4 langpacks-core-font-nso-3.0-16.el9.noarch.rpm 8b1a8a2e9ffcceb79577ce0c08001c4cfc40f377140dcb82785b1ecf98803259 langpacks-core-font-or-3.0-16.el9.noarch.rpm ea03adc166ec92d566e290a7566457151e9224a2db22480c3f4bce9210bdd5d5 langpacks-core-font-pa-3.0-16.el9.noarch.rpm 02dba674ddda95cf01168175255c19c871faf8c72d55ae327dbae93539e751ea langpacks-core-font-pl-3.0-16.el9.noarch.rpm be88f8769850cb9b7f694c943e9e9875b759781d282e8c51bcc6ccc4f3dd62e6 langpacks-core-font-pt-3.0-16.el9.noarch.rpm c8aede284a001a6ce2cca61d4e6173ca6e8f41294319e65a895f7fa932735bd3 langpacks-core-font-ro-3.0-16.el9.noarch.rpm 7b099d68a8b69d758940d8adc52104cf520fe08b3d8eb37192ed68d20deed3d7 langpacks-core-font-ru-3.0-16.el9.noarch.rpm e0e4977d70d4d0e5e948adaeddda588e033c0aceb511861dd761dce3ec9067c5 langpacks-core-font-si-3.0-16.el9.noarch.rpm e85cae9313286ea94bb1051f0dc2b7e79d936f1c4c584851a9688b1811e00901 langpacks-core-font-sk-3.0-16.el9.noarch.rpm 658ab85d1d70e8264344407ca2c5527f10d4ba8d21fd8dc88a51bda885e0f9ef langpacks-core-font-sl-3.0-16.el9.noarch.rpm 090ed99c61fdfb3656b14769f6db6eb20826f726b8ef55f585636d67ee3b27c4 langpacks-core-font-sq-3.0-16.el9.noarch.rpm 81af32686fd1486836dc6536b95efc0255e654df229d8062931d498526d52593 langpacks-core-font-sr-3.0-16.el9.noarch.rpm 922cd69354437f21c3d77821859a3c36a1a791e7741fe54a6426f7d18c214b3a langpacks-core-font-ss-3.0-16.el9.noarch.rpm 5ae2b1c4c410b7d5ef4a4bc41ebf5024905d2e4c42986c16162e5c2f7692ee87 langpacks-core-font-sv-3.0-16.el9.noarch.rpm 71424c9075e3262b9d92d61e9c665dbb01f8a350758c988516826efdf35c3ed7 langpacks-core-font-ta-3.0-16.el9.noarch.rpm 57551674e4fd14383892edfb90fdd19315a2c17efc9771adaaf22ed9d3030287 langpacks-core-font-te-3.0-16.el9.noarch.rpm e4f4c538018996ba39969657b202e491d65e87de271564fc8e9c781656e77125 langpacks-core-font-th-3.0-16.el9.noarch.rpm 9ddc34f9a9ca94c33d2c619f1951983e953a1720ba0a62d2ffcf4298ee230093 langpacks-core-font-tn-3.0-16.el9.noarch.rpm 3933b31fa6b302020e42ce39fc0d3a9b173782b7b8123bc365fd3333c0ecb674 langpacks-core-font-tr-3.0-16.el9.noarch.rpm 8a57e76aa50a68800c180668f44e8cd80444d2d9b391cbca4886a19638d57b44 langpacks-core-font-ts-3.0-16.el9.noarch.rpm 4c4bdfc47a3ed63e7b9a54951aa67508665a3f8f2c94506e105e95816432b301 langpacks-core-font-uk-3.0-16.el9.noarch.rpm 2f9156e97c0ac2d2f4e3c4c3564c560e45010a1de40dd138ec69f62cbf7631d0 langpacks-core-font-ur-3.0-16.el9.noarch.rpm 6b42444e3af30d2913e6ac411a5733e1dafe0e6b7aad72ab59df7712208ce6c5 langpacks-core-font-ve-3.0-16.el9.noarch.rpm 870ad012e83432c77195cf59de0885766b966d424999e9a45c5a86d4eb0940b7 langpacks-core-font-vi-3.0-16.el9.noarch.rpm 34f72a70a3fa24a36b3196440c86f3fadb2eb6714158260d778861a045512c9a langpacks-core-font-xh-3.0-16.el9.noarch.rpm 3bc11f4352e587c69ca954c316de0bcad7c6ac495802ed86f271de719eda6525 langpacks-core-font-yi-3.0-16.el9.noarch.rpm 5f8d15d6e88c09d96518d292d58c86fa69062111539b7ad629d424a1e9d38df5 langpacks-core-font-zh_CN-3.0-16.el9.noarch.rpm d157d7768a828663fc76129831440f4cd065de12203f86351848056349fcfd93 langpacks-core-font-zh_HK-3.0-16.el9.noarch.rpm 353741ee6bda6b41d761955ade343a8bf463a8ca6035bf0aab1883558ae07508 langpacks-core-font-zh_TW-3.0-16.el9.noarch.rpm 62db3aeadf1ba629510c25687ad39973724ed58448e384a45534ec5e6d4610ce langpacks-core-font-zu-3.0-16.el9.noarch.rpm 3c91d6dfce28024538502676b7a5808eebf893447653f4a9be559f0e82ac0974 langpacks-core-fr-3.0-16.el9.noarch.rpm 5d118bd31770aa5dca7ac7b059a3570855117f74952367ef7237a307f502f402 langpacks-core-hi-3.0-16.el9.noarch.rpm 95c5c9418852d4bbbc7cebba8f2e503839a5e3fda064e5bcfcbfa6208761c008 langpacks-core-ga-3.0-16.el9.noarch.rpm b896176ee6e88a73c80955e132de8c0ba8006237b2dab15514fe1a1af0d441d9 langpacks-core-gl-3.0-16.el9.noarch.rpm da83ec057fd8ed1c87055c6b03e12204560ed63a3a5b784642086cc7d039f0e5 langpacks-core-gu-3.0-16.el9.noarch.rpm fca2624a6db9fa32af8c840f9168b1ec977b1403b70629c6326b293e91b17493 langpacks-core-he-3.0-16.el9.noarch.rpm f743d8bd9bf365a19041c88ed2c5d7ce2ad53d0a4452ddea4925bb99152e616a langpacks-core-hr-3.0-16.el9.noarch.rpm ceb857b7bd119f28b562d38ef95193873ae9d938d3256a2cacfdd6fe95e7a66a langpacks-core-hu-3.0-16.el9.noarch.rpm 18b489902a14c7949e4ea1996732f9fb72f162e766fd04e904541cc03cd9b084 langpacks-core-ia-3.0-16.el9.noarch.rpm a1c31f046d24660f8449372a0eecfd1a406eb81398e112fdcf39156384785213 langpacks-core-id-3.0-16.el9.noarch.rpm aeec24ae85622ba773db5b9b723491878f9b340c5a98f7fb6471ff7af39d3f66 langpacks-core-is-3.0-16.el9.noarch.rpm db05ef394ecf2d950812e0f20d55968c6e2a15608cb6acdda76ee0f272d7aa51 langpacks-core-it-3.0-16.el9.noarch.rpm 3ee2e34348ee9074f430d75824b5b42d80b9425f148811edc0567f5cb698ee61 langpacks-core-ja-3.0-16.el9.noarch.rpm 5cd588fb9621bbf406731a500ff92e4f7be9653b3b415d06e545360d7fa7a99b langpacks-core-ka-3.0-16.el9.noarch.rpm 6a07809725c1352e4c196fa4546e99ea2a13ea84379236153e5ff2209da1509d langpacks-core-kk-3.0-16.el9.noarch.rpm 4c5a08135cfbfeb15f811cccd0323fe243f1e5f46160e7c80b7485b656236d66 langpacks-core-km-3.0-16.el9.noarch.rpm 5825e2ce1460aeb9c70f6c24a664a40186a42fc33fc8534839a08e5844d1e4a3 langpacks-core-kn-3.0-16.el9.noarch.rpm b2efa051aab646e8ad57620eaac8b2c440444a88c1f525501ce651d075884c6b langpacks-core-ko-3.0-16.el9.noarch.rpm 7e65953ce16d42f0bc4e4bc4510b49ee5e79705f4c5c9921188433545eaa11a3 langpacks-core-ku-3.0-16.el9.noarch.rpm f4b052b15a5f78fc0ebdd2c839f51bf35c8f9d3c38c126fd49293d7f9cba6d87 langpacks-core-lt-3.0-16.el9.noarch.rpm 5a9449973e5105cc117317a4810239cdb8b03b7df43efe59bf7ca3d9ce477c68 langpacks-core-lv-3.0-16.el9.noarch.rpm f2dd16c75f61a7511dc438130598a8d36d860a8493aa51e7d26d77769bc42545 langpacks-core-mai-3.0-16.el9.noarch.rpm ef4d3a7f6825711093c7df6a12fe3917ecd6ada4c61b08f7e82d2c968d5810bf langpacks-core-mk-3.0-16.el9.noarch.rpm 47279306636831fdc45f86bb5d0700d25f5c4573b66ecb3dba9ee2d3707374f6 langpacks-core-ml-3.0-16.el9.noarch.rpm d0c942f898643c98bc77f528ebe102d5abaadba194dee25e5c15ee3457325cc1 langpacks-core-mr-3.0-16.el9.noarch.rpm aac9db5eee0b648e9882ee2ae95ed50cbd81fdc624ee188809a18e1fea5382d1 langpacks-core-ms-3.0-16.el9.noarch.rpm 5cc7ce3d61ed2321a1b9cea917704175021482ed00e1b0ee9c470c61808912f6 langpacks-core-my-3.0-16.el9.noarch.rpm 4cddbd0514135daf207825973933aace25b203b278daa48a860b5bda10f67cc5 langpacks-core-nb-3.0-16.el9.noarch.rpm 8d20e1ae89e6b1051669e38cff27cb7c85170875c8087fbd4a96dca3b6f719e5 langpacks-core-ne-3.0-16.el9.noarch.rpm 47cadb25dee249c6af1b22751d7f4b69f57bea828a5917b7a52531c63f38e405 langpacks-core-nl-3.0-16.el9.noarch.rpm 5c22e79b43f60da286fde90e01f8e57325a2305b9a8e92a009868d60e709113e langpacks-core-nn-3.0-16.el9.noarch.rpm a609299b16966a1589b603f6935cfaad1ab189e629d43d6819e6229c5b27eff9 langpacks-core-nr-3.0-16.el9.noarch.rpm 7354e43ffbd9c43240cf0b31decddf66c197a4a458cec70b231738f5a58f432e langpacks-core-nso-3.0-16.el9.noarch.rpm e0167f1d9a9e59fd5a2bfb4fd2af307e0ec0378fd154f3ba7e0119c9c4801d45 langpacks-core-or-3.0-16.el9.noarch.rpm 75293d1259b3b52432dcb4a3ae5ea23bd4c91b0d1f80b93c476cfd13edd3ba3e langpacks-core-pa-3.0-16.el9.noarch.rpm 32902d26d0f191afaa8716d1b398d1abb74a850f994d294e459248a2d2191e93 langpacks-core-pl-3.0-16.el9.noarch.rpm 434fa590796ebf0606d8dc1832d0aa54be6cd7dc106e297c65ca2935a147d33b langpacks-core-pt-3.0-16.el9.noarch.rpm 47826a98e7e383f28df119003ae9c20278a5c98899a3777796dc645f8a7d5e1d langpacks-core-pt_BR-3.0-16.el9.noarch.rpm ed06add08cabbd428094e2e86303000178e65b4de267f0890949859920e8f264 langpacks-core-ro-3.0-16.el9.noarch.rpm cc5df04747af1e43c1d3cd2fceb81f649bfe479555ee8161f558ad3b9c128523 langpacks-core-ru-3.0-16.el9.noarch.rpm 5285b52c39b28a1664dd63debe57212f143976ad847120875a603207fecdbba6 langpacks-core-si-3.0-16.el9.noarch.rpm df02b8cee8cccbaa0353c9db13042c500f9fe9ee0faa21bcb3780688f4b59178 langpacks-core-sk-3.0-16.el9.noarch.rpm d015aa064ff059f24e39fa32367c3310ee62dbacfb2ee16c3b731468ae7e87f1 langpacks-core-sl-3.0-16.el9.noarch.rpm 741c47f8083f6f892b8ce6d60ee09402800620320da88171dd296b235b17fee0 langpacks-core-sq-3.0-16.el9.noarch.rpm ba818cbaeced0f115acc79b195a4350ec3c23b5f850469d6d27d85639ed1418b langpacks-core-sr-3.0-16.el9.noarch.rpm 4f64f9c9ec8c8be7eca9cc3e83e75541450122c99d061e04a76558b5ccc9efbd langpacks-core-ss-3.0-16.el9.noarch.rpm 0cb0ceaa62194de5bac17a3abd9cbb8dace92c3f6dc1a6bbc79d380ff2f25f99 langpacks-core-sv-3.0-16.el9.noarch.rpm c78314e8b74afdea72cbd3cea3787189ce94eff738fdfa56d53bbc7d6629c7d6 langpacks-core-ta-3.0-16.el9.noarch.rpm 31434deec643fb47f028752e9e8a68b55063a242fee416ab37e8d38cdf7b45f0 langpacks-core-te-3.0-16.el9.noarch.rpm 5136fdda8c0a4c0a68185fa8d8b6c0944bb2a37d7faf3917e900035a53dbc9ea langpacks-core-th-3.0-16.el9.noarch.rpm 8e2c238e5821f543bb422aad2f9114371b5e8a8cea6cde1fad415522856d7f9e langpacks-core-tn-3.0-16.el9.noarch.rpm 7e8c17e10d0079447d90e9c75ab1348a6f47d0d5dc6e3cfa2a6d2ddb7b6d1d4f langpacks-core-tr-3.0-16.el9.noarch.rpm 32f0134ae1a1ea28e2dae7baf8ea072bf04b1d7497d36ec1a4cee91d1d6ad624 langpacks-core-ts-3.0-16.el9.noarch.rpm a0cb93779b46fe4a7bf0fd76b73123ae5c97106277bfe20b6ea3d43a326a02a3 langpacks-core-uk-3.0-16.el9.noarch.rpm 5f5d30a5648861679987605517e26630f4498dd09c2d86dacd327bcafa1cf120 langpacks-core-ur-3.0-16.el9.noarch.rpm 862d17b30d8a0ac6e5b9a47387cdb376fb8eb39543e0b5abd396deb1a1c7b8f9 langpacks-core-ve-3.0-16.el9.noarch.rpm b9fe237445e52de90240aa72ea828b3d23a03796163050525653de9bbb46442b langpacks-core-vi-3.0-16.el9.noarch.rpm a933d7cc404062004529469dd740d7f5f2469a8606bc151e4f37ea31f864fcc1 langpacks-core-xh-3.0-16.el9.noarch.rpm 8e779cc31b00576e74e7deb976d6455b22531562fe32b7e982c344af8a60bcbd langpacks-core-yi-3.0-16.el9.noarch.rpm cba285522c98c34cafce47ff55cf5fb9572e9b160b230499bf78fb26ac0b5d3c langpacks-core-zh_CN-3.0-16.el9.noarch.rpm 0b676e12d5d6712c58c08f1e353ebfadd39f8184d52397f189dcf782c807cbda langpacks-core-zh_HK-3.0-16.el9.noarch.rpm cb436e5c5487b8af73b7c80028524666d322d1c86a6c90c93e556616b93d5730 langpacks-core-zh_TW-3.0-16.el9.noarch.rpm 3b180a791572c1e218a516af22c2f4a234e13f360c2bd0cb18edef6aee499dac langpacks-core-zu-3.0-16.el9.noarch.rpm fcb616effd535db0d88f6206d66738c3c0e494000c7d1e6900fb1ed71042ac49 langpacks-cs-3.0-16.el9.noarch.rpm 5ef553e463013ab5df4a77e4e448392e146fb64f4bff1cfdc027e73e8b5c457f langpacks-cy-3.0-16.el9.noarch.rpm eb73d9d9b0ebecc9063ec69fc5cc4f44884628c6663b0305a7191fd309b3ee00 langpacks-da-3.0-16.el9.noarch.rpm 023bc270118e920d59106dfde9d2ff8ce455fe835c982354526d135e6a6f66a9 langpacks-de-3.0-16.el9.noarch.rpm 96b421f490086ebcb7fe963369f95530fe41377d39af33706f3c5e608750b60c langpacks-dz-3.0-16.el9.noarch.rpm 24f18d9eed0c0e276955f85f9a2531a8700b8154c837473f7267f35cf79d4ebc langpacks-el-3.0-16.el9.noarch.rpm a7de98c2e438a228a1f59d4b42d8dd39ceb167157f3ab8c672aedaee28af2631 langpacks-en-3.0-16.el9.noarch.rpm 591882981e4e5835b47c21b591e63f3907f1aad59764e4479c0bcc8b6ae51ab6 langpacks-en_GB-3.0-16.el9.noarch.rpm 6c30d3e49cb90bdf8cccc7a636c4439f8e219afc29125f76f6e5c635d45dc936 langpacks-eo-3.0-16.el9.noarch.rpm 57a02b7749c6219dd568b96360c534b894826c81cd9fc9511454f792ef62d28a langpacks-es-3.0-16.el9.noarch.rpm eed4b5403c5c0047dba6e8c62294191343065908bf20d50358362dc20efdd666 langpacks-et-3.0-16.el9.noarch.rpm 0fb5d09b477c40df17f28ba0834e3dcf4637093e3c38a39235e0f54120af07d8 langpacks-eu-3.0-16.el9.noarch.rpm 661e496809d1002534c8243359c027e56105550a395099efab2ced1264884d49 langpacks-fa-3.0-16.el9.noarch.rpm e029de9b7617a63324abcbf3f9107c9f0a4220281022fdf4a35d7deb0e1f47ce langpacks-fi-3.0-16.el9.noarch.rpm 48c8b97e70006d2367b9b523b964b76383d78fa6b0b1753a098c7d173add9846 langpacks-fr-3.0-16.el9.noarch.rpm ce6e99107a62ef8bbc2b7ae05328c5448dfcd5695c0d4ebe69e34075a437f70d langpacks-ga-3.0-16.el9.noarch.rpm 5071c301345228b9efea6d15b1a3308c6bc9eef7356eb9dd9e565350153288ae langpacks-gl-3.0-16.el9.noarch.rpm 1e26f4f7583852dcf2528fc6918ec9d99c11789a6fd14f7225dc83447cdb37c3 langpacks-gu-3.0-16.el9.noarch.rpm b760bfe86bf99a0bc0589471c5a37b8a5a3cd1d0f0ab75ae6b61189afe5d50da langpacks-he-3.0-16.el9.noarch.rpm 52fbce2034023f11093cfed880e6c5bac5f6d212798ed96aa9b74d1f03ea953e langpacks-hi-3.0-16.el9.noarch.rpm 11ffa93eb287237b224ed864179594b5c177ee1a435636ebc4e9e9ac16f5020e langpacks-hr-3.0-16.el9.noarch.rpm a3642337d64b630b74555a1e84727adc2b363686c957565246a916726915e83b langpacks-hu-3.0-16.el9.noarch.rpm a5a00bba9dd51810b2fcf53a9f1a576c0772e634167e243744b258aa0a954d3f langpacks-ia-3.0-16.el9.noarch.rpm 0e45604b78bf51a3955e71b709d525175912773cd740c6d3b1070a78ecf0e9a0 langpacks-id-3.0-16.el9.noarch.rpm 65b3615ed0002c1d0a147908a9cc3b8503438d90018dbf2edc865382046902c3 langpacks-is-3.0-16.el9.noarch.rpm 4c2085f396970ab20573c7db11ac09b0f2591c7281ad6729560ab8e67abe3a88 langpacks-it-3.0-16.el9.noarch.rpm 3f5652190e8bb810b335ad9c2f49a85740f4a622dc967fbeaa0acb6d5bf52e1a langpacks-ja-3.0-16.el9.noarch.rpm 2bd94b44715f9a205deb62936739533984ff8bdd2031b802f218b054497d1b24 langpacks-ka-3.0-16.el9.noarch.rpm 6224d40970f2dafab580702d7cf23fde3cce7da890b059f2fcc6279fe6ffdb52 langpacks-kk-3.0-16.el9.noarch.rpm 153c577ad96cb3acc8b24e8a5817667ed1471444cc2904d3a193a80fc3b8b299 langpacks-km-3.0-16.el9.noarch.rpm eb2fb5ed6756745044950efa3b368e44c3b80d56cbc578cc6969dac2643c0ea8 langpacks-kn-3.0-16.el9.noarch.rpm 9c3d92859f7cee7b05d366f2e7b4ab785bad53f9e1062d51f7fa4621c7996968 langpacks-ko-3.0-16.el9.noarch.rpm 3294e549413e8c1ddb0d21b87c16d2c57c08d0a28a5d170f0d8ba3f854ef4028 langpacks-ku-3.0-16.el9.noarch.rpm 8b49a842cba1bbd0a6243f0af222214a9fa5cb4838464d3bab1fe12e8a664bbe langpacks-lt-3.0-16.el9.noarch.rpm e3c5129d69bd6aa6650c4b204fa7cc3ce3ba4a3d6db8f67f41110414e0401cf6 langpacks-lv-3.0-16.el9.noarch.rpm 2aa2420ed38392bdd5c7eafb5d5726e91c2a0a3b49e7581e829425e12897914b langpacks-mai-3.0-16.el9.noarch.rpm cc36e2f4f42e6660dce6592d0387f95ed6bfe0b9ea03c244ae9acdca9c7104d4 langpacks-mk-3.0-16.el9.noarch.rpm 5e931debc3032308d754defd1e55553e21681db41fa7a4c55dec821a738e3bba langpacks-ml-3.0-16.el9.noarch.rpm d143c98424ecd756978473d0e5f9ae918148ac9f3575481d3b889c2ba301db69 langpacks-mr-3.0-16.el9.noarch.rpm 111b190e645f4d05befc1cae2e7b49b4de769493832df93b1e8e8dccc0dc642f langpacks-ms-3.0-16.el9.noarch.rpm 9f311bb5c3cb6f72b4159918bd4444e071ac7de251ae3a10c917c39a814c61ce langpacks-my-3.0-16.el9.noarch.rpm cf1d730f9254fc49c99ae8790de7eb534834ce5492a7b199ddcd6e85e5f7000c langpacks-nb-3.0-16.el9.noarch.rpm 72ca706585234a6900288f0b91d078a51b3502435f137b5820d7a4d709b8f35e langpacks-ne-3.0-16.el9.noarch.rpm 2aed7a059c4a46f559a77170bcb36e3ce681204ac3a16c1544b267680988c239 langpacks-nl-3.0-16.el9.noarch.rpm ca4ca411a52dee255a8a1d31ac97a734f4f358e67e8379dde03902391dcf5d89 langpacks-nn-3.0-16.el9.noarch.rpm e75a932706641deecab47be576b80fe99d915fa0476f3267d68849587a0a7202 langpacks-nr-3.0-16.el9.noarch.rpm ba7060d50e2795be40b166285013b9b68a6df19ddb83b1d3e7ca151bfe5dbf1c langpacks-nso-3.0-16.el9.noarch.rpm f12a64d270f4443825dfd954ecb15a032a1c8ad5a25fdd66ed74570f38bf97aa langpacks-or-3.0-16.el9.noarch.rpm 3399992ae406a9869e049f47a0e22ceee10e087a6dc959d215e8de2f635c21af langpacks-pa-3.0-16.el9.noarch.rpm cab192440537f54d3407b00b1f827c5beecc184dfac1f28606ed0c70305e627f langpacks-pl-3.0-16.el9.noarch.rpm 807605e33e3ff60c4a2f0c40e51543dce16fb67780f2f8c2b23de43cf246a7ef langpacks-pt-3.0-16.el9.noarch.rpm 622dd74889c4765ebee036fbe6d055c326d71678ae3f93bbc49e6f21ee162f48 langpacks-pt_BR-3.0-16.el9.noarch.rpm 2ceb2719f9bfb779bd7874d0961a76785259286206f087d95577158cf6e340e6 langpacks-ro-3.0-16.el9.noarch.rpm 54f08655c837e598f4fc9ec1b7197918db1786c4a8f88887bf8601d2887ebd11 langpacks-ru-3.0-16.el9.noarch.rpm d5d3db5295816767a695fe170047bad093463ceefd62935830bb25e4c6b0b08d langpacks-si-3.0-16.el9.noarch.rpm 169b0dc60c5b4dc441e8446b4cfd4659a340324aa2bebe68fd01a4e329ed3f8f langpacks-sk-3.0-16.el9.noarch.rpm 74380d25c4eb6eb22f9ebd4d0c04cc0d337886a1b7a2adf3d33e5b8336f87e5c langpacks-sl-3.0-16.el9.noarch.rpm def3078301060403fcced79413fda197a6a8cbecf97c0122968184ac8f83e5c4 langpacks-sq-3.0-16.el9.noarch.rpm 7d681f147e162b539307c0c26d7af7867a894fab0a33c042a498c0315dbbc2a4 langpacks-sr-3.0-16.el9.noarch.rpm 9e2d6691d81975e4dc15144cb48af32eb3023af9f35db4efe1684c2aa3b693a5 langpacks-ss-3.0-16.el9.noarch.rpm 10e27bda386153372b03715e88c7c7afa0fe75375f30ac744752b1f17e8daee5 langpacks-sv-3.0-16.el9.noarch.rpm bb7510c6af2d476946864dc12638fc1716ef49b0248728e48940dcecd5347dd8 langpacks-ta-3.0-16.el9.noarch.rpm 4e051b5dcb4ce10c94d55f2c5d5cc24f1c09cd705af61b51436e2e44c70c40e9 langpacks-te-3.0-16.el9.noarch.rpm 2dabc8ecb97df0a5c8486f46e439907d8535720f0c37b8028e790e5972299340 langpacks-th-3.0-16.el9.noarch.rpm ad395b750c82e64aa71b56dc10e5435996f5bd0777b24856010790bc3b0d5950 langpacks-tn-3.0-16.el9.noarch.rpm 102cf9b6a2bd6f31fa8cc87c826e7b1be9d8b10c822bb4f2531bda4bf4c00cbb langpacks-tr-3.0-16.el9.noarch.rpm 3d1eda13fe541dc4562b8e81e347c0e138e3ccfc8bc1468854eb749df5a51cb9 langpacks-ts-3.0-16.el9.noarch.rpm 46e35afc77f2692210085e8b5bba613f0e9108e0637eb66ca7574ca0b53f1066 langpacks-uk-3.0-16.el9.noarch.rpm 05293e9c10d79264f39a3c7f5f926977ddf3f7f698ca2d1b59dedfc07409a5ee langpacks-ur-3.0-16.el9.noarch.rpm fbf037b911f636f6c04d43ad5b2904331ff2784519469fdb7045287678c3241d langpacks-ve-3.0-16.el9.noarch.rpm 92e855e1c3f3e5eb52f348525bd86685cdd847f26eb3fa4ba577c1008ff8dcaf langpacks-vi-3.0-16.el9.noarch.rpm 624b785333c9587326aedbf1b43ced6e5cce3a6750fd308de3d6a7a114657f59 langpacks-xh-3.0-16.el9.noarch.rpm f1f0468a75e32e83be84d94236032b169d3eb9f5a794d7f413efd29fb6e6aab6 langpacks-yi-3.0-16.el9.noarch.rpm 78397df9310f8696ec51d8e041d7930863f95a60a7bafa96fc9a94618a919eba langpacks-zh_CN-3.0-16.el9.noarch.rpm e3f7d868b93efa040b8e044a64fb67c09de82d78c3bd69391a33cce60675f02e langpacks-zh_HK-3.0-16.el9.noarch.rpm f606960f23f7db4e872e359eefe2e8f9d9cf8a02be9fe34e170270ead8d21996 langpacks-zh_TW-3.0-16.el9.noarch.rpm 3d88a4abce16d0bd18c107ea0e86f2b8d074abbb003e9549492158954fe045a4 langpacks-zu-3.0-16.el9.noarch.rpm 48d8ccf74425be8fbb68e8d6fb5102a0a768f2ae3b9c5ad1d86420fcb7160bf9 RLBA-2022:3118 new packages: langtable Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for langtable. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms langtable-0.0.54-4.el9.noarch.rpm 1560d5022abbc0a1eba93bc177c3d092968178a1847e6c83403536bb3470c0d8 python3-langtable-0.0.54-4.el9.noarch.rpm ef91f4287e03a212219573ff97afe054571404f7d6ed30b3c74801f77217b9c6 RLBA-2022:3119 new packages: lapack Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lapack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blas-3.9.0-8.el9.i686.rpm ebad46f4e2fad45e534ba6bbc9df153d6842b9c169f4f6c0f978bddfbb498f13 blas-3.9.0-8.el9.x86_64.rpm 851f8672e184a9559b9eac883f9d313effc98b229b5c6998f08fb95af576ebbd lapack-3.9.0-8.el9.i686.rpm 7dfc8c6a5d60dfc23303e3dfd75e97fd1882106bfc3d5cc4aa0458e6d02484d6 lapack-3.9.0-8.el9.x86_64.rpm 1a536d4d6cb79bd3f8aa0d31d941fc58aac684438279fcdf27fce903ba9d1357 RLBA-2022:3120 new packages: lasso Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lasso. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lasso-2.7.0-8.el9.i686.rpm b934f1997ec363f8e2956bafb2b6d10f9fc121f9e0d2ca4944fe19bc21e0c434 lasso-2.7.0-8.el9.x86_64.rpm 7eeeb43b7b5d00e565534830cefa11aa3cf0e787a017dd0a9ab23c9f7c236906 RLBA-2022:3121 new packages: lato-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lato-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lato-fonts-2.015-14.el9.noarch.rpm f2d21e33e88eaeb3966ec400278279de1b5067d0e8eb08fb0e1647a35c3f6551 RLBA-2022:3122 new packages: lcms2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lcms2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lcms2-2.12-3.el9.i686.rpm 0bb687a9dc452f451f0dd8ea188ce2caf347abf1c0f1a992bdd45afcf59a1c7d lcms2-2.12-3.el9.x86_64.rpm f7cf689b4e88369620ed8f2a8077126e728935b3a78d8c16f44f81d6b38bb1d1 lcms2-devel-2.12-3.el9.i686.rpm 3a586695430a41b98abca198dfea61476b667406f3e0f01da88b907c925d60cf lcms2-devel-2.12-3.el9.x86_64.rpm acdf2128872c75f4a9f26537ec94113bf08828408e14c3ba9b90ca8c3abc1c98 RLBA-2022:3123 new packages: leptonica Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for leptonica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms leptonica-1.80.0-4.el9.1.i686.rpm 6c9873fa0a49c1b6051c5192888f7a5529408042d89b2f8fb5431982a3a453b6 leptonica-1.80.0-4.el9.1.x86_64.rpm 5ad6e3210ab480dc1b42d200d11c8c0df1a1772e3ed549b87bdede4074fb9e44 RLBA-2022:3124 new packages: lftp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lftp-4.9.2-4.el9.i686.rpm 6aa420195797d630af13a02179e70a6d6e325ba25389fbd53fb91fe2f55f8e90 lftp-4.9.2-4.el9.x86_64.rpm 7f439c7364d18e6e0e4d87ee41b663f904ce7976372a3f4b1cb0df2c4cbdd67e RLBA-2022:3125 new packages: libICE Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libICE. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libICE-1.0.10-8.el9.i686.rpm af047dc8772a2cae6655bc6a322ddd8de9bb06773e4eb3fc8cf2a03adad2d7a8 libICE-1.0.10-8.el9.x86_64.rpm cf73a6d5729b2888f5f629f45106e47ae673c72b902955784d3abef7c9a13696 libICE-devel-1.0.10-8.el9.i686.rpm 70ff7b8c0814a6ed5887639d36ea90b24498d5ff1e50df02151445b4bced2f2b libICE-devel-1.0.10-8.el9.x86_64.rpm eff8e3cb5370258f1a04205effe1741b0cbbbe728027145cb220ebb0fa15352b RLBA-2022:3126 new packages: libSM Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libSM. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libSM-1.2.3-10.el9.i686.rpm d116c1eb65b9ca72c8c64f3d7097044a5494ebaee7352893d9b1046a73562788 libSM-1.2.3-10.el9.x86_64.rpm 86af171005be195c9296a65c0f86b744f608c0ec7e14459d0836e33a8d0129f7 libSM-devel-1.2.3-10.el9.i686.rpm 9bb836e5c6eafe0dbf4dc40c6f505f78341e1c0a61d95d57d54a145e763e619a libSM-devel-1.2.3-10.el9.x86_64.rpm 306a7e15d3095532a378382c308875bde7881a43746e71d2659bdad8a02df561 RLBA-2022:3127 new packages: libX11 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libX11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libX11-1.7.0-7.el9.i686.rpm 1d79c9c277e81e11540d4f6b5a8849b7a34a1a8bf1bc1a201976a02b01389063 libX11-1.7.0-7.el9.x86_64.rpm 8162e2d25c807c473f8559f042bbebed27fe6acb9ec8df46d243850f3a687fa5 libX11-common-1.7.0-7.el9.noarch.rpm ada046fb459ae18b792e570ecbdf3bc89afadf45b0f7e10761fdd00c061c4c62 libX11-devel-1.7.0-7.el9.i686.rpm 4d2274b809b32edd13fa196f03e4745032af9d01deaaa13855d86b4df7e2b470 libX11-devel-1.7.0-7.el9.x86_64.rpm 50b556b29899f258863b35dd099ee7d2b5731b3216eb552e23e3d20f9c45c7e4 libX11-xcb-1.7.0-7.el9.i686.rpm 38bafd811016229ce899b546722b399d5487026126ba14d1ed26804839f4b30e libX11-xcb-1.7.0-7.el9.x86_64.rpm 7b9e224a0c54f1a4eae7eba0d86ff1cddf2117c63cf25f9be1d402d351cb40cd RLBA-2022:3128 new packages: libXScrnSaver Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXScrnSaver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXScrnSaver-1.2.3-10.el9.i686.rpm 58eb5c3c334afcb5e85a614ab4c82c485115b0d98afbf8f098f1a56e09bde6a1 libXScrnSaver-1.2.3-10.el9.x86_64.rpm 9f8ba1b5e19febf274a8d1de46db7c64fc223a42f1144b975321815813ac4b82 libXScrnSaver-devel-1.2.3-10.el9.i686.rpm 7456d09a85ba908c0cc6e141b93a38d30600c80bd568443463a59a6919c8f7f6 libXScrnSaver-devel-1.2.3-10.el9.x86_64.rpm 3f85e1afa903e62e1f8a85216ed85d741ad92b89eb5015fbb09bb8d0e7b7e126 RLBA-2022:3129 new packages: libXau Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXau. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXau-1.0.9-8.el9.i686.rpm 57cb9e6bbe5949bd4fa26f55e93840f35d530ace542ecd3d50273bd2e82c47cc libXau-1.0.9-8.el9.x86_64.rpm 335f72e8070dd3179d129af94b6bd272c0b4a4b83ffa38522e393ee3706acf4c libXau-devel-1.0.9-8.el9.i686.rpm 102e1dfb6a0857ddff98d102e2c7ff4b52579f6737b5ba1c471c3c13348c66a6 libXau-devel-1.0.9-8.el9.x86_64.rpm 0a47fab42690110686d56742aa81b4d1cca60ebd6eb10f4d5c8a7edcfce41011 RLBA-2022:3130 new packages: libXaw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXaw-1.0.13-19.el9.i686.rpm 85068d34af740eef32a9c6ce7b4528ebf85d6226d6cf352d51561e1ccdab92be libXaw-1.0.13-19.el9.x86_64.rpm 85266646b841f398a2ee65797419cf89f2bc7cacc89295e243936e936a4338d4 libXaw-devel-1.0.13-19.el9.i686.rpm 1b07b4ddaa7c23c6a856a76866f63d3a41c9b2d09f22b0369ba4161888fc4f37 libXaw-devel-1.0.13-19.el9.x86_64.rpm 21fd7f310ad107212607fb1cff9a3c2691c317843c0ba59c84cbd88ecd4e0107 RLBA-2022:3131 new packages: libXcomposite Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXcomposite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXcomposite-0.4.5-7.el9.i686.rpm 83c5832afc94953b00af288f62a3e646023e72351e25b7042acf3af8b1402602 libXcomposite-0.4.5-7.el9.x86_64.rpm d63a25a6ec5b44371569aaf0790e58ef88a7deae5a97c0824389c2e28212786b libXcomposite-devel-0.4.5-7.el9.i686.rpm 4da99bbc611fa5b4a114b1e7071672adbce0335f2368dc46f762693aa4e1d2cb libXcomposite-devel-0.4.5-7.el9.x86_64.rpm 0b3f223536564caf1463579dbbae8578a788b0b6e6ac9aa365e146f6c226658a RLBA-2022:3132 new packages: libXcursor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXcursor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXcursor-1.2.0-7.el9.i686.rpm 79ff6cf56df3da5fd843a664485d02831ca25c812d4554c4b60c39b5f13f7f1a libXcursor-1.2.0-7.el9.x86_64.rpm 311e8fa754d5897c8e790cca9ab281936f66e795704f7cbe18baec13f692608c libXcursor-devel-1.2.0-7.el9.i686.rpm 8b24aa4e0a967a7acee3b55267e0105fee81ededc1f008acaf8873dda7233aae libXcursor-devel-1.2.0-7.el9.x86_64.rpm 2e0135f7d4af771339ed4a7b179138b8af4a892da81e5d29b47cba9cd0016090 RLBA-2022:3133 new packages: libXdamage Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXdamage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXdamage-1.1.5-7.el9.i686.rpm bfa94f8edec93659c528174d3f93c8a603bb6c15fbda0db6c6003c951ef10d0e libXdamage-1.1.5-7.el9.x86_64.rpm e35fb4a9b632ca4226f4d2a81ffced45a23825149d6edcafcefb896c3a38e59c libXdamage-devel-1.1.5-7.el9.i686.rpm bd9fb6243077c017cabbd580ed82734a40512a1396a8d13e63fb031f1ab6415d libXdamage-devel-1.1.5-7.el9.x86_64.rpm a482efaecd2006efe7cb85588beacec03a36fabdfdcec2d4ed1b539acaed5cd4 RLBA-2022:3134 new packages: libXdmcp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXdmcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXdmcp-1.1.3-8.el9.i686.rpm 7ae237f0f1643a37171a33aac3ddc18ddd06280f2b6cfb4ff83934c4e588804d libXdmcp-1.1.3-8.el9.x86_64.rpm a9ca0c3bcebc9d7e882c55c444e342e04aab1a2a90a95aafca0eb1dd258e2d93 RLBA-2022:3135 new packages: libXext Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXext. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXext-1.3.4-8.el9.i686.rpm 4f7579380c046a045b0c75facdd87b7e15c3c6363a01e855e54713dda3679875 libXext-1.3.4-8.el9.x86_64.rpm 45c8e6d796a66e91b5b4230e493be44fdafe389592eb2cce6400d209b0ac5f9f libXext-devel-1.3.4-8.el9.i686.rpm 9fd81ea3cdb4b1a8514a66a9abd80ee0981b72d0cb4bff0fa3f192b0072c57ce libXext-devel-1.3.4-8.el9.x86_64.rpm 9112ebe132868a03ec755ee5824ced4c4664ea979f7a509c5d07fce2aa29930b RLBA-2022:3136 new packages: libXfixes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXfixes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXfixes-5.0.3-16.el9.i686.rpm cb72af73b2057af146be88b02d96942f6c36341e4f192400fff731919088841c libXfixes-5.0.3-16.el9.x86_64.rpm c2089ff858c950e403f302b071e2c6a871a424ac1ac8f6eb29bc24e61b692dcf libXfixes-devel-5.0.3-16.el9.i686.rpm a0db3ab53eefd615dd45ff479df77915ec1766256360365104e8efe9e3f50312 libXfixes-devel-5.0.3-16.el9.x86_64.rpm ae95e774652f6364e708c12ba259c37fef6bc4e25e898e8ba6d6112ee7443013 RLBA-2022:3137 new packages: libXfont2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXfont2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXfont2-2.0.3-12.el9.i686.rpm 09fd6f7d2433fb7b0587dbb7010a0d547b63030c397526040c38bb07de7b40ad libXfont2-2.0.3-12.el9.x86_64.rpm fdf69ba1bb50bcf1d182e51fe2ef943a06d60eff01d8df6d0ce94d943177063b RLBA-2022:3138 new packages: libXft Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXft. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXft-2.3.3-8.el9.i686.rpm 1912dfe8bd492369c8a865a9af23029386adea611f04c2f906665565036d6d48 libXft-2.3.3-8.el9.x86_64.rpm 7fd443896652bbc7685fbda98d2ddaea36cf9f4840b8c79fe77005dc1315e194 libXft-devel-2.3.3-8.el9.i686.rpm fb9f04690b0cb168e08d37d518c572e92960e48ebf240066ece0d55446e1d7b7 libXft-devel-2.3.3-8.el9.x86_64.rpm 7fb33dd8a3a88816c44f229704d2b38dc15c63b38c34aec57b37eda1b68d1626 RLBA-2022:3139 new packages: libXi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXi-1.7.10-8.el9.i686.rpm 94f0da337b2112dd7626b3a7f4c48bc8831867455dacb8fc8413eb3c4c7bdd22 libXi-1.7.10-8.el9.x86_64.rpm f9299e304d6ceca0afecacc52e3a8f1ded57d522bf0d4df80727b4038688e445 libXi-devel-1.7.10-8.el9.i686.rpm 6f38df4b29b9d641fee9eae32fb489812f0b87f41dfbcf4557e0b5a3f0d7dce9 libXi-devel-1.7.10-8.el9.x86_64.rpm 17c1bd58fb23258069b28b04d6e48e972584ea4604e114ebadca7ecdacf9aa82 RLBA-2022:3140 new packages: libXinerama Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXinerama. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXinerama-1.1.4-10.el9.i686.rpm 23c4a2b53f055676d0bde64b3771c552c93310fb0c9ea3df4b8ddf44ef27bbc6 libXinerama-1.1.4-10.el9.x86_64.rpm aa25538dcbab918287de6cc0dfa7b585cee4ea1c35ed01ce4ed22bb13e69c83c libXinerama-devel-1.1.4-10.el9.i686.rpm 9522afbb753d16d92c9b7ad76dd5a0a0a0734b3ef0215d23a53caa2e5dac7d48 libXinerama-devel-1.1.4-10.el9.x86_64.rpm 20e00bd0ad1da9c1fe0d5b265a2ad1dabf9cea980967fc52a01d39ad2be02060 RLBA-2022:3141 new packages: libXmu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXmu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXmu-1.1.3-8.el9.i686.rpm 45abc3a9e72669a606c2aa9411a5578838e9d57aa856a5d0c64e3203d4c409cc libXmu-1.1.3-8.el9.x86_64.rpm d19e8bcce562a3bf1ca45510d3ce5ea76f31bbda14d64c0b882c73331c2bb8cb libXmu-devel-1.1.3-8.el9.i686.rpm caa3d3afc923b00373f9d014d4595f78649f1277a43fff84ba0c01a285e2e870 libXmu-devel-1.1.3-8.el9.x86_64.rpm 5aa71da0d8db9cb1706560934360f3e7a3f6352772f67709e6576208efd95d62 RLBA-2022:3142 new packages: libXp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXp-1.0.3-11.el9.i686.rpm fa27510d1ed4118e2869871a009553b33546d6cbe8ba362cf69d78a5b1739d4e libXp-1.0.3-11.el9.x86_64.rpm 14d4cbc45d7c31c6b9d66bda9f78ae1ca51c939d7eff66dfd61557d5d4c64929 libXp-devel-1.0.3-11.el9.i686.rpm 4e2d35804980cfa4626ff2e0516c2e666f49d370c9055ac0188c8f3164550d94 libXp-devel-1.0.3-11.el9.x86_64.rpm 6302e0a1b54ebe8732509cad56dbb97a7878084c12349d9f8fcbe28978fa93ac RLBA-2022:3144 new packages: libXrandr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXrandr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXrandr-1.5.2-8.el9.i686.rpm 06119d874152a7fe522fbf69be76cb5459c5683ef117feb5ebbed7cc2c6e1a87 libXrandr-1.5.2-8.el9.x86_64.rpm adb1b07da2091c35027477f6c24d1874a6965565fd0f21a9ac1a0a6f8104407d libXrandr-devel-1.5.2-8.el9.i686.rpm aaee00be97bf3f22d0801d8e863da3923d073dd62908d66d8e1ce35c5fea10f1 libXrandr-devel-1.5.2-8.el9.x86_64.rpm 4e874d224a9209bf44a3ea87ca92e9f742585892753a6018f209b46ea5bf7052 RLBA-2022:3146 new packages: libXres Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXres. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXres-1.2.0-14.el9.i686.rpm b511a9b138e0dea98ddbb278cf12ef0773a7164e10079867bb0959a369fcb930 libXres-1.2.0-14.el9.x86_64.rpm 9211d57a5d2f77ce93b7f743b02aae0c4aea71076e03fbf93a341f669f880ba7 RLBA-2022:3145 new packages: libXrender Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXrender. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXrender-0.9.10-16.el9.i686.rpm c6a41f3a5ddd6c74efdbd3e6a6325cd817d286d242aabe7db7dce723a5b16b2b libXrender-0.9.10-16.el9.x86_64.rpm 1e7f886a15aafea4345a6c5679b97f4690ca03d80168984cfa34dcd785159361 libXrender-devel-0.9.10-16.el9.i686.rpm bb56479293d846e85cf435ff5f72866d5c914eee1c6dc4d5b8cba94ba53adc05 libXrender-devel-0.9.10-16.el9.x86_64.rpm d4e647bc73ff22c752f62c11135ca8b2afa1e002a5bac0d7be11bf9fec7d95fd RLBA-2022:3147 new packages: libXt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXt-1.2.0-6.el9.i686.rpm caf787a46cfd27d39e37d39f02b9b78d6efc5b2e71e3f50b4be6e32148255eca libXt-1.2.0-6.el9.x86_64.rpm 63443cb00ae22dacc37cef0934017d5d9ba106d281fb34f2a76164033fc435d7 libXt-devel-1.2.0-6.el9.i686.rpm 5d328158362dbe862ef50a2a798d75278b80a2b8f7353456559833eae8f734c4 libXt-devel-1.2.0-6.el9.x86_64.rpm 198e40b37857fcb735963b7621a0fdc07f9391b937bd9d9c625eca97080c4521 RLBA-2022:3148 new packages: libXtst Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXtst. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXtst-1.2.3-16.el9.i686.rpm 0acf01b3f6d246e8ac689777737ae87ba7c72444f3b935fc21e8c6e702753727 libXtst-1.2.3-16.el9.x86_64.rpm 83f234bc485ed247fe5bd283acb1458d53329525318dbbf7f29121bf4fd2543a libXtst-devel-1.2.3-16.el9.i686.rpm 2060e85e72d21b0c5c11d8152710204db3dae05f262d40f5e29978f8eceaeec9 libXtst-devel-1.2.3-16.el9.x86_64.rpm fb0968ab4ecd7252d060d22845212bb4dda69a1434794a15e9b8cfbeac859929 RLBA-2022:3149 new packages: libXv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXv-1.0.11-16.el9.i686.rpm 71f624dcec94cc84ea10e9651b684fcd3c941f37b33377b76a6e7fd1a49ce4a1 libXv-1.0.11-16.el9.x86_64.rpm 5d14bad7acdb5b036fe1e280b0a816ae78de449f7bd10dc876178e3f8d24a2c1 libXv-devel-1.0.11-16.el9.i686.rpm 07ad8d4dea5f92aac50ddcee2dfc09ea7f9b0123834e9672658e834ef0b90d5e libXv-devel-1.0.11-16.el9.x86_64.rpm 6a15d4a5d158d40ae5d09a5feb4d0c76faec1192b7b04c87a9345c43bdf960a5 RLBA-2022:3150 new packages: libXxf86dga Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXxf86dga. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXxf86dga-1.1.5-8.el9.i686.rpm a60b1cb2dd225059e822fa423b6923401e77bdb454e2085502709768386bbb10 libXxf86dga-1.1.5-8.el9.x86_64.rpm 9ea5d7e3888548c823c25a43f025a81d5184107a5d6c42fb399cecd2d3fe8d22 libXxf86dga-devel-1.1.5-8.el9.i686.rpm 7851a33e96e23e19f3622504aff6802c69dbe61f2d0df33f6bae1bbbdb4d8e11 libXxf86dga-devel-1.1.5-8.el9.x86_64.rpm 925f01d80e93b763c4ac513bf47d1b958fa99fd8fe0e1369c3c54d4b18654767 RLBA-2022:3151 new packages: libXxf86vm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXxf86vm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXxf86vm-1.1.4-18.el9.i686.rpm ad183ce975f759327653bd9b24bfd306eec6df2a98be87bb17ba2dbbc4696f4f libXxf86vm-1.1.4-18.el9.x86_64.rpm 05bfc543291a482c3de7804ca66a5451edef43c91d2b599bce81bfbb44b93cdd RLBA-2022:3152 new packages: libabw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libabw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libabw-0.1.3-7.el9.i686.rpm 15eab9c13f7883ffab9187677e1b96eddf87c9cfa431423315d7952397bb32af libabw-0.1.3-7.el9.x86_64.rpm 57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09 RLBA-2022:3153 new packages: libao Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libao. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libao-1.2.0-22.el9.i686.rpm 469a646509499191fb645cf230b9fddc5e8fba17ab1167f1f6fc48d0eb6f5064 libao-1.2.0-22.el9.x86_64.rpm 44d77e9fe8733a8eca10eba8354b2e24a76db036844d08e7422f9f2825e4fd58 RLBA-2022:3154 new packages: libappstream-glib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libappstream-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libappstream-glib-0.7.18-4.el9.i686.rpm 5282207860b80ce69969b865e94693ee353c33beabb31f7f19c32aa36d33c33c libappstream-glib-0.7.18-4.el9.x86_64.rpm 7599776277f865bf7778711d3d62185d42309847b94801c74a8623ebf0ae526e RLBA-2022:3155 new packages: libasyncns Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libasyncns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libasyncns-0.8-22.el9.i686.rpm 222f5228a91daff60bb51e0a351fd14b881e299a21ebfb8d8f84888e60150cdf libasyncns-0.8-22.el9.x86_64.rpm c4e0f32330d3eba8546a9f8b92952f1cd461d09a92cd7d80751d16338acee6c7 RLBA-2022:3156 new packages: libatasmart Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libatasmart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libatasmart-0.19-22.el9.i686.rpm 170f9363063be2f4a2a5539e69147d4f2d5956798c764eb7cb2352b0e4cb5c52 libatasmart-0.19-22.el9.x86_64.rpm d4fbcc1d9b791040471311860f5eba8404816e367b00004b50d76859c06c5ce5 RLBA-2022:3157 new packages: libbase Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libbase-1.1.3-31.el9.noarch.rpm 0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738 RLBA-2022:3158 new packages: libbytesize Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libbytesize. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libbytesize-2.5-3.el9.i686.rpm e6ab43d53294c1dfeea578058c326a337922e8bfe2cf300f40de732a71d318aa libbytesize-2.5-3.el9.x86_64.rpm 2f33d75361f43d90983fcccff3c972167efa4906900121ad885e7c86cdc7f5fa python3-bytesize-2.5-3.el9.x86_64.rpm 039bdcd5a20ac8721beab51a51b10dc1c5f4ee9196c205279bd49b65095b9487 RLBA-2022:3159 new packages: libcanberra Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcanberra. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcanberra-0.30-26.el9.i686.rpm 36fa6a0f18f6ab7b146bb9e1a6c4f6777ce12a2dddab1655feea509d9de93750 libcanberra-0.30-26.el9.x86_64.rpm c23330111faf4001c75b9abcc529199abd7c29d931fa1545ab278333a6d2773e libcanberra-devel-0.30-26.el9.i686.rpm 0d27fd277ac91b1c57d54615ca6eee190d507d2e8e2c1c1d4d4616cc3167cf1b libcanberra-devel-0.30-26.el9.x86_64.rpm 0a95f8ae61c6e5a3177d56ab95b0e6b6416b4d69e8a1ebe1af8ed622108391e6 libcanberra-gtk2-0.30-26.el9.i686.rpm 7087b4014a50edd82eac0efe6764c17a55f76081924fb01ad91df02d98ea79bd libcanberra-gtk2-0.30-26.el9.x86_64.rpm ef64949a88b809cbbc7281117938b5ccc5c8ae0ebc10b44be59f3aef50d63713 libcanberra-gtk3-0.30-26.el9.i686.rpm 62a00913d58ebca5c05319c76c17089c03ae2f88e75a5624142578bc14383f70 libcanberra-gtk3-0.30-26.el9.x86_64.rpm ccdd9f877f9ccd1d2854cb17d3a215c22547aed31f1af788a2d47847ebdcdb79 RLBA-2022:3160 new packages: libcdio Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcdio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcdio-2.1.0-6.el9.i686.rpm f816e5b4ea4373ed93b4f4479eec6dc011718d57bf3e0bce12db97701083f8e6 libcdio-2.1.0-6.el9.x86_64.rpm 1bd1452dc0bad4a41c8adfe3e876860f8324881918f6f626078fbfb112de5a0e RLBA-2022:3161 new packages: libcdio-paranoia Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcdio-paranoia. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcdio-paranoia-10.2+2.0.1-6.el9.i686.rpm 43a79ae64d746b9b2922f183031b3af4e49f45f35682a14b440bfdc28b7fdd0f libcdio-paranoia-10.2+2.0.1-6.el9.x86_64.rpm d08101ba49a6f93a6ef2a531b0c4efd713aa3dedb8e6a8a1be45afe9292d835c RLBA-2022:3162 new packages: libcdr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcdr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcdr-0.1.7-3.el9.i686.rpm 0614480e3518b8982c318bbbb1e71097b1ec74dd9bb21eee0c3f007b2775657b libcdr-0.1.7-3.el9.x86_64.rpm 416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22 RLBA-2022:3163 new packages: libcmis Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcmis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcmis-0.5.2-12.el9.i686.rpm 7744f7b1ce14a64f30d210727a8b57135e1a85e152b0ce1cd1a2db708f7a5f48 libcmis-0.5.2-12.el9.x86_64.rpm a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76 RLBA-2022:3164 new packages: libdatrie Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdatrie. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdatrie-0.2.13-4.el9.i686.rpm fd1e5f28c41e4123ee3beb34cf13eecdf68fe8db96017fa617b80bf7593f170d libdatrie-0.2.13-4.el9.x86_64.rpm 820f090a87181c921892fdb5744c53cb935eca5e303d4adbaba0d04ae35a4a61 libdatrie-devel-0.2.13-4.el9.i686.rpm 4f35387a2506b3b0106d91118ad55bafc636d5d49d4bc4f7ce61d456866ccb25 libdatrie-devel-0.2.13-4.el9.x86_64.rpm 1e326749acfccabeb330a0e6fb6600442ebd116f71f890a60a58406496793b98 RLBA-2022:3167 new packages: libdvdnav Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdvdnav. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdvdnav-6.1.0-4.el9.i686.rpm 76f165127ca3a9676370f91987a0af1410bb6ed35828efd51c15e79be72c29cb libdvdnav-6.1.0-4.el9.x86_64.rpm 3faa815709ce56d5e019796131157f206f16dc55ba873c1242424b0cbae94a70 RLBA-2022:3169 new packages: libecap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libecap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libecap-1.0.1-10.el9.i686.rpm e6303a586e9eed0b96650c898f825ef09128014946e7bb03cf931a2d3c17e9cc libecap-1.0.1-10.el9.x86_64.rpm 7197f3758ca4eb891cd6df1251bdb3556af1eecc58c05b091b25c349081199a7 libecap-devel-1.0.1-10.el9.i686.rpm fc5c26b6269f02cc26f4f1cde051aadce672a49fd0b03961128f286380394548 libecap-devel-1.0.1-10.el9.x86_64.rpm e888d59fab8ebafae165120df6c0e24fb78e7ebeddd2ed4d5393b6ddbd24682d RLBA-2022:3165 new packages: libdazzle Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdazzle. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdazzle-3.40.0-3.el9.i686.rpm 2dfee94e36b5d9f987e57f78f70477ba2eb8a7ccf21a7d190d87f2aa10ab4808 libdazzle-3.40.0-3.el9.x86_64.rpm 334b0b1a1acf82ed6efb046bb71f7230256fae18045d1492fe021798e2b88199 RLBA-2022:3166 new packages: libdmx Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdmx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdmx-1.1.4-12.el9.i686.rpm 9aeec567f7e56ebe90254b7e5d3182b17424ccd9f2d9b425d0e466ec24a966f0 libdmx-1.1.4-12.el9.x86_64.rpm 9b4246817e5840a5a5e4c5bc4f88f9b13d570066db9da556cd40829726ed4e79 RLBA-2022:3168 new packages: libdvdread Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdvdread. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdvdread-6.1.1-4.el9.i686.rpm 02bb37f8edb271f636a3f772511782716a2729c46bbc1e29404d212eef95d0d3 libdvdread-6.1.1-4.el9.x86_64.rpm ffa468092ad6a2ce5166376778704a54fa28c153ef80ccf8c422643428f42adb RLBA-2022:3170 new packages: libell Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libell-0.41-4.el9.i686.rpm 14d84d178d9d928babe8ed1556d57f1e3d56989177c6955f5a6b607950edeb26 libell-0.41-4.el9.x86_64.rpm 76f3bd812341db30417414c03a9474cbc3570c00e8fa09147d800cb42deff533 RLBA-2022:3171 new packages: libepoxy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libepoxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libepoxy-1.5.5-4.el9.i686.rpm 64faf19b50658179e10fb44d48b6a1ba256abbf30938095c0d5d1e5f97b4153e libepoxy-1.5.5-4.el9.x86_64.rpm 6520de86c5183ff8b3ddfe27640b898627ef3987419128dd71c088f5d5e9bcb3 libepoxy-devel-1.5.5-4.el9.i686.rpm 5ae17bf8c560f66e13329995ddfa39ea0ee7b52bfa8cd90527a78ff0461f447c libepoxy-devel-1.5.5-4.el9.x86_64.rpm 86b2a9988f3ed5b7f9c810e525588f98a2667af67e1aacdb61556ba30eb1af4a RLBA-2022:3172 new packages: libepubgen Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libepubgen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libepubgen-0.1.1-9.el9.i686.rpm 848402b649eef92488c6bb20b97b5d2e33b6be248980eb7297dd362d9ab899fc libepubgen-0.1.1-9.el9.x86_64.rpm cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398 RLBA-2022:3173 new packages: liberation-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liberation-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liberation-fonts-2.1.3-4.el9.noarch.rpm 7d7ba08fa5bc1e356c8039fb512953ef13d943a984268b3eb2eaa2c6bad83862 liberation-fonts-common-2.1.3-4.el9.noarch.rpm 14af23e3af64c7548ef01e923484512a471bf4df80ae022c7967180519d12ba7 liberation-mono-fonts-2.1.3-4.el9.noarch.rpm dd7103b13739d6c67ad6b79bac32971794ac96171fb21da541821e37fa59cc03 liberation-sans-fonts-2.1.3-4.el9.noarch.rpm cf9cc9c939c501a69079a87b872a33ab34b9a9e49c4118856dc4a30bc1f80f49 liberation-serif-fonts-2.1.3-4.el9.noarch.rpm 6148528532a0dcf81bfe74aa92b7b9ed29d8c9a052f0964083796cf4735c5602 RLBA-2022:3174 new packages: liberation-narrow-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liberation-narrow-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liberation-narrow-fonts-1.07.6-9.el9.noarch.rpm d390ff7a104b1b49d73a71c18c67bcd5ad10813a0cf260ac83772d9413ba3366 RLBA-2022:3176 new packages: libetonyek Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libetonyek. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libetonyek-0.1.10-2.el9.i686.rpm 74fba126b9ca06ec0529f675d88a1af2898c8302d9b5fb61e99954027c331e6a libetonyek-0.1.10-2.el9.x86_64.rpm a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806 RLBA-2022:3177 new packages: libevdev Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libevdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libevdev-1.11.0-3.el9.i686.rpm c301d9e380ad02e5545ddbd703d4fdff8094d4a79bc0b7b276efde8e7a83f9cd libevdev-1.11.0-3.el9.x86_64.rpm 6e62f64bd004b988017571a11b72d9b177d75368236f17af81b4c479ce8d5e31 RLBA-2022:3178 new packages: libexif Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libexif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libexif-0.6.22-6.el9.i686.rpm 1330df60b4d35e14c8bc3556379bf81c15178b24a4c4496fc12325fad45b55ed libexif-0.6.22-6.el9.x86_64.rpm e72ca599be38763524b3c1c5d6ea5c1efc5f20cf979398f4628caff834dffe62 RLBA-2022:3179 new packages: libexttextcat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libexttextcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libexttextcat-3.4.5-11.el9.i686.rpm afddb67e3855df0f64de8906d43aa38d09465b1cfd88260927730dc4c9f20b23 libexttextcat-3.4.5-11.el9.x86_64.rpm 693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245 RLBA-2022:3180 new packages: libfastjson Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfastjson. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfastjson-0.99.9-3.el9.i686.rpm 25b6c34763c7134e9c6d5154c2f53aae041fd319fc1aa21be52e2b456feb764a libfastjson-0.99.9-3.el9.x86_64.rpm ce22f4ed04a47249099a2af7bba764e0f4b93c62798e27f6dd936b1e6c964c62 RLBA-2022:3181 new packages: libfontenc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfontenc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfontenc-1.1.3-17.el9.i686.rpm 7eab7eddb95eb1a69c87ec92653673e56edd35911f072a97c0bc630d7e2f4784 libfontenc-1.1.3-17.el9.x86_64.rpm 867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23 RLBA-2022:3182 new packages: libfonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfonts-1.1.3-35.el9.noarch.rpm 6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081 RLBA-2022:3183 new packages: libformula Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libformula. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libformula-1.1.3-32.el9.noarch.rpm bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b RLBA-2022:3184 new packages: libfprint Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfprint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfprint-1.94.0-3.el9.i686.rpm 604d53446f84e7250328fc9ff7d0c31ea796fb5e8e170eab3e6bd50abd3fab7f libfprint-1.94.0-3.el9.x86_64.rpm 0646a04de10e47e9271fbc6455cbca18c6e92a81b6af96c7aeff84e235ae0173 RLBA-2022:3185 new packages: libfreehand Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfreehand. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfreehand-0.1.2-11.el9.i686.rpm 427c2fd77ae5b14283c2d75cb67305d5b821c77357948b3c01d006187145d0d5 libfreehand-0.1.2-11.el9.x86_64.rpm 443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d RLBA-2022:3186 new packages: libgdata Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgdata-0.18.1-4.el9.i686.rpm 3e5b9ada7f6794d2bc4fac9cefd88cf3d7333c10284c2e0165147180edb6eb83 libgdata-0.18.1-4.el9.x86_64.rpm 5a5fa4a6f766cf6f3ea9a8c93c54f34f96ebb16e14e5e4483586970e8efca8d5 libgdata-devel-0.18.1-4.el9.i686.rpm 0bc1d7d49ec888794e1fe27e2589d1b4dfddc4c7f0e012cbaeda9c6b1e73d48e libgdata-devel-0.18.1-4.el9.x86_64.rpm 3a95a739d8ca86e36ca4b6a5e38995a1032e1ddf56d547f3838b89527c09eb2f RLBA-2022:3187 new packages: libgee Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgee. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgee-0.20.4-3.el9.i686.rpm f7adcbdbb49d7d8cefa10010bedeff35bf78a8e23be3468de372376b71352910 libgee-0.20.4-3.el9.x86_64.rpm b20ed763002259f17e874d773f3ff2d0eff98a5a9484e3bd1d432364ee8b1f1f RLBA-2022:3188 new packages: libgexiv2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgexiv2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgexiv2-0.12.3-1.el9.i686.rpm 6fd8f0801bc33dc8b0ca2257d91127cd7ac5f8501dab381629edaca2ec69825a libgexiv2-0.12.3-1.el9.x86_64.rpm 2c790b11c35cf67d89d712066bfffe00697c03754132982e5612c324e0711fb0 RLBA-2022:3189 new packages: libgnomekbd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgnomekbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgnomekbd-3.26.1-7.el9.i686.rpm 42ec8b35c0a5828d3cf7a48275da3b16fb36b9d435be228a58fbada21333737c libgnomekbd-3.26.1-7.el9.x86_64.rpm e5901c188bb6a726b17dc2cd043f9be18eb59683680e2e7f4d0e91678ff61da6 RLBA-2022:3190 new packages: libgphoto2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgphoto2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgphoto2-2.5.27-3.el9.i686.rpm 9650df7d068f00150d823cd7f1fb89d5c38af1dad1e86c1e840d0d908835a2f6 libgphoto2-2.5.27-3.el9.x86_64.rpm 260a2f87c175166a42d08a868bb6c552b9ce5cd397b502f1f002edf5c1cb2e97 RLBA-2022:3191 new packages: libgsf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgsf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgsf-1.14.47-5.el9.i686.rpm 9fc75f93143ea7e0e3fcaf2faaa816647b0e23a28408592300a26dd892e0aabc libgsf-1.14.47-5.el9.x86_64.rpm 9cf8de72cc1ea995664a249615ea0b79e53ea52b89067e3937a589b48d788540 RLBA-2022:3193 new packages: libgweather Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgweather. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgweather-40.0-3.el9.i686.rpm be841a1deb867d670c161cd31a33188d6866973a57cf29008a05e1314275c3aa libgweather-40.0-3.el9.x86_64.rpm 84c0f17d7f8c3a3e2a36f63f42db096a1ec34893a3a4e6ec7146f645ff6d83b4 libgweather-devel-40.0-3.el9.i686.rpm e8cae45cdd64f8073580a7865b940b91544606250b2838eeea5d3f10aea4a3a6 libgweather-devel-40.0-3.el9.x86_64.rpm 7a5baf6719fe929c7c1b22160fe64d18b2147f6b2714657dc36207e26373c77d RLBA-2022:3194 new packages: libgxps Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgxps. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgxps-0.3.2-3.el9.i686.rpm 5d420d3ed10735a4a574258c652c718d9ff7ee2c6a7fb8ac94551386b55e8ee3 libgxps-0.3.2-3.el9.x86_64.rpm f4c1f9a5d197b12a508a482f0cee6d91e1645f76e97bd72b532f45d5fca69ad7 RLBA-2022:3195 new packages: libhandy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libhandy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libhandy-1.2.3-1.el9.i686.rpm e57deb2b95d881bf3c12eaef1c64be32dc3b9dc107a31e74c0c399a0854c4f11 libhandy-1.2.3-1.el9.x86_64.rpm 01cb40c89ed3624a8277f9462a44875be992e17efb40a4537323b0d997149e50 RLBA-2022:3196 new packages: libhangul Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libhangul. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libhangul-0.1.0-25.el9.i686.rpm 15359952a1d887b1cc1b3c76ac3b62e9d297b7ae468e3055db4561c63f99ab27 libhangul-0.1.0-25.el9.x86_64.rpm 4e232f09cb2b0563c8f5f36909fcd4a7d059b0abc609941f9ddb2477e1ccb3a3 RLBA-2022:3197 new packages: libieee1284 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libieee1284. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libieee1284-0.2.11-37.el9.i686.rpm 98e04fc8dd411458e9047d8ddb945ec083939ef3112cf6d039bd50da8870e850 libieee1284-0.2.11-37.el9.x86_64.rpm 28a8daa97a8ff1e88f424ce906f934ffddcaa9541ef24df640cf96e9a45a60b5 libieee1284-devel-0.2.11-37.el9.i686.rpm ab99da8647569cd48cb81fb3d38fba1568f1968232cf3e66241ef95ea5787dc3 libieee1284-devel-0.2.11-37.el9.x86_64.rpm 22a4c1bcff277537494fd93abc2de17bd31d489c5ff7b441604232d0d0e1deda RLBA-2022:3198 new packages: libijs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libijs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libijs-0.35-15.el9.i686.rpm b6df42217e67e1b299aab1d50c5196e6ee6a8648be06f578176c915eb4dcc24a libijs-0.35-15.el9.x86_64.rpm eeca220487e0fa7e50fbbe153a4c432a2319ad20bcd0e3790db90dab46e786a9 RLBA-2022:3199 new packages: libipt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libipt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libipt-2.0.4-5.el9.i686.rpm b8aa4cf7b59d46c51cf9d7c6224f011401b3143ac6c05c540010c042dea30818 libipt-2.0.4-5.el9.x86_64.rpm 966988eb26b800f623b3a08bfdb4082530f37406de0ca4818f285e92eec3eff3 RLBA-2022:3200 new packages: libiptcdata Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libiptcdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libiptcdata-1.0.5-9.el9.i686.rpm fe281a4be45e8dc0327d42aedacc9eb6ce87d32237561c0993545cac45686de1 libiptcdata-1.0.5-9.el9.x86_64.rpm 15e54296720aabbd8ee28980061beed948f30b616a374015749bfb4f49455764 RLBA-2022:3201 new packages: libiscsi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libiscsi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libiscsi-1.19.0-5.el9.i686.rpm e7736e38354966e6d3096cf505716d47a4b34efe53bfa2597ec76606a3481610 libiscsi-1.19.0-5.el9.x86_64.rpm bb6a093ac9d3f261870486369485426c25a106286bd3b175e396b03c9b75a938 libiscsi-utils-1.19.0-5.el9.x86_64.rpm 89186895b0b4a8c82c5ce8b0d327829d1831b479aeaed44b4a9eeed272142c94 RLBA-2022:3202 new packages: libkeepalive Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libkeepalive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libkeepalive-0.3-16.el9.x86_64.rpm 6af75fe40cad11a8f932629d71dcd23c9178679ff46e81ecc0825c78b6496f7e RLBA-2022:3203 new packages: liblayout Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblayout. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblayout-0.2.10-25.el9.noarch.rpm 15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291 RLBA-2022:3204 new packages: libldac Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libldac. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libldac-2.0.2.3-10.el9.i686.rpm 42948af8aa73c83341eda1875708e54d074525ff33a6cb695237c526193cbf4b libldac-2.0.2.3-10.el9.x86_64.rpm 1e41be409fc5c440e2e64226879a23b6c98dd12366702cb448162f8d23f22a2d RLBA-2022:3205 new packages: libloader Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libloader. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libloader-1.1.3-32.el9.noarch.rpm 76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1 RLBA-2022:3206 new packages: liblockfile Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblockfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblockfile-1.14-9.el9.i686.rpm 9d9ec19c8803b3081d64ce74062a2c49eb9431a1155daafc30c47bc7897f167b liblockfile-1.14-9.el9.x86_64.rpm 5de17271fe6db36e5a5ac7110479196946e6536a9cdf5d09a1d7482cb3c3c636 RLBA-2022:3207 new packages: liblognorm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblognorm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblognorm-2.0.6-4.el9.i686.rpm c09b6a1800adc53732bfdb280a914e04866b1449eb323741359be1c089c1502e liblognorm-2.0.6-4.el9.x86_64.rpm 64a9e05963063dcb3b49731ae08021d4bd4485eff394cce5d305c5939b839977 liblognorm-doc-2.0.6-4.el9.x86_64.rpm a6a435dcc7fba0fe999978400a72d4e054950db26f316fce23387136b50c217f RLBA-2022:3208 new packages: liblouis Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblouis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblouis-3.16.1-4.el9.i686.rpm 606ba88939bbb6b3ec37968acdb2e71533a7bc9bdfecb0c6406067c3ddb2090a liblouis-3.16.1-4.el9.x86_64.rpm aec3d40939ac98a69c80509d5a299cba61d96c743960b03126399f8430798b17 python3-louis-3.16.1-4.el9.noarch.rpm a4945addf0b5a6369ab3e741ae4ed598caa67384a88950a9edea2bef94dab160 RLBA-2022:3209 new packages: libmad Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmad. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmad-0.15.1b-33.el9.i686.rpm 2ddd7588a9187ff7e7e03f3194df2f93dbaa42bbaf3f04658fd06504b3936e8c libmad-0.15.1b-33.el9.x86_64.rpm d16b55c3b7e09a4b1dfd31ca8f6a02e29ae216135645cd6fabe3d4381c16027b RLBA-2022:3210 new packages: libmatchbox Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmatchbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmatchbox-1.9-30.el9.i686.rpm 3fad43c41f943b2f8703a161063f1dcbd45f3191eaa01062d4aa61198b9354f8 libmatchbox-1.9-30.el9.x86_64.rpm e8a4dc827547a108ac311b7eccf3b6744a2ca915d5325675b0fce47d46673fae RLBA-2022:3211 new packages: libmaxminddb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmaxminddb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmaxminddb-1.5.2-3.el9.i686.rpm 3c0acb144438dd4a3251ba9bf26499510bc5421b05888cee0128a910c18180a8 libmaxminddb-1.5.2-3.el9.x86_64.rpm a42f8a9f73ecf3ca7fb709e72dd4bce9213d34027db57f8d27dcf512e8bccbfc RLBA-2022:3212 new packages: libmediaart Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmediaart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmediaart-1.9.5-2.el9.i686.rpm 62d7da2b60aa84a696062405f4292a6cdc814305f111c8fa179391f3d3784ce1 libmediaart-1.9.5-2.el9.x86_64.rpm 6d586a9a5283bf08e3df1297f71589d3c26a4ce4418454868cc967c38fc56053 RLBA-2022:3213 new packages: libmicrohttpd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmicrohttpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmicrohttpd-0.9.72-4.el9.i686.rpm 38e34b52510e5c2b9cab48908f27f210c72c96b4fad418db928594129b3ca708 libmicrohttpd-0.9.72-4.el9.x86_64.rpm 12d851dd92e0653994dbc906f4a8b4f51e1b2addb7d8e3ad1000d5c334946fba RLBA-2022:3214 new packages: libmpc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmpc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmpc-1.2.1-4.el9.i686.rpm 5e871c25709599583289e64d0c96d0409187afdd12554741b2fe76e69b1781e5 libmpc-1.2.1-4.el9.x86_64.rpm c4def74fc686113748590ce9bc8591092947be804650ef56aa161e049660273e libmpc-devel-1.2.1-4.el9.i686.rpm 2c358fb8bf0c5e04f8a47be84a1b6972502eeb65ee42be0999c268a800a3eb39 libmpc-devel-1.2.1-4.el9.x86_64.rpm 578b41fcba5bf0f26ce832122dcf572637263180c1f46b74c14ff51c49f93e87 RLBA-2022:3215 new packages: libmpeg2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmpeg2-0.5.1-24.el9.i686.rpm 650b842357176930da5ef81d7cf9d6c0a19298d5a1cc1d6abf9d3c6efbf45889 libmpeg2-0.5.1-24.el9.x86_64.rpm 54145513ea13f614c5b1afb5c98aa565d066891704aeaad13d5f1c06c3a367cb RLBA-2022:3216 new packages: libmspack Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmspack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmspack-0.10.1-0.7.alpha.el9.i686.rpm f2a9b4fc2d2c45552f8b9142d324cc233df9289db182c457fec2e832f79afd0e libmspack-0.10.1-0.7.alpha.el9.x86_64.rpm 07447328f3a90b61846cbbb915dc2a567c4834281a6a7509750bc5b2c46ab415 RLBA-2022:3217 new packages: libmspub Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmspub. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmspub-0.1.4-17.el9.i686.rpm 7c79c4f328b2c3e7a64d1cd1ede3d97f545a8f5886369bb2dc3b0c57c9738fbd libmspub-0.1.4-17.el9.x86_64.rpm 134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e RLBA-2022:3218 new packages: libnet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnet-1.2-6.el9.i686.rpm 88c9b8668fcc6fbbbc7d6d6cd8ed9ee35862748fd8df48c211741545e98d015e libnet-1.2-6.el9.x86_64.rpm 3ee2d74468370c1bcd5c5107dbedf048db66f8b59830c88fe86755b8c4a2c998 RLBA-2022:3219 new packages: libnetfilter_cttimeout Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnetfilter_cttimeout. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnetfilter_cttimeout-1.0.0-19.el9.i686.rpm 20984916cf9363f01256082d992f5f0235e5afd6337c91f713deecb8a8b1f94a libnetfilter_cttimeout-1.0.0-19.el9.x86_64.rpm d24f20c24b9b138c557d2455eeb03ccb31993773647f7bee8c256b562c9d95f9 RLBA-2022:3220 new packages: libnetfilter_queue Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnetfilter_queue. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnetfilter_queue-1.0.5-1.el9.i686.rpm a20f3daeb6ad4563efee619888333d15e6751a3b8acc1f2b4e72abfa66b370dc libnetfilter_queue-1.0.5-1.el9.x86_64.rpm 0c4a355e01b60072b74a981c78b70c745944f5cfc6a9b0e6fe1cfe7e8b501e8b RLBA-2022:3222 new packages: libnumbertext Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnumbertext. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnumbertext-1.0.6-4.el9.i686.rpm 5c0421283ca492d718e7ef345b190fb428c609df3251a1721528ffa35c6732af libnumbertext-1.0.6-4.el9.x86_64.rpm ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab RLBA-2022:3224 new packages: libodfgen Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libodfgen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libodfgen-0.1.8-4.el9.i686.rpm 59f4c7d7ec9e8b38087557615e96b3ed6cf7735e8784912a568772ad838d2b6c libodfgen-0.1.8-4.el9.x86_64.rpm 0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2 RLBA-2022:3225 new packages: libogg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libogg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libogg-1.3.4-6.el9.i686.rpm 20917d6a4ccf6ceb102be4e4b87b1adc528018b10dec0570ec0ef9691b8ea4cf libogg-1.3.4-6.el9.x86_64.rpm b9185380df1f9787e93de2e32b0dddbd24d0017371e7b4ae2106ff0bbe8819da RLBA-2022:3226 new packages: libopenraw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libopenraw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libopenraw-0.1.3-11.el9.i686.rpm 0f324e9dab8bd1b8a020c68b727ddf13c21b464fb0c7c15db4dda6304df772a1 libopenraw-0.1.3-11.el9.x86_64.rpm 74e200911c2d54b820bc99d7d7a047d9a3ae6292c17b53a45788c48c423d718a RLBA-2022:3227 new packages: liborcus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liborcus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liborcus-0.16.1-8.el9.i686.rpm dbd3df3daa47ca8ad07c2cb4c1b001b21c814f49c669635b449ffb44359b600d liborcus-0.16.1-8.el9.x86_64.rpm 8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec RLBA-2022:3228 new packages: libotf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libotf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libotf-0.9.13-20.el9.i686.rpm a0b8fadc20e33bf80462351fdd64eb7bbdb85a93d68663238d269cd7b15501df libotf-0.9.13-20.el9.x86_64.rpm 700b83ff56ac549011be218ce33ecb880668f4ee5c8f000339f1d5872fc8f766 RLBA-2022:3229 new packages: libotr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libotr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libotr-4.1.1-13.el9.i686.rpm 7ef0020630a7f8681453f388a829b85525df5133be23e0e849df3758b0981e73 libotr-4.1.1-13.el9.x86_64.rpm 8a2b08884cfa3fb9f941e7f64e185e148b240a99db37679debbe5b1ae62c76b6 RLBA-2022:3230 new packages: libpagemaker Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpagemaker. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpagemaker-0.0.4-13.el9.i686.rpm 338ab38a840c16c19149f3fc208f328d405214aee0f299311afa985485955bb2 libpagemaker-0.0.4-13.el9.x86_64.rpm aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542 RLBA-2022:3231 new packages: libpaper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpaper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpaper-1.1.28-4.el9.i686.rpm 9c1cfd14e7657e857ba6fdb5fe42cdae021f4679590371b36709e6499cb151bf libpaper-1.1.28-4.el9.x86_64.rpm 8210eca90ce2987b21e389bb943e1da9cf8b61182143b819068feaad12f9128c RLBA-2022:3232 new packages: libpfm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpfm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpfm-4.11.0-6.el9.i686.rpm 1adff96fd145e2db14921a6501275c421851c3b5812dada6cb586aa4009dc6f5 libpfm-4.11.0-6.el9.x86_64.rpm 988348915075d1eb3b2d7f27091260f13d1a14b268abe7d23fec0a901742c32a libpfm-devel-4.11.0-6.el9.i686.rpm bdea2b369a95285f968a2a554519505cf822130b6e858f0aa1bffc52a9066c73 libpfm-devel-4.11.0-6.el9.x86_64.rpm 8924ecef7341192116bb8a113dc7a5b2bbda9a31ac4c60e5a6c472e0d4af7947 RLBA-2022:3233 new packages: libpinyin Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpinyin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpinyin-2.6.0-4.el9.i686.rpm a473c2b7021e268c7addb47dd45da8afd919fd7a65747fb0cbe7b3902a88f74e libpinyin-2.6.0-4.el9.x86_64.rpm 84c519fb305618e62520954b2e7109cd667e96cb66e77c440a42e287d40305d3 libpinyin-data-2.6.0-4.el9.i686.rpm a8f6e8f90ee153e667f94e5b882b0aa79be773b2d20e85e77fb1852d8724fcf8 libpinyin-data-2.6.0-4.el9.x86_64.rpm 364e0e36d28bf78a56dc7fb75cb01ff7509e3ee9bbe3162bd21b2ea5455e7dda libzhuyin-2.6.0-4.el9.i686.rpm 7c310955743d5a64bdce6ad4cb305b017991dad613895a6f4dc4aa207a7e1c44 libzhuyin-2.6.0-4.el9.x86_64.rpm 3786988bf101f7256d0227d8e2ec41169410385225754c0152fd5174059509fc RLBA-2022:3235 new packages: libpst Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpst. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpst-libs-0.6.75-12.el9.i686.rpm 61ce9a5ec35f77d2e65393bdfc1ca0b7fe4035a5388e4fba3f8404a50347aa86 libpst-libs-0.6.75-12.el9.x86_64.rpm 366b18d4bf80f7df74c255e23b8a9d84b90bb5059fddd977053a9a756516300b RLBA-2022:3234 new packages: libpng15 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpng15. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpng15-1.5.30-14.el9.i686.rpm 288c78f9e3abe01fa6de4ac40e5de3c224a16245bbdf91f27cd5c2f45a6fb5e0 libpng15-1.5.30-14.el9.x86_64.rpm 579b779680c0497bbc49f0b068a34b9a6ecc830d03e3240e1f91757145f62b67 RLBA-2022:3236 new packages: libqxp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libqxp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libqxp-0.0.2-11.el9.i686.rpm e6c5a11101c0eefe3acd6d6a5974c78e3fe0f9a299c66de59000ec3df0e23c42 libqxp-0.0.2-11.el9.x86_64.rpm 68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71 RLBA-2022:3237 new packages: librabbitmq Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librabbitmq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librabbitmq-0.11.0-5.el9.i686.rpm 3192b3e578a9ef68a57ca3756867054a3e412dc8aacc05afe99ca3775f3a1124 librabbitmq-0.11.0-5.el9.x86_64.rpm 5dd63c92bf9cd9ffbb1ef0c391ac3f8ef2cac279867b222523fe10754e4eb966 librabbitmq-tools-0.11.0-5.el9.x86_64.rpm 863da4b3ebe909be94de567ca549a11b55b238c99bdca527612eadcf0dc8ac7c RLBA-2022:3238 new packages: librelp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librelp-1.10.0-4.el9.x86_64.rpm 634fc3d551060e09c87c2b8a7ed0cbe09eda683db669832ec27e8795f218a39e librelp-1.10.0-4.el9.i686.rpm e7e6502880c5a56a9cd719597bd17a009479e770e588997041a5b635e827aaf3 RLBA-2022:3239 new packages: libreoffice-voikko Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreoffice-voikko. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreoffice-voikko-5.0-10.el9.x86_64.rpm d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0 RLBA-2022:3240 new packages: librepository Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librepository. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librepository-1.1.3-31.el9.noarch.rpm 7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378 RLBA-2022:3241 new packages: librevenge Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librevenge. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librevenge-0.0.4-22.el9.i686.rpm dd8c1b6e44ab1e6b81506264c45f278cfa248a01a04786238e809332743688bf librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 librevenge-gdb-0.0.4-22.el9.x86_64.rpm 66247af870ea73812480bab041210ddd24dc87f965a69941437a4c392e5f900c RLBA-2022:3242 new packages: librsvg2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librsvg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librsvg2-2.50.7-1.el9.i686.rpm 28834770f52040b8f0a5aaf7ab7c7854f809b634c1489432224164c0e42e5493 librsvg2-2.50.7-1.el9.x86_64.rpm d507e190bcab36b3a224fa4efed7416fe6c65fad462f191d7855f2f24609794e librsvg2-devel-2.50.7-1.el9.i686.rpm bf4bb5ecc8b77a527e188a0f1f6ee43ef7254439949e8eb76e0d073758b649e7 librsvg2-devel-2.50.7-1.el9.x86_64.rpm 089de21919e73d223335f4dafeb4ea7a69cb7022cadf0eb6626e922322bbe244 librsvg2-tools-2.50.7-1.el9.x86_64.rpm 6fdb15ae0835a14d36d84699e2f86846f168d0d5b30cf6b656eeb4ce4f627b8d RLBA-2022:3243 new packages: libsamplerate Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsamplerate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsamplerate-0.1.9-10.el9.i686.rpm b9a2596179cf9d14cde1428ab8ff76256a1b0fe56fad3d89d271126fc5130f47 libsamplerate-0.1.9-10.el9.x86_64.rpm be6aa29c121874ef865b8d389dd5794d47345d21b6ce75f3ec19d4e74863e88a RLBA-2022:3244 new packages: libsecret Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsecret. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsecret-0.20.4-4.el9.i686.rpm 0df332237678359c814c5400aaa00d366869d9b98bb14bd759123a3d3a360b78 libsecret-0.20.4-4.el9.x86_64.rpm 27b6dc9dde386ee9de16b53144b252dbbcdcea614dc56ab2fe3e1423c004eea1 libsecret-devel-0.20.4-4.el9.i686.rpm d77c7a1ed7f5dac196cae5f65b9c74db754c30de95d5def334eb18273f334cd0 libsecret-devel-0.20.4-4.el9.x86_64.rpm f87f569fca3447a04048e9ed5bb59c281f541bb16c30ecf6b11d0f5595905632 RLBA-2022:3246 new packages: libshout Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libshout. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libshout-2.4.3-7.el9.i686.rpm 836c00412b47853a30ae3dc559a64bc24a7bcc80b6f45693959c46cda657d581 libshout-2.4.3-7.el9.x86_64.rpm 4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435 RLBA-2022:3245 new packages: libserializer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libserializer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libserializer-1.1.2-30.el9.noarch.rpm d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68 RLBA-2022:3247 new packages: libsigc++20 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsigc++20. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsigc++20-2.10.7-2.el9.i686.rpm 10184fb9e994cbc01712fb5f39814eca6832ac0116120d2470337a67b69f7ea9 libsigc++20-2.10.7-2.el9.x86_64.rpm 7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb RLBA-2022:3248 new packages: libsmi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsmi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsmi-0.4.8-30.el9.i686.rpm f1615a441cc6f8052bc86d5158b6f3438f4174352b5cd79769f7e9df1994ecb7 libsmi-0.4.8-30.el9.x86_64.rpm 08db49177ea850d5725a600d421c433fa3d26ebf33d8289f42ca2a07a094ae3a RLBA-2022:3249 new packages: libsoup Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-8.el9.i686.rpm 62f74b93cf517bb5c22fa32070a96db967c7cc8841cad28033fffadb4be36ec4 libsoup-2.72.0-8.el9.x86_64.rpm 29de6bc5022554f6554629c453fd8f021248c5a134a2147310c8facb967caef1 libsoup-devel-2.72.0-8.el9.i686.rpm 4957447415f5cdcb8360352e45f1f0370735d3f71b66d0583d01fff3ca2919ef libsoup-devel-2.72.0-8.el9.x86_64.rpm bc56983bc66b6aa4f67e482a5134c0e02619c32f7d0c8d82f6ea33dd5ae37966 RLBA-2022:3250 new packages: libspiro Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libspiro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libspiro-20200505-5.el9.i686.rpm 10b60185dcff95be5ae92fc3d67d175ddacf30ebf65a95f37d53224c86859000 libspiro-20200505-5.el9.x86_64.rpm 0c246134e555367789a517502a37f257468b43adb4ef3b44d28e82d0bd7900a5 RLBA-2022:3251 new packages: libsrtp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsrtp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsrtp-2.3.0-7.el9.i686.rpm 5e9ff370b92cb19c5a32d8f45829aa00b9af96c653641a53ae4fda290d498cf3 libsrtp-2.3.0-7.el9.x86_64.rpm a6b7bbf89719c0062d1342bd726417577ec259f10e510f13d4fb5f6ad60acfca RLBA-2022:3252 new packages: libstaroffice Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstaroffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstaroffice-0.0.7-5.el9.i686.rpm f372a67b2727decb4ac55c309fea187fde90ce36d3a0d7b1a28b908334ab13b8 libstaroffice-0.0.7-5.el9.x86_64.rpm bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783 RLBA-2022:3253 new packages: libstemmer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstemmer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstemmer-0-18.585svn.el9.i686.rpm bedd4d56f895d5f3c4d96412b9a75a1220c5b12b8ea42d8650040cfd405075c2 libstemmer-0-18.585svn.el9.x86_64.rpm 1c100c574348ee586077add5d13aa526b47cf69f88eb51750555d86a3e7127d0 RLBA-2022:3254 new packages: libthai Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libthai. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libthai-0.1.28-8.el9.i686.rpm 6197202ec079801b0424e9a92e178c93feed8e3fd309c48d878b73cd6975d6f4 libthai-0.1.28-8.el9.x86_64.rpm 06babaa62e1fd04f0b7bfebaa55d9d3beb215f1543356be6b25ee7d0cb0a948b libthai-devel-0.1.28-8.el9.i686.rpm f5b97b428d94d6cb01efde0283a8e08af7f71fffc914dd97d5d9fd08c19cfb43 libthai-devel-0.1.28-8.el9.x86_64.rpm a1bc54db633e3e8499f810037322f0fa5ea701e49d8c444e8122a2245a14545c RLBA-2022:3255 new packages: libtheora Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtheora. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtheora-1.1.1-31.el9.i686.rpm d5b91e82dcd7eb6b9947417917534db7196c7c44848f2387413aee32b9b5a8ef libtheora-1.1.1-31.el9.x86_64.rpm d3b85db64000a3b859d7bde0076a28a52c7be5fa40636cc64d695b10372684ea theora-tools-1.1.1-31.el9.x86_64.rpm 93e136126f9fe2a80e8cbfc30fccdb09244c6d35776716c07da53407fdcf1756 RLBA-2022:3258 new packages: liburing Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liburing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liburing-0.7-7.el9.i686.rpm bb52884e5a7e7a10ef273cad1bd78a0eeccca55782e3f5d27fabca844477605e liburing-0.7-7.el9.x86_64.rpm fa78ff026c3f74fddb55dcc7a56325390f7f4dd9d4e8b99786d35de47f1bfdf2 RLBA-2022:3259 new packages: libusb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libusb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libusb-0.1.7-5.el9.i686.rpm d71d66bb4a6b9ecac9b63c6ef20287945f94da5b8036156358523554b341bf29 libusb-0.1.7-5.el9.x86_64.rpm ae368057141ae71e4b683222ca810d4b6547518a77b4748ea06863f5b774f844 RLBA-2022:3260 new packages: libvdpau Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvdpau. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvdpau-1.4-6.el9.i686.rpm 68e9094c677d1e71399211fb37155a1af49d3eae73b48f1b3359892b5eee7fd4 libvdpau-1.4-6.el9.x86_64.rpm 2d7d51005a7a087334a6faa61462e7715cbe18a87832f8ebaa7febcac08b3cdc libvdpau-trace-1.4-6.el9.i686.rpm 573219ba4515664c75151a7e5a3e53fe60142d1ddbd789f5f8e577052e3702c1 libvdpau-trace-1.4-6.el9.x86_64.rpm f78ef13ee698bdbd9dfd66ddf390cc1e6708dcea4b2b63ccc5758e992926b01e RLBA-2022:3261 new packages: libvirt-dbus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-dbus-1.4.1-5.el9.x86_64.rpm f8d32c75cd95b9be8670e6f6e92546515b707a1026768a879a28dbefb56fe172 RLBA-2022:3262 new packages: libvirt-glib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-glib-4.0.0-3.el9.x86_64.rpm ece24cff3cea037bd2a04e2cec8ca15ce3f6fcda4b99891e3e3d1bd763a6e150 RLBA-2022:3263 new packages: libvisio Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvisio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvisio-0.1.7-9.el9.i686.rpm e73b392b8bceaff01beb14f1a5f9f23f34d762a6852a55536df22bba70d4b9d2 libvisio-0.1.7-9.el9.x86_64.rpm ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324 RLBA-2022:3264 new packages: libvisual Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvisual. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvisual-0.4.0-34.el9.i686.rpm 40752c55ea79166853b4ec737fcfce73cec438ac45c55a86b3e3db35e08a46df libvisual-0.4.0-34.el9.x86_64.rpm 628fd8d18ae0ec4cc213baca32c3fd0ad18150f17edd19ec25afdb5bf637f760 RLBA-2022:3265 new packages: libvoikko Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvoikko. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvoikko-4.3-7.el9.i686.rpm 82209dc6c6bbf5896668414a544f4a40668f394c68da3d6631e132608b112620 libvoikko-4.3-7.el9.x86_64.rpm 700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a python3-libvoikko-4.3-7.el9.noarch.rpm 73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f RLBA-2022:3266 new packages: libvorbis Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvorbis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvorbis-1.3.7-5.el9.i686.rpm 12ec8f87938e116a09577c72f5cff90044785d75f1a67edab32c4087e901f145 libvorbis-1.3.7-5.el9.x86_64.rpm c57530fcd760d7c465826b85dd5dabc086b7922e875da914cf30744c77197dca RLBA-2022:3267 new packages: libvpx Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvpx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvpx-1.9.0-5.el9.i686.rpm aa9f90478f5d6030cabe42290bf9f49e5d105ab0cb76dde262df5bcc2a68c7b1 libvpx-1.9.0-5.el9.x86_64.rpm c622cd5eaaec519f1c49e197259d54d20076536bf31d208bc50325bdaf298723 RLBA-2022:3268 new packages: libwebp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-3.el9.i686.rpm 3f5170905cb36ae60209b56ef69238af3bed0fd910f87ddc0aa76d3aa0374964 libwebp-1.2.0-3.el9.x86_64.rpm 3d19d8c911cfaa907698f9d4bedf9aa22269a67fb707fe4148b2e4261244235e libwebp-devel-1.2.0-3.el9.i686.rpm 349098e5e9957c5401f89de303f362ab0133c6a7f00748d8daf83bc751f550fc libwebp-devel-1.2.0-3.el9.x86_64.rpm 65b8a68fbb345a96a17266e035261f01b9aaf38dd7e0a0c7710e82ad1bfe1caf RLBA-2022:3269 new packages: libwnck3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwnck3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwnck3-40.0-2.el9.i686.rpm 8f6aff2b36fb1404422431f0ce53ccbc0e5023ba4e22835a5e3cc5cde74e56cf libwnck3-40.0-2.el9.x86_64.rpm 2d418875f04a64e1f6eeab44fda6fce33b6a9fc8f050c4d2975aa5b1301c20b8 RLBA-2022:3270 new packages: libwpd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwpd-0.10.3-10.el9.i686.rpm 7a7a81462e70ba3b04632e7694866b7786a34ec8a30e3916d70da4ec738fbd6c libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 RLBA-2022:3272 new packages: libwpg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwpg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwpg-0.3.3-8.el9.i686.rpm 0932067af1048e45cdffb7bfa263dfa146b3692da08f7704576b88f9b933030e libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 RLBA-2022:3273 new packages: libwps Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwps. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwps-0.4.12-4.el9.i686.rpm 50219656c7e51cde2a8969e40a69227e03cce44c11d8db925bc56171cd1d223b libwps-0.4.12-4.el9.x86_64.rpm 62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0 RLBA-2022:3274 new packages: libxcb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxcb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxcb-1.13.1-9.el9.i686.rpm ae05ff23ab6ae681b53fa403b819a6bff0f2c05e33151429910c17f121a66831 libxcb-1.13.1-9.el9.x86_64.rpm 759581ab8b7935e159beb690be7c5279a5642d5ce0deb369b12396962bf1257c libxcb-devel-1.13.1-9.el9.i686.rpm fcb6338210a3206c20bec7c570045ae4c44bcb9905ee0824678dc58ce54bc131 libxcb-devel-1.13.1-9.el9.x86_64.rpm 961afe230fee8f27acdfb5bdd528b35e5138f83c1032f374100e756fe9e44f06 RLBA-2022:3275 new packages: libxkbcommon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxkbcommon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxkbcommon-1.0.3-4.el9.i686.rpm ff047f229e11c8cd6e605e6fde1e08a9e877d1ab1c1f8abed5e6048228d2d415 libxkbcommon-1.0.3-4.el9.x86_64.rpm e806faf168de52e934b88a52aa6c16a87cedefaae97d130e4bc10a997d14f93f libxkbcommon-devel-1.0.3-4.el9.i686.rpm 238934e35501c6aae0c6c6f35422d897750003c3654a5ebcdae7b71b47a6d299 libxkbcommon-devel-1.0.3-4.el9.x86_64.rpm fdb28b3722d1bd7b512d391ca7d5dd38e4af9ff49b07186608b8f70c285a0aa9 libxkbcommon-x11-1.0.3-4.el9.i686.rpm 8401daedace1a858177e9a416d0d8b32dd3d98059a39da37c74c76fb2ce7dce9 libxkbcommon-x11-1.0.3-4.el9.x86_64.rpm 80d6c9dad2ac97f6ecc5295b8995f90f4d0c91f6fd40998400b2be7477d9579f RLBA-2022:3276 new packages: libxkbfile Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxkbfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxkbfile-1.1.0-8.el9.i686.rpm 68a552b5ac8f3a43ef8351713c527f9f1d61796246aa83661b41e0d625a032ef libxkbfile-1.1.0-8.el9.x86_64.rpm e2b4cfd781ce91e12cd760c612d4ed603f763d17ef215ea603be5b4c91b4c82f RLBA-2022:3277 new packages: libxklavier Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxklavier. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxklavier-5.4-20.el9.i686.rpm cdd597c7213f04d166f6617123ee095273294429d4e9642ecfb5b4a6f36f8bdf libxklavier-5.4-20.el9.x86_64.rpm ac50408016c8b60f9cef61af20b3c8986e020b7d006f82f7e8b1377d82254834 RLBA-2022:3278 new packages: libxshmfence Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxshmfence. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxshmfence-1.3-10.el9.i686.rpm 7bc4c251d37aafe4cffcc96961544ea617acfae0507ab9660facb63b529b49e5 libxshmfence-1.3-10.el9.x86_64.rpm 4f10626c3a16e3f22087d208ffa45868558c155123b0c7d4c0c55d696e19aeec libxshmfence-devel-1.3-10.el9.i686.rpm eb34910011b0b3d969c6cb944322ab08228e40e2f2308e72cd5af368546800fa libxshmfence-devel-1.3-10.el9.x86_64.rpm 62a4b8689fcd3622f53ac0571e57c98374d4e41ee5cc1596481262e6a7f6ea18 RLBA-2022:3280 new packages: libzip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libzip-1.7.3-7.el9.i686.rpm 9a208bf2a59163641eb32a444e6f679ce5cbed0f26877f598f3cf408aa0acca7 libzip-1.7.3-7.el9.x86_64.rpm 3c60ebff40aef76fdd88aa98aeafa39d037ca266f6318dc76d0adc52e9e73fa0 RLBA-2022:3281 new packages: libzmf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libzmf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libzmf-0.0.2-18.el9.i686.rpm 369e0756c34d763951bc0f53951fef4bb3f96dcc27a918827598e6fffc95c42e libzmf-0.0.2-18.el9.x86_64.rpm fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b RLBA-2022:3282 new packages: linuxconsoletools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxconsoletools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms linuxconsoletools-1.7.1-3.el9.x86_64.rpm 3311bbbf4dea96d94ece964434224ac9ff49dc4ef1a83194011ffe3091ebe584 RLBA-2022:3284 new packages: lklug-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lklug-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lklug-fonts-0.6-26.20090803cvs.el9.noarch.rpm d1399564b5148247c7a1b4a84c933900d74d172ced271d3ff3092a672782284e RLBA-2022:3285 new packages: lldpd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lldpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lldpd-1.0.4-10.el9.i686.rpm 6b4e3f4c97f725e49770c04f11a0c4cab92a9b5ea1222a2f2b0131fe4b9ec99e lldpd-1.0.4-10.el9.x86_64.rpm d4d29cc1b54a7898578622b67ce3b1b08c70a3aa5741a71be0d6b1bf98379a88 RLBA-2022:3286 new packages: lm_sensors Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lm_sensors. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lm_sensors-3.6.0-10.el9.x86_64.rpm af7cc35aec437b5a31358196c52e232b7f31397160c420136d030815b7f9efc0 lm_sensors-devel-3.6.0-10.el9.i686.rpm cded0d31277f5d9310731f6f97eef57d7ca5730de23a28ffdb634f94c928657f lm_sensors-devel-3.6.0-10.el9.x86_64.rpm 57fc09080295affcb5f96ca558b16c9bc81b6e0a5f4935e2c7938f00fdb123d3 lm_sensors-libs-3.6.0-10.el9.i686.rpm 6f00005f964696e756e11fedcc91faceb0179472bfa0615246ffb3e0ead4df4b lm_sensors-libs-3.6.0-10.el9.x86_64.rpm 52bc9efe00740e12b81dc4c3eb67b6adbdfc2b4496e281b487c92802be6468a2 lm_sensors-sensord-3.6.0-10.el9.x86_64.rpm 1cc062f499a0b3e4c62366fb32e2866d01bed49a7ef8757866c8b8465c015407 RLBA-2022:3287 new packages: logwatch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for logwatch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms logwatch-7.5.5-4.el9.noarch.rpm e57f612dfe6ba6d0abf0c224279288ba05a7cfc37a8cce8257ad67d776a2c489 RLBA-2022:3288 new packages: lohit-assamese-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-assamese-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-assamese-fonts-2.91.5-13.el9.noarch.rpm dd0026f340e88e7435152571d46116064438cc02b1885aea6216a72fe16e9ab3 RLBA-2022:3289 new packages: lohit-bengali-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-bengali-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-bengali-fonts-2.91.5-13.el9.noarch.rpm 84981f5f4b0f1a72f973106cd5e5695f23e67eca027c35b2745661ad757f65de RLBA-2022:3290 new packages: lohit-devanagari-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-devanagari-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-devanagari-fonts-2.95.4-14.el9.noarch.rpm 46f3f8a880a174111869ad20f7cee8fb35d3f33ed59747682e9bf349da80cfd7 RLBA-2022:3291 new packages: lohit-gujarati-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-gujarati-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-gujarati-fonts-2.92.4-13.el9.noarch.rpm e3729242c57233d1752e902e4eec4d5114ea40753100332d21e0692863b68ac3 RLBA-2022:3292 new packages: lohit-gurmukhi-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-gurmukhi-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-gurmukhi-fonts-2.91.2-14.el9.noarch.rpm 7c4d71cc1674ee655d1bd00f8eb0d60a7544a6ccf084e5a6dffa350f4ab76dc8 RLBA-2022:3293 new packages: lohit-kannada-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-kannada-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-kannada-fonts-2.5.4-12.el9.noarch.rpm 2bd661e59f18131dd694451a3ccec94182c8f9abe4b62f88142f716839433105 RLBA-2022:3294 new packages: lohit-marathi-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-marathi-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-marathi-fonts-2.94.2-14.el9.noarch.rpm 6135d57b0b05c146f16ffa1a4b084d16ea2bf81ecc2418be3518d8f6f5a76b73 RLBA-2022:3295 new packages: lohit-odia-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-odia-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-odia-fonts-2.91.2-13.el9.noarch.rpm 68aaf9a0e0be99f545242ec556ff1422c011ae94d27496fdf5cf1dcb4ee156c3 RLBA-2022:3296 new packages: lohit-tamil-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-tamil-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-tamil-fonts-2.91.3-13.el9.noarch.rpm 41c892f760174b8317a7c89ebf4604fe9ef64d6de63b70cb72fa243fd3004889 RLBA-2022:3297 new packages: lohit-telugu-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lohit-telugu-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lohit-telugu-fonts-2.5.5-12.el9.noarch.rpm 9c7b7dc3f3f84f4626e95582108b45f9a9d43f9b282f3af642324490bed73b2c RLBA-2022:3298 new packages: low-memory-monitor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for low-memory-monitor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms low-memory-monitor-2.1-4.el9.x86_64.rpm ab671224e3f150c2e671f7a2090a2e3094cd7b47fbfe0680f7579b3c937faab8 RLBA-2022:3299 new packages: lpsolve Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lpsolve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lpsolve-5.5.2.0-28.el9.x86_64.rpm 8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b RLBA-2022:3300 new packages: ltrace Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ltrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ltrace-0.7.91-43.el9.x86_64.rpm 6e3ad1850883ae0963f7f3f73d27fdceb777ece4d709d5abaddb9f2b3d4169a2 RLBA-2022:3301 new packages: lttng-ust Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lttng-ust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lttng-ust-2.12.0-6.el9.i686.rpm 0a51fb0887b3fd2c9a0439dc804973a31b5f44838c4672dfc42dec50a54c31c5 lttng-ust-2.12.0-6.el9.x86_64.rpm 6c10518bc5b9c00502ac1540567ae0248e38380662619761d9f385ea37f7a4b4 RLBA-2022:3302 new packages: lua-rpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lua-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lua-rpm-macros-1-6.el9.noarch.rpm 6c583d025d0677b41df376a87f9b0dead705ac39dfd1d8a3973891a5d67df450 lua-srpm-macros-1-6.el9.noarch.rpm a5cab6e3a6ecb1d3a87c1573d0e993ff042e5948fa8e8262740b53c69eac2390 RLBA-2022:3303 new packages: luksmeta Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for luksmeta. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libluksmeta-9-12.el9.i686.rpm 8bd74f4f9eb8aada11471c42d7c0bd2a9dc397a242650b23d83e32ccf6762d24 libluksmeta-9-12.el9.x86_64.rpm 391474425feaf13f8a877c870568e576859a050f932dece2b48a7300053578bd luksmeta-9-12.el9.x86_64.rpm 9a09f7555f075d8f18e9a683e452d9a712f143a0bbe730fc5c6459e243070a72 RLBA-2022:3304 new packages: m17n-db Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for m17n-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms m17n-db-1.8.0-16.el9.noarch.rpm 8f82bdc58bbb537f38d5acb8e16a8b744beeceba739850b11169aa83ae7f4690 RLBA-2022:3305 new packages: m17n-lib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for m17n-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms m17n-lib-1.8.0-13.el9.i686.rpm 9c87b908872e06aadfda0afca2a6a99084beec759ff31499983bac8faf73ceda m17n-lib-1.8.0-13.el9.x86_64.rpm 7e5b76f5c91a2cd8194add1eea0d9618d08c45703c44ebf180dede59ab226418 RLBA-2022:3306 new packages: madan-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for madan-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms madan-fonts-2.000-32.el9.noarch.rpm cc0aa6edbefe20c323d282bba5f50003330e66a51c1b9b7db01b70f59692f3f4 RLBA-2022:3307 new packages: mallard-rng Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mallard-rng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mallard-rng-1.1.0-7.el9.noarch.rpm 2bd81c9d55885e161631eee718511cce8c83126726025cc7be1929ae320f9b9b RLBA-2022:3308 new packages: man-pages-overrides Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for man-pages-overrides. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms man-pages-overrides-9.0.0.0-1.el9.noarch.rpm 27b882340d6653aa7de966639494146368b2c537e29381b986683f1d4a358f0d RLBA-2022:3309 new packages: mariadb-connector-c Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mariadb-connector-c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mariadb-connector-c-3.2.6-1.el9_0.i686.rpm d04f5a3d8a1cdce03afce92687c69e44a638ea37986aac8d897301c3142dc1ba mariadb-connector-c-3.2.6-1.el9_0.x86_64.rpm 007d48646e32a1747734871f4169495fd04ae62b670a9a5ebcca9997329f6a8c mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm 35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f mariadb-connector-c-devel-3.2.6-1.el9_0.i686.rpm a623746a24198a03da5590ed9deb4b95733b352fde940f7f67cf92c12e9cf5ac mariadb-connector-c-devel-3.2.6-1.el9_0.x86_64.rpm 2562fbfe459c902520b792ca0827024402b856c0eab28da8df59e2bcda2bbb31 RLBA-2022:3315 new packages: mecab Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mecab. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mecab-0.996-3.el9.3.x86_64.rpm 62631d13849946a0b31605ff6b214de5cffb8f218cee25e652982e60066edb9f RLBA-2022:3310 new packages: mariadb-connector-odbc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mariadb-connector-odbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mariadb-connector-odbc-3.1.12-3.el9.x86_64.rpm 74daff791c4bf8f5c4c1dc4d5846ddb641448311312ff0fb6efc6c7e3f4fc4dd RLBA-2022:3311 new packages: matchbox-window-manager Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for matchbox-window-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms matchbox-window-manager-1.2-31.20070628svn.el9.x86_64.rpm 3d5aeef416ad33923643c6ac742de6f4a61f3f0920a78bb747fb30b04768a5c4 RLBA-2022:3312 new packages: maven-shared-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-shared-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms maven-shared-utils-3.3.4-2.el9.noarch.rpm 0a94272c449294555eae6fd085d5a8d5af746d8bd31069eda701c2556243e4e7 RLBA-2022:3313 new packages: maven-wagon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-wagon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms maven-wagon-3.4.2-6.el9.noarch.rpm da1f99fd64f685c69f3a8e7be5f8da0fbbcfcab1ff239e091349fc1913edf64b RLBA-2022:3314 new packages: mc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mc-4.8.26-5.el9.x86_64.rpm fd2dac26e2e8d8367e44fdbf14e116ea3db9f6916bdfc524cb49d31d33d2fdb8 RLBA-2022:3316 new packages: mecab-ipadic Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mecab-ipadic. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mecab-ipadic-2.7.0.20070801-24.el9.x86_64.rpm a04682a17aa693899bd7718c353c19e1aabb983a74ced51d93c0c89af30d62db mecab-ipadic-EUCJP-2.7.0.20070801-24.el9.x86_64.rpm 3769899266c580c211f7c4bed345b155efc322052d404e9c66183d0958495d6a RLBA-2022:3318 new packages: memtest86+ Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for memtest86+. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms memtest86+-5.31-0.4.beta.el9.x86_64.rpm 529cf2a32a069db1118b63430c160a26b2b8a715a726f9ee88ed24af370ca2e0 RLBA-2022:3320 new packages: mesa-libGLU Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa-libGLU. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-libGLU-9.0.1-6.el9.i686.rpm ef518088bcb902d102d8f42deafa52d0c266c947a7cf69449cbd0b8f26dac826 mesa-libGLU-9.0.1-6.el9.x86_64.rpm c7da4f0a399f5b9d5833dc1f5d0f388d9b5ecf6cd7ad6fbd9397f5a661393a68 mesa-libGLU-devel-9.0.1-6.el9.i686.rpm fa22305485c2ec64f82e53665f9f95386229d715ab05a2cc3f18aa842398aed9 mesa-libGLU-devel-9.0.1-6.el9.x86_64.rpm 58c44993f0ef419b8722e91cd3a988bcd3bc1d2e1a08b84217e06f5d7c2b9460 RLBA-2022:3321 new packages: mesa-libGLw Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa-libGLw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-libGLw-8.0.0-23.el9.i686.rpm cc0071e42974969c2fa6f8777d0c8f23e66c18383d75f8fa2b4a0204f22315c1 mesa-libGLw-8.0.0-23.el9.x86_64.rpm 1fdf4c16d17cd3ec8a72f425f5e592e4b133fa5c96c02c99be0bfb5eac049a6c mesa-libGLw-devel-8.0.0-23.el9.i686.rpm 1faae05d27578cbce54e575978096ec1c7fbf4bba9733e726beb0eb1bf7fbd49 mesa-libGLw-devel-8.0.0-23.el9.x86_64.rpm 6eeed9906edf564c09eaf3d43cfd9492d84f8756038adc83704db64500ed6da1 RLBA-2022:3322 new packages: micropipenv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for micropipenv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms micropipenv-1.0.2-5.el9.noarch.rpm 447d54febe87b918826fed41981355c33230347e6bfd9005d03a7b2c8c079d5e RLBA-2022:3325 new packages: mingw-srvany Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-srvany. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-srvany-1.0-29.20210127git89f2162c.el9.noarch.rpm 969bf17d1ca59d9be2d6bef5f7e78220eda9e0bc915b92edba5cb7f60bdb06ad RLBA-2022:3326 new packages: mkfontscale Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mkfontscale. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mkfontscale-1.2.1-3.el9.x86_64.rpm 35068992e79d872eb9fcd11a986910de00799d574cb746f8429ced2578d7c782 RLBA-2022:3327 new packages: mobile-broadband-provider-info Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mobile-broadband-provider-info. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mobile-broadband-provider-info-20210805-2.el9.noarch.rpm 683b53df6181ceff28d57f74c7ee8a44a22c3d36cca5877a429a8b7233c1e82e RLBA-2022:3328 new packages: mod_auth_gssapi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_gssapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_gssapi-1.6.3-7.el9.x86_64.rpm 26f6e7a698f56c88e27333db327cc4224ded51809ace25f00fd778446f191f9a RLBA-2022:3330 new packages: mod_authnz_pam Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_authnz_pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_authnz_pam-1.2.2-3.el9.x86_64.rpm 14e0506013e9188f7c00ef16f17e97e6c4f491b1067c8c45715c80e1d168857a RLBA-2022:3331 new packages: mod_fcgid Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_fcgid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_fcgid-2.3.9-28.el9.x86_64.rpm 9d3f2d119905d026e01e46d8718e523fe24430b06ae2be6853f60c4bde588f7a RLBA-2022:3332 new packages: mod_http2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-1.15.19-2.el9.x86_64.rpm fd31034a7df3b458dcaa3a0eba86b80fd53dcbbce566587b2c51929bd39255ea RLBA-2022:3333 new packages: mod_intercept_form_submit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_intercept_form_submit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_intercept_form_submit-1.1.0-15.el9.x86_64.rpm a325ed17b39ae759c71a46fe332af0965d963da0d04f0542e2b531fd7137a613 RLBA-2022:3334 new packages: mod_jk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_jk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_jk-1.2.48-22.el9.x86_64.rpm 97674abd7f01ea94cde6847f6793f591cd1780e24ef24b962dfabae94bc7e7ad RLBA-2022:3335 new packages: mod_lookup_identity Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_lookup_identity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_lookup_identity-1.0.0-15.el9.x86_64.rpm 1ec92c31cc2fbfbcaefe1d63297643ae251d5893a38ddc4e8740f20cfdc9329a RLBA-2022:3336 new packages: mod_md Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_md. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_md-2.4.0-3.el9.x86_64.rpm 0d9a0f4f5dd82929e8306be4be80765280e5ebe7c9c1ea7f8e05b4da7ebb7572 RLBA-2022:3337 new packages: mod_proxy_cluster Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_proxy_cluster. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_proxy_cluster-1.3.14-23.el9.x86_64.rpm 4602affdf3cc3e628482523eec14b94d46f823de8b723bf5896d4707a107ed8e RLBA-2022:3338 new packages: mod_security Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_security. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_security-2.9.3-12.el9.x86_64.rpm 17261bdc873959db7743d4890e03689ba318c541b7ee9b6d5d76da649f5fecc4 mod_security-mlogc-2.9.3-12.el9.x86_64.rpm f4fe13bc74055b4dbfd127b8c9fb378281601c5d02ba26c90da56bfa94abc39a RLBA-2022:3340 new packages: modulemd-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for modulemd-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms modulemd-tools-0.9-3.el9.noarch.rpm 30c86ee4a454c2126f24dbc6ba8d5497f8a246d369520000b1f101a35ffcf1f2 RLBA-2022:3341 new packages: mpg123 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpg123. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mpg123-1.26.2-5.el9.x86_64.rpm e13ca78b6d8fb99769efd2278f067f3a220fa75a642360d364a7b8a7e353a2c0 mpg123-libs-1.26.2-5.el9.i686.rpm 387fa6a59ee2a0907adbff5db5f35cc274db141225402208268edf7c53dbc1ad mpg123-libs-1.26.2-5.el9.x86_64.rpm ae5017ee654fefc2b93283e0cf40d33512992d3f2285c3a183be55fca1d847b4 mpg123-plugins-pulseaudio-1.26.2-5.el9.x86_64.rpm ffa9b74b8322132864728b547937f93898132f1e7aeb696227ca187bb78d266b RLBA-2022:3342 new packages: mrtg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mrtg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mrtg-2.17.7-10.el9.x86_64.rpm 39d710e93487d6df6608978dd1aa49e3b97dbce6d2759afc8289453bb37971a7 RLBA-2022:3343 new packages: mt-st Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mt-st. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mt-st-1.4-7.el9.x86_64.rpm 8c1e07fda57422f0e42683e74dd1cd6a0a2c9be904d918d4b44254417a7bc396 RLBA-2022:3344 new packages: mtdev Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mtdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mtdev-1.1.5-22.el9.i686.rpm a0bcf811abe4c46e53f9d829a86d5bbe01492460ee943e6c71cc4e76c69ee326 mtdev-1.1.5-22.el9.x86_64.rpm c359a327063719ca24169d600b4c53693d89a881079b9820fab7b8f8e211cff9 RLBA-2022:3345 new packages: mtx Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mtx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mtx-1.3.12-26.el9.x86_64.rpm aa712e9b6483f35593cd056df86dc551fecd3d95b4f19649eb9b1c796fc49680 RLBA-2022:3346 new packages: munge Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for munge. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms munge-0.5.13-13.el9.x86_64.rpm 3ddb5c379b6227315c28fc0ac84e891f778ac54ebfac59abfe5a420ec0c4944a munge-libs-0.5.13-13.el9.i686.rpm 0bb6b2d8086965b9c229d4d3d2244cba80229373582b94f84f4ee200d5967f05 munge-libs-0.5.13-13.el9.x86_64.rpm 915122ccb6bd1903e3280ca64889ac98587098c2002fb2451a2ccd6e17e76bcc RLBA-2022:3347 new packages: mvapich2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mvapich2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mvapich2-2.3.6-3.el9.i686.rpm 290f20ad060e46bb47908dadcac3165802d146da4b6dad56263d52334bfecd29 mvapich2-2.3.6-3.el9.x86_64.rpm d40244c339969261b3016e89a5bdaecaf54e620fc44c6014e2b658f8ef8af472 mvapich2-devel-2.3.6-3.el9.i686.rpm 73a5561960be21b4953bf40ff0d930d441c7e4ef51a3b8f4b1d53b95a7b37829 mvapich2-devel-2.3.6-3.el9.x86_64.rpm 03cb36382df386c5d40f8fddb9b252cd87ffd5675862131660041865f010241d mvapich2-doc-2.3.6-3.el9.noarch.rpm 26d068dc07b6831b9651445a2c3197565c4c64ad3eceaa3bfe4fb5908603d26f mvapich2-psm2-2.3.6-3.el9.x86_64.rpm ca36499080d6ae8032e76af3668d41813e03dd50194e1b98c2d66c77ae9e4332 RLBA-2022:3349 new packages: mythes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-1.2.4-18.el9.i686.rpm 19a25ed9efd23383829dff20c0c3af47628333e141966c78c3edf1066bb8eb7a mythes-1.2.4-18.el9.x86_64.rpm 9c5a4860e65c3f859797d4117386f9bf94c50cd54c4e95610a62e40294d9eeb0 RLBA-2022:3350 new packages: mythes-bg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-bg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-bg-4.3-21.el9.noarch.rpm 1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb RLBA-2022:3351 new packages: mythes-ca Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-ca. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-ca-1.5.0-24.el9.noarch.rpm ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b RLBA-2022:3352 new packages: mythes-cs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-cs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-cs-0.20070926-27.el9.noarch.rpm c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e RLBA-2022:3353 new packages: mythes-da Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-da. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-da-0.20100629.15.16-22.el9.noarch.rpm 2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233 RLBA-2022:3354 new packages: mythes-de Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-de. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-de-0.20210302-3.el9.noarch.rpm 56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298 RLBA-2022:3355 new packages: mythes-el Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-el. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-el-0.20070412-27.el9.noarch.rpm a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393 RLBA-2022:3356 new packages: mythes-en Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-en. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 RLBA-2022:3357 new packages: mythes-eo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-eo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-eo-0.20180330-8.el9.noarch.rpm c55f617fb7604137dab74afa18454a6dbb3ebf687b5f0b7732205c51a1bc6e8c mythes-eo-0.20180330-8.el9.noarch.rpm e382eccb945d331b618b8e0feb5395609d7d16abbf7a062c11715a88166791e2 RLBA-2022:3358 new packages: mythes-es Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-es. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-es-2.3-10.el9.noarch.rpm 5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2 RLBA-2022:3359 new packages: mythes-fr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-fr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-fr-2.3-19.el9.noarch.rpm c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb RLBA-2022:3360 new packages: mythes-ga Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-ga. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-ga-0.20071001-27.el9.noarch.rpm ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3 RLBA-2022:3361 new packages: mythes-hu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-hu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-hu-0.20101019-23.el9.noarch.rpm 95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967 RLBA-2022:3362 new packages: mythes-it Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-it. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-it-2.0.9l-26.el9.noarch.rpm c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6 RLBA-2022:3363 new packages: mythes-nl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-nl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-nl-0.20130131-17.el9.noarch.rpm 1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121 RLBA-2022:3364 new packages: mythes-pl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-pl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-pl-1.5-28.el9.noarch.rpm ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2 RLBA-2022:3365 new packages: mythes-pt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-pt-0.20060817-27.el9.noarch.rpm 1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36 RLBA-2022:3366 new packages: mythes-ro Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-ro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-ro-3.3-22.el9.noarch.rpm b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7 RLBA-2022:3367 new packages: mythes-ru Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-ru. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-ru-0.20070613-25.el9.noarch.rpm 9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3 RLBA-2022:3368 new packages: mythes-sk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-sk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-sk-0.20130130-19.el9.noarch.rpm 03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed RLBA-2022:3369 new packages: mythes-sl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-sl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-sl-0.20130130-19.el9.noarch.rpm 620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d RLBA-2022:3370 new packages: mythes-sv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-sv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-sv-1.3-21.el9.noarch.rpm 9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3 RLBA-2022:3371 new packages: mythes-uk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mythes-uk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mythes-uk-1.6.5-22.el9.noarch.rpm bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d RLBA-2022:3372 new packages: navilu-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for navilu-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms navilu-fonts-1.2-19.el9.noarch.rpm 631312dae346453d8f0d2b469ca52d9ed268a625b1d279710dbb8c6c8bcb686e RLBA-2022:3373 new packages: neon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for neon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms neon-0.31.2-11.el9.i686.rpm ebf152c95e89da818070828e4c8354b179c4677f516bc9811cda1d2cfbde0465 neon-0.31.2-11.el9.x86_64.rpm 30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed RLBA-2022:3374 new packages: netpbm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netpbm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms netpbm-10.95.00-2.el9.i686.rpm 469eb9451f4508b38adfe76e72ae4655856ad0d52d99e2ab30af070406eab7f9 netpbm-10.95.00-2.el9.x86_64.rpm 214d751e41a68f659ac8fd869c835d6258e9ee0243b6c93673d42a4a1e28c6a0 netpbm-progs-10.95.00-2.el9.x86_64.rpm d9e8a1d308e2547a8ae6e0e968535861b1cfa6e154d7fd8fa2b467e45b6f4408 RLBA-2022:3375 new packages: nmap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nmap-7.91-10.el9.x86_64.rpm ee236ffca7659faeb51bd74ac7dc6667867a79b30c27b1344ccd7d96b6e83a1b nmap-ncat-7.91-10.el9.x86_64.rpm 68c404293d3a392dd0576d5f683c7448a912de26b6ba59900951308e8c308473 RLBA-2022:3377 new packages: nss-altfiles Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss-altfiles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nss-altfiles-2.18.1-20.el9.i686.rpm c93b0f98b5ea2e3e7ce14aa7741bf8fb130eef5a5354407c8df8bf8f323223c2 nss-altfiles-2.18.1-20.el9.x86_64.rpm f9beabe66d217b949578d08ea868893679e1516a7171439f9fe991e8ebd9d1a2 RLBA-2022:3379 new packages: ntpstat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ntpstat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ntpstat-0.6-6.el9.noarch.rpm 9bac2db04d262d94abab1f16b8e4a560831a33fdec3a12338c7614eb4739c69e RLBA-2022:3378 new packages: nss_wrapper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss_wrapper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nss_wrapper-1.1.11-7.el9.i686.rpm e7a13920e6db64f5f604a6daaf383af6a25feb93cd402d30139b36c8e3a6ad39 nss_wrapper-1.1.11-7.el9.x86_64.rpm 7842d293712037a0c80f850859d3f2c0455cdcb76a4c17b1ce0c9f059a43a0fc RLBA-2022:3380 new packages: objectweb-asm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for objectweb-asm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms objectweb-asm-9.1-5.el9.noarch.rpm 4dd93dcacd0a3f36b6f1191dc286780de798c2a0190a0cf769eed9bb12bf81fc RLBA-2022:3381 new packages: ocaml-srpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ocaml-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ocaml-srpm-macros-6-6.el9.noarch.rpm d3734ecf41e5adca9ee09baf59e7a3a54481cd7bfad00e433d0fedb0eea2d924 RLBA-2022:3382 new packages: ocl-icd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ocl-icd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ocl-icd-2.2.13-4.el9.i686.rpm 81c3e18424d366ca07070a35d1cb084a2c113b7a4df846413b1b82177f25b761 ocl-icd-2.2.13-4.el9.x86_64.rpm 89c3df8be01178f6b06eca5c2025ef11e4983c50afdcf83c66454441aef9f6b0 RLBA-2022:3383 new packages: omping Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for omping. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms omping-0.0.4-26.el9.x86_64.rpm a63f04d48c3112f9bb908204f919b95e1b74489f99f5bb5ac149f2a36c9c10f1 RLBA-2022:3384 new packages: ongres-scram Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ongres-scram. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 RLBA-2022:3385 new packages: open-sans-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for open-sans-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms open-sans-fonts-1.10-16.el9.noarch.rpm c7e8849df2eda286fd6660d82cc79bf7881d6af06105b8f2bf2d03e94e29ecdf RLBA-2022:3386 new packages: openal-soft Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openal-soft. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openal-soft-1.19.1-16.el9.i686.rpm 8a3074d181183fd37064fa3f89c2016335868f2c8e26c7fba7685cb1e2263b86 openal-soft-1.19.1-16.el9.x86_64.rpm a73661c62a75bc6aedbe47c67cfa5dabadd8f828732227b521e548ba9d2784e7 RLBA-2022:3387 new packages: openblas-srpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openblas-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openblas-srpm-macros-2-11.el9.noarch.rpm c36ae20c96419534745708b7a93f20ce19f47e953233ca17c4994e25cd4d7c59 RLBA-2022:3388 new packages: opencl-filesystem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opencl-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opencl-filesystem-1.0-15.el9.noarch.rpm d1365a4d760c5a07c29fc6bd80a8481336e1004f2e655b3b785c5cf18f7c09af RLBA-2022:3389 new packages: opencl-headers Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opencl-headers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opencl-headers-3.0-6.20201007gitd65bcc5.el9.noarch.rpm c0bc450d9442efd83aadd1770dc07e9b72dc917ef6047fb7bb8f62cd214d16db RLBA-2022:3390 new packages: opendnssec Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opendnssec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opendnssec-2.1.8-4.el9.x86_64.rpm 3cf3df63f0edfb5d0a091005cfe7d8b1f3c213181ef687313ac53fabd944f070 RLBA-2022:3391 new packages: openexr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-2.el9.x86_64.rpm cad2b18ef4e06fdc32c7d62aea55a161d5f989cc3a506e9fd0317a78ca76048d openexr-libs-3.1.1-2.el9.i686.rpm b95d50ff0fb0ff2061f17d1fbddfda9cbaafe6b99de1744f5b814aca1d4b1d35 openexr-libs-3.1.1-2.el9.x86_64.rpm 6b152c299a73ac7bd009eb1f709a72e416a36682d2d4b115ffa4c834262477c9 RLBA-2022:3393 new packages: openoffice-lv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openoffice-lv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 RLBA-2022:3394 new packages: openoffice.org-dict-cs_CZ Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openoffice.org-dict-cs_CZ. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hunspell-cs-20080822-16.el9.noarch.rpm d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784 hyphen-cs-20080822-16.el9.noarch.rpm 18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a RLBA-2022:3395 new packages: openslp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openslp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openslp-2.0.0-30.el9.i686.rpm a722b82b8ed979603dd12b793670f5c9c1cbdc61a5aa2d5299dcafa6f69845b4 openslp-2.0.0-30.el9.x86_64.rpm fc24a741a1d5fc5e2536b9903817e7cca60b720fc602c88f947121bad4050f97 openslp-server-2.0.0-30.el9.x86_64.rpm 8a9172f34df509d625123e6b13b453ab97169692c38146d35bb6fab30d6aea49 RLBA-2022:3396 new packages: opentest4j Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opentest4j. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opentest4j-1.2.0-9.el9.noarch.rpm 2ac518475aeb4bd5d8aaf664cf53304169fa237a13271ebbd8d82f947a194876 RLBA-2022:3397 new packages: openwsman Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openwsman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwsman1-2.6.8-22.el9.i686.rpm 4010ab11dd7b743bcf97e624813012d32ff2f27bde863ee228687595559417a7 libwsman1-2.6.8-22.el9.x86_64.rpm 2f30722870cccdb82b6449c9f7ce2626670a468925e602ecddb1c4414d4f7861 openwsman-server-2.6.8-22.el9.i686.rpm d91a049139bf23dcbf728f4a7fd7f3a1b99725cded1a1d7265ab0b3631ae024d openwsman-server-2.6.8-22.el9.x86_64.rpm 4f3da3696a5048e2d6f5f7c669ededd3e651b996f77df6dcc641b6e4f4c993f4 RLBA-2022:3398 new packages: opus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opus-1.3.1-10.el9.i686.rpm f470999334727d845bfe2bfac6e31264d4573b7a978b5a3d2a59ab6a1839cc51 opus-1.3.1-10.el9.x86_64.rpm a871c8c2662df51308853f4561cec2f1d7f948ab0a53ba1493f06a01e504f56e RLBA-2022:3399 new packages: orc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms orc-0.4.31-6.el9.i686.rpm c7ee17dd26a7e08fe2a4aee71bde3310b61123d696161e8cd765b0e0c9625146 orc-0.4.31-6.el9.x86_64.rpm 576764e1949b329ca17ba895be5ddab29472fbfac8be45d16f20a9d595f0d8a8 orc-compiler-0.4.31-6.el9.x86_64.rpm 5a1a5c037aeb555cfe6c88f16a6cb237f04a0fe2c434e9b2b7833e7f855bbfd0 orc-devel-0.4.31-6.el9.i686.rpm 759527a00245e1642ab3abed06dbce368b1b0b0914707d8457adabead12642e0 orc-devel-0.4.31-6.el9.x86_64.rpm e447a415c6c395e88d9cfc4ce3ee88ad2298f82964a9d701c91811e97bec1732 RLBA-2022:3400 new packages: orca Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orca. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms orca-40.0-3.el9.noarch.rpm 072db53cb31fe01840c4865c4cc4eb86259298c7ddd8fbcb91444149dbec6ed4 RLBA-2022:3401 new packages: osinfo-db-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-tools-1.9.0-3.el9.x86_64.rpm ead1a0c072b15e08587f888395a77efd6e7e1e5864004be9ab294b16c3f1876f RLBA-2022:3402 new packages: overpass-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for overpass-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms overpass-fonts-3.0.4-8.el9.noarch.rpm a945a57b6e385bcf03a4793b1ec6a68028e91097f143e278e749c4f9239e4fe2 RLBA-2022:3403 new packages: owasp-java-encoder Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for owasp-java-encoder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms owasp-java-encoder-1.2.2-6.el9.noarch.rpm 0206e2b90330b93ea379ef2c373a02cc604dd01e6a55811f4911d73ebae2412c RLBA-2022:3404 new packages: paktype-naqsh-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for paktype-naqsh-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms paktype-naqsh-fonts-5.0-5.el9.noarch.rpm 0816601f43b21491924c9424d46cc3ab6449739f71085c2983fa219dd5df24af RLBA-2022:3405 new packages: paktype-naskh-basic-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for paktype-naskh-basic-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms paktype-naskh-basic-fonts-5.0-6.el9.noarch.rpm 1b25b765640e8c65f7e5b6d7bd26ce45d4e4e6814e6c54138561fd9f1e6cc02d RLBA-2022:3406 new packages: paktype-tehreer-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for paktype-tehreer-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms paktype-tehreer-fonts-5.0-5.el9.noarch.rpm ba483b5b1776a9152131a29ed47d164413d0b9e35fe756ddfa227eac7c5d8382 RLBA-2022:3407 new packages: pango Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pango. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pango-1.48.7-2.el9.i686.rpm fe231369b196617584dd72fdba18d992c31c45b5527b7e0096d5e2fa8f4297b7 pango-1.48.7-2.el9.x86_64.rpm befb665fe617febb70cefff6fa3313b9d7f87a7cf99e9ed067c7535c4aa9d558 pango-devel-1.48.7-2.el9.i686.rpm e93b3d14aa79b7cda01541aef433a655c116877a8e1418b2d23abe940627d935 pango-devel-1.48.7-2.el9.x86_64.rpm e7ad675e5684c63a943d6d7147c2abbcf399098788196eb19d7ebcf2b3ba00fb RLBA-2022:3408 new packages: pangomm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pangomm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pangomm-2.46.1-1.el9.i686.rpm 855650062ca7fb0eaadc31283bc67acfe04a99eb46b8b5a09b3a8e736d1611e4 pangomm-2.46.1-1.el9.x86_64.rpm 4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376 RLBA-2022:3409 new packages: paps Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for paps. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms paps-0.7.1-4.el9.x86_64.rpm 31e8ece3aa187469afc8dc16ba296e0e0037e10acad23600e26ab8909b4a86ef RLBA-2022:3410 new packages: patch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for patch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms patch-2.7.6-16.el9.x86_64.rpm 76b4b0ebecb7dc952372923a96c8f653a723c15299b3f8b7d2aa2ff37c8d948c RLBA-2022:3411 new packages: patchutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for patchutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms patchutils-0.4.2-7.el9.x86_64.rpm e6eebdc12804383f1986c09b95a6ca89b9567b7919ba3788bee8ab11e2dd875b RLBA-2022:3412 new packages: pavucontrol Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pavucontrol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pavucontrol-4.0-8.el9.x86_64.rpm b0a763ad1f790d0c6e7cf8ff32cb0cfd9e536fb248cd219b88e5122ec3009be1 RLBA-2022:3413 new packages: pbzip2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pbzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pbzip2-1.1.13-6.el9.x86_64.rpm cec244f76528d0c2d7faa94a66e2987a2578c3b3b3051e14c76dd65f4729479b RLBA-2022:3414 new packages: pcaudiolib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcaudiolib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcaudiolib-1.1-9.el9.i686.rpm 28a9a8e20e39aca766f65abd145bfa66ca83a93640ae1c0441502ee8d944b81c pcaudiolib-1.1-9.el9.x86_64.rpm 56da3b87ffd26641d1903dc632fd86e92c3268e5cfeff849833f592649be3122 RLBA-2022:3415 new packages: pentaho-libxml Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pentaho-libxml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pentaho-libxml-1.1.3-30.el9.noarch.rpm d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4 RLBA-2022:3416 new packages: pentaho-reporting-flow-engine Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pentaho-reporting-flow-engine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm 561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776 RLBA-2022:3417 new packages: perl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-5.32.1-479.el9.x86_64.rpm e33ab1b77636e133143215f0c59d01007aa4ce99cb2f7ccdaa5a35aa44ac2315 perl-Attribute-Handlers-1.01-479.el9.noarch.rpm 1306819729e96e27da3c69160a9e383aa49431ca396669fb2219d68a694ad707 perl-AutoLoader-5.74-479.el9.noarch.rpm de126737f2568d7cc48ace946b5c5a8b00123ef1655a2ef3eabdc3931bd51a3e perl-AutoSplit-5.74-479.el9.noarch.rpm a9cdf12b568bbd2d05e0af8ef4a0f90d8b1b466a118d66c23784ce5495598354 perl-autouse-1.11-479.el9.noarch.rpm 379a9157fde71791fce35097fa0df9db038b071e67ac05a6e757a37b5e27ca2e perl-B-1.80-479.el9.x86_64.rpm 80504c6be273e46037d16ed933b61b97e776adfef2d43cac081b38505528bb17 perl-base-2.27-479.el9.noarch.rpm 617fc317493cf592d17b1d0f36f12f9160ca4510a2801b258d641e869abb2870 perl-Benchmark-1.23-479.el9.noarch.rpm c8a38526a3e5c84afbc241772985c64b68929b693282fcda826d5c6ff6ff6f3a perl-blib-1.07-479.el9.noarch.rpm f88b66ef6c64c9687754bbe918c68018667f78d2381bb7d633f0069955317337 perl-Class-Struct-0.66-479.el9.noarch.rpm 45770669108af7457ce79781831593f480acccf54478909e96d4c7ed0a80984a perl-Config-Extensions-0.03-479.el9.noarch.rpm 95e2e3d1c0914f34199e94ee50d7535a086f0feea1b1bd9134fd18acf9b5919b perl-DBM_Filter-0.06-479.el9.noarch.rpm fc369fa6a8ed44a3739b9236c2438f109e2b99d724b86412603cee5f8b9f7a72 perl-debugger-1.56-479.el9.noarch.rpm 22b3a23bd34da5736e371fc1ef97c852ccd641e8c570a8bffbc4141666f37823 perl-deprecate-0.04-479.el9.noarch.rpm f16ddedabfd6eb9f27212730cf7b64cc01a8d0156e465d87ee39983815888422 perl-devel-5.32.1-479.el9.i686.rpm 6d444ffce62549d805791f3fd4c8dcac98ff253cbfb97f4f526ad11002f813b4 perl-devel-5.32.1-479.el9.x86_64.rpm 52319d0bcf957455dfbf4bb1ba989d8ce1260a33ffad2b9fb459e4abbbca3a12 perl-Devel-Peek-1.28-479.el9.x86_64.rpm d0171e37d2da8004f50c84b23288432e36f888aeee733024cdc7fcacc2f9f139 perl-Devel-SelfStubber-1.06-479.el9.noarch.rpm 03da81dcad3d204013ee1b847531619aa900c1dece5846985e20dfd466b0d76b perl-diagnostics-1.37-479.el9.noarch.rpm 9a718213410853f9e6d915ff894650e6f5e286aaef39e246ab9cbb2c6b8647db perl-DirHandle-1.05-479.el9.noarch.rpm 1f990bc9f79235d1949d2ece7d1fe0bfd61862a564133785cbf6facec4e3e5ba perl-doc-5.32.1-479.el9.noarch.rpm a66f79d53538a2b34375e75b515ac62f7ad4d32e97a3a2e108a509ca0cdd21af perl-Dumpvalue-2.27-479.el9.noarch.rpm 6e824780bcedfa7cc8f25902581cb63b14af52a6459cc1c9b78575daca522378 perl-DynaLoader-1.47-479.el9.x86_64.rpm 7d67e9d680baeb6ccc7e265dca114ed00c1928a5b63989e480d859c77ecd1b39 perl-encoding-warnings-0.13-479.el9.noarch.rpm a5a1d52a3f0e6c090370c0d09c48de801390c67e85c17d886470c3b7731488bd perl-English-1.11-479.el9.noarch.rpm 6873fe92a079403ccaf19cf5b2d2fc653f7ca5104cf456265bc3d64899e6f157 perl-Errno-1.30-479.el9.x86_64.rpm 9294d0854d99c320d06255a4949a850d0e5d85739a83b946a0ea18c5af9b31a0 perl-ExtUtils-Constant-0.25-479.el9.noarch.rpm 80a14d83ffae2b23863c086cc9936b49e207197f499552126d6be72df595debb perl-ExtUtils-Embed-1.35-479.el9.noarch.rpm b48608ee1ed1488bf2fcfa65101f28152d7a0abce0c06cc34bb35fe4cf7c2f8f perl-ExtUtils-Miniperl-1.09-479.el9.noarch.rpm c53f4d9aab3c372097a192645d0f0d483607139be895c1c9d6f0ae10dea47794 perl-Fcntl-1.13-479.el9.x86_64.rpm 56cb35e61436eef1e1cc9e4baa541680db3f38211d0aaa0bd9de833a1a63746f perl-fields-2.27-479.el9.noarch.rpm 486ba18d3fa23f4445287731c30a48e17bfb972295df599b184e948236ac3494 perl-File-Basename-2.85-479.el9.noarch.rpm 17454567c250ec113ac216de94e9c1bba733de373f9ce1a5065f146ac44e0e50 perl-FileCache-1.10-479.el9.noarch.rpm 90ba4138ef7f11afb807472f87c1b077bbb685af3f4c53946b2f00a442587ee9 perl-File-Compare-1.100.600-479.el9.noarch.rpm 5230e821b757029dd346e36cc7d2ebebea6eb2db824c41950c839dbfa143aa1f perl-File-Copy-2.34-479.el9.noarch.rpm 64b6824c5aecb0b2e8d81b9e3350adc5e7548c25aba9748359f8781f7b038cb0 perl-File-DosGlob-1.12-479.el9.x86_64.rpm 6a2beb8892bbe4d6dc3067fdf666ad0ca037e18519cca15511bbe09f81a22183 perl-File-Find-1.37-479.el9.noarch.rpm 6edb8d78319a62b9933eb05f196cf4c5c80ea92a0c6e3c3f93a2da788d1811bf perl-FileHandle-2.03-479.el9.noarch.rpm fe8a728b970834e974577ccc3352f6f2bf8642d4f25903845651fcd4c641814f perl-File-stat-1.09-479.el9.noarch.rpm 28312b10f75967a7df9cbb302c730092016be042920f473e5f4d652ea720a0f1 perl-filetest-1.03-479.el9.noarch.rpm 6e68d7d2dec5a7b6cdb736cf2c5abb3e9b16ffd69c329981e2a2fdc4831cd346 perl-FindBin-1.51-479.el9.noarch.rpm 48de689527c8004fb2d1a72ab7497581f5bef9920cad51b7a31a79013312a813 perl-GDBM_File-1.18-479.el9.x86_64.rpm 77a2b828226f8d7aca828890e9ec5e4d6e8232866ab752b54584d4a486b95282 perl-Getopt-Std-1.12-479.el9.noarch.rpm 340c7e9a511fc53d82a9fc584bdad8215e4d0eebb5d7d2568af8b38a460b5009 perl-Hash-Util-0.23-479.el9.x86_64.rpm 6cdbb8366e1eb3dd4495a8a8e351a027a73b6ff30b11c6cfa73414ac4470b801 perl-Hash-Util-FieldHash-1.20-479.el9.x86_64.rpm 7415b030f2a4feab08d4570fd36f7aec7617a15c2ebceb0b659cb08d7bb9a466 perl-I18N-Collate-1.02-479.el9.noarch.rpm dd3c8fc259b61ef01b78a7f9398f3de2e4a9a51955ef3cf397696e9a35d48e5a perl-I18N-Langinfo-0.19-479.el9.x86_64.rpm a502cb3b1f1131eff971e3bce520767aee4bba313b99635006a78ef76f491a35 perl-I18N-LangTags-0.44-479.el9.noarch.rpm e64c35a0ea9566be4cd8b1c236c39587aa4bd7c3bd6a26d83aeea08d635acbef perl-if-0.60.800-479.el9.noarch.rpm d93d6f5ab112030ace26dedc156d8f6e007553b2319e6a604ce4297d5263a812 perl-interpreter-5.32.1-479.el9.x86_64.rpm ff8daff6eae5efd96fff88d01ff6da824483d51dee6d5268b1497e60b7fcc319 perl-IO-1.43-479.el9.x86_64.rpm 92acc2529705ef4f7c4d27be78e22681c3965641db45f9a096dfc0b324df2c85 perl-IPC-Open3-1.21-479.el9.noarch.rpm 86beddded68d9ec55d36d0ef7c42228c3fdc1103263fe1d9a18c00f438a14fd7 perl-less-0.03-479.el9.noarch.rpm a0a342d3aec542a53cf96ab91dd2ce870d99b6af9cd236d778148f10745047b8 perl-lib-0.65-479.el9.x86_64.rpm 7f7111d81acbffe263faec49857bbebe9e0ed5db4aff8102e75bb3a52ace3885 perl-libnetcfg-5.32.1-479.el9.noarch.rpm d81d853116bbff5df8fff3c891042d249a83ce4ce72f725af22c10922b95bb65 perl-libs-5.32.1-479.el9.i686.rpm a2f05a5d0991e660f9570fa9e6483d25cd046e36eec393041c6d5e59b1d041b1 perl-libs-5.32.1-479.el9.x86_64.rpm df20b5ec749712b747812adc5d65128888d67b891a11ad8ef990de645952e174 perl-locale-1.09-479.el9.noarch.rpm 38ec2e1a1b3eded8c0aae1e8eeb314303c8734129b0b784ccdafbae46d7f17b9 perl-Locale-Maketext-Simple-0.21-479.el9.noarch.rpm 13fb77e5f71b91d94b0dced57e08a1ee7e6a4212d302bb0de30d507b5b7639d8 perl-macros-5.32.1-479.el9.noarch.rpm d43cdb8257da464255221693e7b386482f3b95bb60f23fe6fa04b5226a28f09d perl-Math-Complex-1.59-479.el9.noarch.rpm 576e774249e1df2de036505faa3f18fd41696e940fcd697cf227e644aac1476f perl-Memoize-1.03-479.el9.noarch.rpm 8bf8a8e6c20ca9393f6795ad88dac1c3ba0224b71ee42784c21bea8ce5459086 perl-meta-notation-5.32.1-479.el9.noarch.rpm 56b1d3a2a814523756753d845974dee94f13fb9c13cbb9719d4600cf049a7a33 perl-Module-Loaded-0.08-479.el9.noarch.rpm d1b76475a866ef663c9e552893e0c894f199c3a0acb5766c1c2ba59fab16529d perl-mro-1.23-479.el9.x86_64.rpm d071dac6870f5bcdaa6be3ae1be348efee96a1514e2a6b03ee3af5b7a14af945 perl-NDBM_File-1.15-479.el9.x86_64.rpm fce0f451a8dde16ca037bae31ae6135dd00c3b290200b12ff24a4805383b5ff6 perl-Net-1.02-479.el9.noarch.rpm c863c8ab9bfbcdcd6b536665b69ab79d2f8e73475b7e91e5fbdeb35cb225b8ae perl-NEXT-0.67-479.el9.noarch.rpm 1fac0bacfdfba85156d89b14364c824922a8080e5af76571b1d548d128065c40 perl-ODBM_File-1.16-479.el9.x86_64.rpm 79de369c22015e1439efd9aca5c53c817b1f0d489a22b90893d2005cf4d30ec2 perl-Opcode-1.48-479.el9.x86_64.rpm bac67c6ec0a893e09c29b0bfcced117050799a9b2d788b7402a5394891992b39 perl-open-1.12-479.el9.noarch.rpm 47b23621952aed071a574d14b09c635bf24a7049bdbb02280f35756d5b821d8f perl-overload-1.31-479.el9.noarch.rpm f482b8996a6d0d84161f6862353882114aa9ad98460891f13384cc7f6ce37ddb perl-overloading-0.02-479.el9.noarch.rpm 16d4fa2d70531bb0a7cde3caf6afaa67a25604eb64ceb2870811eb2f693456d9 perl-ph-5.32.1-479.el9.x86_64.rpm 8e7faa030561690b64b0be43682660f872f4003e22f3eb34f01b9ab1841309a0 perl-Pod-Functions-1.13-479.el9.noarch.rpm 5f49ca25e407bbc56169a51c2cf06c0a935a5334dabf65dca53fc45ecbe88575 perl-Pod-Html-1.25-479.el9.noarch.rpm ea4b11a3d8c8a457f71ecb8107cecb68f549281f2fe7204c7dedfb859464dae1 perl-POSIX-1.94-479.el9.x86_64.rpm 7cb7aa9eb5821378476a9c78985013dc18c9d9da8dca87afe79822b26b68ee55 perl-Safe-2.41-479.el9.noarch.rpm 28db03ce508ca215f9d3ccf0c2798ee205806bacd71a7ea3aa632aa3938eae1e perl-Search-Dict-1.07-479.el9.noarch.rpm b203f0f75cd146fbd0d74c9a1308bf593f8f4f1fa715751079ef776e35ba58e0 perl-SelectSaver-1.02-479.el9.noarch.rpm 5c1d254f27e258df2ff1c37cb979485fe2068a02e796473daab2a1d7382cf82d perl-SelfLoader-1.26-479.el9.noarch.rpm d0f7227f90244271723cf652dc3580d5addb2d814b18b35b40df30b67dbcfd60 perl-sigtrap-1.09-479.el9.noarch.rpm fd0400b4dca1b73d5871c3ff61a74a636a6891cf07c382d5974b034acf0c1979 perl-sort-2.04-479.el9.noarch.rpm 22063eb4e21da51f363c03ff68f2e52783dadb9d9a9455421038644eaa27ba47 perl-subs-1.03-479.el9.noarch.rpm 97915fa7a4e0d80c5f947cee182db0a4a595b38af54752226b4e0c216a3bb2a1 perl-Symbol-1.08-479.el9.noarch.rpm 8490f7b67ee7b1c58ce1a6bdc6578ec9bc997c14a9e03eb746769167e4a7e621 perl-Sys-Hostname-1.23-479.el9.x86_64.rpm 7472ae5bd85b641847db7cbedbd9a82649d1311071d12e2fce09a23ff7dfc82c perl-Term-Complete-1.403-479.el9.noarch.rpm a603d3dce35a5b86266ae545ec80aa84213ebc325bce69d813edaab03ed976f0 perl-Term-ReadLine-1.17-479.el9.noarch.rpm 1a0c85ffee7a3d4e7f9d285dae4b4a2452da4ec51dbcc17ea7fef5e9326185a2 perl-Test-1.31-479.el9.noarch.rpm ab455afd77ee3f19e715e4cb8c4d439bea465e5340aeed5f100fd96462ecf0e8 perl-Text-Abbrev-1.02-479.el9.noarch.rpm d85d4d9a3b7aedd9bcffda3fb9e7f3af3afbad3ce5a94e511bc8202c7c44dc43 perl-Thread-3.05-479.el9.noarch.rpm 0dec0ef10efc7b57790d770d410412706bff3d6a454fdaa83b366ac2139c0277 perl-Thread-Semaphore-2.13-479.el9.noarch.rpm 3e397205265c3ec8bbaa1effe9a6e252f772abbdf170e774f3fd08c5a94a9f88 perl-Tie-4.6-479.el9.noarch.rpm a5a73678e556dc0ee54c07fcd10f93634cd4db24021265f69f5a38623e1dfb90 perl-Tie-File-1.06-479.el9.noarch.rpm 85711f2ea7466fa753a4001b3c2cf7ea2ba039d1b34f67170241ca6dcb2f9990 perl-Tie-Memoize-1.1-479.el9.noarch.rpm 746c0e9c5a67cfb26c781f596457f5591d31cf8a6b2af5e52591ef0e0a438e32 perl-Time-1.03-479.el9.noarch.rpm a6de2353b343ae13c2ba72b1b0415b4dbfae51538fe3e5e2b3b05d1ac9414457 perl-Time-Piece-1.3401-479.el9.x86_64.rpm ac8c280211dc2669793c3aaa807b212a69aeddb65de817f4383f5899eea66dff perl-Unicode-UCD-0.75-479.el9.noarch.rpm 1c886c53e3984fb2d5e4d4a547b4a4a2fb54d9b1679764993ee78397ab549ad2 perl-User-pwent-1.03-479.el9.noarch.rpm a8b82c2c6a4095761959c75c46c4e3485c9888b06ff2163497472080c7e8455b perl-utils-5.32.1-479.el9.noarch.rpm eee7dbfc25a96a722a6ccc4ddbdcd0b7954fd5fffefb6b47408267241812fc07 perl-vars-1.05-479.el9.noarch.rpm 5d7248a460e62639ed4ee82565b54f672258a2d09511d4150a73a3c2fd87ffd4 perl-vmsish-1.04-479.el9.noarch.rpm f2d6e9869251e6ed929e4a9ac1b2aaab2668f6fb4a5447105bd4dbc60f06d99f RLBA-2022:3418 new packages: perl-Algorithm-Diff Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Algorithm-Diff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Algorithm-Diff-1.2010-4.el9.noarch.rpm 1dbbf8ac9314c0bf90a7dae471dfe53108397b35d4b25209139b76b1e24df351 RLBA-2022:3419 new packages: perl-App-cpanminus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-App-cpanminus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-App-cpanminus-1.7044-14.el9.noarch.rpm aa994e604155e03ae9ae787d467b39059ab859881029ad2c5ba8492748d44e84 RLBA-2022:3420 new packages: perl-Archive-Tar Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Archive-Tar. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Archive-Tar-2.38-6.el9.noarch.rpm c185824c00390e992023ba28c65103d104d4fe86d2586a061ceaac24fe09cb4e RLBA-2022:3421 new packages: perl-Archive-Zip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Archive-Zip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Archive-Zip-1.68-6.el9.noarch.rpm 69ea2f4b2d67ab411992385c3b51b9e56d6cf95c587029a3ecb49c9f9004f957 RLBA-2022:3422 new packages: perl-Authen-SASL Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Authen-SASL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Authen-SASL-2.16-25.el9.noarch.rpm d13bbcfd15e24e34cba72125cb8d36cac7b6e13830d7cce2b6bc0de5982bf441 RLBA-2022:3423 new packages: perl-BSD-Resource Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-BSD-Resource. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-BSD-Resource-1.291.100-17.el9.x86_64.rpm ea2140915bf07e65ad3ec5c895561df214791a813c3c496c3387fc53e74646b4 RLBA-2022:3424 new packages: perl-Bit-Vector Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Bit-Vector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Bit-Vector-7.4-24.el9.x86_64.rpm b2a381dbba67e3a92d4c0909e65371ef6e4df7bc817430da91576099efee895d RLBA-2022:3425 new packages: perl-CGI Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CGI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CGI-4.51-5.el9.noarch.rpm c2878b39cbadab12d0ce72f74a3969bc9c88862c87524103347378d96d861313 RLBA-2022:3426 new packages: perl-CPAN-DistnameInfo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN-DistnameInfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-DistnameInfo-0.12-23.el9.noarch.rpm c22d80fc015994622993fe1de1ed7f05599c33c5c300e9412b8f39504a5b4510 RLBA-2022:3427 new packages: perl-CPAN-Meta Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN-Meta. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-Meta-2.150010-460.el9.noarch.rpm 82c3fd673a8b44ef1e719598aabfc9d3007b4bb4294c1630c0f6d75562b855c3 RLBA-2022:3428 new packages: perl-CPAN-Meta-Check Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN-Meta-Check. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-Meta-Check-0.014-17.el9.noarch.rpm ccfc82c6ba27bc145dc42f39f0256b6f4b1e3f49b8d161a01afd6fa959d133ad RLBA-2022:3429 new packages: perl-CPAN-Meta-Requirements Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN-Meta-Requirements. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-Meta-Requirements-2.140-461.el9.noarch.rpm 031a64259a5674f770541c9596a947cb9634633c4facd888d59134edbaa0bdea RLBA-2022:3430 new packages: perl-CPAN-Meta-YAML Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN-Meta-YAML. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-Meta-YAML-0.018-461.el9.noarch.rpm 89eae1dfd600e246e8cdd69078caa903201eedce276a273bdbed4dbf830a6e46 RLBA-2022:3431 new packages: perl-Carp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Carp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Carp-1.50-460.el9.noarch.rpm d7b68a8235ad65d52d2d40d0608f876a8b13b1a3dcadae2f09b126407db17ee0 RLBA-2022:3432 new packages: perl-Carp-Clan Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Carp-Clan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Carp-Clan-6.08-8.el9.noarch.rpm deebe1d98e741aa8b77bc767a6a817349e809d54abbdfeb24e4459bdc3e90826 RLBA-2022:3433 new packages: perl-Class-Inspector Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Class-Inspector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Class-Inspector-1.36-7.el9.noarch.rpm b72c5061210e5281d51f7321a2f8143018aa8bb662b084b4651b361aa1729ec4 RLBA-2022:3434 new packages: perl-Clone Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Clone. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Clone-0.45-6.el9.x86_64.rpm 54984bdf012986eac17bda4c736f400ca57b32236dddeb0d0c0c2ae8ca9d4ed7 RLBA-2022:3435 new packages: perl-Compress-Bzip2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Compress-Bzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Compress-Bzip2-2.28-5.el9.x86_64.rpm 20655c91677cd4eb2f98c6b42facc40e5bcdae271f0e493f3637683d5e5d6fd0 RLBA-2022:3436 new packages: perl-Compress-Raw-Bzip2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Compress-Raw-Bzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Compress-Raw-Bzip2-2.101-5.el9.x86_64.rpm e3b52e1bc33ffb244e0f7792941d02fe72a93917922acc4ecfe4f07748a89c03 RLBA-2022:3437 new packages: perl-Compress-Raw-Lzma Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Compress-Raw-Lzma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Compress-Raw-Lzma-2.101-3.el9.x86_64.rpm fc9b0fa2bd5e74f7d7b1d6b83a20d8ec370f574120bcd18d49bb5c092f540bf3 RLBA-2022:3438 new packages: perl-Compress-Raw-Zlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Compress-Raw-Zlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Compress-Raw-Zlib-2.101-5.el9.x86_64.rpm c427d20a5b1ec8bc1bd51e7117e5f0a12f46f63fe2f699ed68ef96761bf907eb RLBA-2022:3439 new packages: perl-Config-Perl-V Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Config-Perl-V. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Config-Perl-V-0.33-4.el9.noarch.rpm edc1020a208f99dd038f04afc6a5456fe6f062160bddc3639ae23fcfc28464dd RLBA-2022:3440 new packages: perl-Convert-ASN1 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Convert-ASN1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Convert-ASN1-0.27-24.el9.noarch.rpm 295d8d287c126ef467d1665cc7fb878df35f0f5395c081ebd4deb2c917d7f842 RLBA-2022:3441 new packages: perl-Crypt-OpenSSL-Bignum Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Crypt-OpenSSL-Bignum. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Crypt-OpenSSL-Bignum-0.09-16.el9.x86_64.rpm 9bdee3f4e03f8de0bc6eda1108f924189e7cc3ba35ddf61b984aaaf4cfda30ed RLBA-2022:3442 new packages: perl-Crypt-OpenSSL-RSA Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Crypt-OpenSSL-RSA. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Crypt-OpenSSL-RSA-0.31-13.el9.x86_64.rpm e28b237917209dd7d385ea85f9bef5ab9630d11652d35b2c89bbb1e612450c2e RLBA-2022:3443 new packages: perl-Crypt-OpenSSL-Random Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Crypt-OpenSSL-Random. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Crypt-OpenSSL-Random-0.15-14.el9.x86_64.rpm cdf3681ebc3371879ac7979b01741df1d859a6c4a23015fe3d97c1e82dc4b8bb RLBA-2022:3444 new packages: perl-DBD-MariaDB Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-DBD-MariaDB. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-DBD-MariaDB-1.21-16.el9_0.x86_64.rpm e97495599d4a243789303524a1d9ea9bc48c5a2203d9332c2f3af614e4cde163 RLBA-2022:3445 new packages: perl-DBD-MySQL Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-DBD-MySQL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-DBD-MySQL-4.050-13.el9.x86_64.rpm a3550f83d14ddf7650b7ab4e32d280f8ea6897e082b259512eeb51a4048f64e6 RLBA-2022:3446 new packages: perl-DBD-Pg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-DBD-Pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-DBD-Pg-3.14.2-5.el9.x86_64.rpm 0c1eca976d8975ec447ce14c219a46c0b2fbf939ea81901f12a0efbb353c09c3 RLBA-2022:3447 new packages: perl-DBD-SQLite Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-DBD-SQLite-1.66-5.el9.x86_64.rpm 5f643508f4703ed5d89c0a6e608f937d78b0bdb8d4db52846a04c44342a32b64 RLBA-2022:3448 new packages: perl-DBI Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-DBI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-DBI-1.643-9.el9.x86_64.rpm 2b1cd9e1274fa806c9d84c88fe585cbe270c597fa8d2eb5c866c3b5a8571ee18 RLBA-2022:3449 new packages: perl-DB_File Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-DB_File. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-DB_File-1.855-4.el9.x86_64.rpm 4d6bb98553fa745eace516d22ec186eec0a228ad89d920ca40851dd5d209b599 RLBA-2022:3450 new packages: perl-Data-Dump Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Data-Dump. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Data-Dump-1.23-18.el9.noarch.rpm e26a176594d468957d49bd3be728bff3143fc2182d3a436bf1731926566a659b RLBA-2022:3451 new packages: perl-Data-Dumper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Data-Dumper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Data-Dumper-2.174-462.el9.x86_64.rpm 9de98b2b4bff63d413158a65bba5334d8536c6eb1b3398d76f024e0e9f74ce75 RLBA-2022:3452 new packages: perl-Data-OptList Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Data-OptList. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Data-OptList-0.110-17.el9.noarch.rpm 8f5242e63e752a1a6bfd1230533c0ff8068f8991369b1ac005322922913603ec RLBA-2022:3453 new packages: perl-Data-Section Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Data-Section. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Data-Section-0.200007-14.el9.noarch.rpm 268d059ad9b62e5184228da7300c40eed458813adda64813f8a5cf67785beac2 RLBA-2022:3454 new packages: perl-Date-Calc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Date-Calc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Date-Calc-6.4-20.el9.noarch.rpm 3ed9f7f8bc2c0170fbb8f29013c13111a7b1deaa54b8c7635cf7b1d7cb6e94e6 RLBA-2022:3455 new packages: perl-Date-Manip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Date-Manip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Date-Manip-6.85-3.el9.noarch.rpm f3b9c8433aa02aaa3727aa11b4ea1a6781e807855e36aaa3067e6f6a0d8fa5b0 RLBA-2022:3456 new packages: perl-Devel-PPPort Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Devel-PPPort. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Devel-PPPort-3.62-4.el9.x86_64.rpm 09968fcd23247b3587cb2b04df143a4736930329371cf3c67fbf4a803eb22240 RLBA-2022:3457 new packages: perl-Devel-Size Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Devel-Size. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Devel-Size-0.83-10.el9.x86_64.rpm 09dadd63a55e5aab24ff6c30cfc89faf914e8401dd95f8aba5941daa4cea4a6e RLBA-2022:3458 new packages: perl-Digest Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Digest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Digest-1.19-4.el9.noarch.rpm 5016ad372d63577fae720e9ee3f5249eb72d063397bf19f0de746c7ea88154a7 RLBA-2022:3459 new packages: perl-Digest-HMAC Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Digest-HMAC. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Digest-HMAC-1.03-29.el9.noarch.rpm 41a244cd7c87efc75498145d2f04da9f736c43ed116ae73e4556087492186007 RLBA-2022:3460 new packages: perl-Digest-MD5 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Digest-MD5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Digest-MD5-2.58-4.el9.x86_64.rpm b1f4db8af3cab8814a4fea1c773a0f2e4c7d011fddaad24b1c28f2bfd0ddb144 RLBA-2022:3461 new packages: perl-Digest-SHA Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Digest-SHA. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Digest-SHA-6.02-461.el9.x86_64.rpm 1ad99c1e7fbfc9099806768d8e9730fff8b61e05e364b75b401bfa8195e15a3f RLBA-2022:3462 new packages: perl-Digest-SHA1 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Digest-SHA1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Digest-SHA1-2.13-34.el9.x86_64.rpm 3256a7f5dc777b6f4b7e7347491a8b22a71990e75c30156491131c0902d7784f RLBA-2022:3463 new packages: perl-Encode Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Encode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Encode-3.08-462.el9.i686.rpm b0814aee28defbe03d936dd810dcd67b0bd3037acd2790dae66ea4cbf5cc4567 perl-Encode-3.08-462.el9.x86_64.rpm e82e31795bc9935d931f3a3d1e6c047a53bad58639a5416ba6dc109f9bf7d21b perl-Encode-devel-3.08-462.el9.i686.rpm 6418f7d4273c6fc180547021d25685f710f400cecabc38b8452c7c131ba6ed9e perl-Encode-devel-3.08-462.el9.x86_64.rpm 1d2dd8d8c69cfe60d90caa8eed816c88b316077a4432048877fcfb8ee7d4e13b perl-encoding-3.00-462.el9.x86_64.rpm 78be2b82921e3510ac1e8c9134dcdd07ae886a148254bcecc74f1b1f1f50c6b7 RLBA-2022:3464 new packages: perl-Encode-Detect Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Encode-Detect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Encode-Detect-1.01-37.el9.x86_64.rpm d5efce87a69c7593b06ffa3f158cd55d7ad7cd1dd81076a27eccce643579c208 RLBA-2022:3465 new packages: perl-Encode-Locale Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Encode-Locale. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Encode-Locale-1.05-21.el9.noarch.rpm e724850e82ea3ea4a32d6b9b33430317898ff17959578e7aa1ee56e5cc9b5da5 RLBA-2022:3466 new packages: perl-Env Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Env. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Env-1.04-460.el9.noarch.rpm b760bf7138cbd7d3cfffba1f1c70714eff11314ba3426f9100799e3397645c8b RLBA-2022:3467 new packages: perl-Error Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Error. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Error-0.17029-7.el9.noarch.rpm cbd8a8136141df16d087caaed262a8bfa6f973f993893920322d400941a603ef RLBA-2022:3468 new packages: perl-Exporter Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Exporter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Exporter-5.74-461.el9.noarch.rpm 561a49eff3da57f0b88fc3251691998077d34555af431695525babc6aac09dae RLBA-2022:3469 new packages: perl-Exporter-Tiny Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Exporter-Tiny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Exporter-Tiny-1.002002-6.el9.noarch.rpm 9644047a354af748fb99f01dfdb472cd385e4f554761e854943c73aadddadc2f RLBA-2022:3470 new packages: perl-ExtUtils-CBuilder Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-ExtUtils-CBuilder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-ExtUtils-CBuilder-0.280236-4.el9.noarch.rpm 603ec2b9cc5338988631fcdf168e457b7a4d86f199d56f95e05ae0055add9bba RLBA-2022:3471 new packages: perl-ExtUtils-Install Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-ExtUtils-Install. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-ExtUtils-Install-2.20-4.el9.noarch.rpm 35025f907a34a24559259292c7734df02da90feb99ba52cccfb9797f06bacc33 RLBA-2022:3472 new packages: perl-ExtUtils-MakeMaker Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-ExtUtils-MakeMaker. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-ExtUtils-Command-7.60-3.el9.noarch.rpm e4828127d1d18cab13b36bbc0164b6e64a3118a2d79ba870276614c9f977176f perl-ExtUtils-MakeMaker-7.60-3.el9.noarch.rpm 4b3b90c4c770ef084db9df1cd8f57a0cff653f6a61b2a77b91b02ff2bc4908f5 perl-ExtUtils-MM-Utils-7.60-3.el9.noarch.rpm c0e2a133565b5331007a88277cd876d84d73b1b785f10ab9652b1fe73d45a3cf RLBA-2022:3473 new packages: perl-ExtUtils-Manifest Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-ExtUtils-Manifest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-ExtUtils-Manifest-1.73-4.el9.noarch.rpm eed523a4484449313b5541bcd4e9a22b05574cb8fa9981ed713dd596060d39e3 RLBA-2022:3474 new packages: perl-ExtUtils-ParseXS Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-ExtUtils-ParseXS. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-ExtUtils-ParseXS-3.40-460.el9.noarch.rpm 024db0a83463bceedbafd2e03dc73c26a2755dceba6bbb3fed293a20ba1f3a6d RLBA-2022:3475 new packages: perl-FCGI Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-FCGI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-FCGI-0.79-8.el9.x86_64.rpm fe4cd017a701cf8f19fe1c525e97a056ec823b435ce88f9d766f30b32067c21a RLBA-2022:3476 new packages: perl-Fedora-VSP Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Fedora-VSP. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Fedora-VSP-0.001-23.el9.noarch.rpm 9d3be38d11e891d04950edeb670463808dba327e20bb88f0886e58f22a5206ab RLBA-2022:3477 new packages: perl-File-Fetch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-Fetch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-Fetch-1.00-4.el9.noarch.rpm 9cd9cf4200e0e6cd51bb273aa8ee666495edf942111e14875903b174fb9fe4de RLBA-2022:3478 new packages: perl-File-HomeDir Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-HomeDir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-HomeDir-1.006-4.el9.noarch.rpm 449e34d1e638be8f260a66e13b95d6650fe479a172b373b5edf476dcd7798097 RLBA-2022:3479 new packages: perl-File-Listing Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-Listing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-Listing-6.14-4.el9.noarch.rpm cbbe55ccdb4e8741e444453883e4357dea8ef5ffe5335c0a6be22a3b619f2874 RLBA-2022:3480 new packages: perl-File-Path Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-Path. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-Path-2.18-4.el9.noarch.rpm 8d47e85b8f150481c64cdad38199cb527b3f4e0aaa18f7c04157f08ccc6b44ea RLBA-2022:3481 new packages: perl-File-ShareDir Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-ShareDir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-ShareDir-1.118-4.el9.noarch.rpm 8e8a84756798aeaebd6a05d948b504eab648475879f6e8a385e42065b0d345b5 RLBA-2022:3482 new packages: perl-File-Slurp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-Slurp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-Slurp-9999.32-5.el9.noarch.rpm e9aba7ab7b3f8cd4212fe681f7f15c088dc35d3993a2c0cc6d65fbd46fa01a31 RLBA-2022:3483 new packages: perl-File-Temp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-Temp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-Temp-0.231.100-4.el9.noarch.rpm ac408a99cdc94ae249761fa5f1ac9b0db794267527e07df78d36515b09c2a1a0 RLBA-2022:3484 new packages: perl-File-Which Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-Which. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-Which-1.23-10.el9.noarch.rpm ce5be7b329adf24a1decd1f3eeca549e5b2234d7c361df42014d308682683251 RLBA-2022:3488 new packages: perl-GSSAPI Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-GSSAPI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-GSSAPI-0.28-37.el9.x86_64.rpm 967474d536893021c189f716481d9989e857e16686e92408b281975c5c105479 RLBA-2022:3485 new packages: perl-File-pushd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-File-pushd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-File-pushd-1.016-12.el9.noarch.rpm 85fd535307c0f981f5db48c6dda33fcc86b3a1b3c9afe249d94ef8a4674f7ed3 RLBA-2022:3486 new packages: perl-Filter Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Filter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Filter-1.60-4.el9.x86_64.rpm 4a15e0473c0c3169d5c9086153825654f66cabf14d8623cc8b4e1676d4858f9e RLBA-2022:3487 new packages: perl-Filter-Simple Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Filter-Simple. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Filter-Simple-0.96-460.el9.noarch.rpm 5d91da27972df85f942d82d4d503f965148890e7ea3a536736474bc190c30917 RLBA-2022:3489 new packages: perl-Getopt-Long Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Getopt-Long. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Getopt-Long-2.52-4.el9.noarch.rpm 073ab80a2867bff161163125c13ac9433488681ed27aabaa784021c0f423518e RLBA-2022:3490 new packages: perl-HTML-Parser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTML-Parser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTML-Parser-3.76-3.el9.x86_64.rpm e1873d6f9871f883f04c52f6ef050c491286144f4bcf21b86f458cc21fbb5715 RLBA-2022:3491 new packages: perl-HTML-Tagset Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTML-Tagset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTML-Tagset-3.20-47.el9.noarch.rpm 1838325d3407148223b5ce089b67242fa17a9a04a1877edfda7e7038fd839321 RLBA-2022:3492 new packages: perl-HTTP-Cookies Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Cookies. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Cookies-6.10-4.el9.noarch.rpm dcb475a6e9d9268777a8cca1a159edd58eeed0693425cd8c6edd6f72fe91116e RLBA-2022:3493 new packages: perl-HTTP-Date Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Date. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Date-6.05-7.el9.noarch.rpm 92aef93cc1e0528c5148edf2936364816e3812f242debe84bec54c1060aec3c0 RLBA-2022:3494 new packages: perl-HTTP-Message Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Message. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Message-6.29-3.el9.noarch.rpm d179234a25cedee93eb2163722dbef66dd53cdf6a1a5ecba532285ab964ace89 RLBA-2022:3495 new packages: perl-HTTP-Negotiate Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Negotiate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Negotiate-6.01-30.el9.noarch.rpm b054f87b5a5c67b5cb534d5201c224fa32857e37ffc32b573a142f88059a87c0 RLBA-2022:3496 new packages: perl-HTTP-Tiny Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Tiny-0.076-460.el9.noarch.rpm 28677597158fd32f04e633e51164d4f9ce6da979ff1bd0da68ee1590ba754df6 RLBA-2022:3497 new packages: perl-IO-Compress Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Compress. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Compress-2.102-4.el9.noarch.rpm be23bc2b0a107c636f62325a43d73e3bc1b84cd0677a7f6c34da2fa156ab2e82 RLBA-2022:3498 new packages: perl-IO-Compress-Lzma Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Compress-Lzma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Compress-Lzma-2.101-4.el9.noarch.rpm 08f98963bd66df23d5389ac915143dc35236667a95f6cf0e25193bba19942659 RLBA-2022:3499 new packages: perl-IO-HTML Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-HTML. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-HTML-1.004-4.el9.noarch.rpm e6e9c3fa506a4a720a81ac49d6c3e7de3306c566c466c7d1d91a5630b3aced8b RLBA-2022:3500 new packages: perl-IO-Multiplex Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Multiplex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Multiplex-1.16-21.el9.noarch.rpm 752d392d2b1fd3631a6505b59aebce7b3be8a41332d25c3552dceb7cab3c8433 RLBA-2022:3501 new packages: perl-IO-Socket-INET6 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Socket-INET6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Socket-INET6-2.72-24.el9.noarch.rpm b8eb2bcf725df25d0a2e3e413bb54f0cfa2f5f4250030a495792bd1e208e2d83 RLBA-2022:3502 new packages: perl-IO-Socket-IP Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Socket-IP. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Socket-IP-0.41-5.el9.noarch.rpm ffb4b46f1ed518b2275bdf732212082387a6f3021e1a7cd3b1c6ec6e6ea7ce09 RLBA-2022:3503 new packages: perl-IO-Zlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Zlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Zlib-1.11-4.el9.noarch.rpm 8d8a06a3250886cff35fd7c676f31a142db5a5238567a0b468049d3d536f8ea3 RLBA-2022:3504 new packages: perl-IPC-Cmd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IPC-Cmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IPC-Cmd-1.04-461.el9.noarch.rpm 7b156ce1cd9fcd733fdf89492f8c91541fcd0613a1118bbd077e86f1982ba72a RLBA-2022:3505 new packages: perl-IPC-SysV Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IPC-SysV. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IPC-SysV-2.09-4.el9.x86_64.rpm 1b007d757ea0e90338faf1ac0adba1fe5bb34d75b4c3f13b2b57b6a2bc74ac00 RLBA-2022:3506 new packages: perl-IPC-System-Simple Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IPC-System-Simple. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IPC-System-Simple-1.30-6.el9.noarch.rpm 9bc344e9aecc4f1145353a7a10c86065e6e8251c9bc8a8b2daa184b5226f8c8b RLBA-2022:3507 new packages: perl-Importer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Importer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Importer-0.026-4.el9.noarch.rpm 961384283477a817b634a9a27b067f169d40f241ee0773c7cc1d9aac3d17d6c1 RLBA-2022:3508 new packages: perl-JSON Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-JSON. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-JSON-4.03-5.el9.noarch.rpm 30b4a3296838ded87d7346a5ab1e6f64aef81bb187c4f7ed2fe80bc916fbf7ab RLBA-2022:3509 new packages: perl-JSON-PP Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-JSON-PP. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-JSON-PP-4.06-4.el9.noarch.rpm 9d27fd287fdfd4a13eb24b9a4e0d68e48ac634f11c57dfa1e876da0de1dd8a2a RLBA-2022:3510 new packages: perl-LDAP Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-LDAP. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-LDAP-0.68-5.el9.noarch.rpm 26dc56345a94677e90ed46d8ae1d2cd0d2a52980d6d806a46e8682a1fee59bf2 RLBA-2022:3511 new packages: perl-LWP-MediaTypes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-LWP-MediaTypes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-LWP-MediaTypes-6.04-9.el9.noarch.rpm 1999f5d1ae99b8b59f944cb8b51b58952b0dae0c4c3265d75d027f907c3808cd RLBA-2022:3512 new packages: perl-LWP-Protocol-https Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-LWP-Protocol-https. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-LWP-Protocol-https-6.10-4.el9.noarch.rpm 113be1626293361507f8b63f58b69eb2292af1601e81c8a4ade0c26681ffb53b RLBA-2022:3513 new packages: perl-List-MoreUtils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-List-MoreUtils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-List-MoreUtils-0.430-4.el9.noarch.rpm f41a09f7711081bcec18c44c05b7eb6189a6b1191465ec64d6d5d42f95992569 RLBA-2022:3514 new packages: perl-List-MoreUtils-XS Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-List-MoreUtils-XS. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-List-MoreUtils-XS-0.430-5.el9.x86_64.rpm ab378f3f43db217b4887a4077d8e4bc193a8e801a03d66ae393e4a0b890e7d6d RLBA-2022:3515 new packages: perl-Locale-Maketext Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Locale-Maketext. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Locale-Maketext-1.29-461.el9.noarch.rpm 7cd906e4dc9c5286ef980f158173c9e3e5af79a5834616b98136c72d65f37656 RLBA-2022:3516 new packages: perl-MIME-Base64 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-MIME-Base64. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-MIME-Base64-3.16-4.el9.x86_64.rpm 5c45dad965abc4f062efcf37bb260d28cf38b4b7f79f02308f5526d5de3874fe RLBA-2022:3517 new packages: perl-MIME-Charset Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-MIME-Charset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-MIME-Charset-1.012.2-15.el9.noarch.rpm 5efe57553c23fc2ff4e91e3d57109e6fbd268d1e6dc647b9a17e63f570a756fc RLBA-2022:3518 new packages: perl-MRO-Compat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-MRO-Compat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-MRO-Compat-0.13-15.el9.noarch.rpm a3addd832690871caa3e6fe554cafe1e8776c85f810cddb7f9ec8d48a3a7ecb6 RLBA-2022:3519 new packages: perl-Mail-AuthenticationResults Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Mail-AuthenticationResults. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Mail-AuthenticationResults-2.20210112-4.el9.noarch.rpm 0bd5fdb99cfd58d606058cd9e0ed96c9b124b87a4c49dc162f72e1285703f84a RLBA-2022:3520 new packages: perl-Mail-DKIM Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Mail-DKIM. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Mail-DKIM-1.20200907-4.el9.noarch.rpm 18324a95928a700e49ba149be53235ff900dae5d9b132bec43cbbe2027afa7bf RLBA-2022:3547 new packages: perl-PathTools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-PathTools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-PathTools-3.78-461.el9.x86_64.rpm 463e8e1704053e1cbd984c15d47ca12dbab1dc6cc774df014f1ac0e52009adfc RLBA-2022:3521 new packages: perl-Mail-SPF Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Mail-SPF. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Mail-SPF-2.9.0-26.el9.noarch.rpm fabd4031b2cad31090073d63012c6024a9d300e58e2509a27895db89c96ab4e5 RLBA-2022:3522 new packages: perl-Mail-Sender Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Mail-Sender. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Mail-Sender-0.903-16.el9.noarch.rpm 53eb6842605a8b85b7d05d97ce41cf2a3c9b6e53c4481d211b8d2a6c61c5631d RLBA-2022:3523 new packages: perl-MailTools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-MailTools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-MailTools-2.21-9.el9.noarch.rpm 6a625f97c9bfdaaf8e4e2c51bac3938b218dbe66ad1584e707deaa0a21190c71 RLBA-2022:3524 new packages: perl-Math-BigInt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Math-BigInt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Math-BigInt-1.9998.18-460.el9.noarch.rpm bb2ae0f30f9aa03356b2251304d1ad37c44783f47987eae727835007556b8ce6 RLBA-2022:3525 new packages: perl-Math-BigInt-FastCalc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Math-BigInt-FastCalc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Math-BigInt-FastCalc-0.500.900-460.el9.x86_64.rpm 262b7c7d5286064546bad5872911ee2823e5e610fcfedda0b44b2719a0efac5c RLBA-2022:3526 new packages: perl-Math-BigRat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Math-BigRat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Math-BigRat-0.2614-460.el9.noarch.rpm d52c59bcca97e2b9de7ff572697aea906f3cd5e6f2b38d0602b22884510a6076 RLBA-2022:3527 new packages: perl-Module-Build Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-Build. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-Build-0.42.31-9.el9.noarch.rpm 2f57ee5b0bf897ecce1921e9b1dc2ae3ddb6cb8cc97dd3d22caec2dcb2ed161a RLBA-2022:3528 new packages: perl-Module-CPANfile Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-CPANfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-CPANfile-1.1004-12.el9.noarch.rpm e62d30cbf07e8b18d85f016c07c131123f684f8317f13be6f4a969bcfa84b992 RLBA-2022:3529 new packages: perl-Module-CoreList Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-CoreList. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-CoreList-5.20210320-3.el9.noarch.rpm 45835adf2872ac762d6013b113d8645bd01bd0f86357a08857a3036ee3991f2b perl-Module-CoreList-tools-5.20210320-3.el9.noarch.rpm 63d197040742424a8c3843e798639e07627125dc2a421684f36642d2b4b5fd0b RLBA-2022:3530 new packages: perl-Module-Load Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-Load. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-Load-0.36-4.el9.noarch.rpm 1d7ba4a7c941d27969480bd0e422180f5acb2f7ef3ec6d587608b576a2c15eae RLBA-2022:3531 new packages: perl-Module-Load-Conditional Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-Load-Conditional. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-Load-Conditional-0.74-4.el9.noarch.rpm a9f6a7e1673b07dfa93dcf3e92730693e36d41e320a943161e0de4a4a113a939 RLBA-2022:3532 new packages: perl-Module-Metadata Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-Metadata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-Metadata-1.000037-460.el9.noarch.rpm 1d65c7124fa1acceeb2f6907cc89f64afddfa9defee31df4300a09f660be720d RLBA-2022:3533 new packages: perl-Mozilla-CA Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Mozilla-CA. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Mozilla-CA-20200520-6.el9.noarch.rpm c0c93096a5ce0448ec12a8bb04a6180844d1e133dab824953aa332404a6af81e RLBA-2022:3534 new packages: perl-NTLM Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-NTLM. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-NTLM-1.09-30.el9.noarch.rpm e5cc95ebf3f212c70f5f57e05d260f078cfd994eb3a9aa5108a02ac253e19e1c RLBA-2022:3535 new packages: perl-Net-CIDR-Lite Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-CIDR-Lite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-CIDR-Lite-0.22-2.el9.noarch.rpm 4c7f7d0b9a276c8164b80159319f7a088948b6bddefde3adac66690b590ddcbd RLBA-2022:3536 new packages: perl-Net-DNS Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-DNS. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-DNS-1.29-4.el9.noarch.rpm cc71d58536bbdb09d4429384f3a8dbff94b5beaa551352c460dcd8dc1d3372a0 RLBA-2022:3537 new packages: perl-Net-HTTP Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-HTTP. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-HTTP-6.21-3.el9.noarch.rpm 81fbe9e80470dd1443b5d34eaaa2def28d67a05a55d9c0b6f8b3045b236e2124 RLBA-2022:3538 new packages: perl-Net-Ping Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-Ping. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-Ping-2.74-5.el9.noarch.rpm bee847af91eb9f61f6669176233e8830d014e6242e38d30541c5d2f5e99d86aa RLBA-2022:3539 new packages: perl-Net-SMTP-SSL Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-SMTP-SSL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-SMTP-SSL-1.04-16.el9.noarch.rpm d6c6eab9eb9967aa0971f1659d1ec7e3d5868747c0cf860eefceb33678c64726 RLBA-2022:3540 new packages: perl-Net-Server Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-Server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-Server-2.009-14.el9.noarch.rpm e2c79c4392a753a6835af65a0c370bb265179d2c30285e60246a8fcd351f8071 RLBA-2022:3541 new packages: perl-NetAddr-IP Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-NetAddr-IP. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-NetAddr-IP-4.079-18.el9.x86_64.rpm b1979e8695be37603de43c02f8e6efba13d9007abd9a532e400c6a17e4088ff7 RLBA-2022:3542 new packages: perl-Object-HashBase Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Object-HashBase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Object-HashBase-0.009-7.el9.noarch.rpm 2f923490f38a9f1b64dcb3b55ef1905436c7bc3482f8997e591bc9dd34cd16e3 RLBA-2022:3543 new packages: perl-Package-Generator Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Package-Generator. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Package-Generator-1.106-23.el9.noarch.rpm 51882324f0082ac01a7dec367370ea2ade8c379bae7eae992f3fd6916d8b8025 RLBA-2022:3544 new packages: perl-Params-Check Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Params-Check. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Params-Check-0.38-461.el9.noarch.rpm f76e4edeaf723a5aedf3f511f1af6aac4c7c7e5797d9387ebe92e90e7470c5bf RLBA-2022:3545 new packages: perl-Params-Util Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Params-Util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Params-Util-1.102-5.el9.x86_64.rpm 6d1078f176ad5a41414034ccfd7e0a3eaf31b57e0800ae223ec074fa5a5dc595 RLBA-2022:3546 new packages: perl-Parse-PMFile Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Parse-PMFile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Parse-PMFile-0.43-4.el9.noarch.rpm 4601a7f42072469242f898c962190bb8197eb473dce25cbe6215f66f1fd519e5 RLBA-2022:3548 new packages: perl-Perl-OSType Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Perl-OSType. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Perl-OSType-1.010-461.el9.noarch.rpm 3dc6cadf2b2be5bdf90192d985beacc077b1b2c9d7f73dd3ff5ba1bd0d709b23 RLBA-2022:3549 new packages: perl-PerlIO-via-QuotedPrint Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-PerlIO-via-QuotedPrint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-PerlIO-via-QuotedPrint-0.09-4.el9.noarch.rpm e951e57589275b490a0c3f3ab9f8749474a4a5608c20d904bf2cf999252b3be2 RLBA-2022:3550 new packages: perl-Pod-Checker Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Pod-Checker. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Pod-Checker-1.74-4.el9.noarch.rpm 71355d44503378b78b90f4efe3f5d2fe46ad223245070d71e9d6ab7ce8032683 RLBA-2022:3551 new packages: perl-Pod-Escapes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Pod-Escapes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Pod-Escapes-1.07-460.el9.noarch.rpm 0dc13de132f255b6c13618a32a9b95dce434d998b8300a30ea412ff75abb84ec RLBA-2022:3552 new packages: perl-Pod-Perldoc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Pod-Perldoc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Pod-Perldoc-3.28.01-461.el9.noarch.rpm 4bc4888efc7cc0b39aea13267e621d245d35e8e808603ca0f3a9434fce8d2e8b RLBA-2022:3553 new packages: perl-Pod-Simple Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Pod-Simple. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Pod-Simple-3.42-4.el9.noarch.rpm aaac71076e517a13ca7459918761c66a460f0fd993cb510644af7e5978d2fbcc RLBA-2022:3554 new packages: perl-Pod-Usage Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Pod-Usage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Pod-Usage-2.01-4.el9.noarch.rpm cab7aea2d5686233dea13aa7ae4de48a9b6cc9a81f73f6f1448558f8e6423862 RLBA-2022:3555 new packages: perl-SNMP_Session Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-SNMP_Session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-SNMP_Session-1.13-28.el9.noarch.rpm f1adf0e24512fdf575e759287be3c8caea0d581b50f663b897e9d6c7d02110b1 RLBA-2022:3556 new packages: perl-Scalar-List-Utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Scalar-List-Utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Scalar-List-Utils-1.56-461.el9.x86_64.rpm 3c4720fe49d11a8b5909c9c52bbedf227645b1b774d402bde4ecdda9191c0cef RLBA-2022:3557 new packages: perl-Socket Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Socket. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Socket-2.031-4.el9.x86_64.rpm 1f21b37d47f95b550e26db0c0b5f257db65123b3846cacbed9bc3c36b9b65a8f RLBA-2022:3558 new packages: perl-Socket6 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Socket6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Socket6-0.29-11.el9.x86_64.rpm 5d4391e7c49e1c46172e8d65ff4547dbd4e27d27f88feed794c3dc86dd4a57a2 RLBA-2022:3559 new packages: perl-Software-License Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Software-License. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Software-License-0.103014-12.el9.noarch.rpm 63157ec199846a4ebb1be6b3d0d2787c79da86b98dc4e3432f66ff5a5bf431da RLBA-2022:3560 new packages: perl-Storable Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Storable. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Storable-3.21-460.el9.x86_64.rpm 98f0b75a6a7de6aab4821e60f78596fae47b29d4b93e6a2ae4dddf5c626368a7 RLBA-2022:3561 new packages: perl-String-ShellQuote Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-String-ShellQuote. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-String-ShellQuote-1.04-34.el9.noarch.rpm 7708f506618917b5e57a98960905423d8ea1157213ea06247c0cadc009bf7c05 RLBA-2022:3562 new packages: perl-Sub-Exporter Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sub-Exporter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Sub-Exporter-0.987-27.el9.noarch.rpm 842ed8c31564ed07922d39cfb796e7d2ec702583e2746c7da4f2994467efd459 RLBA-2022:3563 new packages: perl-Sub-Install Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sub-Install. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Sub-Install-0.928-28.el9.noarch.rpm a7480912bc6c02cea71ada2404ec76dc6dd1abe8755cecc126adcdc81866a8da RLBA-2022:3564 new packages: perl-Sys-CPU Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sys-CPU. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Sys-CPU-0.61-26.el9.x86_64.rpm 7b2986b85e27d3db48cb03013eee70289ff93394af91f2bea4d8cb80dbdbcd8d RLBA-2022:3566 new packages: perl-Sys-Syslog Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sys-Syslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Sys-Syslog-0.36-461.el9.x86_64.rpm 7739cd6137aa2969d59822e5ec09809b7328ef74ca7eef4bdafd01ecdf4632c5 RLBA-2022:3567 new packages: perl-Term-ANSIColor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Term-ANSIColor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Term-ANSIColor-5.01-461.el9.noarch.rpm b22daf7a57ec0b5ad94880f1d61b78d44f91541e0c6aac9447196a6afb369957 RLBA-2022:3568 new packages: perl-Term-Cap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Term-Cap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Term-Cap-1.17-460.el9.noarch.rpm 09d0193df1b33a3b6710e9bcb187a52353afc12751fb03f2fb3a241171af7b31 RLBA-2022:3569 new packages: perl-Term-Size-Any Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Term-Size-Any. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Term-Size-Any-0.002-35.el9.noarch.rpm 70ffc9048f270f48edb74fa0e7e044ec3395d306453843ed35bc071a655f0b82 RLBA-2022:3570 new packages: perl-Term-Size-Perl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Term-Size-Perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Term-Size-Perl-0.031-12.el9.x86_64.rpm 5152784552cea31b85c752794e71b7883bd4dc9d92d10de1d01337a3b1479ea0 RLBA-2022:3571 new packages: perl-Term-Table Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Term-Table. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Term-Table-0.015-8.el9.noarch.rpm dbcc8e7d764e0d5e7a775b4e1e4417a98aed5341597aec67f33f09213614ee94 RLBA-2022:3572 new packages: perl-TermReadKey Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-TermReadKey. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-TermReadKey-2.38-11.el9.x86_64.rpm ec952a672accbd5a7d9a2733a25d2908ab592bf4f47b810bdac5398fa53ce96e RLBA-2022:3573 new packages: perl-Test-Harness Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Test-Harness. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Test-Harness-3.42-461.el9.noarch.rpm 0c2deb3fc2d9e01e99b80736f6e832ef2859686a2c152847a0c75fdf2542fec4 RLBA-2022:3574 new packages: perl-Test-Simple Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Test-Simple. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Test-Simple-1.302183-4.el9.noarch.rpm 7863270cbe326425269bb033a1bb1a9dfbf8ba9704f7b44297d247a3c1ad31fc RLBA-2022:3575 new packages: perl-Text-Balanced Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Balanced. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Balanced-2.04-4.el9.noarch.rpm 239d21c24144f6bd06845ed5845302082e446e16c1700d9d2cea2e51dfb8dade RLBA-2022:3576 new packages: perl-Text-Diff Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Diff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Diff-1.45-13.el9.noarch.rpm 4d07d3c7faeccb724d0f723468434c1d2a7897aa11c13377a469bff8cce5555a RLBA-2022:3577 new packages: perl-Text-Glob Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Glob. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Glob-0.11-15.el9.noarch.rpm 1ee780aa8b60a8ade62020b7ca590a80579fd93a9ff2e0568b43708d8cd32e43 RLBA-2022:3578 new packages: perl-Text-ParseWords Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-ParseWords. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-ParseWords-3.30-460.el9.noarch.rpm f42e27499c2060ed69355d0a9ebf3d65e15dca452a15620ca68c53442bc4d7f8 RLBA-2022:3579 new packages: perl-Text-Soundex Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Soundex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Soundex-3.05-20.el9.x86_64.rpm eddf7e521195e2a814d16a2d710234511b236dc14e9d910080904f8ec0233b33 RLBA-2022:3580 new packages: perl-Text-Tabs+Wrap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Tabs+Wrap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Tabs+Wrap-2013.0523-460.el9.noarch.rpm 64378a33545ba69912e8be9c49720ef73616ce9b8a3bc28f9bfc1b2cca352e0a RLBA-2022:3581 new packages: perl-Text-Template Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Template. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Template-1.59-5.el9.noarch.rpm 4a6fa7d6dc321ad0bb383ceffcd7b94d72f99a0272e399a226e90b70d6fc8f54 RLBA-2022:3582 new packages: perl-Text-Unidecode Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Text-Unidecode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Text-Unidecode-1.30-16.el9.noarch.rpm 6f56cfa1dc914fcdef60da4e7e056b23af10cd3711029a5f55a84c5ebdb4d66a RLBA-2022:3583 new packages: perl-Thread-Queue Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Thread-Queue. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Thread-Queue-3.14-460.el9.noarch.rpm 3b2e22e8dd868564b29b1389d8769a1aa6ee1edcefd8569e8bf78db630a93e52 RLBA-2022:3584 new packages: perl-Tie-RefHash Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Tie-RefHash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Tie-RefHash-1.40-4.el9.noarch.rpm 44b208af45f344989d7cf63e0a9f620f924eb2217dcf8284e2dd805ef841cb9b RLBA-2022:3585 new packages: perl-Time-HiRes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Time-HiRes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Time-HiRes-1.9764-462.el9.x86_64.rpm 9c4c81b7e7e7a2727f0c4b02f300b2ca1dd43e96cde488ed9bc81dbb2e833c2a RLBA-2022:3586 new packages: perl-Time-Local Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Time-Local. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Time-Local-1.300-7.el9.noarch.rpm d989488e3beff23f6209ca8de9fa16e6f0f61ed0343acbd44b21292c3fc028be RLBA-2022:3587 new packages: perl-TimeDate Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-TimeDate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-TimeDate-2.33-6.el9.noarch.rpm 57953da3f375363b69f83e042db462bbfd6743281a1e3c7aaad9479b1c6d79e9 RLBA-2022:3588 new packages: perl-Tk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Tk-804.035-7.el9.x86_64.rpm 9e720a020005d77c21abbcd38d35bf43a9205ee5f8abbb6cdb3e2fe342183f13 RLBA-2022:3589 new packages: perl-Try-Tiny Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Try-Tiny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Try-Tiny-0.30-13.el9.noarch.rpm 857b0cabab1edf39d4c09c51e620fee02eb753a69e021c0856e6abd23cf38be8 RLBA-2022:3590 new packages: perl-URI Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-URI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-URI-5.09-3.el9.noarch.rpm 3bdb35f88ab875c7b5ff3c09adc2a08c5ed20517a3bbc068022ea43b0776be83 RLBA-2022:3591 new packages: perl-Unicode-Collate Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Unicode-Collate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Unicode-Collate-1.29-4.el9.x86_64.rpm f127558904ea4af9a279e7e29e66fbb95080a77d221dcea628cb236392c0d88d RLBA-2022:3592 new packages: perl-Unicode-LineBreak Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Unicode-LineBreak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Unicode-LineBreak-2019.001-11.el9.x86_64.rpm 729a0e3ecfe1217e525bc57fe7f264437e23f6459e8d3ddf951674defa4adeb8 RLBA-2022:3593 new packages: perl-Unicode-Normalize Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Unicode-Normalize. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Unicode-Normalize-1.27-461.el9.x86_64.rpm 6be1fdbd0890149103be1f6efe7091240eb5ab7e049c418881dd55086b78a0b3 RLBA-2022:3594 new packages: perl-Unix-Syslog Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Unix-Syslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Unix-Syslog-1.1-41.el9.x86_64.rpm a358699a5ce894c1bd67fac2c0d1c58465c9c9497c47efa762e650ad1366396a RLBA-2022:3595 new packages: perl-WWW-RobotRules Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-WWW-RobotRules. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-WWW-RobotRules-6.02-30.el9.noarch.rpm 56e68900d8d2dd6c0e43cf7717363f6a200a9a432181e2836a0bf686dadd21a1 RLBA-2022:3596 new packages: perl-XML-Catalog Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-Catalog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-Catalog-1.03-22.el9.noarch.rpm 358a3b2e27a8c660eed601a6c4b99da5058358798844701afb2df86fc7336d57 RLBA-2022:3597 new packages: perl-XML-LibXML Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-LibXML. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-LibXML-2.0206-5.el9.x86_64.rpm c8857fafa2815d6e0c2efc183e1483bbfc352aa66f135a29ee149fd0a7c33d93 RLBA-2022:3598 new packages: perl-XML-NamespaceSupport Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-NamespaceSupport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-NamespaceSupport-1.12-15.el9.noarch.rpm 45052043ca1fb9a4c0c155b564fa4f69b9a75a67e81d0ee25a8fe5ea850af842 RLBA-2022:3599 new packages: perl-XML-Parser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-Parser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-Parser-2.46-9.el9.x86_64.rpm 8a2ba89dfceb09500829f6efd3f41154b95060500d2f40626bffbbd052bc294e RLBA-2022:3600 new packages: perl-XML-SAX Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-SAX. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-SAX-1.02-8.el9.noarch.rpm 0261c5a5f0eef24ed425d93e08dccf7dc3cd108a5898721bb0985861a6a8c273 RLBA-2022:3601 new packages: perl-XML-SAX-Base Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-SAX-Base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-SAX-Base-1.09-15.el9.noarch.rpm b52d29239c42f3e7c3cf17bf8ff7448b2177304e712fb89b2052a646247134d8 RLBA-2022:3602 new packages: perl-XML-Simple Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-Simple. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-Simple-2.25-13.el9.noarch.rpm d6090f175b89db4b6de14ec5424ac959fb1ae6cf78cad9d237c0cbfe624e3b6a RLBA-2022:3603 new packages: perl-XML-TokeParser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-TokeParser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-TokeParser-0.05-36.el9.noarch.rpm 02525e6e9d58c6c2745cf63c575f7c3cc378e9be6070801c278eb9a86e27a9d7 RLBA-2022:3604 new packages: perl-XML-XPath Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-XML-XPath. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-XPath-1.44-11.el9.noarch.rpm 26572bf19093a6a2901cf4086f78896bdbc56fabea8c218c427abee34b2281c2 RLBA-2022:3605 new packages: perl-YAML Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-YAML. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-YAML-1.30-8.el9.noarch.rpm bc66c253ac1fdfae1df596454fe0ec0b72cb1b49ae483a3880d1b35bbee5980f RLBA-2022:3606 new packages: perl-autodie Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-autodie. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-autodie-2.34-4.el9.noarch.rpm 2c9ef7bca6c14575f2d2359f5326c0a96353c922f5a93cf78068d1aedcac660b RLBA-2022:3607 new packages: perl-bignum Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-bignum. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-bignum-0.51-460.el9.noarch.rpm a406efeede23bac497b67c3a2e6b4765afbeb950a22580306eda7c321748e27c RLBA-2022:3608 new packages: perl-constant Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-constant. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-constant-1.33-461.el9.noarch.rpm eb777f7ac52af61f65c85ffe9b81c05479ba90153cac98217d9cf6889812f378 RLBA-2022:3609 new packages: perl-experimental Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-experimental. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-experimental-0.022-6.el9.noarch.rpm 72889b97b331351164d11927220132d87bc67d8d6fde821f8c91eb49a9470acf RLBA-2022:3610 new packages: perl-generators Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-generators-1.11-12.el9.noarch.rpm b102f03c897fb4a2d72503a776506c5c93d969c2eb1cda0e10fbb4c93c95c0ff RLBA-2022:3611 new packages: perl-inc-latest Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-inc-latest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-inc-latest-0.500-20.el9.noarch.rpm 7111da2e663660b38ec93361c06ca6e71737721d93c76a3679b1c56a381a4303 RLBA-2022:3612 new packages: perl-libintl-perl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-libintl-perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-libintl-perl-1.32-4.el9.x86_64.rpm 2c8f4642aadcd8ecbe1f4b959dbde1e0343988dfc6bb2b527157f5a04eff45e8 RLBA-2022:3613 new packages: perl-libnet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-libnet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-libnet-3.13-4.el9.noarch.rpm e369b44b80d60ade095dda03c59d3eb7fa5fb2632f60e593bdefdac7b84eb02f RLBA-2022:3614 new packages: perl-libwww-perl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-libwww-perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-libwww-perl-6.53-4.el9.noarch.rpm 12b287c41f889db8672712795e68da88c40bf00aa0290cb5abb95c0674d1fef1 RLBA-2022:3615 new packages: perl-local-lib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-local-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-local-lib-2.000024-13.el9.noarch.rpm c122133a1bcb1fbfd21d70ac0a80fa61272550d45a841c4c5be5bb84d828a041 RLBA-2022:3616 new packages: perl-parent Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-parent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-parent-0.238-460.el9.noarch.rpm 3a66910d2ab5c5b5e574b5377dede0fbaa87012bcd7130d66027d3f6117df03b RLBA-2022:3617 new packages: perl-perlfaq Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-perlfaq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-perlfaq-5.20201107-4.el9.noarch.rpm 21032d25448b2c2433b065797235e71bfc664ca2599a523a34fee4e86fcdb830 RLBA-2022:3618 new packages: perl-podlators Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-podlators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-podlators-4.14-460.el9.noarch.rpm 8aa609d0999aa7c5701eddd93d024607980aac5f81e927f37c1f8a6312d3bbd7 RLBA-2022:3619 new packages: perl-srpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-srpm-macros-1-41.el9.noarch.rpm d513c5c2a9a51bc7af808b7619ec8aaa9495d72f34b403a9d0b8a839bad4e41a RLBA-2022:3620 new packages: perl-threads Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-threads. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-threads-2.25-460.el9.x86_64.rpm 31f7667a17020530a996f8ba35fe51418bc17ac97e30441fa91708cb2c2d305e RLBA-2022:3622 new packages: perl-version Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-version. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-version-0.99.28-4.el9.x86_64.rpm 3f9c065b12664605cf79dce003bb6e5de19d67947e79266a6e55db0a380ebc34 RLBA-2022:3623 new packages: pg_repack Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pg_repack-1.4.6-4.el9.x86_64.rpm 7e7efdc1094c5f9a38ae4c87e43f88fc5a5b4c51efe87648f7576b36a8e8b33c RLBA-2022:3624 new packages: pgaudit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pgaudit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pgaudit-1.5.0-6.el9.x86_64.rpm a4f1e312e8f121b48b2764c33dead36c0f0200202d50c06f27176f7efd6f4fbf RLBA-2022:3625 new packages: php-pecl-apcu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apcu-panel-5.1.20-5.el9.noarch.rpm aa48096ed5141719e41c942ff1742328bc4b1b45aff90f413c82b0ad6e4a4bf0 php-pecl-apcu-5.1.20-5.el9.x86_64.rpm d4761c7c1f804587af6cbf16334dec38a205262585c14b50d40e7741006dffe0 php-pecl-apcu-devel-5.1.20-5.el9.x86_64.rpm cd16cc7d7c22ca65d1357d692e8af1ef6348f461d047321544e2da024f17185b RLBA-2022:3626 new packages: php-pecl-rrd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-rrd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pecl-rrd-2.0.3-3.el9.x86_64.rpm f9091f3ae0609f1e7187ff1a078cf5f227ee086ec8dcece21f8a82911018ad7c RLBA-2022:3627 new packages: php-pecl-zip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-zip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pecl-zip-1.19.2-6.el9.x86_64.rpm df4f29fd82b9bd90758f162ea8e642374b48d63ee10d0fcd5f9868ac2d14b70f RLBA-2022:3628 new packages: pinentry Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pinentry. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pinentry-1.1.1-8.el9.x86_64.rpm bcb0d7145aca311a6f20a5de1e62b12619113a6a15ae7d623fdc9120d641c610 pinentry-gnome3-1.1.1-8.el9.x86_64.rpm 8b46f7455fac5003608090f86f8a184fb22d263aceca7203d55926a753e35cfc pinentry-tty-1.1.1-8.el9.x86_64.rpm 6ecddc6df311d64358d5c56a171cd89adee511f1b3a76680946a89d1683b3660 RLBA-2022:3629 new packages: pinfo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pinfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pinfo-0.6.10-29.el9.x86_64.rpm 1b992a7869847abff963d04803f5ee6100a1e31c112d3354be0a02d894884e69 RLBA-2022:3630 new packages: pixman Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pixman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pixman-0.40.0-5.el9.i686.rpm 636feeb25f0b8a27b9fdadf67374e2a6e4a44b262de5d9746586706f0611cfc2 pixman-0.40.0-5.el9.x86_64.rpm 6d3812d5e6841c69ff695feff0ac2bbd8e04287d822e71f1ae865925e8a2a33d pixman-devel-0.40.0-5.el9.i686.rpm 4772f0a9f1da57817ce4cc209dec5a882b1e4af2ab084ec5aa3f8313017129b7 pixman-devel-0.40.0-5.el9.x86_64.rpm 1a058e78bfb2eb09d0666e6c55f5b81d81d011eb2589d7110fb674e90094c9da RLBA-2022:3632 new packages: plexus-cipher Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-cipher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-cipher-1.7-26.el9.noarch.rpm 616df0e391dc7da441c78842ad3e3807574d400cf9c68abcbd93871e76e6db13 RLBA-2022:3633 new packages: plexus-classworlds Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-classworlds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-classworlds-2.6.0-10.el9.noarch.rpm 8c6a69374e6ea7b2ce0c6d15b99b774999f91ff89294e3420fa2022b2b0d83b6 RLBA-2022:3634 new packages: plexus-containers Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-containers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-containers-component-annotations-2.1.0-9.el9.noarch.rpm f5edcaf7dab261db1805329b8c412eda7df5ba79914b8d22cab525456c99f4dd RLBA-2022:3635 new packages: plexus-interpolation Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-interpolation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-interpolation-1.26-10.el9.noarch.rpm 018c48c1263bfc572932fdca5b4536e92f3676e27e5bd58d89cdf57547612f7a RLBA-2022:3636 new packages: plexus-sec-dispatcher Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-sec-dispatcher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-sec-dispatcher-1.4-36.el9.noarch.rpm 45707c479b62265612634c7a5716e1d17e4647ffdf8c4893e2707dc441bf49f9 RLBA-2022:3637 new packages: plexus-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-utils-3.3.0-9.el9.noarch.rpm 15fbe0eed0c8e02cbc48f98ed0ac2e7f52ed1d34913d65673a9916ea9bac726f RLBA-2022:3638 new packages: plotutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plotutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plotutils-2.6-28.el9.i686.rpm 697af251383eb52ca796257282fd9170262606ea926fb6be1544074f81f320d9 plotutils-2.6-28.el9.x86_64.rpm af80a16fa2fa3e56b3d428cdbebca52c1952d7d3f1e4a0a5dbdc8fa120e0b7cc RLBA-2022:3639 new packages: pmdk-convert Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pmdk-convert. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pmdk-convert-1.7-8.el9.x86_64.rpm 10b7bb5155a8d1f705138bd57f84e39cf6d7d1d1c14e40e1b770179d8c30a392 RLBA-2022:3640 new packages: pmix Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pmix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pmix-3.2.3-3.el9.i686.rpm 672bb9d43dcecd1346da1a847ed5e2c62fb2e2431edf67c856687fe5fa07d155 pmix-3.2.3-3.el9.x86_64.rpm 4838715128aaa803720759c84f246995741b53d300274f93b2d0e2391f25ac26 pmix-devel-3.2.3-3.el9.i686.rpm b1c55fd9467b5e4ea2e01b4caa6c1e9eacdd4376f997e45995a391ef9a0f8ed2 pmix-devel-3.2.3-3.el9.x86_64.rpm e53f0f34f5e04dcee5f8dddce347ff4f4e97aaf6240940cb350e3c714549ca1c pmix-pmi-3.2.3-3.el9.i686.rpm 67729116f4f549fd23e4ef0f74f2d3252c75c0d8aeaef6998bad2d5b71efde56 pmix-pmi-3.2.3-3.el9.x86_64.rpm aefe9bee17cf196fec6c88a12df756e9fa9d0eb415dd788d7f78ab6ac5253d99 pmix-tools-3.2.3-3.el9.x86_64.rpm 7610d7645fbb82aa8fe9c952878e2eda871098e923ac10559e9d3209799d0bf9 RLBA-2022:3641 new packages: pnm2ppa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pnm2ppa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pnm2ppa-1.04-52.el9.x86_64.rpm ed32639b1e0a7d578139868c920e0f494c2e32f903fb4e1ed7feab813aeeb217 RLBA-2022:3643 new packages: poppler-data Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 RLBA-2022:3644 new packages: postgres-decoderbufs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgres-decoderbufs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postgres-decoderbufs-1.4.0-4.Final.el9.x86_64.rpm e62b537b1fa74e079aa18a01ba08846bb6d44f30918f9323d66666ec128175f7 RLBA-2022:3646 new packages: postgresql-odbc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgresql-odbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-odbc-12.02.0000-6.el9.x86_64.rpm bfe997de09ddf12632e1814c2c08a6ec7d89cd10b65c61e6f2ea697c6b7438d5 RLBA-2022:3647 new packages: potrace Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for potrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms potrace-1.16-7.el9.i686.rpm c3aca949ff100eecb2e26cd9821c4597942dd88dd2dd229459711d4b1a4b5f1d potrace-1.16-7.el9.x86_64.rpm 85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802 RLBA-2022:3648 new packages: powertop Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for powertop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms powertop-2.14-2.el9.x86_64.rpm 4d30ae5c8bc4470fc7069117aaba0f11df9bd53cdada5dc970564d74437664f3 RLBA-2022:3649 new packages: pptp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pptp-1.10.0-14.el9.x86_64.rpm 5a7f6c3d482a3752109abba3a0eaf15f048dedb80b7a378fcd7967a5ae9ac6ad RLBA-2022:3650 new packages: procmail Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for procmail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms procmail-3.22-56.el9.x86_64.rpm 6a9c72658f1751af33304e93c2e15cd8f55e1393a0518de432d6db93e3d618bd RLBA-2022:3651 new packages: pt-sans-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pt-sans-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms compat-paratype-pt-sans-fonts-f33-f34-20141121-23.el9.noarch.rpm 549cd72566f4b91ae6dc01efe25fcc41d43403d99880d261222b3dfdbc7fb7a9 pt-sans-fonts-20141121-23.el9.noarch.rpm 9c1d857eebbee5a1d46bcdaba0b002bad75706456e176f20b4d1974529d7b282 RLBA-2022:3652 new packages: pulseaudio Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pulseaudio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pulseaudio-15.0-2.el9.x86_64.rpm 4fcb2ea115d1bf762816c6c9ece5bb8151919bc362478de8c5cef3339ac5b166 pulseaudio-libs-15.0-2.el9.i686.rpm c906baf77d790e020887ac615f1001e00ff6b666199f48d33997f7de2fae4de8 pulseaudio-libs-15.0-2.el9.x86_64.rpm b0c38349e1ac517c131c9eabfb9f952692684126775305b9a73ead98ae1acfba pulseaudio-libs-devel-15.0-2.el9.i686.rpm 33baf79c08bfdfa9b05d5fbc305d1cf1d78ee99f0767b8900bfd828a45b50c37 pulseaudio-libs-devel-15.0-2.el9.x86_64.rpm a397f9a40a63c13c7f4fa1189336dc69749b40894536488f32b7dac28b436a94 pulseaudio-libs-glib2-15.0-2.el9.i686.rpm c4f864cd17022f536b4341edd36c27c6437643925dec374c61f0c7308c6cf1e5 pulseaudio-libs-glib2-15.0-2.el9.x86_64.rpm 1fd0991cb4406ab257063eeacc7696a3fd7b15bc29316c06336b7c94ad1f1f53 pulseaudio-module-bluetooth-15.0-2.el9.x86_64.rpm 2497e669925a422aa77c7f760534c13ed7d3a738c45c9cc8420630c8bf9bd730 pulseaudio-module-x11-15.0-2.el9.x86_64.rpm f0099ef154190278449846d518c0b20091ae2132ab2edd599bcdd9600d88081b pulseaudio-utils-15.0-2.el9.x86_64.rpm b5d640aa277bf74a70502e54a78cb4d2c41312afb99a2d2850749e39e35610cb RLBA-2022:3653 new packages: pyatspi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyatspi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyatspi-2.38.1-3.el9.noarch.rpm 89df4356f2a01de616a73e752e050aaf8a7f1d4b15c1937bd8111e49e004f157 RLBA-2022:3655 new packages: pyelftools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyelftools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyelftools-0.27-4.el9.noarch.rpm 1943df3aa568cad776237bb4946f592132e1d693aebf4332bbf98cfc55d7be69 RLBA-2022:3656 new packages: pyodbc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyodbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyodbc-4.0.30-4.el9.x86_64.rpm c8a1f2d1f971092c887c6021d712c57eac2fb50891f094bb2bc9cdd0c684c381 RLBA-2022:3658 new packages: pyserial Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyserial. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyserial-3.4-12.el9.noarch.rpm fc0998943302fc164c42d97083a4593bf49e4903fac807edf7a650d57e0e3904 RLBA-2022:3659 new packages: python-appdirs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-appdirs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 RLBA-2022:3660 new packages: python-argcomplete Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-argcomplete. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-argcomplete-1.12.0-5.el9.noarch.rpm 1dcb32bea866d4ee0082e8f18a9d779e5d90558e18c78a60c971066b111709f2 RLBA-2022:3661 new packages: python-augeas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-augeas-0.5.0-25.el9.noarch.rpm d331efe5f85d3a1735f92a23dbc0dd08ccc5e5b67c33dfcb57cb02b17fe3390f RLBA-2022:3662 new packages: python-configobj Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-configobj. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-configobj-5.0.6-25.el9.noarch.rpm 6c4a4973b2604e0e6b79d7d16b19ab6dc467672b2e8889c483a1e2de882d4430 RLBA-2022:3663 new packages: python-cups Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cups-2.0.1-10.el9.x86_64.rpm fc0c1f6333fdbdf05c34bd835c9369f7585fc74531b570b0e022b69ca919db15 python-cups-doc-2.0.1-10.el9.x86_64.rpm af5c18ad7cc26909220b0f43529a30920ad6bba28bc93cc780af29200bc06331 RLBA-2022:3664 new packages: python-dasbus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dasbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dasbus-1.4-5.el9.noarch.rpm cd47bf4dcd1613f8d23f423983c4e1747a5c54f31dc9b1e86a5c9ef696862260 RLBA-2022:3665 new packages: python-dbus-client-gen Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-client-gen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dbus-client-gen-0.5-5.el9.noarch.rpm d52a6e36a9b35e64331b2d4fcb4fecee6f895e902f7cfa13eb25dfc056b4f6df RLBA-2022:3666 new packages: python-dbus-python-client-gen Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-python-client-gen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dbus-python-client-gen-0.8-5.el9.noarch.rpm f5f0b742933f67fd3e4dc51c3fc5248ae1b5e3450dde59ba186664a9bc975a1b RLBA-2022:3667 new packages: python-dbus-signature-pyparsing Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-signature-pyparsing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dbus-signature-pyparsing-0.04-5.el9.noarch.rpm ca759b2fb44772121318add34db4c0804e758c9f6ffad6e088fd8d85b292d208 RLBA-2022:3668 new packages: python-distro Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-distro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-distro-1.5.0-7.el9.noarch.rpm cd390e4162f7675ec2af86c265300555b6eba149a04c3fbd8a4bfd0ae7161f80 RLBA-2022:3669 new packages: python-enchant Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-enchant. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-enchant-3.2.0-5.el9.noarch.rpm 477e0c70f084c79a0a301abb1907133b78f4d6ae8070c0b9ca550d036f88330b RLBA-2022:3670 new packages: python-gssapi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-gssapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-gssapi-1.6.9-5.el9.x86_64.rpm b51314b1ce48a94a4388eb55f1a8236cfbe0c2530aeed89ceee8b0ccd4dbfc25 RLBA-2022:3689 new packages: python-oauthlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-oauthlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-oauthlib-3.1.1-2.el9.noarch.rpm 8cf1ffa50e304f71ba8a90c318b4276a16c2a9a63140be486992adf1726c5063 RLBA-2022:3671 new packages: python-into-dbus-python Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-into-dbus-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-into-dbus-python-0.08-5.el9.noarch.rpm c0b5e0fec847c477fb6f8ef331f62e5c85a1fd007fc8cc6ee7c3ffc0b7d49bca RLBA-2022:3697 new packages: python-qrcode Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-qrcode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-qrcode-core-6.1-12.el9.noarch.rpm 3b81b8bb734166e53d02d430e7a085abade18983c6b33472b5347616f2d7942e RLBA-2022:3672 new packages: python-jinja2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-4.el9.noarch.rpm 450c6930ad5829b425311e920b37abba521e0f64d180e68066af948c5f710ab3 RLBA-2022:3673 new packages: python-jmespath Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jmespath. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jmespath-0.9.4-11.el9.noarch.rpm 1472a91a3959c86180064a56dfa58a317ba3fa102ebac203edeea1545c2b4135 RLBA-2022:3709 new packages: pytz Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pytz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pytz-2021.1-4.el9.noarch.rpm 3e14e3479cb226537cf886aa771e3f9c1866ab0354d92efb51d087705e3f2c15 RLBA-2022:3674 new packages: python-jsonpatch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jsonpatch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jsonpatch-1.21-16.el9.noarch.rpm 3e95e115269dd22ec6ca88ebd83f7bb903f82ee9efcbf71ebf476414d2cf465d RLBA-2022:3675 new packages: python-jsonpointer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jsonpointer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jsonpointer-2.0-4.el9.noarch.rpm 21cc6275d3b3c4b2cba404a3838102b889baff286b71e8883a47f0080c657f0e RLBA-2022:3676 new packages: python-jsonschema Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jsonschema. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jsonschema-3.2.0-13.el9.noarch.rpm dc8da354c531d71d7ea70cd2e5b49004128ba221e580c7bf1341da813eba078d RLBA-2022:3677 new packages: python-justbases Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-justbases. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-justbases-0.15-6.el9.noarch.rpm 9275d665532b3c455ab276d3157808c66f32123ede49b83aac8de3fa1d2ce4fd RLBA-2022:3678 new packages: python-justbytes Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-justbytes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-justbytes-0.15-6.el9.noarch.rpm a0b50a65a668bf1b7eb3737e7d0108172014cff7df90842ec624733488e451b3 RLBA-2022:3679 new packages: python-jwcrypto Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jwcrypto-0.8-4.el9.noarch.rpm 55b1e29f417d1017bcb86509e0dd1c664d2b8f74d79a3d8f3f20a7c2b3befeb7 RLBA-2022:3680 new packages: python-kdcproxy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-kdcproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-kdcproxy-1.0.0-7.el9.noarch.rpm ae0c7ddbda09ea266548730867fa43e9aee6bf59586222a6fdbee374a4a18dd8 RLBA-2022:3682 new packages: python-libevdev Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-libevdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libevdev-0.9-4.el9.noarch.rpm 558d0b5e19478d870b97acb0e4f36611f9db75d0418fa572c70a41758128ea9d RLBA-2022:3683 new packages: python-mako Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-mako. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-mako-1.1.4-5.el9.noarch.rpm 49c288329b2eb5f5f3016f6fe5a58c4a96e87d84477171da4522e4f109428d15 RLBA-2022:3684 new packages: python-markupsafe Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-markupsafe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-markupsafe-1.1.1-12.el9.x86_64.rpm 84a34118418d2c0554c2add71d7368dbdeb2f99977697b93b62c8db8bb66e879 RLBA-2022:3685 new packages: python-meh Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-meh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-meh-0.50-4.el9.noarch.rpm 1f7f64920e1d2096918570f1c68f995a94495590eb35936e46b9fdac1cc1c498 python3-meh-gui-0.50-4.el9.noarch.rpm 4c077f548930aa9091e98ce27507c598540692350cceb7a664e48f7432a8f510 RLBA-2022:3686 new packages: python-netaddr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-netaddr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-netaddr-0.8.0-5.el9.noarch.rpm 7423fe191e035fa4e1b31498be0674f9a7d261e45b6b54fe179507b841b29736 RLBA-2022:3687 new packages: python-netifaces Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-netifaces. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-netifaces-0.10.6-15.el9.x86_64.rpm 864a5352211ce78061ae155ed2b6b2ca07c67a30abdd98a44e43f9e058c243c2 RLBA-2022:3688 new packages: python-networkx Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-networkx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-networkx-2.6.2-2.el9.noarch.rpm 1f7b90fcdb6dc183b3b1fea691929321a5f8182e286442590270a80308f5eab9 RLBA-2022:3690 new packages: python-pid Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pid-2.2.3-12.el9.noarch.rpm 140cd7b5994b89fa4b631efac5b23353eb50557ee1afc87cb14bfdab5b768f86 RLBA-2022:3691 new packages: python-prettytable Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-prettytable. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-prettytable-0.7.2-27.el9.noarch.rpm 3fabd970a0ffc0353cd3354180f11c4171ee151d58269389710b9d15f5878638 RLBA-2022:3692 new packages: python-productmd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-productmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-productmd-1.31-3.el9.noarch.rpm 4ec024eb82897eeeb9398ab6c982a35c6105b666886ad3b83945a64c0f882b44 RLBA-2022:3693 new packages: python-pyasn1 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pyasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyasn1-0.4.8-6.el9.noarch.rpm 0343d620c8306ec8d609af7142a2e9ffe66fc7bb38c1104f1293c5e922c2d749 python3-pyasn1-modules-0.4.8-6.el9.noarch.rpm df0e78f0f3b2e33eb23b95bad31da1bda1eb3ef648dae33a47c485f5fed9a603 RLBA-2022:3694 new packages: python-pycdlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pycdlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pycdlib-1.11.0-5.el9.noarch.rpm a6343a68eca91e0fd909655664276ff511b855f68c810967471d53063ede54e3 RLBA-2022:3695 new packages: python-pycurl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pycurl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pycurl-7.43.0.6-8.el9.x86_64.rpm 497b37bcd9d70baf21cddaf39d2303612263d6eb81b66e862a1f2597667abcea RLBA-2022:3696 new packages: python-pyrsistent Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pyrsistent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyrsistent-0.17.3-8.el9.x86_64.rpm 33d3d13e076a409a150f9e40558314195a239912ae9a58417a3d4f78fdd939b2 RLBA-2022:3698 new packages: python-qt5 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-qt5-5.15.0-10.el9.x86_64.rpm 7c12e19178c37196791a9bed0df043c9d16ac716d47f1dd1e9899b74352a0e1a python3-qt5-base-5.15.0-10.el9.i686.rpm ec233def053bfad702e51ffbee3c7cc143c526a2930305b1be34f56a989e6a49 python3-qt5-base-5.15.0-10.el9.x86_64.rpm e8bc08e9f5cc3a7110da633ee025706f9ba8649922b0f63ce720db7af0b91582 python-qt5-rpm-macros-5.15.0-10.el9.noarch.rpm 64ae41547c82b58a0832fe57b4bb6ef66599074f3117867fbf064aae548eebf4 RLBA-2022:3699 new packages: python-requests-file Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests-file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests-file-1.5.1-4.el9.noarch.rpm 3e99f9d762c5ea065578d34178f6abde35e8028fc0c87f7c3ee2da454611ce7f RLBA-2022:3700 new packages: python-requests-ftp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests-ftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests-ftp-0.3.1-23.el9.noarch.rpm 2b59c9b787db80bbeb150339a5adfeb5ce00e2914790893f15b9ddabab8d47e3 RLBA-2022:3701 new packages: python-requests-gssapi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests-gssapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests-gssapi-1.2.3-3.el9.noarch.rpm 5173eb3b4176f6c89dc40fafc675b86fa62e3d48bed92f6225defbeb56dd24a6 RLBA-2022:3702 new packages: python-requests-oauthlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests-oauthlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests-oauthlib-1.3.0-12.el9.noarch.rpm d5e57903f4595e07d17a1f2034f58fab80da5c874d7a472b1d315f38051f4bd7 RLBA-2022:3703 new packages: python-resolvelib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-resolvelib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-resolvelib-0.5.4-5.el9.noarch.rpm a7903327eb375e671b9e4a99c70eca9e6db018560c7d6a282ab67ab50168e921 RLBA-2022:3705 new packages: python-scour Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-scour. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLBA-2022:3706 new packages: python-simpleline Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-simpleline. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-simpleline-1.8-3.el9.noarch.rpm 019b7e28659ecd08a5fa4299dc3a0d859f8f1c782143cd054e77760c5d2c812c RLBA-2022:3707 new packages: python-urllib-gssapi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-urllib-gssapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-urllib-gssapi-1.0.2-4.el9.noarch.rpm 5cac4ce2b13c50cdda99c16f18685d43b904e1c463e561580d424c4ccbe2cab6 RLBA-2022:3708 new packages: python-yubico Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-yubico. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-yubico-1.3.3-7.el9.noarch.rpm dad60e6c1c2b50ddfef4ac0ba3bd88397a43a78b5453b6e8f2ada55caf4a6968 RLBA-2022:3710 new packages: pyusb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyusb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyusb-1.0.2-13.el9.noarch.rpm 030c649ed6b736080f5e52abc5fb659072149590b6167704497052973fac018c RLBA-2022:3711 new packages: pywbem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pywbem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pywbem-0.15.0-6.el9.noarch.rpm d3521dfc08622e5ee5279d9c8ba77cd1f871e64d57abe908ff163135fb33244a RLBA-2022:3712 new packages: pyxdg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyxdg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyxdg-0.27-3.el9.noarch.rpm 2c63144daa29faf585df966a1714deb5283b2661a65ccf8dc8576e78b1d31b32 RLBA-2022:3716 new packages: qt5-doc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-doc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-doc-5.15.1-4.el9.noarch.rpm 4feaf02bcf6e6f128fb1f348767403a1d02607a52ed5f00a013e9c047d9cb4c5 qt5-qt3d-doc-5.15.1-4.el9.noarch.rpm eddd1b37caadb34faee508c9782ba8c51aba6405bfbf542560d1363daecf54a7 qt5-qtbase-doc-5.15.1-4.el9.noarch.rpm 095ef84f3fa0e525f26e6ef45a9b3a3b31b7cf2b210751e62729b20a4e6ea034 qt5-qtcharts-doc-5.15.1-4.el9.noarch.rpm bfd2d4a3c7566a0dc12ac27a57deceaf124df50a8b727ecae31753a2a26ffc0f qt5-qtconnectivity-doc-5.15.1-4.el9.noarch.rpm 2230430767f905cf3e41e85eacf28735ac7543a54e5ba0ce7c80d703f8c85d6c qt5-qtdatavis3d-doc-5.15.1-4.el9.noarch.rpm aca48e9612e54489881068b658b6c38afded94e8d0af986a9ab82a3d9b51e782 qt5-qtdeclarative-doc-5.15.1-4.el9.noarch.rpm babae625dfb97e81d7eb78a8260de63bc1b1884550621357d353c1afb16c671f qt5-qtgamepad-doc-5.15.1-4.el9.noarch.rpm 2226a26e06995d918ed14e688066128ec1aa212bf5f08d71a9d2a204f7992db9 qt5-qtgraphicaleffects-doc-5.15.1-4.el9.noarch.rpm 9c0da1fc3f4ce12a9ef33846a3ec1217f9a4c98bf61a177d4ebbf3d6edb5e620 qt5-qtimageformats-doc-5.15.1-4.el9.noarch.rpm 23537e0aad92d1143f28e115e1e4bd5853edac20b13de2d2bba782406f400d53 qt5-qtlocation-doc-5.15.1-4.el9.noarch.rpm 5d57fd6b8664cdbc02fc31a5034e5c1c1051620ba361518bd5fe61b78e246edf qt5-qtmultimedia-doc-5.15.1-4.el9.noarch.rpm 0f34be5f2ccc7974043c1908ac0691be827f829c3e3db110347aee3436ebe5e1 qt5-qtpurchasing-doc-5.15.1-4.el9.noarch.rpm 1021211698e24d59d6ef7548688e53a214e3f644d08929177541b69455659e96 qt5-qtquickcontrols2-doc-5.15.1-4.el9.noarch.rpm a856d6db1177df02835a8bf77718e66414b32707ff670cb6f8c6f01aba099b4a qt5-qtquickcontrols-doc-5.15.1-4.el9.noarch.rpm d3a3ee21d431d79814c53cdcdc2c3f9a1ad434f49761f2d367a6759aee8d9efb qt5-qtremoteobjects-doc-5.15.1-4.el9.noarch.rpm 2f73a86ecbc6e36e01097ff825b2e8735a6498eb634a3cf00819ed49427d0825 qt5-qtscript-doc-5.15.1-4.el9.noarch.rpm a8a93d95fb0f656512c76cecc0eb262b747affdfd9fc4cd1860331a1a383126b qt5-qtscxml-doc-5.15.1-4.el9.noarch.rpm 2e463d3f298d6773bea70e3fb0fe1e4e5fc69cd77fd95422d0e04f130155a961 qt5-qtsensors-doc-5.15.1-4.el9.noarch.rpm ed02acbab9c7bc3a65e7779abbd77e787d53252fb8b7604ed38224afbcbddf46 qt5-qtserialbus-doc-5.15.1-4.el9.noarch.rpm aac704ce4780fa8fdd02ccdfe061824c1900d16d4dce8da01f2b8b9b97bdb485 qt5-qtserialport-doc-5.15.1-4.el9.noarch.rpm ee6574410b687d76db0aa868d0bb7944abb485b5ec06048cd3a6f9e98b8c1058 qt5-qtspeech-doc-5.15.1-4.el9.noarch.rpm b3d1b1bc94bd620f97892ac158e350f98ce7fa33995ec002c1506db826417dcd qt5-qtsvg-doc-5.15.1-4.el9.noarch.rpm ad52b61cdcc912fa7d6250b2b9911b2e5fa5414e647e4144582f0b0027fff792 qt5-qttools-doc-5.15.1-4.el9.noarch.rpm 4695f8cdafadfc9bf0e9fc48bcb30140948fe4ed86056b33f13dbc95aa837195 qt5-qtvirtualkeyboard-doc-5.15.1-4.el9.noarch.rpm b7851a730e1afb405ea1e4854fe0203cb4790d9604078cfaa80724b54a8a084d qt5-qtwayland-doc-5.15.1-4.el9.noarch.rpm 4076a92d094c5a4aed2c2e1462f3ea36bd7b8f2b22b1940ac3aeee3e6b6db6a7 qt5-qtwebchannel-doc-5.15.1-4.el9.noarch.rpm 412ee215dd566bf72263843e60be5ad745b76168c90b79f84285b8137d383b0f qt5-qtwebsockets-doc-5.15.1-4.el9.noarch.rpm 860e9c69376480a872ba1253dff05c08ce7abc248a3da285e96c6454c22ae088 qt5-qtwebview-doc-5.15.1-4.el9.noarch.rpm d5bb9d1e4c79089567f5af3d40cbc28a1d8715b2b54ec60ad5c69b464cc21d79 qt5-qtx11extras-doc-5.15.1-4.el9.noarch.rpm aea1147d2de0b91036212edc08e2001255497a8511faf1fdeeef52f4fb223783 qt5-qtxmlpatterns-doc-5.15.1-4.el9.noarch.rpm 6b1474bf679b4470be96f504f9f41d2004d8075c91fa633f39f107498a3ee2ae RLBA-2022:3718 new packages: qt5-qtconnectivity Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtconnectivity-5.15.2-6.el9.i686.rpm 0804df27a04070c95342e4d455ee67089c2903ac03c2f46a5ea481229681f0ac qt5-qtconnectivity-5.15.2-6.el9.x86_64.rpm 38400344f2401878ea60141f54f3b37f36b1e10f0023b7b8f29b9e826dd2388c qt5-qtconnectivity-devel-5.15.2-6.el9.i686.rpm ea50388b5773d6eb016865c7873d9e583364d0740cf708361bbdc590ebc35372 qt5-qtconnectivity-devel-5.15.2-6.el9.x86_64.rpm c2a76665a5df2be196eaab003aabb6d5a89f4305167e1cee63eebdff41b02f1b qt5-qtconnectivity-examples-5.15.2-6.el9.x86_64.rpm ceb04c445922ff7921e2c98877050fc390c3c896defe5278b36e60bbc2e401f7 RLBA-2022:3720 new packages: qt5-qtgraphicaleffects Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtgraphicaleffects-5.15.2-6.el9.i686.rpm dbe68bf0ecbaaff9e8fcf3abd1f222b72e8d1dfab92f652661fcbd9f65bdcf65 qt5-qtgraphicaleffects-5.15.2-6.el9.x86_64.rpm 0ab05641c6ca96b30ad191d4090a990dd2c4a8344c780b125c154d3441ef6f75 RLBA-2022:3721 new packages: qt5-qtimageformats Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtimageformats-5.15.2-6.el9.i686.rpm aa5daabbebd00d18be77388abc57753ecb3868cc4cc1765b1035e1a247c26a1c qt5-qtimageformats-5.15.2-6.el9.x86_64.rpm df0fae3e9f634971dcb7d3285425f7095175267acb60db83099d40bacfba8afb RLBA-2022:3722 new packages: qt5-qtlocation Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtlocation-5.15.2-9.el9.i686.rpm c7be9c31029ab505e7bd8a47b63df0d0095d6b800ed978ad3408df522d6774e5 qt5-qtlocation-5.15.2-9.el9.x86_64.rpm 2529d293af1cba7839548d36cb747ab9f6b801277141921033d18f0d28cf69b4 qt5-qtlocation-devel-5.15.2-9.el9.i686.rpm 3cc70b39413d529d8be7c2e2838373eaf653f5c2e92796cb99009ade1f6cb93d qt5-qtlocation-devel-5.15.2-9.el9.x86_64.rpm 9ffeb65e723d012ddf685b8e72540f97e224980a86bcd6b2b7a0de5d1a4070c6 qt5-qtlocation-examples-5.15.2-9.el9.x86_64.rpm 7f3c4abc1ad4e35ba23aa38a0ad2876252105e00add1d1b631f970acb89103aa RLBA-2022:3725 new packages: qt5-qtscript Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtscript-5.15.2-6.el9.i686.rpm abfa93bb6cf65642faa094af093b5fc4eb6bfac19a5c9d1d737776d839a5d94b qt5-qtscript-5.15.2-6.el9.x86_64.rpm a1f75b7dcb733557b659674b3c37cc488bb70686ef955c33634d7faee60a038a qt5-qtscript-devel-5.15.2-6.el9.i686.rpm 0aaf2d56c4fba1ac6daef17d08e48e9dff1d3da9e4a7b32326c9ed2ddcea0eb4 qt5-qtscript-devel-5.15.2-6.el9.x86_64.rpm 6dab6d3aca0ab17a0d26fcb15f8314c76789761b1456f7b292cf268ac7781f8b qt5-qtscript-examples-5.15.2-6.el9.x86_64.rpm ddf5d9d0826c8648b7b30e04f64c7460b4aa23667c76d228be20e9a7361fbee8 RLBA-2022:3732 new packages: radvd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for radvd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms radvd-2.19-4.el9.x86_64.rpm da7091258f09fc71cabb6d7b8473d5315233f396af6746809d3755e164a92857 RLBA-2022:3733 new packages: raptor2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for raptor2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms raptor2-2.0.15-30.el9.i686.rpm f1b879eed10e406a7065feea0837cbd070165626b237b1bc4ca50a33d3ff2e41 raptor2-2.0.15-30.el9.x86_64.rpm e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e RLBA-2022:3734 new packages: rasqal Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasqal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rasqal-0.9.33-18.el9.i686.rpm 8b033f5670a7de5bd6ff12fb28d6b30cc892b09e92057645e58b78a92cb59c02 rasqal-0.9.33-18.el9.x86_64.rpm da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f RLBA-2022:3735 new packages: redfish-finder Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redfish-finder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redfish-finder-0.4-9.el9.noarch.rpm 590979e19e727c077106c05e63b538d76194fdf2996fb398a39c9bea99508478 RLBA-2022:3737 new packages: redland Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redland-1.0.17-29.el9.i686.rpm 0ea55ae47181c641201888c4bcb594570b1b8736c9aed5b41aab64ccc5d6502b redland-1.0.17-29.el9.x86_64.rpm 487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d RLBA-2022:3738 new packages: regexp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for regexp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms regexp-1.5-37.el9.noarch.rpm 49554c0c181463be34e862e47b84246e690df6ab43b4474571a57e80a5ce56af RLBA-2022:3739 new packages: rest Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rest-0.8.1-11.el9.i686.rpm 5fc5e042ef67118a033ae6cc4958a8410df6de24c8673ee5227c46767e3264a1 rest-0.8.1-11.el9.x86_64.rpm b7a0c01eb27c9d9a6eb1d4b474838f71b6b299347cd211c7e7e0a7048c461d11 RLBA-2022:3741 new packages: rpcsvc-proto Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpcsvc-proto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpcgen-1.4-9.el9.x86_64.rpm 127234a4100d5dfb8feba7b90208ab0a95506c1d0196382fa016316c2b3bf5c1 RLBA-2022:3742 new packages: rpm-mpi-hooks Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-mpi-hooks. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpm-mpi-hooks-8-3.el9.noarch.rpm 1a9803e2f02ea3cafaf3e2278cbdd59e0c4439a726928f4263ccc21b05ccacd2 RLBA-2022:3743 new packages: rrdtool Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rrdtool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rrdtool-1.7.2-21.el9.i686.rpm 89f84955e94b7e26b8d0ae23089aa0a011cd44ebef0172d6a9ba81cb0726fb1d rrdtool-1.7.2-21.el9.x86_64.rpm 832825221ed2936a61364a4afca0a0611a5d3e1b9ea3e550a3ff05cb4f3c1776 rrdtool-perl-1.7.2-21.el9.x86_64.rpm 842bac750fab9cae29bf1fc3af7de85e08fe7341421d3fa0cbf455894264a9cf RLBA-2022:3744 new packages: rshim Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rshim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rshim-2.0.5-2.el9.x86_64.rpm 1676d0db451a2e697c9cf1c49ed2a0f50ee785bdf5ad6cf46401d049dfb7cb47 RLBA-2022:3745 new packages: rtkit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rtkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rtkit-0.11-28.el9.x86_64.rpm c1f75d252c80b24dc5f7dc34c558698c88684b987ad5ae7411f7908555770e65 RLBA-2022:3746 new packages: rubygem-mysql2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rubygem-mysql2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rubygem-mysql2-0.5.3-11.el9_0.x86_64.rpm ce6a2c9028ca12855944fa30885afbc22fbe20771bb3a89712f98841d29ae97f RLBA-2022:3747 new packages: rubygem-pg Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rubygem-pg-1.2.3-7.el9.x86_64.rpm c8211a675f8a6ca093481111838bff2daa32863d5f84b08840fe9bc060294f1c RLBA-2022:3748 new packages: rust-srpm-macros Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rust-srpm-macros-17-4.el9.noarch.rpm d24e845e8bd18f2420543ae792d98a823b313de698c432d7345e1889568d789f RLBA-2022:3749 new packages: rust-zram-generator Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-zram-generator. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zram-generator-0.3.2-7.el9.x86_64.rpm d6365ea8dbcc3e4f1bd0dca273dfab96459182a277956c22c929dfe15cd15505 RLBA-2022:3750 new packages: s-nail Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for s-nail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms s-nail-14.9.22-6.el9.x86_64.rpm 155ccbc5775ed68306e317da252a20291ae64532da23a7bfdd83568d28d385e7 RLBA-2022:3751 new packages: saab-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for saab-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms saab-fonts-0.91-25.el9.noarch.rpm f285e6ce1b9e7324d296d7912a5310c3ee72fa9e6a63e555d67e3f2389b8729f RLBA-2022:3752 new packages: sac Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sac. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sac-1.3-37.el9.noarch.rpm 4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e RLBA-2022:3753 new packages: sane-airscan Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sane-airscan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsane-airscan-0.99.24-3.el9.i686.rpm 5ea31873b33c855b61a9d0baea8eb7462d68bd235a4b7547aef3f4d6c5088838 libsane-airscan-0.99.24-3.el9.x86_64.rpm c8ee9819ad85821da5f714df358eaf40da70785b0f0d5c090d855fe5b29056f8 sane-airscan-0.99.24-3.el9.x86_64.rpm 6c92ddaf8c82d9156af7bb01516079476c633dd4bc6289ec94ba0c7dda5de2ca RLBA-2022:3756 new packages: sbc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsbc-1.4-9.el9.i686.rpm 4c75cd168e189acf23a34d1295fcf90f563fe50996aea3859890e8b4ac1963ac libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:3757 new packages: sblim-cmpi-base Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-cmpi-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-cmpi-base-1.6.4-20.el9.i686.rpm 0079c11d1915b1ad762ba7aee330c9aad5ea8de79234dd0a6296f4fab8fb1125 sblim-cmpi-base-1.6.4-20.el9.x86_64.rpm bfbb53d2a302a94be9e9d2a9a705db08e522cb9ea2a975ccf4963d75f6d7c741 RLBA-2022:3758 new packages: sblim-cmpi-devel Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-cmpi-devel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcmpiCppImpl0-2.0.3-24.el9.i686.rpm bdb0a14dfdf2fb44bfb1c77b0f54dffe8e0967c7089099bd5fd6f582aa763b0b libcmpiCppImpl0-2.0.3-24.el9.x86_64.rpm f56d5ef507e47fdba672e0cee7c154790ab3cdf03c8305761ced24fd1802160a RLBA-2022:3759 new packages: sblim-indication_helper Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-indication_helper. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-indication_helper-0.5.0-8.el9.i686.rpm 84a7ca586ba84247d4e40b83108afa6dfe3711ec1bcfca3fd6769525b8f4cd91 sblim-indication_helper-0.5.0-8.el9.x86_64.rpm 891eee8b544c0a6bfcdaba3e4058b3472e1e3c1a21fcbe04e3ecb7786d986a8a RLBA-2022:3760 new packages: sblim-sfcCommon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-sfcCommon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-sfcCommon-1.0.1-19.el9.i686.rpm 510c5f5c886fb642c991febc12b11e74f75a4dda027b1ab92149b35df09e8e78 sblim-sfcCommon-1.0.1-19.el9.x86_64.rpm 69d179e4308caaf0d06203065fdd13a519a00b0521cb129e165235ce142669cc RLBA-2022:3761 new packages: sblim-sfcc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-sfcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-sfcc-2.2.8-18.el9.i686.rpm ae1375c4a40e0282579ca77e8c8c4f679ed7a79064df0d7e26d77126a66a6b3d sblim-sfcc-2.2.8-18.el9.x86_64.rpm b487b3f634a8072a0153366dbabec2f729266320c28f7103e14fbc8e5c4087b0 RLBA-2022:3763 new packages: scapy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scapy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-scapy-2.4.4-5.el9.noarch.rpm ed652a097831710be2b84c850661f68e28ed8e82a27e6f24602e205ffe711252 RLBA-2022:3764 new packages: scl-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scl-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scl-utils-2.0.3-2.el9.x86_64.rpm 7d756665c09b0af15269e4688ef3cc2ab9250b4297233dd9fe37419af051a3d0 scl-utils-build-2.0.3-2.el9.x86_64.rpm 34a4c60c7c5c5b88645247d869455f2c2d53769a75a84fb66cee9f6144e55acd RLBA-2022:3765 new packages: scrub Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scrub. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scrub-2.6.1-4.el9.x86_64.rpm 4d5f0ad9dfe121dbf329f3ccae02c3fc6c33d1a7937eda744096dfaf470e5c37 RLBA-2022:3766 new packages: seahorse Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for seahorse. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms seahorse-40.0-2.el9.x86_64.rpm 1f123c901c6fe7f88fd79ff7d4ca8e34d9569edb53c0a33cdc51b4063728ce80 RLBA-2022:3767 new packages: sendmail Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sendmail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sendmail-8.16.1-10.el9.x86_64.rpm 0c6a02ca170b3c6d9e39f645df27bbe91fff20c763eb1fa810c9f06fb176d3f2 sendmail-cf-8.16.1-10.el9.noarch.rpm d9d513de6a486ebd8e39241d43908f99e359bbcdb970a04cea98cb3b06124404 sendmail-doc-8.16.1-10.el9.noarch.rpm c9eccaf1122d9d221d3d3e012abf1e7f034dfb7e6b3901b82e1cd15de2039131 RLBA-2022:3768 new packages: setxkbmap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setxkbmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setxkbmap-1.3.2-5.el9.x86_64.rpm 175a58ad49221dc62e79210d09c9984259a370e16dfaf192581464a86cff557e RLBA-2022:3769 new packages: sgabios Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sgabios. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sgabios-0.20180715git-8.el9.x86_64.rpm 83ea82b1673ca93fd0f572088b4814b9c3496be442c7ee7e52d1f50123fbff18 sgabios-bin-0.20180715git-8.el9.noarch.rpm db0f39a52c7f388a8718f5820bb04cb385135ca6fed3b715d55d0cefd423c0d5 RLBA-2022:3770 new packages: sgml-common Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sgml-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sgml-common-0.6.3-58.el9.noarch.rpm d989a4e4fa61b65f13e77fcf02eccbd0e401d695f9d0d664ef0827ebe8cf193f xml-common-0.6.3-58.el9.noarch.rpm 47ddd3f701924b321c3349e2ce4ecc65cd3d38635fbebf889565b983f4f73d7f RLBA-2022:3771 new packages: sgpio Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sgpio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sgpio-1.2.0.10-30.el9.x86_64.rpm 4aca7fe7ce15adec65d1ed4ff9f6a231fd7743c71409a5d12037af07aad1ffad RLBA-2022:3773 new packages: sid Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sid-0.0.4-6.el9.x86_64.rpm aefbe5b6aeeeb56baa5090a13469f44bcc595e350214e7f61f100e7575ae3261 sid-base-libs-0.0.4-6.el9.x86_64.rpm f5075c036088cafcfbbb96115d471ef0ecb0eed92611f0395c7378e056096e0a sid-iface-libs-0.0.4-6.el9.x86_64.rpm 75e5381ab8a82c7a16e944da6dbf2d9239ed18188723aacd3a8beb0fc26b3e75 sid-log-libs-0.0.4-6.el9.x86_64.rpm 1070b58406d82d0d8eaa62648765d1567658e2f52b71c73456875dd15c7d5bf8 sid-mod-block-blkid-0.0.4-6.el9.x86_64.rpm 8f49a8f263a08ff4e0fb6ca332547dc40e43a5e2547c124c92a93974fb5525ea sid-mod-block-dm-mpath-0.0.4-6.el9.x86_64.rpm f99c799718c5c5fae7fb0dd299d09fbff450a00fc69b40d753e67844a8029834 sid-mod-dummies-0.0.4-6.el9.x86_64.rpm 453113b343037b91083d298fab467bc74f727f08edbf7222c354246bc67a005f sid-resource-libs-0.0.4-6.el9.x86_64.rpm 71cfa37e5e2fc0faec0105f1ae4c519cfd1ae42d8ab82c3cb376470e259ec39a sid-tools-0.0.4-6.el9.x86_64.rpm da6b3c8a1d5cb13a1520b298e2a747201e7fd06fe9695bc12f38203da92bbe64 RLBA-2022:3774 new packages: sil-abyssinica-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sil-abyssinica-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sil-abyssinica-fonts-1.200-23.el9.noarch.rpm aca5948bc0a5d64c1a1f093149dc43d1555dd97038b1a2ff9a16176b21b7caac RLBA-2022:3775 new packages: sil-nuosu-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sil-nuosu-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sil-nuosu-fonts-2.200-4.el9.noarch.rpm 872f68f3fbdf30ea5c1595737deaece15432bae591ee7449f0d9f7e65c724228 RLBA-2022:3776 new packages: sil-padauk-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sil-padauk-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sil-padauk-fonts-3.003-9.el9.noarch.rpm 220bfa0f9ae56b9e194de353b1b1af193220138f6a4aa04e749a96d8ec425bc5 RLBA-2022:3777 new packages: sil-scheherazade-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sil-scheherazade-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sil-scheherazade-fonts-2.100-14.el9.noarch.rpm 1c81bf6e93feea0b11bc87251c68f660b072fe043a4f300ad4d98d477f75d4f5 RLBA-2022:3779 new packages: sisu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sisu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sisu-0.3.4-9.el9.noarch.rpm 4ea28b4be16fb4fb26529434820a0827f39e5f82e5ccae248eb60d4a9705cdc1 RLBA-2022:3780 new packages: slf4j Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slf4j. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jcl-over-slf4j-1.7.30-12.el9.noarch.rpm f582f4c2af30eb5376da09c58113b308ab52c5e5817db1d3da940c5639ed9484 slf4j-1.7.30-12.el9.noarch.rpm d58d7801d7898ba2b512a359d8a6b7be33015014e0b7be6110ad9465739e275c slf4j-jdk14-1.7.30-12.el9.noarch.rpm 5dcd5497b279f1f933497b4b7fd4f3ecae088299ee5ab9f7dcf579046869b55c RLBA-2022:3781 new packages: smc-meera-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-meera-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-meera-fonts-7.0.3-5.el9.noarch.rpm ef11aac047bee255983a3efb7e74609e831f00bdb98fee80a56802d66d674815 RLBA-2022:3782 new packages: smc-rachana-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-rachana-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-rachana-fonts-7.0.3-5.el9.noarch.rpm 8ecbd6245902a22a97870252c49bdc223a6b884db71f942c8090e22f532aafcb RLBA-2022:3783 new packages: socat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms socat-1.7.4.1-5.el9.x86_64.rpm ab551ed42075c017fb3979ef53cdd9c1c9098be96f6f298e904ffafdd3dfaaa1 RLBA-2022:3784 new packages: softhsm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for softhsm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms softhsm-2.6.1-7.el9.2.x86_64.rpm fe82b9bf43fa64862d0304be1746218403e3b8ecf7c3dd54e237e3324ab8188a RLBA-2022:3785 new packages: sombok Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sombok. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sombok-2.4.0-16.el9.i686.rpm 6a6f82bba895fd6bc87998a2531590ecf7f94038e4fe921d55e271ccc074b923 sombok-2.4.0-16.el9.x86_64.rpm bbdf901953eecac3f748618c50a3a9212777421090090ed5168b681c3307b7ca RLBA-2022:3786 new packages: sound-theme-freedesktop Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sound-theme-freedesktop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sound-theme-freedesktop-0.8-17.el9.noarch.rpm 621b97f40db0f7f8a967eb4a30496f6d7f5c7a5947d60f10d953a8de14d2ba89 RLBA-2022:3787 new packages: soundtouch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for soundtouch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms soundtouch-2.1.1-8.el9.i686.rpm ca1c6bf0f7ce6324345c1317fdbb8008817d03d27b9f2bc29f354ae7628f2b32 soundtouch-2.1.1-8.el9.x86_64.rpm 397f8334994abc648fdfe8e78edccb1a74bfeb0fd0c9ff848fd8a287de12417b RLBA-2022:3788 new packages: source-highlight Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for source-highlight. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms source-highlight-3.1.9-11.el9.i686.rpm 8afdf7d2653bd8c72883d712fbed91e06ffaded7f96116a346e4253ee483e1c2 source-highlight-3.1.9-11.el9.x86_64.rpm 8619f82da1a29154e604f210149ab8c29dc4ae530b634fa1e041bc9d029921b6 RLBA-2022:3789 new packages: speech-dispatcher Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for speech-dispatcher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-speechd-0.10.2-4.el9.x86_64.rpm afd90e71ecbdbc65150ff6b81e226a6ae6313548e8fe31466e8d018da8be5508 speech-dispatcher-0.10.2-4.el9.i686.rpm fb8ba36572f6c14895deab790dd6edb64a5644bd6fa70efaac54bf43b73d5fbd speech-dispatcher-0.10.2-4.el9.x86_64.rpm 71364933dfd516b2565ad30ae2a994a484dd8c64201037b66e215ec11c114bc3 speech-dispatcher-doc-0.10.2-4.el9.noarch.rpm 3567ac1059ac4af0e4b17d4d7eeae7c98d401f0679efe97db51ff36e0aa925d3 speech-dispatcher-espeak-ng-0.10.2-4.el9.x86_64.rpm 136b61a27f320d43954767a38402e4164a38b72edd3081b39927708043197d80 RLBA-2022:3791 new packages: speexdsp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for speexdsp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms speexdsp-1.2.0-5.el9.i686.rpm cfca123abf370d71f90668f5595e4b52d4b2c45d30365a27211f23c2f52d07a1 speexdsp-1.2.0-5.el9.x86_64.rpm 98d6b07df75b9a44d71b4cc08b7d0e0f68c42d4694900bb3ed583392fe014cea RLBA-2022:3792 new packages: splix Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for splix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms splix-2.0.1-0.46.20130902svn.el9.x86_64.rpm f7e0ac4801449ca420010193ae3369daa86693753d85979bac7524d41ba1e293 RLBA-2022:3793 new packages: sshpass Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sshpass. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sshpass-1.09-4.el9.x86_64.rpm 788d3639aeace23cfd8fd0fb93fa8ec1af851df48cfc244df6565e1cd7673a7c RLBA-2022:3794 new packages: startup-notification Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for startup-notification. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms startup-notification-0.12-23.el9.i686.rpm 0a2711aace1ad050107a200486a1a23780b3222fe84b27af24ee70083b4aad2b startup-notification-0.12-23.el9.x86_64.rpm 0cee3e1666928fbaefc35c3bb6683f712b1d79d228e9ab1b0e4e70f0d2c5eb33 startup-notification-devel-0.12-23.el9.i686.rpm e601669950b1e4f97f9885b3296ee901df697d662f1e0e8bce06a6707b1e9a6c startup-notification-devel-0.12-23.el9.x86_64.rpm 6afd04039cb17b22e2782e90ebd234ea6fc428461a084efc125829d0aada3ef3 RLBA-2022:3795 new packages: stix-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stix-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stix-fonts-2.0.2-11.el9.noarch.rpm 71602b2204573bf414ee6f2745d9046904260b4b20d87e45d2a6349e2ca8bc45 RLBA-2022:3800 new packages: switcheroo-control Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for switcheroo-control. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms switcheroo-control-2.4-4.el9.x86_64.rpm a8072633d0a5dbc8fa12a87d590d294f0a865323abd34652087947349280de77 RLBA-2022:3801 new packages: sysprof Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sysprof. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sysprof-capture-devel-3.40.1-3.el9.i686.rpm 7b5f34384d5d7359592b67ea6a7a4dcc6b42dac02174017f8c52b2195f7ecc0b sysprof-capture-devel-3.40.1-3.el9.x86_64.rpm 25c16fceed630b41cb80882a7d74c8284bea8d8316c5254412429d994168f79d RLBA-2022:3802 new packages: system-config-printer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for system-config-printer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms system-config-printer-libs-1.5.15-4.el9.noarch.rpm 17112be2cf3c9c9b3fd9cd6527a9feed03116487f528e3e28b07ab1176069758 system-config-printer-udev-1.5.15-4.el9.x86_64.rpm 16ed28948a7d87d06ceb9137dd5b1c36db0ad86d835bf2901254fb905f82d002 RLBA-2022:3803 new packages: taglib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for taglib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms taglib-1.12-6.el9.i686.rpm 770aa70de0b1480bfd11ad7b575e4afc88b05f3b0ab33869c2792c36df9c4a2e taglib-1.12-6.el9.x86_64.rpm cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10 RLBA-2022:3804 new packages: targetcli Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for targetcli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms targetcli-2.1.53-7.el9.noarch.rpm b42866fd04e52979638aa1f51a369b563446b50ab4dbf821d0ed2850b9c3648f RLBA-2022:3805 new packages: tbb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tbb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tbb-2020.3-8.el9.x86_64.rpm 612fbc16c0f54c12a3b340edd867ba58b85dc85ae23226f068805a578922b76f tbb-2020.3-8.el9.i686.rpm 4e16671eabfebb11ad01a2b7c57a91734a952cabf1b1b6383e6af18bce3a9937 tbb-2020.3-8.el9.x86_64.rpm 1b1c4ff9fce70dbfe9a88ade638ee91d2c62192c2d79dd80c35e88cff9049ed8 tbb-devel-2020.3-8.el9.i686.rpm 2d3da020036f0a5e84bf20058d3b73b999043a2873f90e2e119035445bbd4aa2 tbb-devel-2020.3-8.el9.x86_64.rpm 98c2222d584cdbdea1bb0fe2453130da93fdeb21ab7273a6859c02596a352e70 tbb-doc-2020.3-8.el9.x86_64.rpm 297c1c1175278b45b9885f185ccec242ba193d9f49cd71974f0d5a6b2cc1c082 RLBA-2022:3806 new packages: tcpdump Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tcpdump. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tcpdump-4.99.0-6.el9.x86_64.rpm b3d3db0980ae4df8252c244c939d7e38bd45c518ddeb140c8814c20ad409a99b RLBA-2022:3807 new packages: teckit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for teckit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms teckit-2.5.9-8.el9.i686.rpm 27ee3b3becc73ae0ce78ad268f158c932d2905fc5286d1db2dbcf758ab1c8898 teckit-2.5.9-8.el9.x86_64.rpm fc83324f7d2c5606ca8997d66f07c4e6c0533f7ba073ebef9b2920b5262430d7 RLBA-2022:3808 new packages: telnet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for telnet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms telnet-0.17-85.el9.x86_64.rpm 1ed2da93f521063e07d8e69835a53f80bf23ba9aede52371e972a642348d384b telnet-server-0.17-85.el9.x86_64.rpm 439ab47e535802ac623781ac5878744e877113474a9c9915102dbfbce05560bf RLBA-2022:3809 new packages: tesseract Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tesseract. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tesseract-4.1.1-7.el9.i686.rpm 9ed5cf59dc78c7d41f5b19bb58fef52cc6ee96994e498c1c557b516b26a12870 tesseract-4.1.1-7.el9.x86_64.rpm 22eb25be7aa98d836e2123e3e92165eb5d28906448eadb528a18b8aff903be39 RLBA-2022:3810 new packages: tesseract-tessdata Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tesseract-tessdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tesseract-langpack-eng-4.1.0-3.el9.noarch.rpm 0ce5864fdc5759e7fb335d15cf4262df21aa1c1c6ea7164cd16938e553daaf89 tesseract-tessdata-doc-4.1.0-3.el9.noarch.rpm 75a212885953459b2f2de99dad327b9c0bac9499200da98f874840fc899e7bfa RLBA-2022:3811 new packages: tex-fonts-hebrew Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tex-fonts-hebrew. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tex-fonts-hebrew-0.1-36.el9.noarch.rpm df87d0cbd179d281da99bf140a9212ba358a5ae47ccf5e3d366b225ac9b64c7c RLBA-2022:3812 new packages: thai-scalable-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thai-scalable-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms thai-scalable-fonts-common-0.7.2-5.el9.noarch.rpm 7ed8dec028fe34adaeeeab4e8dddfa42749d9237ad3e22528e47207aef87c979 thai-scalable-garuda-fonts-0.7.2-5.el9.noarch.rpm b08a9de6c131693e4ea43e252c6c3bb47cead642fa573a4a3019661264867408 thai-scalable-kinnari-fonts-0.7.2-5.el9.noarch.rpm e5f7942ee66305777083f8254143b091544afeece2197f87eab20039c83265de thai-scalable-loma-fonts-0.7.2-5.el9.noarch.rpm 93a4f24ad1bdf2294c35968e0aa59ca10c013d57e438b1a750872d82f2e782fd thai-scalable-norasi-fonts-0.7.2-5.el9.noarch.rpm 1a60b0969404b135aa650861bfc73523bf3d4320b8ce85f4d65df2f73fed4e03 thai-scalable-purisa-fonts-0.7.2-5.el9.noarch.rpm 2e92930ddf54221e025200e3bac21684edb219659bf0a0a3909983af9e9f5938 thai-scalable-sawasdee-fonts-0.7.2-5.el9.noarch.rpm 438eadadc97b7729cc2bf003b534d897a0e2ece93bcdd230fa15456531222b71 thai-scalable-tlwgmono-fonts-0.7.2-5.el9.noarch.rpm 4793778b9d95a34e42fa11cf379d41f8626469f3452ac5ac9dae1bb165df9608 thai-scalable-tlwgtypewriter-fonts-0.7.2-5.el9.noarch.rpm 45b71f41fd8adbf53ff4ea293346ff71bbdd21fb8c2c21b90e7090c0840e325d thai-scalable-tlwgtypist-fonts-0.7.2-5.el9.noarch.rpm d93ccbef4d07edcc7c6f0154e444018c35ae081d4a4d51e277da66406a7f842a thai-scalable-tlwgtypo-fonts-0.7.2-5.el9.noarch.rpm bef6ff79d876885c6dcf446a93123780d697dea52cf6977da38d31bdc742ba53 thai-scalable-umpush-fonts-0.7.2-5.el9.noarch.rpm 9d2a7e3213c86ffc035c04f1ff23b68ee52281c50870ffee38c9fccffe252dab thai-scalable-waree-fonts-0.7.2-5.el9.noarch.rpm dfc3820558f7f03f3af8de67f8d2bdac3f35acc491bf4e1461c68a2fe549bd0f RLBA-2022:3813 new packages: thermald Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thermald. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms thermald-2.4.6-2.el9.x86_64.rpm 13e17fd99fafc0b687b5b658443e7bf5933b59c4a7060cd0a5e621a425d25a6b RLBA-2022:3815 new packages: tmpwatch Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tmpwatch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tmpwatch-2.11-20.el9.x86_64.rpm fe568c7e2f6f974f824d5158247949e7801e410d81c29052c88309f0fd4f7dde RLBA-2022:3816 new packages: tokyocabinet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tokyocabinet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tokyocabinet-1.4.48-19.el9.i686.rpm 66ae03931ccf6fe69ab0c4a37d7345e9e6ff0ae03d6cf879633cfe2c3108086d tokyocabinet-1.4.48-19.el9.x86_64.rpm 7cd8691fee0bf215fd3f3cfb180f55dc83a911932bb2d7fa815704a1c2730039 RLBA-2022:3817 new packages: totem-pl-parser Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for totem-pl-parser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms totem-pl-parser-3.26.6-2.el9.i686.rpm 0a587ba63d677848b7d138c15996337f6249434a33f84b01187da555987db647 totem-pl-parser-3.26.6-2.el9.x86_64.rpm 394d2becb707ad123cbba4086f9f2f4b3e8f6085f701a250c0d06d98ca56fceb RLBA-2022:3818 new packages: tpm2-abrmd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tpm2-abrmd-2.4.0-3.el9.i686.rpm 104352d629646cd27a24709ccad36c71a172815c233a8d6db238ec9e60bd4cac tpm2-abrmd-2.4.0-3.el9.x86_64.rpm 6d484992c071bc0fd7b5f7a34bf0a1686292f17ed7aee332b3ac59ed066bc6bb RLBA-2022:3819 new packages: tpm2-abrmd-selinux Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tpm2-abrmd-selinux-2.3.1-6.el9.noarch.rpm e57c39c511676bae27d50e167f9cc4ce62423305cebc754cf365d234fbed009d RLBA-2022:3820 new packages: tpm2-pkcs11 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-pkcs11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tpm2-pkcs11-1.5.0-9.el9.x86_64.rpm 343e835f5fda28b52210596d9e06cfe275a49b1bfeed63e92d92dfb3dbeec5de tpm2-pkcs11-tools-1.5.0-9.el9.x86_64.rpm 439c29015424a1d36850338392fb32f546890754e9e711756c814b91974eb6ee RLBA-2022:3821 new packages: tracer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tracer-0.7.5-4.el9.noarch.rpm fdb78da65e9b324014ef29839028562946e6dc64014de42f74fbf00c54983e22 tracer-common-0.7.5-4.el9.noarch.rpm 969fec274b7ef0a2efaf1c63f3aa563a86e2052f95d8d21a97b632260270c925 RLBA-2022:3822 new packages: tracker-miners Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracker-miners. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tracker-miners-3.1.2-1.el9.x86_64.rpm 15096e6f9ce8824811f2be8fe15e9fb583b2cbac478920361033682fa95bf2b1 RLBA-2022:3823 new packages: ttmkfdir Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ttmkfdir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ttmkfdir-3.0.9-65.el9.x86_64.rpm 6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6 RLBA-2022:3824 new packages: twolame Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for twolame. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms twolame-0.3.13-19.el9.x86_64.rpm cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f twolame-libs-0.3.13-19.el9.i686.rpm 2491f6bd787256fcddd9744e4fe24a2f24f78d30b84574d7f33458bd5ce13e91 twolame-libs-0.3.13-19.el9.x86_64.rpm d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0 RLBA-2022:3825 new packages: ucs-miscfixed-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucs-miscfixed-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ucs-miscfixed-fonts-0.3-29.el9.noarch.rpm 8f79e7be9441d49fcce7264faa2fdf37cc2545f0577f86e90f7688cd4f3daaee RLBA-2022:3826 new packages: udftools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udftools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms udftools-2.2-5.el9.x86_64.rpm ec0d2a4ed3f9cb5b4fb1e7ce2f675ffb8239299467a5658bcfd6661328d2b207 RLBA-2022:3827 new packages: unicode-ucd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for unicode-ucd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms unicode-ucd-13.0.0-5.el9.noarch.rpm 2989fcda957146e6e99a2557911a16bf516c6dbd44b160a3fe2dd60ecd35aac6 RLBA-2022:3828 new packages: univocity-parsers Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for univocity-parsers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms univocity-parsers-2.9.1-5.el9.noarch.rpm 63486718d9ccf8c0abec530eabad75f003c619bb1337c4cc025f42cbf9757dd4 RLBA-2022:3829 new packages: unixODBC Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for unixODBC. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms unixODBC-2.3.9-4.el9.i686.rpm b0095841ba397a08ff989f84bb460c55d6b24334225c0e10369936cede74880d unixODBC-2.3.9-4.el9.x86_64.rpm d3776e7cfe06372d483b9a9996885e522c4584645fce0cf72b7a974e7ed294ad RLBA-2022:3830 new packages: upower Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for upower. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms upower-0.99.13-2.el9.i686.rpm 76d06d001fa4859f5611690fab33851afb3d7544c248dfb8cf226c129b118680 upower-0.99.13-2.el9.x86_64.rpm a3a5f9aa134f5b8064275d47b3bd5595a5eaf7ae6503b79a2ae360a16d2c522e RLBA-2022:3831 new packages: uresourced Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for uresourced. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms uresourced-0.4.0-3.el9.x86_64.rpm 6a456903cc49d96c0bf3f4cb22a208996b0852d9c82ecdd94860d53298f9c427 RLBA-2022:3832 new packages: urlview Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for urlview. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms urlview-0.9-31.20131022git08767a.el9.x86_64.rpm 77cc8514cc7d38bad60a04dc6faa289dac5f53646bf828ef5e9cca6c3351e839 RLBA-2022:3833 new packages: urw-base35-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for urw-base35-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms urw-base35-bookman-fonts-20200910-6.el9.noarch.rpm 27daff9c1c54ed196339f8de7c2f651579c2627a405511fdb5fb107549ed40db urw-base35-c059-fonts-20200910-6.el9.noarch.rpm 68870a40414ee33bceb8775e7c02c1f3b490e87e9c412e8139811f0e9c784df7 urw-base35-d050000l-fonts-20200910-6.el9.noarch.rpm fe7c0d5b7f92593bc46de6a47a236184a786edd0536639eed140d56370164d42 urw-base35-fonts-20200910-6.el9.noarch.rpm 5de538f5dd77bc99018fb6bbcc3729045034fb784914d599c2cac56aa15fa461 urw-base35-fonts-common-20200910-6.el9.noarch.rpm dbc689f47f1cc1513038fbebef960699572654ac2245b5db5ead26a07face05b urw-base35-gothic-fonts-20200910-6.el9.noarch.rpm 6c27be8e0be44052fb554614024a0600cd8cb310778b61c9c7479837b5bc8bac urw-base35-nimbus-mono-ps-fonts-20200910-6.el9.noarch.rpm fb6a1f46b19380b9c077ac1813a02cdceb2cb6e50845f1ac448c9df38fb76be6 urw-base35-nimbus-roman-fonts-20200910-6.el9.noarch.rpm b4f7f1dcd3ab5786d7c7b7e5b797fd9ca1eb0e65ba9a0dafc29aaedb5caa32b4 urw-base35-nimbus-sans-fonts-20200910-6.el9.noarch.rpm 3cb9a04fc4144d15aa7410cd9417e288f6a75c0a270d67acaaf7f4c523ab1b00 urw-base35-p052-fonts-20200910-6.el9.noarch.rpm 9cba57467c10f97d5d2d57086b5c05b5f5e0367ab5dab3922386bd320d54f19d urw-base35-standard-symbols-ps-fonts-20200910-6.el9.noarch.rpm 2296069a2889ba1bd00896024ca18623133f029bc812906d6dd4d5b2aa76e15f urw-base35-z003-fonts-20200910-6.el9.noarch.rpm dce1f19c50d2f98c17c466c9b30e3f933e29b5169e10b28d6852d1ca8e66ddaf RLBA-2022:3834 new packages: utf8proc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for utf8proc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms utf8proc-2.6.1-4.el9.i686.rpm 36bb973bd88f62bd8fde384f2124c8d24b4ec48334ee695f65933e570f0998e9 utf8proc-2.6.1-4.el9.x86_64.rpm db0abef61f3d5f662bc3293e2e8f7a50c9afd5c59eb13119c01e3ba02d732dc8 RLBA-2022:3835 new packages: v4l-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for v4l-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libv4l-1.20.0-5.el9.i686.rpm 3f33c4c41b2931ace0374c6e9a6ae6abdce1d4eef5bb6dbe175bcf72855600d6 libv4l-1.20.0-5.el9.x86_64.rpm 959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3 RLBA-2022:3837 new packages: virt-top Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-top. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-top-1.0.9-21.el9.x86_64.rpm 2207ecd308260f7c90476e89b237fdeba5ed74b03498e80d59f11da413ebc717 RLBA-2022:3838 new packages: voikko-fi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for voikko-fi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 RLBA-2022:3839 new packages: volume_key Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for volume_key. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-volume_key-0.3.12-15.el9.x86_64.rpm 6d7d8df897eab3b6b585533b22411d486e8e222a9f2fdb5b6013f56e1601558e volume_key-0.3.12-15.el9.x86_64.rpm 3ea811e885fd3605d2a7375e13cda87371a6fad479acf447303142b63fad4383 volume_key-libs-0.3.12-15.el9.i686.rpm f2df8943c829869284187429ff877ef46c1e96875a322b2426f55da17ae3799f volume_key-libs-0.3.12-15.el9.x86_64.rpm af73662f47ac8ac947921451a9852f47083ca565ac724e5eaef01703479e7dde RLBA-2022:3840 new packages: vte291 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vte291. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms vte291-0.64.2-2.el9.i686.rpm c0158d2b79be8f0cd01fffde4e9a0426b3cad635f9536cb482ace5ef45b85ec8 vte291-0.64.2-2.el9.x86_64.rpm 8766225fa4af594b3e4d89c27f6e17c07e65db0deb3f5f47012f593db8efdd47 vte-profile-0.64.2-2.el9.x86_64.rpm 3f5e54b75573a6291a6aeec9d33cbc8396ff0cd2094c811ad2e7c607bbe88017 RLBA-2022:3842 new packages: wayland Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwayland-client-1.19.0-4.el9.i686.rpm 10da5e36c6a85e0bea11d6ac9b765e52a2126c717546ad3ccface9aeb584b8f3 libwayland-client-1.19.0-4.el9.x86_64.rpm 4c1718061503d972dd4ed0938ff4ed2d098779a323b6b122b026539411f988fc libwayland-cursor-1.19.0-4.el9.i686.rpm f7e9de7c807f69385cf6ddafe81640c400c9696a4e148fe826278a049375b9c6 libwayland-cursor-1.19.0-4.el9.x86_64.rpm b6db085e0d17a50846d4b754ac2f0d4d45253458e48c76d7150dd64eb0ec3c84 libwayland-egl-1.19.0-4.el9.i686.rpm 765027814218d8f3a5dc27f432e465322376f53c182495383980537613cdc342 libwayland-egl-1.19.0-4.el9.x86_64.rpm ddc80ce52d2a663a8ae7746caa0bf0d945d8fface6c768b151d715b495f8067c libwayland-server-1.19.0-4.el9.i686.rpm 6e660150d7bf0d41f72190b16a105c882a088888beb278f341c04c50087c0792 libwayland-server-1.19.0-4.el9.x86_64.rpm c0ee5e7824dff3ce76be1814f896a29fdc2736105e771d36571acc00c8755a2f wayland-devel-1.19.0-4.el9.i686.rpm c9dce228490cd1b126fff95982373a92badeded83119395c223d9e154bcc21f9 wayland-devel-1.19.0-4.el9.x86_64.rpm dd2df486776c681755529d13af199429304257886a3dd0abf477edd26d4b52d7 RLBA-2022:3843 new packages: wayland-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wayland-utils-1.0.0-4.el9.x86_64.rpm 6336a085f7de16dfc73a7508fb87cb2990ee8d5c17cf000c8a8e1c4404a770f6 RLBA-2022:3845 new packages: web-assets Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for web-assets. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms web-assets-filesystem-5-15.el9.noarch.rpm 01139b240fb56cd16afd43eab59464a09b707b3759a9956e840d3528fb0e30c2 RLBA-2022:3846 new packages: webrtc-audio-processing Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms webrtc-audio-processing-0.3.1-8.el9.i686.rpm f0a2f60c037f99b9f4a327ce927263ffb95e4babf5ae5ee63d7d9aed2472d953 webrtc-audio-processing-0.3.1-8.el9.x86_64.rpm 252da90e9f9cfa879cd6b43b6d94006e484989e1d1bb29f25782e53c7d1b6458 RLBA-2022:3851 new packages: wsmancli Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wsmancli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wsmancli-2.6.0-15.el9.x86_64.rpm 716a53907bbdc80e5ea2af2dfd1487a5514b71aaf0239884f7e0b5b42bd58ab0 RLBA-2022:3852 new packages: xalan-j2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xalan-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xalan-j2-2.7.2-10.el9.noarch.rpm 96237e4d04c6e60d326da30769034bf757e509354a571c05d45f66ba3b36fe99 RLBA-2022:3853 new packages: xapian-core Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xapian-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xapian-core-1.4.18-5.el9.x86_64.rpm 6f9fbad5d01b5cd867e8003f0a50ec06e6fadae27c4b4d7e38d01a5e9f864849 xapian-core-libs-1.4.18-5.el9.i686.rpm 6f22af2f9f1b9036cb3f51d9ebc474ffdd06c7b9bbad46eecadc3ed8d37b2ffa xapian-core-libs-1.4.18-5.el9.x86_64.rpm f5c59961ae8b373699a8508fee22d3e400c27d63d7b846dc2b0b72bddba51f9e RLBA-2022:3854 new packages: xcb-util Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-0.4.0-19.el9.i686.rpm 0ac9cf44589711419ae7bd79c8ec49eb7d08e1964ef6bb0d9eb2cb55d4e3c7fb xcb-util-0.4.0-19.el9.x86_64.rpm 7cb6a5c9d331f25440d75472451659ce8c7193c0a46d083679076a939c80efaa RLBA-2022:3855 new packages: xcb-util-image Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-image. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-image-0.4.0-19.el9.i686.rpm 212668c0e7b6fcade0eb2adc928e6bb4c14a0713142d9439d983451b48d5677b xcb-util-image-0.4.0-19.el9.x86_64.rpm 25604daacebd1f6e0502d5c9807d0e96d2bfe18f34245654d559e0c9209b9f43 RLBA-2022:3856 new packages: xcb-util-keysyms Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-keysyms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-keysyms-0.4.0-17.el9.i686.rpm 852b680f305f1e75f78992462b56d5a9f6adcbcf09a166caee357a646119a494 xcb-util-keysyms-0.4.0-17.el9.x86_64.rpm 9a4e1d6c677d70eb0200d444c410ee0599208cfa506a32f7ddb8c7d22190c7e3 RLBA-2022:3857 new packages: xcb-util-renderutil Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-renderutil. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-renderutil-0.3.9-20.el9.i686.rpm c5b78153bc5a0e11cefdf1c789a0fc96839d3b385245b1ae44da3cb786022a0e xcb-util-renderutil-0.3.9-20.el9.x86_64.rpm 56dfdc833cd2e53cb1f31972ccaea38810c124c6a5ea99fc00a7f24b54d1e187 RLBA-2022:3858 new packages: xcb-util-wm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-wm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-wm-0.4.1-22.el9.i686.rpm 03c94065c218596aeaf3eb6a84eaecbe6d16598aaa823fe7a98e4fc066f8d9f2 xcb-util-wm-0.4.1-22.el9.x86_64.rpm 2614e58579e0cb4d14d41cefeba7f30a67174040780e72dea051b4ee42109e17 RLBA-2022:3860 new packages: xdg-user-dirs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-user-dirs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-user-dirs-0.17-10.el9.x86_64.rpm af7fa1b02fd48e314a1b914f7d7fba26f66724cc04edfa702c9ef98296a344b5 RLBA-2022:3861 new packages: xdg-user-dirs-gtk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-user-dirs-gtk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-user-dirs-gtk-0.10-22.el9.x86_64.rpm 6d9b2ed8bc6b477553b17352cc0320d0f4c8742ca326e69cc259849546a3af79 RLBA-2022:3862 new packages: xerces-j2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xerces-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xerces-j2-2.12.1-6.el9.noarch.rpm 9912d7a3d0d9ed74f3ab29f236ba4be91b398cdbf5404335c6d3f6f3c8035b42 RLBA-2022:3863 new packages: xhtml1-dtds Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xhtml1-dtds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xhtml1-dtds-1.0-20020801.14.el9.noarch.rpm 317d3e7d720f4a895105c28b62821ec7fca90322ac7f1c2e25ec3d722223b54a RLBA-2022:3864 new packages: xhtml2fo-style-xsl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xhtml2fo-style-xsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xhtml2fo-style-xsl-20051222-24.el9.noarch.rpm ba22387cc7497dfce4c6b84c292f0fa7f9da7ebcd690cf0f167c2570e1a96aa4 RLBA-2022:3865 new packages: xkbcomp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xkbcomp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xkbcomp-1.4.4-4.el9.x86_64.rpm 057eb52b686afd12713d130d797b582568939380a97c75fd08a51b881dcf7337 RLBA-2022:3866 new packages: xkeyboard-config Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xkeyboard-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xkeyboard-config-2.33-2.el9.noarch.rpm 673889fd77ce740d79e7da7cb58dfdb8937a9d5c02ba7533288231d1797e1b15 xkeyboard-config-devel-2.33-2.el9.noarch.rpm 0e8127aadca58056758f7e804ef45904b5a713e82a29f732b910e5788e255d19 RLBA-2022:3867 new packages: xml-commons-apis Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xml-commons-apis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xml-commons-apis-1.4.01-36.el9.noarch.rpm 69fd151623173d92fe13f9c81341c17c63c9c9bb790b39875194018ff2d34bd6 RLBA-2022:3868 new packages: xml-commons-resolver Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xml-commons-resolver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xml-commons-resolver-1.2-36.el9.noarch.rpm 3376229b156ac137e3fdcc11786e961b602ecd64c02711ab7200bdfa5b420231 RLBA-2022:3869 new packages: xmlsec1 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlsec1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xmlsec1-1.2.29-9.el9.i686.rpm 4e9685a302690dbdc6b57b46d51606ffae53ca62913a46567be2c1377ff03e13 xmlsec1-1.2.29-9.el9.x86_64.rpm ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a xmlsec1-nss-1.2.29-9.el9.i686.rpm 1ef78b843b2a6c7c68e58b779084f96ac0d37e41211aacf9fe6c604f5c108f00 xmlsec1-nss-1.2.29-9.el9.x86_64.rpm 04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2 xmlsec1-openssl-1.2.29-9.el9.i686.rpm acf490edbf994c753f9c42ce32c02342c9db9d844d7ade70815c1b78cf89b7a3 xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm 435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679 RLBA-2022:3870 new packages: xmlto Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xmlto-0.0.28-17.el9.x86_64.rpm cf1e2083aa1af1b6c0dcbd46bebc622bbf785fc5f3ee2c193771d926e8d93f6b xmlto-tex-0.0.28-17.el9.noarch.rpm 850876b10c3ce58d402d7022d9316c073e2705a4810a5742345a9d79e579cddb xmlto-xhtml-0.0.28-17.el9.noarch.rpm f0bfa44747904ef4de45036466bfa45c1b45005ab24cf8b922d773bb3e60b1ec RLBA-2022:3871 new packages: xorg-x11-drivers Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drivers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drivers-2021-4.el9.x86_64.rpm e0a3ff613e8309715716f2261744aa40c5973f4a4a84a418b480ed582007ec20 RLBA-2022:3872 new packages: xorg-x11-drv-libinput Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-libinput. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-libinput-1.0.1-3.el9.x86_64.rpm 252b9e40118afa28a3aa656ba49b4d4b12b779d8157bf197f972961049a6bb2a RLBA-2022:3873 new packages: xorg-x11-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec RLBA-2022:3874 new packages: xorg-x11-proto-devel Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-proto-devel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-proto-devel-2021.4-2.el9.noarch.rpm e56a232af57e20bdbd4162651917e116c8da4597fc25035aedaaa7cf6e721c59 RLBA-2022:3875 new packages: xorg-x11-server-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-server-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-utils-7.7-44.el9.x86_64.rpm db9a2ea42ce248925cf537a9b827e5f41a1e59d28d6774af93d424fe25db6db5 RLBA-2022:3876 new packages: xorg-x11-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-utils-7.5-40.el9.x86_64.rpm 9e17b1311d933e8707be20c92eaa9a7b40e9985ddc65b8f6d5e485dd3df85076 RLBA-2022:3879 new packages: xorg-x11-xinit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-xinit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-xinit-1.4.0-11.el9.x86_64.rpm e025062361419edb3fdc3ededcfce87d01c4c740aa9a138ca3164717c43c56b1 xorg-x11-xinit-session-1.4.0-11.el9.x86_64.rpm eb377dbec0a1e63e4a6cbe417785d4f7aff36186d18ec4ff72c546d7c120465a RLBA-2022:3877 new packages: xorg-x11-xauth Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-xauth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-xauth-1.1-10.el9.x86_64.rpm 55a6b4a89e861e6f9adeecb6a2734bf346068c8c081d7b815f801559ab22b44e RLBA-2022:3878 new packages: xorg-x11-xbitmaps Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-xbitmaps. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-xbitmaps-1.1.1-23.el9.noarch.rpm 333aaeff4f242c1f5cd6756eda241eccb999eefe2dc4ca97bc31bd52832b7648 RLBA-2022:3880 new packages: xrestop Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xrestop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xrestop-0.4-29.el9.x86_64.rpm 9d65be001dbababe8c1771d2bd42e69e4692689fa3b55a0d419495e401ab12ba RLBA-2022:3881 new packages: xsane Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xsane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xsane-0.999-42.el9.x86_64.rpm bdf6d4a867f9479c26e9ca8a2e73b50cc9a35f197dbef2f7bed3f57095796462 xsane-common-0.999-42.el9.x86_64.rpm 33d0392d8b5f4ac9b982f2f634e2a70d68443a76698e2845edce6f5b28c80796 RLBA-2022:3882 new packages: xz-java Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xz-java. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xz-java-1.8-14.el9.noarch.rpm dbcf68720ed7133daf5db12c3c8f1efc1601bfd337ead77297c70aaf25a999d0 RLBA-2022:3883 new packages: yelp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yelp-40.3-2.el9.x86_64.rpm e5ba9b0bb5f9d48b88be39e35811908daf2dd823e652d926ee8ab9235c3a7db2 yelp-libs-40.3-2.el9.i686.rpm 59189b36defd21cb4552570c7febdbe994282635eaed98fdad4e15c99131aaa3 yelp-libs-40.3-2.el9.x86_64.rpm 53b2396f3745a5f3e9321574d4753db9b9f6d78f42ecb648309741408acc4b27 RLBA-2022:3884 new packages: yelp-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yelp-tools-40.0-3.el9.noarch.rpm b4904b00d20709705969d6aff3fdfb43537b24354c5511cb19ee177fc5b5bc18 RLBA-2022:3885 new packages: yelp-xsl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp-xsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yelp-xsl-40.2-1.el9.noarch.rpm 377dd62e39485f2ef7064baf2074f9a5bec76a84df8969ad22bf77632b964665 RLBA-2022:3892 new packages: ipvsadm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipvsadm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipvsadm-1.31-6.el9.x86_64.rpm 82ffa43a89992c6db273657d1ab294b5b4236b23e46637f52d77e4dd0377bb75 RLBA-2022:3886 new packages: zaf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 RLBA-2022:3924 new packages: libsepol Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.3-2.el9.i686.rpm 577b40db2c564022daa7923a023c66536f538a0a2e4197da6a7100affeebed85 libsepol-devel-3.3-2.el9.x86_64.rpm 15e7cbdb5e18f9ecb6f4ea67e6c1f50d7f60d792ac2aa853b215966eb36919fc RLBA-2022:4006 new packages: lksctp-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lksctp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lksctp-tools-devel-1.0.19-1.el9.i686.rpm bbad1f38ae16ba9f300d75717f1849c0d2228ebd3c32f3a584e626612c7171eb lksctp-tools-devel-1.0.19-1.el9.x86_64.rpm bc7349d2cc90e0d56629d3a37583b7417df5b36244d241fbec309c973eb2b1ae lksctp-tools-doc-1.0.19-1.el9.x86_64.rpm 9bc4f3a52fab5c8d8237034191960ff645f08d1b07422f67a6ea63ffea36666c RLBA-2022:4043 new packages: e2fsprogs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms e2fsprogs-devel-1.46.5-2.el9.i686.rpm 5924b4aa0a7d3314b0434c10a732af5db5e26d064969bc6e6b63cc7bf1207656 e2fsprogs-devel-1.46.5-2.el9.x86_64.rpm 1a26ce2407c4a01723257909ba91a852fe0ab99c365e0a8f646387a2e03d2600 libcom_err-devel-1.46.5-2.el9.i686.rpm dbf151414532438ea0a23466a54e1268dedabae1425d328426e2d2a52e31275c libcom_err-devel-1.46.5-2.el9.x86_64.rpm 74336c77500b3d509bc4261ccfd0587f5effe82ea84f8d203733e6402665107f RLBA-2022:4070 new packages: dracut Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dracut-caps-055-45.git20220404.el9.x86_64.rpm e550c033d067ef181d538c0ea5e811f2bba566adfa012b352fca14463ab8836b dracut-live-055-45.git20220404.el9.x86_64.rpm 1964f85b810607f0e2b9a377e6d4046bbe668889ad2a52f41ae760743c3ddb33 RLBA-2022:4119 new packages: file Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-file-magic-5.39-8.el9.noarch.rpm 438f21f96e7e14f365119f6f3c39ecf146d2c6ce5b1a6174d68f3dbbac63e495 RLBA-2022:4172 new packages: libnl3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnl3-devel-3.5.0-10.el9.i686.rpm 90d977e14dee91b42a37eab8ead88ef0f353e028461fafcc707b71017cb6a892 libnl3-devel-3.5.0-10.el9.x86_64.rpm 48e23d8018d31086a6af90557e4635a7f0906b0c2597b2a32cf5744ac11e6e71 RLBA-2022:4571 new packages: inkscape-flatpak module Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsigc++20, gc, poppler, inkscape, poppler-data, python-scour, libwpd, librevenge, libwpg, pangomm, python-lxml, potrace, gtkmm30, double-conversion, gtkspell3, python-appdirs, numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms double-conversion-3.1.5-6.el9.x86_64.rpm 1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977 gc-8.0.4-7.el9.x86_64.rpm d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d gtkmm30-3.24.5-1.el9.x86_64.rpm 2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a inkscape-1.1.1-6.el9.x86_64.rpm f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171 inkscape-docs-1.1.1-6.el9.x86_64.rpm 084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4 inkscape-view-1.1.1-6.el9.x86_64.rpm 75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libsigc++20-2.10.7-2.el9.x86_64.rpm 7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 pangomm-2.46.1-1.el9.x86_64.rpm 4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376 poppler-21.01.0-12.el9.x86_64.rpm 18fd7f5209755b145d523d305f900ca11a393c35b711da5902fc85db39bdfe5a poppler-cpp-21.01.0-12.el9.x86_64.rpm 52c26fb209ef63a62e8399641fce4f8f87f4662d1290a173120417c1f191726d poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-12.el9.x86_64.rpm 06cf367d138624fc9f15d7803f9cda28e823aa7575f56971f01dc4b9b5677c39 poppler-utils-21.01.0-12.el9.x86_64.rpm 2be4571777d7925f19631c21d087639486260267a0d7bcaa500d49a44a5579ea potrace-1.16-7.el9.x86_64.rpm 85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802 python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 python3-lxml-4.6.5-2.el9.x86_64.rpm 4653357b461c3b84a3a99489f8a12c3ab9fefba525cc5c5124b5dabb555b0f6e python3-numpy-1.20.1-5.el9.x86_64.rpm 634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm 939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6 python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLBA-2022:4572 new packages: firefox:flatpak Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:4573 new packages: thunderbird:flatpak Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:4579 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * snmp within the container doesn't work well (BZ#2075537) rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 45c7fdf8bf7ac6873f0836dd4b5b9359ad1426f8e0b7c2dc50db7b4b24c5e77c net-snmp-agent-libs-5.9.1-7.el9_0.1.i686.rpm 34386bc8151023ac08fed088cae847fbcdf6c225b30a0be60ecc837cd66ff27d net-snmp-agent-libs-5.9.1-7.el9_0.1.x86_64.rpm 5c34051105cfeadcc20cd1b0ee7a657ad7964a91a7d4d6e4bb023aacce2a7173 net-snmp-devel-5.9.1-7.el9_0.1.i686.rpm e9b29003e4aa7b52ebf51da7323935394bd2d3c96ac4d1bc8109e59ae0eefe4a net-snmp-devel-5.9.1-7.el9_0.1.x86_64.rpm 68cbf14158d98027adc73958b26b40b5e19d4e11d077c8822baf6a0f5c984462 net-snmp-libs-5.9.1-7.el9_0.1.i686.rpm 112c41409b7cfd1bd61ed78e827fe263dd12b507c97126b6be17478ddd96a32b net-snmp-libs-5.9.1-7.el9_0.1.x86_64.rpm 30715b3db6c7797ede2f3014db8a4b367d64ff5176173d6fd752b2dae9351d0c net-snmp-perl-5.9.1-7.el9_0.1.x86_64.rpm da1af97bfa7c44f028e4b574657a69d62143d9fecc996c76911ff79bf7d98b99 net-snmp-utils-5.9.1-7.el9_0.1.x86_64.rpm 63c6fec11b84ca7b9bc0dc713db458663a9f44fd91f6b12dfe4581fc4fc66d1a python3-net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 0f91007d6139d5d60efabc69cfa31f1b78b9f5188ec70235502c5609524ac0b5 RLBA-2022:4580 sscg bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sscg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sscg utility helps to create more secure "self-signed" certificates. These certificates are generated to create a CA certificate that can be safely imported into a client machine to trust the service certificate without the need to set up a full PKI environment and expose the machine to a risk of false signatures from the service certificate. Bug Fix(es) and Enhancement(s): * --subject-alt-name IP:127.0.0.1/255.255.255.255 causes "ERROR: Cannot allocate memory" (BZ#2075546) rocky-linux-9-x86-64-appstream-rpms sscg-3.0.0-5.el9.x86_64.rpm ce4a3a03d7c5c9445cc07c4df208eccbbfdafe08cccd2fd0c01a3b6b84150e7c sscg-3.0.0-5.el9_0.x86_64.rpm 7b4c82d678abdc622d3eb4a68afdbb86f6318ebea6b006ec372d36ac21fc7e3b RLSA-2022:4591 Important: subversion security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for subversion. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_dav_svn-1.14.1-5.el9_0.x86_64.rpm 284783052a3cc8b203e48ef7b30d097a089aa4e9e3517867d980cc4af9185d95 python3-subversion-1.14.1-5.el9_0.x86_64.rpm bdd3d7d716e8912a6bda4ff45a20595dfead59bb9a503323970432ee10025def subversion-1.14.1-5.el9_0.x86_64.rpm 920e01a52d9d3241348dddd189b8c064fbb1904372a7de24297941f5e0faba90 subversion-devel-1.14.1-5.el9_0.x86_64.rpm be9df5a5d97a38e28f04aa7f7cb2e8bd0a3b3c5c6b7093ecfe38161a58b05713 subversion-gnome-1.14.1-5.el9_0.x86_64.rpm 4ac73805e5878513498c749f56520f45cb221591a8025ed399b3f9af3ac3c82f subversion-libs-1.14.1-5.el9_0.x86_64.rpm 08bad3deed67586ceb777fd9db6373e6980f86e5caebfc38a5caddc2ab072f87 subversion-perl-1.14.1-5.el9_0.x86_64.rpm 0d47c4aa3fb6d27e11dc98dcda2e992f68c0f3ad3137a62ca4ae96ac449023b1 subversion-tools-1.14.1-5.el9_0.x86_64.rpm 9544a761081529ab2f38bba30f7b5add42d12d5a558d5277242d23ca259a5762 RLSA-2022:4771 Important: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.7-1.el9_0.x86_64.rpm cc8c60ee1801752b701ac7b8ccfcefbfc7d556cf531c70d1b5cbef8fb6a9cf7e postgresql-contrib-13.7-1.el9_0.x86_64.rpm 5da2535f20a24e3aa76cd23d139722af277440d92ab16266fc0a1e1cfa3c0086 postgresql-plperl-13.7-1.el9_0.x86_64.rpm 66f4a43340e555b56624a754a47f83b968d6025e56c513abe18acae3997a1fbf postgresql-plpython3-13.7-1.el9_0.x86_64.rpm d13138960d9a5b1063f1d74655037d1a0fc3cf15b2dad83cb8b857205bcf8465 postgresql-pltcl-13.7-1.el9_0.x86_64.rpm a6a5d9d7647f5a0f2ddb2d476adbc0f15dab9be5fb207b7363d8237b47710d50 postgresql-private-libs-13.7-1.el9_0.x86_64.rpm 31ef0736ba0c5d7049117680753c6d4c5a49890680a61a7c6650cb16421bfaf7 postgresql-server-13.7-1.el9_0.x86_64.rpm 282c46ff5e02769a6cfecd69db0f25bc8c999b9559f4780091f1c52c7f619491 postgresql-upgrade-13.7-1.el9_0.x86_64.rpm ea4e6ef1216bc8c55ad4d8ff40e544458f559496f6c8eab28006619e8ef8b3c8 RLSA-2022:4899 Important: compat-openssl11 security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for compat-openssl11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl11 provides the legacy 1.1 version of OpenSSL for use with older binaries. Security Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * compat-openssl11 breaks in FIPS (BZ#2091968) rocky-linux-9-x86-64-appstream-rpms compat-openssl11-1.1.1k-4.el9_0.i686.rpm c0b8d921fc2ca35ae55d999ff21db099bc2810230f856ab8cc7d6ed2c98fdb6c compat-openssl11-1.1.1k-4.el9_0.x86_64.rpm 3929a00e792a462066fa54dfa79e84500fa5e2f1569605c89e73471e88514850 RLSA-2022:5257 Moderate: libinput security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libinput. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libinput-1.19.3-2.el9_0.i686.rpm e9d68adfae00cf791a9ed850ff4ad2e501ae96ed69ac9cc25df32c435d050c33 libinput-1.19.3-2.el9_0.x86_64.rpm 7a98c935e19a670d1c6d2463b419d3bf4e57fcf7bd13e74eaaac91feff0877ef libinput-utils-1.19.3-2.el9_0.x86_64.rpm 57d33785e1d06dd26e6b42a6efa99b0fb5d7977a14bcf8ece045c4c938aca0ad RLBA-2022:5260 fence-agents bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * fence_apc, fence_ilo_moonshot, fence_lpar: missing "import logging" (Rocky Linux9) (BZ#2086839) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-20.el9_0.2.noarch.rpm 9f2dae8de9cb289e1aac1ed2713b143a6993bf0dceb196ee7c298985427d63af fence-agents-compute-4.10.0-20.el9_0.2.x86_64.rpm d610d569299678b14b854e2f9b5b9b75f9ff47d0cbe698ef0d0f0355e6b5a851 fence-agents-ibm-powervs-4.10.0-20.el9_0.2.noarch.rpm 23231bfdc495e434490994b30a93bef88d018a7fca39fc0a5ce5b2de7ad30123 fence-agents-ibm-vpc-4.10.0-20.el9_0.2.noarch.rpm b27314a3760b4d6d7403f4b2b1933ef63b9bc5e6be444c126cb302327767a460 fence-agents-kubevirt-4.10.0-20.el9_0.2.x86_64.rpm 44dd7bba7c13491d3afcefd5ba62692c563088f60b4b2813d0e9ce151a0122dd fence-agents-virsh-4.10.0-20.el9_0.2.noarch.rpm fdbf5d9846829d59f5f91f4e0171526c4a86794749a36e442f02e905eb2f4b70 fence-virt-4.10.0-20.el9_0.2.x86_64.rpm 6fbadb5ed15fdd63904dbcaa1ad9dbb6ea7b7bd20ce14dcc0fedde6312ed4f91 fence-virtd-4.10.0-20.el9_0.2.x86_64.rpm d234a8aa56497fde8967f1f487e00e38ace2a6c4d1d0bf0640599454400ad0c9 fence-virtd-cpg-4.10.0-20.el9_0.2.x86_64.rpm f68eb3b27a7402a474e57c6f1de41dff4da1cd7e4bef3e7562111d59e6d0dd74 fence-virtd-libvirt-4.10.0-20.el9_0.2.x86_64.rpm 06aaf7c3a8a8f3372784a332876288d76cbe24b6a25e9914bc7fdfeaefacba98 fence-virtd-multicast-4.10.0-20.el9_0.2.x86_64.rpm 4837560ebd1b7a73f1c86c7aa0664f8880eaaca12b0259eab9d36ef2aa5625c6 fence-virtd-serial-4.10.0-20.el9_0.2.x86_64.rpm 7e8736db577efbbfa25a451802705fecca2c889fca53cae9255206dd2f735a43 fence-virtd-tcp-4.10.0-20.el9_0.2.x86_64.rpm 4b27839d245ba1a6d526a365c917e016db404b9fc6dabdf5fd797ebab84ecbcb ha-openstack-support-4.10.0-20.el9_0.2.x86_64.rpm af708364b7df2d800fab4b61528473a2858ca6846275f463d82c76b3077f6e22 RLSA-2022:5948 Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql-selinux, mariadb, galera. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms galera-26.4.11-1.el9_0.x86_64.rpm be8e0004017ead821c09dd4d96caa34af82dadecb520f290aaad6030ea35ed66 mariadb-10.5.16-2.el9_0.x86_64.rpm 8834aa6d622ab64a22234e2f045f22f6e0330ea957550901150a3a4d60d3ac0d mariadb-backup-10.5.16-2.el9_0.x86_64.rpm 8e553970a520e0e779c66b51f56e088434b1796059e3dc57a148de1fb4593e22 mariadb-common-10.5.16-2.el9_0.x86_64.rpm f774514657c4fbd6987f0d341529950e4a23fa7371a63e30c94a3c9dbfb96948 mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm d03f1b8eaae455a6da4af82164282edbe47fc5eb5cb59df882dd434703bacc87 mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm 017756d95c87df2b4e987df03be570c1f2e73aa5c7720e50e245975d2a08fc4a mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm 5fa9f2e2b8b96dc639b869f8f1381ce0e6b1af0aa4d716e4c716c827ec0e141a mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm 6c4342de09226eb2d9376f7fb3100b461bac03369ad84af3f3a625e5d495fd0d mariadb-pam-10.5.16-2.el9_0.x86_64.rpm 8a60b6f0162c1783e20718ad949a7e4ada40220ba5e02080420cc25ebeb7ea73 mariadb-server-10.5.16-2.el9_0.x86_64.rpm 89f0325781e8f4a360f37828d38d41d35afa7e413fee01356a064f6b98128a1a mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm 2de215b7a47169ee0b6bec71ffdbcbf8d9f91fbc2c1f1b58f1ee31660a4af634 mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm 7b98204667205e2108a8c93ef2893f53922e9e2ad9b639703ed35e8979ac0de9 mysql-selinux-1.0.5-1.el9_0.noarch.rpm 3eb39d87c5a04055a947b1bc7800521d9dcc6b405189e53201e3f79716a680d7 RLBA-2022:5954 fuse-overlayfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - fuse-overlayfs (BZ#2111736) rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.9-1.el9.x86_64.rpm a1fd525022c9dd098f6fd4a6f8b0992a1703a09edc150e860b2f68b88ce89898 fuse-overlayfs-1.9-1.el9_0.x86_64.rpm 0fc694e7a8a1d452449d730ec4573bb96e8e5be99a98e8ee09e65dee164952e0 RLBA-2022:5961 slirp4netns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The slirp4netns package provides slirp for network namespaces. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - slirp4netns (BZ#2111627) rocky-linux-9-x86-64-appstream-rpms slirp4netns-1.2.0-2.el9.x86_64.rpm e3cacad672f5369a5f1a759d15a5e5e3fc8b511d51d3f720276a8a01ec867a06 slirp4netns-1.2.0-2.el9_0.x86_64.rpm e22ca6482a3026204f0857880b187459d2773a4e594121c73191bd3706cb4697 RLBA-2022:5962 yajl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. * Regular rebuild for 9.0.0.2 (QR) - yajl (BZ#2111628) rocky-linux-9-x86-64-appstream-rpms yajl-2.1.0-21.el9.i686.rpm 586f257769f8fdaa8dc113a960fa9d4e4f6fdefd8b8464e48d9527d035b23661 yajl-2.1.0-21.el9_0.i686.rpm ce5e6ace7e1ca65f6ddd67e4a4a7e109206a5c2d557c646613e0cb8d2adcfc0a yajl-2.1.0-21.el9.x86_64.rpm 98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de yajl-2.1.0-21.el9_0.x86_64.rpm 0a66ac8a71ba35e7087fdea5f7fcab8fefbe6d5b4e0a3e3442d37c0066f5cadc RLBA-2022:5967 firefox:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:5968 thunderbird:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:6412 thunderbird:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:6413 firefox:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLSA-2022:6585 Moderate: ruby security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109428) Security Fix(es): * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ruby-3.0.4-160.el9_0.i686.rpm 309bf5ce4950e616142bb32a937c55fe01e9cb03b9bb90664515d61e467f74bd ruby-3.0.4-160.el9_0.x86_64.rpm c004947f654a9e14bfeb4bbbc8dc995a5d2aa02bf0b7df2b10e3b928c5a99cda ruby-default-gems-3.0.4-160.el9_0.noarch.rpm 417fbed7251159f0c663d144e00efda40a10ed58e82fb15348675603e5d3f76e ruby-devel-3.0.4-160.el9_0.i686.rpm 5a82c5ee3063dd7cfbf7295bbd009e1313723710f41e584eb0e77218d26ec13f ruby-devel-3.0.4-160.el9_0.x86_64.rpm d0aca8f7fbf058dd93ca5abd6a3480d698059debed59de5e67c314903bfb02b1 rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm 312bf6ec219a724f2322c862f94a70fceb30fff2c5f909a8a775ebde38910e6b rubygem-bundler-2.2.33-160.el9_0.noarch.rpm 961b326e76e4d965a937c69699ea3c746822a7f78ef4fcbceb82e8377194078d rubygem-io-console-0.5.7-160.el9_0.x86_64.rpm 0012db91bed5ed85a142852865b46b5665ac04bebe7e9353cde93ea50dbb4615 rubygem-irb-1.3.5-160.el9_0.noarch.rpm b382b053e851e49aa1a8940882982ccde6e67ac6e658ed584d808dd3519e6a0e rubygem-json-2.5.1-160.el9_0.x86_64.rpm af2d66b886802a445b7d9e55df02e1d25e1ffcc3bab5b7453ececf83347e6195 rubygem-minitest-5.14.2-160.el9_0.noarch.rpm 9edc861cdbc1c57d0084f7cb0ec96b525d4a68ce38154f77dc87c9838f8a7014 rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm 0c07d363626565436743174ff2662f3579fedaf8047b39773c47bab2b29350cb rubygem-psych-3.3.2-160.el9_0.x86_64.rpm e0352cd0060859774db7dee8dac70d26c45513b6ddd759f27d7780a7fa396a56 rubygem-rake-13.0.3-160.el9_0.noarch.rpm ead12b3501cd16da88627055dea6f2527c7a73b7fd7f608fd1a8f608cca2cf5a rubygem-rbs-1.4.0-160.el9_0.noarch.rpm 751fd61ca2d202eaf1e53f8f362ccd81696b30c71f62c0fc63b136d32d157c0f rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm cb911a8b5a58673e057994ff8a0231e9b98560f7b8ba7fa6166f78a0051a4226 rubygem-rexml-3.2.5-160.el9_0.noarch.rpm 155b434f4d5caf04d27176b14492f93da49c7bb212ba11169a9ebe4acde4ec99 rubygem-rss-0.2.9-160.el9_0.noarch.rpm e669e336ccd53007907207d2996a90207e20d27b6d03dc9021ac30d1c5b732b9 rubygems-3.2.33-160.el9_0.noarch.rpm 6ab3fd3762a955392e8ae03e3b24931a40a9af1bae49feeac465fe2388926505 rubygems-devel-3.2.33-160.el9_0.noarch.rpm a1ff8e3c133a6a59e1b3b0662178daf34654f28d8ad2030d82c9ba1f07181629 rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm ce9678bd8941dc0da4ce6aa93f3a1d71dc7c807f0fd2b050e8558afa7491091a rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm de1ce9f8adda61375fa95fa9afbc770753793462652f973e9abb4e9f0bb26e1b ruby-libs-3.0.4-160.el9_0.i686.rpm fc75dc05a7b4a3a83be134513e716395c68e0324a0b4301812cac32d4a6cadeb ruby-libs-3.0.4-160.el9_0.x86_64.rpm e8ba2cfcb7fd136051a9833ef1ea15d6db43d8449af9d71e14ffbd315297bb14 RLBA-2022:6588 python-ldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-ldap packages provide an object-oriented API for working with LDAP within Python programs. It allows access to LDAP directory servers by using the OpenLDAP 2.x libraries, and contains modules for other LDAP-related tasks (including processing LDIF, LDAPURLs, LDAPv3 schema, etc.). Bug Fix(es) and Enhancement(s): * python-ldap FTBFS in Rocky Linux-9.1 (BZ#2121547) rocky-linux-9-x86-64-appstream-rpms python3-ldap-3.3.1-9.el9.x86_64.rpm ef62df4cbc90c0b91f31d6fdd84c43bacc46109bc5e5a7867d49c178be3ae58e python3-ldap-3.3.1-9.el9_0.x86_64.rpm 202b9bd4a849116161ed5ddd2828ea48f99b1570b3123b146c4dc531bfac6771 RLSA-2022:6590 Moderate: mysql security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589) Security Fix(es): * mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479) * mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415) * mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423) * mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457) * mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569) * mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534) * mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547) * mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Default logrotate set to wrong log file (BZ#2122592) rocky-linux-9-x86-64-appstream-rpms mysql-8.0.30-3.el9_0.x86_64.rpm 788dbc7c20a543535495e7932dd6ef3903bfa80bbd01d121708d28de5f8e77db mysql-common-8.0.30-3.el9_0.x86_64.rpm dbcf38131e3e767e49a6fa62a2e05acad826349edd20bf9964a55b947095a188 mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm dc7607b13722bf8d3668ed1eb65bfb756cfb555766b2d02d36c7621828b76327 mysql-server-8.0.30-3.el9_0.x86_64.rpm 1cefbd31947ab359487aaafda25b0b4a0cccbee5e27de0c7260203e409d6553f RLEA-2022:6596 nss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR. (BZ#2093488) * certmonger startup very slow using default NSS sqlite database backend. (BZ#2097896) * Allow signature verification using RSA keys <2k in FIPS mode. (BZ#2099438) * Need to be able to run self-tests at will programmatically. (BZ#2100504) rocky-linux-9-x86-64-appstream-rpms nspr-4.34.0-14.el9_0.i686.rpm da9a89afde13756e2fa42ea0bab3d093c22fd9876a5893ca31e650a89752968f nspr-4.34.0-14.el9_0.x86_64.rpm 420eb3521b65392eacfb871ce838bdbcd7abddf16d2dc2a58ee7c0f5625cc7e1 nspr-devel-4.34.0-14.el9_0.i686.rpm ab80e1ad5cc669d533630ccc383a8294f32e8b7382bdd2216956507df5e3bd56 nspr-devel-4.34.0-14.el9_0.x86_64.rpm 0862ab05808dc63064d54c1ac060738ba6ae1a42aab030a3394c6c446a2e59f0 nss-3.79.0-14.el9_0.i686.rpm d27ffdd27430c64542d96b1e610fad5a80606714473c1296820b2893d79ec859 nss-3.79.0-14.el9_0.x86_64.rpm 42b04cc7a7a1662a4cca25b21d38d8f04af1f488c1ef262a21a292c7990da641 nss-devel-3.79.0-14.el9_0.i686.rpm 2d2b1d4fdacac3ab446ad6f697a6f07af9fdd34d183473c3130800557330d657 nss-devel-3.79.0-14.el9_0.x86_64.rpm c282fc485cc583b6f7a13a40a705cf25dca020537e7a1deac53e6e586cdfabbf nss-softokn-3.79.0-14.el9_0.i686.rpm aa791bfe4d33fd711224c9937218618259d4b12afbb49e3a1a4811c0d429b026 nss-softokn-3.79.0-14.el9_0.x86_64.rpm af7e726fe13bbca4eb826fc16ceb0b50c909576189debce00e0f19fcab4e9df8 nss-softokn-devel-3.79.0-14.el9_0.i686.rpm 167888c9b121cd46ad5ced0979b360c5e9d97d36db22bfa51a923e683b86a131 nss-softokn-devel-3.79.0-14.el9_0.x86_64.rpm 7d2ff5aaea4a655c266cc2c1343969ce359f44f915ba202106a8c59d2a7dffcb nss-softokn-freebl-3.79.0-14.el9_0.i686.rpm 8b9f5be29178cc90e75964f81aebdad4deaa1ceb5c05f83cf24a153022afa505 nss-softokn-freebl-3.79.0-14.el9_0.x86_64.rpm 212cb24c631dc01e03305890dca92b8191e9eb6f04348d0b9ec8eb478e1e7631 nss-softokn-freebl-devel-3.79.0-14.el9_0.i686.rpm f0741edde112e0b5e8f2a6fe18cef30030b6bd9830834fedd4ffd894b542f48e nss-softokn-freebl-devel-3.79.0-14.el9_0.x86_64.rpm 82ea250fb6baf67918f68f5f6474d3016575d16ed65730445c168f3a2f37886f nss-sysinit-3.79.0-14.el9_0.x86_64.rpm d5a216dd6c8ae27508ea36d8a4142cf63af6662e317f9d7eeb4b00add59c0219 nss-tools-3.79.0-14.el9_0.x86_64.rpm 3b7f30ae8e303cf072ad131464b75a65ba4045164a97da6e8d18010ba8b63082 nss-util-3.79.0-14.el9_0.i686.rpm b0c1d68163c1901e770c938a9639cc8e5e4990866b1850035265113e8d00fb3b nss-util-3.79.0-14.el9_0.x86_64.rpm 55720d07d5ed6e98d0951dbcf84f44f01ca6e95c15b11397740f0062eece0f49 nss-util-devel-3.79.0-14.el9_0.i686.rpm 822b6ac4779997da2dd9bc48dc57c80b4e4c889bc055b3fd31ff9d06dd1c62d2 nss-util-devel-3.79.0-14.el9_0.x86_64.rpm e5f5b4b8d99f7bc9c67dedec95bbe6e91868698e7a46b58043e5ae55793f6168 RLEA-2022:7320 ostree bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es) and Enhancement(s): * Update ostree to latest upstream version 2022.5 (BZ#2127868) rocky-linux-9-x86-64-appstream-rpms ostree-2022.5-1.el9.i686.rpm 23a185b07b0cc39438e7b90bbcce197cefa9f7d1cb3acf46c179a557721dfa7c ostree-2022.5-1.el9_0.i686.rpm a8df3ab9797bf59bfad66839a85cf86bf627b071ba419de1b8ed4d9679564d03 ostree-2022.5-1.el9.x86_64.rpm 6af184ec89b61e57aab331e065d125e27d15acefbbeb79275ade48b7d26b48ca ostree-2022.5-1.el9_0.x86_64.rpm b766a327ca745a298505cf93577f4da5ce4c864c193aedc6e3c258b23bb476a6 ostree-grub2-2022.5-1.el9.x86_64.rpm 270c8f82d1dc25fe3fa7c2d256e93e9108043a42ef698b2d593426f78330f23e ostree-grub2-2022.5-1.el9_0.x86_64.rpm 643a59a13a299ba3e67ad56a783c86284f1a0ff80d52157df8f272713711619b ostree-libs-2022.5-1.el9.i686.rpm d41157f436cb396a2e666626b3de7701482976c82050e467b872222b5ff6402a ostree-libs-2022.5-1.el9_0.i686.rpm b3097ed10ad10fae2c32fe71a51ae6b9e277a6211966c697686dda302a63a7cc ostree-libs-2022.5-1.el9.x86_64.rpm 01fb60886745eceaf7b7237d433a21a1d7312c974e7528554dbb1ffdadaad3fc ostree-libs-2022.5-1.el9_0.x86_64.rpm 30303489e69073bdec707e406cc517ccffcf329ebd2e79e046daed8d1a55f161 RLSA-2022:7326 Important: pki-core security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pki-acme-11.0.6-2.el9_0.noarch.rpm fcda9a6c19e5f6ca8ee019f4e8ec264a36fab59931ae706f3ef3fea0bda64bbc pki-base-11.0.6-2.el9_0.noarch.rpm 88c574b2baa4f46d6283f5bd7ae1eb81d57033394a8514080174ed70a0381c07 pki-base-java-11.0.6-2.el9_0.noarch.rpm 3564101e10ab4a5ab4dc345a2717cfc52c698702ad44a63e3c8d891607ab83ab pki-ca-11.0.6-2.el9_0.noarch.rpm a3f74d79a6d637b13ce500f51727065c7da0f45b96e3ac78ece75d843e833d91 pki-kra-11.0.6-2.el9_0.noarch.rpm 48a8fc5e0e19c1ad1f04ebbc818032017a96088a9452619e6c4442c9bbe3adc3 pki-server-11.0.6-2.el9_0.noarch.rpm 74aeee726a1c470265240e92a3d1622e22c817d98f20ded8f2ffa75f228858a7 pki-symkey-11.0.6-2.el9_0.x86_64.rpm d1e36f6c07621d3aaa452c5295383b9bb713097150bc0fea429230ea2e53c631 pki-tools-11.0.6-2.el9_0.x86_64.rpm dbb384087b8766b36940e35287fc5972b02465c15c64c4b84ad52f25f00adf3b python3-pki-11.0.6-2.el9_0.noarch.rpm c1fcc173399228caceac8fd8851e53334dd3c584969b306645ef7c3156421f55 RLBA-2022:7332 thunderbird:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:7331 firefox:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:7942 crun bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.5-1.el9.x86_64.rpm 0ea5faf2a6000901348226bf0c7b43fd150adced7d926288b0651a4e520ba87f RLBA-2022:7943 container-selinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-selinux-2.189.0-1.el9.noarch.rpm 6c3c4f04523edcab98dc30ca91ddacde4f6cac160e2976b2bc770c5d889c45b2 RLBA-2022:7944 libnbd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.12.6-1.el9.i686.rpm 122eb066879f8beea62fbfce2a4e6c01491ac1779e57831c7e2c39f292e89200 libnbd-1.12.6-1.el9.x86_64.rpm c797f3a57fb7311e0e60838282b8ebcc8d91e4a0c8015c522c95ea21aaecee0a libnbd-bash-completion-1.12.6-1.el9.noarch.rpm 1c36a11283ecff43fc6ae7ff9784647bed914d387f2ae062a6e198c5241c2677 nbdfuse-1.12.6-1.el9.x86_64.rpm 3984f4dd265d0c20033bc5ccce8b0e1711a0639315ff3ebd670c8d6981a8cdcf python3-libnbd-1.12.6-1.el9.x86_64.rpm 4b820903a0f067db41ab286e51d3f11fa9fc543040615fa7527188af6bf62557 RLBA-2022:7946 sscg bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sscg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sscg-3.0.0-5.el9.x86_64.rpm ce4a3a03d7c5c9445cc07c4df208eccbbfdafe08cccd2fd0c01a3b6b84150e7c sscg-3.0.0-5.el9_0.x86_64.rpm 7b4c82d678abdc622d3eb4a68afdbb86f6318ebea6b006ec372d36ac21fc7e3b RLBA-2022:7948 libwpe bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwpe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwpe-1.10.0-4.el9.i686.rpm 148fe8974752511b791892e7f9aecbce4a66b3c0405514312da26bc6b3fd37cf libwpe-1.10.0-4.el9.x86_64.rpm 75a560e5d26af123a6fd333c63b5159eb27fbddd465ea26f45cd301a4df2dc57 RLBA-2022:7947 wpebackend-fdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wpebackend-fdo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wpebackend-fdo-1.10.0-3.el9.i686.rpm 58bbefe66f2994db1a7235d7f415e694ef303980c795121911f422c3d2e5c054 wpebackend-fdo-1.10.0-3.el9.x86_64.rpm e0c19cb6ead5a0c2fd8eefa26f4cf08c7629d8393fc0d9890348a233297cd03d RLBA-2022:7949 containernetworking-plugins bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.1.1-3.el9.x86_64.rpm c4a89113a22f34a6a8d057715d35ad681486f6b5314581ba2856413b6616ea3b RLSA-2022:7950 Low: Image Builder security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cockpit-composer, weldr-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-composer-41-1.el9.noarch.rpm 474c2786d84f9c5daf859f72cb567fec479412067bbc9898bf3ee8276480ff5a weldr-client-35.5-4.el9.x86_64.rpm add90ad088fdda8b3b19781acdb9f44051795499628f402375e2205ccb860706 osbuild-65-1.el9.rocky.0.1.noarch.rpm 6ad1d9ff002d476db570ed5e98103ab4758452b2cff6c1ce14f18a70d1e42d87 osbuild-luks2-65-1.el9.rocky.0.1.noarch.rpm f67ba9bb1798347438c4840a2b944f3ffddbc5737db9e942a6ca6492fc3ff0b2 osbuild-lvm2-65-1.el9.rocky.0.1.noarch.rpm 49726b7817a3b9b36ea3b0a39d60e4a7b2dd124db5f5f0f3807620961ad28635 osbuild-ostree-65-1.el9.rocky.0.1.noarch.rpm 7df336df7aa3c26a37e756623668835996c0c2b4e1f98b71fea3f4112d9e7510 osbuild-selinux-65-1.el9.rocky.0.1.noarch.rpm f7edd2e04c61e103932e4541a833adab4e5c0f7eeadc2aaa6978305510ea16d2 python3-osbuild-65-1.el9.rocky.0.1.noarch.rpm 04f0065dd32a7e525a96d11c40dae06fcfc32ede99e94e3486018f994c6af550 RLBA-2022:7951 pipewire bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pipewire-0.3.47-2.el9.i686.rpm 5959f4c9795565db471cb48285baa8cedb1523edb0a49a85fc24e5e0f9fdf932 pipewire-0.3.47-2.el9_0.i686.rpm 78f3a5e519b4ee96d863d9ba4b3565365f617ad5583e131ce7d5dbbf8184644f pipewire-0.3.47-2.el9.x86_64.rpm 3de3a83596a47b935d33bdc0bd66090295b02239b0cb1bea4cccf3958d3f6df8 pipewire-0.3.47-2.el9_0.x86_64.rpm adf65844a10a8cea61e41ffda9df8213438e43cfab3df9668ca83d20580c51f2 pipewire-alsa-0.3.47-2.el9.i686.rpm 306f3e302d86f97336fc3ce58c941c65156c20afc2df2053945494a6dea290ca pipewire-alsa-0.3.47-2.el9_0.i686.rpm 4bf5b7445820ea10cecdfdf0b54fb134936c73772133613d794f666c13e01fa7 pipewire-alsa-0.3.47-2.el9.x86_64.rpm fe6b1e032263d0d7c4aaaec9eeb4913b24d03794de30f40bf88e6d2d8e443f47 pipewire-alsa-0.3.47-2.el9_0.x86_64.rpm c51a21f9b6e1e029bdf7ac320e6f1e7dee4dd8aa3287a29571962df9f92f0770 pipewire-devel-0.3.47-2.el9.i686.rpm 803c0900add1cc0bdf16964d4d42a74ca9bfe1db88ba897741640618b4a30768 pipewire-devel-0.3.47-2.el9_0.i686.rpm e224d8da11ca73f586698bd63ce6cdf51412b31e935ec0734c6035163e0b9415 pipewire-devel-0.3.47-2.el9.x86_64.rpm 1b80dbba8c30cde1f574587f158a11c50815b699cbb59ec19d25b6ae34d4c781 pipewire-devel-0.3.47-2.el9_0.x86_64.rpm 8c13bff2248b69fbfadaab52829244107b7dccd5ea1ac878b3d96632d11de85c pipewire-gstreamer-0.3.47-2.el9.i686.rpm 176368d405004d1be22432a1fdd2c7856c6ac42c82d4d41646f91189c4ea16c5 pipewire-gstreamer-0.3.47-2.el9_0.i686.rpm 0fad63f51b9846aabb50705d83f295dc776c11df4e81f8f54fe6c9ef23e8db29 pipewire-gstreamer-0.3.47-2.el9.x86_64.rpm 07019486ea9968f3fcfa2436370b1065673c510f872285a5d6363cab5d9e0160 pipewire-gstreamer-0.3.47-2.el9_0.x86_64.rpm 1394fd3d4b854330d3d13858ea7b3040782eb85ae0d27fdba6a9bbbd74dd26ae pipewire-jack-audio-connection-kit-0.3.47-2.el9.i686.rpm 92c3f5ab981bc430c21102c2ff04f0dba8e8f06a3b17b899768ba6eb6b804e82 pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.i686.rpm 609b64b11edebb55cd83728158ac3baaee0e78d7b04bbbbb673f8ce6ef4534c3 pipewire-jack-audio-connection-kit-0.3.47-2.el9.x86_64.rpm aa7ea3528e16a8af6aabf7b4f300548ba25eb56c4a0ca82a9d22603e2eed029f pipewire-jack-audio-connection-kit-0.3.47-2.el9_0.x86_64.rpm 06b057d2d6ebb8ec1d314dc0bd56eb3108dd839513253fa4942db78963ba81f2 pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.i686.rpm a501d458ae5a43c3c1c1c5a40f98cbf7d74e20b31928b158dadba80ad838ad0c pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.i686.rpm 5b392954b71927ebb460970806535bd9859a38ebbd6ced14b1f510518e3fc912 pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.x86_64.rpm 6bc6089139b156c5afa64891e6395fbf7a4d84fbb835569093ea6908e699b43c pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9_0.x86_64.rpm 6dd8353c6bc29febe1ebdf348a02751a0268bb48a8cf687184584f42a23ba04d pipewire-libs-0.3.47-2.el9.i686.rpm 6dff526d939f72cc31545a2d83142787f555fcb7f29805160d2b16d19e7fca5a pipewire-libs-0.3.47-2.el9_0.i686.rpm 21eeb0d2776d467205bc323e3e116a0316e53aee99e57cc12cd28be957afd1e9 pipewire-libs-0.3.47-2.el9.x86_64.rpm 0c2d96713249488829737d7107396fdc566f87031931ed105623bcadd44cbcef pipewire-libs-0.3.47-2.el9_0.x86_64.rpm 556c112b74be8c56f77fd31da9fdf43a34544e973313022a4cc0e7bda37e3971 pipewire-pulseaudio-0.3.47-2.el9.x86_64.rpm 7415b8fde19ea9bb78959a7fcc30e945f07bbd05643a56efe60138c7a86ab00f pipewire-pulseaudio-0.3.47-2.el9_0.x86_64.rpm 9ff68cf2fa5df1a951bc282d64e3c48b62e0e24bd1e88bfdd6e869e1294c5b0b pipewire-utils-0.3.47-2.el9.x86_64.rpm 01de374851cb6f1989858bfba16cf220b38141da9da1e4cf9c4d54e4bdba65ee pipewire-utils-0.3.47-2.el9_0.x86_64.rpm f629232bebeccb0f15c7d5353ef38d878f91d8debcbc2debf589360e6236e412 RLBA-2022:7952 flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.7-2.el9.x86_64.rpm 8bb0cec4c0557901023742c40ef0c2759e31a3948c2d8fbb7d2c78c6076c6fb1 flatpak-libs-1.12.7-2.el9.i686.rpm 400a47774e5bf05e13cb57bf8ec25c5a96c3860ff3e0f94c8c830c0997539353 flatpak-libs-1.12.7-2.el9.x86_64.rpm ffb35c77faa2108d5bd36da28cd094205828a09b7f97f5ec87cacf4f8575cc3f flatpak-selinux-1.12.7-2.el9.noarch.rpm d11d7884a5d313ba78025a47abe3920c5cdcbcddc4bf365e08e9c3e7617ee7f2 flatpak-session-helper-1.12.7-2.el9.x86_64.rpm 6223689d6c0a575b81f0403baa9b9714967776c8147d31bafc77e68590ea13dc RLBA-2022:7953 gdm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdm-40.1-17.el9_1.i686.rpm b38472c3b3eb6bb6ad967af81a07fdef83cf67f0ecf84d790a3ebdaf303e99db gdm-40.1-17.el9_1.x86_64.rpm f34bcddc04f3539adf9b14e6e1239bb4b35711f40cf947aea5d18201d7f9d7aa RLBA-2022:7957 annobin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms annobin-10.73-3.el9.x86_64.rpm 3cc711ca325a622647f5641213e27f63e6e609d007d85527e2f6b754d8a46cec annobin-annocheck-10.73-3.el9.i686.rpm 765f28aa449fba12f62ac603258f6cff2e672830a46bfb87d7cb25262ce40549 annobin-annocheck-10.73-3.el9.x86_64.rpm 120f83ad85a941dd7a759c33b694e1e21d635391ff2ebacc6de126bd0549c863 RLSA-2022:7958 Low: libguestfs security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for libguestfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libguestfs packages contain a library used for accessing and modifying virtual machine disk images. Security Fix(es): * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libguestfs-1.48.4-2.el9.x86_64.rpm cfd2ef2d65a48b3201767956428cbd561570ff669f152d9c354dfb155a94a6fd libguestfs-appliance-1.48.4-2.el9.x86_64.rpm a70c590028d24e9401c4e11e3634acddc6822c87b1019bb3c481a3a8264d10d4 libguestfs-bash-completion-1.48.4-2.el9.noarch.rpm 4578ac679f0112fa5798334cefc33a451d75da55fd2dcb6f8201c66189ce8e7c libguestfs-inspect-icons-1.48.4-2.el9.noarch.rpm 5167b905bf41ef5abf03a3abbe0781f3ad3c4f38e0d1876133c7999b08d71a92 libguestfs-rescue-1.48.4-2.el9.x86_64.rpm a3da0a51d3b5a995a5f5e0aa7a65898adb85e7d805ffd6ef77f0d5806edcc34b libguestfs-rsync-1.48.4-2.el9.x86_64.rpm f832543b432b73bdb35ab22d1ece09a89a5b2206cc31261a3511d525247f1d4a libguestfs-xfs-1.48.4-2.el9.x86_64.rpm 74282153a9ee4a9bc84a0cfa74f6833a6fb199a02e6a3a220198791ddda6b142 perl-Sys-Guestfs-1.48.4-2.el9.x86_64.rpm c0b945a6d130b6c9741281b743bbf243be334ad979665a70b5e43a797956b8c6 python3-libguestfs-1.48.4-2.el9.x86_64.rpm 46b91d0e55025b5a5180f562054196062120daf4e85cc08ede2d01b38baeaddd RLSA-2022:7959 Low: guestfs-tools security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for guestfs-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list guestfs-tools is a set of tools that can be used to make batch configuration changes to guests, get disk used/free statistics, perform backups and guest clones, change registry/UUID/hostname info, build guests from scratch, and much more. Security Fix(es): * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guestfs-tools-1.48.2-5.el9.x86_64.rpm 43125f0af7eddbbfc8fe79e1dd74605c9e2e16fa451c3f83c4c5b01f3bdf0215 virt-win-reg-1.48.2-5.el9.noarch.rpm 88c5a14bb96d2d8863e0fa1342183a23a3c19cc2151fc4fc9656eca0929ab1aa RLEA-2022:7960 rust-afterburn bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.3.0-1.el9.x86_64.rpm 9450a95a5ef1412c2fc0415624b6a3b554d56d020955aa3aea853e779827d6c2 afterburn-dracut-5.3.0-1.el9.x86_64.rpm c3e08c4dc232f2cbcfb8d2d6102baea10d8cedd42633e54f7853e01618763987 RLBA-2022:7962 rust-ssh-key-dir bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-ssh-key-dir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ssh-key-dir-0.1.3-2.el9.x86_64.rpm 21e8becf78429865faefecff1e0ff2dfc16c6a05789c61374af718ae7b0d1294 ssh-key-dir-0.1.3-2.el9_0.x86_64.rpm 32bf841a986c157d264cfef35f136a1507cae5b1f9ef98ae10b3e6215c9c7466 RLBA-2022:7961 oci-seccomp-bpf-hook bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oci-seccomp-bpf-hook-1.2.6-1.el9.x86_64.rpm e633b1dc42acb852d02782bed060c19a2fd367c3a03a5fbcd3214668e640232f RLBA-2022:7963 rsyslog bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsyslog-8.2102.0-105.el9.x86_64.rpm 40d277dc72563d90b6e82079f04f4d6a4653950d5ae55fe46f3c1fc5cc5cecf3 rsyslog-crypto-8.2102.0-105.el9.x86_64.rpm 52eca00cef8ae9eef680e2f0dde997903a77b06e44e0c60b738297efed94b336 rsyslog-doc-8.2102.0-105.el9.noarch.rpm dcd300c713a8e80758e2a66bdf3159b05c88fc89f888d65aad66e6d89531aa10 rsyslog-elasticsearch-8.2102.0-105.el9.x86_64.rpm 2f08e016bc39898340c0eee4616fc1a6416f453435e2a454731e1f0a39549f14 rsyslog-gnutls-8.2102.0-105.el9.x86_64.rpm cca1d79ee0fdbdda374ae074758432dcf0eceeaff0002c28496cd12442ecbbb1 rsyslog-gssapi-8.2102.0-105.el9.x86_64.rpm 26e137487a6fad618adbe465d50c8439107ba6ba8ee6040c8c0b5cae3b0d36c8 rsyslog-kafka-8.2102.0-105.el9.x86_64.rpm 26510e4ab13f07861198b2d21073b4198aaeda888060d96998bb7e9a1a495cda rsyslog-logrotate-8.2102.0-105.el9.x86_64.rpm 712f6ea374a8173ad38a7c00c4692b23c16792807df882fc137a4143a1efd05b rsyslog-mmaudit-8.2102.0-105.el9.x86_64.rpm 4439b4921a61a45ac1f89140cb26a82de701d0165c2fa18513b0a700d78240b0 rsyslog-mmfields-8.2102.0-105.el9.x86_64.rpm e3832b65c84ea368104b0be39aacf148cf302ff813765c941369acb431baa928 rsyslog-mmjsonparse-8.2102.0-105.el9.x86_64.rpm 31fb268be07a9805114100282a9cf69ff97ca062078a734c942cb64e9f8e1c8f rsyslog-mmkubernetes-8.2102.0-105.el9.x86_64.rpm 52adbb316dc9d727dd46a41ceec4843087f9c0ec972ac8e99a024a0502dc9c13 rsyslog-mmnormalize-8.2102.0-105.el9.x86_64.rpm 5e82f452580c16e19d870eb0fcc45e6cbac69a6a14759b1245a99bcf6e1d4dd1 rsyslog-mmsnmptrapd-8.2102.0-105.el9.x86_64.rpm 2b89ac3fdc9bb98c91b040a1912ccdc2c4732d0d932d47b95dff87b09bae6455 rsyslog-mysql-8.2102.0-105.el9.x86_64.rpm 807854568e2c2cd18cddf99ee0a993f58b42224ce511224c57cb7881188a0308 rsyslog-omamqp1-8.2102.0-105.el9.x86_64.rpm baf508f9a9ecb32817c2228d20a561644db795e8f5c633bd02e43e15c195d95b rsyslog-openssl-8.2102.0-105.el9.x86_64.rpm a20e1697e01fa0a7943b202bde643d8acbb27dcc2f2df79fff7dfa128a71f09f rsyslog-pgsql-8.2102.0-105.el9.x86_64.rpm 74b6956f7dc8838f6579ffb92f70e5f530fe117d16ce086ed8346093e3bef9cb rsyslog-relp-8.2102.0-105.el9.x86_64.rpm a85071a7891308b41b18d219088f8173f799e1a8d214270aa3b51b0c0a6aa1ae rsyslog-snmp-8.2102.0-105.el9.x86_64.rpm 82acb6094da9c89b361ed04e3e08b42929770492f9d414c9e718acaa2e348c9f rsyslog-udpspoof-8.2102.0-105.el9.x86_64.rpm 00f5f9a69400796877abb7c5bf068fb968d4c83231e675298f6d220c3af1bb8a RLBA-2022:7964 babeltrace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for babeltrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libbabeltrace-1.5.8-10.el9.i686.rpm 1ffb1ab25185c525b7d43838837e19db99cb6e0bed1115fffaf6ae08b88eb80b libbabeltrace-1.5.8-10.el9.x86_64.rpm 42473f9f5930f90e707d75e2f7e62bfb9cf8a970f587ea1edcbcf839316b5418 RLBA-2022:7965 supermin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for supermin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms supermin-5.2.1-8.el9.x86_64.rpm 1833a757880cc8920424f21e4105b0c1d75c6d151bb00083ac144ff04336b4a0 RLBA-2022:7966 gnome-software bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-software-41.5-1.el9.x86_64.rpm 6ea4cbcb15ba48825049ea7b5acef5c2e3ebb06eadeba4ce6662e495fc727c49 RLSA-2022:7967 Moderate: qemu-kvm security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757) Security Fix(es): * QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750) * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-7.0.0-13.el9.x86_64.rpm ae8eae1fd9f64728104f48f0e4416dc49dfa2ac17fc194af2eaf81dc8ea2447b qemu-img-7.0.0-13.el9.x86_64.rpm 6d74ce57e187a7bfe20d01279b8f18599683438a024d00b276fffb66ea107f22 qemu-kvm-7.0.0-13.el9.x86_64.rpm 769ac5fcb981ff9cf793e296cf5a2591f4699745c264c56efdb1f1dc07eec631 qemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm cd36b49796d4871de044aec91c818699ea3f71f5dc2f7be4deac7da41826a89e qemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpm a8c94ce651a4db543fe6113bc9ea8897e846e65ea80442e29df18f40b09bc701 qemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm 8b9a4e1e042ca0fefe7c6a5491ada6cbc9a91976dc019f9c8cec3991abd2cfcd qemu-kvm-common-7.0.0-13.el9.x86_64.rpm b7bd4bd0e67fe8d5afb0e0db069a17488ad3f1c0ac403e9da03d38f4c28c5934 qemu-kvm-core-7.0.0-13.el9.x86_64.rpm 6c96fd75832b4325949d3f0890c8ba000fd291af73216da21582bd8a2dab0db3 qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpm b16a922353b458e40feeac46fd2743b07f40d0c35a5fb0cbaa9805239b7d8896 qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpm 1594ac4b90996a6898ab67af40d79d4e51efff88b1f0921fc9d307d5e4ec1d32 qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpm 00b0f28b9ed6b13a1a06cc44669412978b8baa7ee8820a117db03369f0da2a8b qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm eb8158e5858494e042534672ab46a906c700e491aab165049ca54b3533f6f41a qemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm 5e42fa9b8848829e66928d2cfe0fa6a0b6aefc986a2628a7f900551da3d546b5 qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpm 3ad05a2749d817b07e23c6436b26511c0aad4836b65785bfe18072b6111c0c47 qemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpm 0c1fd80c6b94a4fbfadd3016fed6c5d7b8ad26a14b9098f20f3a5541a8c6b4bc qemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpm 8388ac531d466e6ca3143bca349190c46646908cfb2c039088e1055a142db402 qemu-kvm-docs-7.0.0-13.el9.x86_64.rpm 0b2cf3ff399ee5450c11f6e143b26f11e8b6c92dabcb8db132da70f6bc1d43e4 qemu-kvm-tools-7.0.0-13.el9.x86_64.rpm d4e8d8895b3eb2f633f3f2f487e4e93d8b2e49eedaba4f496803d06a1d301680 qemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpm a0bd84ee2c3ac9515cde434338c7cba0266f47963d173b054c9173468bfd0af7 qemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpm e5783e862bf56476dbb1664cdc7e3fe4ac3899e877ea2a88401d44fa42118632 qemu-pr-helper-7.0.0-13.el9.x86_64.rpm f97b900fa1d36cef59b9be4f6cacc04ba07a5f78f2835bdbca22d80878b1f8bf RLSA-2022:7968 Low: virt-v2v security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible. Security Fix(es): * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.0.7-6.el9.x86_64.rpm 08a2d7a5a74a2e43f533a66c11482e55a90cc8184432b7486498957f417387d1 virt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm ba18e3f6854602e1a110e30ea2b77c8bd3e79722e273ed81a7a42224de0448a0 RLBA-2022:7969 network-manager-applet bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for network-manager-applet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms network-manager-applet-1.26.0-1.el9.x86_64.rpm 9758c6b37599c2643a321624dd5d7ef0c08c566b012236e12bb0746f08160e52 nm-connection-editor-1.26.0-1.el9.x86_64.rpm f715218d2eb47f1a7605281cb2c2d2b39e102d32a30be1f5a3c03cf647d2b977 RLSA-2022:7970 Moderate: protobuf security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for protobuf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-3.14.0-13.el9.i686.rpm e9555809ecf853e7f344596d414137146d51f8578a8e984d1690bf2f9cc52943 protobuf-3.14.0-13.el9.x86_64.rpm e67d8801918a3200aeaeb3beb7a5a56124ef13c3e5b2f514b33d026ce2ff016e protobuf-lite-3.14.0-13.el9.i686.rpm 9359605b00acfa9ad58f46976a6fdca7ffe34eacf3bfb911566c5dc822af2020 protobuf-lite-3.14.0-13.el9.x86_64.rpm 21ff481d8f5d8bd08c9a6d192af40c06d7bd923d21a95220c4ed9f46abfd61a7 python3-protobuf-3.14.0-13.el9.noarch.rpm 169c2dc33df72dfd0d6563e4b7b4a811349da6e243fc89f1a0e4eb8ac9c1761f RLEA-2022:7971 edk2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20220526git16779ede2d36-3.el9.noarch.rpm d6487d29b107b21fe9e5db07c92e4dc4918e79dbfe3f6a012fb8d2b96989f079 edk2-ovmf-20220526git16779ede2d36-3.el9.noarch.rpm 95ca4bef0aef31d8963e2ca7f7f5cd9e7ca0ace9da0facaee38c5a5d4edc0136 RLBA-2022:7973 tftp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tftp-5.2-37.el9.x86_64.rpm 70193c0aeb7f62e4007c05722102348d224aa4ab01bbdabf93e2096459eac8ad tftp-server-5.2-37.el9.x86_64.rpm f252a9225c85a7165bf4d87722058db1e285ff45abf1b17f2b38401d5ea14927 RLBA-2022:7974 cockpit-podman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-podman-53-1.el9.noarch.rpm 13a9c4072ab45ff677e013557e7409d54057ffda5cd4816661379ecd5eca5224 RLBA-2022:7976 libnma bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnma-1.8.40-1.el9.i686.rpm c0e725e71e3caaa35eee3ef9553f0abb263d3b99b11edc5de1b4c27058143e85 libnma-1.8.40-1.el9.x86_64.rpm b41cac88cd28e7771ef201647b15687f40fc4c9ba8033a627479f8e53a1b170b RLSA-2022:7978 Moderate: gimp security and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: buffer overflow through a crafted XCF file (CVE-2022-30067) * gimp: unhandled exception via a crafted XCF file may lead to DoS (CVE-2022-32990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gimp-2.99.8-3.el9.x86_64.rpm f3aff4bd98554c12cf0cabdd92a007577f5311fe1e77abe30254611e2862f2d4 gimp-libs-2.99.8-3.el9.i686.rpm dd6a34ceaf8bf8233df1c8bff59d079a0f04187d4c8d5e1835537858c680b305 gimp-libs-2.99.8-3.el9.x86_64.rpm 2cbd3376d21c0f03c5711e3b1935f167c71ebc9950c6350b0b45ad52dc9c5691 RLSA-2022:7979 Low: speex security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for speex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Speex is a patent-free compression format designed especially for speech. It is specialized for voice communications at low bit-rates. Security Fix(es): * speex: divide by zero in read_samples() via crafted WAV file (CVE-2020-23903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms speex-1.2.0-11.el9.i686.rpm 49787117d378d557b7010f221fc52a9759e117898fc213c696545e8626497ed0 speex-1.2.0-11.el9.x86_64.rpm 4e12db6044b05c8cd37d14cd3e2f113ab2c798b1d4891b325379722b6f688e12 RLEA-2022:7983 ostree bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ostree-2022.5-1.el9.i686.rpm 23a185b07b0cc39438e7b90bbcce197cefa9f7d1cb3acf46c179a557721dfa7c ostree-2022.5-1.el9_0.i686.rpm a8df3ab9797bf59bfad66839a85cf86bf627b071ba419de1b8ed4d9679564d03 ostree-2022.5-1.el9.x86_64.rpm 6af184ec89b61e57aab331e065d125e27d15acefbbeb79275ade48b7d26b48ca ostree-2022.5-1.el9_0.x86_64.rpm b766a327ca745a298505cf93577f4da5ce4c864c193aedc6e3c258b23bb476a6 ostree-grub2-2022.5-1.el9.x86_64.rpm 270c8f82d1dc25fe3fa7c2d256e93e9108043a42ef698b2d593426f78330f23e ostree-grub2-2022.5-1.el9_0.x86_64.rpm 643a59a13a299ba3e67ad56a783c86284f1a0ff80d52157df8f272713711619b ostree-libs-2022.5-1.el9.i686.rpm d41157f436cb396a2e666626b3de7701482976c82050e467b872222b5ff6402a ostree-libs-2022.5-1.el9_0.i686.rpm b3097ed10ad10fae2c32fe71a51ae6b9e277a6211966c697686dda302a63a7cc ostree-libs-2022.5-1.el9.x86_64.rpm 01fb60886745eceaf7b7237d433a21a1d7312c974e7528554dbb1ffdadaad3fc ostree-libs-2022.5-1.el9_0.x86_64.rpm 30303489e69073bdec707e406cc517ccffcf329ebd2e79e046daed8d1a55f161 RLBA-2022:7985 nautilus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nautilus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nautilus-40.2-9.el9_1.x86_64.rpm 68f100394a0abffb6fe435a883e058819296100462791326d145e2af6a5517a0 nautilus-extensions-40.2-9.el9_1.i686.rpm cb08308623d73ddd9255af3b246d61151841419bde6e0ab3b74f81ca1e0bbec3 nautilus-extensions-40.2-9.el9_1.x86_64.rpm 58433a3da1876b7dccc20c8b5a2e4ccc80f9de76e92a68bcfd1d95f777486a77 RLBA-2022:7986 tigervnc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.12.0-4.el9.x86_64.rpm 182ab6ca165b159ce2796b9565599de6b13e3cc79081c6a0dae9f831aa87f1a9 tigervnc-icons-1.12.0-4.el9.noarch.rpm ca9181ccf07ac109be00b9053c585edb8c1f84f1f06d98997b107f0ef6cc1f33 tigervnc-license-1.12.0-4.el9.noarch.rpm b769de1827560d1dbbd0a3fe8e89203c7b31d3ab144abaec805893ed46d47861 tigervnc-selinux-1.12.0-4.el9.noarch.rpm 893a9b43cc3230801d4f1f55d529917e7b997d06eb54b1b90f658316f3869aae tigervnc-server-1.12.0-4.el9.x86_64.rpm ca5bee1853ad7e2abfa0a8fa4e6b1e20cc813175974e6a6ca90eaa342cab7288 tigervnc-server-minimal-1.12.0-4.el9.x86_64.rpm a208cbd8ed486d9e407cd09467cf065664d7fed4e2ebe2f2847391f61d4f6426 tigervnc-server-module-1.12.0-4.el9.x86_64.rpm 25495f0cbdfff59690ff8a53d2b51c097ae10dc6d92057e7693d2faa5144c227 RLBA-2022:7987 rasdaemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rasdaemon-0.6.7-8.el9.x86_64.rpm 32375a5ce17e90a934d889f052b6c1294bfd78da519898e0c8ab4627ca716256 RLBA-2022:7989 pcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcp-5.3.7-7.el9.x86_64.rpm 42c7ae3551f33490eff0c258a8193f1eb80c7d379ed1d39161f1edc491c9c605 pcp-conf-5.3.7-7.el9.x86_64.rpm e9016b737e17f17fbe2f8991384386ff856f4d5c937c363409680cc9925c1c02 pcp-devel-5.3.7-7.el9.i686.rpm dc79ad982545d20f9ad3648cfb5d49d7dff813abf4c1668ac85b60806d249875 pcp-devel-5.3.7-7.el9.x86_64.rpm a082d6c06a136e71dfb0b35d25044c912eee9ce63096df514fcc0c5f11e4b501 pcp-doc-5.3.7-7.el9.noarch.rpm 5db779ce5ef2d98e35ad64464124313ffaf6f04420df97037c49e3a4b2b92e46 pcp-export-pcp2elasticsearch-5.3.7-7.el9.x86_64.rpm aa522bc890efa9732cb74f10d94904bce1e3c1d3cf9ab263a4b81df0a664ba0f pcp-export-pcp2graphite-5.3.7-7.el9.x86_64.rpm cac0b1fa8b3151399918c806e04573780485f84bbdb9977ec422e95e3a70487d pcp-export-pcp2influxdb-5.3.7-7.el9.x86_64.rpm 72aad23fe4110efbb0ba4f2582cde2457a10263caf426efc65e54e592a28f56a pcp-export-pcp2json-5.3.7-7.el9.x86_64.rpm 4b225f54354e84579278b5785e618995010137521a6896cf14894609a6045137 pcp-export-pcp2spark-5.3.7-7.el9.x86_64.rpm f5698a76cb6c7fccec67e1ab2352721971d3d2473d804e2830e27761e052e3af pcp-export-pcp2xml-5.3.7-7.el9.x86_64.rpm 682e12aca0d2b46448e3df4c1e6358cc723804d15a13b170f8fff6eede7505a9 pcp-export-pcp2zabbix-5.3.7-7.el9.x86_64.rpm c78d0f70e58a491e7d3613bd00cde14e714fd59bd7c59ec0da15f4d1c50c4472 pcp-export-zabbix-agent-5.3.7-7.el9.x86_64.rpm 9a45973f9fc00176c05e07378246f4ab87d37cae4500cdd71a240d91195ce59b pcp-gui-5.3.7-7.el9.x86_64.rpm 5a0f60cae705fd1268bb0a43b4ba03185109cea2e0eb1b44572f62aee162a6e5 pcp-import-collectl2pcp-5.3.7-7.el9.x86_64.rpm f02b019c0f28fcdc7f273137c0e47eb44bf8507bb8e5d43c22453f61b18b866d pcp-import-ganglia2pcp-5.3.7-7.el9.x86_64.rpm abde6658e2660a76d45f932f958012b0571a67906553ebf1d1c898c60fdca2c8 pcp-import-iostat2pcp-5.3.7-7.el9.x86_64.rpm de0b64fddb4fcdb61e58900d78983de6d417bcc818da95f1b566ae42ab97d8bf pcp-import-mrtg2pcp-5.3.7-7.el9.x86_64.rpm 5b537b517e63de8c03ed8e4b37dda109384450c265a59b9f32c3499a45eccb8f pcp-import-sar2pcp-5.3.7-7.el9.x86_64.rpm da6ad333590ea6dc381c4841f5992fc314c5955d4ec75e4965cf50f954796453 pcp-libs-5.3.7-7.el9.i686.rpm 54fde7606567b5f49aa2b9e271cc4d145cb21aafb32f60b776c19595bfdb7e29 pcp-libs-5.3.7-7.el9.x86_64.rpm 34a1d3e5f1356fa62a3436fe010724617a03b120e458628527c15cef0dcba418 pcp-libs-devel-5.3.7-7.el9.i686.rpm b483c2d71c735b0ec55e9504a5d20eb719828bd7eec9503b70acb4e9099d5e78 pcp-libs-devel-5.3.7-7.el9.x86_64.rpm f4b9fabc38ee97430dd013352cb0e0ebec3b8bb5edc730f46c7f9ef56b11c352 pcp-pmda-activemq-5.3.7-7.el9.x86_64.rpm 4bbef93c6c2b40fc2fc0b0ee36848c9e18b2fd68847214756226184ba1798566 pcp-pmda-apache-5.3.7-7.el9.x86_64.rpm b03b3247bb4c3eb77edfac387eb560284f2a74f54980b7c05b2cfa4b6042b290 pcp-pmda-bash-5.3.7-7.el9.x86_64.rpm fb66155466d72090e60e4683c84b9d61caf9c76ef503dff68b7d246aac781d7e pcp-pmda-bcc-5.3.7-7.el9.x86_64.rpm 41d392dfbf168a54fce27fec31c87a8eff56815f382c8c5344448ba2262176d2 pcp-pmda-bind2-5.3.7-7.el9.x86_64.rpm 4c953afd3f76a25ad4d214466dd79e4d525564aa531a8b8f08d76558105544eb pcp-pmda-bonding-5.3.7-7.el9.x86_64.rpm 1c627f18331985d5f23d114a015cdd40d2f813aa143612ff6992585d406a302a pcp-pmda-bpf-5.3.7-7.el9.x86_64.rpm a84dfe1b5c922b44a797d6bb731218319da912ccd5332759e16b4a809d55097e pcp-pmda-bpftrace-5.3.7-7.el9.x86_64.rpm 57cc1675145353df62461dd0d6bdd14c462c8b50026ea1433f5176898909e1af pcp-pmda-cifs-5.3.7-7.el9.x86_64.rpm dde128247f14a5288a3fc6c873f3f31be82a37e79b222c7a3a9c5f950dd2de7a pcp-pmda-cisco-5.3.7-7.el9.x86_64.rpm 5742ac46b4f348f481fe3b202b3f9e229b3d0fd0cc8db54aae8f655bac8d305f pcp-pmda-dbping-5.3.7-7.el9.x86_64.rpm 4c7cd746fcfb119b081d93ccca6ea65b9bce5902887704ba8b2f5fb590233ff2 pcp-pmda-denki-5.3.7-7.el9.x86_64.rpm adf637dbee92bb4e3a9e11c6f69ffa00612b9a847f588fc11fecf6b63a0d1419 pcp-pmda-dm-5.3.7-7.el9.x86_64.rpm 37f6c1c57c3cd334334eddd63963bda8e4a05fe33feeb2d8022b83785c24fe83 pcp-pmda-docker-5.3.7-7.el9.x86_64.rpm 98fae90773d5c95738f93f488b59a9f581f23865d1f9f3b39b59b7ec02eb54b2 pcp-pmda-ds389-5.3.7-7.el9.x86_64.rpm 228a7585e65a43b81d486403fed67d479a33b38b522de6b955e6b0f209ec1fc1 pcp-pmda-ds389log-5.3.7-7.el9.x86_64.rpm cabb7fad64bd080771fccf90c8bf0439d3b866ad5dee7871357a29bda1cd864d pcp-pmda-elasticsearch-5.3.7-7.el9.x86_64.rpm 52fa7b9d64f669ebbe26249a4f94082e70ce8b20b2e953a89aa7e103fec024ac pcp-pmda-gfs2-5.3.7-7.el9.x86_64.rpm 05294fee0e5961cfef88e0ebce763a6e36de2fd50d3520fca84d0ef821a10cdb pcp-pmda-gluster-5.3.7-7.el9.x86_64.rpm 43cfb084bb796d355d9dd50ebbd8348e5e944e66b70eaef312558a2789c0272a pcp-pmda-gpfs-5.3.7-7.el9.x86_64.rpm 5d0701250f27f51b5b1a3d9dc4d9c4008e4531fc08488254bc8d8a17695f2908 pcp-pmda-gpsd-5.3.7-7.el9.x86_64.rpm 9bebaadb58a36ee744554affbc871fe732f53309e74a98a8e9bec417eeb64eac pcp-pmda-hacluster-5.3.7-7.el9.x86_64.rpm e210dfa911b6ac36e2408e02e2cb4c04d69552f92a3bf091455f0da3a8316b3e pcp-pmda-haproxy-5.3.7-7.el9.x86_64.rpm 1f1cc9af51bb8bf34b117b25c16af463acaea93452210739ed392c31273db801 pcp-pmda-infiniband-5.3.7-7.el9.x86_64.rpm 21b94c8fdaea67e011fd82d529255f962752c196686c56e2b6a829925aec5c6c pcp-pmda-json-5.3.7-7.el9.x86_64.rpm abef33a2fcd03338092f9d220da7c7a1478a7785f57a1d02e27ccff4e0d40dbf pcp-pmda-libvirt-5.3.7-7.el9.x86_64.rpm d14ec3ac6467cb5a91059d1d546858b5df1029b581bc87472d07031440b8b55a pcp-pmda-lio-5.3.7-7.el9.x86_64.rpm 8b2ed271e688b08e5af7fd8a5cc3cb0425322177d928431c4cd03b05c7cb712b pcp-pmda-lmsensors-5.3.7-7.el9.x86_64.rpm 9ed0241edf77ec428ea178f0b932d34b948223a734938e6d7392da82d889295a pcp-pmda-logger-5.3.7-7.el9.x86_64.rpm 72b28e997f68d21ec8b53e1c921de0f29eff7e3268464036c2531ec6262442ba pcp-pmda-lustre-5.3.7-7.el9.x86_64.rpm 2c9db8b81fc86683ab72c93f8e1feb1bb5939a255912c24b2b7a2844c03fb5ed pcp-pmda-lustrecomm-5.3.7-7.el9.x86_64.rpm 06522306cef6bf9523ec1f3a002f005289a0479b9bcf9abce2a6598c09c02e80 pcp-pmda-mailq-5.3.7-7.el9.x86_64.rpm 6aa0293807d678d4c55beed8718bdbd01cfa8d1cc1e9150953984a55f97aadde pcp-pmda-memcache-5.3.7-7.el9.x86_64.rpm d18a97a2df05dce8f1623dec762563e419fc41ceed78e86265b22ba319ff4d63 pcp-pmda-mic-5.3.7-7.el9.x86_64.rpm 5867752aa9ccf90042b215f749778e1d15f3d27ef1de30fc48b4aff3a936bb16 pcp-pmda-mongodb-5.3.7-7.el9.x86_64.rpm 61a50bbb5a9ce626987f133037714cf924e1a0413a050e395dee0be8cb8ef90b pcp-pmda-mounts-5.3.7-7.el9.x86_64.rpm 4b1c8938fb54f5edfd6110b60c9d2368cb5dd31e7f1942d1453fc10cf67c3ba8 pcp-pmda-mssql-5.3.7-7.el9.x86_64.rpm 31bc2461c2d0700d7f9f1dc66694c730cff2b2194ec048f8195f316c1930a21b pcp-pmda-mysql-5.3.7-7.el9.x86_64.rpm 35607851f9a062b09b880519d614f595cdd330e76f4f46e0a13d33031bc378e1 pcp-pmda-named-5.3.7-7.el9.x86_64.rpm a4278d65ce8d2dd56bd5abe9737030e99b337ab3e450bc0e09e63830d57908be pcp-pmda-netcheck-5.3.7-7.el9.x86_64.rpm a1e478a0f38d4695557d0bf426e7b00d4b1cdc5e04a562db4c142c8f08ae5ad8 pcp-pmda-netfilter-5.3.7-7.el9.x86_64.rpm 5fd8a881bae8f91d1744248da0acfa188104593f2db29e9c65776270706a4185 pcp-pmda-news-5.3.7-7.el9.x86_64.rpm 8b6e8bad526e20fbd3072c6010d2e4d84b477dc3fa9521988995537487a18a65 pcp-pmda-nfsclient-5.3.7-7.el9.x86_64.rpm e8c9dbdaece222ad4da075696307fd22b51ee0cd5d5664357c750c3f82d807a5 pcp-pmda-nginx-5.3.7-7.el9.x86_64.rpm 0eb49c26dfab8923569871ad57b099d39e6673176eb59cb2ee74950a3c90f6be pcp-pmda-nvidia-gpu-5.3.7-7.el9.x86_64.rpm 4334f9e143a09b85ba8c7f072f70fd648edc365d6e0cf0caa4855745da6a9bd5 pcp-pmda-openmetrics-5.3.7-7.el9.x86_64.rpm 14eec24865c9e25fe8ac172a574424c1a560fdf063f2bb3489a89703e421843b pcp-pmda-openvswitch-5.3.7-7.el9.x86_64.rpm 3781a368424c297193b82eef7296ed0c8de55fee90db1dc2170d648d0cdc02a3 pcp-pmda-oracle-5.3.7-7.el9.x86_64.rpm 2530b18c4b291e59961544ad48690a4965bfd371cdb70e82db686939e542c580 pcp-pmda-pdns-5.3.7-7.el9.x86_64.rpm b35a174148194b05358bed97a7e33ad17a0116f0fa89ee313ff6a919095f88df pcp-pmda-perfevent-5.3.7-7.el9.x86_64.rpm 590b75c0827f04d00905b3af2924dd343811b406734eb97ec1dc584080559be9 pcp-pmda-podman-5.3.7-7.el9.x86_64.rpm eb3b571a8f15bdf39113162423104db459987586c8b89e3d54529a062cd74c88 pcp-pmda-postfix-5.3.7-7.el9.x86_64.rpm d7f20e2d7d62bd711e81080c93bed522011a3e13b8e5b492092a67380b3a1074 pcp-pmda-postgresql-5.3.7-7.el9.x86_64.rpm c5b16753080b48d492acfa47d27503fe87a7a94be230b56e4071989eb6f91b1a pcp-pmda-rabbitmq-5.3.7-7.el9.x86_64.rpm 8ca2186d184c8fcd760ab74b28b1a34eca850e295903a6faaa3bec9b3f63f0b2 pcp-pmda-redis-5.3.7-7.el9.x86_64.rpm d773636bb7a5fe1068d2dfa7634384385cb041c99cb5d1f6ee63830f517353f2 pcp-pmda-roomtemp-5.3.7-7.el9.x86_64.rpm 55b2b6c81f3044fdfccc86fc2460ef5b0b244a24a815c304ad50169ac2faf255 pcp-pmda-rsyslog-5.3.7-7.el9.x86_64.rpm cde07c14e58bd770a197f3bab7d2b33e345eb50f98cf542251dcef2e58fa6b6b pcp-pmda-samba-5.3.7-7.el9.x86_64.rpm b0978f929f0d3990e122f8ee616288e636e277fd6bc91ce8bc55708defb4ec87 pcp-pmda-sendmail-5.3.7-7.el9.x86_64.rpm 2b29cbd51a37d94a055fd6d2bdad2e87036c1790cb5f1ce2d382dbb9226f3796 pcp-pmda-shping-5.3.7-7.el9.x86_64.rpm 26a6fde9e14da01a7518c8985734ef2d62a036e8f1778e342d270b731fc06894 pcp-pmda-slurm-5.3.7-7.el9.x86_64.rpm 89b01297e1282f839e2474ce3cd23258794a0488659bb0922ae37158a02dffa7 pcp-pmda-smart-5.3.7-7.el9.x86_64.rpm d0ba0b074b73adad835e0da94323ab0795615510ab5b15476a7624c67af087ab pcp-pmda-snmp-5.3.7-7.el9.x86_64.rpm 001c6decb65cc8d6ce3b02138535ae4ae222d33ab4437b9914502316acc106e7 pcp-pmda-sockets-5.3.7-7.el9.x86_64.rpm ca288c63854d507e9afcecfa170b21675f4bb4b94c6ddd7a02eb1a4c83186878 pcp-pmda-statsd-5.3.7-7.el9.x86_64.rpm 9c0f836537990feb9710bfa9922fd44f4f2408ee3be5ba75425cbb6262f0db87 pcp-pmda-summary-5.3.7-7.el9.x86_64.rpm 19c3e196a4856cb630769c6ca158b85445ee6c5a158b5b7958698689d32cd970 pcp-pmda-systemd-5.3.7-7.el9.x86_64.rpm a1940210f1c33cbc024a332bb250cdec065fb05602e2d07c86a373afd9a0d583 pcp-pmda-trace-5.3.7-7.el9.x86_64.rpm 4ca5091c96f436eb8e93e85bb3ec4f9cbe7c244e2baea575ddf80e59c7951398 pcp-pmda-unbound-5.3.7-7.el9.x86_64.rpm 1f6e254d7b901d5db7dbd499669168efeac5f976b3dfc3d3c8fd0f484b00ba26 pcp-pmda-weblog-5.3.7-7.el9.x86_64.rpm 830cb130a43bddbfa80015bb4985188b989717eed59174b06b941609cea102c1 pcp-pmda-zimbra-5.3.7-7.el9.x86_64.rpm c113cee5590adba9bea06c5754159ceb602207c1a24278f6cc036ea191795658 pcp-pmda-zswap-5.3.7-7.el9.x86_64.rpm 1af9801db336d77669a3506bba1b36dbf62184f19c5c1d996aaab7cde94a039a pcp-selinux-5.3.7-7.el9.x86_64.rpm e9d759a3d5da0a75e040fc841213fc826a889e4f6fd663c4316a3a90f53dc467 pcp-system-tools-5.3.7-7.el9.x86_64.rpm 41d82d8e3392f4ce1da2f16f42ec49a827b42a053e1eff7f365c74e8089e9f35 pcp-testsuite-5.3.7-7.el9.i686.rpm 39cc6c1f585f0d1e917fa8c397cc31c513c30190403b4851adbe544f2075b972 pcp-testsuite-5.3.7-7.el9.x86_64.rpm 5fa2d6191d6ed868d28d74be131afc1ffcee67e553586d77eb57fa1c35d8358e pcp-zeroconf-5.3.7-7.el9.x86_64.rpm f4bf46c644cefdb5512b26f53056a83848533a9250cd384d923bc1bfa6ac6263 perl-PCP-LogImport-5.3.7-7.el9.x86_64.rpm 44fc146b3e583e4dcce189e41cd1da843ca78a136cf3f4053589ea0cb7270732 perl-PCP-LogSummary-5.3.7-7.el9.x86_64.rpm 175b0dd1ea7ed33e0ddef249423c8aed9c9bf5c2dbce73025c69eea4ba3eed89 perl-PCP-MMV-5.3.7-7.el9.x86_64.rpm 25e5691d2bf8c645341fb321d2e5c5f45298bd5b031ec06dc0daacc07e29b900 perl-PCP-PMDA-5.3.7-7.el9.x86_64.rpm f7cedcf1efc5378cd5ed05a24752556c3c096b8c7b75a9fab77205050d20723f python3-pcp-5.3.7-7.el9.x86_64.rpm 74a1b9cccba3dcecee9cf3d6d636421ab2b2e4e08a64596dd9cc78792d974507 RLBA-2022:7990 flatpak-xdg-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak-xdg-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-spawn-1.0.5-1.el9.x86_64.rpm e12118305dffd8e8a421660d7899d4a2008e5659f473b820c3b9758911c1b386 flatpak-xdg-utils-1.0.5-1.el9.x86_64.rpm 806d5734c94fffafd6b432cf9a813c60343fc937ae091d2bab1298387af93820 RLBA-2022:7992 libestr bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libestr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libestr-0.1.11-4.el9.i686.rpm c89f7091daef0d56cb646aecd063cc89aecb8561d2beb113c8e79de91a3dae6a libestr-0.1.11-4.el9.x86_64.rpm 311360768204cf58a79d72f92e5fa25671cfdaec398ad3fc90cacfbcfb0f83eb RLBA-2022:7994 evolution bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-3.40.4-6.el9.x86_64.rpm 63f59c74ffcec300bfff30b8d56d8e2cabbdefda98c2cf49ff0883c09ee45239 evolution-bogofilter-3.40.4-6.el9.x86_64.rpm 4b5cd6d9b38014aa1847327c49f3c3981642b9e797fa35e13fe9340db2053a1c evolution-help-3.40.4-6.el9.noarch.rpm 7b67cb16b5f085601d654b537b388c090423d90cc851be33dd74e9c195dc4294 evolution-langpacks-3.40.4-6.el9.noarch.rpm 80c1b3448aa997afb16b8696746bc14839c5fc1efb6e013bd0fa268612993c70 evolution-pst-3.40.4-6.el9.x86_64.rpm 222f8d9d65f0cc6d8f027f7788f319a0f1cff29e0833dde131b26fc8cc260867 evolution-spamassassin-3.40.4-6.el9.x86_64.rpm cd38dec19299bf8b08eea4c871daa3e405986576bc8315d5a62a4e4a86516152 RLBA-2022:7993 mod_wsgi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_wsgi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-mod_wsgi-4.7.1-11.el9.x86_64.rpm 3186a8b911124746e2632ab8be6ecdc289036a884e3e7cca9cec42ada88bc7a6 RLBA-2022:7995 evolution-data-server bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-data-server-3.40.4-6.el9.i686.rpm da397784c3524325a57ea5bff13a1ba86dfc00ea09c006fca62b68421aa984bb evolution-data-server-3.40.4-6.el9.x86_64.rpm 6b3e20586e0fb36fd380503dd439750e032ee433daaca2c611fd6e4f3f4f254a evolution-data-server-devel-3.40.4-6.el9.i686.rpm e88b5d32a1e761af9658c4bc2af305f2a0da87a490438d73a72de6c65fbc24c2 evolution-data-server-devel-3.40.4-6.el9.x86_64.rpm 03c607ee947a55264a69525b9aa1aec64dad06d8325e1234eb32dbd9d972448e evolution-data-server-doc-3.40.4-6.el9.noarch.rpm 93ab2ed7576d23b294b1db56171dae650df9b660b2c8bce44a0e6da2e1df184d evolution-data-server-langpacks-3.40.4-6.el9.noarch.rpm db81a56031c693d5d1cd9b7e6fd4d88addb685a57aeed735c95724468034dd57 evolution-data-server-perl-3.40.4-6.el9.x86_64.rpm d871f020d8ced243917204a0012c9e90032614fa5f18eec8b24d7ed85a783ab7 evolution-data-server-tests-3.40.4-6.el9.i686.rpm f404ad56a2bf7d94822c3620c05115579628b21c20feb677f748e184cb6a9107 evolution-data-server-tests-3.40.4-6.el9.x86_64.rpm 499c75494c55be70cc7ba94d6963b0a5175e2ededa6123277e4d717ea46d4546 RLSA-2022:8011 Moderate: fribidi security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for fribidi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FriBidi is a library to handle bidirectional scripts (for example Hebrew, Arabic), so that the display is done in the proper way, while the text data itself is always written in logical order. Security Fix(es): * fribidi: Stack based buffer overflow (CVE-2022-25308) * fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode (CVE-2022-25309) * fribidi: SEGV in fribidi_remove_bidi_marks (CVE-2022-25310) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fribidi-1.0.10-6.el9.2.x86_64.rpm da453272ba50af82b42370ab516b4de94977072a4069f657c84e5c357d572bc5 fribidi-1.0.10-6.el9.2.i686.rpm 34e056cbd3e37b9cbd1da8430012d747b45d0eceaf9648f2cb507c6527a1539c fribidi-devel-1.0.10-6.el9.2.i686.rpm 223dcd2aea91860af3b6e68ec99631a3bce23a1c4c752296e6dc2af0b3f16870 fribidi-devel-1.0.10-6.el9.2.x86_64.rpm 4a6b9992cc89bc774d8141080df63af1516eefcdfe6450ec85da36fd47e3e51f RLBA-2022:7997 xdg-desktop-portal bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-1.12.4-1.el9.x86_64.rpm 5b69bca006861baa18cb3a5e35394012d0ed0b49e18441b4246aecb476684716 RLEA-2022:7999 xdg-desktop-portal-gnome bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal-gnome. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-gnome-41.2-1.el9.x86_64.rpm 7bb9428acc9ef87979050d06e4e975e053a17ccd38d5656039909c20d6be90d5 RLBA-2022:7998 gnome-tweaks bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-tweaks. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-tweaks-40.10-1.el9.noarch.rpm aaa2c4060fb312151b4c35249fa0a32d4301932f1ea81f57e9cbc68b1a3e9da5 RLBA-2022:8000 wayland-protocols bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland-protocols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wayland-protocols-devel-1.25-1.el9.noarch.rpm 3a912fcd7eaa246e88b4bae743895e34228b4dac59c387b671e4994708954b4b RLBA-2022:8004 rpm-ostree bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2022.12-2.el9.x86_64.rpm ae5615f173f2691dedd7a531190010fab535795e4826e07ea634408bd674f74d rpm-ostree-libs-2022.12-2.el9.i686.rpm fba0f7fb3e5742b38d46e02902cad74e2345c925276fb9eb28ebe08593710066 rpm-ostree-libs-2022.12-2.el9.x86_64.rpm a222c74f2e68887a97bcaa5c2ef20221cf6c33f4e5d4eb8aa832b14ed773b665 RLBA-2022:8005 ipxe bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipxe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipxe-bootimgs-x86-20200823-9.git4bd064de.el9.noarch.rpm 00192a333bae22063d4782365c916aad980288d7e2db31a24cc4fb9d7a1e58ee ipxe-roms-20200823-9.git4bd064de.el9.noarch.rpm 790a3f2840fcca13eb25fee64b11ccfa199084a66b317607bea6ad57d9e558a0 ipxe-roms-qemu-20200823-9.git4bd064de.el9.noarch.rpm 571c22893e831cd0b2f5b79611684a4a9b2d7443444188a8b3d24d2f01115f38 RLBA-2022:8006 gjs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gjs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gjs-1.68.6-1.el9.i686.rpm dd220454af47dd472627be699a5f9f0711444405489578c30cba9e3a2ea07187 gjs-1.68.6-1.el9.x86_64.rpm 29a9d4662db1efd9c5be705bf931d7f946e03fed1584b9fb557c97d7a6fff768 RLBA-2022:8007 libvirt-python bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-8.5.0-2.el9.x86_64.rpm 1de6fbb9601b277c40d0f46d0266b9a337c3998a0b1414a66ad0307df6c2bd0a RLEA-2022:8014 tomcatjss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcatjss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-tomcatjss-8.2.0-1.el9.noarch.rpm a94f3c18e8f044139c200e0517b93d550cb16fa5593b638d1977eaa492b6ed2e RLEA-2022:8009 jss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-jss-5.2.1-1.el9.x86_64.rpm fa737b0c3ee90e6463989b7c235f2d7686c124895d4219180779dbaa08d2acda RLEA-2022:8010 ldapjdk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-ldapjdk-5.2.0-1.el9.noarch.rpm 004262e302baeb622832e882808b98d3c848e00240ef81f026b2898869ffcb65 RLBA-2022:8012 xdg-dbus-proxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-dbus-proxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-dbus-proxy-0.1.3-1.el9.x86_64.rpm d577de2e576b019218ef9db79c6364e17bc6cc612909484936cb2e03d3a6c95d RLBA-2022:8013 gnome-shell-extensions bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-classic-session-40.7-2.el9.noarch.rpm 990688f4cd3ff5235e13e912e874979c0c8300349cace7518e113b50f8aa1c50 gnome-shell-extension-apps-menu-40.7-2.el9.noarch.rpm 7c0e3186f3d07c4bb540babbb87f256aaf03d6f25ea13edc4cc9066183b8ba2b gnome-shell-extension-auto-move-windows-40.7-2.el9.noarch.rpm 31fdf452708625689e5d08e4537babaff88caca0c6158577ea6db9a76f2acd39 gnome-shell-extension-classification-banner-40.7-2.el9.noarch.rpm a2f0cf98bba752734277ca3308b792826ddc9313a744fa7cf704e1f78eb7ba53 gnome-shell-extension-common-40.7-2.el9.noarch.rpm be9e5b0e1d57ec9b6d3c4ea137c35aac1a44775343f002e5b2ac976ff258352b gnome-shell-extension-dash-to-dock-40.7-2.el9.noarch.rpm 39ae3b3b5656e4ba3d334ef195a39859e694fd88c7af85f6d171da4871719416 gnome-shell-extension-desktop-icons-40.7-2.el9.noarch.rpm d2ad825b121db10ea0aa6f90ab6575ebfdb00d544cedbad607ce9db78258185c gnome-shell-extension-drive-menu-40.7-2.el9.noarch.rpm c296a856ae2e48020422446f5c53f48222acff8558e039f16d0e5e5b56bd74f5 gnome-shell-extension-gesture-inhibitor-40.7-2.el9.noarch.rpm c67a680f9d3d7e32dd89a77bfd461b4381508ed9ac5de66c0014533f543fc1a0 gnome-shell-extension-heads-up-display-40.7-2.el9.noarch.rpm 9b511d1bb34b86a24f4b29b883c0a28638df3d62c3a10a8c1bdbb792a3e30e32 gnome-shell-extension-launch-new-instance-40.7-2.el9.noarch.rpm 6e5852626a9790ff7dcdc4b0a3b3d60035dd9cfe33163bab47de94a1988cf784 gnome-shell-extension-native-window-placement-40.7-2.el9.noarch.rpm 4133f12d27d29ca4a710a02a32fb1842c0073b523d55c4b45fe4b79f43984002 gnome-shell-extension-panel-favorites-40.7-2.el9.noarch.rpm 6568cb2f57eac309e030247d64cba70a29eec5a3e7bbc2515d2d7dca73105ca8 gnome-shell-extension-places-menu-40.7-2.el9.noarch.rpm 9c9e347ab95fa105d9e351f044e4e1fb523442448f51b7f3aaacf9f3a7136768 gnome-shell-extension-screenshot-window-sizer-40.7-2.el9.noarch.rpm 219c59ac1826555af1bddfab311ca1573bd495aa086c7088aa11517dc12d3220 gnome-shell-extension-systemMonitor-40.7-2.el9.noarch.rpm fecb8109d2537434f831abc6271a254c61c3b8e730fdd70aa36be5a0101bf68f gnome-shell-extension-top-icons-40.7-2.el9.noarch.rpm 8a611b952ad4c5d1bbd96a6e718c70500b1a0c8638b89ebf1839ba6582c7bd5c gnome-shell-extension-updates-dialog-40.7-2.el9.noarch.rpm 1d6a8f997ed44d3839171b0e706ee6432b480ff0f583a562061c7aa5afa00754 gnome-shell-extension-user-theme-40.7-2.el9.noarch.rpm 4f063f27dd2b89ffe4eaadb73f5da88e8c0f6f48b22897fba15569cc756e9304 gnome-shell-extension-window-list-40.7-2.el9.noarch.rpm b4f80345761ce454a1194a905ca297d60dfb748a5e72b8b29ef7044614ccf0b5 gnome-shell-extension-windowsNavigator-40.7-2.el9.noarch.rpm 84c94bf7776727e12861f5a4968f1534de22bc0e2c81920b6a9868d7dbd5d0de gnome-shell-extension-workspace-indicator-40.7-2.el9.noarch.rpm cf96dbfe2991f2df9514f79e16b72e3cd414381f12c7588eee91824dd5abf6c3 RLBA-2022:8015 python-cryptography bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cryptography-36.0.1-2.el9.x86_64.rpm 0325bc0114d7326f9207d2b890e937897d416fc9acb97a86ed5d6810f7628f29 RLBA-2022:8017 augeas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-2.el9.x86_64.rpm b4f129cb03300710d2139134f285a7b613c7cb9fd9f61bea7603dac8fa2cfecf augeas-libs-1.13.0-2.el9.i686.rpm e04e9fd643a881f9df23e36bfbc2c3959b483fdfdcb6fc2bc6472e738cdfe5f4 augeas-libs-1.13.0-2.el9.x86_64.rpm 0d0f8cdc9e961fde1577a5203f71db7640da59869a62a5de4fd7bb667d6f0bb0 RLBA-2022:8018 lorax bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-34.9.20-1.el9.x86_64.rpm 4ecceef5f5ad62773431607fc2b6bfd98a73f6ce034713cb27c0122873e8cd80 lorax-docs-34.9.20-1.el9.x86_64.rpm 5d3987367ad06e214c622623da6cc7d07d50610e3c528c12ad18a1f90b67c67c lorax-lmc-novirt-34.9.20-1.el9.x86_64.rpm 6f442aa7d619189764745a14f34cc1edc75ae3d36a727afbf6c9987d4fef3438 lorax-lmc-virt-34.9.20-1.el9.x86_64.rpm 8052d9c1d15b08e15099dcddf6556eb33e5da60e7196a1bee2bca1fd76719e62 lorax-templates-generic-34.9.20-1.el9.x86_64.rpm be8e3393384c5db7ec2b02283d794e65a85b98e727b63d61b0c91bf783491d3c RLBA-2022:8020 oscap-anaconda-addon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oscap-anaconda-addon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oscap-anaconda-addon-2.0.0-12.el9.noarch.rpm fd5384db0a2d285cbe5457a291934c462543e5b5172b913b897b0146c66c4b6b RLBA-2022:8021 qgnomeplatform bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qgnomeplatform-0.8.4-2.el9.i686.rpm 4b5b117d2558715ef1d18cd425555747f227bb6c0b5c0cffaa55da510eb9343c qgnomeplatform-0.8.4-2.el9.x86_64.rpm 1246fc28de4856095b22cc825f3c427e45744bec87f4f476a44cbbf3a4b48454 RLSA-2022:8022 Moderate: qt5 security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-5.15.3-1.el9.noarch.rpm c39fef040a43baa7e9026cbaed0724adfca06ee9e078171bab817f2972228030 qt5-rpm-macros-5.15.3-1.el9.noarch.rpm f8a3d9cbc578d0da895f387154042bbf35e1cdba5a5dbc9e4e3e6182238e0ded qt5-srpm-macros-5.15.3-1.el9.noarch.rpm 39f47b9331907f8d26120e199684c714acbebc81b6dfe415769ba7ab0788a101 RLBA-2022:8023 qt5-doc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-doc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-doc-5.15.3-1.el9.noarch.rpm b3556a302b304d46009f826c3e777f883dd1c1d246bfbc40f8b4cf00933bfd88 qt5-qtbase-doc-5.15.3-1.el9.noarch.rpm 94bd19050ca31afabd3c51c00026bae4db3ef3cf63f4bb9e4114949f85620629 qt5-qtconnectivity-doc-5.15.3-1.el9.noarch.rpm 214766b39b53ff4929a366bb5ed5e66d08a40f3ecc31289fb08eef80935dc4d5 qt5-qtdeclarative-doc-5.15.3-1.el9.noarch.rpm 8612bc82903f03f0e08202e059d26e57a2a4430a9fc09a82d640fd9250263e1e qt5-qtgraphicaleffects-doc-5.15.3-1.el9.noarch.rpm f261e70dc417f210e2293383cbbf5c16fe45f1d4a85cf4d10b10b99f0a86188e qt5-qtimageformats-doc-5.15.3-1.el9.noarch.rpm 1e5f07f2a6f31415bd8ac4f00405981281af382cdd38e62dc8ba50259cde84cc qt5-qtlocation-doc-5.15.3-1.el9.noarch.rpm 7286513229bf8a719eb643aa18390ec213529e97d77ddef11b10548085a6617b qt5-qtmultimedia-doc-5.15.3-1.el9.noarch.rpm eede390598ba9bdf93cadbe225445a7a6563296d79c9fa2fa6a4a0475a68564d qt5-qtquickcontrols2-doc-5.15.3-1.el9.noarch.rpm 4405bf5cbd416e20f62fcf3933fa61d65dcdb80be01271182da1b75be0740434 qt5-qtquickcontrols-doc-5.15.3-1.el9.noarch.rpm 8c4d8b70b8ea468e3e76a85e452ce6fd4e8a6d6e3e6c44123b8f74380fdd6a17 qt5-qtscript-doc-5.15.3-1.el9.noarch.rpm 24da9173a89b9d98974721de74512d52c337803979235cceb26a6eabfcdfc65c qt5-qtsensors-doc-5.15.3-1.el9.noarch.rpm e4438bd2b520ee39ab0fca910bc11026aaf58e286cd692dcfc38758801c70c58 qt5-qtserialbus-doc-5.15.3-1.el9.noarch.rpm cd780a3244d4d7af5ee419ca2bc5f63b71f9574351b067bbc19b5d1b6949bbf5 qt5-qtserialport-doc-5.15.3-1.el9.noarch.rpm e66e4e5aac0c9f3e211059639b9e33c836f2f2455cca9a0ca5fb621e8fda73a8 qt5-qtsvg-doc-5.15.3-1.el9.noarch.rpm 777be179df1b2df52be9f2af4ca13b3b9b5716dff86c78989329c5d41bf00fe1 qt5-qttools-doc-5.15.3-1.el9.noarch.rpm 62944d7e3ab4f532874d7d57fd24652ad4fb56671a259927046ad3d9e2d43b5f qt5-qtwayland-doc-5.15.3-1.el9.noarch.rpm 1a0968b443a1a9aebf097abce7ef5e005d5717750f0ae172c361e6adf73e2a55 qt5-qtwebchannel-doc-5.15.3-1.el9.noarch.rpm dec17c9313743e1df8d735f98f1a650ef7c58b01f525e487c60817717311f4c6 qt5-qtwebsockets-doc-5.15.3-1.el9.noarch.rpm 4607214d0a2cfa5feb6272fe5bc6d5e4d4d25469ccdf70e37040d71ed3f57721 qt5-qtx11extras-doc-5.15.3-1.el9.noarch.rpm 5c5c8e9c9f404346e918cb31cb50ab4992438417c46e765621b1340aa74fd708 qt5-qtxmlpatterns-doc-5.15.3-1.el9.noarch.rpm 566c57cd2ef171b82b9740f540e5a5137c4350f485dbbbb88bb1e8986b6e166d RLBA-2022:8024 qt5-qt3d bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-5.15.3-1.el9.i686.rpm 73f2c3d3dc90c691fcbadc6dcee936236658f76e2cc4e931c3d57b4ec4564ec8 qt5-qt3d-5.15.3-1.el9.x86_64.rpm 509dc82dd85b25568e73e83dd7a21f8a387941596fd67b02a9b23c5dde1ec027 qt5-qt3d-devel-5.15.3-1.el9.i686.rpm 5c7aae2b8d242c6ce7c6ed3bf099df9e8bbae6957b8c5811aa0837d0a1f0134a qt5-qt3d-devel-5.15.3-1.el9.x86_64.rpm a462a937a3279fe2e58c81f864cdceebf5a48f1817d1958b35f9770b1b037e8f qt5-qt3d-examples-5.15.3-1.el9.x86_64.rpm c08342b8e1022e85d022d883ba22c0369cd90ae4f23c354e0d67ab112413edbd RLBA-2022:8025 qt5-qtbase bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtbase-5.15.3-1.el9.i686.rpm d870f29a05093ed8c7c7168764544825a8cf7f13d2919562d58f8cbad9436779 qt5-qtbase-5.15.3-1.el9.x86_64.rpm bb0fa3dfdee57234132e94100751f1eecaf49741d0c888d939232431bc0a62bf qt5-qtbase-common-5.15.3-1.el9.noarch.rpm b7f8a1a2a84ca826a32f0c4b0772286ca8c9e931d1970dd970395f51bab931d9 qt5-qtbase-devel-5.15.3-1.el9.i686.rpm e92f1f4a8b2f852fff5f4e5e12fb887085a369414a819737a40fcf0301bf1665 qt5-qtbase-devel-5.15.3-1.el9.x86_64.rpm e51a6701c2b36a570bfeb52daecbea8de971ed485ad3004688d9cb4ba919a5f1 qt5-qtbase-examples-5.15.3-1.el9.i686.rpm 5994fce320d8aea8b4aa3df77511354ec89535b44ece55aa768e0d65fa851aed qt5-qtbase-examples-5.15.3-1.el9.x86_64.rpm a0392c36f7299563c5f04917b0bd9acbad38e4120fa0ecaebb5098116c8e3390 qt5-qtbase-gui-5.15.3-1.el9.i686.rpm 4a63702a587cab5171a78f86c7fd3a40a06ef0df9f0da899d76f7690c3ca7b50 qt5-qtbase-gui-5.15.3-1.el9.x86_64.rpm 5908f0a313cb4000864e3b30922409260a3271dd2dc414b04dabc092967d70db qt5-qtbase-mysql-5.15.3-1.el9.i686.rpm 9500798c4759ce8b2400247b60461628ccc9e2e0acb50b7507733f33a44d2a76 qt5-qtbase-mysql-5.15.3-1.el9.x86_64.rpm f16c6c98aa1d650160abe9986341987d4b3da1c2164b6a6cb7c8fa39585683a4 qt5-qtbase-odbc-5.15.3-1.el9.i686.rpm 4632476c41904d7582abdb3c6a09154e777c0f5b71dadcdd137191b62f9b867a qt5-qtbase-odbc-5.15.3-1.el9.x86_64.rpm 5ecd8a3d00eea40cbb49657eba959c960176272b7beace5d613463168ae9143e qt5-qtbase-postgresql-5.15.3-1.el9.i686.rpm fa6fcd520934daba8ec1bcb6ecc542e050d2cb5d58859b069e8e11550177cd32 qt5-qtbase-postgresql-5.15.3-1.el9.x86_64.rpm 866dc2f8be3abcfd1294f18135cae22857b1af4419df02384619ef06c84c262f qt5-qtbase-private-devel-5.15.3-1.el9.i686.rpm b5d2231f8b8f58ade0985ddae4946cdaa7fe29a052759bd175616a5f0fe7777a qt5-qtbase-private-devel-5.15.3-1.el9.x86_64.rpm 100b0bd9fa60b02e7b2b55b9dda0a02b098893947db85eaa465928b5b990c1f4 RLBA-2022:8027 qt5-qtconnectivity bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtconnectivity-5.15.3-1.el9.i686.rpm 802d33014ce9c28bd749d975912073b4bb58632ad97580d3e99991772c9eb6ca qt5-qtconnectivity-5.15.3-1.el9.x86_64.rpm a0930c3c2d3a2b41ea9112eee8ec4002cac16fc057e5e53772b0b5d07cd0a8ce qt5-qtconnectivity-devel-5.15.3-1.el9.i686.rpm 5378f8591d76c4507ed0829e75049b122032aa86d236d654c3a1878e234c81b7 qt5-qtconnectivity-devel-5.15.3-1.el9.x86_64.rpm 3d44cc227506c139d8e27381ef18954ce8d6e6f0b0d65552ac4edcbc385072b1 qt5-qtconnectivity-examples-5.15.3-1.el9.x86_64.rpm 7d7640995e81b5bbd9f8d83436453343a53577acbdcae41519d73ad52ff81277 RLBA-2022:8045 qt5-qttools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-designer-5.15.3-3.el9.x86_64.rpm 4ce01af679692e6bf5c8a4f5bf1f01d31cc519d5e03b05cd82d007c297a2fc4d qt5-assistant-5.15.3-3.el9.x86_64.rpm efa0a9290ba1cd94ce039ca3c9e38c41aa5801b63d53b5f3351435de31c6a446 qt5-doctools-5.15.3-3.el9.x86_64.rpm b18c9d827231b7f26fe911a28a64624155c554835c7b236c886396c365de0240 qt5-linguist-5.15.3-3.el9.x86_64.rpm 7369c677b9233e2605e927e0a021e73291f84b469f64ac254c0863f3b99be445 qt5-qdbusviewer-5.15.3-3.el9.x86_64.rpm 2f1fa20c14d089548f6b15361b4c84c24598ca368134f6d22411a8b97d83c3ea qt5-qttools-5.15.3-3.el9.x86_64.rpm 69a251ae573fbbf055d2660e5d844372cc7949f4165b5045a1f96be2925e4e18 qt5-qttools-common-5.15.3-3.el9.noarch.rpm 2bdeadd79971b6b43faf3833ad88e1d70de58b4629d1546be737a0062589b9bd qt5-qttools-devel-5.15.3-3.el9.i686.rpm 029b4722ab1d41375311542e23dcab6644d027add865a59845c758122b578ae3 qt5-qttools-devel-5.15.3-3.el9.x86_64.rpm 57f8f0039a1d0054df5097a72f775a7bc7d0602ed3565c307d00ed7b94d20f99 qt5-qttools-examples-5.15.3-3.el9.i686.rpm b8da8c4a3f1d1d43e67538f3015b0e9db2727e0d9bd9b06b7d6f8084e1fd2477 qt5-qttools-examples-5.15.3-3.el9.x86_64.rpm 985e2934632db4172bfd86a0396104ea9c8bf2b22ab38adbe7b27ec5049e6524 qt5-qttools-libs-designer-5.15.3-3.el9.i686.rpm b3db65cb59fd7e658166a262095de2c0ee2e910f4da8f13089ee9ead79ad25bc qt5-qttools-libs-designer-5.15.3-3.el9.x86_64.rpm 40dcc5639acbc53b1fcde54dc6da5f709839bb3d8bdbf7dca377ae43298f43b2 qt5-qttools-libs-designercomponents-5.15.3-3.el9.i686.rpm 93ef3eb0fbe32f8cf6fd04455e6a4d5e5e7480e300ca47e168fe142652f6432b qt5-qttools-libs-designercomponents-5.15.3-3.el9.x86_64.rpm 9fa09ddfcce3ff237858a0ed367cdd85eae34e1b30bfa4097f4429b4444899f2 qt5-qttools-libs-help-5.15.3-3.el9.i686.rpm 2a7be6e1b47035585fd161827a9ac405459bd305167119a18eb2363c6d4ffaa0 qt5-qttools-libs-help-5.15.3-3.el9.x86_64.rpm 86fa29f515c37c411a9646e37f1dd763dcac3883cf394a17942cdffdfef5db52 RLBA-2022:8026 qt5-qtdeclarative bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtdeclarative-5.15.3-1.el9.i686.rpm eb1b60ba00b0832b4a9567a96b227d771a429a099d1b2757f9b028b5f6eaac89 qt5-qtdeclarative-5.15.3-1.el9.x86_64.rpm 6dd6ce59530a550de5bd2186fe46ab6daaba08fce3c4475614b949082268ad87 qt5-qtdeclarative-devel-5.15.3-1.el9.i686.rpm 0b142fcc6d6d9aa1e551956c6b5e14baedf83de57513d97d53c3d766e8fd3acd qt5-qtdeclarative-devel-5.15.3-1.el9.x86_64.rpm b7951169e6fcf052b205e9e84045b90d703d06f3e7fd84d9f86628b45d37c049 qt5-qtdeclarative-examples-5.15.3-1.el9.x86_64.rpm 1c8beee52a729d2996d74f62cd44b1d7312b9a06a653c1d220c241107a5f25d2 RLBA-2022:8028 qt5-qtxmlpatterns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtxmlpatterns-5.15.3-1.el9.i686.rpm c30dfc9a81f24e0be4c6b2acbfa346fda7105a100a0f75b44539d10e52b6f075 qt5-qtxmlpatterns-5.15.3-1.el9.x86_64.rpm ea3c416df8543440ff746107e514adcd71628b12148b863a7c427c9c5dc3e35b qt5-qtxmlpatterns-devel-5.15.3-1.el9.i686.rpm 73314e2a180a4ade9e68ff7ff765537b4e1e3af389132a3035ed76254b4f9172 qt5-qtxmlpatterns-devel-5.15.3-1.el9.x86_64.rpm 8bdf6d8e57944c2072a59c2e7ba7e8f734af7bb389c43eac63d5d1e9d007a350 qt5-qtxmlpatterns-examples-5.15.3-1.el9.x86_64.rpm 967e8e49735edd25c06924bde88f9e157d562d5124a40272e3957a7cb8c0a917 RLBA-2022:8029 qt5-qtx11extras bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtx11extras-5.15.3-1.el9.i686.rpm 99bfd791eeb20bc40bf626052627419364c42098573a0ede3335852327f394f4 qt5-qtx11extras-5.15.3-1.el9.x86_64.rpm e2c070f89f2dff6c2033b0751cf3495d68f8d1a5638226d25381bdd1e2056ab8 qt5-qtx11extras-devel-5.15.3-1.el9.i686.rpm 33b7d98b71e9cd760a6468e86f1167eaaaf69ce4cd1605bb38a6807be769717a qt5-qtx11extras-devel-5.15.3-1.el9.x86_64.rpm ff47959fb8406ccafbd90ef3c1d8fb7ac1664bb594d9400f24b0bebaed662ee3 RLBA-2022:8031 qt5-qtmultimedia bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtmultimedia-5.15.3-1.el9.i686.rpm 8ead89fa7e809b49928ee94edad863e46f69641a6457aedd547a806c511cd4b1 qt5-qtmultimedia-5.15.3-1.el9.x86_64.rpm a51f5a6a20d4bfc52373a82a8af53743dd6990efd8e2d85fcd8a5c41f3fdf74a qt5-qtmultimedia-devel-5.15.3-1.el9.i686.rpm ea1611e7b73a55f98dd0fa22aee18098190676097d11b1dae38152259a775ad3 qt5-qtmultimedia-devel-5.15.3-1.el9.x86_64.rpm de2897579df9ecfcc25ffd7460056b0b4944064bcf1e4a5241996f43fea1db37 qt5-qtmultimedia-examples-5.15.3-1.el9.x86_64.rpm 6b5deaf459bfce9084b34be6c124c29003d1c6bb163175c77b4d6b6395090178 RLBA-2022:8030 qt5-qtlocation bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtlocation-5.15.3-1.el9.i686.rpm fcf0341c49c46bb6682fb67e5ff66f404ea694dfe414fb1dcb6dd70d80f0a548 qt5-qtlocation-5.15.3-1.el9.x86_64.rpm 0992ea8582c426f36d91cca6fcfbfc8517c8048030d50aab63da582db42b980d qt5-qtlocation-devel-5.15.3-1.el9.i686.rpm 14da2dcfb69517e8dc1b25947eeea0060b8d4d2825d7f9c41ac0e2bef42121fb qt5-qtlocation-devel-5.15.3-1.el9.x86_64.rpm 7db45d25b1f5a502166107db19044445c82f01913b10a13594cc89cfa4234505 qt5-qtlocation-examples-5.15.3-1.el9.x86_64.rpm ff2bd0e522f802d2e4fb63e13800c61259774d772fff9095c923b69bac5e8010 RLBA-2022:8032 qt5-qtwayland bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwayland-5.15.3-1.el9.i686.rpm fc418493920ac8536961c1049384f2013b5758a7dc0a3d6866012bff63b52dab qt5-qtwayland-5.15.3-1.el9.x86_64.rpm 2a87ff164ee68e58b70d0b7755d10c3b8a5b71d3f07c868f3e842e4bdd0efa6c qt5-qtwayland-devel-5.15.3-1.el9.i686.rpm 75fae79d0bec1b0fa9b0f96893478fb1f85824dcd73a67be1bfa1dda352fc509 qt5-qtwayland-devel-5.15.3-1.el9.x86_64.rpm 2b0218953b97e573c37f266143289354a36bf5e7c4cac8e39f4fb76f923a0126 qt5-qtwayland-examples-5.15.3-1.el9.x86_64.rpm c44da717e73949605bc8a56e2fc838a2e46ebca777abc25433c469ffdf0736a4 RLBA-2022:8033 qt5-qtgraphicaleffects bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtgraphicaleffects-5.15.3-1.el9.i686.rpm c424ebb4f814332c03f764f7c5cddbc5af0b71f48d77554effc4027c1d6564d5 qt5-qtgraphicaleffects-5.15.3-1.el9.x86_64.rpm 9dc4742fe2e7958a04dd2eb9f9b348ac41d9609acbdfe32dc71a57398d6652f0 RLBA-2022:8034 qt5-qtimageformats bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtimageformats-5.15.3-1.el9.i686.rpm 4f440f90cf53d95161f4d57fb9d425eeef99ccd78a41b90a3bc50bb653c52b94 qt5-qtimageformats-5.15.3-1.el9.x86_64.rpm 4a7cdde976e920f4a72ece1abddfafaaf16be9ef0e95f1d2ce03a4eacf2d3b06 RLBA-2022:8035 qt5-qtquickcontrols bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtquickcontrols-5.15.3-1.el9.i686.rpm bc6aaa6d1a6dac31b0bafeaa38e54fe6023b522b04c3552b633cf6f740d3aaf5 qt5-qtquickcontrols-5.15.3-1.el9.x86_64.rpm b213558e5f718bd4b84d36ad38f52159cacc48be8531fd0892bb22999eb60b7e qt5-qtquickcontrols-examples-5.15.3-1.el9.x86_64.rpm 1f62280eeeeec3599a5224c308153b489886ddb55d341a75b309281f6c2a4cc6 RLBA-2022:8036 qt5-qtquickcontrols2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtquickcontrols2-5.15.3-1.el9.i686.rpm afa65c8f568351d7b4faf854518cfeb7e79cdc3388f779295730f2d0338ab233 qt5-qtquickcontrols2-5.15.3-1.el9.x86_64.rpm 048cca133b6f77dae2356d81d4c5c000cebae8e8109ef5c75566b55d68907118 qt5-qtquickcontrols2-devel-5.15.3-1.el9.i686.rpm f0ae49ff8e43b17ef1af7d97990b58fa356da15ffa70d49849b75aaf398f19dd qt5-qtquickcontrols2-devel-5.15.3-1.el9.x86_64.rpm b491d4b0e3699e80b4a1d71478effc9b934dbd2bc1d18dcc2cda33e2df6b6668 qt5-qtquickcontrols2-examples-5.15.3-1.el9.x86_64.rpm f213bc3014329dca545d29831885733645745afd45c6df2a5059c70b995c244b RLBA-2022:8037 qt5-qtscript bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtscript-5.15.3-1.el9.i686.rpm 70e07def441f391b6cdf45bfb223f4ec8c3c6a019a72b35382c38033ffa4f62c qt5-qtscript-5.15.3-1.el9.x86_64.rpm 9d3331da578e2e2d94efe9d259bae346536e8fdd1946d9788529a25a32d8285a qt5-qtscript-devel-5.15.3-1.el9.i686.rpm b90cf3b4fd9242fdbd61588247059a9ed3a736004c77fa0d1b6ba0303d2d697c qt5-qtscript-devel-5.15.3-1.el9.x86_64.rpm f5dacf6a3dd9ed5d1823e3ae5a9ce58161f304ead63fca34a990e51ca66c92e0 qt5-qtscript-examples-5.15.3-1.el9.x86_64.rpm f7e0ce9cc4d5fe41995a0d9c35c0e10f51ffb51ba2728b84c75560ac2727ae24 RLBA-2022:8038 qt5-qtsensors bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtsensors-5.15.3-1.el9.i686.rpm fec7bcc97b071712ea8608052327f64a221801a17edab539c67855d09d59b6d1 qt5-qtsensors-5.15.3-1.el9.x86_64.rpm 75cf4e933a8d6be5165e3da4b2480b833c9d4887be3c424fe08ff4df9f322713 qt5-qtsensors-devel-5.15.3-1.el9.i686.rpm c2dd2a8fe839e5566298f142041bac2e6d72e6d0b5729e6526a891b676ea3a71 qt5-qtsensors-devel-5.15.3-1.el9.x86_64.rpm cd77feb2ccfb3a8bebd4fab49e197f979817568c76cf2498eef57858c41fca5e qt5-qtsensors-examples-5.15.3-1.el9.x86_64.rpm 710aa63f77c126e307f7f3d55c73550b7fd3686c0afc64c2c22ec13df5025ca7 RLBA-2022:8039 qt5-qtserialbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtserialbus-5.15.3-1.el9.i686.rpm 2e107888b7d7ab9df53f65a5ee8a1ffb70f6a88a462b25f1dde7f44d81017a90 qt5-qtserialbus-5.15.3-1.el9.x86_64.rpm a23331485282bd406861aaaa1437b745f6fe757743b5436aff9787c3d92cd907 qt5-qtserialbus-devel-5.15.3-1.el9.i686.rpm 6364950724b0e8c004f59dd8ecdeae33608fc249228db615534b316707a28df2 qt5-qtserialbus-devel-5.15.3-1.el9.x86_64.rpm 16948d8b448a124db092e472736ab7dfca97b6181c5d85da63de8c7edcd18cf9 qt5-qtserialbus-examples-5.15.3-1.el9.x86_64.rpm 5510d5999ac960337d1c3fd0a3a4b6bc3af5700a1e7861bbb1a47b336667be2f RLBA-2022:8040 qt5-qtwebsockets bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwebsockets-5.15.3-1.el9.i686.rpm 70ce8fe626acfd069e873bb2fd773cc0d7e9107797789916dd3a9707d58d728c qt5-qtwebsockets-5.15.3-1.el9.x86_64.rpm 2755afef17a300b86b577919e2963ce715e99f37b98736c264bdb06714b64af4 qt5-qtwebsockets-devel-5.15.3-1.el9.i686.rpm 338417363bdf761d176b18793a99fa07dd258d17957c08ee56f0c8745cf1332a qt5-qtwebsockets-devel-5.15.3-1.el9.x86_64.rpm 65fb5e314775f4aceeab0000b77148b1addfd613c21930c338c4d4cf63b21b27 qt5-qtwebsockets-examples-5.15.3-1.el9.x86_64.rpm 9c38fde54d0aef1cd800f21b717564fdb07e16e2aa045809f604640cb4b26b16 RLBA-2022:8041 qt5-qtserialport bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtserialport-5.15.3-1.el9.i686.rpm 68aa0cf70713a2b5ed2ac651e42b2afcfa5a06182619ba5347ebc537cb7697e6 qt5-qtserialport-5.15.3-1.el9.x86_64.rpm e99511468f32805b64e15e1f57eeb2ba3bb53ce67847fd5bb2626373cce52da1 qt5-qtserialport-devel-5.15.3-1.el9.i686.rpm 7ab175be1de666cf53669b14aad77e60153111d9c9bed29ee3fdd69f0dfe1dff qt5-qtserialport-devel-5.15.3-1.el9.x86_64.rpm 1c258517fead6071ed07875ddfb23ccfec98d4c4929063a0baf4ee60a7daea34 qt5-qtserialport-examples-5.15.3-1.el9.x86_64.rpm a721aea2a8cdbc75d1d452b31ddf6ff5d3e6e6f737d2dba3f2e34e6f495bd379 RLBA-2022:8042 qt5-qtwebchannel bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwebchannel-5.15.3-1.el9.i686.rpm 8b414744cfea9a4f93c168dd88643eb3724942f730764d2ec2b882fcb68142dd qt5-qtwebchannel-5.15.3-1.el9.x86_64.rpm c6d5f79f34bcaa8209af09c06f053af85872ecdae783eeaef158aa117eebb0ae qt5-qtwebchannel-devel-5.15.3-1.el9.i686.rpm 72c0cce5754facc935f8b5a85a8d9ad0a329877e7f3451fff49a9fd7e49f702c qt5-qtwebchannel-devel-5.15.3-1.el9.x86_64.rpm 7e8fc33cf0ea0e1ebc875eef89af3bbebe3867062e89246e99dfb55175437ffd qt5-qtwebchannel-examples-5.15.3-1.el9.x86_64.rpm 97b3c4abbe2e2b4c7727306b6265e41d1b6e6366f49a82fce6ebe85ca01629c6 RLBA-2022:8043 qt5-qtsvg bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtsvg-5.15.3-1.el9.i686.rpm 642e25610d94d7796c2c491f93c4ee75d712d0cdcb0d771d6ec3de0a73e9cbf9 qt5-qtsvg-5.15.3-1.el9.x86_64.rpm c927686c41ba6c9a559dc66224b41f5548a060c414ea52c31962c64c5182c44d qt5-qtsvg-devel-5.15.3-1.el9.i686.rpm c85fdb3a7b4854aafb867f9525dc479bd8b606adff0cf7296fbcbf0e8355fd4a qt5-qtsvg-devel-5.15.3-1.el9.x86_64.rpm b3a133846e56ffebd0d677348832c0e64babb4ef95a91e11b74b336b70308f5e qt5-qtsvg-examples-5.15.3-1.el9.x86_64.rpm f38f5352627464dd94971c60eae433b3fe312d1e3b2900326a341315012914e7 RLBA-2022:8044 qt5-qttranslations bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttranslations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qttranslations-5.15.3-1.el9.noarch.rpm cc91c751c585b26969d7ab213b11a7a686d7b0e2d6db4e683c8d46930582e42a RLBA-2022:8046 sip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-wx-siplib-4.19.25-1.el9.x86_64.rpm ce9c05e384c0cad52c5a77a3c768edb51076b51cee0ee3bca4a2d17e64a503ff RLBA-2022:8047 python-qt5 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-qt5-5.15.6-1.el9.x86_64.rpm 4ae49a2b238fdf09946943c50eb5c0c2d7e0e44acaad5c776884545fde5e5d0b python3-qt5-base-5.15.6-1.el9.i686.rpm 00e814a9f223b2094f2e846650d30a36dd75f12785d0639166796658e609e002 python3-qt5-base-5.15.6-1.el9.x86_64.rpm 6c05805ae2171175a4f2f85c0d279fa6c887d6f5b039b461c3331114d70f729f python-qt5-rpm-macros-5.15.6-1.el9.noarch.rpm 9c5c4f828db0187ab8a3f4c4e0bb11af7a80db9b05acfdbcf1d9d8d9b256b216 RLBA-2022:8048 adwaita-qt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adwaita-qt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adwaita-qt5-1.4.1-3.el9.i686.rpm 6b85dee08df8da9fb8a69af4c48441bccd4303bfd34d4048030d59819c21987a adwaita-qt5-1.4.1-3.el9.x86_64.rpm 58b091e84bf8f2c7c9c1d012b15c73859f74cb311333fa67a9566afb69e00ba9 libadwaita-qt5-1.4.1-3.el9.i686.rpm 3c6efd06c64f9090af17987a3963514b7d0c4fb68a0d73eab44ce384637f36ed libadwaita-qt5-1.4.1-3.el9.x86_64.rpm 988445336d33692368b2b23aa7f77376ae10d9341f6231b4717b9f14dc56db6b RLBA-2022:8049 qt5-qtdoc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdoc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtdoc-5.15.3-2.el9.noarch.rpm 6d290aad6edc176a63157b18af2af8239e9bb304c7ea8ac01f8296e0bac0be7d RLBA-2022:8051 seabios bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for seabios. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms seabios-1.16.0-4.el9.x86_64.rpm 8c5595150761c8d1bf01c988f84147b5d17159841e99a88a6b95a9763d706377 seabios-bin-1.16.0-4.el9.noarch.rpm 1bd39c37ea4d9094a080a9179c96f9099f797bb68b5793b876ef45d61133ccdd seavgabios-bin-1.16.0-4.el9.noarch.rpm 2f35435b9344232b0508ac951f592516c65e6bb67b31d2399f52d097ba5c0e1c RLBA-2022:8052 cscope bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cscope. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cscope-15.9-15.el9.x86_64.rpm 60a446e57d5a28ebdf9b7cabfe723c238ee6891e9a3855f63af16a64f5cf725a RLEA-2022:8053 pki-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.2.1-1.el9.noarch.rpm 79d51c4e69efe1ec548ee8b00a42e64d8d7263758024f9ae15af8b9a11ac2086 idm-pki-base-11.2.1-1.el9.noarch.rpm 69cc6fd71502b65119229b2af34f072299f558597dfb0924a50f1f06ba9aa198 idm-pki-ca-11.2.1-1.el9.noarch.rpm b9e8fd5a994b7751f6b57eb9bbf7ebf9809428ed2a092f248d203c1bee73eafe idm-pki-java-11.2.1-1.el9.noarch.rpm 1dbe1c88a6f900d4cacc1fc2e9dbf97a965928d2c80a5c40fcc78dfb384eab3a idm-pki-kra-11.2.1-1.el9.noarch.rpm 914c0fc70d8f715f56653b0142b0f99f0fd0dbb83ad3ea4f9c63e1ac7d848e13 idm-pki-server-11.2.1-1.el9.noarch.rpm ce0891a211529ac8837b85431fe6e574376c53bd86bc1178a433fc977e5363c9 idm-pki-tools-11.2.1-1.el9.x86_64.rpm 4e4fb794ceda4b539e1fc52642ef7226e5ad3c9d6625a146992760f12f4bc51a python3-idm-pki-11.2.1-1.el9.noarch.rpm 9589aabc7b71dcbc72c2d8e6615c606ac0bf43cdce88eb145a3b4dbe7baf9774 RLBA-2022:8055 virt-who bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-who. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-who-1.31.23-1.el9.noarch.rpm 784584efa81080071f9a7bc3d0ad45c4996f45b3f6bbc14d946f93b25ea03e1d RLSA-2022:8057 Important: grafana security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055349) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-7.5.15-3.el9.x86_64.rpm 48489bb532801d4939c30266186831da72e3ed7f9ff8a16847212ff292b1d0ab RLBA-2022:8059 certmonger bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms certmonger-0.79.14-7.el9.x86_64.rpm 1d2d4db2e7ca5825445517d187e51e1c0c3884222a8a9735939e728551ba219b RLBA-2022:8058 dyninst bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dyninst. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dyninst-12.1.0-1.el9.i686.rpm 0b91cb0d77fb2e944f901be13cf095dc6588a609bf2ae74c78413ddb946a489f dyninst-12.1.0-1.el9.x86_64.rpm 222d5b432f0a8a17386e56595cd0ffcb93768ffffbe584bf540961da73a2e67d RLBA-2022:8060 mingw-filesystem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-filesystem-139-1.el9.noarch.rpm 7011486c107e4902c3143bbcb63904b7f20dafff27a167b2e1be2eebf43994c8 mingw-filesystem-base-139-1.el9.noarch.rpm e649616756623966b975584c95c99d3e681e57569ff5b69910b1477dcb9f4b3a RLBA-2022:8061 mozilla-filesystem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 RLSA-2022:8062 Moderate: unbound security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2087120) Security Fix(es): * unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-2.el9.x86_64.rpm 6e358e56306b818a80f36b05ac87c1e74f0b86ddeba5eaa6a5849692ccfd9617 unbound-1.16.2-2.el9.x86_64.rpm 87e4b2205c21d1be493191351f8034d942ac07a66e2000d15f4703ef8fb7395b unbound-libs-1.16.2-2.el9.i686.rpm 3d768c57ba4a56d38962867ce8c1d22f82388b5c95f3bff67e056a224cfb86d9 unbound-libs-1.16.2-2.el9.x86_64.rpm 2b424b32311280a433c0c8a0031c40102afc0eb28ea27bdf1b2c9759861fc860 RLBA-2022:8063 libva bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libva-2.11.0-5.el9.i686.rpm f79d5b2eb791ad0c984282d72ff47c060e49112b7138257cf9828ce9bd6a18e3 libva-2.11.0-5.el9.x86_64.rpm 9b6a29b45d3e33f33d7bffe4e5575fc56cd6683a904450fc5f7ec63b690da1a5 libva-devel-2.11.0-5.el9.i686.rpm e5301e9dd57304294efb2e709fae00cb6e5d879b8eba9354a6703dbc0107a9e1 libva-devel-2.11.0-5.el9.x86_64.rpm 5bc38651a705773d154ed75ad8410f7ebaf5cfa9e3266a4fd20c58db4c2c62eb RLBA-2022:8064 xdg-desktop-portal-gtk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal-gtk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-gtk-1.12.0-3.el9.x86_64.rpm b9bd575335d436c028319f671eab37777c24aa8e471cc233783fc727e4d66511 RLBA-2022:8065 sip6 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sip6-6.5.1-1.el9.x86_64.rpm d43e145186c16cc8507db2f95beb10e4d7929f15f6fec8ec07bca7272f8b4123 RLBA-2022:8066 valgrind bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms valgrind-3.19.0-3.el9.i686.rpm 89e404809d28ee51579f127b5494ffcbb701630e306f2f8ab7c585d18482908e valgrind-3.19.0-3.el9.x86_64.rpm 9c444b882b8aba8893096fcc4515807646ec2e0fe67e6fb8f7a4e638fdc02b18 valgrind-devel-3.19.0-3.el9.i686.rpm 63f90bb2db08ed6304928773ebfcb2fe36a4ea81ce4363c1b37f3f706e47881b valgrind-devel-3.19.0-3.el9.x86_64.rpm 95c1a2b51d73f553ce41f7f63ecf34e72f10200a7954af2831fd6d14ee498ba5 RLSA-2022:8068 Moderate: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-5.el9_1.x86_64.rpm 86550a053b1b2ec69e703cc534c9e264cb2a9345556af643768757f1db6eee78 bind-chroot-9.16.23-5.el9_1.x86_64.rpm 2620e4ef1a59359f9ed1466e916c3283a8ed396f696ba7a3df82b2b17ce6804e bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm 5528c1e593893f2129e52054b2a5f0c2479e9e82cf699a8dfc4a3866b06bd386 bind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm 3468f1174e597136269c81a5d5a5b7f903b980447136a2c7dfd71b8ac212af4a bind-libs-9.16.23-5.el9_1.x86_64.rpm 63bd05687d7dd824cc3dc1327f1fcb351c83b243c7299d21ff16adaa523524a9 bind-license-9.16.23-5.el9_1.noarch.rpm 200eb5e4448c07184492f15a0b2380b9165609468b42d4eae0a7fff0a96ad51a bind-utils-9.16.23-5.el9_1.x86_64.rpm 892e94833846474112aaff4b2640bfe4d03bd737d2e06157ea2932c7b162205a python3-bind-9.16.23-5.el9_1.noarch.rpm 5ff82fa0977b486ce914a511698c095a498d8ede2fb67019c3f478758f852105 RLSA-2022:8067 Moderate: httpd security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939) Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-7.el9.x86_64.rpm e262959dc5e4a257521a20ac25e1594875f554d519b8f6dd15d8a8aadde444bd httpd-core-2.4.53-7.el9.x86_64.rpm 4dad1e1872e0c2508ed4ce3364545de31cfca689ee2d30c7f856bcaeff5ebfe2 httpd-devel-2.4.53-7.el9.x86_64.rpm e7a7acef0858ec008543c34c53ced8fa995a0281c7c6055bd22cb841f47e07ab httpd-filesystem-2.4.53-7.el9.noarch.rpm aa3d1ee3ff8e4d7e5f74c869d8dfcbe1e737264d57342d30590988590a75aef0 httpd-manual-2.4.53-7.el9.noarch.rpm 39956eb02a68c53fec8ca038d7d5dbefef2f409a6003535eeef68a2a7dc3c2cc httpd-tools-2.4.53-7.el9.x86_64.rpm 7135226a4cf998c4ff758ccb062f571c32044147c15a0c1522de1676e11f6845 mod_ldap-2.4.53-7.el9.x86_64.rpm 81eda6ed3b2ccca2a1c7b5f2f0e2b4fcc540a6d6a60fc0a0692b439bf719f32e mod_lua-2.4.53-7.el9.x86_64.rpm 61880e543f2f9b4249241ff0baf4177d46bb1c832b529efa5411afe2f3d3c368 mod_proxy_html-2.4.53-7.el9.x86_64.rpm 3d8b5f95ee1f95fe0ab7e531361ac1c37d1632dca442f5e904e12ca059412072 mod_session-2.4.53-7.el9.x86_64.rpm 67cfa4c4f868e8b28415df65ea7f6e11330d5607645a86c23899a80a2b209cc2 mod_ssl-2.4.53-7.el9.x86_64.rpm 69ae6059fe9d4d89ddc913a147d414a0852a49e7368eaeb88ba4a96153735e2f RLBA-2022:8069 anthy-unicode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anthy-unicode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anthy-unicode-1.0.0.20201109-9.el9.i686.rpm 7baf60359794c166514f8465ae08dd4cfb8d0ac4de91c1766898a92d019bbb32 anthy-unicode-1.0.0.20201109-9.el9.x86_64.rpm 1a2f31e0745b82675ff318f873d78a7e1f6058929f96113d4f0d88270a114e6a RLSA-2022:8070 Moderate: dnsmasq security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dnsmasq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dnsmasq-2.85-5.el9.x86_64.rpm b9a534d64afe5bd1bff48b859a905ac0387519dfb4a8c3447168a6a4cfc6c178 dnsmasq-utils-2.85-5.el9.x86_64.rpm 911ec6e69e2fbdb3f939b7bcef5060e1efb552b8731c3fa0cb442041b4f6719b RLBA-2022:8072 slirp4netns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slirp4netns-1.2.0-2.el9.x86_64.rpm e3cacad672f5369a5f1a759d15a5e5e3fc8b511d51d3f720276a8a01ec867a06 slirp4netns-1.2.0-2.el9_0.x86_64.rpm e22ca6482a3026204f0857880b187459d2773a4e594121c73191bd3706cb4697 RLBA-2022:8074 ansible-pcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-pcp-2.2.5-1.el9.noarch.rpm eb2087120965b59259b0a0892e70f5e09a6cbedbdf065fe394691f4d6a9510be RLBA-2022:8075 systemtap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemtap-4.7-2.el9.x86_64.rpm 405d28f1002c5a2de35d3b0547c3e0a6ceff090d8c9af0eefae6db9728bbb73b systemtap-client-4.7-2.el9.x86_64.rpm 1f87ef8fe12636c10e368d1617639f66c5d7ffcd9f53645bf07c80625eab0aac systemtap-devel-4.7-2.el9.i686.rpm 221f7e2b0501b51c163f18cc2343b339a7b279e7749dbdd53d956580b9d2ce6e systemtap-devel-4.7-2.el9.x86_64.rpm 1c5b07c7baa9163bc5ddb40e4fc365a4194236e87a3f8302268972fdd14fbce7 systemtap-exporter-4.7-2.el9.x86_64.rpm c16fc0dc8927db561cce7eb1bfa21cec8054b04c5d43460339cd3c2b31b386bf systemtap-initscript-4.7-2.el9.x86_64.rpm 9a14abf1afe2e1bf25c57d1be4f2453f86a3f8b1802f53e79b95c0d2a99d6d1b systemtap-runtime-4.7-2.el9.x86_64.rpm 3ac728aec765f272f1b1abf932d0d0506de74b8ead4eac159b1bdfc7b2914fa1 systemtap-runtime-java-4.7-2.el9.x86_64.rpm 295617c5388e401a2283987b6adb2f82b6bfd905a401f6d00a7af3018abdef1e systemtap-runtime-python3-4.7-2.el9.x86_64.rpm 89d269455660abdedcc282de9f592aab6644fbfcec3304554c7ae7649742f93e systemtap-runtime-virtguest-4.7-2.el9.x86_64.rpm 561e94aa6f580b6d0ed60f4030c52180ba41b3e7d3b4a9d7b8099d3d11bb06ee systemtap-runtime-virthost-4.7-2.el9.x86_64.rpm 2c0cf1daef9e1b1cf02fb944a7141470fef95c80647f2f6b63bf10f1e07beec5 systemtap-sdt-devel-4.7-2.el9.i686.rpm 87fc3bd51514c5edb1bd4aad4db399873172e89966bfa5d0bd4f2066751f94dd systemtap-sdt-devel-4.7-2.el9.x86_64.rpm 62f34478649dcd7eff655b2e75f57ece6976d9f43ce2c64a5a5eb5de685390f6 systemtap-server-4.7-2.el9.x86_64.rpm 85655b99f141a2e0cb8aaf3e596e326befcf00f2ed893e6da7ffdbb50a4cc31b RLEA-2022:8076 rig bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rig-1.1-6.el9.noarch.rpm b13374b76eebe5eb1caf79526d7b54cf2a96ced5c23bba66c214a049af3481f0 RLBA-2022:8077 pki-servlet-engine bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-servlet-engine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-servlet-4.0-api-9.0.50-1.el9.noarch.rpm 985cabdb4510b5895c66f3966f7117ff64de5eac59c82ec4e879d33cd8869268 pki-servlet-engine-9.0.50-1.el9.noarch.rpm 467b31d4a1c87a1e0a7213597955df9029460f34cba29e985f9656b7db8fdd9b RLSA-2022:8078 Moderate: flac security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for flac. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files. Security Fix(es): * flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c (CVE-2021-0561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flac-libs-1.3.3-10.el9.i686.rpm 3f2055313ca833cb0a0920ed3423656d9f9e5a12d3a72fc3e718f46e97223637 flac-libs-1.3.3-10.el9.x86_64.rpm e91cebb7bd7e48b93a95aef62a4347b35a153c1a6b2cabb260760dd2701d1192 RLBA-2022:8080 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-tools-1.8.1-1.el9.i686.rpm 18a7feccf584ae7f666ca90ceb7daab4df1482172e3384fc11da72311ae46108 smc-tools-1.8.1-1.el9.x86_64.rpm 12226c7be26507055616a04d6e4e8ad8a1012dca1e64d9ebc4c982a3fa2e2da3 RLEA-2022:8079 whois bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for whois. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mkpasswd-5.5.9-4.el9.x86_64.rpm 818f5b9fa31ab596380cd767a0d266641a38b62140a7bc2629670083e16fdb61 whois-5.5.9-4.el9.x86_64.rpm ebf6e357d17db0e63c26c505ac000db4f04a6bc2bbc70a78b34688db83672e34 whois-nls-5.5.9-4.el9.noarch.rpm db1eaee40444c0208bd029d6e656b166bfa11cb7bf97b97e0cf85134d540598b RLBA-2022:8081 open-vm-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.0.5-2.el9.x86_64.rpm 848780e2e5dc46929c586f2d5ea3ed3dda6d254c436545b2d2a06fa0813db7df open-vm-tools-desktop-12.0.5-2.el9.x86_64.rpm 1984c9769452cc4646a247f81842f4bc9051df38db8b94ac961204de85df1acb open-vm-tools-salt-minion-12.0.5-2.el9.x86_64.rpm edffcb89cf7152dfd6435a51b5882a542aa4850fe4b3b34da238577e9f00611a open-vm-tools-sdmp-12.0.5-2.el9.x86_64.rpm a6217cc1b821456b9d1a6e42a2c62f5a153f0ff1735240bab5b0e7bcd0b12f2c open-vm-tools-test-12.0.5-2.el9.x86_64.rpm 04462c0466451bd9aa14693cf0b963fe2e0438000d9e00409c1d6c03d6a123bc RLBA-2022:8082 stress-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stress-ng-0.14.00-2.el9.x86_64.rpm b0b8d99f545678ce08855ebf48897a63abdc0a7c1a950c0a36f6eace9f9df8ff RLBA-2022:8083 wireguard-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireguard-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireguard-tools-1.0.20210914-2.el9.x86_64.rpm 34740923a5eec9612be07a1fa9ec295829e89323177585ce69e9b6273f1a82e4 RLBA-2022:8086 mingw-crt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-crt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-crt-10.0.0-2.1.el9.noarch.rpm 01409a9f8e5a5ab0d39636ba4b66ffa2f98c85aab9e4fde330bf81c13add37b9 RLBA-2022:8087 hexedit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hexedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hexedit-1.6-1.el9.x86_64.rpm ef81ba195321df0668abd24e96af92815a0f76a4b98dbf7558f21b7daebf5e8c RLBA-2022:8089 freeradius bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeradius-3.0.21-34.el9.x86_64.rpm f33b09c96b838ae0d6b57ccccea9ee31c3de281a2f1cc5e9c825ef9c6583b604 freeradius-devel-3.0.21-34.el9.x86_64.rpm 066ede80cd168386aed64444f8fdb060c14766f7b0b700744d9fd1498d604608 freeradius-doc-3.0.21-34.el9.x86_64.rpm a518a7218f3d519cfda981f2d8639b88aa8c1e9b065d664f890b6e211a4f6195 freeradius-krb5-3.0.21-34.el9.x86_64.rpm a12b03a25bcfa99869a23e5ef0e8221f476dbf895e8cae7d68bef37c938e894a freeradius-ldap-3.0.21-34.el9.x86_64.rpm 7f711c3b8d8d4346e607b703501d6aa2a4716eddbe7cebdebf88d863ad91fdf3 freeradius-utils-3.0.21-34.el9.x86_64.rpm d1655a586dca9f38af9f28128ea24aed6ab3d42a02b67b0c2a7a9a2e3d47f12c python3-freeradius-3.0.21-34.el9.x86_64.rpm 1a0114086f03b8c154ceaa671e9a39e7e7cedd9d2b4689eec4c041a9a1a55980 RLSA-2022:8090 Low: runc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms runc-1.1.4-1.el9_1.x86_64.rpm a06c71f8d70df988d7821a0999b7fdc6d426bdcd45e9e421861730a5eb97a7a3 RLBA-2022:8091 zenity bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zenity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zenity-3.32.0-8.el9.x86_64.rpm 7937b3e953976660518b75671ead4057d5da92df1b58985c9b7dc06983644a90 RLEA-2022:8233 nodejs:18 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-packaging, nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLBA-2022:8094 cockpit-machines bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-machines-274-1.el9.noarch.rpm db19c762872c7249d5c0f2740bf3ca15b2f5e3eb19c4226a183740285b5f1563 RLBA-2022:8095 crash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-8.0.1-2.el9.x86_64.rpm 8f5c0dc2b2e29c9a27aa6743b86da9ea1a27764206c7901d199422f9f3c8a8c6 RLSA-2022:8096 Low: redis security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.7-1.el9.x86_64.rpm d1e9d472152616a9ed7c5afa3a65d31eba457c8931c340270584ed7462408b48 redis-devel-6.2.7-1.el9.i686.rpm b70047765d0e43fcd6dcccd1b5327b3d7ebe428b8c60d9adc70e482eee5b3717 redis-devel-6.2.7-1.el9.x86_64.rpm ad399d9c692c02f6fa0f8b7a5c36547f1f034d34eb09ba852d9963d9d392c013 redis-doc-6.2.7-1.el9.noarch.rpm e6058967d045d58fd5abd329601d5f10d762d6c0dc19a0904a9462d9683936d4 RLBA-2022:8097 osinfo-db bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-20220727-3.el9.noarch.rpm e33c652133b496d754e93679adebd83c92b03e5522b91e17990ebc89023a8201 RLBA-2022:8099 rust bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cargo-1.62.1-1.el9.x86_64.rpm 38782349338f704413a4e092b7a24f187a6c7fc42bb35792643c138ea50f0fac cargo-doc-1.62.1-1.el9.noarch.rpm f29ace2847bee75e097d591b39881d9fbcd53f574cb317470a4da5f12e538ea0 clippy-1.62.1-1.el9.x86_64.rpm f9562d268c6e0336c0cb86894ad8e2136b4d57609d555856a747dc4f6a0fe3f5 rls-1.62.1-1.el9.x86_64.rpm 383bf337aa83c2be3882ca4916aa7f260018ea2624138713bb3c918476b629d3 rust-1.62.1-1.el9.x86_64.rpm 84ce4f76cd6b848265ebf8d5d98d011354d90b130b916ff61961127298ed2857 rust-analysis-1.62.1-1.el9.x86_64.rpm 9904151cabfc58e5edb72aa6dd3b548278bf395ec555e53dc5b3aa7ed036ff39 rust-debugger-common-1.62.1-1.el9.noarch.rpm a9eff0f35e761dd1f2e022778d0d24ac2241e04eb86cac6b24cf311a719473c7 rust-doc-1.62.1-1.el9.x86_64.rpm b046f4b4f3e4fefd4d262409d1168712a1faa1948ed69640f16aee259e22cc3b rustfmt-1.62.1-1.el9.x86_64.rpm 2c9348db204164f4757f4d0fc97715d5e6002eefe0850a9e9cb7529d0a98f563 rust-gdb-1.62.1-1.el9.noarch.rpm cc76abc8fce8fcd7054e8995119b23ffc50da6757d6334403ada27a79cac0fdd rust-lldb-1.62.1-1.el9.noarch.rpm 161042401fc2d3c791a4bf9397b5adfd3b42443d29cf7b28b432efff158ca848 rust-src-1.62.1-1.el9.noarch.rpm 1c9b0616109b8184c0a320b824abc893b27be59190565cdf4a0b813d32f1cefc rust-std-static-1.62.1-1.el9.i686.rpm 521b99d969e693af20f276b79ccac7eee6d44638a5d82647b34b318a3b382181 rust-std-static-1.62.1-1.el9.x86_64.rpm 1076f6b38be8e58b10b7486b74a3eaec2900e7b79493cd62f759ab9803c36ba7 rust-std-static-wasm32-unknown-unknown-1.62.1-1.el9.noarch.rpm 7f0292daf2ab2f29566976ae970d671f506e00af5b0831dd95eabc4c3292d79a rust-std-static-wasm32-wasi-1.62.1-1.el9.noarch.rpm 901c16cf44b632b85d77ef9f442e46e7a2db448a9da6c8a6f4702a5b97d311f2 rust-toolset-1.62.1-1.el9.x86_64.rpm 6342b2348e4758473a173c06e1555123b9f007ba75405be95786f396226835bf RLBA-2022:8102 waypipe bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for waypipe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms waypipe-0.8.2-1.el9.x86_64.rpm 799266e5764308d40d819cc7751023682328a27876454472572a15ec4cc52089 RLBA-2022:8103 motif bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms motif-2.3.4-26.el9.i686.rpm 11e78acc01052c7cf025e164699c831c3fdaec684c509630ff204bc8bf7d3c20 motif-2.3.4-26.el9.x86_64.rpm 1ab12debc0b035bcd79878a1248338048d226cb19e4745999397c1e7b565ced1 motif-devel-2.3.4-26.el9.i686.rpm cbdcf5582a033395dff6148a66751ef8812cb1124d20c9be3e85d205d70a16d2 motif-devel-2.3.4-26.el9.x86_64.rpm 6639a218320aa236d0647792fda7b304d1284de5d12d7c6085a93dece2196223 RLBA-2022:8104 evolution-mapi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-mapi-3.40.1-4.el9.x86_64.rpm 14b353eb1cd9387880d41d61f5913ba2f71462e0fdbb315c7816017e57f440ec evolution-mapi-langpacks-3.40.1-4.el9.noarch.rpm 14b782e06c8d5b96445b30d289f42ce2ef98fd644ffebc67d359bbfdb2e9a013 openchange-2.3-39.el9.i686.rpm f39f00372506fd2199a28f342dd97290baf59eabccf9ad91f3ac6e2224cbb61e openchange-2.3-39.el9.x86_64.rpm 683fe2a1a19a79d433532034db48e049817a95a060d857b99c0a4ccfdefdc1cb RLBA-2022:8105 python-rtslib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rtslib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rtslib-2.1.75-1.el9.noarch.rpm cb61cc1b08659c5a9e188dd3b235d68409a78a8b68d40c58cb1242e22c811bc8 target-restore-2.1.75-1.el9.noarch.rpm 1e6d0e3382703875fb33f4ddeeff009875657a38de1f53b4233e02d4794ae463 RLBA-2022:8106 power-profiles-daemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for power-profiles-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms power-profiles-daemon-0.11.1-1.el9.x86_64.rpm 8f36c23f7d5c484cd7d4c09390ac8798f05c8012cd49fccb515195ccb6c17d03 RLBA-2022:8107 mingw-qemu-ga-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-ga-win-104.0.2-1.el9.noarch.rpm b1874c9c00b0123447a769f43c7fd44b9145deb80ba2945a5968b30514064181 RLBA-2022:8108 conmon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms conmon-2.1.4-1.el9.x86_64.rpm a6e7d8da82c0800a146f7a1f9e580cf72869dba3b4eda7540cadb2ec34065d7d RLBA-2022:8109 bcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bcc-0.24.0-4.el9.x86_64.rpm dc8664ff176b307bf0af1c044ac3a993c2e237e4e00992810e79b92f2fa91982 bcc-tools-0.24.0-4.el9.x86_64.rpm cb454150fae77103a7a60411471e187bdde6486e01f524716bb53c3dc17c2ffe libbpf-tools-0.24.0-4.el9.x86_64.rpm 61f948359838e0b24be6c055f6ee370d1e874a3199ad1767c85f1584a5c904cc python3-bcc-0.24.0-4.el9.noarch.rpm 03fe2ea438665ff736d127b56b81110f1ecafe948ef365cd0dcd71aa7118fc4a RLBA-2022:8110 bpftrace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bpftrace-0.13.1-1.el9.x86_64.rpm c1ffc9d5a7b2a6221dd34f1d0e2cca7b4bd1ab1399740a2eb5a323f7d4950d68 RLBA-2022:8111 gnome-system-monitor bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-system-monitor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-system-monitor-40.1-3.el9.x86_64.rpm 07864250b47c17dcbf357d5d292f7a25f5232b078085cd5a456010a0402f1b1b RLSA-2022:8112 Moderate: frr security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for frr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. The following packages have been upgraded to a later upstream version: frr (8.2.2). (BZ#2069563) Security Fix(es): * frrouting: overflow bugs in unpack_tlv_router_cap (CVE-2022-26125) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms frr-8.2.2-4.el9.x86_64.rpm 2f53bb26753db000765f8b9320cfdaca605c3727d752f40dfba5a0e55207e6bc RLBA-2022:8113 ipa-healthcheck bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-healthcheck-0.9-9.el9.noarch.rpm 8541de466c5dd605fda1125675f85ecebce5d6051e6ff97a9724e72d89f3cab8 ipa-healthcheck-core-0.9-9.el9.noarch.rpm 98df424d011891e82f3d5f2d85df24ff35384a786569720201e644697d01dcdd RLBA-2022:8114 container-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-tools-1-12.el9.noarch.rpm 0c92d1a4b4e3662a5974da9674904d0dc487a32b266a893c947ce0e707b2f39f RLBA-2022:8116 google-noto-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-fonts-common-20201206-4.el9.noarch.rpm 31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7 google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm 8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313 google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm 1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9 google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm 113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0 google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3 google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm 9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579 google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm 574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802 google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8 google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17 google-noto-sans-fonts-20201206-4.el9.noarch.rpm 28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm 66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48 google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm 5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm 870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6 google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953 google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm 91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91 google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm 46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm 1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm 019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3 google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761 google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm 6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899 google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902 google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3 google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm 2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420 google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm 6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm 34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137 google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm 387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3 google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm 5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35 google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm 46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730 google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm 99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm 9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7 google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm 525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51 google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm 866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334 google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm 0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911 google-noto-serif-fonts-20201206-4.el9.noarch.rpm 310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7 google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm 254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2 google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183 google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm 98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b RLBA-2022:8118 libblockdev bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblockdev-2.25-14.el9.x86_64.rpm ec232ec19afc58e1830670fe3d043c1edc64b460571f01cc3ec508c945c7fd52 libblockdev-part-2.25-14.el9.x86_64.rpm 0c2406d943f71a92802b7d3403b0e3717d3459596f5b81edb5a2ce18e059da51 libblockdev-2.25-14.el9.i686.rpm 9105906eba8323f6456921e6bace978a48063fd12ac9435dd83fed48edb8829b libblockdev-crypto-2.25-14.el9.i686.rpm 45bea335a2dffd88940c1832aabdc0c333ecf8518d28b1a39c362583d47801b1 libblockdev-crypto-2.25-14.el9.x86_64.rpm de53c858b244a62438f5303b8e78fc3995be020c4d06eff5fadcf056241b33db libblockdev-dm-2.25-14.el9.i686.rpm 5e1c0b1cfcececef1e3fa5361c9b31a35f69a1c5279663f22793d71a84ef49f7 libblockdev-dm-2.25-14.el9.x86_64.rpm 9be4d629bc8b90a0650bf8c65d26d0f200f91e2d89cceff9d4c044562944915d libblockdev-fs-2.25-14.el9.i686.rpm a97b20468f86b3a2bc3f5ba69b7bb53bea69729fac0f8091c8a7dc32e1dcc615 libblockdev-fs-2.25-14.el9.x86_64.rpm 120fbf5e7c0d48ebdead9c4e197e167353c43653ecddbc523be75808f73028b5 libblockdev-kbd-2.25-14.el9.i686.rpm 16c1b7e5c50960eee5d6112ae0988450a174eb2eaa7e15749b80fbe72f0dff7e libblockdev-kbd-2.25-14.el9.x86_64.rpm c1862d8c9141a7bb6f63d31191c2d5154f8edebe8a38f77247e44224a9a2ee84 libblockdev-loop-2.25-14.el9.i686.rpm 39147b8c5bd821dd557726f00c9f44e307fa18c3f0ed01d4e8260914ac9ba5fd libblockdev-loop-2.25-14.el9.x86_64.rpm e33e7329a6d60ed8c62686fefa2355c12bce7afc2154531f7e5764f4fceba6de libblockdev-lvm-2.25-14.el9.i686.rpm a7b7fd5b521a27ddaad5954cd62deb8f7bd56e763d7127d6ed35be88631ab85e libblockdev-lvm-2.25-14.el9.x86_64.rpm 1e8fd23e0a0935d634a1b62bcb69f264c154efcc6a430abe8a5a633d76938326 libblockdev-lvm-dbus-2.25-14.el9.i686.rpm 3f90372bfab81193adfa4b778b21537b2f414e7e81dbb1410a3b19f3b119fd8c libblockdev-lvm-dbus-2.25-14.el9.x86_64.rpm 447652b82725bac308da9249850de8903e2567706e5e46813a5c631de96b55e5 libblockdev-mdraid-2.25-14.el9.i686.rpm bbd533563566864ff91055114ad72840646e70715e52bbd7d8aedd576a740af2 libblockdev-mdraid-2.25-14.el9.x86_64.rpm fbe0850dae89f3113eb994adc4f4b557e763da1922956d8ab9668e9f7a1e48d7 libblockdev-mpath-2.25-14.el9.i686.rpm cb0e266ee38e13a24ae3d1cecb41072bc5fcd6458ecfb13576ace62470e322f7 libblockdev-mpath-2.25-14.el9.x86_64.rpm b6729c29d14133a9fcd1e73b3ad863b135e2ef3fefa44b515f399e6e61855366 libblockdev-nvdimm-2.25-14.el9.i686.rpm 9d3e5ddfea4bb12db934ab22bb3d2ae24d18b0c38dd533c1769640910459b744 libblockdev-nvdimm-2.25-14.el9.x86_64.rpm a6266b0f28a65a5df598f351a20b0f062ed1953019b416c31ae6e30d01a8d535 libblockdev-part-2.25-14.el9.i686.rpm 2e7cf2c39d7d71fb40ebf2dc8964c3a87df2a02776c6769010804f6ad6d3441a libblockdev-plugins-all-2.25-14.el9.x86_64.rpm f3a7b0f27c4bd20e2574980969a69a4791c7eddb135d61c6abfb61d2326a0bdf libblockdev-swap-2.25-14.el9.i686.rpm 9d100419c7d0c547e12b51a9ef6fd5ea6d84411586a62b69833adf37bd6b6b01 libblockdev-swap-2.25-14.el9.x86_64.rpm 5f804df3e41ae229afe6b0b3af25e25801c980006a871dd68914e31c4b9902ea libblockdev-tools-2.25-14.el9.x86_64.rpm 7f8ba82e67aaccb5fb1b3a18d3ad0ed908cfae877ab39b1544d269c6959d67c7 libblockdev-utils-2.25-14.el9.i686.rpm 2ab82d85f9041d1113286af43701b509f410618f03bb010bd10724400aa556f3 libblockdev-utils-2.25-14.el9.x86_64.rpm 4848de60b57b346810e8765b660c0a0c3a14cc07073e2ad5316147b05436c8ed python3-blockdev-2.25-14.el9.x86_64.rpm 199fc9fe2d57d6e39a4aea72901ebdf3612787043e746a0d28bbc10747971ff9 RLBA-2022:8121 sushi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sushi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sushi-3.38.1-2.el9.x86_64.rpm 8e868297c7eeacf2b674a451909193d65d5b5b8b9d6df9c0a924021a4860c791 RLEA-2022:8117 Rocky Linux-system-roles bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.20.1-1.el9_1.noarch.rpm b0c48af24ed0999f52c7b92900ff4bc4c31080c55966b9e9e27b9f0e4065916d RLBA-2022:8119 evince bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evince. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evince-40.5-2.el9.x86_64.rpm 33c622b8ddbbd7999b2ff892935edc2cd729ed6dcfb27de58f0ce19afd7116dd evince-libs-40.5-2.el9.i686.rpm c6e323913035c40f9de8f21e1a7607e8bdfb2d500ecc2b3a686d78dd1e76dda7 evince-libs-40.5-2.el9.x86_64.rpm 83bad2f8c7c62550c1ccc905e5277fc137586b206a93745111f61c297116bce4 evince-nautilus-40.5-2.el9.x86_64.rpm 1a1876b9fd0edfa1fe42157be077b44e2d320e0107fb36d2cd564c172384ea69 evince-previewer-40.5-2.el9.x86_64.rpm 4a99f6f96b7f0c5325c6e103c4e998bc663bce14ffdbfa3b57cefd9141ce9162 evince-thumbnailer-40.5-2.el9.x86_64.rpm 7c35b3e9be1e36f0cbe874953f8ca64daa5628a8946918b26e50b128a8d54ce1 RLBA-2022:8120 hicolor-icon-theme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hicolor-icon-theme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hicolor-icon-theme-0.17-13.el9.noarch.rpm 17372f87e2e2d00215a08ff5c0bcbd30bee9afd77dabc7f969fb996cac457c9a RLBA-2022:8122 tlog bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tlog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tlog-12.1-2.el9.i686.rpm 06d30d348e0c13aa016482a5a8141ba2df7ec8b2acf9f35118d00257aa10ea13 tlog-12.1-2.el9.x86_64.rpm 78389853dbda96807df3edfff0579e46ae14f6c1790cec57de726939d51614e0 RLBA-2022:8123 python-wcwidth bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-wcwidth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-wcwidth-0.2.5-8.el9.noarch.rpm 44388fd11b95a5343ac1a2489532ecba5c5294247717aadeb47b2340d84f31ba RLBA-2022:8124 stratisd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratisd-3.2.2-1.el9.x86_64.rpm f9a334e100be3ddb648cfd5cabf8b9e2609d461e328f3007609415ef325d71d6 stratisd-dracut-3.2.2-1.el9.x86_64.rpm 9c47aafb3657c38c12d5b846bfbd640c34bc3e6f520076ecdff581259ca4bcf1 RLBA-2022:8125 stratis-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratis-cli-3.2.0-1.el9.noarch.rpm 74a53e77fed71b3c8fc85369f48a7cc4b5a1fc18812a2397a2680f9046bd294c RLBA-2022:8127 corosync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for corosync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms corosynclib-3.1.5-4.el9.i686.rpm 08f828de0bc93e38adddca4a33e68935c94fe7eeeeafd4614b38b50951306f0c corosynclib-3.1.5-4.el9.x86_64.rpm e243d3ef9369bcce3e44bb51c65c093272f0ea214e0718c0bfbba1f60b363c5a RLSA-2022:8126 Moderate: ignition security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ignition is a utility used to manipulate systems during the initramfs. This includes partitioning disks, formatting partitions, writing files (regular files, systemd units, etc.), and configuring users. On first boot, Ignition reads its configuration from a source of truth (remote URL, network metadata service, hypervisor bridge, etc.) and applies the configuration. The following packages have been upgraded to a later upstream version: ignition (2.14.0). (BZ#2090647) Security Fix(es): * ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ignition-2.14.0-1.el9.x86_64.rpm 8ef30fc7e278f7f5f38e5b225ccd4ef69fa890b6331a071e8b83241e71fb78da RLBA-2022:8128 checkpolicy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for checkpolicy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms checkpolicy-3.4-1.el9.x86_64.rpm 34e4359abb6d4cbd9c76833f8f0111f64f3dca9f501ef408c216407aebd43d67 RLBA-2022:8129 papi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for papi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms papi-6.0.0-12.el9.i686.rpm 29e784eaf49749a1a01394d24e2e9b8a5ba845110e4d8a96241e45d40513f5ac papi-6.0.0-12.el9.x86_64.rpm 5101b138e97a8481b3d4e9eb3003b6e6b960f4dbc67e22ce38f257b986ba4d8d papi-devel-6.0.0-12.el9.i686.rpm 68cc829958782037044d782c0bdfa7a6dce05ec9b87bdf8566257a0dc43b402b papi-devel-6.0.0-12.el9.x86_64.rpm 8a4f834b392aa5d1fdaefb5eee0d8c6e255969065aabe32d8c9f562dede2cc0f papi-libs-6.0.0-12.el9.i686.rpm 8b21d28c3454375539d49d1b3c66913a8eb10cd4f5f14d1cdf15ca8c70712ba2 papi-libs-6.0.0-12.el9.x86_64.rpm 315b2961f0ccc8456984959c6706e2343a459043505431f24096bac88374b34a RLBA-2022:8130 criu bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crit-3.17-4.el9.x86_64.rpm b0d3a44deb3513b89013cba7d5b3cbaa734d55de596638e3b7f4466d66b257bb criu-3.17-4.el9.x86_64.rpm bbc9c1874678879c4d403170775cbb2d1153a50d01fecda5641db0bec891b6e7 criu-libs-3.17-4.el9.x86_64.rpm a95784e8d647fef4f1c8d9bcda29077951ffb630b73551b5ba321ec5b8b77eae python3-criu-3.17-4.el9.x86_64.rpm 0a256b8135e033393cc13cdc15242292daf687617c4018d583cfad98bc131388 RLBA-2022:8132 libgtop2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgtop2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgtop2-2.40.0-9.el9.i686.rpm f91719fcb177f2c640484f1db38123bd0e43082e4d5237d6073d5ad55e7a8a18 libgtop2-2.40.0-9.el9.x86_64.rpm 5b5b2e4618a5a576afb265befe3ec5276791d4d01383c2367154dca4059611fa RLBA-2022:8133 cockpit-session-recording bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-session-recording-12-3.el9.noarch.rpm 7b479bd1ee05980da17af1e7c5ad0d90e7bd9bdb3ff0cad492650dd3e8b27585 RLBA-2022:8134 xmlstarlet bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlstarlet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xmlstarlet-1.6.1-20.el9.x86_64.rpm e26bacf2fc510845611e89482dd688e97849710168b2d178be361cb24fe8b8fc RLBA-2022:8135 python-pyqt5-sip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pyqt5-sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyqt5-sip-12.9.1-1.el9.x86_64.rpm 9f11d936058f880263df80c6f230ae9bc35dd7864d35d85d345e2bb04ece580a RLBA-2022:8136 squid bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-3.el9_1.x86_64.rpm 9e5017077840cbcb4c1d7c190f30c33c432bf81ba609a38ddaa2d2ef28804d16 RLBA-2022:8137 gcc-toolset-12 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-12.0-5.el9.x86_64.rpm 069ffd5abc88929cdcb296b732d20a33dd8e42d72c5b4b9550f41391015da11d gcc-toolset-12-build-12.0-5.el9.x86_64.rpm baa40298b58f78796dbd03ac4c9c44bb5b2ed865b24762bae5d54b6398e53fe9 gcc-toolset-12-runtime-12.0-5.el9.x86_64.rpm e78d7b7ee0ac92420bbb966606deb3a5c33c96ef226aa77176cf5c93988eefb5 RLBA-2022:8138 pykickstart bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pykickstart-3.32.8-1.el9.noarch.rpm f22736e2ed9afa86dac65c3f47c80a53698fb007e4a1a87a68edbc920d074312 python3-kickstart-3.32.8-1.el9.noarch.rpm 93ba5604ca07622511f8e406eed91469a4cd8856f88630c705f6038c27a862b4 RLBA-2022:8140 gvfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gvfs-1.48.1-4.el9.x86_64.rpm 1247ffc4409c42fb000d646fa303e26cfb311e5f46885bdea6d9dd46905cd029 gvfs-client-1.48.1-4.el9.i686.rpm a585589031764f10c19cd9020f930eefb68e23b7a50e87515ccaabe75f9ec61b gvfs-client-1.48.1-4.el9.x86_64.rpm 95dda415b751b9ad4ee25f1efd61444f4a281df25c6108f33c7e7308c44aecb3 gvfs-devel-1.48.1-4.el9.i686.rpm 2f564278a1e1b2f62fe9e05dea688f66c9b30d8fb6c4bd5db7a1c43862738b90 gvfs-devel-1.48.1-4.el9.x86_64.rpm 0d05239397aa8c74eb8613db193d5312fc3475befe89c42f0ebc2613a15ee4d9 gvfs-fuse-1.48.1-4.el9.x86_64.rpm 2a897cc17aed2261fc25c6a66fa48e2c806fa29c8d286dcab02073e6bde72f6e gvfs-goa-1.48.1-4.el9.x86_64.rpm a290d3acce55bbf330bf170ed85067eb1b02ab1a64fe119a86774d47ad875ee8 gvfs-gphoto2-1.48.1-4.el9.x86_64.rpm 0072263d41a2f7067d8dec84e92aebf27557e99077fc5d6120619e2feec8507d gvfs-mtp-1.48.1-4.el9.x86_64.rpm bdc9873cdedcdb46bd0b1fda3839149fe06d248614a9ccda92cbc3e689ff2710 gvfs-smb-1.48.1-4.el9.x86_64.rpm 3434aa9e33cd2c9a5de89fc8aa6f4081aa7e371083ebcbbd2e3ca47191a82d3b RLSA-2022:8139 Low: wavpack security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for wavpack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. Security Fix(es): * wavpack: Heap out-of-bounds read in WavpackPackSamples() (CVE-2021-44269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wavpack-5.4.0-5.el9.i686.rpm 390ef240ec337ca163824773612c73f3da9026b2b2bd9334c05e792e5150103c wavpack-5.4.0-5.el9.x86_64.rpm 0cb9059f9475aed284b143b6e1075fa61ed0ec330c26fe4d14400663a10ee814 RLBA-2022:8141 libtpms bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtpms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtpms-0.9.1-2.20211126git1ff6fe1f43.el9.i686.rpm a979efc2ea3ceec51f355bf7889d557caa05c34112ef59f45b7d545665878664 libtpms-0.9.1-2.20211126git1ff6fe1f43.el9.x86_64.rpm aece19397d1e86c41c2b834d567ee1f8086faf19378e89bcaf369132f395fa2e RLBA-2022:8142 yara bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yara. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yara-4.2.3-1.el9.i686.rpm ab4f91581e61679f0306e4a662849f559e0d6aad16d4aeb96eb07cbe1e3bb49f yara-4.2.3-1.el9.x86_64.rpm e35e26f6a439fa0de4cb34724af02d7563a5d2188bb6ae2c7d198f9f806b2d15 RLBA-2022:8143 jigawatts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jigawatts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This is the description of an automated advisory - please update rocky-linux-9-x86-64-appstream-rpms jigawatts-1.21.0.0.0-4.el9.x86_64.rpm 5da599eb894ae6fd64647434631f2f8987d3855906a29b0c6fe1eab48bd3527d jigawatts-javadoc-1.21.0.0.0-4.el9.x86_64.rpm d1dd381a6d43fe73a53a786491b1d1f1f40c8035c5df732779267b8e322397fc RLBA-2022:8144 gcc-toolset-12-dwz bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-dwz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-dwz-0.14-4.el9.x86_64.rpm d5818cd21e858306c982772a08ff1973f3024e19060a30431a1e9869049442b9 RLBA-2022:8145 gcc-toolset-12-gdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-gdb-11.2-4.el9.x86_64.rpm 717724155d20a1d48e2e29dd504ef755d0374fb0ad627c873dd43aaab0437c34 RLBA-2022:8146 gcc-toolset-12-binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-binutils-2.38-16.el9.x86_64.rpm dad63b1fce07b6f45004195896293f3dc072847a7836a112ea720a6227c91cdb gcc-toolset-12-binutils-devel-2.38-16.el9.i686.rpm 969219ccbce2e5fc63373317f9a777203e952f35ae4c3dffc29c62e545ee18c7 gcc-toolset-12-binutils-devel-2.38-16.el9.x86_64.rpm 9078b696d1d3d8024b50a9816adeaf150cda8e65f72eae811bbef016580c1c52 gcc-toolset-12-binutils-gold-2.38-16.el9.x86_64.rpm e30ee2c6c0c98c44047c9934dd6fc277770305f9b17c7266ef99933a62012d7a RLBA-2022:8147 gcc-toolset-12-annobin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-annobin-annocheck-10.76-2.el9.x86_64.rpm c79f7f178d84ca99e5b5a24105b76ff39d2a3b7297fa05d3a70d00830d84080b gcc-toolset-12-annobin-docs-10.76-2.el9.noarch.rpm 1f0f658f506bd3469cc46a9181062f2b21570ffe3391e17a0fd9596819991184 gcc-toolset-12-annobin-plugin-gcc-10.76-2.el9.x86_64.rpm 2f9d1b9c82d9cdc082d6d925da7c3d335daed50ca581db620e2f7feba0e89538 RLBA-2022:8149 redhat-rpm-config bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-rpm-config-196-1.el9.noarch.rpm 24aecb7465b5b95d3857e62a0e412878350eac4678ba73cf14323c312b74d295 RLBA-2022:8150 go-toolset bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.8.3-1.el9.x86_64.rpm edf8ce12472e36dfc8992607b69e5b3855c7b421279e5c9680c23f87da1e8579 RLSA-2022:8151 Moderate: poppler security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-13.el9.i686.rpm 28afc670a3b7e8cae388e335bd4479bd3b207fa34dd50187ea41497fcba193c7 poppler-21.01.0-13.el9.x86_64.rpm 15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc poppler-cpp-21.01.0-13.el9.i686.rpm a5cdeba4f828085c569b3cfc88283e28ae624a8bb3b53f39daaa6c5e08c1b7f5 poppler-cpp-21.01.0-13.el9.x86_64.rpm 054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de poppler-glib-21.01.0-13.el9.i686.rpm 925299930b6c054547c5d7729b127f000d92644d068d961600d22c1e2adac187 poppler-glib-21.01.0-13.el9.x86_64.rpm b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40 poppler-qt5-21.01.0-13.el9.i686.rpm f64c331de77920bcac93049337bbfc401a3aa954c944895167dde73fea7d77fd poppler-qt5-21.01.0-13.el9.x86_64.rpm ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163 poppler-utils-21.01.0-13.el9.x86_64.rpm 40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f RLBA-2022:8152 adobe-source-code-pro-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adobe-source-code-pro-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adobe-source-code-pro-fonts-2.030.1.050-12.el9.1.noarch.rpm a2ae30876e45d49b94caad29fdc085e2f7b0261daf9c95a1540c2823988e3cce RLBA-2022:8153 sblim-wbemcli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-wbemcli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-wbemcli-1.6.3-22.el9.x86_64.rpm b61d03b77ba83b3b7671697bb3302f4d6339424b2412d8b4412ce5180c08e819 RLBA-2022:8154 ansible-collection-microsoft-sql bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-microsoft-sql-1.2.4-1.el9.noarch.rpm 2f46e364529f6e0b54f48653d84ae555935302cbf8564474954e441ab851ba05 RLBA-2022:8155 nginx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nginx-1.20.1-13.el9.x86_64.rpm 6b99ae591ad364a5543ef1ba624ccc4013688b1d1691f9fa42f147a2a4a395d3 nginx-all-modules-1.20.1-13.el9.noarch.rpm a598f868f09baf5b1b6be644242975747e698ec66fac18741b1d76bed4d98ebb nginx-core-1.20.1-13.el9.x86_64.rpm d9427bd641fff3b6f4dcf42be7166090749c9cd51c226d400ad4ca9fc2aa1ddc nginx-filesystem-1.20.1-13.el9.noarch.rpm 0ac0934c29f718f4605e79e87d9948ce844e08c9f3d1698fc2df23ce812ec668 nginx-mod-http-image-filter-1.20.1-13.el9.x86_64.rpm e52687f8d3778d99507cacd3f5f64c6e28571806c02b4965b1e1648f2c177050 nginx-mod-http-perl-1.20.1-13.el9.x86_64.rpm 98941845b5b0a092c125c347d9fb803402d350f9ee37dc4eee2170b0c7bf1368 nginx-mod-http-xslt-filter-1.20.1-13.el9.x86_64.rpm ab64d591f7c7a36f575b7571f1cf6ae23b8b3a904dce3480ce7a89e9b685af01 nginx-mod-mail-1.20.1-13.el9.x86_64.rpm 5cf54cfdb84b31b1fd161aea6d2cedfe79deef76f6892df5c8c35336088ad606 nginx-mod-stream-1.20.1-13.el9.x86_64.rpm 31e58cfe59c7366cec72fc5f38d85f2dd7cea5a830f785b6c23b42cb8356d516 RLEA-2022:8157 libdrm and mesa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm, mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-22.1.5-2.el9.x86_64.rpm 3ef571cb74688e6739894b4214ae070fbf464ab934fab148886e4329f2886ee8 libdrm-2.4.111-1.el9.i686.rpm 7f872affa17a92f0f35bedb7fe908049ca8446a2783ac0195400412f1ae45391 libdrm-2.4.111-1.el9.x86_64.rpm 9f0231776c4a5b9cb98417530227df7b87fb32423746d6080dc6df4d7b780cbb libdrm-devel-2.4.111-1.el9.i686.rpm 492d9af6a953bc4046cd9a1e46dc3c2325573d2090fb02e6850578c4087bf926 libdrm-devel-2.4.111-1.el9.x86_64.rpm 8eaf1ec77ceac5c29010a05674aca47433b99954f8fa4c12270522c865a08acf mesa-dri-drivers-22.1.5-2.el9.i686.rpm 49e0644b9fdf2a83b67563cad899f4269669a6b4b374919c9003c68fccfb2089 mesa-filesystem-22.1.5-2.el9.i686.rpm 6716361d661e98aa6d21dd404434c25ceed468d9caba872eff16a2d453b63881 mesa-filesystem-22.1.5-2.el9.x86_64.rpm a447cad78cfaf8f8c5026f5617bd8f08e7a4698c5b30ffbacc99bd782bb70053 mesa-libEGL-22.1.5-2.el9.i686.rpm a710056806c6f698789f9aacd66fc4f9e828e7f0f0e4eff5b39d3b31fdf52163 mesa-libEGL-22.1.5-2.el9.x86_64.rpm 410bc351f74f81a504a50df75db17bb11eb55c0a2adbdd947c4b88c638565199 mesa-libEGL-devel-22.1.5-2.el9.i686.rpm 2e480c3ee9e66fec8d81b96e0fd1a265ba64f6c51b2dc004a0f3d9de5c70ee77 mesa-libEGL-devel-22.1.5-2.el9.x86_64.rpm b6a737bc98c4c68c6b8bd319328971e73a0747ce2cf32bcd0a692a90e29d9da5 mesa-libgbm-22.1.5-2.el9.i686.rpm 57f2a04c5af1f2fc37434327463e0a1c1ab676eb084055d738d7396825427229 mesa-libgbm-22.1.5-2.el9.x86_64.rpm 6f8546d7d4137b19cc530b9f50873004a6d9eba926b8e0f3752c11716c8126d6 mesa-libGL-22.1.5-2.el9.i686.rpm bb5db03f778474f650894f0aa906483d3b1a10e19094426ef2f6d210f72c4c9b mesa-libGL-22.1.5-2.el9.x86_64.rpm 0df365db3d3492e491293faf4c1eaace63aa65355213b370eb2760f2962b3e5f mesa-libglapi-22.1.5-2.el9.i686.rpm e8c37970035bd4c12e7c63e983250208a57f70e950ae8eb7b766e8e7e193d501 mesa-libglapi-22.1.5-2.el9.x86_64.rpm 7a62d3da4bd2aa45df8d9a30b528f3bf45e70b6c26e5bdafcea34f352c45a1fd mesa-libGL-devel-22.1.5-2.el9.i686.rpm e74db749455a6e774944de2670cff2999fe50b79300e46bacdfae7e922f5686e mesa-libGL-devel-22.1.5-2.el9.x86_64.rpm ea395d297e633ab23a305ec0893ba6ac20654aed45d64957ee535c7e0d3d8a3d mesa-libxatracker-22.1.5-2.el9.i686.rpm 640de554b947a3971ad64c674fb92d1f30fba23ea93780136cd1003acaa81f5a mesa-libxatracker-22.1.5-2.el9.x86_64.rpm 5db4e60e53b5be0a232549b650b923c22648df305541121dccafc7218f117ec2 mesa-vulkan-drivers-22.1.5-2.el9.i686.rpm e90c3365d079d18f56838649ecbc9818c79dc72f8fed6c7a6d40771af50e7dbc mesa-vulkan-drivers-22.1.5-2.el9.x86_64.rpm 351b33e09ee4b52778ce7de94950fe1791e7ddac3a20b8c7730cd3476ead94bd RLBA-2022:8156 gnome-initial-setup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-initial-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-initial-setup-40.4-3.el9.x86_64.rpm e4a1a754630d196a70a040ac837fd77c6aeda12add337bb240273604f92eb9ae RLBA-2022:8158 sdl12-compat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sdl12-compat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sdl12-compat-1.2.52-1.el9.i686.rpm 21e2d4045b6984c87679e4a97cbaadd0808cb86933d454b31d7fbe94658e779c sdl12-compat-1.2.52-1.el9.x86_64.rpm b155c876f6cbc1653cd85021dbf0722adb4b367888ed68eb748845d1e1ef4dd8 RLBA-2022:8159 lynx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lynx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lynx-2.8.9-19.el9.x86_64.rpm fb311eadc81278144d71ffe7c2b6779c26a250ec999733ba92347a049bd66334 RLBA-2022:8160 freerdp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.4.1-3.el9.x86_64.rpm b324ad279b70861510278673ecc3dd75335ff66d9e4b87ae0f2c342c7c0df909 freerdp-libs-2.4.1-3.el9.i686.rpm b6e677381d4f8ed46b90e69e00c1273d36e4c060f1dd1b933a8eaa07d50fba15 freerdp-libs-2.4.1-3.el9.x86_64.rpm 525944e88aa24c6be8527e5c4a42891891c92d8be22914d3a559802cb56c8a1e libwinpr-2.4.1-3.el9.i686.rpm 3cd552f55a0178915dc69854f1567143ed3072fa860ab16d5853f5b0999b4b99 libwinpr-2.4.1-3.el9.x86_64.rpm 2ac6eac99b061ad260da0104b576120e563d2cb4d318e58fdd1546d3694fb05c RLBA-2022:8161 gnome-control-center bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-control-center-40.0-27.el9.x86_64.rpm e6d2f9afdc86938336580a8a11667134723aa12b690592df76302b875abefd70 gnome-control-center-filesystem-40.0-27.el9.noarch.rpm 684127af116dfec70a98c98fe216d90da936316866bf2bfd795e4098b4ef4b4c RLSA-2022:8162 Moderate: 389-ds-base security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. The following packages have been upgraded to a later upstream version: 389-ds-base (2.1.3). (BZ#2061801) Security Fix(es): * 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) * 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) * 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.1.3-4.el9_1.x86_64.rpm 3b4cc6473ff5ac1392e616ec97e9443b1453e7d32e91fef6cdb0682be4956c36 389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm 2efe69bf5068be4b868b036e6e7a3871592b770688e24fa61604599fb37fe1a9 python3-lib389-2.1.3-4.el9_1.noarch.rpm 1e7a92e3e3888fc691fffb710723fb26275825319b3d2ef0384e4f7bc845e100 RLBA-2022:8163 libtimezonemap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtimezonemap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtimezonemap-0.4.5.1-12.el9.i686.rpm 6d538f6356694cad5f6f2784db14aacf6ac5e7a96c353595ca46515ffe61e453 libtimezonemap-0.4.5.1-12.el9.x86_64.rpm f446a32d9f121b709415f9b778394b9e20d012904bc7c24b9d07850e878652ec RLSA-2022:8832 Moderate: nodejs:18 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nodejs-packaging, nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.12.1). (BZ#2142809, BZ#2142830, BZ#2142834, BZ#2142856) Security Fix(es): * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLBA-2022:8165 python-blivet bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blivet-data-3.4.0-16.el9.noarch.rpm 7ff48531205fa1ed8871f8d3ecbcb92c1042d5b9b52359ff6ff5681facce8c53 python3-blivet-3.4.0-16.el9.noarch.rpm ea90e4e4cbf5338eb3e0ebecca93b1ca19ccc0bea135f8f3f3c16243d87cb77d RLSA-2023:3577 Important: nodejs:18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-packaging, nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) * c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147) * c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2023:4327 Moderate: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: schema_element defeats protective search_path changes (CVE-2023-2454) * postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd RLBA-2023:4491 nodejs:18 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-packaging, nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * nodejs:18/nodejs: Coredump during --force-fips (BZ#2227918) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2024:0950 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd RLEA-2024:1138 nodejs:20 enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Enhancement(s): * nodejs:20/nodejs: Rebase to latest upstream version (JIRA:Rocky Linux-21189) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLBA-2022:8166 virtiofsd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.4.0-1.el9.x86_64.rpm 839830a0aeab4fa39ff627035b9f64caace968d28315d8e0448fa91a52397377 RLBA-2022:8167 gdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdb-10.2-10.el9.x86_64.rpm bbe23d5fde66a4ae7ed4073caa1fbbac83dbf32e19d36a4de2948fd66da10c78 gdb-doc-10.2-10.el9.noarch.rpm 41b24e6cdf8edadef09a42d3a17ae7a05e5b6dbc2c74765df0508ba9ca308905 gdb-gdbserver-10.2-10.el9.x86_64.rpm e6650f0730a69bf0f8eef55e199c0e0c4466a959d4b694126e270db3058e9908 gdb-headless-10.2-10.el9.x86_64.rpm c0f6fd4349b441d40e3bcfb5326d92c53fe9ac1a23c0b475cd33b1c53e081fd6 gdb-minimal-10.2-10.el9.x86_64.rpm 47adb160ce09d6a5880286d9c8214c67592ca30a55b6978b6646cd60c4f5ba34 RLBA-2022:8168 fuse-overlayfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.9-1.el9.x86_64.rpm a1fd525022c9dd098f6fd4a6f8b0992a1703a09edc150e860b2f68b88ce89898 fuse-overlayfs-1.9-1.el9_0.x86_64.rpm 0fc694e7a8a1d452449d730ec4573bb96e8e5be99a98e8ee09e65dee164952e0 RLBA-2022:8169 pycairo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pycairo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cairo-1.20.1-1.el9.x86_64.rpm b3ddbe8ce45710aab96976a9dae64958925cf2c2ad4c90cb1e38664e1fc11ca0 RLBA-2022:8170 nispor bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nispor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nispor-1.2.7-1.el9.i686.rpm 86c6609c0df5b810c31d1d7ec2e3b2f7b79bd5da863cbe91627555aa115e0006 nispor-1.2.7-1.el9.x86_64.rpm 14e8f0d959bc0ad63c533714dacffc442f9fbebc225e77a8aeeb899c341ceead python3-nispor-1.2.7-1.el9.noarch.rpm 55727a20d5fabb52be4f132f88fbf337d3da937f1eb0bf51111db5b6c1e48e47 RLEA-2022:8172 libi2cd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libi2cd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libi2cd-1.0.3-1.el9.i686.rpm 10d70a77548056a1d5c0154143d22808355dafe6a0b2a03463aa3332b9eed9a9 libi2cd-1.0.3-1.el9.x86_64.rpm 8fa092ef4e81fc1645f36c5532571bf5c68d45077d30a232e0b27487534ecd11 libi2cd-devel-1.0.3-1.el9.i686.rpm a9d19606a26c0290083f09ee738f3f9be396d84aa3aa8e36425a41b6ca44e39b libi2cd-devel-1.0.3-1.el9.x86_64.rpm 4f4756c8626b1d3ade2699591e62684a16b5650a69d86b5eca844cd8efd52ff2 RLBA-2022:8171 sevctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sevctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sevctl-0.3.0-4.el9.x86_64.rpm 5be0222bb330bfc1206c076084079f4c4d08bfa548c085c58f1fe85bf8fe27cc RLBA-2022:8173 libgpiod bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgpiod. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgpiod-1.6.3-1.el9.i686.rpm b5112bfa1e5f3c33ef821b5f04636a0c4e8f1706932055881178c5955070b302 libgpiod-1.6.3-1.el9.x86_64.rpm ac34238f945c69c3c1c3748f6f0ef509f06599796e126edaef0d8abf558269c3 libgpiod-c++-1.6.3-1.el9.i686.rpm 71641e3321fed8da4b4454f9468ffb2bbf23d80227e20e45fa7a58435117f6c1 libgpiod-c++-1.6.3-1.el9.x86_64.rpm a90d6453a5fa3b184719369f4bbb4407442fc0ad9074db149ec80257f819dea1 libgpiod-devel-1.6.3-1.el9.i686.rpm bdbf3753f9b3e564cf30987637d3822dec6c56797a1b9493d8b6c31a56da0ace libgpiod-devel-1.6.3-1.el9.x86_64.rpm c309dbb0d532ee27f119b6d0dfbadfb575da77fcfe225897d98e3a92efce693a libgpiod-utils-1.6.3-1.el9.x86_64.rpm 1af76bb3d3e2f7b49948bbebf2684d8be30c9c97a826140bfdea79da33b1bd10 python3-libgpiod-1.6.3-1.el9.x86_64.rpm 87dc1dce492670381b40812a32f0885f69fe7848f9166715f1abcc703cba0539 RLBA-2022:8175 mptcpd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mptcpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mptcpd-0.8-3.el9.i686.rpm 0b593d3abf786dca50c25a44c44b1f52060570781dc74bea55521f46be637a0d mptcpd-0.8-3.el9.x86_64.rpm 3720605296f5f179f39691619ac61de11cdafa8a8d903be2df23cb09091775dc RLBA-2022:8176 ldns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ldns-1.7.1-11.el9.i686.rpm 502a935d5f630df45cfbfee0055f4e6dff4156c1d3ba9fea1088dfc41acaa9ca ldns-1.7.1-11.el9.x86_64.rpm 8ef8279cc9755ac5947e0c5c72df6d420f52082879f9bf75a75d51daa3174674 RLEA-2022:8177 alsa-sof-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2.1.1-1.el9.noarch.rpm 11a8722a5699bc1eeca7991f10288cf0194e5ea3773aef2b6b883df0e4a13ffe RLBA-2022:8178 xxhash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xxhash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xxhash-0.8.1-3.el9.x86_64.rpm a1a93b88a208341014a07b4e227ee8f63ad38f3cadd995530d28717de18630d1 xxhash-libs-0.8.1-3.el9.i686.rpm 46faf9996ebe875735141af9e7a412d2a3b8406b34a205d241b5fed38b01706d xxhash-libs-0.8.1-3.el9.x86_64.rpm 7e3de1027fe3d3c0934ecfe927698b1f46cff9d0a2f8a9758ecf613b507f9a37 RLEA-2022:8179 alsa-lib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-lib-1.2.7.2-1.el9.i686.rpm d8fb25ab92198ce8ad68938302056d3deee83da4848f85b7ec03b031d123e920 alsa-lib-1.2.7.2-1.el9.x86_64.rpm 84fdb9af40258397997eecb1f6a46000f03f1c6346787ba5b36517bc1111787a alsa-lib-devel-1.2.7.2-1.el9.i686.rpm ba6a5d9318e52f6115a401970e5479ba43367d1717756238e4cb017cf188e847 alsa-lib-devel-1.2.7.2-1.el9.x86_64.rpm 13dd2b2d59e669ffc48a2a7bbea625dcd9b56a0c0e1b81595917aa10c52c77b2 alsa-ucm-1.2.7.2-1.el9.noarch.rpm 58414314f567dfa4dfc60b2b53ae84ebb83992ae6734b1c7a839b9a0569419fe RLEA-2022:8180 alsa-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-utils-1.2.7-1.el9.x86_64.rpm 1f6a516704a614ecbdf92042a997d18b08b032573c92866fead27b5bae4e5824 RLEA-2022:8181 alsa-plugins bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-plugins-arcamav-1.2.7.1-1.el9.i686.rpm c1211f799d3d1d3a313716fa7de04d3072da36b0904ebc2a673adb0531fca2f0 alsa-plugins-arcamav-1.2.7.1-1.el9.x86_64.rpm 841441ec5727cdf32ac9fd0d621d81c31567139864569eda06a9e044f93ee3c4 alsa-plugins-maemo-1.2.7.1-1.el9.i686.rpm 4b8ceb4db90de830f26ea28716c120a562e2a31a003bdb2ea8fe680a2d670d29 alsa-plugins-maemo-1.2.7.1-1.el9.x86_64.rpm 171d59aa860a81a80f23e0514985fa49305629250b17fe67bfa34b5466171608 alsa-plugins-oss-1.2.7.1-1.el9.i686.rpm ce8b869d93ffcf5469782de2e75bcdb73db5ebe00718dcaac7dd05c16264b54d alsa-plugins-oss-1.2.7.1-1.el9.x86_64.rpm 8558a98367322574df923366f69607c5ff9b98d4133855dab56a8a284cac55c6 alsa-plugins-pulseaudio-1.2.7.1-1.el9.i686.rpm 311efca5973c39e98c72939f3183b108a24727b42c5a69ed28db2c813d390156 alsa-plugins-pulseaudio-1.2.7.1-1.el9.x86_64.rpm f0306182d2629ed563dc67cad008afe3cded020c883678b088cc6ede7babd0f6 alsa-plugins-samplerate-1.2.7.1-1.el9.i686.rpm 4a469bf14b461dce9bb39444fe5f79fd4205267d8e43aedbc4e008044ae8ad6b alsa-plugins-samplerate-1.2.7.1-1.el9.x86_64.rpm 8bb3d05cddb725d795f67b545b6489a95ab1edfd3c02afc26867d6ffc2aa1303 alsa-plugins-speex-1.2.7.1-1.el9.i686.rpm debb39665ad11463123292f43119bbad39256ce691234a58ed161c757477a3b1 alsa-plugins-speex-1.2.7.1-1.el9.x86_64.rpm 11006d3adab8d69166c076dca7452f972f18ec9b42fba1c6b56209dcf404cddf alsa-plugins-upmix-1.2.7.1-1.el9.i686.rpm 0d887deba9ddd07ebb228848df5e1b3d355553a68d1791edd8142a9fea27be8b alsa-plugins-upmix-1.2.7.1-1.el9.x86_64.rpm 0999d1ff60102e26f066f97b829352e61a77c16c247ad6fb5f5388ec572f78e9 alsa-plugins-usbstream-1.2.7.1-1.el9.i686.rpm 685595c994452c2f36eebe638184224d3ec78f4404be2fcb226390d8483a1cae alsa-plugins-usbstream-1.2.7.1-1.el9.x86_64.rpm ccddca7f9022457151be397111118bd7172cb4e701a463113e55870ce9f1b139 alsa-plugins-vdownmix-1.2.7.1-1.el9.i686.rpm 9788946512a5f7dfb8cfd1be4b4e7b6cefa5b1b4946d84967f7d00f2bdc23ee9 alsa-plugins-vdownmix-1.2.7.1-1.el9.x86_64.rpm b752f38e00063f7ab4a5ab55632bfbad1907c482eea6c0dbe5ddcc4ce76cf77a RLBA-2022:8182 realtime-tests bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-tests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms realtime-tests-2.4-2.el9.x86_64.rpm 43c85b357874fc2b8a1827532d9e6f0e2870d5aa0f47c1a0b21936cc0995c3d6 RLBA-2022:8183 libyang bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libyang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libyang-2.0.7-2.el9.i686.rpm a44011d7d851299bfe41502bc731c6425a1276854d0c3a1eab106bea06bb8464 libyang-2.0.7-2.el9.x86_64.rpm 97422d728343a775487873c4d589ba70d269bddbf8b9f4e26d1524eff48f8e60 RLBA-2022:8184 woff2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for woff2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms woff2-1.0.2-15.el9.i686.rpm 791eac3e45468a6b4866acce5d639d3a71829b0797f4d4ab80520a46159b76db woff2-1.0.2-15.el9.x86_64.rpm 4f9899b89e5007560d8773b3ed583a1820a1bb9a2fa6a6796dbbc533ae2f0f8a RLBA-2022:8186 virt-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-install-4.0.0-1.el9.noarch.rpm fb4f09ec90f2f618ede3147eaa90a1f36a6aa8ddd204f5985ea7f8fc71aa843a virt-manager-4.0.0-1.el9.noarch.rpm ff6c887968e9d6e214da67be056bdf88c608a7fbab6794531920ed2d23c7bd51 virt-manager-common-4.0.0-1.el9.noarch.rpm a9a7fd82033f1e5cbe4f5e44aacdbdb8f26ec9f3f2ac3496826880cbac1739c3 RLBA-2022:8187 python-lark-parser bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-lark-parser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-lark-parser-0.9.0-6.el9.noarch.rpm e28a433c4a37b68a19a41a4e824c65a26f0f2ad822cdaaef8ffc804e5b417114 RLBA-2022:8188 python-sqlalchemy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-sqlalchemy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sqlalchemy-1.4.37-3.el9.x86_64.rpm 2cb693b84aced02b07c585c597c0f6074d5c0c6a1fb32a15bf9bcbd793f14e25 RLBA-2022:8190 keylime-agent-rust bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keylime-agent-rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keylime-agent-rust-0.1.0-1.el9.x86_64.rpm 9edbae77d20ff689c11cfa6441d3588817fb7d62a418a8e19b36cef7f10aacc4 RLBA-2022:8191 python-alembic bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-alembic. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-alembic-1.7.5-3.el9.noarch.rpm 6f5942cf159b45e15ffc895ea2bf038296c821ace1f4f8afc28d54f2e50735fb RLBA-2022:8192 python-greenlet bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-greenlet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-greenlet-1.1.2-3.el9.x86_64.rpm 5fa6ab3ce220807cb8cca69b5bb33253ad1b8b21b37e02c9187935216edade4e RLBA-2022:8193 python-tornado bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tornado-6.1.0-8.el9.x86_64.rpm 18dbaf8ed09764fbc045d958d8fd57e8cc8593138aab06c60126b59fdf8b95c6 RLBA-2022:8195 egl-wayland bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms egl-wayland-1.1.9-2.el9.i686.rpm 4887ea358804b0cbbccfaeab0e0153e2fb61faffac53d58ef075653b39376067 egl-wayland-1.1.9-2.el9.x86_64.rpm 9ccf61e337a05f188a658e7fee97db3a5ce2cc8e42ca78894a4c0cb496c7fe81 RLBA-2022:8196 esc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for esc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms esc-1.1.2-16.el9.x86_64.rpm 7502abf540649cbb5edf9421528ecff0185372de94c7f9f92cd5ced018e6b286 RLSA-2022:8197 Moderate: php security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.20-3.el9.x86_64.rpm 5e175c78aeeecb434e348603c9f64c2658149d836cf5df2ffc1e29cdabc26aa1 php-bcmath-8.0.20-3.el9.x86_64.rpm 49935fb88cc8ac6b59fc29d9ef96ca69275ec126fceea16b9197b858961203c1 php-cli-8.0.20-3.el9.x86_64.rpm 79635d8a99c88749c1cbfa795fceeb0ce6728ee062ae687cc0282c8099783a8d php-common-8.0.20-3.el9.x86_64.rpm 948160e7119d2928ba5717ec620af563e3b1f440113029200674a6496cd68caa php-dba-8.0.20-3.el9.x86_64.rpm c0c18dd3cc4a300371c3a051cecd36175b3195aa8b7bbcb04d5daacf6826571b php-dbg-8.0.20-3.el9.x86_64.rpm ddf9727ea726dd63fa0d292ea1f51eea4d8963ca30ea49f79239b90d99db23bc php-devel-8.0.20-3.el9.x86_64.rpm 339999c377ff047d9e08829588dfdf39356719ae3317d59a939abdd1a42942af php-embedded-8.0.20-3.el9.x86_64.rpm bb097d1cbabee71a01baae17f325b30168e99a59c6784a881512e26307b493f2 php-enchant-8.0.20-3.el9.x86_64.rpm 851cbd8b7f0ef7836b9e2f496d2ad8a753ef7b50011e05e6d4e8e8564e71a40d php-ffi-8.0.20-3.el9.x86_64.rpm ac7eb942d94d69fcbe2e8e9a2a343b9534fb0c76ebbc5d219d52c78ee25a16c4 php-fpm-8.0.20-3.el9.x86_64.rpm 587f05e5a414002bb464a1c5e9521d78ec805c411f253199422e277f8cc8a91c php-gd-8.0.20-3.el9.x86_64.rpm ead40131db50980be39a118cda31b55728a0b7e85e2b1cd677d646780a271f93 php-gmp-8.0.20-3.el9.x86_64.rpm 1b4836a5fcf7b25612f15fc01ba9eca4c69d78efcb45599bc958626cd74f013a php-intl-8.0.20-3.el9.x86_64.rpm 944cf829386de1b4ff5bd6adfaafc7aa3b3d144be26e2490146a649ea31eb95c php-ldap-8.0.20-3.el9.x86_64.rpm 7dc0057c96e84fd83f9f5d3e95147cf63b2e01048bfe1b2a411ebb086484b810 php-mbstring-8.0.20-3.el9.x86_64.rpm 5dad49cc5135b8d18d54e83d87edc786ad036b3a1ec22d67b9ae11d9b39dc144 php-mysqlnd-8.0.20-3.el9.x86_64.rpm be7cffe754ff1a72e35f1191c33c9908bfbff46dca3e508031f312fd48e4b78f php-odbc-8.0.20-3.el9.x86_64.rpm c092f39361c909b9881bbd5ae8538c89296badebe9aba40bd70302351df4c3fd php-opcache-8.0.20-3.el9.x86_64.rpm 58cf1c9d7d7d8a2da1c60e3036b6796f01a98071db7147883b0aac3866ee2877 php-pdo-8.0.20-3.el9.x86_64.rpm bb6081db58f55d68f78248ab8a3791942d505ecb3d36e1057dd0ab225f427e59 php-pgsql-8.0.20-3.el9.x86_64.rpm 20e544831a519ae4f1a4e53b086268faa24f9165672daa94b81c30d4a303962a php-process-8.0.20-3.el9.x86_64.rpm b8402b2ddb1a32cdf3ed00f489b7f5acae90ed3f0833157cf4cf1844e3c2959c php-snmp-8.0.20-3.el9.x86_64.rpm f3387477e3c93c21b12543ce93f2196171c8c08bd4691d24a0af988a16b8aa7d php-soap-8.0.20-3.el9.x86_64.rpm 3798a3a2ee6bcf61d7e7f4410b9fdf45872547a5345eec00d9f45dca574082c9 php-xml-8.0.20-3.el9.x86_64.rpm e5363d13ea6de9054e1e4858799473c046fee9f523f9083584bba10b6666cfd9 RLEA-2022:8198 rust-coreos-installer bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms coreos-installer-0.16.1-1.el9_1.x86_64.rpm b6a3f953b2d0b6ea51d1541108dc27603c238df01b7510d376c6b5bbf41e886a coreos-installer-bootinfra-0.16.1-1.el9_1.x86_64.rpm 0f60cb49d4897d90c9c772757a8b000825048e5b6c45a458429d3591273dc773 coreos-installer-dracut-0.16.1-1.el9_1.x86_64.rpm 77e2e821d3e2c6702cb6f4c8ff605bcc0756f8b5bd4f141d2dacf9185ee0b2aa RLBA-2022:8199 memstrack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for memstrack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms memstrack-0.2.4-1.el9.x86_64.rpm 2f33a33f249759e30e8ec16f7705ec061947d487aafd55e201731aa43bd3e64c RLBA-2022:8201 i2c-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for i2c-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms i2c-tools-4.3-3.el9.x86_64.rpm 00051fd0991b600bbd98398f72bf0df4c0a32453ce473ee9153bd40b292aa974 i2c-tools-perl-4.3-3.el9.x86_64.rpm 65f60b4390a953f3fc886737446948184ca5a9e95638ac1524135e3d9dca2ce8 libi2c-4.3-3.el9.i686.rpm f1cb910320ecafc60fc5796a79d15304ad4edba6926896b0476f9b32571e3af3 libi2c-4.3-3.el9.x86_64.rpm 3c124d4e29d84f6889e3a170a8b1c9702c601786a2a62626064e84e19776d1c0 python3-i2c-tools-4.3-3.el9.x86_64.rpm 12fd5297d4ad389fc6634ef9c3843e178cccc8daf36d6d50671672dd16cfc501 RLBA-2022:8200 qpdf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qpdf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qpdf-libs-10.3.1-6.el9.i686.rpm 10bb2d031a2c79fc5d47975097d224af197d2897c7a145634f4a7fab0897dfef qpdf-libs-10.3.1-6.el9.x86_64.rpm 48a7b0df3bd69bdfe0bf1552d774fd3aefe499e7118167159fc04c9d8662f28c RLBA-2022:8202 desktop-file-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for desktop-file-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms desktop-file-utils-0.26-6.el9.x86_64.rpm c21437bc05ff7c3dee231b51fecc0da983a7734e39dbbbd7b599c1db29db2204 RLBA-2022:8204 tk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tk-8.6.10-9.el9.x86_64.rpm 82ad90c7cc5ae4e7e881e96877d4bbb11591533b7d90dc784ec1e99aa33300b2 tk-devel-8.6.10-9.el9.x86_64.rpm b0b183301591e3d13956c3c74cf0810718f4d6427392676b2dc1d680df5c04fd RLBA-2022:8205 boom-boot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.4-4.el9.noarch.rpm 36d899d5655c1d73937495a9d3373a659e7f85e112fb9ea66e44e631df4abb1c boom-boot-conf-1.4-4.el9.noarch.rpm 7f50d99086c4dcb67b946bc9f16bb26f69aea3106328106eca4efbc5b7b7df51 python3-boom-1.4-4.el9.noarch.rpm 0a86880339a0bfe308f6271fe2e50bf812e4cb56b1a591b7dae4dfe3cf187ce2 RLBA-2022:8206 babl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for babl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms babl-0.1.86-4.el9.i686.rpm 75101daf3a2db0f4478c52fa38ed7aa3983abd31a15fb6a2e26e9dadb33dc6f2 babl-0.1.86-4.el9.x86_64.rpm 713540974c7915151dc9acf6718e37779abde14b42654ada9aef425615c4983d RLSA-2022:8207 Low: openjpeg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for openjpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openjpeg2-2.4.0-7.el9.i686.rpm 52aaa3e88ca62afea172e795409264945c957b26bb2fc71b0840042a8791493c openjpeg2-2.4.0-7.el9.x86_64.rpm 380ef2db96766ecee5e15cce67f91b5d73c721672930add64bd35de5da12c6a7 RLSA-2022:8208 Moderate: dovecot security and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-7.el9.x86_64.rpm bce9c48cdd6c1728b24154db2df749923d566cd5ba8af9b81020b1a8483df30a dovecot-mysql-2.3.16-7.el9.x86_64.rpm f6b6f62fb91c8bf43d28d4adef1cf0bd4b292ff0a9d153c7902046fd59dcd1b2 dovecot-pgsql-2.3.16-7.el9.x86_64.rpm 66791a014213a14247c6070f04d47115ffb492ebe04409f15675dd430460f184 dovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm 260ebeb9e820d106630cf20e2729060eee2a2d53f7e03380647bfae804962b55 RLBA-2022:8209 boost bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boost. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boost-1.75.0-8.el9.i686.rpm 58ed8937d98085d8e48714de56d2ddbb3f1da3d127b9a18237929d72e0d0f07f boost-1.75.0-8.el9.x86_64.rpm 2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f boost-atomic-1.75.0-8.el9.i686.rpm 42e51de336d46116cc659f9b5a58aec31a59f0477a737b741937fb52c59122cd boost-atomic-1.75.0-8.el9.x86_64.rpm 52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409 boost-chrono-1.75.0-8.el9.i686.rpm f0c2b20e2433f2d21bda9e1f7cf392926fd73cd6e114e72ed2a7aba3dc71db26 boost-chrono-1.75.0-8.el9.x86_64.rpm 784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f boost-container-1.75.0-8.el9.i686.rpm 3005167606f243f2741ac6574f8377b70ed0676451ec1bdd5ea96a8d661083fa boost-container-1.75.0-8.el9.x86_64.rpm f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b boost-context-1.75.0-8.el9.i686.rpm e727bb684649efccb51a80a283dc678e24b506bb9859c3fece10dee5ec98bf6f boost-context-1.75.0-8.el9.x86_64.rpm 5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a boost-contract-1.75.0-8.el9.i686.rpm 907a6227e84653a535ce70ac0999a6917448bb3acc610c7662e6257fa1a0236c boost-contract-1.75.0-8.el9.x86_64.rpm 7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434 boost-coroutine-1.75.0-8.el9.i686.rpm d4c0a594b6aceb68fba791ca7ac2b2a397818af78a4131fb1b52cc27d9cd6fa7 boost-coroutine-1.75.0-8.el9.x86_64.rpm 1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75 boost-date-time-1.75.0-8.el9.i686.rpm 976c88250567f44bacdc12d5d0b1dcbe8b71974f950e77d697e255a2f9829203 boost-date-time-1.75.0-8.el9.x86_64.rpm d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98 boost-devel-1.75.0-8.el9.i686.rpm 63901104228b418e873c2c4395808085ecfcdaf574f47c875445a01f09863b7e boost-devel-1.75.0-8.el9.x86_64.rpm 445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd boost-fiber-1.75.0-8.el9.i686.rpm 4617722852d77bffb2b8ba431ab8f6258816668428b8704adc3817afcbb55b52 boost-fiber-1.75.0-8.el9.x86_64.rpm c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369 boost-filesystem-1.75.0-8.el9.i686.rpm 2b10603f623495ecc136ac2e9aa57f3e8c8ae400072033f324a9b41a5eda6715 boost-filesystem-1.75.0-8.el9.x86_64.rpm 9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d boost-graph-1.75.0-8.el9.i686.rpm 86584c945976a1ebfc2145faed1eb799808909f159013548f372485098e4a063 boost-graph-1.75.0-8.el9.x86_64.rpm 0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5 boost-iostreams-1.75.0-8.el9.i686.rpm fbf3415c681fd8fa9a693db008b1a1734a0902dd97b2bc3aa31b4a7ef100fb46 boost-iostreams-1.75.0-8.el9.x86_64.rpm fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585 boost-json-1.75.0-8.el9.i686.rpm 440a0a8742eb8f769c0309939e264688699453f1aaebb48ae36a0360a43b6856 boost-json-1.75.0-8.el9.x86_64.rpm 4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f boost-locale-1.75.0-8.el9.i686.rpm 8b1d3e963c86da485122fdb5b146ccc7e37070d4f62d682929c15d05d5917ec6 boost-locale-1.75.0-8.el9.x86_64.rpm 675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3 boost-log-1.75.0-8.el9.i686.rpm 340e75e71e371b10ca458fdbb0dbd4e77b512390b094f22fab80ac0225fd56d9 boost-log-1.75.0-8.el9.x86_64.rpm 1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720 boost-math-1.75.0-8.el9.i686.rpm 76c985c84b75a9ff6fafaaa503e5631314f1aa4788a01a2d9694880110264da9 boost-math-1.75.0-8.el9.x86_64.rpm a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161 boost-nowide-1.75.0-8.el9.i686.rpm 127d21e6569f70094c080d73bf92a8247465627f52b1fd2a36e415fb2f5a2d03 boost-nowide-1.75.0-8.el9.x86_64.rpm 85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1 boost-numpy3-1.75.0-8.el9.i686.rpm fb77effe64d876c933f28a57a97e8b5297cf2d25eb36625d8f3d359d9dfde10a boost-numpy3-1.75.0-8.el9.x86_64.rpm 00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b boost-program-options-1.75.0-8.el9.i686.rpm 5b50ab1238f9302b21440476c9016e7e843d6b9c8b15e62eb959efd9d0bbf3f9 boost-program-options-1.75.0-8.el9.x86_64.rpm a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e boost-python3-1.75.0-8.el9.i686.rpm 9026712d638bbc413ea75f3f1a64b84a479063d6d77292751142ead328e21e02 boost-python3-1.75.0-8.el9.x86_64.rpm 872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731 boost-random-1.75.0-8.el9.i686.rpm 6e2c5c68c6662e77385b620f1a22971786e45edb543e6270c7e98ee01d0d7c2a boost-random-1.75.0-8.el9.x86_64.rpm b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098 boost-regex-1.75.0-8.el9.i686.rpm cf2feb7f87ee9bc16661ce07437ccfb538839b95d4a58150494385dba73dd53c boost-regex-1.75.0-8.el9.x86_64.rpm 7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c boost-serialization-1.75.0-8.el9.i686.rpm 452ece30edc38c5910f92aab440057f17aa1c98d001041c24e404799433bcdfe boost-serialization-1.75.0-8.el9.x86_64.rpm 73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f boost-stacktrace-1.75.0-8.el9.i686.rpm e1622741e30ad6da37b6e28fcdfa5807cf61bd457c0dcc30fa30c1f99ab4b9c8 boost-stacktrace-1.75.0-8.el9.x86_64.rpm 884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a boost-system-1.75.0-8.el9.i686.rpm 5126686589b845b18e6763abde79b90edb2a3493aab998882e71ec8099d72441 boost-system-1.75.0-8.el9.x86_64.rpm b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f boost-test-1.75.0-8.el9.i686.rpm 5507b687862fc4f9a0e9c6a8fe908f88228d2b5cf5075ac041054a4e97117392 boost-test-1.75.0-8.el9.x86_64.rpm 1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487 boost-thread-1.75.0-8.el9.i686.rpm ea34b832a8a0b9630271e0d55c19e21a0980d4cd16368d67aec52fe71e98ffd9 boost-thread-1.75.0-8.el9.x86_64.rpm 55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989 boost-timer-1.75.0-8.el9.i686.rpm e9c7e311d4f212f4c8795b1c40026a01b29601988892a5aa249e1eee68246bfc boost-timer-1.75.0-8.el9.x86_64.rpm fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162 boost-type_erasure-1.75.0-8.el9.i686.rpm a1f84e5e0168d6eda59ae34fbd41f2bd8a297638e88910987d60299293dd4c3f boost-type_erasure-1.75.0-8.el9.x86_64.rpm 736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383 boost-wave-1.75.0-8.el9.i686.rpm 50d039d5c439f231368fb55fafc9c75b1c75718e45bb90c582f90a919d9a95bf boost-wave-1.75.0-8.el9.x86_64.rpm 555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba RLBA-2022:8210 pyparted bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyparted. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyparted-3.12.0-1.el9.x86_64.rpm 0afa7b5034da816c99cf2752ec0d843f76addd01ef3c9280cc3e4a298f453e5e RLBA-2022:8211 gnome-screenshot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-screenshot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-screenshot-40.0-4.el9.x86_64.rpm a6c5e1eb1610025cd061fdfcb4ddb2b6b88e7f8c782f175d7c29a4e251154810 RLBA-2022:8212 haproxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms haproxy-2.4.17-3.el9.x86_64.rpm 78dbb113b27ff5a265a42987d46723fa2fbfe11e3d44cfce4414ed4dc6b60892 RLEA-2022:8213 nvme-stas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nvme-stas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nvme-stas-1.1.6-3.el9.noarch.rpm 6dc35cd1f740d622bff0843c8cebc11ce55922367441363193afa60bbd78ffe0 RLBA-2022:8214 perl-Net-SSLeay bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-SSLeay-1.92-2.el9.x86_64.rpm 357229b9af77138e17a13553f1fb066fe3701612189ea8383b98ea1e51885e75 RLBA-2022:8215 thermald bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thermald. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms thermald-2.5-3.el9.x86_64.rpm 091823c2b1375dccf989c7beacca0228ece69bba97c2fc1433a67d623d072ab8 RLBA-2022:8217 usbredir bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usbredir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usbredir-0.12.0-3.el9.i686.rpm c593686fe8502b5059088e8dc39b034d414bbaba752c6ad4507e14b76e9810d8 usbredir-0.12.0-3.el9.x86_64.rpm 57fb3b4a5be1eb45e5b172c74cb064e52bfcb0bf71bd1250be5c167c95295919 RLBA-2022:8218 gtk4 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon, gtk4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-settings-daemon-40.0.1-8.el9.x86_64.rpm 800dd0da960865369db3c68aead417ff8cddf4b7c4518168ca9cfcf08284c87c gtk4-4.4.1-2.el9.i686.rpm c736a9851ff4f7730a8c3f000e36515cbe28524759958a62c7960290ea149643 gtk4-4.4.1-2.el9.x86_64.rpm d437e452d1fe83036d5eca55e35589ba02cd2ea4a8fa9e305c0f17b2dd19f97f gtk4-devel-4.4.1-2.el9.i686.rpm 6e51c38d35a50883388074014e45bbf59dc381ed20a7b8fa8b8cadcd637cc8b0 gtk4-devel-4.4.1-2.el9.x86_64.rpm caea1db5a795bca96600266cce9f98ee30323c4d63cfea681e4a8695a50365fb RLSA-2022:8219 Moderate: mutt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mutt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mutt-2.2.6-1.el9.x86_64.rpm 61d1790586762a83003766cbc478f8c89f5c926018cb6ca060c73eb5ba3d3c19 RLBA-2022:8220 linuxptp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms linuxptp-3.1.1-5.el9.x86_64.rpm 4bde8fdc5d0a442ee994505f36f09018954997ea0f29ddb126265078718317c3 RLSA-2022:8221 Moderate: xorg-x11-server security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm 7d8b5f3399c42339f7c4ee7d3b889fb5083fa4f6d9c681152c59398b7f5efc4d xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm 2e27abde8895d87a40cde4e7e45d4eb7cc69294658f55183e7fcfe8110ee04a7 xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm ce545a7d5176f15df483c7a31b60dcd258f632b9a76f80c2c957ef0f83b6a3dc xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm 70473190d910f0dea1dd79af8fe1d57a02c661261bf203ce08958063ec8ba821 xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm 20da0d88f41ef7b6e7bb191b03fc8934a40652f190f49071afba9c66789ac777 xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm 44de1961729f2d471e990643a072a56de17b01ccbfd606a1cb0212fd1b18564a RLSA-2022:8222 Moderate: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpm 60132705c1fff9b7e772066b3c8a26d6a184b5010f979d325f21a3b42ab05290 RLBA-2022:8223 memcached bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for memcached. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms memcached-1.6.9-7.el9.x86_64.rpm 0bad4c2f81ba7832bf7b83d64324cad09cd1b486d3e5be3af77c64955d5216bf memcached-selinux-1.6.9-7.el9.x86_64.rpm b751390d0464b4ea36d262cb67461b91f045bd9e9ed6ade29357062aa21d45bd RLEA-2024:1140 nodejs:18 enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Enhancement(s): * nodejs:18/nodejs: Rebase to latest upstream version (JIRA:Rocky Linux-21438) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLBA-2022:8232 clevis bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-18-106.el9.x86_64.rpm e58138c100a2b959897cc248f49ddd35dfc465c092f0d6d950acf64cf4be6a2a clevis-dracut-18-106.el9.x86_64.rpm d277cb71560fdb9d14b787b1837cdbf15190ec96b39083e3366cd578f86bfaaf clevis-luks-18-106.el9.x86_64.rpm 69c5b03a602fc4dd5bddcae71dcd982848efeb438c894122f2abe207aa0c89d5 clevis-systemd-18-106.el9.x86_64.rpm a75bac460450de46b7dbebec21fd0eca73b4160ede7baf868316d6873bd9adad clevis-udisks2-18-106.el9.x86_64.rpm 251831b42e94ac3d1e4679e9230493854302ead31e0bcf32b8868e6e638ed057 RLSA-2024:1503 Important: nodejs:18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892) * nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019) * nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2024:1688 Important: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809) * nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019) * nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892) * nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896) * nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891) * nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890) * nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLEA-2024:2162 new module: postgresql:16 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm 44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm 6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259 RLSA-2024:2779 Important: nodejs:18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: CONTINUATION frames DoS (CVE-2024-27983) * nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025) * nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982) * nghttp2: CONTINUATION frames DoS (CVE-2024-28182) * c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2024:2853 Important: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629) * nghttp2: CONTINUATION frames DoS (CVE-2024-28182) * nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025) * nodejs: CONTINUATION frames DoS (CVE-2024-27983) * nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLEA-2024:4763 nodejs:20 module bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * Faulty npm package version in NodeJS release causing issues with connections [rhel-9.4.z] (JIRA:Rocky Linux-44942) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2024:5815 Moderate: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Bypass network import restriction via data URL (CVE-2024-22020) * nodejs: fs.lstat bypasses permission model (CVE-2024-22018) * nodejs: fs.fchown/fchmod bypasses permission model (CVE-2024-36137) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2024:5929 Important: postgresql:16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks (CVE-2024-4317) * postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm 44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm 6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259 RLSA-2024:6020 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgres-decoderbufs, pgaudit, module.pgaudit, module.postgres-decoderbufs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348) * postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks (CVE-2024-4317) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd RLSA-2024:6147 Moderate: nodejs:18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863) * nodejs: Bypass network import restriction via data URL (CVE-2024-22020) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2022:8226 Moderate: python-lxml security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-lxml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API. Security Fix(es): * lxml: NULL Pointer Dereference in lxml (CVE-2022-2309) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-lxml-4.6.5-3.el9.x86_64.rpm fa211bf07228f42800523d7e6d2c932f1f9f15812f944947820d29fa4bd27bbb RLBA-2022:8227 rust-bootupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.7-2.el9.x86_64.rpm 9a0e1470330f67e6a3a065626f9094dcf0727bc5e6d6498f4db6401041c22280 RLBA-2022:8228 virt-p2v bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-p2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-p2v-1.42.2-1.1.el9.x86_64.rpm 94d05e055f21891efb4b075a2839c8938ef316c456d708da8e39306dc3f0cec8 RLBA-2022:8229 mod_auth_mellon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_mellon-0.17.0-7.el9.x86_64.rpm a9fd4dde11407ef5867b6d98654736649367fe62d45d3ec71aab416f97efca6f RLBA-2022:8230 python-ldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-ldap-3.3.1-9.el9.x86_64.rpm ef62df4cbc90c0b91f31d6fdd84c43bacc46109bc5e5a7867d49c178be3ae58e python3-ldap-3.3.1-9.el9_0.x86_64.rpm 202b9bd4a849116161ed5ddd2828ea48f99b1570b3123b146c4dc531bfac6771 RLBA-2022:8234 libmypaint bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmypaint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmypaint-1.6.1-9.el9.i686.rpm f6bcc99887d1613d6c2fa40291417e4461efb9f8ec51f7f4835eed886fb22463 libmypaint-1.6.1-9.el9.x86_64.rpm 2cc42b9c0b713fef6c2beda9bb4f8aa00a27f4f15154e574e0d1a386d8688140 RLBA-2022:8235 console-login-helper-messages bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for console-login-helper-messages. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms console-login-helper-messages-0.21.3-1.el9.noarch.rpm bea910a5de9b65a1df9ff25aa90b366bddcbe1ace548e6a817338a2bfe3ae86c console-login-helper-messages-issuegen-0.21.3-1.el9.noarch.rpm db679a734f9ef8961bbe4d96fd02d818cb511c1d9ac538f1e6b88b3ba1c22cd4 console-login-helper-messages-motdgen-0.21.3-1.el9.noarch.rpm a0ec05018f8ce26fcb4dc10eb4153ce197a4a9994791f4c609504d1ba45dc045 console-login-helper-messages-profile-0.21.3-1.el9.noarch.rpm ea21cf6c9866c4640f4371684453a281dda1fd08f4c08fea1e645e04a862401c RLEA-2022:8238 maven:3.8 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__maven apache-commons-cli-1.5.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 5f60c0f0885af2f6f950afcf45d7f1b95f5e34396261dd8ab6d7cfb442e04992 apache-commons-codec-1.15-7.module+el9.1.0+13170+43ecddfd.noarch.rpm 0220287810e4799917d4db36b17366650576949b14c8618a71dfb1a7682f5fa9 apache-commons-io-2.11.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 93c68ec43f1b49c63479295890c398322ab939ab29ca7e14793be3e42b78dc58 apache-commons-lang3-3.12.0-7.module+el9.1.0+13170+43ecddfd.noarch.rpm 7a97cce8dfb4f34680befc4ed4ee791511f7c4809a53d7c74b6c34b1824d6f9d atinject-1.0.5-4.module+el9.1.0+13170+43ecddfd.noarch.rpm cd129e561144604ca32ec4bee7ea7aa4765f8ed2b3c36faf0e32cb1a1f5dcd49 cdi-api-2.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm 96dc9cd4356a07481cb5d88f756fd07ba7af7e8f36bc0d3abd8994f17dde304a google-guice-4.2.3-9.module+el9.1.0+13170+43ecddfd.noarch.rpm 85f6ee589dac7db7b3758a33e66d9c94d1724fc1ed3ff964f7d8d2b207141dba guava-31.0.1-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 7053c8ec1dd10a61c90c4b7d7d61f077bab8b34805957c3db312f76553c1905e httpcomponents-client-4.5.13-5.module+el9.1.0+13170+43ecddfd.noarch.rpm 484bd383b25748ca4e080f457c6722bc4ed14cc96873ae54ab2d9eec52671e47 httpcomponents-core-4.4.13-7.module+el9.1.0+13170+43ecddfd.noarch.rpm dede20b7e3f22bf3717f8e50258bb8a3fd02b45f533970099ae70d1e90419dc0 jakarta-annotations-1.3.5-14.module+el9.1.0+13170+43ecddfd.noarch.rpm 5a30f1e02cb734a8377b4f3afd1becb24ecdce48c88b2738056880824dde2b5b jansi-2.4.0-6.module+el9.1.0+13170+43ecddfd.x86_64.rpm 5baf28a6b6225d36009e2411b8363856ea07e2e9dc78266991285c8ea48f19e7 jsr-305-3.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm 52ac49dedf9a4d4d34659161de396aaf24ebab5df8687728c7446ecd00eb189e maven-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 1df931bcf111accb8fde1274956c1dadf7d44af54eb033df5982d587e56029f6 maven-lib-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 29623a02dd4fa20b10cb5576b2fa742ffbd0ff98b9e0efce7a6c0abae6ea4aff maven-openjdk11-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm d036e0f520a266cf1a4073fd2daa0d87e2c35e8d6d2fe11559106afc9adef62f maven-openjdk17-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 7b6af55330bbc4cba5e756870581ab86faac168eed97e186fbff68bc1346c496 maven-openjdk8-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 25b69af66417f1e5fef95a64ad260b50cbd7c72cebfe049f66df215a587348b5 maven-resolver-1.7.3-5.module+el9.1.0+13170+43ecddfd.noarch.rpm 508ca00cd0867997130acefcce0fb3735dc2b7bf8670522630022218f070d947 maven-shared-utils-3.3.4-5.module+el9.1.0+13170+43ecddfd.noarch.rpm dcbbe98f91df73f36aa2644486cf31cea32885e4e2aef6ef6bb28fae76bf9dca maven-wagon-3.5.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 5153d667906734b37ef6d8e212fcf7ffdd6ed1b9355e63711918b6819cb73a42 plexus-cipher-2.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm b11abf8c08095567df1496e4330aceb70a5163268b164bb28e254089db634957 plexus-classworlds-2.6.0-12.module+el9.1.0+13170+43ecddfd.noarch.rpm c6d49d6b64148f873197a3cc51a507afaf0239101e0124e4a15a531371c8795b plexus-containers-component-annotations-2.1.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 0f3fb322eaba1f62aff06ec80bcaf501c28a2db6356cc8b6516149a0b2cc3bd7 plexus-interpolation-1.26-12.module+el9.1.0+13170+43ecddfd.noarch.rpm b820fc3d61f29e6dbca25c09dc2b656a5b12cec378d1ef3d408f474cc688328d plexus-sec-dispatcher-2.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 72dd34d0de2d033e4ece01cb917333305955d537c452a4025aaae7a6ada50e68 plexus-utils-3.3.0-10.module+el9.1.0+13170+43ecddfd.noarch.rpm 1cd5464ba8e8aa341ee6e1dc441ccab6b0d9b8d75745f181ed91dafc9d39dd75 sisu-0.3.5-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 3385b54dd2ce04419619aa06506209484c6e3aeeef9879593e1052e4428a1c87 RLBA-2022:8239 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sanlock-3.8.4-4.el9.x86_64.rpm ae38bc1bbd31fe51b7ba7e1a80db2fb855c5c5700c6ee0d22f1eedd3d5a2e5fe sanlock-3.8.4-4.el9.x86_64.rpm 9b0ca1c638236ac6961e065db951d322d4b1d8fb3c5228232393aaa46480353e sanlock-lib-3.8.4-4.el9.i686.rpm 38a0134785f72c64785bff4356766e7fc9bbd3b66dc4c8a3c987747967965dbe sanlock-lib-3.8.4-4.el9.x86_64.rpm 1e471abe195b95065e12e268f67f373aa1b8822af93e3a1c17834a08b3a21ebb RLBA-2022:8240 libwmf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwmf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwmf-0.2.12-10.el9.i686.rpm ba0f271dfc03845d8f9f2ed1cc18e5330fc902673f6e9ea7043e6b9f22ec79ee libwmf-0.2.12-10.el9.x86_64.rpm 10edb5e9b9fccd66c4e55055bbaa1143a10d0c94b68b64ffca6e23746afa36da libwmf-lite-0.2.12-10.el9.i686.rpm 4c7d32b35a79a0a41ed50f407d3d5104958114d468abe02ebb4d1762d8244199 libwmf-lite-0.2.12-10.el9.x86_64.rpm feac0332faf70b0d4020ee6ea093f92c00dbe549ce339e64db5df41178817496 RLBA-2022:8241 oddjob bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oddjob. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oddjob-0.34.7-6.el9.x86_64.rpm 35ffb909d64d80a820904f8c7a75b949de40fa129a19f0906d2d1851f896a3a9 oddjob-mkhomedir-0.34.7-6.el9.x86_64.rpm e9030611829295ee108b80b4a564988ce58e2ac034ac1e7718ef82f52f638ca5 RLBA-2022:8242 cyrus-imapd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.1-7.el9.x86_64.rpm b829eb431f81aa37245b13b5950504cf1a5b8c3a18e5099d3df46361c332bf18 cyrus-imapd-libs-3.4.1-7.el9.i686.rpm 225300109af48fca1a8628d7a1afc36af783c913a9b078e4f798649730f4ec96 cyrus-imapd-libs-3.4.1-7.el9.x86_64.rpm ab15ef771f9e0cbeebb1d24ec281f8e2ba946e1b25494dcb1e45f02bc5ea3851 cyrus-imapd-utils-3.4.1-7.el9.x86_64.rpm c4548108d8ebd50f5590118ed6f32e4f40aba5fe184e37bd406ad88a9ebe83c9 perl-Cyrus-3.4.1-7.el9.x86_64.rpm 6d059a1c4a2be5194c1dcbf35cfaeb10a6cad898b9a84cf1d5a870c0355b3a7e RLBA-2022:8244 postfix bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postfix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postfix-3.5.9-19.el9.x86_64.rpm 6bd218d9106aef57f107855f817ae875519db76364c01aadde4aef80b22c9b4f postfix-cdb-3.5.9-19.el9.x86_64.rpm dfcc70fdf527193703e989a3afdb519e9ce035f4ffe5830c6a88ffc2f8962d20 postfix-ldap-3.5.9-19.el9.x86_64.rpm e60921e145ce1c01f69c46946ccd3c6c6073647df4587bf19d340ee62a1b0b8f postfix-mysql-3.5.9-19.el9.x86_64.rpm 02596c950777c16c311a104ecfd924c8d0b198e5e7a23c83b5bf5824634f39fa postfix-pcre-3.5.9-19.el9.x86_64.rpm a5faa2d06088bb997e9e8e17179f387b406330ae703766ec1b43bee21f1a9339 postfix-perl-scripts-3.5.9-19.el9.x86_64.rpm 6d90768263b252bec6168cd52955611e40d15ca4d0be492fc48fcc4ae98399d6 postfix-pgsql-3.5.9-19.el9.x86_64.rpm 518556705128c3a92afdde8f5c3630253304655f353971d8078fe431af2426cf postfix-sqlite-3.5.9-19.el9.x86_64.rpm 2a1320ae4ab3e1a1eb77db606c1169fffb2ba86cb93b0af06f1ac5d81c9f0888 RLEA-2022:8243 ansible-collection-redhat-Rocky Linux_mgmt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-redhat-rhel_mgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-redhat-rhel_mgmt-1.1.0-2.el9.noarch.rpm a993fc8b1a6fe626b846b1013953840d5a2b351791fce4b775796b1ae3417bb2 RLBA-2022:8245 redhat-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-display-fonts-4.0.3-1.el9.noarch.rpm 61aa9f5a9291c27b6ba9961c0966e69019b396dc7627f0e74478333fa3356a63 redhat-mono-fonts-4.0.3-1.el9.noarch.rpm 887119ab098677e9be1607c63ccc99a2630d507f97e883501f48c56e7a2aca80 redhat-text-fonts-4.0.3-1.el9.noarch.rpm 1b11415a8e7e42aa352258b914e0ef24d4c90a203126970b55b0f73010e28ef1 RLBA-2022:8246 rear bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-15.el9.x86_64.rpm 89cf013f320dede3c9b289033a5976ca6a596f5b9b0eeab2ca970d063a6d8c60 RLBA-2022:8248 xdp-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxdp-1.2.6-1.el9.i686.rpm beb7c66717ac93db67e54e7d633606d9107b46fb1bcecd5d502068db3441a372 libxdp-1.2.6-1.el9.x86_64.rpm f71cd63363be4cb761b93786e0cc04e69bc828ff93c2a62a42ff038f9ed4adb9 xdp-tools-1.2.6-1.el9.x86_64.rpm 19ba61dfad9d6e56f9dab6e4e2d0756f5933e1c81a849513417158f99e779607 RLBA-2022:8247 slapi-nis bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slapi-nis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slapi-nis-0.60.0-2.el9.x86_64.rpm a532f162ca5ba258aa60b4216af198d7166d587d94631d5e0a3bc98294e2e54a RLBA-2022:8249 sane-backends bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sane-backends. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sane-backends-1.0.32-7.el9.x86_64.rpm 69e6b7fcc2d2de541cf68673157ec0e5d3681585cfc6d1b6561e004134c56734 sane-backends-daemon-1.0.32-7.el9.x86_64.rpm 53c67e1fa2ccbcc3b20182ffe182c04edcc35c550ef1cf413a587ef393c89ba1 sane-backends-devel-1.0.32-7.el9.i686.rpm b1f56fc86b06c9a9164b7ec00e5786b81c79d8b881e641f6ac6d047584f250be sane-backends-devel-1.0.32-7.el9.x86_64.rpm f918bac272b3be5efaeedcbd406107b3dd1f39184aa69638f9602f924e7851fb sane-backends-doc-1.0.32-7.el9.noarch.rpm a9d8c28e58d3b72a99879099ae09e78c6656f162d335d4ab82def47286e3a967 sane-backends-drivers-cameras-1.0.32-7.el9.i686.rpm 4ef594d86228f1d54964068febc2515b305cc38bb9861893a14e56ba69c8859f sane-backends-drivers-cameras-1.0.32-7.el9.x86_64.rpm 4c73477320cd47a6d330cd4ec7c37dd5b3c76df3771b2afe7387c3a98f630a43 sane-backends-drivers-scanners-1.0.32-7.el9.i686.rpm ed80ab8a7d9b7a5ff9d315bea58cd461ac2d9bba6e7da7f618a9d6eece8bfda8 sane-backends-drivers-scanners-1.0.32-7.el9.x86_64.rpm e561568efccd50d05f79850cc70f93d6c5a6b4b9430ec519ea12fc31963fbd50 sane-backends-libs-1.0.32-7.el9.i686.rpm a93ba014d0f8cd4b6be0fb365ec5ddf478a94a6b6a1c4dd0744489115ab6303a sane-backends-libs-1.0.32-7.el9.x86_64.rpm 0d94e007729b38860b1c77d1158c0b2b5be6664213073921d97423975a8fd7f0 RLSA-2022:8250 Moderate: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-3.2.0-3.el9.x86_64.rpm 19ca12570537b8613096a4d64f92977eda66c3d9e9d2606c4e36a052d1955f53 RLBA-2022:8251 vulkan bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glslang-11.9.0-3.el9.x86_64.rpm f7ecb5d314ef2fd7f0a8abc843504569029cb186e8ac4bc8c3312575401f5d5e glslc-2022.2-2.el9.x86_64.rpm db08a3be7df205ae7df359599a9610990447807f1c137d5bf0a2e34034297ee7 libshaderc-2022.2-2.el9.i686.rpm e91e1d8fce54ce7ea74c6812cd89e4123da7cbe79d1489d418a5c0af21b536ce libshaderc-2022.2-2.el9.x86_64.rpm 09092d63509dd6470f0483962952ddbbdc935f9b31ec2bc979b10d05e4899f4d spirv-tools-2022.2-3.el9.x86_64.rpm 3d3ef03de9922b424ec842c636f74507c574dc758f80b75b555febed8cac8873 spirv-tools-libs-2022.2-3.el9.i686.rpm 8856b444f1fac96b08a31eaa64d9dcaa150a2e2f104a03fd569575048ade1583 spirv-tools-libs-2022.2-3.el9.x86_64.rpm d612c378a9dae1745bb90f1380a4ed65ec8baa5b3fa556f3381f95dd93d70186 vulkan-headers-1.3.224.0-1.el9.noarch.rpm 0321defcee4c9eee209c2632f0a11b86318c7a39a4b99df98b6b77e7a356f74e vulkan-loader-1.3.224.0-2.el9.i686.rpm 184b803588c4ffd5e550936b7d9941f20f3924d4a9b91419d382ce777da872f9 vulkan-loader-1.3.224.0-2.el9.x86_64.rpm 56346c3837cc1785503fd644f2ffe318a65a8394b1e602281e46e7007eda2a24 vulkan-loader-devel-1.3.224.0-2.el9.i686.rpm e8eaaadad1878d0d83627dfa71095545700c2b626bd8b9fef69a686f53bf0c0a vulkan-loader-devel-1.3.224.0-2.el9.x86_64.rpm 0e9f444443b42bd2211c01bd760ee660b67b0f6575054040af153c8029e0859d vulkan-tools-1.3.224.0-1.el9.x86_64.rpm c329173443d3f915db9747e8053b1c048ad46be5e3a7dc3fbe220eb1b1b2b3de vulkan-validation-layers-1.3.224.0-1.el9.x86_64.rpm e02998f51dea7bc2ef836b6de8f31f240a15de5ff3833d73ad661b105ac85773 RLSA-2022:8252 Moderate: yajl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yajl-2.1.0-21.el9.i686.rpm 586f257769f8fdaa8dc113a960fa9d4e4f6fdefd8b8464e48d9527d035b23661 yajl-2.1.0-21.el9_0.i686.rpm ce5e6ace7e1ca65f6ddd67e4a4a7e109206a5c2d557c646613e0cb8d2adcfc0a yajl-2.1.0-21.el9.x86_64.rpm 98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de yajl-2.1.0-21.el9_0.x86_64.rpm 0a66ac8a71ba35e7087fdea5f7fcab8fefbe6d5b4e0a3e3442d37c0066f5cadc RLBA-2022:8256 qatzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatzip-1.0.9-1.el9.x86_64.rpm 1abf3eb09c7ecffb3faa71815faef5f73bacde7542ceef9f9f6f7105f6fb43e7 qatzip-libs-1.0.9-1.el9.x86_64.rpm a7c4cfbfe0794719a423cb8d123f163a43fd96bf32885d7a072f2e2814b9d733 RLBA-2022:8257 qatengine bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatengine-0.6.15-2.el9.x86_64.rpm f7646fa5230220a0deafb19b09e2a2f79dc2971291531c07b740d4aec85b873f RLBA-2022:8258 qatlib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatlib-22.07.0-1.el9.x86_64.rpm a9d8ca8f3f79b236220b564f1829aa638bd0fa45c43dfc0088410abf11ba41e0 RLBA-2022:8260 gnome-tour bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-tour. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-tour-40.1-2.el9.x86_64.rpm fbe77165a605cf4898e99d3f77cff02a5e123fd7a744bb432adc0a4f9370e9e1 RLBA-2022:8262 setroubleshoot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setroubleshoot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setroubleshoot-3.3.28-4.el9.x86_64.rpm 6ad1c3a31f3fc7b6656b9bb8a2dfe4e60d42f9050d24ffb8698955e4283d1245 setroubleshoot-server-3.3.28-4.el9.x86_64.rpm aaf39fed8ad12feb3bbbee62a17f992dde7aa37692c9e5989aa086bc391b1ffe RLSA-2022:8263 Important: dpdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dpdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) * DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash (CVE-2021-3839) * dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service (CVE-2022-28199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dpdk-21.11.2-1.el9_1.x86_64.rpm 284faae4b6d6e9c4c6e2fdde8cf55f4732a1f24999d619fe9c0ba76b22e530cc dpdk-devel-21.11.2-1.el9_1.x86_64.rpm ea5404855a7df4fd9fe04662d5b3ab9138b9d61110de5660ed836b3623d25a20 dpdk-doc-21.11.2-1.el9_1.noarch.rpm 1038ad9ebd5eb49b47bd3b94c68449f40858ee91129a50e87e734c86756aa17a dpdk-tools-21.11.2-1.el9_1.x86_64.rpm c746ae12cdbd162d7a965e232a0bd898e0d31582c9b3cf8f284563b497e0694a RLBA-2022:8423 inkscape:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for enchant2, cairomm, gc, libwpd, gsl, python-lxml, boost, potrace, python-appdirs, poppler, inkscape, python-scour, librevenge, libwpg, lapack, gspell, libsigc++20, poppler-data, double-conversion, gtkmm30, openblas, pangomm, atkmm, glibmm24, numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atkmm-2.28.2-2.el9.x86_64.rpm 996adf691e2f558ee1915a6a801bbb8aa13192da905e3799f2489caa00de73a9 blas-3.9.0-8.el9.x86_64.rpm 851f8672e184a9559b9eac883f9d313effc98b229b5c6998f08fb95af576ebbd boost-1.75.0-8.el9.x86_64.rpm 2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f boost-atomic-1.75.0-8.el9.x86_64.rpm 52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409 boost-chrono-1.75.0-8.el9.x86_64.rpm 784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f boost-container-1.75.0-8.el9.x86_64.rpm f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b boost-context-1.75.0-8.el9.x86_64.rpm 5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a boost-contract-1.75.0-8.el9.x86_64.rpm 7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434 boost-coroutine-1.75.0-8.el9.x86_64.rpm 1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75 boost-date-time-1.75.0-8.el9.x86_64.rpm d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98 boost-devel-1.75.0-8.el9.x86_64.rpm 445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd boost-fiber-1.75.0-8.el9.x86_64.rpm c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369 boost-filesystem-1.75.0-8.el9.x86_64.rpm 9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d boost-graph-1.75.0-8.el9.x86_64.rpm 0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5 boost-iostreams-1.75.0-8.el9.x86_64.rpm fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585 boost-json-1.75.0-8.el9.x86_64.rpm 4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f boost-locale-1.75.0-8.el9.x86_64.rpm 675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3 boost-log-1.75.0-8.el9.x86_64.rpm 1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720 boost-math-1.75.0-8.el9.x86_64.rpm a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161 boost-nowide-1.75.0-8.el9.x86_64.rpm 85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1 boost-numpy3-1.75.0-8.el9.x86_64.rpm 00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b boost-program-options-1.75.0-8.el9.x86_64.rpm a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e boost-python3-1.75.0-8.el9.x86_64.rpm 872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731 boost-random-1.75.0-8.el9.x86_64.rpm b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098 boost-regex-1.75.0-8.el9.x86_64.rpm 7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c boost-serialization-1.75.0-8.el9.x86_64.rpm 73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f boost-stacktrace-1.75.0-8.el9.x86_64.rpm 884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a boost-system-1.75.0-8.el9.x86_64.rpm b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f boost-test-1.75.0-8.el9.x86_64.rpm 1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487 boost-thread-1.75.0-8.el9.x86_64.rpm 55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989 boost-timer-1.75.0-8.el9.x86_64.rpm fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162 boost-type_erasure-1.75.0-8.el9.x86_64.rpm 736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383 boost-wave-1.75.0-8.el9.x86_64.rpm 555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba cairomm-1.14.2-10.el9.x86_64.rpm 74216e92ac5d1452d6d8fde90970c1769ebfebb0bfaf86610070221a008851b2 double-conversion-3.1.5-6.el9.x86_64.rpm 1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977 enchant2-2.2.15-6.el9.x86_64.rpm f0ac2534a1dd08b82840623a8472d5c88e12d830df402ba7300421667a1c4be9 gc-8.0.4-7.el9.x86_64.rpm d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d glibmm24-2.66.1-1.el9.x86_64.rpm a9c054a0e3ef1f92748658b37f9d31f8681aa0462d39606fda704eacbec262e4 gsl-2.6-7.el9.x86_64.rpm 6ad7c0869388e9fa92edb51cf895cffdda934117bb65031d182f782020281aa5 gspell-1.9.1-3.el9.x86_64.rpm c1a520e082ae470c3134508db102a390f5ffd09105ca56bc944d82b4c1cf4cbe gtkmm30-3.24.5-1.el9.x86_64.rpm 2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a inkscape-1.1.1-6.el9.x86_64.rpm f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171 inkscape-docs-1.1.1-6.el9.x86_64.rpm 084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4 inkscape-view-1.1.1-6.el9.x86_64.rpm 75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4 lapack-3.9.0-8.el9.x86_64.rpm 1a536d4d6cb79bd3f8aa0d31d941fc58aac684438279fcdf27fce903ba9d1357 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libsigc++20-2.10.7-2.el9.x86_64.rpm 7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 openblas-0.3.15-3.el9.x86_64.rpm 47461d2fa724b1437330f2fb5cc45073a4c3f598d02880af488ed6e8199c2bdb openblas-openmp-0.3.15-3.el9.x86_64.rpm 9fb2ca11be237ff5e3aa5ebcf1466ca5c10389c4a94dd35b01a8ac6a70d98a49 openblas-serial-0.3.15-3.el9.x86_64.rpm 774951fbb53756cc9e4d40a3a7cb34ca962ea4986bf8cf7deba3fdcb85703682 pangomm-2.46.1-1.el9.x86_64.rpm 4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376 poppler-21.01.0-13.el9.x86_64.rpm 15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc poppler-cpp-21.01.0-13.el9.x86_64.rpm 054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-13.el9.x86_64.rpm b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40 poppler-qt5-21.01.0-13.el9.x86_64.rpm ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163 poppler-utils-21.01.0-13.el9.x86_64.rpm 40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f potrace-1.16-7.el9.x86_64.rpm 85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802 python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 python3-lxml-4.6.5-3.el9.x86_64.rpm fa211bf07228f42800523d7e6d2c932f1f9f15812f944947820d29fa4bd27bbb python3-numpy-1.20.1-5.el9.x86_64.rpm 634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm 939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6 python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLBA-2022:8430 fence-agents bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * fence_ibm_vpc: Add an authentication token caching mechanism (save token in session for configurable interval) (Rocky Linux9) (BZ#2127878) * fence_azure_arm fails with 'ServicePrincipalCredentials' object has no attribute 'get_token' (BZ#2127882) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm 5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a fence-agents-compute-4.10.0-30.el9_1.1.x86_64.rpm 987cdfdcb4cf9924bb79f8450816d0d9d9c64a16e68b9ee9216aa28b2e504140 fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381 fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm 5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e fence-agents-kubevirt-4.10.0-30.el9_1.1.x86_64.rpm 81f39692a3915637682b3c922fab5f48cf18c63836b45a075a16d72196cf9871 fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm 8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8 fence-virt-4.10.0-30.el9_1.1.x86_64.rpm ad8079229d80d22fa0b8a61057b51407ad042735f9265cbee09e8c01d2b02744 fence-virtd-4.10.0-30.el9_1.1.x86_64.rpm d38c221fad37130c267cb2e09f09e54c7a1661d8f391298aa667b988f94416f7 fence-virtd-cpg-4.10.0-30.el9_1.1.x86_64.rpm 7311bd308b7fce7626e1f1efceb4a2ebe51142076cf4d47af3b383af25d612a8 fence-virtd-libvirt-4.10.0-30.el9_1.1.x86_64.rpm 7c7a047976567520da46e488d7770e91a655a19440cc4afce78756c6125c7571 fence-virtd-multicast-4.10.0-30.el9_1.1.x86_64.rpm cb792c9a484d9d15cf5973d6a91e80650cb25bd23d2769ed7eb8852605304c6d fence-virtd-serial-4.10.0-30.el9_1.1.x86_64.rpm d4c34e220f40da921730f096c90d89a975509b4d566b16599c7bee32dbc69aa2 fence-virtd-tcp-4.10.0-30.el9_1.1.x86_64.rpm 641685476e28e6708dc334ca1aaf3a92ad48ce39ce395796d44e85e77b7bf30a RLBA-2022:8432 containers-common bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta (BZ#2123611) rocky-linux-9-x86-64-appstream-rpms containers-common-1-45.el9_1.x86_64.rpm 0317217135c1f62f4bbac2e7a2bbee073556e7fab000b8179d04176bf3c7c039 RLBA-2022:8433 runc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Bug Fix(es) and Enhancement(s): * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 9.1] (BZ#2124700) rocky-linux-9-x86-64-appstream-rpms runc-1.1.4-1.el9_1.x86_64.rpm a06c71f8d70df988d7821a0999b7fdc6d426bdcd45e9e421861730a5eb97a7a3 RLBA-2022:8435 netavark bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Netavark is a rust based network stack for containers. Bug Fix(es) and Enhancement(s): * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (netavark) (BZ#2136306) rocky-linux-9-x86-64-appstream-rpms netavark-1.1.0-7.el9_1.x86_64.rpm b805d4e34fd20718453196fbdc15a8c0039f9e1619260ea51a3781a92221b2b3 RLBA-2022:8437 ansible-freeipa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132976) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132990) * ipaconfig does not support SID and netbios attributes. (BZ#2132996) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135756) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135757) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135776) rocky-linux-9-x86-64-appstream-rpms ansible-freeipa-1.8.3-2.el9_1.noarch.rpm b8daad624892a66649974061a744caf221b30df61e86b052ef643c53ebf71716 ansible-freeipa-tests-1.8.3-2.el9_1.noarch.rpm 19b460be48462862efa1a8dded89994549516dfdb9f714f7f00f3c8e11421cb5 RLBA-2022:8436 aardvark-dns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The aardvark-dns package is and authoritative DNS server for A/AAAA container records. Bug Fix(es) and Enhancement(s): * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (aardvark-dns) (BZ#2136395) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.1.0-5.el9_1.x86_64.rpm 5ba5a97a46dfe56a33954eeb4ffc3b5e3f3b98d2aa78d9cfe32935cf6f2ca633 RLBA-2022:8439 python-podman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-podman package is a library of bindings to use the RESTful API for Podman. Bug Fix(es) and Enhancement(s): * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2136283) rocky-linux-9-x86-64-appstream-rpms python3-podman-4.2.1-1.el9_1.noarch.rpm fc48be3f554f9ee78ec7fe4d347b9929648d6b37d3d336189edc160295031b79 RLBA-2022:8440 mutter bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 9.1 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-9.1.0.z] (BZ#2136747) rocky-linux-9-x86-64-appstream-rpms mutter-40.9-10.el9_1.i686.rpm 4e3d16a73c4d923e5e9af5f5a8138cd682cfeb5ab527375cb3e3a323470ffac7 mutter-40.9-10.el9_1.x86_64.rpm 2d3b70879b9922cc48ca36a67b707aee6d8dcd283fffaf3c81104f9e9da621d7 RLBA-2022:8443 Rocky Linux9/skopeo container image update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Skopeo Universal Base Image provides a command line utility to inspect images and repositories directly on registries without the need to pull them. This updates the Rocky Linux9/skopeo image in the Rocky Enterprise Software Foundation Container Registry. To pull this container image, run one of the following commands: podman pull registry.redhat.io/Rocky Linux9/skopeo (authenticated) podman pull registry.access.redhat.com/ubi9/skopeo (unauthenticated) rocky-linux-9-x86-64-appstream-rpms skopeo-1.9.4-0.1.el9_1.x86_64.rpm 2a77ae05a0cb0755f9cbb2c1e699a62fa7c162554295bb2d50a6a1e486c80d6f skopeo-tests-1.9.4-0.1.el9_1.x86_64.rpm c28cbaef7f50c84612c7fc66d551131465f1b48136556a093ff4ae5f403405bb RLBA-2022:8446 bind-dyndb-ldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree (BZ#2130614) rocky-linux-9-x86-64-appstream-rpms bind-dyndb-ldap-11.9-8.el9_1.x86_64.rpm 3a72e9b5a513cf3ec462e02cfcf10df61fe2d6cc45be0d92f4da32205fd86815 RLSA-2022:8643 Important: varnish security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-2.el9_1.1.i686.rpm c068a1f9d3a1c249487d18db2f18b2012bc8c6cd9b8ee37e136cdbf6469b5d9a varnish-6.6.2-2.el9_1.1.x86_64.rpm e59a3aff50bf54c2855693ea6a88f52aadd286ab784af4b9c19258dcdaef326d varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm 1f4218dfac56d7056b83497444bf39bd2dd07bceade816145460324491df49da RLBA-2022:8898 thunderbird:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Bug Fix(es) and Enhancement(s): * Update thunderbird:flatpak module stream for Thunderbird 102.5 release (JIRA:Rocky LinuxPLAN-137720) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:8899 firefox:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Bug Fix(es) and Enhancement(s): * Update firefox:flatpak module stream for Firefox 102.5 release (JIRA:Rocky LinuxPLAN-137721) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2023:0006 thunderbird:flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Bug Fix(es) and Enhancement(s): * Update thunderbird:flatpak module stream for Thunderbird 102.6 release (JIRA:Rocky LinuxPLAN-141433) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLSA-2023:0021 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360 webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795 webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439 webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496 webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm 43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3 webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm 543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm 671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm 29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca RLSA-2023:0077 Moderate: .NET 6.0 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154459) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm 9db0dc0600bdea1d83e9cf77244d47746337cd3d132e8d11278559003b4ce323 aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm 551600b9437595edcbeb0ec2b5e5f0267af1e10da9373256f0d797a0289a8885 dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm 9d6fa29af152f6cb805c18a7825a22cfff1735023b30d7f4d1786cd6bad70adc dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm 58ecd780e4538f926e33de436242765dfa0c61490260ee484747e409e0a46b1f dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm 4c0201e920e53c917d9fe9b64b17498fe8e8d67e36e5606a3ce234e051578588 dotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm 2b47d910f58052a3881edb2c7eaa066804fc58bd101fba881f9a466e6a9e84b9 dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm 31d66d2443534ec6cd75d4e3f168bf8fcd138192f4459b6235a2818cb15114fa dotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm acfc5cb8bdd3bdaf790f2066c7d210bd469a7914c429dd4f94aa7c2635158e4a RLBA-2023:0080 .NET 7.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-9.1.0.z] (BZ#2154468) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.2-1.el9_1.x86_64.rpm 45a3ea757e590caf1fe512335d62daf8273796fcac047292b1c2d87d135ddd45 aspnetcore-targeting-pack-7.0-7.0.2-1.el9_1.x86_64.rpm 933dff30066a5323eab4d9ab8fe243394a2025d444348588effe1b38b873fea5 dotnet-apphost-pack-7.0-7.0.2-1.el9_1.x86_64.rpm f5e8e740ecb08cac5385fc703376e33fe476ee725c9405c87ba212e710db7b86 dotnet-host-7.0.2-1.el9_1.x86_64.rpm 39131f5c63acdc7834ae652fa087ce57cadd1a9a95d378033654a89816d8c0bf dotnet-hostfxr-7.0-7.0.2-1.el9_1.x86_64.rpm a622fc3fce5da03f4b8cd03be87cfdeb4ee8d18d1ccd3d12390a76b93fdaaa02 dotnet-runtime-7.0-7.0.2-1.el9_1.x86_64.rpm 63bfb252dd6e8f7ffb01d4fa0f8c398f1f9b1118248ad5a9d071543c05d3c57a dotnet-sdk-7.0-7.0.102-1.el9_1.x86_64.rpm 0dc3dd8c128c66261929c65e9bdcec9f1e7486e000a18cc2352f157acaebc427 dotnet-targeting-pack-7.0-7.0.2-1.el9_1.x86_64.rpm 165b7a4cd93d6876f7b16baaae518090b6c19979a4fc1fa786903cb38b2b02d0 dotnet-templates-7.0-7.0.102-1.el9_1.x86_64.rpm 50a32099402a38ce5cf0f4f9a6a0b8cc1be33680e0f7a9fee18b469825d58c7d netstandard-targeting-pack-2.1-7.0.102-1.el9_1.x86_64.rpm 394ee25bb288039ecc63f93370b77863cad2d60cc3e0de16af66a04870f16b9c RLSA-2023:0302 Moderate: libtiff security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-5.el9_1.x86_64.rpm 9ad603482201a15f2fe22300f480783803f3533a648cf0c3ac815aa2ede25c42 libtiff-4.4.0-5.el9_1.i686.rpm a8904df1e994a0a1bd4c0744bab2ae19ef64f51d34b3cc6c1e9f90e4a86dc786 libtiff-devel-4.4.0-5.el9_1.i686.rpm 99887ab930d1a7382528eff8bcf1437a3a173910637bd60d2de0b1f8a7d33ed5 libtiff-devel-4.4.0-5.el9_1.x86_64.rpm ef870eca9ad97a5edf3db88926078f6d425bba15f2a682454037b6636d474959 RLSA-2023:0202 Moderate: java-11-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-9] (BZ#2157798) rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm 60c900e0e70ad2aa113168d0ad1248e227f72765f35f2ccbfecd7332a0556521 java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm 6ff16801bfc4f869f374a422c0d63f76704b5c2b9381283f7d61a26b5588cc3d java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm d5a8739a6eac143ec2e0ee514ef2b75c99bc9537193611e89e16266ce6b5b735 java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm 80e3bf567d65b724252354970f420896b5e7fdfb9a061d11f2d9e50357b6af84 java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm a6dc49895a69a59fe8b17e4950e71ddfce4631ff1a6917ea4e6e0f1d126d1081 java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm efeee81819c8be95606f0332b03e9bf263eca50ed3680e76e54ccc500b4ac37f java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm 4c9a4b8f28722695dcce618d2206825054f21c03c3f5b78d749a837610a82fb5 java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm 130807833f20785a8d94a8f3f2e9140a43b28cbd2b2fb0e4878ec7241855ded2 java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm 7f3dad478f4df0733595a39a172e3fef8a32c9bbc47632cc7a5a300b6aab126c RLSA-2023:0285 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.7.0-1.el9_1.x86_64.rpm e8250a15f8ed8a8fc434e3905d38e23ff428c5d1c455055f7cc31b659aa424c2 RLSA-2023:0194 Moderate: java-17-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147476) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-9] (BZ#2153097) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm 4409381234e9e28121971447acbe4f89491a7559f18934fa55653dc46b0b18fa java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm 2289ddbca594e14f4f05d39e4da3b3e44f1994c34c4adb912842ad325a22c2a6 java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm 2b5aed4d7296f9f168dfb09f40f0b480453fb4a5fc2e7acf522365541b454f61 java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm fe66df12861f6373c7e8922a622bee5034f91ff32650fbeb6b59b0ea5689b420 java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm 40f474416097aec3d4d877477170ecf0e4fc1eaebc39eb31090b095c3cb441a1 java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm 384c363d515eec71cb89b4fea5d65b1fc088e4fb42e85b260140011b545f0432 java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm bd51be60766e26132a7c67cdb701bbef8eb88e2158f2f8bb080077daf8400236 java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm 167de51cc3c1c77aa2a6f9715deaa89d7922bcfb67e7bc933aa41d9ee9eee612 java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm fddbc4dcdd185cc68d1ee00316f3f524bbc5f3cc3b58193c6b33def4c142421f RLSA-2023:0304 Moderate: libreoffice security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-8.el9_1.noarch.rpm 98a866ad23fe0c7ac4349340425b1952cd54817a9ab6773c9a18573655a6552c autocorr-bg-7.1.8.1-8.el9_1.noarch.rpm 5be15c28438dcafa92f2e410759eda47843898555c99166e8398adae4c7f1b08 autocorr-ca-7.1.8.1-8.el9_1.noarch.rpm 142bcd322b14f574c87a5c774397ba55a6496f2ce2afbf297b3f81eed627d430 autocorr-cs-7.1.8.1-8.el9_1.noarch.rpm 2c9313ce95a2aaaf3bb3b8a999983db1b110e49f4fefe65f9f58a8c9204a50f2 autocorr-da-7.1.8.1-8.el9_1.noarch.rpm dcf03a78c14c9b775818e62d7ee01fed302d33d666cf1a30f62188b3ab281bde autocorr-de-7.1.8.1-8.el9_1.noarch.rpm ac6f40d7c93b2abe62ab1fc52856317ecd9eb335252c8b41f5e22a15f7a3d6b2 autocorr-dsb-7.1.8.1-8.el9_1.noarch.rpm 6e9f8cf9d81aac151fb35e1a2764f132ecc982dd4f9f4d3e088c377b4dcbdcbc autocorr-el-7.1.8.1-8.el9_1.noarch.rpm 131c22c7baa10ce6030572b97969abe0e895c3363b7473166a1cf17dbca340c2 autocorr-en-7.1.8.1-8.el9_1.noarch.rpm 3187289c9274e083b14457d6bac8abf9988b7e0e4824991090b39a1b2e8a804d autocorr-es-7.1.8.1-8.el9_1.noarch.rpm d88a43343f88e9b132ba01c1fb00cb6b6ef7fd8f46d05515cc23143ad7a7bc98 autocorr-fa-7.1.8.1-8.el9_1.noarch.rpm c5c530940ec82813d2cccdd9d599791faad2a25662a3e73d234305b9896c5b62 autocorr-fi-7.1.8.1-8.el9_1.noarch.rpm 2229172a62e5aedefe8bbdf5c16c13f24526a234de89f10f139f40564268ebc1 autocorr-fr-7.1.8.1-8.el9_1.noarch.rpm 8a38f3140a32919798846b7bd64bc3b95bb853efafa6f665298e5fcae983c86c autocorr-ga-7.1.8.1-8.el9_1.noarch.rpm 36b3819441723ce83fec6569a3bf909b95eaadd9732ea7e81777dd9601d6716d autocorr-hr-7.1.8.1-8.el9_1.noarch.rpm f7795276cf95ee949c8bb232a4b570af198f3927c399b46b16c99e24279eebce autocorr-hsb-7.1.8.1-8.el9_1.noarch.rpm 88bb6839b571445456084fe15445f9a0f8d8aebc96ec9254527741fc49ad463b autocorr-hu-7.1.8.1-8.el9_1.noarch.rpm e96996b3af11a7b07238fa3dda707bf0ec7f48259e0fd5994135b3190f88f446 autocorr-is-7.1.8.1-8.el9_1.noarch.rpm 77ca14ce9a589c1a4259295b7b34e0a78708b9fd57fad324a09a981d2592e1f6 autocorr-it-7.1.8.1-8.el9_1.noarch.rpm 59dbf71bfbd92e94eea6c3be2c4d3fdc75183f8cbc245c24330f972c9102b3a1 autocorr-ja-7.1.8.1-8.el9_1.noarch.rpm d23e2c44cd49310299fe60cd1fd813004acd59fb27a0f6cce623c09aac1176db autocorr-ko-7.1.8.1-8.el9_1.noarch.rpm 1add419b3e5e2dd5e631167183b4ceb7c163e6e6b1ca9595324647e06b49c4f6 autocorr-lb-7.1.8.1-8.el9_1.noarch.rpm cf06d6d997ab839a7fc4a137ccb028da00292a9a543b15c2bc2350f54d790ca3 autocorr-lt-7.1.8.1-8.el9_1.noarch.rpm aef12d41f081103dd7a8116f61fe79ffa9e5d31cf1f71c83cde4c48f24ec8841 autocorr-mn-7.1.8.1-8.el9_1.noarch.rpm 97928aaa2489720660577e94ce473bb3d825cfe43c0acadb939c5804fa8e33c8 autocorr-nl-7.1.8.1-8.el9_1.noarch.rpm 0ca37421eb5282668ec80111515c0e9c2c2d1fbd18a419c3929082dd6bc01287 autocorr-pl-7.1.8.1-8.el9_1.noarch.rpm 71c1e6f529d3e1f7fabccd2f7fd306542ab7f6321d6c32cc6433d7743b468e68 autocorr-pt-7.1.8.1-8.el9_1.noarch.rpm e1b8482a30bc4f70587cc0ab2b0058e58c745ff3d8f1caf631293d6f7efe3354 autocorr-ro-7.1.8.1-8.el9_1.noarch.rpm 0388586c4e8af8b9d026f0ba47c9a49834c9d66eaf2c1a134e6b77233e6aae84 autocorr-ru-7.1.8.1-8.el9_1.noarch.rpm a809c9adb4f697e87b80a47180c03348b5762be1a0ae6395a4559882a6d65b85 autocorr-sk-7.1.8.1-8.el9_1.noarch.rpm f8aaa94b8524340c21f520e77244ab447d627f126b82b2bab43fa257c37c4f36 autocorr-sl-7.1.8.1-8.el9_1.noarch.rpm 62e85dee0f858cd74c14c5398661ffa21997523490b29d901ee9bf3746b9f1c2 autocorr-sr-7.1.8.1-8.el9_1.noarch.rpm 831491f8902b83343bf9492ee7d5e16ac48e6b4893a3989d20f15250416bfca0 autocorr-sv-7.1.8.1-8.el9_1.noarch.rpm 7afb55a7fecc25e88d962f6a9114f463ddb45bf3b01433fabdf174b4ff111670 autocorr-tr-7.1.8.1-8.el9_1.noarch.rpm c710b8f912c6629e7466fba317398b73048412a1bbc18863d1c153292f86b60f autocorr-vi-7.1.8.1-8.el9_1.noarch.rpm 289bd8a57afbd57f77a2e7e10e8015010584361be5c3328ecd25032b926e4471 autocorr-vro-7.1.8.1-8.el9_1.noarch.rpm 4077cdfe5b2f02a5459a867c196591275042152a6d2d1eb32587381d59929657 autocorr-zh-7.1.8.1-8.el9_1.noarch.rpm 2d3cd2fa0d3c890bdbfa4ee9a5797272f56cf1e8fb63fcee3d0c09e7583e6b69 libreoffice-base-7.1.8.1-8.el9_1.x86_64.rpm 57b18282533ed9d7300e08346c5302164355e217f500677c2a241626632653c8 libreoffice-calc-7.1.8.1-8.el9_1.x86_64.rpm b4f939876bce2bdea906baeaef1df757ae0ef2b80f095b53243617b602f3cd00 libreoffice-core-7.1.8.1-8.el9_1.x86_64.rpm 3abd6d102d7542c276ce820a4c836458ef5397a4911fd285d21ccd5a8a3a039e libreoffice-data-7.1.8.1-8.el9_1.noarch.rpm de75ed47ee296c57bdfc71667ab6724d7e657e6e86008f6ec741c7f91b22407e libreoffice-draw-7.1.8.1-8.el9_1.x86_64.rpm 83cced1404bcaf611ad6760bf2a634ebb8e0a331eb18171593fe317c995efbbd libreoffice-emailmerge-7.1.8.1-8.el9_1.x86_64.rpm 3aae373899b3abffeb0bd129f52f0bf4da805e707431d6f32ddc40ec5baa4146 libreoffice-filters-7.1.8.1-8.el9_1.x86_64.rpm 46f4124d781e1abde4444591f66fc637af218844c09f49c7177601e3680686c3 libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.x86_64.rpm aea35a5c39848b8a153296e963d94f6625f9e44cdc2928d404037f62f4185a3e libreoffice-graphicfilter-7.1.8.1-8.el9_1.x86_64.rpm 50a0ae067353ab983d6d5557d8d19f830c9e696c150883327960d3e89682f468 libreoffice-gtk3-7.1.8.1-8.el9_1.x86_64.rpm 957a501d6ecfbf9ecbf854b35eb6d33f377a4fd2aca89c2bd7c5a1369f3131ee libreoffice-help-ar-7.1.8.1-8.el9_1.x86_64.rpm 1cee6776d862f6c6f0c449b67dceeb0821a3cb9c22a74cee630d7f1873d764a9 libreoffice-help-bg-7.1.8.1-8.el9_1.x86_64.rpm 12f0745df802a25cf557468f7eb1f80f71bc85917c0b676c2d8027335a7ca01e libreoffice-help-bn-7.1.8.1-8.el9_1.x86_64.rpm da16b2a89ffba1b0f8a38d66506357b41a5ea47a558424d902d13e7f0d7d5d52 libreoffice-help-ca-7.1.8.1-8.el9_1.x86_64.rpm 8925f3ac02d9c830ef85555f86c18b915ea1ee4c8beeb032c2b50d9dac627b4e libreoffice-help-cs-7.1.8.1-8.el9_1.x86_64.rpm 2db61c5edca061761b0692309e3847d4114bf547f7e4bfb27c5bece7a0874e18 libreoffice-help-da-7.1.8.1-8.el9_1.x86_64.rpm 877e8750276393e4edd5b6391695ce8f5a0a4308ea9c8fea408566157b611f40 libreoffice-help-de-7.1.8.1-8.el9_1.x86_64.rpm 1b0147b71ef7a929c75299170a6abe6c63af2e514934133a57405c92688bf8fc libreoffice-help-dz-7.1.8.1-8.el9_1.x86_64.rpm d5b61f098b278e99ee9ca6ff2f1f9b145e6df50c518c5a67d9386a61085db1f8 libreoffice-help-el-7.1.8.1-8.el9_1.x86_64.rpm 74c02e8943e4f8d1836721b8bfbdcbc89a2e6c019ed5b5f4559d13ec773c3532 libreoffice-help-en-7.1.8.1-8.el9_1.x86_64.rpm a76e48f8ea4974cf1997baef1932cec5d25108384ff3ee461223759871c2b3a1 libreoffice-help-eo-7.1.8.1-8.el9_1.x86_64.rpm 7208ae0a3f5d248a7aa4df3da0aee40207414e2fe9c5362c81bad40a5bc6976a libreoffice-help-es-7.1.8.1-8.el9_1.x86_64.rpm 0b743090e6477a911e0956830ee8ec131aba5309d4bd3649d34bf680983fc70d libreoffice-help-et-7.1.8.1-8.el9_1.x86_64.rpm 6392a9d0f49f6f12f593f1d7f8153db4c4d23e1481be255be187cbad43824704 libreoffice-help-eu-7.1.8.1-8.el9_1.x86_64.rpm a033da0d75e50562cc4470c3c45e8c577843138235044b39f72cefcad2ba4d77 libreoffice-help-fi-7.1.8.1-8.el9_1.x86_64.rpm 3397c1b980933a8f61c278d753ee8d92c374bec45f82f43aa102a1f289194b39 libreoffice-help-fr-7.1.8.1-8.el9_1.x86_64.rpm ba5dee986d1067080ee459aea7fb4ea3a1a8233f72cea582ff734bd75c468a0e libreoffice-help-gl-7.1.8.1-8.el9_1.x86_64.rpm 99066543c10e5a58798a64dbdc8f0e2f126e8105c04ad38c8c1a3146f870e0ea libreoffice-help-gu-7.1.8.1-8.el9_1.x86_64.rpm c04e8a889aebecfab64241ffa35a1206c36cb191096e00da03e4181cdf8b8b83 libreoffice-help-he-7.1.8.1-8.el9_1.x86_64.rpm 52dee689f1c255b36d0d8c52e961ae4b8656ebff66fd85600313f57dfd8585eb libreoffice-help-hi-7.1.8.1-8.el9_1.x86_64.rpm 0b66126e37449026645069c3c9a92fcc8723954b2bdeff546d7ef0734b1a8438 libreoffice-help-hr-7.1.8.1-8.el9_1.x86_64.rpm d45d1f3dcb431a0b64c8b5643f43597338e7b23254e5e80847209f12f9c84d3a libreoffice-help-hu-7.1.8.1-8.el9_1.x86_64.rpm e2d92cf69ef478e0d40cfe27d8b6bfe79d192d4309dba2563e722d1963c58376 libreoffice-help-id-7.1.8.1-8.el9_1.x86_64.rpm 3229c7c6bc1fc2ad69fd53c79490ffab6a138a514a70a88a1df07b71fce5de4d libreoffice-help-it-7.1.8.1-8.el9_1.x86_64.rpm 2231a7682f9d2f3d760364c3a9e1cd87ff950c2c9369ee75b619f2c27dda0b78 libreoffice-help-ja-7.1.8.1-8.el9_1.x86_64.rpm b513d846726c880041a695b20426886249d95ccb3db7209bfe081f920a86f668 libreoffice-help-ko-7.1.8.1-8.el9_1.x86_64.rpm 9e4cecb152033b72a53ac5a095a5038acab8848ddc10c641603de3e4be081823 libreoffice-help-lt-7.1.8.1-8.el9_1.x86_64.rpm df393089d2f612f87fe7926f47dab15e30d9fe0fd3f80096e58642d4ae35e791 libreoffice-help-lv-7.1.8.1-8.el9_1.x86_64.rpm feb8eaa5f4c3c81b3bd8ac68022f6828d5fbb5893b143bbd814455355bc3cd23 libreoffice-help-nb-7.1.8.1-8.el9_1.x86_64.rpm 467f45c06f8060ebef477adcd188b4449628391025b35c905f86fe6c50d644ce libreoffice-help-nl-7.1.8.1-8.el9_1.x86_64.rpm 4e7ba6969d8e23e3ef79a9a96ff713079fb297b76cab9bbff1718b04f0c10317 libreoffice-help-nn-7.1.8.1-8.el9_1.x86_64.rpm fd7a10c5b9bc841f20c257bc65abd06f2245db2ba8c6f7db151f2ee27b9910ed libreoffice-help-pl-7.1.8.1-8.el9_1.x86_64.rpm 27e4509519f749422d388af5b6e24ace07257f56b28e3db06b38d48364b0ff60 libreoffice-help-pt-BR-7.1.8.1-8.el9_1.x86_64.rpm 73ea1126020c5bb199333adb344992b8d04c59d7b9a5f453fa7c0e3224334685 libreoffice-help-pt-PT-7.1.8.1-8.el9_1.x86_64.rpm bf5e248b778859b2a34fda87ce0ed50107786ac80d1db5e9298f5b86ea20bd5a libreoffice-help-ro-7.1.8.1-8.el9_1.x86_64.rpm 81dc93bf68a3d9a112072588697159cd1cb94c65b35fbdb7dccc03f153b18aa2 libreoffice-help-ru-7.1.8.1-8.el9_1.x86_64.rpm 6f218d76834d34313a54f0b8048b75897ab79e4dc49039437c3030a0ee022348 libreoffice-help-si-7.1.8.1-8.el9_1.x86_64.rpm bee7f9cea2846f2c39cf96cf0e1ea32593cf853c693c1ad423f1852b144b40be libreoffice-help-sk-7.1.8.1-8.el9_1.x86_64.rpm b07900f8cb97a7ed7a9ad82a0b19f4d5379156efa05ebe072f995829260d1099 libreoffice-help-sl-7.1.8.1-8.el9_1.x86_64.rpm 2a8fb15edf23fd13e606a98a8a2014563c9e1bc9c826fd735c4395fbe78d3a0d libreoffice-help-sv-7.1.8.1-8.el9_1.x86_64.rpm 3768bba8138af97a03f7b7f7a0fbef052285c129b0be30d39c9f9c38a02a147b libreoffice-help-ta-7.1.8.1-8.el9_1.x86_64.rpm 76e71b02e06de52e546f13f4f0f561b8afc61ff531ccf7e4cd1b017c976c73d2 libreoffice-help-tr-7.1.8.1-8.el9_1.x86_64.rpm 2b37d4ef225049052508560399f3f3de89795626ff86248cbcaaef05cd617826 libreoffice-help-uk-7.1.8.1-8.el9_1.x86_64.rpm f106df85ba89d100e03c5dcf0ab0b3dd99755e90e9b5d716a77111ab460eac07 libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.x86_64.rpm 176d7f7748aab209a96e1be7ca389a9a24f2838914d9643036b645dede1d5a0d libreoffice-help-zh-Hant-7.1.8.1-8.el9_1.x86_64.rpm 042c953e1dc9a0bde12143fd05e9301f2d8edabed1468b77d323a985eec5a43e libreoffice-impress-7.1.8.1-8.el9_1.x86_64.rpm de369982ff0a2741c432f8fd10daf098a2581b908e0ef02e020436b5dc82bbe0 libreofficekit-7.1.8.1-8.el9_1.x86_64.rpm 05076f3643fc2de1edeee9f697248fc455d64c0923199d2d45d0a93b6567488a libreoffice-langpack-af-7.1.8.1-8.el9_1.x86_64.rpm da3aeaca79fb633c67ac334e6e1f5ae920859b5950778be7dde7bdf581b97190 libreoffice-langpack-ar-7.1.8.1-8.el9_1.x86_64.rpm 7357740b78ef97c6e786e22e0de8f4a9e975e14e80ae157eeaed79407584cf6e libreoffice-langpack-as-7.1.8.1-8.el9_1.x86_64.rpm 48da8f9a7fe08b94f137082717b3b3594641eb4c1be83c4a1959c68608cd6d29 libreoffice-langpack-bg-7.1.8.1-8.el9_1.x86_64.rpm 0e624733f2d83c06af1763f41447458afe6a651c539c570809cd00411f8fd834 libreoffice-langpack-bn-7.1.8.1-8.el9_1.x86_64.rpm a284954648ccc6f7af85142beeb4ce77377d65146ab48be617c2e72872faa6e5 libreoffice-langpack-br-7.1.8.1-8.el9_1.x86_64.rpm c7850db59a6c6fef169a7def0b123a9d8104582db9670a468361f9a420899bec libreoffice-langpack-ca-7.1.8.1-8.el9_1.x86_64.rpm a9b10907bda9a082745579d9137fe86303067998bf9c777e11b2c46af3c7136d libreoffice-langpack-cs-7.1.8.1-8.el9_1.x86_64.rpm 004f62c461ffa8b031b7b1178a2dad40de4cb5ed9c081162b401ee0abc64e397 libreoffice-langpack-cy-7.1.8.1-8.el9_1.x86_64.rpm 857b5b0dee6654940dfa86e77110268f9630978f2b5aa99345819e6556e7280e libreoffice-langpack-da-7.1.8.1-8.el9_1.x86_64.rpm e3a54189530cdc1c96dd238d6dfa1bb267e6daad7376ba68e1aab9e8b45913dc libreoffice-langpack-de-7.1.8.1-8.el9_1.x86_64.rpm c66f8ed05132b9ad4a64ab8ad35663ad570c01b9265997e43c57665cd467ae4f libreoffice-langpack-dz-7.1.8.1-8.el9_1.x86_64.rpm bf01d2e836c86f04349780f1ae92343c121d110b4cf5306600be7fa976550ac8 libreoffice-langpack-el-7.1.8.1-8.el9_1.x86_64.rpm fb1b98f7b63701f2d0a0047fa4d86a08dc13bb4c01a7ba33094c04fc0622454d libreoffice-langpack-en-7.1.8.1-8.el9_1.x86_64.rpm eae45b3a1037fabdf5d9e8859fe56560c9af97a2abe1950c659702ae0dd50fb8 libreoffice-langpack-eo-7.1.8.1-8.el9_1.x86_64.rpm 524795ec95bced0b3593fdecb64761ed1570e149d21ad43e7206903ff60b3474 libreoffice-langpack-es-7.1.8.1-8.el9_1.x86_64.rpm 40c87f68987a43a4baceb4dc164b80973c3ee43bb3211a5e47f2f6e96007454a libreoffice-langpack-et-7.1.8.1-8.el9_1.x86_64.rpm 1822e06ec22784bc5cbe037e3162c07681a76f049689406fc3963af66046552a libreoffice-langpack-eu-7.1.8.1-8.el9_1.x86_64.rpm 878ab847b89f5b9ccb6da265fcf60800a0c4d2cbaaf2929e277d04d89b1ad832 libreoffice-langpack-fa-7.1.8.1-8.el9_1.x86_64.rpm 3af3c245882fd0eb6f34518ce6b0b27c723201d80862bd6ba527097dff8d0ff8 libreoffice-langpack-fi-7.1.8.1-8.el9_1.x86_64.rpm 4e38129744276b294036fa41586e51cb276344da5e20bb401f98784c98ba1b66 libreoffice-langpack-fr-7.1.8.1-8.el9_1.x86_64.rpm 396c22992ee8d51a8d332ba2997220a1f238a74c98190add02f65e7287b63f1b libreoffice-langpack-fy-7.1.8.1-8.el9_1.x86_64.rpm 33d7d265814f83b6d76d485e6aa319b6072f8eefd7d720419e0f0c67b4b0dc87 libreoffice-langpack-ga-7.1.8.1-8.el9_1.x86_64.rpm a1c9570733a65c4998b7378e5460d874d8c4295f63218d33e66097ecf6a7c077 libreoffice-langpack-gl-7.1.8.1-8.el9_1.x86_64.rpm 86458aba6ff59874feeef581b03b716e2350f5a70ef6f6196fff7e91e1c2662f libreoffice-langpack-gu-7.1.8.1-8.el9_1.x86_64.rpm 53fa3e58d6b0c92bbd87021037b2c0f34425f4650346e49f3d522a2153cc15a7 libreoffice-langpack-he-7.1.8.1-8.el9_1.x86_64.rpm 3019f9c1c643009502a2afffca4d6be9db0efc9b9c11ffbfa655ebfc39b20e8a libreoffice-langpack-hi-7.1.8.1-8.el9_1.x86_64.rpm c8eb009e7fec0cc2e4c104c5c178c9efa8c141164ba11f57b81bf74a366bbf65 libreoffice-langpack-hr-7.1.8.1-8.el9_1.x86_64.rpm 3609cb30cc4853f2423d2611e6341df98e2af53a01ddce74c2d7b215be7c2644 libreoffice-langpack-hu-7.1.8.1-8.el9_1.x86_64.rpm d5a4456a41f5741323aaa1b6decd03a60dd7b454b62abaa9b36d7aeb7e509310 libreoffice-langpack-id-7.1.8.1-8.el9_1.x86_64.rpm 061fe1351ca5de0550542e9076e1a8c31a0896f01285ad7f818126d61f6d206a libreoffice-langpack-it-7.1.8.1-8.el9_1.x86_64.rpm 450bed82a06e85078c38e11076446a9f270d1224b09b712dd9677bf55cd609a3 libreoffice-langpack-ja-7.1.8.1-8.el9_1.x86_64.rpm 4ba221f1b220fe468eb5f1ee92ce54c536c827f02fe7f5ebf7dd8c040d3f74e5 libreoffice-langpack-kk-7.1.8.1-8.el9_1.x86_64.rpm e5b5bf45ec1fbe009c0573cb3ab591da20687d219bade4e098208701b62b4104 libreoffice-langpack-kn-7.1.8.1-8.el9_1.x86_64.rpm c2cfc1eed63c540aebaee11d134e840f33ce14673b4883b262fc28455564c903 libreoffice-langpack-ko-7.1.8.1-8.el9_1.x86_64.rpm 39e8afdb0d655bc8000c5b8b77a30f1ef29c280dc453a0e7442f9260012c20c3 libreoffice-langpack-lt-7.1.8.1-8.el9_1.x86_64.rpm cdaebe76d376c9b9d6d9e6e89c985133670413bf8fe207e9e0d1dc3b6303621c libreoffice-langpack-lv-7.1.8.1-8.el9_1.x86_64.rpm ebdc924c9eec7357ba2493ff19c2ce75a1d18dddcd2feae0934e34d557825b88 libreoffice-langpack-mai-7.1.8.1-8.el9_1.x86_64.rpm cdd17886c3c66cfaa29801d1c41ecabab499c73e3d3029c8c465cfa8f233a725 libreoffice-langpack-ml-7.1.8.1-8.el9_1.x86_64.rpm 1d5c74c5a4b3f4571a818e4acb9e79d28e6ed0b4849c74d2880215736aa55835 libreoffice-langpack-mr-7.1.8.1-8.el9_1.x86_64.rpm a03bc0376902dea76099461e3cf9b4ddad7dfcf09d66edd70323e92adb464797 libreoffice-langpack-nb-7.1.8.1-8.el9_1.x86_64.rpm 135f938eed15269d823e49fd8b6e110318084b3e355d2519836fab963a373911 libreoffice-langpack-nl-7.1.8.1-8.el9_1.x86_64.rpm fd055f3ff95be6244d851998244f8f0a47c96a2e899230ffb3d84e42a8af479a libreoffice-langpack-nn-7.1.8.1-8.el9_1.x86_64.rpm 399aadb5e0d0f87b376bdbaaf33f1a0cd5480d2317b7b9f16b0c7c8204197abd libreoffice-langpack-nr-7.1.8.1-8.el9_1.x86_64.rpm 25641b3c5edf2ebe6829ec5cd351f18be2bf9e74214ae3ae845667ebdab91392 libreoffice-langpack-nso-7.1.8.1-8.el9_1.x86_64.rpm 0dbd034032b4042f8f421ee381960d6ebecb2ff7055539b2ec51d9e7888b42b9 libreoffice-langpack-or-7.1.8.1-8.el9_1.x86_64.rpm 7480423d80e9c95ca7714d906b575c2956fee7c3a8c464d0bf41466480328ad5 libreoffice-langpack-pa-7.1.8.1-8.el9_1.x86_64.rpm 41bde9c91c1c383ad2a2a4d16bc108bd42924c2407dd1bbe383cdde8acf51c04 libreoffice-langpack-pl-7.1.8.1-8.el9_1.x86_64.rpm 30eed206605dd3d9d7fcb5bd5818180997e018c4f3fe1e67114693a14b4fd28a libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.x86_64.rpm d677f9362e8762f2fa1943dca085f22d9fc58730356fbf7e260b6f1746308d7f libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.x86_64.rpm 8f343a54dbc82b693ad7898b8d9d564ee5f135be3c3fec0340d0d022979424ce libreoffice-langpack-ro-7.1.8.1-8.el9_1.x86_64.rpm 485c19891954a4ec2a2b6fe833fb324c36d6f89ea4bd8b01f1e4bb0b158990c6 libreoffice-langpack-ru-7.1.8.1-8.el9_1.x86_64.rpm aaeebc33758066408294bb57e7b0d7fb500f653bd0385447e520bb9ccc087cf8 libreoffice-langpack-si-7.1.8.1-8.el9_1.x86_64.rpm aac0959398e6f71bd90bf41301b838c33b82c4bd1fdbeafd806130a97a9e7ad2 libreoffice-langpack-sk-7.1.8.1-8.el9_1.x86_64.rpm 2ef35119737080ed28ebbbc115496bf077b894fac27713340d48b8b517860291 libreoffice-langpack-sl-7.1.8.1-8.el9_1.x86_64.rpm d967cf834b4d69ce0e66bb046430d02a7c1f1ffd79025d1af0d94ed6e841014b libreoffice-langpack-sr-7.1.8.1-8.el9_1.x86_64.rpm c62154d5546ca2a3e45b970709e49ea9f136c1fd917dcc339b6936bc913314be libreoffice-langpack-ss-7.1.8.1-8.el9_1.x86_64.rpm d1f8c7f2de492bbcec6f2e6cab5871d9c16ada8c79511a73b2f078bff48df7ee libreoffice-langpack-st-7.1.8.1-8.el9_1.x86_64.rpm 523899f4b6f1719c12c9eedeffb0617e6c833c5868bbd3d76d7ccda8580a0ce1 libreoffice-langpack-sv-7.1.8.1-8.el9_1.x86_64.rpm 6e6e4f57f4b9de950be0e390da8bb9d4fc645a43ac1876bc3b8bf3bbceb2ab06 libreoffice-langpack-ta-7.1.8.1-8.el9_1.x86_64.rpm 897680819cbf2b0d5f71846d98b386b8de863a0bbd62e2ef138a86dd71205d4d libreoffice-langpack-te-7.1.8.1-8.el9_1.x86_64.rpm cabca3e3eb5e1e5dbd4910d55bf170245b7cd3ab53d70f78170bba5d383cd2fd libreoffice-langpack-th-7.1.8.1-8.el9_1.x86_64.rpm 9872d147b49f7bf2c59c121ea5953eadfca945318c0c1c574c7e3c8f20887822 libreoffice-langpack-tn-7.1.8.1-8.el9_1.x86_64.rpm f58cc910504897d59671a0a7367d1ac2ceff883192dba167f4866be7cf23795d libreoffice-langpack-tr-7.1.8.1-8.el9_1.x86_64.rpm 03f7ef93bfb5be6f4d2040571ad0d702b7a8cb2010ec773ffae6e43450c1812b libreoffice-langpack-ts-7.1.8.1-8.el9_1.x86_64.rpm 787f531de7b32b0d3ca24c513b98f45ddcf5eaa5bd1d8491afaf8268693cc948 libreoffice-langpack-uk-7.1.8.1-8.el9_1.x86_64.rpm 1b22877e3b0a95475fb8d64516890815b62dd7fda42011fad078f11ed1c98647 libreoffice-langpack-ve-7.1.8.1-8.el9_1.x86_64.rpm a1a1ec674d2b4d02e0fcd82722e6f8d2ff41c510b8a5c45a11a08bbcb74b6fb7 libreoffice-langpack-xh-7.1.8.1-8.el9_1.x86_64.rpm 68b4fdc4fc27b9008ea6aa6d699732913474cc8184c960728935267b6e1c9bc8 libreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.x86_64.rpm a41c35e49959e114c69fec5b68d8828a3ea871ae9e6a6dfa9add33b1ad647644 libreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.x86_64.rpm 4336e686b910a8bb714c37a9063191cb27375e8ad5527e68cce8be09e0e4d726 libreoffice-langpack-zu-7.1.8.1-8.el9_1.x86_64.rpm 6805ea930cc2a3da45202d047a57e6d922255d4bb382758ef2b9d3cee7d8633e libreoffice-math-7.1.8.1-8.el9_1.x86_64.rpm 76e4613f50ff1a4f2f5ca8e3e0cc21df68a861202d167f3ab0971cebb7d1bf9b libreoffice-ogltrans-7.1.8.1-8.el9_1.x86_64.rpm bfcaf58fd8827dc203f64a02462c44a1c0fdfe14bbe81f0a190af7347875e611 libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.noarch.rpm a7518cadf02101e619416247f2699d2c9a1906316f56afc6d47b13cf9ed81897 libreoffice-pdfimport-7.1.8.1-8.el9_1.x86_64.rpm 3124261d23fd724dcc54bc722bededefd99a37adaabdfa5e73883bc7a1e9bef8 libreoffice-pyuno-7.1.8.1-8.el9_1.x86_64.rpm 1b8a69dd7a06cb565ca8a9b4eeda9206a7512d4b3b292c7518087c72b7f21654 libreoffice-ure-7.1.8.1-8.el9_1.x86_64.rpm 3473b86db4de1a7b093f8b34f589f6fcf6ba66e1a2331b49a6507ccf12358c1f libreoffice-ure-common-7.1.8.1-8.el9_1.noarch.rpm f659477b9c1ea5ab9bb0de86642bf9df0faf7d342350c0adc7b4f3c420521046 libreoffice-wiki-publisher-7.1.8.1-8.el9_1.x86_64.rpm 386cacc2ab280263d1da67f6d4c9c262faef0860e25b8728a37f6e283490574d libreoffice-writer-7.1.8.1-8.el9_1.x86_64.rpm 1582abb87edda7350c2017b376e751a2cde290b826e5ca7c1e0d754b49b0012a libreoffice-x11-7.1.8.1-8.el9_1.x86_64.rpm 85ab4c3592df647d3258eeda31c2228616ddef3f0e4d36eb04b52f415faa616c libreoffice-xsltfilter-7.1.8.1-8.el9_1.x86_64.rpm f40276b2527383cc58d3cf74ac6fbb20cdd6af0f3d84c1736ac87819bccd7dc7 RLSA-2023:0303 Moderate: usbguard security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for usbguard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms usbguard-1.0.0-10.el9_1.2.i686.rpm ed1d7851cb634fe120cc8fb62b664d797203278440c07cfd8e0bb50ff3b90a5b usbguard-1.0.0-10.el9_1.2.x86_64.rpm 237bf57bcb21ec99e0f4f605a1f685c29e8fbd52be85215c8091175a2ca2b3af usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm 821f7cc58d4632a98a7470a2f86ebfe04c447623af52700a88c28120b955f508 usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm ff7701135023660d1eb0217503379c5f0bceee00374f4d30c8e847ba04881248 usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm 0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5 usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm 335ecd55f5170814776f7fdcc360afc5acf61947ed0607939d25f8f34c442ad2 RLBA-2023:0306 stalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Rebase stalld to latest upstream version (BZ#2136572) rocky-linux-9-x86-64-appstream-rpms stalld-1.17.1-1.el9_1.x86_64.rpm def949af97937fda0cc5a1ea4388e42c825f62a31631631e7ceeffc47425ec4d RLBA-2023:0307 fapolicyd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fixes: * statically linked app can execute untrusted app (BZ#2137254) * fapolicyd ineffective with systemd DynamicUser=yes (BZ#2137263) rocky-linux-9-x86-64-appstream-rpms fapolicyd-1.1.3-102.el9_1.7.x86_64.rpm cd924613bfa40361bd6fc83f191d0731e67b05452dfa0a8df8e70e889d5c8640 fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm 2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d RLBA-2023:0309 keylime bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Bug Fix(es) and Enhancement(s): * agent fails IMA attestation when one scripts is executed quickly after the other (BZ#2142032) * Registrar may crash during EK validation when require_ek_cert is enabled (BZ#2142033) * Segmentation fault in /usr/share/keylime/create_mb_refstate script (BZ#2142034) rocky-linux-9-x86-64-appstream-rpms keylime-6.5.1-1.el9_1.4.x86_64.rpm 4ebeccd3fa45154859133692dd6e8e7f2ae6b60b4451f3294956928ab32b336c keylime-base-6.5.1-1.el9_1.4.x86_64.rpm 44389a08b4c3b149c3432bd37888893de9bc2c3261069d71a0e873224add559d keylime-registrar-6.5.1-1.el9_1.4.x86_64.rpm bc7a81d8e8e9e3547550806883103a9cbc1d95f78b84494c940912a65bbdc91f keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm 2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac keylime-tenant-6.5.1-1.el9_1.4.x86_64.rpm 74d2ff21c54cd23d1f2756838008f2640b69a17b4de8070de7c282b47eeaeb43 keylime-verifier-6.5.1-1.el9_1.4.x86_64.rpm 22b126056912799186d289c10e59d6c86b3a802b7fa697722a19fac6a166fb16 python3-keylime-6.5.1-1.el9_1.4.x86_64.rpm a289908636025492c0a33826cb1057d77c797d8e52dc02d0779f3e844055d470 RLBA-2023:0310 conntrack-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conntrack-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use. Bug Fix(es) and Enhancement(s): * Rebase to 1.4.6 or backport fixes (BZ#2126627) * Fix for covscan results (BZ#2122946) rocky-linux-9-x86-64-appstream-rpms conntrack-tools-1.4.5-17.el9_1.x86_64.rpm 74526a63f2aef409c913f379f272fcb8b59069dbe660d08837baa23084616c92 RLBA-2023:0312 tracker bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracker. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tracker is a powerful desktop-neutral first class object database, tag and metadata database, search tool, and indexer. It consists of a common object database that allows entities to have an almost infinite number of properties, metadata (both embedded and harvested, as well as user definable), a comprehensive database of keywords and tags, and links to other entities. It provides additional features for file-based objects including context linking and audit trails for a file object. It has the ability to index, store, and harvest metadata, retrieve and search all types of files and other first class objects. Bug Fix: * GTK 3 directly depends on libsoup 2 (BZ#2141023) rocky-linux-9-x86-64-appstream-rpms libtracker-sparql-3.1.2-3.el9_1.i686.rpm aad670c73451ce3a4cdbe60a73d1a207a8495ea7a5fbede4ebc9a102e52e1039 libtracker-sparql-3.1.2-3.el9_1.x86_64.rpm 583a761cca669314c234f24db6a3c5d27550d16dcfbf02f5c9fd53b0da5e57a4 tracker-3.1.2-3.el9_1.x86_64.rpm 64c85f77f05cf0c53dc7b12316289220fd6dc92cff1f11340e9948288fb08eab RLBA-2023:0311 libvirt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fixes: * libvirt doesn't catch mdevs created thru sysfs (BZ#2141364) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083) * qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410) Enhancement: * Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094) rocky-linux-9-x86-64-appstream-rpms libvirt-8.5.0-7.3.el9_1.x86_64.rpm c708779a396e230d2c5b07e0bfe51cd01f49ccbd4c83869d8073d60d6370dd64 libvirt-client-8.5.0-7.3.el9_1.x86_64.rpm 7e78e4b314f9391dae14046061f56a0877ba5d2fa8fc6c80e50ef539c8cb8643 libvirt-daemon-8.5.0-7.3.el9_1.x86_64.rpm 48b52a90c97c6b7ad233f63d5e89b6e755018153285734c21f78660409585d1a libvirt-daemon-config-network-8.5.0-7.3.el9_1.x86_64.rpm ea06d4aa7466a860568cd37e88f867968d093a0323d9f4d47a57c2bbeb18c91e libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 420ff2d0519c7e21815e4beb165018e69bbdc52f3bf3c93b961e9873a55eecae libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.x86_64.rpm 7e3a7d4ecf369c032a337355427483db927474305d71c1815f888aa28197a218 libvirt-daemon-driver-network-8.5.0-7.3.el9_1.x86_64.rpm 3ed76de2a5b5b77ace56a63991e4b9f57579d0419976dadd00cece896e6be893 libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.x86_64.rpm ca05c2a76e07f5ff4647ce9db4ad488a0d4f02a7047be7d15618e969a6a1961b libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 792d48eae60612d2edef25f085c8d1508d110d575b40c3c4a1631ca7177d4b1e libvirt-daemon-driver-qemu-8.5.0-7.3.el9_1.x86_64.rpm b0f28d516b0edc48b0b922dfafa3eb67df028ef014c04e355f31e80aba6005da libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.x86_64.rpm de5bb1b4844f9ff342ccc76b99404624c2d77209c7c4de29253080dcc85c6ef5 libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.x86_64.rpm 11d28b80a7e3f9d171f9d48637e61241c66003ae24366dbe34328c0595e37b7c libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.x86_64.rpm 37d0168e2a00cf5e6928bb0a5bfda4b762fc83455f8d60dd9ee459a0cfc95167 libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.x86_64.rpm 24e8e44a9eae16af22f0a4612baaba359e4df0efa8197bba24b03ce0ad2072bd libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.x86_64.rpm 4019867e2bdd85da3b6fd73d8649fa476875224fae7f21d06c84af2778797e5d libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.x86_64.rpm ac268085630e07135f22f6d3224469f1b1fed919758eb843017c3356e41e153a libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.x86_64.rpm 43a2dd82596de9414d0e7ada2acaaa89d864a20c5b42623b322ec4b86b0890ec libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.x86_64.rpm eb0ac684f2d54aa112510c00b04ba8fca6043aabc83f5b6d3052b5659e701037 libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.x86_64.rpm 92c62e1ff027648c615425c0b1969373bba89fdc99e4c6a95d84be5e1a806c15 libvirt-daemon-kvm-8.5.0-7.3.el9_1.x86_64.rpm baaf46cf94b070312b786a26aa1f21c16d1e17e7a6a7bf6217b7a0cad0cb3bf5 libvirt-libs-8.5.0-7.3.el9_1.x86_64.rpm 676aee21a6ccef29385ddeb6118c7e29c2ca4250acf8ea9af15905ad3ea44e0b libvirt-nss-8.5.0-7.3.el9_1.x86_64.rpm d829f341c6a3e196c3b05e1cee3af14c96f9fd387883a4d76f5afc45af0ccae4 RLBA-2023:0313 nmstate bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix: * Cannot move bridge port to bond (BZ#2148394) rocky-linux-9-x86-64-appstream-rpms nmstate-2.1.4-2.el9_1.x86_64.rpm e97f018f1f7cd2b042099960fa5340ba729f2bdeedef9347d5e2166cd82d5449 nmstate-libs-2.1.4-2.el9_1.i686.rpm dd9bbeb03426c672c4fadf6781d0c6b06610031ae44baa56fccc98aaff0a329c nmstate-libs-2.1.4-2.el9_1.x86_64.rpm 1101d5e8008cfed4b44e4c8307f9b57678479ddb5b1c4769f0f783681bb298a0 python3-libnmstate-2.1.4-2.el9_1.x86_64.rpm 5283d7ae58c28c5872f1207fe6e75d14090db6742cd3581024e3dfb96e8d7d55 RLBA-2023:0314 podman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Bug Fix(es) and Enhancement(s): * [FJ9.2 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2136928) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149776) * SIGSEGV: segmentation violation on s390x (BZ#2150433) * podman: ubi8 sticky bit removed from /tmp (BZ#2152026) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152043) rocky-linux-9-x86-64-appstream-rpms podman-4.2.0-9.el9_1.x86_64.rpm ce8412fbaa7fd6b47fe9f40bfe3fffb2c175f73d4f25104e715f64adc56854aa podman-catatonit-4.2.0-9.el9_1.x86_64.rpm 4f2fb4365deabf7265c2af633fae5018ff360228bfc76bf599d3f88cc999d80d podman-docker-4.2.0-9.el9_1.noarch.rpm f458a6a217cd912f9d966f529c37f69013ef746104c22639b829b1dfa702d446 podman-gvproxy-4.2.0-9.el9_1.x86_64.rpm b26f3bde0d57f2b1f7276dd7e3eeb0e81fc63b8149b79e5e481a004abfc23e69 podman-plugins-4.2.0-9.el9_1.x86_64.rpm 068edd55880260e2c3cab7f059da365ceb6f32aeb1a062dbf0615189238570ce podman-remote-4.2.0-9.el9_1.x86_64.rpm ffd70f0ea6097b4011e905767ed6ae686c21f518fdd2629a725a2658ab47ce29 podman-tests-4.2.0-9.el9_1.x86_64.rpm a67d1d437a7b43844234a4e434a5eccd1c103761766f2d4c7ab752d377ff425b RLBA-2023:0315 buildah bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides command line tool for creating Open Container Initiative (OCI) Images. Bug Fix(es) and Enhancement(s): * SIGSEGV: segmentation violation on s390x (BZ#2150432) * buildah installation includes runc as a dependency (BZ#2150525) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152022) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152042) rocky-linux-9-x86-64-appstream-rpms buildah-1.27.3-1.el9_1.x86_64.rpm a772360c5fc26bd1e7fa9876dc6a911c2cadd9f0a7ade2ca8676e56b6e2111c5 buildah-tests-1.27.3-1.el9_1.x86_64.rpm 0d0940205101c9b48982d9899eeeb902388510f3be0be45a9512826fb473ba7b RLBA-2023:0316 nbdkit bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Block Device (NBD) is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Bug Fix: * nbdkit: error: /home/vddk8.0.0/lib64/libvixDiskLib.so.7: cannot open shared object file: No such file or directory (BZ#2148498) rocky-linux-9-x86-64-appstream-rpms nbdkit-1.30.8-2.el9_1.x86_64.rpm 867079f83d60b98561624545fb6dcdc33c15be17a4fd32d0384672bf8a272109 nbdkit-bash-completion-1.30.8-2.el9_1.noarch.rpm 5bcf99b438a3eed79e72f377af0cb7826eca08f26d9722c6fe07cea6aaefba23 nbdkit-basic-filters-1.30.8-2.el9_1.x86_64.rpm 0ce13e80ed907b0e4b8e83de94153c81f4370dc1a1630f453d1c3b45b728f7a5 nbdkit-basic-plugins-1.30.8-2.el9_1.x86_64.rpm 3466dd341ea657ded09196fa0826e601c193f57348ef69d949e0406da7458e87 nbdkit-curl-plugin-1.30.8-2.el9_1.x86_64.rpm 6692b075148c449525ce62f7a72d3c8918d9c1fdd543d32b204fee5ccc223879 nbdkit-gzip-filter-1.30.8-2.el9_1.x86_64.rpm b18ddb2915c2631bf71b00624c3b871e4b4bca6a8aeed43dbc85210a26eb5ef2 nbdkit-linuxdisk-plugin-1.30.8-2.el9_1.x86_64.rpm e009b2365155c2d1058d7761ce5d9e6df3aa5cb5fdf94285c3fd513b715bdc06 nbdkit-nbd-plugin-1.30.8-2.el9_1.x86_64.rpm 68b47d17a80513e063fb78691c54d4f48cac11d190fbac5fd7fffbb7b2e87fa2 nbdkit-python-plugin-1.30.8-2.el9_1.x86_64.rpm cd0e7aa9610de45b69caa26490730006258dffe58ca0d5c602f9a8566c20f116 nbdkit-server-1.30.8-2.el9_1.x86_64.rpm 4c42d726845b1c2dc42cd59704e80ff83aeac9d8d55e97cbd876b391b554d752 nbdkit-ssh-plugin-1.30.8-2.el9_1.x86_64.rpm a81229467e8cde4ee0559837ae18c4f3fbc6c7253216077c3a8634c5a58108c2 nbdkit-tar-filter-1.30.8-2.el9_1.x86_64.rpm 38b2c68a41a962c9a9f87aef69efdf4ee64317d6a91e09d0029d6039a0ca1be0 nbdkit-tmpdisk-plugin-1.30.8-2.el9_1.x86_64.rpm c65cdd3c1a224feefd167bb5261ae9547fcde717d4a22d215ee9aed168355fe2 nbdkit-vddk-plugin-1.30.8-2.el9_1.x86_64.rpm 68e95e4d99454fe95f7257ec03f1b6f8241edfae3bfde1c45a505c8679e449c5 nbdkit-xz-filter-1.30.8-2.el9_1.x86_64.rpm 03f3832746fe5fe0cdbb21f3a63608cc505de23ae791fec5addc894b388a1d58 RLBA-2023:0317 hyperv-daemons bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150268) rocky-linux-9-x86-64-appstream-rpms hyperv-daemons-0-0.40.20190303git.el9_1.1.x86_64.rpm 9ad347656af733f0c9d08193e6de68afe2f1c24128adff9fe1cfc78b21a25721 hyperv-daemons-license-0-0.40.20190303git.el9_1.1.noarch.rpm fa9059871f00dc113015c27e01e5388e9a52d1b097cd94109f4d4a4bbc886694 hypervfcopyd-0-0.40.20190303git.el9_1.1.x86_64.rpm 617d5a94fef2e4b902531feddeed690e976e40c53b42044290243a3dbfda1ca2 hypervkvpd-0-0.40.20190303git.el9_1.1.x86_64.rpm 8a55232a6b273932785b24fecb7d71713c578450117e564480c98318e426d17a hyperv-tools-0-0.40.20190303git.el9_1.1.noarch.rpm 0140116450ab5a94be5e1d93e8a9fd4694bc666bf0a2ac5c3c1f43eac4fd85c9 hypervvssd-0-0.40.20190303git.el9_1.1.x86_64.rpm 3efd684f075bee685a748ab5aee1f363a971517d20dc2d4135cde72c0b07cefe RLSA-2023:0318 Moderate: postgresql-jdbc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql-jdbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database. Security Fix(es): * postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names (CVE-2022-31197) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm ce261fcfbadb40e68387bc472ef528b45f3c3612089125d3c98f262eb8d9b7dd RLBA-2023:0320 ipa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * vault interoperability with older Rocky Linux systems is broken (BZ#2149274) * ipa-client-install does not maintain server affinity during installation (BZ#2150270) rocky-linux-9-x86-64-appstream-rpms ipa-client-4.10.0-8.el9_1.x86_64.rpm 511d2f0c4dd71cd1563504049ee39e9a51b86c60cbb6c83328744706dbcbc55c ipa-client-common-4.10.0-8.el9_1.noarch.rpm d1dda6cbb850b804179b67a46dd0d84c1378575495514a6da967bcde9dafc01d ipa-client-epn-4.10.0-8.el9_1.x86_64.rpm 09439c201ee287e17b1bde1cd1e8c46125b44ae17a219187557a5a66aa15f346 ipa-client-samba-4.10.0-8.el9_1.x86_64.rpm 5d7c12e6a4954d4d126cbf01371eb5639fa585817a2cd151ae0b6aa35585c090 ipa-common-4.10.0-8.el9_1.noarch.rpm 276c52e480e2d7a11b8cc95b95226eac4fe22eb9af91e1177448b2348c6024df ipa-selinux-4.10.0-8.el9_1.noarch.rpm 63c7492e6faf1f238ec96ce6d48bb903890f745223b44ec0fd48614286c1be92 ipa-server-4.10.0-8.el9_1.x86_64.rpm ab9243aec5974629b88056b46049d94fa4bb255a86acf5ab30633026ce30bcb5 ipa-server-common-4.10.0-8.el9_1.noarch.rpm 546c8064270726c9f3159d8be7c4c411c72eeaa39c58d5df238272f241350bce ipa-server-dns-4.10.0-8.el9_1.noarch.rpm ec35ba0af90eaf5f42c56e0589b41d58b5d6cac6eb7018956658b32b59810754 ipa-server-trust-ad-4.10.0-8.el9_1.x86_64.rpm 4f893f369df72cfbdb122467e8164ceeee3f634ecac0b7640df8fb56e6b74702 python3-ipaclient-4.10.0-8.el9_1.noarch.rpm 50405d81a373f97c8f4aeafd1b35b1f229045d1760ba00e051704b0164bc7ac5 python3-ipalib-4.10.0-8.el9_1.noarch.rpm d1792d66c98e8351803ac9fc16a8355e672b9ecd7cd8d874e39cd0a187a54253 python3-ipaserver-4.10.0-8.el9_1.noarch.rpm 00ba2877876739f123773f4e06eeac31671771f7b01658747cdc09660cb8d885 RLBA-2023:0319 fontconfig bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fontconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fontconfig packages contain the font configuration and customization library, which is designed to locate fonts within the system and select them according to the requirements specified by the applications. Bug fix: * need to fix remap-dir behavior (BZ#2150227) rocky-linux-9-x86-64-appstream-rpms fontconfig-2.14.0-2.el9_1.i686.rpm e23f43da28f64ae3dc3dcbb5bafbeaf8672ebbacde6ae553763b83c6c87c2f41 fontconfig-2.14.0-2.el9_1.x86_64.rpm c8383594be73281a9522d216650b65652f4556a6d3c899531364c30f4df20acf fontconfig-devel-2.14.0-2.el9_1.i686.rpm c56c213751cbf8080d751617d7c6fcdbf1bebd958b54602522c7a1613e94904c fontconfig-devel-2.14.0-2.el9_1.x86_64.rpm 539b15e424cd170f5220f86a20e743f47efbebba93f8167c7e2ae876dc4bc61b RLSA-2023:0321 Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs-nodemon, nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-9] (BZ#2151627) rocky-linux-9-x86-64-appstream-rpms nodejs-16.18.1-3.el9_1.x86_64.rpm 8e40a1e5726e070f2ea790a236b95accfca59e54703b5e716a2ab12f16a97c4c nodejs-docs-16.18.1-3.el9_1.noarch.rpm d6319a6ae834b80fcf596aed6094622aab94d6b0e7e7995e60a4261deb029364 nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpm 5a203ad1ced984685b7ee5fd47259d108e8eb6aa740965f7fd625f5572f1cc95 nodejs-libs-16.18.1-3.el9_1.i686.rpm 35cddf28e9bde5789411fa0dc5831aef22e6367518ec036893541210974d4a0b nodejs-libs-16.18.1-3.el9_1.x86_64.rpm d853ae9511853003c54ea8427be23ed8af9af3a6463a906bf55ddf32b04eb2af nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm 86352f40a608e15555df09437aaf424b124c12a6d495528f03b68dd8a2548268 npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm 4e618cf28a7d0dc1dca3786f748dd07ffa11763ef718429dd23b7a998dca0150 RLBA-2023:0322 gcc-toolset-12-gcc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150126) For more information about usage, see GCC Toolset 12 linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-gcc-12.1.1-3.5.el9_1.x86_64.rpm 240efc5a8025b87626742043e76698c71c8d557ab3d90b53ad4556b43a9d58fa gcc-toolset-12-gcc-c++-12.1.1-3.5.el9_1.x86_64.rpm 1a80c27435ade70a9ca5c40552d10ccd0e9ad1944d34ebc1ba46269ccfc87add gcc-toolset-12-gcc-gfortran-12.1.1-3.5.el9_1.x86_64.rpm d719147f46b476876370ff592f070da4047a918ee1a1452784232cf547409976 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.i686.rpm af13c32de778dc1500167468653a770c3032b711a7670cd6b6dc2159493247fa gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.x86_64.rpm 9f8dbab10ee10dfa615c7b2b2349e920e365749453dd70911f44a16ddf24089b gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.i686.rpm 6f7a496efb4531cdd75098b5f21bf421b8696447d5804b52521a11394dd12c0e gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.x86_64.rpm 93390bd75e7c6e47b2b6e6122e49f56aa236a27430ec4e92128e5f17a87a2006 gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.i686.rpm 59dd583a17f5d048a74a171b1c4545b0e92a74456da8334dae472720141f72ee gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.x86_64.rpm cf13a09a1fa3169270bb33f4bbeaeec0dd02b9e4ca3ad32dfcd16143dfaa8ddd gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.i686.rpm 97497f16c61c2cfd94d595c2199c541c17460ee7fa3b7fb81d7881fecdc109cb gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.x86_64.rpm 7ba04d8a5238045823d787f7507c0a123028a3f54c33882cdb9310700a98134e gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.i686.rpm 12c0a4baab41ac4c4b11ac31e5c6e005325ed9922e3e46a15acd5035bcc23786 gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.x86_64.rpm 1ff00473daa6e4f0a37310f2302a8127d7d417ec838532979575c5639efe813b gcc-toolset-12-libgccjit-docs-12.1.1-3.5.el9_1.x86_64.rpm 5a771f1288df8704b9cc4abeeb5ccf22015be5eea36107d2aa6798184954f313 gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.i686.rpm 270bcc360bb3b7d05cf0b9ffbb0571b31b992284a03a3b07a89d3d1519cda726 gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.x86_64.rpm 149f3ad358e1eb9b9e43287874126ad78b96c8c0ee899d6a313bd1d86f8437db gcc-toolset-12-liblsan-devel-12.1.1-3.5.el9_1.x86_64.rpm c7978a37ca2221cbbdbedeed9f821772729a9471c25c9d934b76582954528ddf gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.i686.rpm 6356bb093c428d07bc814af97e5e7973a1eb37c9f8d210c225d67a4dc5b99074 gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.x86_64.rpm 283393df3b22539274f84a2014338766765c1c77b06e804b294745ee2fb2d27d gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.i686.rpm 6947ce493f2988d670b510f89e0fe2e43e45e6af2f93bd0f8062fe8537a3120e gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.x86_64.rpm fdd56b5704bbd3c13e7da63f4dc39b6f081723c2d177f29b333170713a41efdc gcc-toolset-12-libstdc++-docs-12.1.1-3.5.el9_1.x86_64.rpm a27c7d679d000a5acdc02f08f5f458bca40568e76db18b8081d1d1e3a0284681 gcc-toolset-12-libtsan-devel-12.1.1-3.5.el9_1.x86_64.rpm 6621d3cea19023bda8217c6f4881239670403b281b86a721bc27c61f06b18975 gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.i686.rpm 81911962c9e6d7407e37f20aced2a135a9752075b2758dd142f95526e2872330 gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.x86_64.rpm db7369156d1f065b33516700abadb33de2dcf875bc32a8c03094441f4cbde19e gcc-toolset-12-offload-nvptx-12.1.1-3.5.el9_1.x86_64.rpm c4ea1a97774d72640ee84a193dda1b3e2029e40c194af956e5606a038c94608c libasan8-12.1.1-3.5.el9_1.i686.rpm da5b7989e81fe30070d98be5b1e19b02be3b6812b2ec8c3ac75be70ed88bc096 libasan8-12.1.1-3.5.el9_1.x86_64.rpm 986560f05c7c7f60e1ced423242db9ba823a48d04c921972990163959c586f2d libtsan2-12.1.1-3.5.el9_1.x86_64.rpm 2c929494b1239a6a114a8f9a789a20ea41f6f1d4c79dbdcb2c5c925cd90b3a40 RLBA-2023:0324 libqb bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libqb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix: * pacemaker command "crm_attribute" intermittently fails with error code 102 (2151305) rocky-linux-9-x86-64-appstream-rpms libqb-2.0.6-2.el9_1.i686.rpm f2bb5efe9142fc3e9de3fab35d624b45a64f427ce6b09805815cab3cd8ada97a libqb-2.0.6-2.el9_1.x86_64.rpm 90c57e61e0139d4aff8aacd0a0f56fe91f75110782c4e910587913df69f2e15a RLBA-2023:0323 ansible-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Use python re to parse service output instead of grep rocky-linux-9-x86-64-appstream-rpms ansible-core-2.13.3-2.el9_1.x86_64.rpm 4f5bd9ddcf7a9fcc7d88d4a39a9ae34ac48d2cccf7e3ebec6a0eab6628a21a16 ansible-test-2.13.3-2.el9_1.x86_64.rpm c9597222dbc1ae9c55f1087950dedf6e7d632433b6f7c8bc37fc76330f18f51a RLBA-2023:0325 clang bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The clang package provides a C language family front-end for LLVM. * clang-14.0.6 should apply llvm#55560 patch (BZ#2151465) rocky-linux-9-x86-64-appstream-rpms clang-14.0.6-4.el9_1.i686.rpm 8eba4df98174f745f6609cb722f0590d1a7cd7e0d39ed0fa5a8a80086776d882 clang-14.0.6-4.el9_1.x86_64.rpm f36118e67a7feaea64fc1977c5286f9bd9c49c2f9baeaacfffc30943ff182986 clang-analyzer-14.0.6-4.el9_1.noarch.rpm fa04f0b3c73a390908dece4f904882cb893aabd7211c06d4d24511ed120902ab clang-devel-14.0.6-4.el9_1.i686.rpm 973dbe66dff2fb39a64852680240b77a6d9c3daafd49b47473f8102af531f751 clang-devel-14.0.6-4.el9_1.x86_64.rpm 69560aad07b2bd1ddb6366a36eb92ce6524b0ac70e75611753c48841f0c7a1a3 clang-libs-14.0.6-4.el9_1.i686.rpm a57dd2ca09cf463f30fe7f2d79a0a7c101eafffbbd4159a7fd3869a0f610c205 clang-libs-14.0.6-4.el9_1.x86_64.rpm 88863b42716650a1d80893b21fd72d04488683b1615b596a75ee9af554220840 clang-resource-filesystem-14.0.6-4.el9_1.i686.rpm d00ea8bcd430edb790769c74acc60b224cd99e93f103b7f50fba5ab53844c833 clang-resource-filesystem-14.0.6-4.el9_1.x86_64.rpm 30c6333584909896912d705678d57cbfddeb7411949fcdf8ed8802ff8c447cbd clang-tools-extra-14.0.6-4.el9_1.i686.rpm 3e3a4c17cb4fccc7fd430e3d693a36e845e6f29031e761b4f72bf02063b2b856 clang-tools-extra-14.0.6-4.el9_1.x86_64.rpm 428ec537d10d90c7b8347117c2990007e656bf756dafd3140ef1c92cb5b312d6 git-clang-format-14.0.6-4.el9_1.x86_64.rpm 118a7606099845f5a2643f02dbdb65d0d1318fb7571d38aced27b023dc819155 python3-clang-14.0.6-4.el9_1.x86_64.rpm 1dae356b6af4f400077686e3cbd6ef64d1af0b805f045c68d5171bdacd6f8675 RLBA-2023:0326 gnome-shell bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. Bug Fix(es) and Enhancement(s): * per window screensharing does not work with xdg-desktop-portal-gnome installed (BZ#2144743) rocky-linux-9-x86-64-appstream-rpms gnome-shell-40.10-4.el9_1.x86_64.rpm 1b00dfdff75fec87bd09dabf3ec6cfde1df275347bcbafd6d337dd1a8c4a9680 RLSA-2023:0328 Moderate: go-toolset and golang security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang, go-toolset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144547) * crypto testcases fail on golang on s390x [Rocky Linux-9] (BZ#2149311) rocky-linux-9-x86-64-appstream-rpms golang-1.18.9-1.el9_1.x86_64.rpm 6f1ba51758bafae29919d5ca43693df2f84d0fd266e122e330b1496b554f2395 golang-bin-1.18.9-1.el9_1.x86_64.rpm 7b5f19bb9e0406fe1b27411378ef45607a5ed9c59027023c142fb70c6a5365a6 golang-docs-1.18.9-1.el9_1.noarch.rpm aa0c932ef3c6d3984c4c82f412c4f37703fc9d2fe174c44f524dbf91e47a5ea6 golang-misc-1.18.9-1.el9_1.noarch.rpm d791de42d6bf6b8abc153eaf48d80f3107e1046ee5a887b12e77943f1f6490f4 golang-race-1.18.9-1.el9_1.x86_64.rpm 65b61adafe0229d5eb8b05648ccfae2b709fdcb17c1cc6ba2e3c269a4c620270 golang-src-1.18.9-1.el9_1.noarch.rpm 2e5a41097be4f9aac06f6e1d67e7a0a7372112eed25706bd67c6997c8e75ab75 golang-tests-1.18.9-1.el9_1.noarch.rpm d73463aa9e5471ee48f4bdcd535ee935c65d187bc914c60d3a6f4fecb9cc1a92 go-toolset-1.18.9-1.el9_1.x86_64.rpm 714f154107cb5613974a98ddf6b5e6d479e7de4b007c93534a1fe8a01cf6a998 RLBA-2023:0327 virtio-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es) and Enhancement(s): * virtio-win RPM for Rocky Linux-9.1.0.z (BZ#2145213) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.32-0.el9_1.noarch.rpm 363a92bc7ea8ad76656a70bd2cc464c99509947d7d75bbbe626c56c0df7915e1 RLBA-2023:0329 swtpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for swtpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The swtpm package provides TPM emulator built on libtpms providing TPM functionality for QEMU VMs. Bug Fix(es) and Enhancement(s): * Test for available issuercert before creating CA (BZ#2152916) rocky-linux-9-x86-64-appstream-rpms swtpm-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm 2849b631119b92256d7f8569bb95bb0c47eeacdbdf482a4aa20b9965fcdd762d swtpm-libs-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm 108535362c53294c2d71305a0b1959062bca7b83b47a37af41623688e7a1eebb swtpm-tools-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm e553873ecb50aad9bf8b8c2a4d234443b3bc67c5731cfe7a2d4fe1ea26e31195 RLSA-2023:0383 Important: libXpm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libXpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libXpm-3.5.13-8.el9_1.i686.rpm a9c83e719598aaf946066c421263447564772c3de2fc7d394e9bf2914d895cb9 libXpm-3.5.13-8.el9_1.x86_64.rpm 33892f7917599d8a7581ab7f44e30fa06e777abf9ea17962df937a96929d2a1e libXpm-devel-3.5.13-8.el9_1.i686.rpm 71fe586c8935e14575a62cfff52a085682481d580c0efb6a3a98da8ea8e5672b libXpm-devel-3.5.13-8.el9_1.x86_64.rpm 5a6693ca796b7e5e33f5a9d723f6c024992ebba05538c81a33f05e778322128f RLSA-2023:0210 Moderate: java-1.8.0-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [Rocky Linux-9] (BZ#2159912) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [Rocky Linux-9, openjdk-8] (BZ#2163594) rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm a19683ecb4cbc37da7f3273916a9fcc9a9e7cc375a322e8dc6d2b0bbb865d6cb java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm 51a05b7182a83d97927c2d364cdda3f9f50706c60bf17a1794c90b61279272f7 java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm acf9ddf9f4a969224b75b89703fadc0ee1ac7144009961923d8b4cb2e024e92b java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm e66aeb439a1f2204e8b7275822e3da4856ba226636d91bd7a80765109a95437b java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm d0b1508c5af35809bd42f71964ba8678666e46383c04e6ce396bd2835144fe0f java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm ef7edb2fc10aee4785d45b3d152c5cf79a3fdbdad6e169ef8ee773cc29f8dfcc java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm c2d290ceb0c6b242252e9a950c6278e7936e0c6a1cf070358f644a541be77ba3 RLSA-2023:0476 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.7.1-1.el9_1.x86_64.rpm b8efab098baa6845e2d591f54dd3e8fecd44c77fe6a16d0239972d7568084f02 RLBA-2022:2316 new packages: criu Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crit-3.15-13.el9.x86_64.rpm 90dcb4a657e93c39392f029056810730052929c8f9b26f777fffde66342c1526 criu-3.15-13.el9.x86_64.rpm bc69909cddce3c323ae44111d97625c5e55bcd9443999c2da785e7e6fe6aa3b3 criu-libs-3.15-13.el9.x86_64.rpm f88cfc51ecb73aafaac5e07b21ae56e2edb79fc3dbb69f0bf745054cd8ceb37c python3-criu-3.15-13.el9.x86_64.rpm 83bc7480a7509f88c05f69c60a095bf1ed2a0002b2273ed0eeedac663eac8bea RLBA-2022:2382 new packages: evolution Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-3.40.4-3.el9.x86_64.rpm e88e3f0d2fba1c14b71bc6a9520b18ac887c4527d1a1ec956ac5322f81d6e7ff evolution-bogofilter-3.40.4-3.el9.x86_64.rpm f9fe57507bcbaede8b88ab42bf0ec2d579c5b5ccf859c6bb16d4c31c4304fe23 evolution-help-3.40.4-3.el9.noarch.rpm 198c2f06773d475648aabbd0d70584946cc3a7e417bdb6782f6e0ccb04e51b3a evolution-langpacks-3.40.4-3.el9.noarch.rpm 5c79e9c1d3ce7fef1273e7c415e1e484fe68f49c3b7d02336f3ba80ecd006bd1 evolution-pst-3.40.4-3.el9.x86_64.rpm 085b890bc0d6fc5b6f5b5a48a90bda456466ed46fc5cc4e210a5eebe02fd4dbb evolution-spamassassin-3.40.4-3.el9.x86_64.rpm 07154ba791fde30b35706192484e55d217b5e0c8f55db1a9dc32c20950a94fd1 RLBA-2022:2393 new packages: gdm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdm-40.1-13.el9_0.4.i686.rpm 3a166d8499d3b37e285ca7a01c9031d3ceb5e5d73d7869d9125fe287895f546d gdm-40.1-13.el9_0.4.x86_64.rpm 229ea6719ab48322e6d1e81a8111e3b2b0e817e21a2a46bd66240f3a8b3d32c3 RLBA-2022:2410 new packages: nginx Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nginx-1.20.1-10.el9.x86_64.rpm 16944abd6bd5e1b5a67d7a69bd0501c28d1b8c7575d3c8ba34309ef35d0674a1 nginx-all-modules-1.20.1-10.el9.noarch.rpm b5da23624b5f06385adb200e282d078555f0ab73c156d47b662cc833371d314e nginx-filesystem-1.20.1-10.el9.noarch.rpm 7762b4d66773eb3510bd2628d462b47690efcfebb2404150527fda19a799cc03 nginx-mod-http-image-filter-1.20.1-10.el9.x86_64.rpm 1182ebdf5f410b4a5f488099869f72e7fd563a2b77cae93583c89b9811016e96 nginx-mod-http-perl-1.20.1-10.el9.x86_64.rpm d6d2e5153f1e8bfc447f8f7ee9e03b8ed6302eea2fa36f858a5f34dc352ab046 nginx-mod-http-xslt-filter-1.20.1-10.el9.x86_64.rpm 746f75e710e356ef8abc7b0c6d4f4d3ef9017c294ec69b96dda8d3f2a3537029 nginx-mod-mail-1.20.1-10.el9.x86_64.rpm 0ed9d2a78eca4227702a70573e01e808699bba1caf4f1c7b6d54a00d4fdffcee nginx-mod-stream-1.20.1-10.el9.x86_64.rpm 59ac8280e3349d5ef9638cd6f3db010a6e3d301617a6141035bb07afc682ee58 RLBA-2022:2468 new packages: qatzip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatzip-1.0.7-1.el9.x86_64.rpm d9cc568c432a714e613bb0ed77753965d18bfd84189a55340e2f4c7ab6266904 qatzip-libs-1.0.7-1.el9.x86_64.rpm 7b94c81509ab9c0c6a0dc38a5314255a7dc745fde751c794bb4b2155d1d021ae RLBA-2022:2481 new packages: freerdp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.4.1-2.el9.x86_64.rpm c1acbb0854b7adcdd454cab8498be68833b1abe0982f475840d509dab1136dfe freerdp-libs-2.4.1-2.el9.i686.rpm 2339d23ec5f79949e88019065b198291bf3234eff52a060416a9174d8a360b02 freerdp-libs-2.4.1-2.el9.x86_64.rpm bfc2539239dc6cca85003e741d86ba6e094208fc43cc2a7809db11bc4836cf64 libwinpr-2.4.1-2.el9.i686.rpm fedbfb1792ab31ba61b194c58dfd068a4cdfa48aad1dea1df795e6233554d9ad libwinpr-2.4.1-2.el9.x86_64.rpm 6cf04ffaffe1843adbdc5144ad3aa7f090b1cd3a3186af490d5358eef1a0c7d9 RLBA-2022:2531 new packages: sdl12-compat Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sdl12-compat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sdl12-compat-0.0.1~git.20211125.4e4527a-4.el9.i686.rpm 1a8e87a6d5362dc6e75d9c0e9aa9c5afbdf07845791f94122d3992db9a83379b sdl12-compat-0.0.1~git.20211125.4e4527a-4.el9.x86_64.rpm 8e5739585ddd95d6d773d533a83875ca9b98f936c38e58493ed0791df42fabef RLEA-2022:2566 new packages: virt-v2v Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-v2v-1.45.99-2.el9_0.x86_64.rpm 93cff49568bba5be35a97477ccfa034027f4750284c9d685314bfefe308e6f0e virt-v2v-bash-completion-1.45.99-2.el9_0.noarch.rpm 75a545a8d2dfb02464227bd6219253ceb494df77d143458e5af24e0d15fde4b1 RLEA-2024:9283 nodejs:22 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLBA-2024:9286 postgresql:15 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd RLBA-2022:3755 new packages: sanlock Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sanlock-3.8.4-1.el9.x86_64.rpm 7beb79317d88873ce39b3abe0e20d8ce2c3f5bf83cdbbf1650478b74e78592a7 sanlock-3.8.4-1.el9.x86_64.rpm b4a19df7699e336173b058a8c1269ec7d3cd0a21d405b4d9d1b19b8cc8810cec sanlock-lib-3.8.4-1.el9.i686.rpm 9c93dccf98913efc81bed098f31737d464ae3f596c06377c8ae4ceded0bd8367 sanlock-lib-3.8.4-1.el9.x86_64.rpm 613ceed15099385818bb1a5f869eb99fdedb0324f743483f49554e8ce88e10d6 RLSA-2023:0005 Important: bcel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bcel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Byte Code Engineering Library (Apache Commons BCEL) is intended to give users a convenient way to analyze, create, and manipulate (binary) Java class files (those ending with .class). Security Fix(es): * Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bcel-6.4.1-9.el9_1.noarch.rpm 0c006b32e4b485fdcadf6c6e79a97aaa7dacba4cc46b097566eb8609e3ee6be9 RLBA-2022:4042 new packages: opal-prd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opal-prd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opal-firmware-6.7.1-7.el9.noarch.rpm a010e6488ec5bba285b80c50aac9eba40cef7e16aa9e22d00da06978771f77d1 RLBA-2022:3966 new packages: gcc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cpp-11.2.1-9.4.el9.x86_64.rpm 3d7313993678ddc1c8f9268e484087dbbbd481433f971aa0a48791eb6a78ed83 gcc-11.2.1-9.4.el9.x86_64.rpm 219ae4302ea6e1c52d08ab41c903af47439bb8d5f4c79b4db757bf04bda0890d gcc-c++-11.2.1-9.4.el9.x86_64.rpm 520f4526a226163d6da87e697b368fd82a7a7e42003011e97a00acdc8fca16ed gcc-gfortran-11.2.1-9.4.el9.x86_64.rpm 7ff5917ee206e70b7d9caae14a8be6d06a99f7e21106cd59222a00443318418a gcc-offload-nvptx-11.2.1-9.4.el9.x86_64.rpm 88d32e11b4e872e073410e16e92c800cd99f73d5d88d472bf002ed90f09f1c65 gcc-plugin-annobin-11.2.1-9.4.el9.x86_64.rpm aa1eccb050dd9e27824b31247abf85b94c7ed7568f08adce34094e0ed280cfd6 libasan-11.2.1-9.4.el9.x86_64.rpm e401256d2288ac83e1380dec1bca19489ddd69b93b714ac888edb60f5114b16e libgccjit-11.2.1-9.4.el9.i686.rpm c23865504012e5d4254081413eba16f9d395e219f1580126c722888560e385db libgccjit-11.2.1-9.4.el9.x86_64.rpm 6065d7f59ec320b3e5cb1e9ff9623681fa83b55ad5410f23ffb092642e06c1f2 libgccjit-devel-11.2.1-9.4.el9.i686.rpm d5c37541ebed1b4c097d802bddddfda719896f39e405589d3faad68334cca212 libgccjit-devel-11.2.1-9.4.el9.x86_64.rpm b05c4d04aa3ff2d595fd9bddbb02dc657cec9c213ad723f1664a9dbdf5a4f639 libgomp-offload-nvptx-11.2.1-9.4.el9.x86_64.rpm 6f8c4bb35da8d840ee2223ffa58c8c25d0d84d3cd211f43b67cbfcdf15f93cd0 libitm-11.2.1-9.4.el9.i686.rpm 66d814dec88c32b55f0521945b5c60af544f4758ea0b0aa80dcbcd007b12392f libitm-11.2.1-9.4.el9.x86_64.rpm 8bced2514660a913562b781bf618e1d23849f30a792556f00f68ec27ff7d823c libitm-devel-11.2.1-9.4.el9.i686.rpm 49a0ed3b214275d5013ca335708d164459a0620f015a3d486c8d06b2ffa57767 libitm-devel-11.2.1-9.4.el9.x86_64.rpm 7ff041c4f20e6a46d234b2dd506c2ff34862659254dd28b8d5c463148443088a liblsan-11.2.1-9.4.el9.x86_64.rpm 1300002829fffaabba6fb8353140b3f35278d334cdfe9b38d16d106f845c06bc libquadmath-devel-11.2.1-9.4.el9.i686.rpm 9c35addfbe60b4a35274d4294057c06bb8dd7c4a687475272137339179c4a2d4 libquadmath-devel-11.2.1-9.4.el9.x86_64.rpm a4bc023fd09d01ae02deedd37782ecb1f715b394aba81b5685a7f62153e458d5 libstdc++-devel-11.2.1-9.4.el9.i686.rpm 6bea52615a054766d1e610f58549055247accb1b106275e6fb2972ec93f7b2b0 libstdc++-devel-11.2.1-9.4.el9.x86_64.rpm 7f8b95f2c552797e6ab49a3bf611972e74037e959808fa5552c7a077671894d3 libstdc++-docs-11.2.1-9.4.el9.x86_64.rpm 453fd2471ba09c7f52a0a02500c13e9002b115ae83d13a4483dee592c6894687 libtsan-11.2.1-9.4.el9.x86_64.rpm cdd597fb23878aa006bc90b4c2a4310e2bc0427bc507e1bfce7ab6aacf5ef4e4 libubsan-11.2.1-9.4.el9.x86_64.rpm 8d851f0fa6d735d87ba02879db03c35a469f2bad7815a0b675a568dec6abf178 RLBA-2022:3951 new packages: krb5 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.19.1-15.el9_0.i686.rpm 2ea00ebcc867fd06095d6bec4a2d964d5efd32c7954c3f7945f7ec58af4e488e krb5-devel-1.19.1-15.el9_0.x86_64.rpm f6539a7ce0b16dacf9f70b0a1ecdcd3afcacf150300ab8e821910ff5ceec11cb RLBA-2022:3920 new packages: policycoreutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for policycoreutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms policycoreutils-dbus-3.3-6.el9_0.noarch.rpm f2feef470a0d1a6cf165ff5adad1b23be6e2e095e2709241ef66fdd98d1db735 policycoreutils-devel-3.3-6.el9_0.i686.rpm e8d6fb980a4bb0fe30ac8f9c23798d2d048c86856c09b69c80dac0781555f03c policycoreutils-devel-3.3-6.el9_0.x86_64.rpm 77f7a64a4558603f8343f741a93b8c7e97482314a5514a34fc3f9a074b3810a8 policycoreutils-gui-3.3-6.el9_0.noarch.rpm df1e9bfad0c3c3c53fd441f9686d8584b135ac13f56fb411ced7cab66c3d38c2 policycoreutils-python-utils-3.3-6.el9_0.noarch.rpm d1c4d722cfaffa28389ecd6502507617f411f71be1343397ab6483568925e6e5 policycoreutils-sandbox-3.3-6.el9_0.x86_64.rpm 822118609e71f79a0a965a598382feb9970b059020dfdadcc10016f8d25f6de0 python3-policycoreutils-3.3-6.el9_0.noarch.rpm 8757f529f306c75fa49ca75a151c4b0d3a7b7aad74d47775ebf02e130cd9466c RLBA-2022:3922 new packages: libselinux Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.3-2.el9.i686.rpm 8f269d8077b52ec77d8408fd584e36db07e0b187108c8c696732f7baa6e4dd51 libselinux-devel-3.3-2.el9.x86_64.rpm c32cce1a888126e5abfcb9de1705ddeccd8fa663c3447d9e2005a4e3f87f6eba libselinux-ruby-3.3-2.el9.x86_64.rpm b5a92d3044b771cd423104dfbbcec634937fd940c68383eecf105b92d5363d95 python3-libselinux-3.3-2.el9.x86_64.rpm f68acf3958776f0f72fc994997c83047e0be484d35fd92faba9765bb1d438491 RLBA-2022:3936 new packages: iptables Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.7-28.el9.i686.rpm edd044846cecb5042ede940cb7b6ce30323e7f327095815f92805e7a02860b3b iptables-devel-1.8.7-28.el9.x86_64.rpm 90275a2808592a9f22a4b79bef9a94a5803f714e74be4a2fab31fa83f96ac2d9 iptables-nft-services-1.8.7-28.el9.noarch.rpm 61bcdf76a56ee6a3f0fe7e2547db4d6b005657c4f52995fe1ddbfe7a779c785a RLBA-2022:3961 new packages: libsolv Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsolv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-solv-0.7.20-2.el9.x86_64.rpm 959cc13b207a84f8c372673527018b14320d78f623ffcecedbf30770321501dc RLBA-2022:3963 new packages: audit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms audit-libs-devel-3.0.7-101.el9_0.2.i686.rpm f279d40edbacb05edf3464d4408fd1e7b35da24e64d243387cdacb794618f02e audit-libs-devel-3.0.7-101.el9_0.2.x86_64.rpm e4e89932e8685239613b81cd0272642e220aaea116d00c09a54b1826f2518234 python3-audit-3.0.7-101.el9_0.2.x86_64.rpm 56655399426f0a1004b9444f6338153513fc38ac215f9bb53a01ec8ed888e0e6 RLBA-2022:3972 new packages: lvm2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.14-4.el9.noarch.rpm 6d2269b1abbc9579fb5d5076b64c730c22c378689f68c9e3f1bcbcc6dbb18604 lvm2-lockd-2.03.14-4.el9.x86_64.rpm 8b0ee2b82761d4ede1aa810d3add9347c6c9583cc3dee72749e52ea99e52a038 RLBA-2022:3993 new packages: firewalld Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms firewall-applet-1.0.0-4.el9.noarch.rpm e5e5e32698089d12a3a526440534a18bbd762727614e21a755322ffa7c48b261 firewall-config-1.0.0-4.el9.noarch.rpm 776fafc691108cf3f67086d372b923ab0b63e6ec1aaba010f3647a6a5f111385 RLBA-2022:3995 new packages: elfutils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.186-1.el9.x86_64.rpm dce24fdc2dd72d684db0c71845c029b862532cc9d4ec7cc365b1dd17423d9bd4 elfutils-debuginfod-client-devel-0.186-1.el9.i686.rpm ed10fdf0eef09a22e279687eaf5737f6acace04c8416a329621e2b435cd252fe elfutils-debuginfod-client-devel-0.186-1.el9.x86_64.rpm ff81dd90bf9addeaf50d24b2c3a44f07b8566828d9ccfaa529cba9fcbcc5736c elfutils-devel-0.186-1.el9.i686.rpm 559cfffe9857c3b292a31a742951331ef91e9ba5beacfef28729f4f7406d3a24 elfutils-devel-0.186-1.el9.x86_64.rpm bf8e160cc2784b85152ad257d382af428c2ce3705eb47e74874d8ee1f8d5ad96 elfutils-libelf-devel-0.186-1.el9.i686.rpm f87b7e2655dac20cbfd698eaaea3b52c4b0d8b0d2d62b01eadd4ea24511bebc1 elfutils-libelf-devel-0.186-1.el9.x86_64.rpm 45c1a35b889b4a4c2e9916cea63235f68a25cb356601b1941805f97f6bfea02a RLBA-2022:3998 new packages: ndctl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ndctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms daxctl-71.1-6.el9.x86_64.rpm 97705921968242c61434c12cd10c9e5335b5a0e51ea04ada4e427611ecd695c1 daxctl-devel-71.1-6.el9.i686.rpm 16254f0801b2add6142432d2035d78e4f0a9370f288403b839bc126435dcac29 daxctl-devel-71.1-6.el9.x86_64.rpm a0e61ee6057a480287606d45b47e59c649bf6ef3249ffa46d22a9c54816b5eb8 ndctl-devel-71.1-6.el9.i686.rpm 1bf5942710d302d2b3f22f51b56bd001aaf24f4a6f7c82c9238d1362a27dc49f ndctl-devel-71.1-6.el9.x86_64.rpm 1d5db560b7828e9c9713439e9e9474d729dfecf48c598eaafd3fdd65e2178ebc RLBA-2022:4000 new packages: tuned Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tuned-gtk-2.18.0-1.el9.noarch.rpm 797c55cdf289875ae52078df71af240eac49598dc31c0e570d39e877f9c6ef7a tuned-profiles-atomic-2.18.0-1.el9.noarch.rpm ddb5615e338a7e47396aa045ef8818239a5babb88734b48bd795f8f0cff7207d tuned-profiles-mssql-2.18.0-1.el9.noarch.rpm 554e35b45a5bb7b55d353315505084f2ed1afb8a774330e2b91cd62eada55fa1 tuned-profiles-oracle-2.18.0-1.el9.noarch.rpm 154757635ed08a0a4725465a0df6fae9d6b41fc4c6a302e6d80887f8d760f8c0 tuned-profiles-spectrumscale-2.18.0-1.el9.noarch.rpm df48f10aea73a0ac5c5e2f11361105b0478ad4178a82949dee85b2eb02913a49 tuned-utils-2.18.0-1.el9.noarch.rpm 6c7e91551314f1102b849c623b0b33e895e082ddf5288078af9a5eaaa1b96ff0 RLBA-2022:4017 new packages: bluez Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bluez-cups-5.56-8.el9.x86_64.rpm ffeaed6329a42c644bf4784d4b6c9b8b8be279b2e0a2c35c06ccdfdc1e649a8c bluez-obexd-5.56-8.el9.x86_64.rpm 3b437799404440aceb8883ba06ad1baf368575673b2b19e55b6d459269c62a22 RLBA-2022:4028 new packages: nfs-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nfs-utils-coreos-2.5.4-10.el9.x86_64.rpm 6e9b28005d4ff416259a3d3e83ae3077cfa5ea2d3953ee11ceb683cd66a59908 RLBA-2022:4082 new packages: util-linux Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-3.el9.i686.rpm 7d872cf221c680efc24a724d10cddb8cfaefd840c74a018de5bfb99793f68cf8 libblkid-devel-2.37.4-3.el9.x86_64.rpm d6602748b90f677612df7c6e526ac983456fa32fb1d414879c7e86a656d56a91 libmount-devel-2.37.4-3.el9.i686.rpm 98d20d08ead5771143a090f5c45319be46ba4786abae0a1d45741834dfee43a0 libmount-devel-2.37.4-3.el9.x86_64.rpm ddaeac502117112e19739b1fd75256ad864c79aedd819f469db5885acb2477ee libuuid-devel-2.37.4-3.el9.i686.rpm f31faae0bd656923b2fe54372c45654ad8429c98e9b9fe3f696f365b394c7c0b libuuid-devel-2.37.4-3.el9.x86_64.rpm be03ee660679ea532054db411ad5a3a48d4a3619d801f83b0ba4765d93d86dce python3-libmount-2.37.4-3.el9.x86_64.rpm 6976f10da2cb1ac45ddb3883bb2832eaab3ab4bb7b7a9de9168294c372ef83cc uuidd-2.37.4-3.el9.x86_64.rpm 76428aec0bd820a4fc421f06257f7198e648cb8ba3abecfff212b9314985d394 RLBA-2022:4090 new packages: authselect Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for authselect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms authselect-compat-1.2.3-7.el9.x86_64.rpm bee33ad41157da1d683faccdbe8d20c95ed5b3e8e738978eec0343e4b86db84e RLBA-2022:4107 new packages: dbus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-daemon-1.12.20-5.el9.x86_64.rpm f0f325b6d9a0f91d38e9211cc59ecc187f4ea564b678d6318234d5a47ca06b59 dbus-devel-1.12.20-5.el9.i686.rpm 645c85ace3a88e0da960d63eb71e19d8072ff2b74b4d2eafd41c29a0c8f23515 dbus-devel-1.12.20-5.el9.x86_64.rpm dd7516488d946c468c20868f07ae2ba082c1522ef00595979c6914b7b161b9c0 dbus-x11-1.12.20-5.el9.x86_64.rpm ae54adda84b16c80ca0252eee33d64256b33a09abc36380498e4acef15c10c24 RLBA-2022:4144 new packages: iputils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-7.el9.x86_64.rpm 2b977e9c114dee4b04fb8a9f0ad881ba4ab4b05b74e15f87c074cd37c50eef2a RLBA-2022:4184 new packages: libtasn1 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtasn1-devel-4.16.0-7.el9.i686.rpm b4a12d69b944ac53999d321413c2f8e78f0e4a7bc4d0bf6f8e62696c0478679f libtasn1-devel-4.16.0-7.el9.x86_64.rpm 083947d1e6c999292b9d786ad3b656f9606b7ca6a241b00b0cfe388ffa4fc35f libtasn1-tools-4.16.0-7.el9.x86_64.rpm c5ef71fb72d64ae2fbbcc2c52b6201faf102b197d86a7ade1c296f3956cf2726 RLBA-2022:4245 new packages: pygobject3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pygobject3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-gobject-3.40.1-5.el9.x86_64.rpm 9dc45c0fb1655c95c5a457069c3d8ba9e2fac360fbcece26bdfadc2e4f006b98 RLBA-2022:4269 new packages: sqlite Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sqlite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sqlite-3.34.1-5.el9.i686.rpm b60b17734e7e2cb91fc44ccb900f38d33483b5334f21545e141edb0d3e4faeba sqlite-3.34.1-5.el9.x86_64.rpm 278720ab7dd9d1d051a7d6dd96431a45a781230ffacfa3d358c2b8b81cfb234a sqlite-devel-3.34.1-5.el9.i686.rpm 7c52d9a89c63ec3d5d9e04e92b2ac0ad12ce760959e86a975b15f2e2b71e1faf sqlite-devel-3.34.1-5.el9.x86_64.rpm ab3bcea5c6d74fb90e20aedd32606c4d9a483dea18ad10ea2be002d052ce4550 RLBA-2022:4271 new packages: sudo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-7.el9.x86_64.rpm 825b3a7506ae3424f98aa56a1f79251a7032808a5fbdc5ddb551e9dae6e93e0a sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm 3c51c1e16d0fb0f70feb41a7bea3b9e142e87aca3aca6e552e75befd4761280a RLSA-2022:4990 Important: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: authorization bypass when using "local" authorization (CVE-2022-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-13.el9_0.1.x86_64.rpm ee54d0856aa9157437cad30e31480799b02ef83b960de0e968e752a4486e8194 cups-client-2.3.3op2-13.el9_0.1.x86_64.rpm ad1d37c3cfaabf43041c1597b702b2f8d47c1169388552b24274845fb7b0df91 cups-devel-2.3.3op2-13.el9_0.1.i686.rpm 0b1bc55dc61220a8c8864302f36213532900ab84deb6dba77ffb3d311f3a2268 cups-devel-2.3.3op2-13.el9_0.1.x86_64.rpm caa31783a2770fc4c0730b256aa66f671ff4b16c7f988c4f5462d883192608bf cups-filesystem-2.3.3op2-13.el9_0.1.noarch.rpm 24d7b252f37861c66c75960b675f8567afac6debd8c22e2550e49735aa9f1b2a cups-ipptool-2.3.3op2-13.el9_0.1.x86_64.rpm fd151a8071b6ee25852125644a2af6e6433fc53c1e01ea4062faf209f0d89cde cups-lpd-2.3.3op2-13.el9_0.1.x86_64.rpm 9744acf38443b619e2592a76060e70e074e4b3d6ad25e0e5245c4bc31943c884 cups-printerapp-2.3.3op2-13.el9_0.1.x86_64.rpm 4a4ebcdcb0c02f1e721b6520cd2a361d4ee050e45892983802bde061d83e5f5c RLBA-2022:5247 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * PAM Kerberos authentication incorrectly fails with a clock skew error (BZ#2079301) * /etc/samba/smbusers erroneously applies unix group memberships to user account entries (BZ#2079302) * samba.conf's force user issue when the user only exist in the active directory and not locally (BZ#2079305) rocky-linux-9-x86-64-appstream-rpms samba-client-4.15.5-108.el9_0.x86_64.rpm 8d4ba033de71183854f348826db8d58a0f79db94c9f1c8cc66a1a35027aa0de9 samba-krb5-printing-4.15.5-108.el9_0.x86_64.rpm fdb98bd343a25621670d6df5b721559ee91ead06bc2a866d4301cadb9ba765f1 samba-vfs-iouring-4.15.5-108.el9_0.x86_64.rpm 9505a32bfa4482ea9a162b26dbedcb7348560dfc540e42ec01f98bc700bb335c samba-winbind-clients-4.15.5-108.el9_0.x86_64.rpm a11b86af58d4f64b232edec8c32322b04e6d67c0a5ede92a9a2906d155f0e191 samba-winbind-krb5-locator-4.15.5-108.el9_0.x86_64.rpm e4dc3b8b1ade25fe33016b9b8bf986db51fc1a67d7a98280c55ed72c5fd8cd6c samba-winexe-4.15.5-108.el9_0.x86_64.rpm e26697edfee6290d782d5e12b2704a50ec6fd28e78bda201493e0b9261587126 RLSA-2022:5250 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-1.el9_0.1.i686.rpm ef15fd7b046dfa16b27132a3712c99d55497cde9c193607ba22b8e90bf561e90 libxml2-devel-2.9.13-1.el9_0.1.x86_64.rpm 391a89d2dc668e96be2ae14f9efb8a95f0af0c7702a993f9c2b5a3094c150ca0 RLSA-2022:5251 Moderate: pcre2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pcre2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) * pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c (CVE-2022-1587) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcre2-devel-10.37-5.el9_0.i686.rpm f0f9b8a5c753b290bdcffbc75708a35e7666d19b9b1283979d6afeddc777ce9a pcre2-devel-10.37-5.el9_0.x86_64.rpm 5eafd829509f47ca9b416a0a55c18afcc901e837bec1592b9f0d5a15ca3875cf pcre2-utf16-10.37-5.el9_0.i686.rpm 3a7a3e23ca684fbe3688ae6435c6a1bd8b355e7e1b00aabaa95319c002f9eb97 pcre2-utf16-10.37-5.el9_0.x86_64.rpm 75dafc7573d9043b86d7717a0d392b00da07d8bf6e1eef0d4902b74191ad9363 pcre2-utf32-10.37-5.el9_0.i686.rpm 596579a04fc174a90ce8bcbe27f291704cc33b15b4665c34b8eda5d599052f44 pcre2-utf32-10.37-5.el9_0.x86_64.rpm 4ff058acbafffd6059f8ff607bae7e5e9d3faba1f9d8ae6d30ac99e4c9da4dac RLSA-2022:5252 Moderate: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libarchive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: an out-of-bounds read via the component zipx_lzma_alone_init (CVE-2022-26280) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bsdtar-3.5.3-2.el9_0.x86_64.rpm 5b4b61f05a40d4d78800d1b3c9d6b9e7daa92accfbe83aea2b64ee9f2c1636e4 RLBA-2022:5255 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager 1.36.0 loses DHCP lease and doesn't try again (BZ#2094715) * IP assigned through DHCP became secondary IP address (BZ#2094778) rocky-linux-9-x86-64-appstream-rpms NetworkManager-cloud-setup-1.36.0-5.el9_0.x86_64.rpm bd3ce08427d0888d2d2d9d909b85ac65adc218e79cb9b83d4fa3c17b2af3cf6f NetworkManager-config-connectivity-redhat-1.36.0-5.el9_0.noarch.rpm 2238897a2eb071aee7a6a754ad172a7c22e25798bc5dcb7d8cd7fb76e1361f09 NetworkManager-dispatcher-routing-rules-1.36.0-5.el9_0.noarch.rpm 386a5933590c5c534847a1fed2c3b1745d72776290388e5cec8fc54534c158f3 NetworkManager-ovs-1.36.0-5.el9_0.x86_64.rpm 6ad5f463097d51760ea40b6aed85aaec2ac36135e40038d7ae2b1c0d5d5146ac NetworkManager-ppp-1.36.0-5.el9_0.x86_64.rpm 4671f544fb165e9df0c48e9b7e1d73e700f0f1a2266b4d43c46555674537a728 RLBA-2022:6150 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * Insights-client is producing lots of AVC when run on Rocky Linux 9 (BZ#2106147) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.29-1.el9_0.2.noarch.rpm f09efc8abf36fd6b69e32ba2e88e221c8a4e77ba12a7ee4486c9d3021178a53d RLSA-2022:6157 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP compression denial of service (CVE-2022-32206) * curl: Unpreserved file permissions (CVE-2022-32207) * curl: FTP-KRB bad message verification (CVE-2022-32208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libcurl-devel-7.76.1-14.el9_0.5.i686.rpm f6ff1f26b1413b49482e77b562c2392f0dab7fd46d8889fe391fb5773f892308 libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm 6ca1fde15768528667f7b1cc32969469979456fbed3462933b1aa119c5545bfb RLSA-2022:6181 Important: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-9.el9_0.2.noarch.rpm 24aac731a966a490230f03358ce93bcb08f9082d48954d519723c18b502f8ff0 RLBA-2022:6598 openssh bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix: The "scp" utility previously changed from the Secure copy protocol (SCP) to the more secure SSH file transfer protocol (SFTP). Consequently, copying a file from a location to the same location erased file content. This update fixes the problem for the following syntaxes: * scp /myfile localhost:/myfile * scp localhost:~/myfile ~/myfile This problem persists for the following syntax: * scp localhost:/myfile localhost:/myfile (BZ#2108409) rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-10.el9_0.x86_64.rpm aa0f7cfac336f1faa31be2765565a3b64e944f80d1ce2feb7144beba9db3e85d pam_ssh_agent_auth-0.10.4-4.10.el9_0.x86_64.rpm 012053d49bdf23aea5935847421804a39623321dcb03f130cd89208d9c4cdd27 RLBA-2022:6599 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Bug Fix(es) and Enhancement(s): * faillock command does not read faillock.conf option (BZ#2112888) rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-9.el9_0.1.i686.rpm e17b4faa940ed5e6933cebaa208c588b334a13b551fd99cd45fb4f9bfe53a22c pam-devel-1.5.1-9.el9_0.1.x86_64.rpm d2e2b73e0b2048d09e459510875d2828165594abf8571a4e9ce2732a0f3b1fb4 pam-docs-1.5.1-9.el9_0.1.x86_64.rpm 86e7b7b4b0e55d7a990999968c7459b951f9d194be664ec83c0a00992f0f9106 RLBA-2022:6603 openldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es) and Enhancement(s): * OpenLDAP pulls in systemd in the minimal installation (BZ#2116520) * Rebase OpenLDAP in Rocky Linux 9.1 (BZ#2117752) rocky-linux-9-x86-64-appstream-rpms openldap-devel-2.6.2-1.el9_0.i686.rpm eba98a638493858a584e43247d1d29a8e80a59438c6bd55506ef03ae12fd8b85 openldap-devel-2.6.2-1.el9_0.x86_64.rpm ceff8cb49fa8f459aa6f4a6eeb0a170cc605d149c51c52ab399aa9d43aaa7757 RLBA-2022:6604 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * [INTEL 9.0 BUG] [VROC] Reboot hanged after OS installation with XFS filesystem (BZ#2087677) rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-6.el9_0.1.i686.rpm ed3527736f64b0a274e98ac354aacef6456de03f20333e6a2b6d67ab20d677e5 systemd-devel-250-6.el9_0.1.x86_64.rpm 9a1b1d8cce34b3fe439642074a8e38bd9db85893948c1084d8747612205d5aa4 systemd-journal-remote-250-6.el9_0.1.x86_64.rpm 2ef1d6942775dbb6188a4606b25cc9e24f99814011a8e23f710bc1d10ea0967c RLBA-2022:6605 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. * glibc: Incorrect results of POWER9-optimized strncpy (BZ#2095450) * glibc: Backport __rseq_* symbols from glibc 2.35 (BZ#2115828) rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-28.el9_0.2.i686.rpm 8bb7b394a31221bce6ff539660eb5e8e8cc2086c5c8a79e065d86fa4e4b1a14f glibc-devel-2.34-28.el9_0.2.x86_64.rpm 75c3f456ec041d1d52e88eaa367786072e2400388243b9d28f2a6a0e2d766e89 glibc-doc-2.34-28.el9_0.2.noarch.rpm 9d11b1ba2af38ec99e39c6b456c231899c73422233deefbd2a2d0f6c0b5816e0 glibc-headers-2.34-28.el9_0.2.x86_64.rpm bd89a186d17679d2d445b9f137368de85acf6ac2a3606219a15848aa4782f703 glibc-locale-source-2.34-28.el9_0.2.x86_64.rpm 2443d95158112e0365fedb3a3d7926b0231007dff05818c72ee273ec574d5d2f glibc-utils-2.34-28.el9_0.2.x86_64.rpm a7c0107131efbed4c7556ae3335d545c381ebf9205dad909164533d089da9035 RLSA-2022:6838 Important: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.2.10-12.el9_0.3.i686.rpm cd3b103ab71201927a60b21cf7763b7eaafb10b0d8c690cedeafaeec5bafa4a1 expat-devel-2.2.10-12.el9_0.3.x86_64.rpm 6ef4c315e1f18b5d509cafb75ee61bd2c2f7ba62349f7b1e9d2797cfc9071976 RLSA-2022:7314 Moderate: zlib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for zlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms zlib-devel-1.2.11-32.el9_0.i686.rpm 1c7eec88d3d7e53ad2084a98e2892a116e24d495a27515974f6a3b3d2a458a26 zlib-devel-1.2.11-32.el9_0.x86_64.rpm f00b4cf2b1f9700e406a0884d685550b822a5fed2fce8809456213e7ec9c80f2 RLSA-2022:7318 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585) * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653) * execve exit tracepoint not called (BZ#2106661) * Matrox black screen on VGA output on some systems. (BZ#2112017) * The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129) * watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857) * Update cifs to 5.16 (BZ#2127858) * Bad page state in process qemu-kvm pfn:68a74600 (BZ#2127859) * vfio zero page mappings fail after 2M instances (BZ#2128791) * The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970) Enhancement(s): * Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129453) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm d48de17dcf61ee687d07ed4652243cacb59fa645cfc9006d69d76871e66b0183 kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm ac9e8501f1a4a3988b09f583e667740206106ec706530f010c563b7a43f915be kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm 4448682e13b9d79413903692c69a8f178aed2a4515a6d690982a7489fc8a36ae kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm d032e48b6650c9858aeb69cfadacf78f94a9e3d9b1a744d332dd50463ed78568 kernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm c324897e0fe3e3b77884ca4b66ebc62b3a56f5886607781e5d00f99575184563 kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm e1dc2066beaaa614c96362ae63abcef47b9ee52207c3b34f21f92c7d7c65ff80 perf-5.14.0-70.30.1.el9_0.x86_64.rpm e88e0ac29c1429e73e927c05af72c47a059d55f90afdab9c14440968ccfcf0d7 RLBA-2022:7321 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Bug Fix(es) and Enhancement(s): * Login fails with "This web browser is too old" with upcoming Firefox and Chromium browsers. (BZ#2129056) rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-264.2-1.el9_0.noarch.rpm 07cbb5803fcdefa49f0ac720e6a20aafa4a3709757acb0cf3e83c076097bbf43 cockpit-pcp-264.2-1.el9_0.x86_64.rpm 31741f7b861d7929f038c3fe22208563750dc93e73da5900f3a00b0930d1bc76 cockpit-storaged-264.2-1.el9_0.noarch.rpm 43366ebc9869313e810d8c7cfa434661b20088356efea24bbff3143eec52d330 RLBA-2022:7322 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124603) rocky-linux-9-x86-64-appstream-rpms rpm-apidocs-4.16.1.3-12.el9_0.1.noarch.rpm 50ad53a724227293c7bc3a1db31f5a529ca9518516353d7cb6e438a674945407 rpm-build-4.16.1.3-12.el9_0.1.x86_64.rpm 5f396fdf40ee3eb8f0876d20943ce56751f6adbcaf11c181105c0ef5ee3e2391 rpm-cron-4.16.1.3-12.el9_0.1.noarch.rpm 5eff50744be4a4a0f2115aa33385f78488a47cbe264e4b4aba6877d3711bfe63 rpm-devel-4.16.1.3-12.el9_0.1.i686.rpm 475b90c492344022ca7ef3b75ef02b0b54d9a3fa1e35a9d76ff7024bda885ffe rpm-devel-4.16.1.3-12.el9_0.1.x86_64.rpm adf04ad68aae60e08f4ecf3f59bf6ac232940a296865cfe98dcc421e8e826e7f rpm-plugin-fapolicyd-4.16.1.3-12.el9_0.1.x86_64.rpm d827a69786e956bc0ce19c1e5cc77f1df612da441a352f6f51f0dc43435fab0d rpm-plugin-ima-4.16.1.3-12.el9_0.1.x86_64.rpm d2788db9cc9d631313f16c50eb70acb8308cd111f794b199e656c8c7ea526508 rpm-plugin-syslog-4.16.1.3-12.el9_0.1.x86_64.rpm 5a54558af520232676e0a1a002939f4ec334f8ea2d8f447fbe746c3675276cec rpm-plugin-systemd-inhibit-4.16.1.3-12.el9_0.1.x86_64.rpm 49e39d1beb7c202170f6d5de8caefef7ef8243f79261140203466dbab28eb0f1 RLSA-2022:7323 Moderate: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.10-3.el9_0.i686.rpm 87ce0f7dccf5c1ca01979df95949b75ab7e77fd96b5bbdbaf1b72e7182459c44 python3-devel-3.9.10-3.el9_0.x86_64.rpm 9269432164d049f44e37882a99fc53b8567ca71b3506e6712cf5db7847996c59 python3-tkinter-3.9.10-3.el9_0.x86_64.rpm 36f78893310df4c321bc4bd8a1a1c962312aa4c553875e84a3043ac8bc3fc597 python-unversioned-command-3.9.10-3.el9_0.noarch.rpm a151170fcabcc8eaf38ed871d741a75388eeccf6063a9b7b5eb0289cb5ede468 RLBA-2022:8499 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-9-x86-64-appstream-rpms tzdata-java-2022f-1.el9_0.noarch.rpm 70571d1a7150ad2243e4fde1a8cde3212f8639b272e663d385883efcc15d8fdb RLBA-2022:2306 new packages: cockpit-podman Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-podman-43-1.el9_0.noarch.rpm 53f5008bbb4930a4dbaf70cbbc90d03e13058d32d72fcaf89c1db45d4fc58c70 RLBA-2022:2310 new packages: frr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for frr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms frr-8.0-5.el9.x86_64.rpm 1cf19708005c8f340a2c92b083657d2fb4cb7081fdd4dae90bc55b8edd50447c RLBA-2022:2313 new packages: qt5-qtdeclarative Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtdeclarative-5.15.2-10.el9.i686.rpm 89c3daaf3d616ac7a820528125942b4834ba83696266d691047a065bd469b333 qt5-qtdeclarative-5.15.2-10.el9.x86_64.rpm b7ec96c3f94a112bbc0e03dbf15ff472c2e1af1eabe58d8ed41e868a5ca7b0d0 qt5-qtdeclarative-devel-5.15.2-10.el9.i686.rpm bfd1769f46a2b2d8c8c96c2bbe4bee6afad33bb4c3fea7102055d02937fc56e1 qt5-qtdeclarative-devel-5.15.2-10.el9.x86_64.rpm 92ada25419ab90dbc460e2873021104410e6c6f755bf2cb5b4e5eed8dd838bfe qt5-qtdeclarative-examples-5.15.2-10.el9.x86_64.rpm cc3c59ab2cddd8330a3653f5289f236e98b20c89af866711abfd54619befcbe9 RLBA-2022:2314 new packages: qt5-qtbase Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtbase-5.15.2-29.el9.i686.rpm 8a1ab27161448d0d87519cec7d4c5dc19df09e4f931baf259afc6b28a1980e3b qt5-qtbase-5.15.2-29.el9.x86_64.rpm 9133c18df09f197f80bf9b2d52d58be01d8f62806c9a34c64dda85556bacfb4c qt5-qtbase-common-5.15.2-29.el9.noarch.rpm 636591d4473bdf52c7edbef81f9316c8bfd4e44cb41344c8aae25bddfe635ad7 qt5-qtbase-devel-5.15.2-29.el9.i686.rpm 0ae20d00557e13ef1f8a5469f923127e0277fc143fe59ab16f9e9d73fa8e5539 qt5-qtbase-devel-5.15.2-29.el9.x86_64.rpm 286c6d8c831ef03b7a5fe4796f72d8a9ecb299b7f9d3c7ea5a95ea17610e8cef qt5-qtbase-examples-5.15.2-29.el9.i686.rpm eb370447e6359137723949dce42fff94859a97466557bedfd49b7ec84f266094 qt5-qtbase-examples-5.15.2-29.el9.x86_64.rpm 544dc730129b57a9969ba604e62dbd29a26d716c3902e40dc8d1a2d1d6795a67 qt5-qtbase-gui-5.15.2-29.el9.i686.rpm 759eb1433738df30202ed7a083c70f77bb58ec4f0bc96176f4e908c7a9b8153c qt5-qtbase-gui-5.15.2-29.el9.x86_64.rpm 33dd5636a6c7f8f4a36e3c2becbf89be1dec249b8d1567165a04001fafa98160 qt5-qtbase-mysql-5.15.2-29.el9.i686.rpm b27700d7b809ab0c8463c16c110570c6de0362fb0965ad85777a9594a1e3dfc8 qt5-qtbase-mysql-5.15.2-29.el9.x86_64.rpm b41aa9545cc825fa514f13b8903e717d5c038963ee13cda1ae741d9be7acb536 qt5-qtbase-odbc-5.15.2-29.el9.i686.rpm 7f142f9b16422a7a46ada61790ebc2b00e4a5372b0be7399350628dc285ca7d9 qt5-qtbase-odbc-5.15.2-29.el9.x86_64.rpm d00197a17fd02f99530c33fe8aea33fffca8bbcb3a78f6151192aaee44490270 qt5-qtbase-postgresql-5.15.2-29.el9.i686.rpm 5bd92a7ee14f69be4f879aa6d055c595388a1380e90089504cca1d3e427492ba qt5-qtbase-postgresql-5.15.2-29.el9.x86_64.rpm 4f68d79fef27e0ac02ac498f9a8efb0ea769a6622c67b74356c895b5c3d2e5d6 qt5-qtbase-private-devel-5.15.2-29.el9.i686.rpm 226dc57202c71def3ad4bb42a113472eb6a116aa9a3c32ae3c68d6434521645f qt5-qtbase-private-devel-5.15.2-29.el9.x86_64.rpm 750d722385995ff31b6accff750ff656891c11b22270a4f49e264494df849c55 RLBA-2022:2315 new packages: qt5-qtsensors Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtsensors-5.15.2-7.el9.i686.rpm 27306d01dcb47f78d59e8e10308d4ecb16804cd7cf8059985b468c46c5c9e920 qt5-qtsensors-5.15.2-7.el9.x86_64.rpm 0f10177821b11fe419e1a02d7984e98a5c1eee8253121e638fc38c970114d4eb qt5-qtsensors-devel-5.15.2-7.el9.i686.rpm 486659c19a5f6cf9477be8fdc4cd611d1f53a54d9d23f6cfef066724b935b093 qt5-qtsensors-devel-5.15.2-7.el9.x86_64.rpm d57d4b6816546d7becede728a3a878e79229a9d2453561d897e577f4c19fab4f qt5-qtsensors-examples-5.15.2-7.el9.x86_64.rpm b38f700eca85848c2579a390c3a51db7f6dec8e41413b109f1e3507ef10bb63b RLBA-2022:2324 new packages: httpd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.51-7.el9_0.x86_64.rpm 88b708d822653e4f43b22ed868579f5c85ad4c3679f6ac3b23184163b834777b httpd-devel-2.4.51-7.el9_0.x86_64.rpm bdc7ab926d66e7291626eb0d6c04452ab02f35bb370bb22163f3eeeca289d912 httpd-filesystem-2.4.51-7.el9_0.noarch.rpm c5649da117a9a7a508b46a0f1fbc23b8e84eabc28857678dc910b22afbaef248 httpd-manual-2.4.51-7.el9_0.noarch.rpm d6b341f5d399a551e0acf01ac75a0d5166af39929da40eabf5187092e905216c httpd-tools-2.4.51-7.el9_0.x86_64.rpm be8ababde1bccaa52ac746e5ea7a206e749897c864004a054e2c5a0a25e787c9 mod_ldap-2.4.51-7.el9_0.x86_64.rpm e5345f702e189c5c1644e18f8c093b0a3eb6d1033c3014f40ff49fcf5e6cfbc8 mod_lua-2.4.51-7.el9_0.x86_64.rpm e779486d0e8134d769ab6f272fba39812c6e63285001c33356cdf8eb4e6b943e mod_proxy_html-2.4.51-7.el9_0.x86_64.rpm 12df2ea51c1c8950b1ba4252ca6ae4328948d33ebb21db9defec859094b1d1fa mod_session-2.4.51-7.el9_0.x86_64.rpm 74392699a01e4cb67d2ae1b0308fa76199a70160c1c736e9509facd8801dc66e mod_ssl-2.4.51-7.el9_0.x86_64.rpm 0313c37b85071f8a31042b6a1c1fccc417934bbd936f18047144ce9d768ec4a4 RLBA-2022:2327 new packages: 389-ds-base Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.0.14-1.el9.x86_64.rpm f844a066785b5a094caac6e520376fab8ccca5b2a4692279fb7573cfe1ef8ba9 389-ds-base-libs-2.0.14-1.el9.x86_64.rpm 77c3dd9c02dcdd048f444f13b940a0bcd0cbe8b119603a6e5a15048d796953ee python3-lib389-2.0.14-1.el9.noarch.rpm 9dd706f2cee70049b428e649f0c819c8f02f53023b82bca5021e42c107184ee7 RLBA-2022:2330 new packages: gnome-software Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-software-41.4-1.el9.x86_64.rpm 3b35a3b8661e0280829a1c067ccd527efe53949943bb407153198730396137b1 RLBA-2022:2341 new packages: evince Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evince. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evince-40.4-4.el9.x86_64.rpm 3253e5e0176e964312346648c379f65f8f7acc89b4f7af114c3cdd96ee50eb05 evince-libs-40.4-4.el9.i686.rpm c9f2035d47177ee6733814361f37d550bc1c6355f20a2486d356755f430bf660 evince-libs-40.4-4.el9.x86_64.rpm a43bdfed677300a82f6fcabe776d9010efa4dbb52cce33a5d30f23188e7eb7d0 evince-nautilus-40.4-4.el9.x86_64.rpm 5df9207c5cc26d4fbec04a9f63a3bba37e590d9e854032d74dfde2cbac680fd3 evince-previewer-40.4-4.el9.x86_64.rpm 54be9fab82cc64f5113a04d2c0989b8df78fdd96adafc1e076c13616d5634b84 evince-thumbnailer-40.4-4.el9.x86_64.rpm 42b011ffd6e13ce78f756310eeed23acab8374dff48b9195a3725cdbccd2b0f5 RLBA-2022:2334 new packages: flatpak Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.5-2.el9_0.x86_64.rpm 51236c776c99fd34cb2122dc33caa4dc4855f4fe9191844b886371d5702eb3c9 flatpak-libs-1.12.5-2.el9_0.i686.rpm 0f29186ddaf52cb592f10cb62e0f574557b3357be390842b636554d6726ef417 flatpak-libs-1.12.5-2.el9_0.x86_64.rpm 5595e698fe25af3c4bf8cba1aa30111356e1508767b532e3634f1da206d36a75 flatpak-selinux-1.12.5-2.el9_0.noarch.rpm 4daa5e1b8b10247cf86a46ad9b698d2729cf1420d4a6f7502106efb7dc356fa5 flatpak-session-helper-1.12.5-2.el9_0.x86_64.rpm 62001fc4c00370240c08153fa20d6c5b5d42a60420b5169a49d56074a7893325 RLEA-2022:2339 new packages: ansible-collection-microsoft-sql Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-microsoft-sql-1.1.1-3.el9_0.noarch.rpm 0502fd6a34c292d602b014f5c9251519a148133a92ba4352a8cf1a424cbdc206 RLBA-2022:2340 new packages: gnome-shell-extensions Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-classic-session-40.6-1.el9.noarch.rpm ab70f6e3eb5a6be436d6e41ff2ca9237b0de0596911bb1421682bab4994bc79a gnome-shell-extension-apps-menu-40.6-1.el9.noarch.rpm a247a264760ef5c4f041e7d46833925b059fdc3c54ae05d972d21450e134153b gnome-shell-extension-auto-move-windows-40.6-1.el9.noarch.rpm 53611f58ae3563652edc70c81dcf9f8a10258645ab37ff8d6ae77492f94b4ac2 gnome-shell-extension-classification-banner-40.6-1.el9.noarch.rpm 3b561f38c664ad21ba26c86f8b458d7918be18713409160e2c01d7201a7031eb gnome-shell-extension-common-40.6-1.el9.noarch.rpm 67c3f416d7c38002837847af828f975ffe50f483223198d24984e0efac01220f gnome-shell-extension-dash-to-dock-40.6-1.el9.noarch.rpm 3f787184f1aeea305c2acfdec82c429a7395ad355b163201f406edccc7c32b05 gnome-shell-extension-desktop-icons-40.6-1.el9.noarch.rpm 6ec397d88ebda79eb9470f8785d73b93f9940e5d8a5edeb7a41cb9291144f736 gnome-shell-extension-drive-menu-40.6-1.el9.noarch.rpm 6994f0a6cee9ccce82f441570672e6d2ca1a9b613d4ce6180bc2c3d6794f0cc9 gnome-shell-extension-gesture-inhibitor-40.6-1.el9.noarch.rpm 00d87e697b0bd629cd19235e0a3e7562451c4a51e51bc9b152fc82578ffd95bd gnome-shell-extension-heads-up-display-40.6-1.el9.noarch.rpm 4283ca4378bcd8095dbc75a3a13485309f5aa9001c65d59a2431f0864b88a24f gnome-shell-extension-launch-new-instance-40.6-1.el9.noarch.rpm e1eb67ca5072e3500641ce2f0af953ccf8ee65fd208abfad5662158e77d75ce4 gnome-shell-extension-native-window-placement-40.6-1.el9.noarch.rpm 2900a6f7f53e0bdf27909ef60be2ab8040bf788c4c0bf44caab8dc98b7e35e48 gnome-shell-extension-panel-favorites-40.6-1.el9.noarch.rpm d3589bdb74587d38990b4c8c4904d4bee420d844bfaf42a5e97d0f0bbdf9a66e gnome-shell-extension-places-menu-40.6-1.el9.noarch.rpm d84ff8048e007cdd82627b3acc660c3954b5db291e5187a17160acdec7bb40d4 gnome-shell-extension-screenshot-window-sizer-40.6-1.el9.noarch.rpm 2cac39b801dd152f82460b833fb89063b846d3983d69a2384874db1fc9303063 gnome-shell-extension-systemMonitor-40.6-1.el9.noarch.rpm 8e5c7cd73808bb53cb3abecdfa400744a07f3fa084ded3468bdc8432d2761a22 gnome-shell-extension-top-icons-40.6-1.el9.noarch.rpm 70738e0e4bb1d87cc8e67491a356e1a0c182320a29a479ae843f90e87dcc71da gnome-shell-extension-updates-dialog-40.6-1.el9.noarch.rpm 4100eb3e53cb3f6302b21b35903e8e9b54bd906d087a2e0de8314c10fa0626dc gnome-shell-extension-user-theme-40.6-1.el9.noarch.rpm f3646120f2f12d9a4682d5323a6934b4917eddf1b88310153caa8bc4ba703bc6 gnome-shell-extension-window-list-40.6-1.el9.noarch.rpm cefd758783c4e17123ae0c9330e49008430c310dc4c524da32c1d918d9607bc0 gnome-shell-extension-windowsNavigator-40.6-1.el9.noarch.rpm e2039a461112f16fa45b2707b5b77ae7ebf39bc6e17501f523ed6f62be7467a3 gnome-shell-extension-workspace-indicator-40.6-1.el9.noarch.rpm 01b5835e989fc83578a5cb67b38f490a50545aaee0c7f00c6092382eeb9db491 RLEA-2022:2342 new packages: annobin Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms annobin-10.54-2.el9.x86_64.rpm 8abb16f3b864dafb136b6377ad0f2734af4c5657693f8ee5d5156d91be0a500d annobin-annocheck-10.54-2.el9.i686.rpm 0cc30988fb23f20723188310a1769f77d5e3e1c5470975a347722cf831aee393 annobin-annocheck-10.54-2.el9.x86_64.rpm fbbeee262ca7fe059a4177dc8786b31e7d7462d35098f720c9f1939847f75bf0 RLBA-2022:2343 new packages: mutter Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mutter-40.9-1.el9.i686.rpm 2b440dc3a530b1b84f8f3d96f56bf1fb73cb17fa4ca323cf157d99961776c784 mutter-40.9-1.el9.x86_64.rpm cdaf22fc00ce75986205bfb5aaefbe62dde3b71069da1619e95f32fa66b688e9 mutter-40.9-10.el9_1.i686.rpm 4e3d16a73c4d923e5e9af5f5a8138cd682cfeb5ab527375cb3e3a323470ffac7 mutter-40.9-10.el9_1.x86_64.rpm 2d3b70879b9922cc48ca36a67b707aee6d8dcd283fffaf3c81104f9e9da621d7 RLBA-2022:2345 new packages: lorax Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-34.9.14-1.el9.x86_64.rpm 16ccb2137484932029275b6a1904b101203b91006927cfc5bfdec57cb414657a lorax-docs-34.9.14-1.el9.x86_64.rpm 53ec0f01397f07858bc805e5c3c9729c97e9ff5fa9e5f18fd31deeaf938bec3d lorax-lmc-novirt-34.9.14-1.el9.x86_64.rpm a4a1a47532999c2b7945c2a26aa2140de9a94f1d5933a6f3b9f00d9388221c57 lorax-lmc-virt-34.9.14-1.el9.x86_64.rpm a119bb953a0df5f3f26912ee4c7cef25ef2ad82cde5840300a457d1b225e5ac8 lorax-templates-generic-34.9.14-1.el9.x86_64.rpm 54bd29305ced43c3083cbead5bf02e9aadb28a7334be206141b8fa1aa1f34ff6 RLBA-2022:2350 new packages: python-podman Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-podman-4.0.0-1.el9.noarch.rpm 58d6c7f5b932020d10f79f570fa175fb60782aec7c299f5a3506b44c0b13519a RLBA-2022:2353 new packages: gnome-shell Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-shell-40.9-2.el9.x86_64.rpm 2628a0542288f306d08e9ac5eda179a1a06106a0d2ab5c212e6966579dece3d1 RLBA-2022:2359 new packages: containernetworking-plugins Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.0.1-3.el9.x86_64.rpm 1f7f7b7ca2f32633a83b9dfd8fdc3606db435ddcc14d63d7e976c7df17bbdf73 RLBA-2022:2360 new packages: checkpolicy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for checkpolicy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms checkpolicy-3.3-1.el9.x86_64.rpm 4c22eb9bfea6b9c9eaa9b4ab92b476259793e2a3b16e7d391fa6a5ce09a6e9e8 RLBA-2022:2361 new packages: container-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-tools-1-10.el9.noarch.rpm 63e3e95282fa1129756dd5df0bf2292c9bd25425b84b85c0adad09646a642573 RLBA-2022:2365 new packages: qt5-qtwayland Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwayland-5.15.2-15.el9.i686.rpm 9604bef7ae23d668bbd64711703c8800bb4d55617f9771b7aff1668396c0645d qt5-qtwayland-5.15.2-15.el9.x86_64.rpm 3e488f281759523716b3742e9e8baff3582888f70f4fd293b4927fbef739ef08 qt5-qtwayland-devel-5.15.2-15.el9.i686.rpm d51244c89792ff4bb2b070137666de600160dca0114694909d4721d55c2188f3 qt5-qtwayland-devel-5.15.2-15.el9.x86_64.rpm aa2241aaf623cd7b51c55ad69cc5dc6b2b27474ead80b5ac230fd6d1e36ef138 qt5-qtwayland-examples-5.15.2-15.el9.x86_64.rpm d4a0151af286f62814132cf5c0060756b73cdf8a9ca84fe67e1cc787a32c9c20 RLBA-2022:2370 new packages: pcp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcp-5.3.5-8.el9.x86_64.rpm 71aaa31b961997d12d9e2d86942a448bb72cf32d591a6443fc645920ad377c6b pcp-conf-5.3.5-8.el9.x86_64.rpm e941dee3c25097469dc0dc4d98dd59cd93428f6fa5f35f619a468473051f50ce pcp-devel-5.3.5-8.el9.i686.rpm 1b41f6fd79f31713f1a7f082cbd2371e2bc546830dbd3286a3162766d926cc8c pcp-devel-5.3.5-8.el9.x86_64.rpm 97d3cc09276b4ae400d8de54227c538e5c5a7deaf8646d3ce0c729e7790cee69 pcp-doc-5.3.5-8.el9.noarch.rpm a212e6f2264afde04393417cb6fca84df32c40993d70bda5f450e7c0c6620c54 pcp-export-pcp2elasticsearch-5.3.5-8.el9.x86_64.rpm 1221369a3071f1b1ea7448ca061add790b2c7353d4102b28a75027ca562774f4 pcp-export-pcp2graphite-5.3.5-8.el9.x86_64.rpm 918d58d3e2f4d3a3748959d206fc6ebbc689380170abb78fa53b4d8ad4d015d0 pcp-export-pcp2influxdb-5.3.5-8.el9.x86_64.rpm 265178a4aff5f2d80f1828e6f6867124c6b00bbdf708e105326c2a9142c87cf3 pcp-export-pcp2json-5.3.5-8.el9.x86_64.rpm 88f2c61cd7b09db90b756dd2d8fb796188340ddae23b2f9f8d7a5afdd6597fee pcp-export-pcp2spark-5.3.5-8.el9.x86_64.rpm 45d553023ac3f2ee228045f21736c35d3e82cd721901877d039340f235a903da pcp-export-pcp2xml-5.3.5-8.el9.x86_64.rpm 97923c1856c364e623eba83853d405133d01befebaa018848e7b5daac579437d pcp-export-pcp2zabbix-5.3.5-8.el9.x86_64.rpm bf1b6b475028bfa202995e8dedc080dcd43d0b3e3b27285e87d7b0552ce764f2 pcp-export-zabbix-agent-5.3.5-8.el9.x86_64.rpm 66a134d0f7bf0700f8c938bafeaa9b712d603a7f5e74c825d1bc1b4b00a96017 pcp-gui-5.3.5-8.el9.x86_64.rpm 325caafed2813390f067f0b899024318fb1594a38f2390b8e87ecffdf37e978a pcp-import-collectl2pcp-5.3.5-8.el9.x86_64.rpm 339b5072b66f693b96df508fda7127a7a6e96658c406d3631de6a9a3938ee9fb pcp-import-ganglia2pcp-5.3.5-8.el9.x86_64.rpm b467fdbe57ee014bb31450b585c8e9946f6e9f83193e035d80021722719018e5 pcp-import-iostat2pcp-5.3.5-8.el9.x86_64.rpm 50538a72a28e9f09789d550dd673e7f3c26ccfe5c11017b922227093927b96cf pcp-import-mrtg2pcp-5.3.5-8.el9.x86_64.rpm 8668713f32087c87cd0ed26294e0459ec0af5f5c02321e8fc1a980a80cf7b9ed pcp-import-sar2pcp-5.3.5-8.el9.x86_64.rpm 637f90768db9d607bde523f19f978a691907be463231e0145ff78115457be982 pcp-libs-5.3.5-8.el9.i686.rpm ed117298c162edbbde6ce206269af3d753e7a2c67619edb1018d842cee67a845 pcp-libs-5.3.5-8.el9.x86_64.rpm 591f6531b3661e14360166b657597b712dd837f584df01dabdaa87a69ce2e3e2 pcp-libs-devel-5.3.5-8.el9.i686.rpm abc42e60811cf4703eb5aa148f9dba1796810e4ac0e292fdf6b286912798542b pcp-libs-devel-5.3.5-8.el9.x86_64.rpm 0c3495df141c55465e2d27d498eca55575fa33dab10b72c8b6237463065440ca pcp-pmda-activemq-5.3.5-8.el9.x86_64.rpm 0048f91934dbca3a27da427c3d424d95e4f8bc0bc73e1ef0ec4498ced9569d3c pcp-pmda-apache-5.3.5-8.el9.x86_64.rpm 8934a40ec63afc8deef1b8130aa1df3e9785e43d959ce36ba11674c4323ea50b pcp-pmda-bash-5.3.5-8.el9.x86_64.rpm 140cd6269dcbbd228e562da773fb1442b77128d8a144382d76639fe7359af0cd pcp-pmda-bcc-5.3.5-8.el9.x86_64.rpm 8a44a2f3cb96b11cc96b7ba579f2da589f91ea32c9b403bbd638879b80b87c43 pcp-pmda-bind2-5.3.5-8.el9.x86_64.rpm 04a386c70a6443d0da9e89a204ee6f8db5dc2cdd4ad804fb7a4a14e12cdfc877 pcp-pmda-bonding-5.3.5-8.el9.x86_64.rpm a4bd8811d80a0252daac13cc0c7d1a55a5a461cd8fe973072fc29b0c2aaf9423 pcp-pmda-bpf-5.3.5-8.el9.x86_64.rpm 162183f2ef50367f35a85c87de17e2a35d2cd384d7ae78679262be7e2d324ee8 pcp-pmda-bpftrace-5.3.5-8.el9.x86_64.rpm ef69e14db6a6d580b9e40cf87496830ba5109810dd867a2b4b7b1657bd9280a9 pcp-pmda-cifs-5.3.5-8.el9.x86_64.rpm cce19eb1cd2bc1c7769b14ddf04135299c4f2ae634618ddde4896d5a1759226f pcp-pmda-cisco-5.3.5-8.el9.x86_64.rpm e2e6419d45fa9847565400e938904110861e74815ec22e1c62f045d5bcbf15f4 pcp-pmda-dbping-5.3.5-8.el9.x86_64.rpm 82b743adedf98dcea6beb4176783e289221768faa5025289d6208af4433a307c pcp-pmda-denki-5.3.5-8.el9.x86_64.rpm 2a39a634fa9c51b4d322bb74c8836440bb0d598b520e270a29c896326c129a40 pcp-pmda-dm-5.3.5-8.el9.x86_64.rpm 5b48eaf39952da4e128ce79c8a316ec497998e0b3d63dda1a56f16a0f73a190e pcp-pmda-docker-5.3.5-8.el9.x86_64.rpm 9a7b7b017b5724c2bd274a90f546e91606649fb2982c8d41954808d5f5221fef pcp-pmda-ds389-5.3.5-8.el9.x86_64.rpm 73cd3547ad8124528eb0490a6053320250b7ccca39f95bba254c8117b5037042 pcp-pmda-ds389log-5.3.5-8.el9.x86_64.rpm 4095c8a9902a402a66094c5d3b6a0ee34e0a5c1fc39b521ba5a2748daa69033b pcp-pmda-elasticsearch-5.3.5-8.el9.x86_64.rpm 022e7d913ba31fd01b292d63d8a6e563a367dbcf427e3d6ac7d51a4ca6ff634a pcp-pmda-gfs2-5.3.5-8.el9.x86_64.rpm b1f4e7de007781c1954bd261ea98224ba40db5532876ed17105466fb6583ede3 pcp-pmda-gluster-5.3.5-8.el9.x86_64.rpm fb6db7310fd1a654d0c665d2144d361007978c26a4ece81e4bdefaf9a9d55362 pcp-pmda-gpfs-5.3.5-8.el9.x86_64.rpm 71c3a2df100f4784a158191d3a5b33491db06485b13270708600b37a88428bb9 pcp-pmda-gpsd-5.3.5-8.el9.x86_64.rpm 5aa3c17e8d42971863a0bb8a3212b0f7c51443abb24b62bb8563c28bcffa368e pcp-pmda-hacluster-5.3.5-8.el9.x86_64.rpm 1d5f076c36c444f0efc36effc01c9de963395a52710384f0bb6444469b40d5d6 pcp-pmda-haproxy-5.3.5-8.el9.x86_64.rpm 5c02c84d4e787e05e66905e5dfb923ce3c04ba8ff127023fc2a9a68aec5a29c6 pcp-pmda-infiniband-5.3.5-8.el9.x86_64.rpm 80ff83aa1118a4a3a47a4899d321d0ee192059decd0e5a40f513216fb4fbc9b9 pcp-pmda-json-5.3.5-8.el9.x86_64.rpm 4bbd3e76b0a2fbadf222c146aaf8e2bc3861dc70e2cf22c038c2daeaf3e4129d pcp-pmda-libvirt-5.3.5-8.el9.x86_64.rpm de44b821eb0e41a52687a4d2c7d4ce0dcf813350c59f222233882373197d64be pcp-pmda-lio-5.3.5-8.el9.x86_64.rpm 03d4e4751945ef7da10178422d5754a135e0df21700baec8e13320d7b0f5cffc pcp-pmda-lmsensors-5.3.5-8.el9.x86_64.rpm 356336f07d21f614316283a636a25c148127b157689509c2f10836ff767944c2 pcp-pmda-logger-5.3.5-8.el9.x86_64.rpm fdae1fbcb276b2e3864e49281e1cc432bbc921c6b3234f278eafcea54357d3ec pcp-pmda-lustre-5.3.5-8.el9.x86_64.rpm 0d83cd86169c144d3b818e672a10c4e30105dc28a33b0bcccef9ca31f06a9a42 pcp-pmda-lustrecomm-5.3.5-8.el9.x86_64.rpm 2b7446f2038049d1ab1543033fecb0e46b98b0e04dbf19b4ccc7256c27bf2bc4 pcp-pmda-mailq-5.3.5-8.el9.x86_64.rpm 6814685fce7bd7e2980143aace83ad191bb74440acf4b5c582dbbc8238c47c88 pcp-pmda-memcache-5.3.5-8.el9.x86_64.rpm 5b275bdda3485b16f8471257a2410e553ae6d27ed8bcec9f5b7c4ea506aa93a8 pcp-pmda-mic-5.3.5-8.el9.x86_64.rpm 3ebe9b6c4f7387a355730d115924de615f2eb6f432613b8010b4f263924349e8 pcp-pmda-mongodb-5.3.5-8.el9.x86_64.rpm aa37d0312e5ba8bee37aa097c7ceb15a28a9a8d3dbbee8702ab86406cae75363 pcp-pmda-mounts-5.3.5-8.el9.x86_64.rpm a91769db4b1bdadc733cdc638f18879ba58808fdd4b33704b819f2923ae7e555 pcp-pmda-mssql-5.3.5-8.el9.x86_64.rpm dab43d9516e28cccca6729fae6c98ec64abc8ef8cc824d449a8e16d9ef184233 pcp-pmda-mysql-5.3.5-8.el9.x86_64.rpm fba2c449dbdafebaf1cce89de2e978b2a3482b8f30acbbba13259878c53c4bf3 pcp-pmda-named-5.3.5-8.el9.x86_64.rpm abc8f4e1a3628211ccc73849e78ce47464eb62e4778229bfea0416a378a22c15 pcp-pmda-netcheck-5.3.5-8.el9.x86_64.rpm 77ef3b5dc79b3765edf1967c07e74d485882182d482ac9862268e2526d1a7d77 pcp-pmda-netfilter-5.3.5-8.el9.x86_64.rpm 76e0d5552c1514fd543d4595e83bb4d777c342a0bd54505dec4e72535301c74c pcp-pmda-news-5.3.5-8.el9.x86_64.rpm 88cf24913fe381a383929585eb5a3a01c4301527a476757f00698a7ad0516fcb pcp-pmda-nfsclient-5.3.5-8.el9.x86_64.rpm c613150feba4c2c97deba054a789dd40232b9e26a10df6281b5e0a449d9d15ca pcp-pmda-nginx-5.3.5-8.el9.x86_64.rpm aced51765187767272df8791a2ec3b855c24934d0049cbc0e7171159f5d361ee pcp-pmda-nvidia-gpu-5.3.5-8.el9.x86_64.rpm cc1f6039f245fa4d0174893a7d06095c22ab4f22d50866326e606709f9d6e0b7 pcp-pmda-openmetrics-5.3.5-8.el9.x86_64.rpm e010d6121d5887337d2a9f83644c17235572ca351d325b25c98d79d894f8e71a pcp-pmda-openvswitch-5.3.5-8.el9.x86_64.rpm ad1042ff11f0623f2e9dac99ed26b0b6f1e1820744cef205ac34264ea703b307 pcp-pmda-oracle-5.3.5-8.el9.x86_64.rpm 7a35372e6106088d3a74b4b46a9784044942b5454575e4857a611be68e736a7c pcp-pmda-pdns-5.3.5-8.el9.x86_64.rpm 5a561219c89e8a24e3b3728f6158347e25380ef62600e2d5d5c61ee501335b58 pcp-pmda-perfevent-5.3.5-8.el9.x86_64.rpm eabee1eff50082325777649d73433df8816185257b6b53018bf389e0e532b53e pcp-pmda-podman-5.3.5-8.el9.x86_64.rpm 3c31d023370c78603634d546343a1d9c5036dcb9ed0c07ff544fcd5a5f69f8f3 pcp-pmda-postfix-5.3.5-8.el9.x86_64.rpm 39d7a9b4fa39a022c6e20df3fea24b36490ae3db9a51b81ce8565f949deff472 pcp-pmda-postgresql-5.3.5-8.el9.x86_64.rpm 47c39468b1a2111440c40a60b8d1d07bf187cb0bff2fcef258806b22d8b6b648 pcp-pmda-rabbitmq-5.3.5-8.el9.x86_64.rpm 61be61ab6966b86529683cf8d5a41123cf3eb66a9e6a4aac6f05ee1c3be72750 pcp-pmda-redis-5.3.5-8.el9.x86_64.rpm adda36fdbc6b243c568149aed86958a9d714caf43b4c4e0db238d3b2924b5478 pcp-pmda-roomtemp-5.3.5-8.el9.x86_64.rpm 8985de9c8e5e50e6c4885317442b1469714b495c55e9429d24f873fa835b44a3 pcp-pmda-rsyslog-5.3.5-8.el9.x86_64.rpm acb67ee1fe5905ec8ae8435007d9dab4d0b45363a4dba839d63b56ac9f1f44c1 pcp-pmda-samba-5.3.5-8.el9.x86_64.rpm 196db63cdc94d8efca16dfe5224969d68319b3d096784cabd7a9e66982899be4 pcp-pmda-sendmail-5.3.5-8.el9.x86_64.rpm 689734270568e71d297b5c267ffb1771457d3197c105342a7408c6ef085666c4 pcp-pmda-shping-5.3.5-8.el9.x86_64.rpm d1a1e505c8889f134b7cc7257d42f26bbfccc1befe5d6985d82a5c3995103a8a pcp-pmda-slurm-5.3.5-8.el9.x86_64.rpm 09c38695ab279407c00bb6162f81d39a8cbd6ce1ad0214b60b9a7ef9adbc8934 pcp-pmda-smart-5.3.5-8.el9.x86_64.rpm 82ea32f8c1f68a41bb891059eabf05180d3f7461db5ce843f18dbe8fc2d644a0 pcp-pmda-snmp-5.3.5-8.el9.x86_64.rpm 39179000e61c7751640be5aa3c6600db80a61d8f0d32914e482301717684ebd6 pcp-pmda-sockets-5.3.5-8.el9.x86_64.rpm d7cd6a9bfbb5ac2867b035df81dcf59c16bcabadc8d8a7e4df4d42b8bc524021 pcp-pmda-statsd-5.3.5-8.el9.x86_64.rpm 278fa47088bb283dd2e0cb2dbbdbd6e169fc324cd89433d3fbf49acc393ea929 pcp-pmda-summary-5.3.5-8.el9.x86_64.rpm 5e47b1ca5be9151cb72ab4b8a0a9a748e16c421d876314a868822cdb057a5654 pcp-pmda-systemd-5.3.5-8.el9.x86_64.rpm f93481a5ef17025b7874f341b16a42534747b92dffa6b28c454e583fc26fe93b pcp-pmda-trace-5.3.5-8.el9.x86_64.rpm 60fb405faa7c97fe9bd95620b2d0727f8dbd3077f197742cac6aefd9c0777cd2 pcp-pmda-unbound-5.3.5-8.el9.x86_64.rpm 6ffd6ea9a9618041fb51e97fc03a969dfb7d91a6383e7484e9e9d445e589d122 pcp-pmda-weblog-5.3.5-8.el9.x86_64.rpm d4769c18e7974fd4c98ef198a29ccf86a4cadddfc137894ba5548b3603895752 pcp-pmda-zimbra-5.3.5-8.el9.x86_64.rpm 58f91051b2838ab81bb84dadc93f0963f40f35c1ed68eb204ae5d20daf585a5c pcp-pmda-zswap-5.3.5-8.el9.x86_64.rpm 5e0b232a822cef761c2b27d41528cb8290e1d9a5f8d98a14b70cf918cdab5f6e pcp-selinux-5.3.5-8.el9.x86_64.rpm 69e42302e2cfb27d771e4095e4cde344fa2db5f661689c417f69b9431853cd60 pcp-system-tools-5.3.5-8.el9.x86_64.rpm d479e31e4d4d7aebf10e367d9381241a6c276890426b4493a922af3f038b7faf pcp-testsuite-5.3.5-8.el9.i686.rpm 818eb43a39c748e72e43449555fd00f9a5774b393ee2c708012a3edc507bb5d9 pcp-testsuite-5.3.5-8.el9.x86_64.rpm 93e5dfaaeaf68d214684767b9cda1f891bd6a436c8e1cef4ddc22d0cdaf0f8da pcp-zeroconf-5.3.5-8.el9.x86_64.rpm d21c284c05fbe028f835578a2a2e975e2a6a02339ebfdc7cbd4c22c6b59f72b1 perl-PCP-LogImport-5.3.5-8.el9.x86_64.rpm b1ecc1022261946bdbce1557b54787c9cfa258f30158ee7ccfd3afcc2350d393 perl-PCP-LogSummary-5.3.5-8.el9.x86_64.rpm 56be78692eb01636e8760e3a5b91c0ba98de4a2ed47d5c1eb65fe81448796bc5 perl-PCP-MMV-5.3.5-8.el9.x86_64.rpm 46024fc650854db319ec6a842dc8c2174383e9a477bd79cd11752d52c08b8933 perl-PCP-PMDA-5.3.5-8.el9.x86_64.rpm 14d55106ac67ba26b5a37743251be3d4524ad4802a95c4d86a69a73f8fe6990f python3-pcp-5.3.5-8.el9.x86_64.rpm dc6394dc138520dd3d042e72a8fad469c5e1458bbdeb72d7e53ae8a835868858 RLBA-2022:2371 new packages: freeradius Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeradius-3.0.21-26.el9.x86_64.rpm c6c6774d4d8450143829dd92cc92ba7a6d85d603ef48f639e9a2e20073dfd378 freeradius-devel-3.0.21-26.el9.x86_64.rpm 6d9f6f40b41cafe1596a0f924cb7d57bb1048b693b03a2ab7852bc82a8a033f7 freeradius-doc-3.0.21-26.el9.x86_64.rpm fe0c3cc0bbf14c2356469bbca948d1796439ae420e20d36125904a70a2847cdb freeradius-krb5-3.0.21-26.el9.x86_64.rpm c6690fa6438c088693c17afe6b504a61deaaaf9038aa9abf3a072f9b81fc98d2 freeradius-ldap-3.0.21-26.el9.x86_64.rpm 14eb7428542aa7a4cabfffd4cc737e6df51b2d9b94594edf0598aa7871200457 freeradius-utils-3.0.21-26.el9.x86_64.rpm 4b319c105fa3bac089ce593793b73a6f26e19878eeec271cd3430cc148086d6e python3-freeradius-3.0.21-26.el9.x86_64.rpm 224a26e30455ab5b0ce0e723c1b3be9ed3ed60bcd818ff4410f7ae2405acf242 RLBA-2022:2374 new packages: power-profiles-daemon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for power-profiles-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms power-profiles-daemon-0.10.1-1.el9.x86_64.rpm ff6bff6dbb64e10eb348a510c260f755f1a57cfe69122a5d29b5fc973ecfcb2b RLBA-2022:2383 new packages: wayland-protocols Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland-protocols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wayland-protocols-devel-1.23-1.el9.noarch.rpm 6eeb472af6eb4a83b644af315ce690300a22d4632cc8e49f4a3f9e0c2a047635 RLBA-2022:2385 new packages: libreoffice Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-6.el9.noarch.rpm ce6c8cfe56c662ff871191c0c476b4dfa6823ca3ac58bc3b904d977c30543316 autocorr-bg-7.1.8.1-6.el9.noarch.rpm 28fab974520eacf9d0130af30335078520fb51616cf313904eaca6e1211ff23b autocorr-ca-7.1.8.1-6.el9.noarch.rpm b889e9e02d5853027bd61b3f7e295bedc630368a331d0d55c061aedeae14488e autocorr-cs-7.1.8.1-6.el9.noarch.rpm 1b725a63b3f5fa4260a951bd63e01c85e38075697b522e4a1563f5a6a8525358 autocorr-da-7.1.8.1-6.el9.noarch.rpm aeaa8ce31a842666d12eda8a63f645d600e8652ca21f187c55ece831911d73e9 autocorr-de-7.1.8.1-6.el9.noarch.rpm 1ac5c3b48f94c8b97de1177a068586d0dab742786557b05aa790999be7a1708c autocorr-dsb-7.1.8.1-6.el9.noarch.rpm 43b54401851942f774d923d607ee6b92ce40e00bdc1051998686d8f352682f57 autocorr-el-7.1.8.1-6.el9.noarch.rpm 900d00fded7e50386e958bb396b4be2e7c29ce78b383a4939718bbd80d9e9f62 autocorr-en-7.1.8.1-6.el9.noarch.rpm b3c03d814f6e3edf030d439a1cd3980c7e53566b43a90c2df7256cfaf91c2611 autocorr-es-7.1.8.1-6.el9.noarch.rpm f1b3fd91f1064175699d7e398ae4f21c172ac45515b443903bec44249f29fbfa autocorr-fa-7.1.8.1-6.el9.noarch.rpm 0eb87f687c4e0585f2d482acbd714a487056db80ac59fa38311e8712ed012a11 autocorr-fi-7.1.8.1-6.el9.noarch.rpm 4504fc8d0eec2047273b5ebf412d560de62f969aab5c67121ad4dad14057e5ac autocorr-fr-7.1.8.1-6.el9.noarch.rpm 7aab41753920e827cc4832f78cd7905f32b6a9cfe81c8fa89c4277d44e1a7f58 autocorr-ga-7.1.8.1-6.el9.noarch.rpm b5077af0f4d902fdbd6a6008cc2eeaf5592692c7175cb6c9227fd128fca4925e autocorr-hr-7.1.8.1-6.el9.noarch.rpm 52c8d2ad1cc9842297e1a93acb9b1066dd0402f1d099ea530af4b07e01971020 autocorr-hsb-7.1.8.1-6.el9.noarch.rpm c07c724703f2cd035bf9a1b839fbcd0fec273b4f21b347b4e878abe1e1d706af autocorr-hu-7.1.8.1-6.el9.noarch.rpm d40741030523e38dff12d89a10fdc64a5132dbe0e1683047406bfa2e4bbd9b55 autocorr-is-7.1.8.1-6.el9.noarch.rpm 1ee2f74d722a494cad6d435aade3825268f70ee256d035cab287102e75b9ac5c autocorr-it-7.1.8.1-6.el9.noarch.rpm a15599e5f11db53fbc6ace60202b298c03ef6424363d7baa5681f6b047b9bc4a autocorr-ja-7.1.8.1-6.el9.noarch.rpm 29547f61deff86c925ad72f843b67ca6d1eb040de9f73f3a210facb5c96f3e95 autocorr-ko-7.1.8.1-6.el9.noarch.rpm e159b5ec70c8118e87045dda6645a5897dcd5735149d4d291b612cf3fafbd0d5 autocorr-lb-7.1.8.1-6.el9.noarch.rpm 524ce66158c00417e70ba19446da5cfa6d7e1892f29d80ac47da207e44a7c87c autocorr-lt-7.1.8.1-6.el9.noarch.rpm 87bfe485c58614f76bcb8a20f7d286cf0afae4cc29827489ecde479f190a3d4d autocorr-mn-7.1.8.1-6.el9.noarch.rpm db036528d533236eb2aa3950411aa3131a9ca25bf5fa84a978a835789c44629f autocorr-nl-7.1.8.1-6.el9.noarch.rpm daca88d9841c620164f31c68fcd3ebe4c37687bb623b25ab8e6841140e43f87a autocorr-pl-7.1.8.1-6.el9.noarch.rpm 1bfb188c4a25ff488cb548972a8e0053688172317bba5095865edfef3cab33e4 autocorr-pt-7.1.8.1-6.el9.noarch.rpm bb1115db8698f28f6d38193b72577db144bf297f2da6175dfeb12f92c4034eb6 autocorr-ro-7.1.8.1-6.el9.noarch.rpm 7b50841787247cc293b4f00308e946484d9e59ad71a2fd27693c818c7b3c9a82 autocorr-ru-7.1.8.1-6.el9.noarch.rpm 9af6af92a8f32328d8447fe48de4e4d13bb303fa41b232f4caa3906b8d5128bd autocorr-sk-7.1.8.1-6.el9.noarch.rpm 3f99a962dc8bc96871740e05d381d3d3dba1e20d3327a312f123627dd74f3b63 autocorr-sl-7.1.8.1-6.el9.noarch.rpm c542950738c2c8daa577d76c6221f59ff0832afadd3144d4665721262d7e108a autocorr-sr-7.1.8.1-6.el9.noarch.rpm 0e259d47e12c980e44e37c6650568dc6075fa542dbbe3f001373b7ba6ba66770 autocorr-sv-7.1.8.1-6.el9.noarch.rpm d45ba6db0215cce8f1014c64d6beda6284a34c9bd23ebf5f9e90357afb8a8b75 autocorr-tr-7.1.8.1-6.el9.noarch.rpm 16bbdc62d5e1377c4572d6bb113223cad4300bda44c0e9abbb9b9a44d81437fb autocorr-vi-7.1.8.1-6.el9.noarch.rpm c4e88e37bbb1c11ad934ab4b0ab3173225f7ae74ca7cbbc9e985bc0b8af419d4 autocorr-vro-7.1.8.1-6.el9.noarch.rpm 5355d79794575a6d1b616f1281bb3586ab47a9299e54e26c16b950029f136fb6 autocorr-zh-7.1.8.1-6.el9.noarch.rpm 3ddf6101b213b342dadf290dda051310f37698a9519f6090043c0c796ecda969 libreoffice-base-7.1.8.1-6.el9.x86_64.rpm 0da41c1a40eb779f018b7403eba3ccb954207c8e4d93a4f9d4adb8dd3a3de5d6 libreoffice-calc-7.1.8.1-6.el9.x86_64.rpm fba4229246b92703fa1d631ef453ad0d7debb6c93f46d35da440f06a0d5cf9b6 libreoffice-core-7.1.8.1-6.el9.x86_64.rpm af7f7b067da3f4ccbb6244499d5b36c51bbca26e6983d65e9622d71a29b031d6 libreoffice-data-7.1.8.1-6.el9.noarch.rpm 1a1f79694f0f1a859a0c6a929c9bd8240a056304e55a2c6f4b7956f35e64092d libreoffice-draw-7.1.8.1-6.el9.x86_64.rpm b23061bb5995566e1eab89bd7bbc767944dfa363044c60a82acaeebeacbbe553 libreoffice-emailmerge-7.1.8.1-6.el9.x86_64.rpm f5ef47f2a1c663dce8723feffa472854a2cb11132878e361ba71ad46e45cccec libreoffice-filters-7.1.8.1-6.el9.x86_64.rpm 8f656b754daaf2d662ef611e8d8e3a5daac2297acaf7648d5fe70c1604cca9bb libreoffice-gdb-debug-support-7.1.8.1-6.el9.x86_64.rpm f84ce6f2818b4f8f74968aa2ce389ebb23f0e5fbab0c9454cfff6fd3c6057817 libreoffice-graphicfilter-7.1.8.1-6.el9.x86_64.rpm 63f1876528987a5b4fe3f0a4dacc679140a69e61f25d784af7e1bdaf810b65c5 libreoffice-gtk3-7.1.8.1-6.el9.x86_64.rpm 4c70ce747569e59c7796e8fed939433a22c72ea32ab386f99876a2fa59dfa71c libreoffice-help-ar-7.1.8.1-6.el9.x86_64.rpm 1028a0ec1cb1f605bbff2a2ec9e85f8290c7a3189aa0f781bbb3c7bd2417ec2a libreoffice-help-bg-7.1.8.1-6.el9.x86_64.rpm b67177e0dd1b70b6556b61316bcae21fa271f8150983c305fbc8d16d49dc1f57 libreoffice-help-bn-7.1.8.1-6.el9.x86_64.rpm efebb408a500f8f50302495e0803c49af6d1a131eb243ef1c56b30d0803972fd libreoffice-help-ca-7.1.8.1-6.el9.x86_64.rpm 9df6fc7153eac07f85ee3aaee3a7b1505dc71fd881cd18ce2f23db6005217b10 libreoffice-help-cs-7.1.8.1-6.el9.x86_64.rpm 0fadcaa47b12fbf47523a8452fc68f715901515ac5f53a396419f0c9bf62cf7a libreoffice-help-da-7.1.8.1-6.el9.x86_64.rpm c91aa7e29f35f529feeeba57485c5bc4f6553505af42fa12fba1e8d296d6d989 libreoffice-help-de-7.1.8.1-6.el9.x86_64.rpm d8ae64b86ed54f3c7bc2d1d29d3fc0dd16a775102b5797f66f4ba82db1555673 libreoffice-help-dz-7.1.8.1-6.el9.x86_64.rpm f7f80b3ff6733a2bf9567c478eee7a99f4f699c78ee7e8a481f0447f064aaac8 libreoffice-help-el-7.1.8.1-6.el9.x86_64.rpm 766109b9f2842782fa63f77615235838ea7ced0c2e33ba9e6ae15bbd85aacd93 libreoffice-help-en-7.1.8.1-6.el9.x86_64.rpm 937547cd820f927251f854da2c05f8ee0e19ceafe8d3e4bdcae43a59e39451b2 libreoffice-help-eo-7.1.8.1-6.el9.x86_64.rpm acfbccf72a2989e68095b91b13b313301246ffb6298cd50946af7f71ab48a9f6 libreoffice-help-es-7.1.8.1-6.el9.x86_64.rpm 3635ae61677ef853dfd2693899750bdddcef7674ffab37f7b8e8f93215fff11b libreoffice-help-et-7.1.8.1-6.el9.x86_64.rpm b6990dc560c0130a60fff495633118a97737d42388b177afcb2d30dbc78df940 libreoffice-help-eu-7.1.8.1-6.el9.x86_64.rpm aeccbdf6fa75a9655304e895c6f9e2d6f3e3d98fb33af66515ba2c437fc4fbf3 libreoffice-help-fi-7.1.8.1-6.el9.x86_64.rpm 2c2851be7af1643c64b1bd6ce279e184af481d39c2d01b62df1d445aec60d4b5 libreoffice-help-fr-7.1.8.1-6.el9.x86_64.rpm 3d6939e9f991c1f2543c3373924bc5eb7463943e343f1695302518a1e4ed2618 libreoffice-help-gl-7.1.8.1-6.el9.x86_64.rpm de77dff5bf97cf345a9a119b08d6cd98c291a8b30d324ed61b48c5dbb67e3e7b libreoffice-help-gu-7.1.8.1-6.el9.x86_64.rpm ec75792443e9823eda8c70068d0cdc47de23d340fa2894a967025a5ec9813e3f libreoffice-help-he-7.1.8.1-6.el9.x86_64.rpm 6f337aeedafa57e236d3f75874fc01e43edf9aad20e8a531ce234f08c0da9538 libreoffice-help-hi-7.1.8.1-6.el9.x86_64.rpm f5cc29aa6978c90517e1d6547c10ec644706409fb379dffb6a9a389497b2cb7f libreoffice-help-hr-7.1.8.1-6.el9.x86_64.rpm 9c4f0c7fc43ae24c17460d51d9cb172e9f72188ef816ea1ca2b488f98cb364ff libreoffice-help-hu-7.1.8.1-6.el9.x86_64.rpm ddb359b2abaa08de94b4f0cd713f59c23416ae6fccf4c303183a9386dabf9dd7 libreoffice-help-id-7.1.8.1-6.el9.x86_64.rpm b4dad685e2a70c5f11afb4d030cc18477ceed175ee332287750f7009331ac113 libreoffice-help-it-7.1.8.1-6.el9.x86_64.rpm f4ea97101b45ec9739dcf46851ae45c8ea2d4539ba054bb94ab274c45a406f4e libreoffice-help-ja-7.1.8.1-6.el9.x86_64.rpm ddfca2cbe2d1535bd1398e7d1687a3f1f6c45920bb5dc7fdab21ca4d099e51ee libreoffice-help-ko-7.1.8.1-6.el9.x86_64.rpm eb08f4bb6a7d5e3a1dfeba47094afa7c993627fe76afa40d1f160eb24fb2446e libreoffice-help-lt-7.1.8.1-6.el9.x86_64.rpm e728dd68f22179fea0447fe383187851776aac62bf2c6a5f216f3ba7c33c2f19 libreoffice-help-lv-7.1.8.1-6.el9.x86_64.rpm 19912fe2ebd55c517ff4c825265593a33d5c0b032a408e1288ce0c5c1a60d2ca libreoffice-help-nb-7.1.8.1-6.el9.x86_64.rpm a7e491ae91343b31722938a7ffdd4053ce64a55df6ccf173a21863602fa0ccec libreoffice-help-nl-7.1.8.1-6.el9.x86_64.rpm 96bbf0878dc0de73405f94528ea21a92a3d935f99553e0b9c1b8dc9edb359431 libreoffice-help-nn-7.1.8.1-6.el9.x86_64.rpm 6c9dcb8f415242013ba997306c5a702138095471bcf24294963956d04aaff671 libreoffice-help-pl-7.1.8.1-6.el9.x86_64.rpm fe41abb248ba9c13cd6e223b9927566782d7492067fb58a65d9659bd3a931a71 libreoffice-help-pt-BR-7.1.8.1-6.el9.x86_64.rpm 190a04c015940d4b733ffdc6be381a854684c219ddd71d35dd5b34adfe46c500 libreoffice-help-pt-PT-7.1.8.1-6.el9.x86_64.rpm 4ec4cd694ebe836d8aba4f1a6b8a07ea7756f44b57a9a2bc32bc41de5920935c libreoffice-help-ro-7.1.8.1-6.el9.x86_64.rpm b0174d88eb87a58117e1543a2b9dbd7213d41c046d95fead5a8172c1cfd8406c libreoffice-help-ru-7.1.8.1-6.el9.x86_64.rpm f74e5ad0fcea1727d39c55bf902710c726ff268e90c8f712698d748d6bd90184 libreoffice-help-si-7.1.8.1-6.el9.x86_64.rpm 0ed3caeb7e2576ba0a46ee66f1d71a8b42cd2d24bdf4241c70b35f4636b41e9f libreoffice-help-sk-7.1.8.1-6.el9.x86_64.rpm b1103e02f23f845a2e57808b998e6c729bea2a0d5f8aaef02ef82d0a9b78d21b libreoffice-help-sl-7.1.8.1-6.el9.x86_64.rpm 63befeaaba51dea23b9ca071caa37518c1b6ec0c7c0a4f09f3b28d3be9072cbc libreoffice-help-sv-7.1.8.1-6.el9.x86_64.rpm f31b9892e469990521795d144631c4d14a3d0a7a406a74ed7ef614b8427a2a15 libreoffice-help-ta-7.1.8.1-6.el9.x86_64.rpm a1c1474c9c14493341704b507fed27364c56d50384ab849aac6f785fbd3b87b0 libreoffice-help-tr-7.1.8.1-6.el9.x86_64.rpm 230937ddaa0df35f777ed7b896a5e3db4f574c624b6b44dff7d2d8f8a050640f libreoffice-help-uk-7.1.8.1-6.el9.x86_64.rpm 3253d9dc5993f28fc858a1666592ba2c588897699994796529fb15f97fc9e8d9 libreoffice-help-zh-Hans-7.1.8.1-6.el9.x86_64.rpm 6d23c670a74f03e9be56730f5045d7512364e0343322e8efe8f9cb2dd9e058a4 libreoffice-help-zh-Hant-7.1.8.1-6.el9.x86_64.rpm 2659f235e2e9a3e8b089627bbb02537d3122541e7803f3adaeac16c5d3fff641 libreoffice-impress-7.1.8.1-6.el9.x86_64.rpm c112dcafd162e091b010df1fbd15f888f6c9eebb6458fed6cf26d74beb29ed66 libreofficekit-7.1.8.1-6.el9.x86_64.rpm 8774216ce8c3889496abada6708c411a2ec085563b8a49ce43e5cacef160838c libreoffice-langpack-af-7.1.8.1-6.el9.x86_64.rpm ebc1fbe0d26c9e6da4c7a70d2a5a57f275f3906abb0069af9aaf7d073679bb42 libreoffice-langpack-ar-7.1.8.1-6.el9.x86_64.rpm b019e3835d1cfe05c324d5b96f8756756f9a9dbf87e05c72c1a78efb3076fe92 libreoffice-langpack-as-7.1.8.1-6.el9.x86_64.rpm 202375433b8e8f1a96748b2a16fb1c8139f025335ebc53202d844c35442d7cbe libreoffice-langpack-bg-7.1.8.1-6.el9.x86_64.rpm 3e2898e0eee12437a5e39b74c63b4ae8ca9ed59bbb7987d5255d26da77b34e9f libreoffice-langpack-bn-7.1.8.1-6.el9.x86_64.rpm 32385d92a1031f3767c07f901dd58f1df9f08512bb393648fc26de70e51d7626 libreoffice-langpack-br-7.1.8.1-6.el9.x86_64.rpm 95b4463a3c9aa4cbb7fe3100ae40ca6591a747d1dd11f94e455bdd3702fa2470 libreoffice-langpack-ca-7.1.8.1-6.el9.x86_64.rpm f14114bacf794906f18be92ba7ae11b20d912da48b095ba56ea3b201c93fd919 libreoffice-langpack-cs-7.1.8.1-6.el9.x86_64.rpm 729418f64c3b3b39d40d50005998190b1631906cc633d7cff76d55b7560379c3 libreoffice-langpack-cy-7.1.8.1-6.el9.x86_64.rpm 9fdce2d9fb120f776627efdab552a5a43df377d9a75f6e78497c5f9811d5b4d6 libreoffice-langpack-da-7.1.8.1-6.el9.x86_64.rpm 1c54131cbb366eb12d32d5a4ca5ce4e3277539a3fa5b1936f861e82495ee667f libreoffice-langpack-de-7.1.8.1-6.el9.x86_64.rpm cee5f0855524fbf3d14a901ed95fef1dba61c2210b0301df0e2ff73e605e10da libreoffice-langpack-dz-7.1.8.1-6.el9.x86_64.rpm 61df884923c78ddd55897800ec68841f4084f8b9f3ead0da82080f307add7867 libreoffice-langpack-el-7.1.8.1-6.el9.x86_64.rpm defd44492179a0202b3d70a1d7f4a1d9bf1c369c97d0804efa260d499242d310 libreoffice-langpack-en-7.1.8.1-6.el9.x86_64.rpm 03a26283ed0a29793400d0f35cca7bd5aa8f04ebcee9237603264e91cd5a2e75 libreoffice-langpack-eo-7.1.8.1-6.el9.x86_64.rpm 8beeddd7718e362d6fec1b5a7cfaf13410efb8f7cd72468561bfab1c545690cb libreoffice-langpack-es-7.1.8.1-6.el9.x86_64.rpm 9d4158249f4c1ecee33f3dc600aa92a5e39f86cc545730f5098cccb8129fe8c9 libreoffice-langpack-et-7.1.8.1-6.el9.x86_64.rpm f7b8ab2054828835ea512e4d743a959ef2d3577259ebeedd0c505ae6d14051b4 libreoffice-langpack-eu-7.1.8.1-6.el9.x86_64.rpm d7b92edb57d2bcc95cc33744004a8685dc81d0cfe3469f8cac1171413fd04f20 libreoffice-langpack-fa-7.1.8.1-6.el9.x86_64.rpm bf7b98c45412206b2d16c2904d5e70c8b1948268613f4d5c5392145ca05a8de3 libreoffice-langpack-fi-7.1.8.1-6.el9.x86_64.rpm 7be022ba59d51cdfade93c023b061ae71478c2e725d1b0dd447fb98bcf3f0fbf libreoffice-langpack-fr-7.1.8.1-6.el9.x86_64.rpm a8166e32142c46b2873d3a7cec930d29946d75a5812556712b91a28b13404a49 libreoffice-langpack-fy-7.1.8.1-6.el9.x86_64.rpm 3016e83886cb427a6bf3b0247e8b5e3a3c3071ac68b0768763627e264f4ac26d libreoffice-langpack-ga-7.1.8.1-6.el9.x86_64.rpm 9dd1385b8242e4aa76fcd1b48e33179287c4e4a65c1b0ed0d740732b40209257 libreoffice-langpack-gl-7.1.8.1-6.el9.x86_64.rpm 621ff9639298753c73ba998930272f29f56a98dd609c19f707eba47717e16c86 libreoffice-langpack-gu-7.1.8.1-6.el9.x86_64.rpm d0f588cb933f9141816eff7415851382bb9a342fe85e2ce44361d8e780161bb1 libreoffice-langpack-he-7.1.8.1-6.el9.x86_64.rpm 2ddfe27dfa4b33712c59f696fd049506ede667ebb8609c629b55b79394e4587b libreoffice-langpack-hi-7.1.8.1-6.el9.x86_64.rpm fd87bb4ed66dfa4dc357ed4f9047dcd815d45ab0fdd261e4247b0e5fffaae6fd libreoffice-langpack-hr-7.1.8.1-6.el9.x86_64.rpm 728bebe6072146bca66a0b5baa55c6c57820d49a6bad1e0799f9d6a193d91008 libreoffice-langpack-hu-7.1.8.1-6.el9.x86_64.rpm e0aa64ab9e3159852635499d90f6867b31a682987d230e3b682ae0eab073f2be libreoffice-langpack-id-7.1.8.1-6.el9.x86_64.rpm 69ceb0792a5fde73c20e49ed94f820995c8a0c500edf3c4c406a03307f7f2ca9 libreoffice-langpack-it-7.1.8.1-6.el9.x86_64.rpm 4d3bc174cebba382c67f028aa4e0413a30c111fe8f8dc7945bf7299456d393c2 libreoffice-langpack-ja-7.1.8.1-6.el9.x86_64.rpm 517a1f048e527a08fdc368826b87e742b69bd005621d46a4095a621627378425 libreoffice-langpack-kk-7.1.8.1-6.el9.x86_64.rpm 658ce5d0e584ec5aed9d30001bfd069cbd27dfc479afe17562753758e228dd6b libreoffice-langpack-kn-7.1.8.1-6.el9.x86_64.rpm 60823c4a18d1d1d69258f7e272fd5ac1174cad14f055f82a2c159f79e2c01134 libreoffice-langpack-ko-7.1.8.1-6.el9.x86_64.rpm 5e7bde530f962ac16a3fad48e6d15b256ff02b8ab588b2cb84721977a4550b64 libreoffice-langpack-lt-7.1.8.1-6.el9.x86_64.rpm 54603f632a1353b02ae1789754791ebdbd5c09a864c35f21a917d4e4012bc6ba libreoffice-langpack-lv-7.1.8.1-6.el9.x86_64.rpm b2b2911611642c6188d46efa6f0bec339f971dfaae56c2ea93af01ae91037a14 libreoffice-langpack-mai-7.1.8.1-6.el9.x86_64.rpm 831f0aa8bfb7ddf17baa957dde7d59450f640fe72963f7c5ceee4017dba991f1 libreoffice-langpack-ml-7.1.8.1-6.el9.x86_64.rpm 9e354639d38be0a3186712c233d3bcfcc85d75c995287d153a9da3c1f20f55e3 libreoffice-langpack-mr-7.1.8.1-6.el9.x86_64.rpm f5694a5da01b8e95b2ea5aba1948a576eac12d1979530bb359a1ba2dd29c1e47 libreoffice-langpack-nb-7.1.8.1-6.el9.x86_64.rpm 6bbe09596667bac286a29bf0f0e9bf2ea25d47a9599d427109bb2460dd1bd1ad libreoffice-langpack-nl-7.1.8.1-6.el9.x86_64.rpm f87135d91e9dd53a735f363a3ec0dfb652549a5668cda3a2fc5c5c8f57cd9e40 libreoffice-langpack-nn-7.1.8.1-6.el9.x86_64.rpm 7d3f3fc637273aaabd8199154c0f712384e32795869da6c2eb2ca2ca6c966a90 libreoffice-langpack-nr-7.1.8.1-6.el9.x86_64.rpm 910b44b0bd09f7bbb440cae89d9f6c6f13d124f74c834471cf6e736b0cdef0d6 libreoffice-langpack-nso-7.1.8.1-6.el9.x86_64.rpm 7fa50fa5e1dc803d7b0c3c76c479ab35cd2c58d309362435c6e8af9d6575daee libreoffice-langpack-or-7.1.8.1-6.el9.x86_64.rpm 5f681411e2ced355ee339b30954729110f969b0c2ec90112ed32e2de9e824532 libreoffice-langpack-pa-7.1.8.1-6.el9.x86_64.rpm 33ae432e3be89e6e5ce7385620f022250aa8af178b9e756cbcb0abdc471337ae libreoffice-langpack-pl-7.1.8.1-6.el9.x86_64.rpm 8717940c047560765ba7f7009c496681a5419b406e97b959146340a35241b2d0 libreoffice-langpack-pt-BR-7.1.8.1-6.el9.x86_64.rpm b31c178eadc65f19d5ebd069db5d0839032f1c8ee28dba6ed9f243f59ab25c25 libreoffice-langpack-pt-PT-7.1.8.1-6.el9.x86_64.rpm e5d36e19bfd75b9de8b3593a49888bca054cfd68beeab1f86537778281299bc8 libreoffice-langpack-ro-7.1.8.1-6.el9.x86_64.rpm ef22427ad3d6bb4e0af7ebb30655e9da297fa4bc77077bd35101f8a2b6376e9f libreoffice-langpack-ru-7.1.8.1-6.el9.x86_64.rpm 418835ff9387af5016fa1f3bf13fd2df3d910ebd1f7345232c9d4f1398556189 libreoffice-langpack-si-7.1.8.1-6.el9.x86_64.rpm f568aaa270d63e11061b25773fbebd324fcb8fd541a1f375a8236e6d3896518b libreoffice-langpack-sk-7.1.8.1-6.el9.x86_64.rpm f12b3f395047f192ad772f0232eeb6d00ddbef50b9b3dca50c2aecefba81a1ad libreoffice-langpack-sl-7.1.8.1-6.el9.x86_64.rpm 2025309f1cdfad8a18abc2cac28f8635e22657212f192de7f2d0db59c949bbdd libreoffice-langpack-sr-7.1.8.1-6.el9.x86_64.rpm 9c1ac6c116f82c285ec6bae5829a464bef25fed108314712652858ddfad10e54 libreoffice-langpack-ss-7.1.8.1-6.el9.x86_64.rpm 46bae487acc7fa4d053a55c22ecf81e15e0412322bb2c1eceb702edd750f20c5 libreoffice-langpack-st-7.1.8.1-6.el9.x86_64.rpm b5d5f1570b2ee8694a7da71bc0fd878705b6e16ebd187985ef50a9c08f3596b6 libreoffice-langpack-sv-7.1.8.1-6.el9.x86_64.rpm c64ad5867474b05781ccfa239cb156fc15934f191604af7b8a099f9f3a914b3f libreoffice-langpack-ta-7.1.8.1-6.el9.x86_64.rpm 6d59fbf9a549c40c5edbcb0f4472116ce46c9132f399fada0491043d9bfd119b libreoffice-langpack-te-7.1.8.1-6.el9.x86_64.rpm f796c6ef41a8197e2a6d9792cc49ad8e34b5764611610e673489d777ba57a901 libreoffice-langpack-th-7.1.8.1-6.el9.x86_64.rpm 1a80fb4ca85c0eed58376c1e7c820c3b05495e21d8a8d2d0c38a7fa19138ec9f libreoffice-langpack-tn-7.1.8.1-6.el9.x86_64.rpm aad4a031191ae5ebb907dbeb573376665d0e95dcac335da556e3f04e16e86d69 libreoffice-langpack-tr-7.1.8.1-6.el9.x86_64.rpm a0c2bfed690bd0b99feb0cb7c527b263ce6dbfed58716e9de7f0e41fdcc213cb libreoffice-langpack-ts-7.1.8.1-6.el9.x86_64.rpm ec3c29d113a01ad9e64d28537f21804491b510e457ae4257d7368e8c41c96cfb libreoffice-langpack-uk-7.1.8.1-6.el9.x86_64.rpm 74d78a3b51319ee61deb0277d35890c00246718336dd979a799f4ec401983c2b libreoffice-langpack-ve-7.1.8.1-6.el9.x86_64.rpm 4029b8a1468f4c61d69b44a0581a418ca0aa0b6d11c07307e8e32f771f49ff9a libreoffice-langpack-xh-7.1.8.1-6.el9.x86_64.rpm cf31bd887082862b5b48bab07638ed3b2c14c68f2659d3583d325d5f785c9c92 libreoffice-langpack-zh-Hans-7.1.8.1-6.el9.x86_64.rpm 095c5693b5464726cc0165badf93e9d8ac5bfe8825f395a9c9c3dd743d26277b libreoffice-langpack-zh-Hant-7.1.8.1-6.el9.x86_64.rpm 3df50dc76fb1e789456c80b9011a3c848fa1d4edf2de08e6f7b9d1856641a8c9 libreoffice-langpack-zu-7.1.8.1-6.el9.x86_64.rpm 986c1eeeb3a90a5c07841f8649ac9406fa1635a79cd7953b257e120c7fb8c3d0 libreoffice-math-7.1.8.1-6.el9.x86_64.rpm ac357ba2009c63555fe3d82caad710d7f71e8269a9857f308160bc1491fd3b22 libreoffice-ogltrans-7.1.8.1-6.el9.x86_64.rpm 67f008f13f35ae372f776e90c201dad4a0cdede159e0dcf5abcbac0d8aec88df libreoffice-opensymbol-fonts-7.1.8.1-6.el9.noarch.rpm 4621baa5df251ff762cff293ccd830490e41d5c7c42b8863503582c2758ec4c6 libreoffice-pdfimport-7.1.8.1-6.el9.x86_64.rpm 226ce4b0a80c3adb29a2eb68c36f5178e7e81703dc615bbea950e4b1918c3e7e libreoffice-pyuno-7.1.8.1-6.el9.x86_64.rpm efa105ea3b7b4e4570adfb4af7f78715ba63aa6d932a0a32246af4567ccd6e38 libreoffice-ure-7.1.8.1-6.el9.x86_64.rpm cf9edd9a291f75913182093f7cc1cdeaae60bfc0c971310e0f9d4f2ae2eaf48d libreoffice-ure-common-7.1.8.1-6.el9.noarch.rpm 934a491fcbca660493e4accf8c6701d9a4b196eb87b101525018caa5ff072403 libreoffice-wiki-publisher-7.1.8.1-6.el9.x86_64.rpm 0f3becdef37d9ea817e274b8e0415c78ee63a7a752d70fafe55d0a7a393f72e8 libreoffice-writer-7.1.8.1-6.el9.x86_64.rpm ecb1bb1fa9db8017b93066d65f72954e34a405fae867547a0d2b78bb3991b8cd libreoffice-x11-7.1.8.1-6.el9.x86_64.rpm 5d462af72341b4b1943cf4d858fa50b3b2b87016f7f1ca9fd784e1a1ad422f84 libreoffice-xsltfilter-7.1.8.1-6.el9.x86_64.rpm c7ed3a9d064e2b1e3b2e706b692d929ee0ddfaa7a89bc79335cdf02385179361 RLBA-2022:2387 new packages: ipa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.9.8-7.el9_0.x86_64.rpm 064157f54e52bc8ed4e9801720cd513cb37d979717a2848b047565fd9ffff850 ipa-client-common-4.9.8-7.el9_0.noarch.rpm 4dfb5bf45769b36fce4f8e09669a3f9fbe6020f5008e380a1c3aee525306046f ipa-client-epn-4.9.8-7.el9_0.x86_64.rpm 2a429a5fa390e4450b3e6101779815018ff886b300c8f837d39e9a4d1560ae7e ipa-client-samba-4.9.8-7.el9_0.x86_64.rpm e2a3e3a775dfefa55904cadbbdbd92c6cc70f2a2db7b29e6417fcae7a63872b5 ipa-common-4.9.8-7.el9_0.noarch.rpm 0f200ff4cbe1d621cbbf9b70f2c9da4c8d1369095a4c1e717644c64c6d2e2531 ipa-selinux-4.9.8-7.el9_0.noarch.rpm cd02228d1b0728fb76abf6f2f7800c7df8b42ac476e59217f026e75e565d5002 ipa-server-4.9.8-7.el9_0.x86_64.rpm a3477f5f99cce887553da1ec831b1ebd7332645e13b8618afc3a0c9c49f37fe4 ipa-server-common-4.9.8-7.el9_0.noarch.rpm b005841bc779f796c5e6d519375ea60ba58d5392978b49f89acbff738f4dfde5 ipa-server-dns-4.9.8-7.el9_0.noarch.rpm cc3224fba9c7f0b319098b84355689aef19a73dd289fb34947d0d6c13590046e ipa-server-trust-ad-4.9.8-7.el9_0.x86_64.rpm ee13df015e8682de76cd61967c23dba50805978c85611228f7c4013c2cc2b753 python3-ipaclient-4.9.8-7.el9_0.noarch.rpm b46e176028ba3d702e64c82092c2305171872e4316b7e2660c7670dd25e7d0d0 python3-ipalib-4.9.8-7.el9_0.noarch.rpm b41b0b1850de86cdac68235a153219a5d32e1a36a7dda4ed0cea771fa99c8001 python3-ipaserver-4.9.8-7.el9_0.noarch.rpm 34feb05f48d07c29ec499a0232aae944ce9695dd7494b7cdf4dc5c99c81dc935 RLBA-2022:2388 new packages: cockpit-machines Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-machines-263-1.el9.noarch.rpm 76b43297cfd0629d8a98282b57746a45302cba637e83177e5be74fe6967cf428 RLBA-2022:2391 new packages: seabios Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for seabios. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms seabios-1.15.0-1.el9.x86_64.rpm 3afa7612eae7daac67b321362889b1b8c1b2308b763be640c5cd0f2c63b7d381 seabios-bin-1.15.0-1.el9.noarch.rpm 2ce29727622a19d9dc205ca34516329735cbc1da8a63a9c7ae2170018fdbad42 seavgabios-bin-1.15.0-1.el9.noarch.rpm 83b78fa1dcbbcb748029259d8031010101db668e361e7ff54afd8691b061bfd8 RLBA-2022:2399 new packages: usbguard Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usbguard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usbguard-1.0.0-10.el9.i686.rpm 1f0fa01f60da577553ffe6d5fdee2d4bc0fa205ae5eff3e759ca7e9b241d69c3 usbguard-1.0.0-10.el9.x86_64.rpm 15bfa79dd1538135ebc610560d836800941815cdf58a55e9b95af7bf873ca9e4 usbguard-dbus-1.0.0-10.el9.x86_64.rpm 4831c1c59e610fa826bd6caf3a4e0e205d5e63cee216d58f53481863e87c8991 usbguard-notifier-1.0.0-10.el9.x86_64.rpm 58b4dc28bc8812c7d5a4e0ba4b4b00dcaf627cd3293dd87e5454fc5261e10014 usbguard-selinux-1.0.0-10.el9.noarch.rpm 5d5238c15440161baa1eb227002452b2b322f4737d276414213e9be4f02283b3 usbguard-tools-1.0.0-10.el9.x86_64.rpm cb37ca4490486970fc584cde98c7aa803eaf6d4228fab11035c3a5f0193c67dd usbguard-1.0.0-10.el9_1.2.i686.rpm ed1d7851cb634fe120cc8fb62b664d797203278440c07cfd8e0bb50ff3b90a5b usbguard-1.0.0-10.el9_1.2.x86_64.rpm 237bf57bcb21ec99e0f4f605a1f685c29e8fbd52be85215c8091175a2ca2b3af usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm 821f7cc58d4632a98a7470a2f86ebfe04c447623af52700a88c28120b955f508 usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm ff7701135023660d1eb0217503379c5f0bceee00374f4d30c8e847ba04881248 usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm 0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5 usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm 335ecd55f5170814776f7fdcc360afc5acf61947ed0607939d25f8f34c442ad2 RLBA-2022:2401 new packages: valgrind Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms valgrind-3.18.1-9.el9.i686.rpm 7c89d1582c6b93f288c16d7cf8963e1aea388393d27794186d738df27dd512a7 valgrind-3.18.1-9.el9.x86_64.rpm 08d4de919154c5706e411a6ea55657b300d8bae87c51f95bc053a4c2b9f8d8a7 valgrind-devel-3.18.1-9.el9.i686.rpm 178acb51ac7028a25d2318211fa54bb4507483719d0cd27d425151d65495d84d valgrind-devel-3.18.1-9.el9.x86_64.rpm b0d37f0dc8d0abfabcaadc9aee410d88c31c7be28ceb9783065050a283172980 RLBA-2022:2404 new packages: lynx Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lynx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lynx-2.8.9-18.el9.x86_64.rpm fa7d74a14ea45cc329c8c2ecaf196a5eef9226bdd1349c18b961d21cba6c286a RLBA-2022:2405 new packages: haproxy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms haproxy-2.4.7-2.el9_0.x86_64.rpm e7ab9af75f4ed206188b1cfd50e3e15302b37de13c9c5d347460e9d58e260a4c RLEA-2022:2408 new packages: nbdkit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nbdkit-1.28.5-1.el9.x86_64.rpm 9f339ddd58431e7901cb6464113858b20986eb8c83f0b4a5d9d13011b6f0a54a nbdkit-bash-completion-1.28.5-1.el9.noarch.rpm 5827ea6a46fc10ff351c79e65ec71fb52c3eb20b5bdeb5874d5d10e7978b819f nbdkit-basic-filters-1.28.5-1.el9.x86_64.rpm c3c998d545f9c8a90d7ed8b6c872c11ef36cb7f8c2efdb3685173fd39b9a4c8a nbdkit-basic-plugins-1.28.5-1.el9.x86_64.rpm c42e0b8d06c126a3fde6a7091adf534cfce52be7bdc8cec4b077380114b4628c nbdkit-curl-plugin-1.28.5-1.el9.x86_64.rpm cfe2788c5734208fdd16384feffedd14c51ece3c21d0aff60863ef29fbdc9d69 nbdkit-gzip-filter-1.28.5-1.el9.x86_64.rpm 7523f5b6fcb1e286bf77ab4bc7a65ee1f665535170ca10aa8d536efaf3ebf88b nbdkit-linuxdisk-plugin-1.28.5-1.el9.x86_64.rpm eaadb711920cb05259566055d30c4bb4119da26776529da68f6c1615aa517254 nbdkit-nbd-plugin-1.28.5-1.el9.x86_64.rpm ad141dc7e18a422b6ee3f3d1780f956d89d1b03c2c5b4aa6b34565b238edc65c nbdkit-python-plugin-1.28.5-1.el9.x86_64.rpm be2686898cda64357743a6982c9aca7e3a8cc158c4aaefc7ed16307a1a6a4308 nbdkit-server-1.28.5-1.el9.x86_64.rpm 8373724692ebd884a67d85f01501c76abfb57907ab35da7073571fa718abb359 nbdkit-ssh-plugin-1.28.5-1.el9.x86_64.rpm ff087ce777fbf994e4d6797c444d0009ee2f485c45582bd3101e31e1e8e3189d nbdkit-tar-filter-1.28.5-1.el9.x86_64.rpm 04c0cf48548ff11155fd5a06a487a8cc0cf95ec85c11fc097bcb2c7dbb93e8de nbdkit-tmpdisk-plugin-1.28.5-1.el9.x86_64.rpm 716c451ed530450dcdf38cce95039d796a03732e7a05aa097d42774c58550a1b nbdkit-vddk-plugin-1.28.5-1.el9.x86_64.rpm 64fb7d671d973fd11cbdddf7eecef664f250dcec53e592f410594e330575c1d4 nbdkit-xz-filter-1.28.5-1.el9.x86_64.rpm b3122cb2eaea9ccf6c79cd96fffc6923fc69eef0b6184e95b61f217b48406af9 RLEA-2022:2409 new packages: libnbd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.10.5-1.el9.i686.rpm 60af025b6a6588a55e5dfec8205b153346a304207d8b4c0f1aeca22f953656ee libnbd-1.10.5-1.el9.x86_64.rpm 8f4f47ccc708b67fc28bb521e2262748e3ed1e449da1dfaeeff67fd3daf3e89f libnbd-bash-completion-1.10.5-1.el9.noarch.rpm c7fe4a5b092b93306e05c5011801a00874bfc8253a557b60d866fe0cbb6e9c3b nbdfuse-1.10.5-1.el9.x86_64.rpm 9d889f7342d711b3747454e13a258f332520bbab4dad66330dc442553f7c8346 python3-libnbd-1.10.5-1.el9.x86_64.rpm baa5cbf78d1e63f1e451d438f38b04d9f66d0ce55c662b6e831d47e9b3311eef RLBA-2022:2414 new packages: xorg-x11-server Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-10.el9.x86_64.rpm ff087d657b6fd11f330bf8d9f7235b9877ede80bcc96ef4c84e409dd1e768758 xorg-x11-server-Xdmx-1.20.11-10.el9.x86_64.rpm 55b93fa4d8728a42fc7e509fe2e672bfd54daae609e721b18f8dc90e2e50cddb xorg-x11-server-Xephyr-1.20.11-10.el9.x86_64.rpm b5bf597499a37ffc489131503af10875b34f6c528a37b8c5b3000179741b932a xorg-x11-server-Xnest-1.20.11-10.el9.x86_64.rpm 43bf5701d115cd64851241588adc9aa3c673871430d205fe96a64c8b83e71db4 xorg-x11-server-Xorg-1.20.11-10.el9.x86_64.rpm e3c4494c99488218402756592efe5b9e47a30e937bb6d75c00a989f321cde652 xorg-x11-server-Xvfb-1.20.11-10.el9.x86_64.rpm 9d622d4d0b4f4ae2f1d6747f6aca11069afe7d9f7436c5d12245a9ee3c54e36d RLBA-2022:2417 new packages: mptcpd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mptcpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mptcpd-0.8-2.el9.i686.rpm d5a8b337e3303bc2ec0859fc83363179ea137ea99a552b7370c8467b0cc1d4d3 mptcpd-0.8-2.el9.x86_64.rpm 118605ca362e9ab8d66f325e5a1129ff93ee52a46c13eade4f746da75ba6c920 RLBA-2022:2419 new packages: bpftrace Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bpftrace-0.12.1-8.el9.x86_64.rpm bb8221fc3b4adfa43bcece0af8e9da9415bfca2f5ad79fde5d08aa622522effa RLBA-2022:2428 new packages: gdb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdb-10.2-9.el9.x86_64.rpm e13c0f364fa4b20a6b00f17398137a979b09ca372e285c7231c90406546128b7 gdb-doc-10.2-9.el9.noarch.rpm 8b2e74ef52f17acb9c719005837cb5c5a82bd6441dc8b19e20ba0ad920ebf187 gdb-gdbserver-10.2-9.el9.x86_64.rpm a961ed196ee3a8c9726b9d3db114cc1ab5f7f86f0ea5996d5828567913a69bfa gdb-headless-10.2-9.el9.x86_64.rpm ba2509591d3b70078e5ba6e86ebd162a170c2003e847dab8d4b7d217a6750dfe gdb-minimal-10.2-9.el9.x86_64.rpm f64d2805920615e14c0124b155fd27052166e28c178fdb2d18372289e2dbf141 RLBA-2022:2430 new packages: redis Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.6-1.el9.x86_64.rpm b1c9f25e50779e9f8d2c8d0f1e2d70d3c5e76316b04512020016751420e8a5cf redis-devel-6.2.6-1.el9.x86_64.rpm 27443313b7959f81ada2aaeb1cda961dda290d8ae75a6da02a83fbdcbb68be5c redis-doc-6.2.6-1.el9.noarch.rpm e83c5f22219443df4af5bc8de8fc9dc65c0f9d44d3d12564a54c0b45c5e8823c RLBA-2022:2431 new packages: sevctl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sevctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sevctl-0.2.0-4.el9.x86_64.rpm 31912b8d80024104fddfd1daa036e64ae3699e3db2ef45c81de355d5f1f04315 RLBA-2022:2434 new packages: ansible-pcp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-pcp-2.2.2-2.el9.noarch.rpm 26304fd87a2c8e572a2a1eaaa218ccbd3dd9b717aa5a780cd6b82378e5cff81f RLEA-2022:2435 new packages: libtpms Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtpms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtpms-0.9.1-0.20211126git1ff6fe1f43.el9.i686.rpm 32e33f27cd1da423a7a0c36a0e7b937f150a50f530694e36ba2a0ec7d0648c90 libtpms-0.9.1-0.20211126git1ff6fe1f43.el9.x86_64.rpm 4e70709249f45b15d5806cfef879855bc5bb21a44bdcc814add65d3a0ef8e6b8 RLEA-2022:2436 new packages: swtpm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for swtpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms swtpm-0.7.0-1.20211109gitb79fd91.el9.x86_64.rpm e3446191249d328900a2da418d68e6038496b7e82720cbe563677b4ec0e3f8e7 swtpm-libs-0.7.0-1.20211109gitb79fd91.el9.x86_64.rpm e3d347a26824428fd9bc1bd8b7e1bcf5cd07a78f97a9293125ccac7e9f5de8c3 swtpm-tools-0.7.0-1.20211109gitb79fd91.el9.x86_64.rpm 971faee2e93abd38d824c59e62e20f03b61f64af87d03b63f12896551b7ece07 RLBA-2022:2437 new packages: ipa-healthcheck Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-healthcheck-0.9-3.el9.noarch.rpm e6531afd26f8654bdf69be1022e141d61f525138b4eec25ba968fcafbab04d43 ipa-healthcheck-core-0.9-3.el9.noarch.rpm 7a02988ca3ece3aec2cd1b421e21333895ce3aa45d900768ef32f3ba946c2f9a RLBA-2022:2439 new packages: grafana-pcp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-3.2.0-2.el9_0.x86_64.rpm 0ea7f3d6245ffa12218cf12a7257185a82d7dc05fefc3648ba430eb92b993f75 RLBA-2022:2440 new packages: qatlib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatlib-21.11.0-1.el9.x86_64.rpm 99c935aff377b74c1a6c8407137676dcb335676b4da9facb3bf9c39a2963da7c RLBA-2022:2442 new packages: llvm-toolset Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for compiler-rt, lld, llvm, llvm-toolset, clang, libomp, python-lit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clang-13.0.1-1.el9.i686.rpm a9aa4f3062a11267da9d9886007e24bce65d196340f7747db8132518139e1870 clang-13.0.1-1.el9.x86_64.rpm 321a6f8f3fbd5c54220fa3db846eb7c9d504252ff750b767d4f4707b5a4a582f clang-analyzer-13.0.1-1.el9.noarch.rpm 5d5c36589d9ce32ccdc59c563f867ae09486c178dbc077a7fc367fe219a58417 clang-devel-13.0.1-1.el9.i686.rpm 3f5d40165d697b95ee431c58b73ba2ac6a2646d7dde59808af8ae1039d52cb21 clang-devel-13.0.1-1.el9.x86_64.rpm d8fe3fc48863b1c258a95585acc92222e5c03c768804f6d31017e0cdcf628670 clang-libs-13.0.1-1.el9.i686.rpm 77d5ff82dccf89bb0efa47dfe920e1c6b039885b1e212026dc427a459df64197 clang-libs-13.0.1-1.el9.x86_64.rpm 6a0fe8c23cc9fd87da059c93419d270b9b3486343efd8a2ee8468502657be571 clang-resource-filesystem-13.0.1-1.el9.i686.rpm 830e21787599469909cb78864247a9156602410523453e8e8c9eb3671d347963 clang-resource-filesystem-13.0.1-1.el9.x86_64.rpm 04c8e69dbdb75319819c033209ecef645248eadce4ca4141c9c4806c16c0cafa clang-tools-extra-13.0.1-1.el9.i686.rpm 210e042a7f7b0d772df47cbdfd89d493867bae780b00f27e9d7fb6c8abb7705c clang-tools-extra-13.0.1-1.el9.x86_64.rpm cbef86cc317f855db9de67e2d758237318ea9a1de0c17c1cac04a84690a3f0af compiler-rt-13.0.1-1.el9.x86_64.rpm 6276d4bfeb7f7ed7bcb81f72849c096d7e7587b10e289663811631992aafd04e git-clang-format-13.0.1-1.el9.x86_64.rpm be27ed77d9382264a2890ee9138bd3f27e3708e113c373f36fc996c2a3164121 libomp-13.0.1-1.el9.x86_64.rpm 6c005c136a0c9b3d7feb61a8cbf10d56407ad83afc823378d773b9d8bb2952b8 libomp-devel-13.0.1-1.el9.i686.rpm 16bda9808820bf9325eeae636fa37004056915efb4f259ddb47feaf0d138d284 libomp-devel-13.0.1-1.el9.x86_64.rpm a244250af8533a5229c55e34dbe48210b81d80f671f8ec693eb5b3ce5ec2eb32 libomp-test-13.0.1-1.el9.x86_64.rpm f2e5e82446a7c2bbdb16988a6f661098d0d641f3d29b9df17ba9613da712330b lld-13.0.1-1.el9.i686.rpm b085f8e6960db7795de04f147063f4aa6c622fdd884943eb9e1954dd1e6a1a32 lld-13.0.1-1.el9.x86_64.rpm 2e9237a7908d756f1fd59e1a2309e591ce005eb29cadcdec3d679bdbafa60b5a lld-devel-13.0.1-1.el9.i686.rpm fc39aaac9d2706d6ac3f958161aad15c93b7cb31a65dc287500474a3e4fec443 lld-devel-13.0.1-1.el9.x86_64.rpm 520c49c5fd76f06e34ef4e248a17d27543c774a8a2ce87d871f8145f778d7d64 lld-libs-13.0.1-1.el9.i686.rpm 643c0d0d55b0343786f1c7fd6a7a9fad976b5c7431bbe3eaf0357603da69a694 lld-libs-13.0.1-1.el9.x86_64.rpm 2921a29e2f7bc4c4dfcd13d9e447570ee2e2c383ba8aeea0aefde8c753f68226 lld-test-13.0.1-1.el9.x86_64.rpm 48971201d29d92c05ab4b2b8ea1e516a6508179bee7cc6b24dd758f8affcfa8a llvm-13.0.1-1.el9.i686.rpm 0b82202cdf1359d973c79a5cbdf7ff89ae4ee7fdcb40933b8d141bb624cfdf60 llvm-13.0.1-1.el9.x86_64.rpm 35b477b8090cf4cc69c2d139efdf897bdfbdb9f4fcc30e71f0a784716651a5cb llvm-devel-13.0.1-1.el9.i686.rpm 863d92eccebd49ced9cc72f32d343553e90604bcd2ca974e29a8f8d1e31eed4a llvm-devel-13.0.1-1.el9.x86_64.rpm b4eac3b2988ee28df374321b2fff7c4b1e54767e546d075668738bddc2c1e930 llvm-doc-13.0.1-1.el9.noarch.rpm b5a7c69c3080fb4c445f4dadc02b5a15fefa03ad7273c302eee0daa56edf5f56 llvm-googletest-13.0.1-1.el9.x86_64.rpm 1dfe43eea1e6629ae34dd44de5a84cd76b7058ca66c5c3fd80179116af2b6246 llvm-libs-13.0.1-1.el9.i686.rpm 1c00efccaf508b91725d4ea0248ae22ce727c496dfb8c4356e0908f754b414bc llvm-libs-13.0.1-1.el9.x86_64.rpm c7cd1112e69a6e93c111e23a786145d3e3ef1a08954001ed01d10ef024919fa3 llvm-static-13.0.1-1.el9.i686.rpm 9dd8ec2ce3e81a78f840e8dd8a6c49bd10736502cb8e3b688d2861d3dd81b5e7 llvm-static-13.0.1-1.el9.x86_64.rpm 85123e77cce258618f2a9b65c0804d4223793245d8ff416c9184dc3eacc5f75a llvm-test-13.0.1-1.el9.i686.rpm 2de42ce4cea68bb97c7d6dad0db47670ccf96138255b2d4434568d0dc5e6dab1 llvm-test-13.0.1-1.el9.x86_64.rpm 2abd6858fcb09a7b5372c53942ffea3e2506dc559c40d452066bd82bf70d67bd llvm-toolset-13.0.1-1.el9.x86_64.rpm 48429ffd1b074b7359cf38ba9a85e4616f84206fe90c9fdd4d755a8c71d31fbb python3-clang-13.0.1-1.el9.x86_64.rpm 7dd13fe753c326d7131ce7baea21fd4964fecf53774100d333e881b03854d00e python3-lit-13.0.1-1.el9.noarch.rpm 68567a9ff6601338e1904044611d5a26dcf4dc428c190cfdd0a91596377d19be RLBA-2022:2448 new packages: fontconfig Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fontconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fontconfig-2.13.94-2.el9.i686.rpm 0f3f5a399f518bd107a5ef1b50a2c68b4046241f685feefdce40b4e867fe4e72 fontconfig-2.13.94-2.el9.x86_64.rpm 5654a435ea3af695337d57eb85ec5c043102dca5d240f2f0dd7a5a434a78376f fontconfig-devel-2.13.94-2.el9.i686.rpm ee8d1ed4c35df3c11f167e2dd5f9b2e182ea22107897cbf36428dac3b29dbd99 fontconfig-devel-2.13.94-2.el9.x86_64.rpm 3d8726efeb8f87a696a8e1c229b947f21aa77e1a061abe6976f747c729de5bd3 RLBA-2022:2451 new packages: clevis Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-18-102.el9.x86_64.rpm 3eb7e23cf42c5bbae1e34dd0f89577d2b0c2b9109591e8389b124a5675240937 clevis-dracut-18-102.el9.x86_64.rpm fd55104597dd35ee13235a9d801f538310e7cb4dc0346c6ffe784a5e577ef582 clevis-luks-18-102.el9.x86_64.rpm 0f61aefeebbeaf59d54578b777c153f400217c86e9c253c49651664b1dfc6c54 clevis-systemd-18-102.el9.x86_64.rpm 8a8efbc2ecf0dbc4f188daa7da9f853cf1f1dbf6f45bcd5015ad1ad71a68feb4 clevis-udisks2-18-102.el9.x86_64.rpm c5863d8920c34bbd44c18316d38f60bbeeddd79a8ad457de89e18d2893fc657d RLBA-2022:2454 new packages: golang Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.7.3-1.el9.x86_64.rpm f202dc653c36d5fdf64ff74d157f117d288df5803228298d23a420f25de5b054 RLBA-2022:2459 new packages: hyperv-daemons Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyperv-daemons-0-0.39.20190303git.el9.x86_64.rpm df44648cf108def658e4d20cd7c73994829da8d654c6321c05654b743b701d2f hyperv-daemons-license-0-0.39.20190303git.el9.noarch.rpm 950bab98545678f95b2ee398b1bbf9657674ee3fe9a2117c744ab4bca0dfddc1 hypervfcopyd-0-0.39.20190303git.el9.x86_64.rpm 8e721855a5c25e0a6fd510a833bf9019f8d35874b098682cda246c08887356f5 hypervkvpd-0-0.39.20190303git.el9.x86_64.rpm d1db645a8251d6f6eb777cc2f974f82ceb255a8812a02a609a7ce4ff580ade93 hyperv-tools-0-0.39.20190303git.el9.noarch.rpm 6140f0dfe367b635c986b7bfec0e89a33b2ddeb0492f3d1864c1617ef13d5586 hypervvssd-0-0.39.20190303git.el9.x86_64.rpm d7875a6ec1ed034a815357614e3d74dff76b9bf5eed125c7f51cb69456ee2b60 RLBA-2022:2461 new packages: guestfs-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for guestfs-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guestfs-tools-1.46.1-6.el9.x86_64.rpm 56e9b3394563a250e7e1cceadf578dbb6b4a189bd96630523862a391349fa6cf virt-win-reg-1.46.1-6.el9.noarch.rpm a324a40c942eab1fe578ebc4f3f7dc0b0c196f8ccb0764c327582fd0e07d11bc RLBA-2022:2469 new packages: redhat-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-display-fonts-4.0.1-3.el9.noarch.rpm 0198394746c5525afc05985a3498309e12d956ce9ef9bf365c2ea459765b94e8 redhat-mono-fonts-4.0.1-3.el9.noarch.rpm 5a8055188f1a751b3a6f5bfd476cadcb89ce921bfb6e7568186e81b055df9944 redhat-text-fonts-4.0.1-3.el9.noarch.rpm f496a4aac0e95a46ab995f263c9d467b87e28cfb0f82432bcd246a83556f10c4 RLBA-2022:2471 new packages: corosync Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for corosync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms corosynclib-3.1.5-3.el9.i686.rpm cc89f457fcc4b12aa73f8bdd10b16ff98f8ef6a1542dd40444d9e6e0b545ed52 corosynclib-3.1.5-3.el9.x86_64.rpm 9d7ed8f9093bbb9e424a62964878704dad94a5f6e923411e310ac7f4a07e8a0a RLBA-2022:2472 new packages: gjs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gjs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gjs-1.68.5-1.el9.i686.rpm 4ca883796facd23ed447a2c793e392619700fefabc0d7fabbde6f170ee571002 gjs-1.68.5-1.el9.x86_64.rpm 6650f702e7c8a160dd5a6a1fb3d736487a6fcd468b1f4498c32a6599d12c7840 RLBA-2022:2473 new packages: qatengine Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatengine-0.6.10-1.el9.x86_64.rpm 69a257dfb16c2ab45aa58200b32e3f6aab44cd2d45c60cafc608d73be5aa196e RLBA-2022:2475 new packages: smc-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-tools-1.6.1-1.el9.i686.rpm 9abc5088ab86c49bf0b51a0aa67713830c62d77e163ff27799c6abf87ee5806b smc-tools-1.6.1-1.el9.x86_64.rpm f8c3b4d81e70955cbdbee1e6a4eef1b8f7fc82f8efcfb4a2c486d0de6e6d85cd RLBA-2022:2478 new packages: certmonger Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms certmonger-0.79.14-5.el9.x86_64.rpm 7c90bd2abf582d671002019418dc79027dc3bbd41835bcbe42433a0dbcfb3186 RLBA-2022:2479 new packages: crash Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-8.0.0-6.el9.x86_64.rpm f3bb07903e3581e754d5b4dfca0587a1aa02f0f42d9ec267dcdb61037b5ae8c6 RLBA-2022:2483 new packages: tracker Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracker. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtracker-sparql-3.1.2-2.el9.i686.rpm 01f9b6d31b71e5ee49dcaa417c5d064677cb8b95614a9dcd23112b1a32fe1f04 libtracker-sparql-3.1.2-2.el9.x86_64.rpm 25d736820737acd2bb13d0225b7bfab998029c9b9d4880480808fb11c210af2d tracker-3.1.2-2.el9.x86_64.rpm 845e97eb687ec2dde26aaaf3194f1f85d08053e0b7e921c61f5966b0d0bef5ec RLBA-2022:2485 new packages: oscap-anaconda-addon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oscap-anaconda-addon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oscap-anaconda-addon-2.0.0-8.el9.noarch.rpm d96d32f160022009b320557a214fc42eed59977dbd73e0d1e6c495529fcaf758 RLBA-2022:2487 new packages: tigervnc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.11.0-21.el9.x86_64.rpm e98618acc92cb6cfa196bac843a20c94833f54015bb556074eb850b5e8ffa936 tigervnc-icons-1.11.0-21.el9.noarch.rpm 97da95f0a0f599c21c5b41c3b4550ddd809ff21e497cbc469d405d6d11fe5145 tigervnc-license-1.11.0-21.el9.noarch.rpm 7c78a77ef258979b2dbfac72318cad55dedcca3b13a803a372e20efff1e3f965 tigervnc-selinux-1.11.0-21.el9.noarch.rpm 8ab19ebb0a7a4c0011ba6972e4a7040f0aa7c4baae378c61e9447fb882b8acfb tigervnc-server-1.11.0-21.el9.x86_64.rpm 28315bd30e1f00cda19815fda6e6b32f28195f10ed31a706b061b82d143c53a5 tigervnc-server-minimal-1.11.0-21.el9.x86_64.rpm fe870c77e1396950176c6dcc9aaab95f21e2478b7d2a5a30520152da959b6d5e tigervnc-server-module-1.11.0-21.el9.x86_64.rpm 6571a6db56b76f5a4081ddfc80058b4353a4758763709dc6758084410f030d23 RLBA-2022:2488 new packages: supermin Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for supermin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms supermin-5.2.1-7.el9.x86_64.rpm 741b3e47002640e79b01b14025d1c2dc5dc78c328c1db72cb53494294db51bfa RLBA-2022:2489 new packages: cyrus-imapd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.1-6.el9.x86_64.rpm 49ac6145e28b385631a049afb61685c6786593eaa703400ecfaa3b0c20a0a123 cyrus-imapd-libs-3.4.1-6.el9.i686.rpm 86ff3f86e3dc2f9c86981853258da25e344a7bbec02d4fae7a878bf2d52c8411 cyrus-imapd-libs-3.4.1-6.el9.x86_64.rpm 6557a991dda2f0dff77a7fafe6527cb060ea34168c3f6ba03edadabb1dc23ef4 cyrus-imapd-utils-3.4.1-6.el9.x86_64.rpm e401e69c05ad3d14af86f5cab211bafb432372b6507a072a190300a46e83bd8c perl-Cyrus-3.4.1-6.el9.x86_64.rpm a1a1a38cf34882462c2fc47bbaec405657fb9e553929d645108679e14095e6c4 RLBA-2022:2494 new packages: python-blivet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blivet-data-3.4.0-13.el9_0.noarch.rpm c240179a9d18de08d4767703e1b71a721e92a242318fe864ebfd56b62b7b4aec python3-blivet-3.4.0-13.el9_0.noarch.rpm 0ccb335fb4745624a9d2fbca11145584c92dcf411a60139530d1a10fe54ae13d RLBA-2022:2497 new packages: ldns Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ldns-1.7.1-10.el9.i686.rpm 30e2554ab7b01a58527e6ec10e6acbed1202c39f038917fc3128aa03b363653d ldns-1.7.1-10.el9.x86_64.rpm 0803c29f61bd5404f816b71207649f1d42014536563718c47e6c55719d7da3a3 RLBA-2022:2498 new packages: realtime-tests Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-tests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms realtime-tests-2.3-3.el9.x86_64.rpm ff544a00fefb914644104cf78ee3931a183a6e8c5fe7a7fac718e2ce4a82da59 RLBA-2022:2501 new packages: bind-dyndb-ldap Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-dyndb-ldap-11.9-7.el9.x86_64.rpm 6273ca331bb38e654d5e31500685dba1cc42326ae1900cc5e4e94937e295d8fc RLBA-2022:2503 new packages: libblockdev Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblockdev-2.25-11.el9.i686.rpm 2b551d8ecc92262133aff4ebe42dda0dea6af6ba50eaf79011b92f7ad48a00aa libblockdev-2.25-11.el9.x86_64.rpm 42faab6d85c6b038f291b990cf7bec07da4880b25aa85c1f2bd6215df02ca98a libblockdev-crypto-2.25-11.el9.i686.rpm e670e854ca3aea3287e7f45dab7e930170c19ea3bd28437934a7310fcc2a45ef libblockdev-crypto-2.25-11.el9.x86_64.rpm 6111fb907a1412702ac2106a8af845f33b64c019a21c74fbca7b7683c9f3abdc libblockdev-dm-2.25-11.el9.i686.rpm bd5f09c4dd0eb8afd755a94f9bf2972ba00ed8ef196105562a0be4e417c9d130 libblockdev-dm-2.25-11.el9.x86_64.rpm e3420e6bfb65c756cc16923c5d09299bd76b2adead7c0ccfa9317a2d8d3de7b0 libblockdev-fs-2.25-11.el9.i686.rpm 2e20f7dc10a99509b1b4a1a682d86c5d8f746f997ba7965603fa765cc471e621 libblockdev-fs-2.25-11.el9.x86_64.rpm 3ccc27e3c270d8aa00215a9a7818216e791aafe162b90eba0b13e1656faccf13 libblockdev-kbd-2.25-11.el9.i686.rpm 63c0df2c2d0dff8187163b092d8adbcc3a3b9e693782668d31d3a0e0c64210a6 libblockdev-kbd-2.25-11.el9.x86_64.rpm 561c339b3a20b618118a1070c0476cb34df91b67bcf392e59ba9bc126547142f libblockdev-loop-2.25-11.el9.i686.rpm c431cbef7f4de840ee26215a0c7862fc624f95483b4a0db2b1f6c943f877777f libblockdev-loop-2.25-11.el9.x86_64.rpm a19049d15770aebee51ee2b7851bd8f90b9465ff71f1b1376bfea5b68a76b757 libblockdev-lvm-2.25-11.el9.i686.rpm a309392127066b4c62127375bb3561087f3b1fc162a87bb20a0bad1bc1f421be libblockdev-lvm-2.25-11.el9.x86_64.rpm ae33a88fdb89c057a826943797e1602e7552e095b3cb0deb8613c76c1f99d718 libblockdev-lvm-dbus-2.25-11.el9.i686.rpm 4b928da1561707ede581ddb1af5616482b2506ff5993a46c52cb86cdd68a91a6 libblockdev-lvm-dbus-2.25-11.el9.x86_64.rpm f418c864f2a8e0e4cc4aed5b7dd5386e5a5030c83e6a133973d805e6c69549aa libblockdev-mdraid-2.25-11.el9.i686.rpm f24447054f1c809590ea6e99ce83fb0b8048a4a204350bab2d6ebffec3cc636b libblockdev-mdraid-2.25-11.el9.x86_64.rpm d0f0ed42e515c8f79b4b10b46ee5343111fd0d5bfb61a70b0782cfbf444165c0 libblockdev-mpath-2.25-11.el9.i686.rpm dc90a386eb132ad2e4c5643542baece380aad1e89a9808ca5a2f57e04ded27d7 libblockdev-mpath-2.25-11.el9.x86_64.rpm a0056cfe8ff073edef7288d2303fecdebdd1c61341923fb4b5fd7227acfb7a08 libblockdev-nvdimm-2.25-11.el9.i686.rpm 0bf602e340ff01a2e81d3d1e43e85f7989bf4748e5d2344e48d48c4a656c1af2 libblockdev-nvdimm-2.25-11.el9.x86_64.rpm 337b990532a29784c353a4356da134b62e057220536d3616c6a38d943c2f3012 libblockdev-part-2.25-11.el9.i686.rpm b888242f02fe3b01efdf0e4469ccd6ad0ee0ffdd31bf3a0dd9a64c069469d7b7 libblockdev-part-2.25-11.el9.x86_64.rpm 75434a7667f3b9820e8347ff2fbdf6299a0d6087166dba8961500f991ed05976 libblockdev-plugins-all-2.25-11.el9.x86_64.rpm 3b70d5a5d514edfaaa2ad7442b2c3c20770a78d7d5465aaca42a3d80cf725340 libblockdev-swap-2.25-11.el9.i686.rpm 44bf462ada1d29cd508a6589511984bc48bf60ae403da5d925e52547d195acc7 libblockdev-swap-2.25-11.el9.x86_64.rpm f40ab383b611fb6c9fcd4cb901c240f831603d90a103358c83d0976f606c3814 libblockdev-tools-2.25-11.el9.x86_64.rpm fc7149bc52f6f09a9fe5eba450167dcb92e55a69776aafd54773c54ffe77fd5f libblockdev-utils-2.25-11.el9.i686.rpm 8098971c68dfbc05e11b5fc7429684ea99c815798fca2be1762116e61c34e1ec libblockdev-utils-2.25-11.el9.x86_64.rpm ccb07f76f06a76d8f50436cfc23863270d0520d53537ff7d0d4df9cd2cf640e2 python3-blockdev-2.25-11.el9.x86_64.rpm a21a37fa6fb2c544ddc76b083660087e7468c0b1853702830e55fd0654bdbb2f RLEA-2022:2505 new packages: rpm-ostree Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2022.2-2.el9.x86_64.rpm 063038ac1e0554dc6f8a265ce1ffaed706e5da4308122369a1ed16a8ef483090 rpm-ostree-libs-2022.2-2.el9.i686.rpm a64018b8615f35f6c2d47d441705ba82d45e5ddbf7f56848a62c86753a9dd8e3 rpm-ostree-libs-2022.2-2.el9.x86_64.rpm 4e937ce30eeb0ab84d987ffe5c30d3e8d6ddfc292a4e7f5d1f04228cd58b610d RLEA-2022:2507 new packages: dpdk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dpdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dpdk-21.11-1.el9_0.x86_64.rpm 93db3afecd7ad4307af5dd85319849e902d57a872ec152f8fbaaf9145e9f6d9e dpdk-doc-21.11-1.el9_0.noarch.rpm 1f2c143993d26b0cec3b6782d2b55193f8641977bbe934537f0ef4ae7ec3fd0f dpdk-tools-21.11-1.el9_0.x86_64.rpm b7d94034b13bd8377000490c9a562e937b129186a842f3024f3106b66604e18f RLBA-2022:2515 new packages: virt-manager Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-install-3.2.0-14.el9.noarch.rpm 75c38a59eca492e0522496e3d36b5727573cfdcfcf805123dd51484685ca867f virt-manager-3.2.0-14.el9.noarch.rpm 31c3cb7ee4b3131fbb5ca05b65ad759659c2a6133ec6ced23e1826f9e60d7bcc virt-manager-common-3.2.0-14.el9.noarch.rpm c7e89f6dc5914afca0534c3f80c995f4f37b46c61f37b2f4f57940d5267938d0 RLBA-2022:2523 new packages: cockpit-composer Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-composer-36-1.el9_0.noarch.rpm d029c246364f8b4a504f34eda89f5c451eb89261431b6782215085c437f1b76c RLBA-2022:2526 new packages: qt5-qtserialbus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtserialbus-5.15.2-8.el9.i686.rpm c35c3fe3f4718ed18e029243ddb45a5e9291ab525766a16b78b2a5265d68d8c5 qt5-qtserialbus-5.15.2-8.el9.x86_64.rpm f3297b0052a6c8a64a55ceaf6182504035cdfc2a2ba61d3ef3eeea9b41c2d0e2 qt5-qtserialbus-devel-5.15.2-8.el9.i686.rpm 6185daa443baf08b3d983208e402484ea503aeab1f02dd2a2b219e2be471211b qt5-qtserialbus-devel-5.15.2-8.el9.x86_64.rpm bf1e7c6b7d74222ef5bb3b5ad5fb9e6c1fa7b12a00556d1ba3257265cf58100d qt5-qtserialbus-examples-5.15.2-8.el9.x86_64.rpm ac32368237cb546edda833fe5bcd7f73418493b8ad0c14db905ab978f8d76637 RLBA-2022:2527 new packages: qt5-qttools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-assistant-5.15.2-11.el9.x86_64.rpm de3f795dddd66b6bcc24c494ba5d1cc4fd3a88375bea8bcb157f1a619b9b305e qt5-designer-5.15.2-11.el9.x86_64.rpm 9e08ac0ccd55b431f6db90018f891c509d1123a0bfbad2860b42df962fccd9db qt5-doctools-5.15.2-11.el9.x86_64.rpm a21f5529afac405f454bd59056f96340be8745e0db66437aad08bfaba78d6192 qt5-linguist-5.15.2-11.el9.x86_64.rpm 83d6ef800f157c7cfc69b4dde9f982a2daf0615bd7fcecfaed971d11ba4541df qt5-qdbusviewer-5.15.2-11.el9.x86_64.rpm 3f5e7b0be174d02a9a789482252f244664679a2be8d6b015fde956aecef164c5 qt5-qttools-5.15.2-11.el9.x86_64.rpm 1cd9e630af0c01b3226ed0b0ab0616cd231947b51da5dcd910c26413045b0bbe qt5-qttools-common-5.15.2-11.el9.noarch.rpm 6c845125311b10007f4c66aeddbab364bc930ff87f15302cc396c52819c6c2f0 qt5-qttools-devel-5.15.2-11.el9.i686.rpm 06a2cf3d259344be8826b8b6efe9a6ee8a0c44dbd40d1e78f45a96d34ee849a1 qt5-qttools-devel-5.15.2-11.el9.x86_64.rpm 3dfa41b59571e6a474dca4456c41cf14594084c82acc7122292839222e288652 qt5-qttools-examples-5.15.2-11.el9.i686.rpm 82763623819dc091cdecfa2309feef329bd8d34c64833b0f926b4d43550a114f qt5-qttools-examples-5.15.2-11.el9.x86_64.rpm 7a53a1f9c6e9e68aa37d0b922308621e6db85604a7c8931f98f47ad95818de92 qt5-qttools-libs-designer-5.15.2-11.el9.i686.rpm e966bdce17159fca4dfc310a91315ce50b8e4c491dd2a3bf8dd487feafe26b7b qt5-qttools-libs-designer-5.15.2-11.el9.x86_64.rpm 2be69a26a92a9d440742ab8135245c069046c11894f37127e52f24f7324fd7f1 qt5-qttools-libs-designercomponents-5.15.2-11.el9.i686.rpm 299c5d256026b4efaa74cb9c16b846f18b1040ba88660049ea4482725cb6b056 qt5-qttools-libs-designercomponents-5.15.2-11.el9.x86_64.rpm f7597ae5983323994b84552756ad4723dd0c6e899046eb4bfb16f5e6e334edf5 qt5-qttools-libs-help-5.15.2-11.el9.i686.rpm d317ff76da508f7e13e8cf612d9a9e277e41088243a5c8e58539ec80ae675ee1 qt5-qttools-libs-help-5.15.2-11.el9.x86_64.rpm 5cc6716643a775939e4e3bc50fdf390803c68892472ecf3fe6c8641a2dab17bf RLBA-2022:2535 new packages: nautilus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nautilus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nautilus-40.2-7.el9_0.x86_64.rpm 22df9a3eed85563ad0ff215702a33f864a395bc866894c7756a001d831ac42ba nautilus-extensions-40.2-7.el9_0.i686.rpm be0f14fed044e390ab4eab7d361efcf33f779e36df859ee95b58510bc01ed333 nautilus-extensions-40.2-7.el9_0.x86_64.rpm b4a9df03069ba3a8243bb84dcc8e41424e8641e355d0a21d1976850f3c3a83db RLBA-2022:2538 new packages: alsa-lib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-lib-1.2.6.1-3.el9.i686.rpm 68c55cb132e6e72ff7fac79cd081bf06c0a03bc2e66cf7ede743a972792e02a6 alsa-lib-1.2.6.1-3.el9.x86_64.rpm fe4abb8bd85807440be17e45bda52b62ed4eacc78f1d08c48e499788425e6845 alsa-lib-devel-1.2.6.1-3.el9.i686.rpm fffd6ea738b077eae1a9328e05ffea51196c6266d11030a7c66457fe98f7114a alsa-lib-devel-1.2.6.1-3.el9.x86_64.rpm 5104a42e9ba462fede89682167286697815770906c20d3493e1552700305a979 alsa-ucm-1.2.6.1-3.el9.noarch.rpm 8feedd4e68c468d46e6ae2070fdd0a834d2a6cd66f00e16dc5cbb2aa9d28b134 RLBA-2022:2541 new packages: nispor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nispor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nispor-1.2.3-1.el9.i686.rpm 28e89eae1316c92535940c2e7690d00057814e850c1d854e81a1f8eb698f5df5 nispor-1.2.3-1.el9.x86_64.rpm 8328174fc34cbfa5b06c3510988fd7098ab985319555688c9a6f877441e50e8f python3-nispor-1.2.3-1.el9.noarch.rpm 7646fb16d9a9ae058bb75fd6ddb6dd48d8ef67961dde3cba7fa7222e09a3826d RLBA-2022:2542 new packages: usbredir Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usbredir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usbredir-0.12.0-2.el9.i686.rpm eb3851d1cdf83f5c05689421765ceaaa3a2b39a8ee648dd949170a179e8f27e7 usbredir-0.12.0-2.el9.x86_64.rpm 401cb6ebe40d2ce5de6ebeb1c36d7d72584e1b433e3aa5f1cdab5cb7f8c09863 RLBA-2022:2544 new packages: redhat-rpm-config Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-rpm-config-194-1.el9.noarch.rpm eeb729c6d59b314b65de0adbfd1992e270783501635b471885d9d805aba8e859 RLBA-2022:2548 new packages: stalld Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stalld-1.15-1.el9.x86_64.rpm c54f9380b073f1623aa0930584d0fed7a04c84c9fb205089bb2d3f6c60bde255 RLBA-2022:2552 new packages: memstrack Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for memstrack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms memstrack-0.2.3-2.el9.x86_64.rpm 7abc18d65269a514de9ff2b00a41037d63441b2f429cf47a76329402a2014890 RLBA-2022:2553 new packages: libqb Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libqb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libqb-2.0.3-10.el9.i686.rpm 04dd996bc306903647735bcae889b274b1908ceb2be28446fedc1937c5eb5608 libqb-2.0.3-10.el9.x86_64.rpm 4ba23fad606a9a3e9a4d59cdccbfb5f6ced85c323edea5d53f519a5bcc6f2903 RLBA-2022:2557 new packages: esc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for esc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms esc-1.1.2-15.el9.x86_64.rpm 1ab3453d72472ed475a12aa4300356bf0392e9f8307a5ef121906143d8d59cc1 RLEA-2022:2559 new packages: alsa-sof-firmware Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-1.9.3-2.el9.noarch.rpm 0d7acd2e6cb3eac1c8bcaaa0ab967d06cfd717f71f2e306a51a998ac923d4d53 RLBA-2022:2560 new packages: osinfo-db Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-20211216-1.el9.noarch.rpm 2d8b5056f999119410dc8363b9780f4b1edb4787325abb1257dff4568287a3e8 RLBA-2022:2561 new packages: xorg-x11-server-Xwayland Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-21.1.3-2.el9.x86_64.rpm 74d92ec1bfcd341d877fbd8497f89217cece2000618cf995785419c2df5aa048 RLBA-2022:2565 new packages: augeas Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-1.el9.x86_64.rpm 3c9752777183f683dd34f5f81d790d8e40cb04e313641f7ab4a31df2d5b6502b augeas-libs-1.13.0-1.el9.i686.rpm 2c37570f86ccf0ecf434c61dbe6c24accc7df178d06655e4cd55015b4ed15c39 augeas-libs-1.13.0-1.el9.x86_64.rpm 138ed9c3c3a2f92c1f3a9910b459e0b10116e37ff08348dc2a794a79ba20e969 RLEA-2022:2568 new packages: xdp-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxdp-1.2.3-1.el9.i686.rpm 34b4338c330afd0b3cb65bd69528a6f8dbb1fb29e1cd7c85a4e4d40ff1ed9c29 libxdp-1.2.3-1.el9.x86_64.rpm de8313f3924b79863da3b4ff85842c20ddfafa9840f64dc399c30b2aed21bd46 xdp-tools-1.2.3-1.el9.x86_64.rpm faec536489ff079bf278f7eb570c9d014815418984f6a6a819cfb75bced2815a RLBA-2022:2574 new packages: mesa Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-21.3.4-2.el9.i686.rpm 84feec3d754c42ffed453ddf7c6ed36cf62cf8e934e82d691e3ae0623dfb03c1 mesa-dri-drivers-21.3.4-2.el9.x86_64.rpm 5fcfed11f50800b810ef10b77d4413f63c24d3583ce4a103d7fbc553bd91edd2 mesa-filesystem-21.3.4-2.el9.i686.rpm 1a4fe71e376451cc90dde24c8f8ea25f34cc389b8b9bde106fe2a999fc3012a5 mesa-filesystem-21.3.4-2.el9.x86_64.rpm 1cb79e50963326b8c3df4be31d93a99a398ffa486194e9871bfbff5d9687656a mesa-libEGL-21.3.4-2.el9.i686.rpm 69d5f5554d621b30921a13618b0fe123aff0c586bd891a18829ae28f37f92890 mesa-libEGL-21.3.4-2.el9.x86_64.rpm 73c69ece723cc42267a367f45557530218f055c81cf524b308c00a2b0441de28 mesa-libEGL-devel-21.3.4-2.el9.i686.rpm 60a308d1457a87b3cada796d9d617f2b6fa9f67fca3241f819f5dc867ea3632b mesa-libEGL-devel-21.3.4-2.el9.x86_64.rpm 9c6046ec6c4984970c241cb8d8102011acd258c68e7fef9ca5bacf0d1f2b2bd8 mesa-libgbm-21.3.4-2.el9.i686.rpm a4fd1c718fc305227518724629757831273a88e6fe6c0fc435cb52c67b93f422 mesa-libgbm-21.3.4-2.el9.x86_64.rpm 4d6bcbd5aa89d8552345df009d5fbc4a6e564317c5ed7bf2c875ac67a32c40cc mesa-libGL-21.3.4-2.el9.i686.rpm 2fb17e64f65c742a9625e0f5d23765499debbe3e1f1daea31220356caaa3c9f0 mesa-libGL-21.3.4-2.el9.x86_64.rpm d28865556d5ecd2d1001e38fd6aa9db7a495c250346d34ddcefbcb74a96f0a9d mesa-libglapi-21.3.4-2.el9.i686.rpm 97d8172eba5ee79892849e3ec050f541e35bb15e0d155392506b0d3ca16ee27b mesa-libglapi-21.3.4-2.el9.x86_64.rpm 1eefe74e455b78cfcbc62e2f53864519415841cc0493a1da879d01443a6b83e3 mesa-libGL-devel-21.3.4-2.el9.i686.rpm 898da6a44235a9b9f03c00a5b16971d9ebc91641b7a56883d35c101cc81aaea0 mesa-libGL-devel-21.3.4-2.el9.x86_64.rpm f098a74f01e060c2a358b938900594f719c6bd5f233b05c48c673344bee1df83 mesa-libxatracker-21.3.4-2.el9.i686.rpm 0d32802100ba29346e4dcf514ac3f414a7bead8d3ae69af7b4a60e7f7baf43b9 mesa-libxatracker-21.3.4-2.el9.x86_64.rpm ad760c3484e3b072c794979af3e6fa20c7f1265ee731f4822b6246c33adb0861 mesa-vulkan-drivers-21.3.4-2.el9.i686.rpm 50b445a24d033388f94ffd539eab6a5520263e8720cc40a37010b52e34233fb7 mesa-vulkan-drivers-21.3.4-2.el9.x86_64.rpm 9bbf921af94271a13179cab4aa095a9cd2d905abd01accffc508ef20d2532b87 RLBA-2022:2577 new packages: stress-ng Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stress-ng-0.13.10-1.el9.x86_64.rpm 3c432b2c0af4477bc2098629cf0a0576b6fa756344aba8f9dc12ee6db47a2f83 RLBA-2022:2583 new packages: ignition Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ignition-2.13.0-1.el9.x86_64.rpm f37c57d59739a7ab9a4ecf570d16ae96a32654285f35360ccaec6736126136d7 RLBA-2022:2584 new packages: ansible-collection-redhat-Rocky Linux_mgmt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-redhat-rhel_mgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-redhat-rhel_mgmt-1.0.0-2.el9.noarch.rpm 1bb72cf17539dded72900e2ab528da2ee6c0fb923c4a5a37470ea79529e977d2 RLBA-2022:2591 new packages: setroubleshoot Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setroubleshoot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setroubleshoot-3.3.28-3.el9_0.x86_64.rpm f23bfc920a70c85832a8b32ddacbc6930690c38724864f5b68c855638d431e09 setroubleshoot-server-3.3.28-3.el9_0.x86_64.rpm 82d6acd48eb5645003212df8e558ec89af21fe12ec35684e292a1043d0ff0136 RLBA-2022:2592 new packages: perl-Net-SSLeay Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-SSLeay-1.92-1.el9.x86_64.rpm 2f4435b5c9df8182d5dd6248cd89c5fb89318ba94f6a377ee79af0dd256abdfc RLBA-2022:2596 new packages: egl-wayland Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms egl-wayland-1.1.9-1.el9.i686.rpm 440a707648620cebed48c548df00473a3ca499b0c3f6c1a4ae38659195a1ab8f egl-wayland-1.1.9-1.el9.x86_64.rpm 9a544041acfa7c6fa7a9885966285be125060f9ed042fe49651bf3882525f048 RLBA-2022:2598 new packages: postfix Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postfix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postfix-3.5.9-18.el9.x86_64.rpm 5ec9fad8d0b0315299db53dd9e5981a13915abb9b89eb6d2376e1ad5d2675407 postfix-cdb-3.5.9-18.el9.x86_64.rpm ebd0c6cf4d4b622f67039e31c8c4d2f52c9c741a14de5ec6b48b3661dd5c52fa postfix-ldap-3.5.9-18.el9.x86_64.rpm f0acf2775bc045371b3a732565bec108eca1e1b18a1da99af0b4332bc8de34ee postfix-mysql-3.5.9-18.el9.x86_64.rpm 64c5189857f82e88a5f522ee5ff435e323f8187b811f657f6ac9fafe16da33c9 postfix-pcre-3.5.9-18.el9.x86_64.rpm 4f1071f005345d7457a9ff79fe85be786b33266af8cf784e9715e84b2c6369bf postfix-perl-scripts-3.5.9-18.el9.x86_64.rpm 1d32a0c8e0314dc9fd8f60848671d9f77b5c80adc1ccf73b450f51419a4588d5 postfix-pgsql-3.5.9-18.el9.x86_64.rpm 75752782be3574d3cfd5f461d20f149e2f6341a335e7d124c2a060e9170779af postfix-sqlite-3.5.9-18.el9.x86_64.rpm ab77ef1d3b16a9105c1871a7df4758d94dae125cd47a0354ea14092e1fe22445 RLBA-2022:2621 new packages: tftp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tftp-5.2-35.el9.x86_64.rpm c0dcb00d07f8019b98a18a719104e4aa25ac3523181315f74adb81108b975276 tftp-server-5.2-35.el9.x86_64.rpm 9e8ab4b8ca4ced37ca542e07715185dc09b63b98397f0b4d04f45898bbf2a8d0 RLBA-2022:2602 new packages: qgnomeplatform Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qgnomeplatform-0.8.4-1.el9.i686.rpm 8b817ee12392c86440e39b44d6bedd581ef7bdcc9b9b4cc77774d8eb30eddd5d qgnomeplatform-0.8.4-1.el9.x86_64.rpm 0d0e67cc2842e7d45b7f64022fc5015adfb157851339a0a443c1c14a8c234f14 RLBA-2022:2619 new packages: mutt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mutt-2.1.5-1.el9.x86_64.rpm 39a3c573e3f1c3d82fe843c08e324b43e30d6b8f456d6b2ae7c8bd3de5f2f6b8 RLBA-2022:2622 new packages: oddjob Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oddjob. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oddjob-0.34.7-5.el9.x86_64.rpm 48c4168eb48f6407a28fccffe5ecf4c2ec6bd9ed67279d08e82e550d8742d8ad oddjob-mkhomedir-0.34.7-5.el9.x86_64.rpm 702691bb177dc90e65e44ee13e142b59313757b46de84914389f8facac403427 RLBA-2022:2630 new packages: unbound Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.13.1-13.el9_0.x86_64.rpm 6d2a6439a88f4120d24d8c76e66dabf87ab4f1eeba61ad057cc033f8c04408ee unbound-1.13.1-13.el9_0.x86_64.rpm 3fc26b5a4504907846cc867a41d53ce7fc86be57403b58e1415c7694eabea5c1 unbound-libs-1.13.1-13.el9_0.i686.rpm 923c321919b1152b098b381cbfef76fa3e018828c6625f7329e6067fce5d73bb unbound-libs-1.13.1-13.el9_0.x86_64.rpm bf93c93b92bfe9dcbf7a2f6589dfbb6be6ddf464871127b4bac59bee5db16231 RLBA-2022:2633 new packages: xdg-desktop-portal Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-1.12.1-1.el9.x86_64.rpm bbdf8a0586d19b8e64c4fc7c396b62071df6179c7f1eb1c72ade57c3c6140e4f RLBA-2022:2634 new packages: xdg-desktop-portal-gtk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal-gtk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-gtk-1.12.0-1.el9.x86_64.rpm 5c517247f96cba729a872a6c7ec87947bbaa6dee1fda5d78c9c67d263375e4ea RLBA-2022:2641 new packages: mod_wsgi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_wsgi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-mod_wsgi-4.7.1-9.el9.x86_64.rpm f2fcdd4b7df3aeada2c5be32c19b2c79aaf3f1ca571c1d5f8823f041b55882d1 RLBA-2022:2645 new packages: insights-client Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for insights-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms insights-client-3.1.7-6.el9_0.noarch.rpm e714f7ba36dcf3a66617da4df104b9aa866f3109eb866f6abafb093f23c0e4ca RLBA-2022:2653 new packages: libva Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libva-2.11.0-4.el9.i686.rpm 8cdda606c8a2472cc18c2124713a7c17b244d10d56589fde1dd8fcc7aae617ae libva-2.11.0-4.el9.x86_64.rpm 94b4532377b9f6eaaccbcdf9e85490e2f1399182de72cc68d025ce9946d1fae7 libva-devel-2.11.0-4.el9.i686.rpm 28d4bd364287344404b81a16022449fec125f244b0cdcb48c7aeb883ac573e87 libva-devel-2.11.0-4.el9.x86_64.rpm 26ea6b26d9be53b3005d6697d4684c363f9497e3ff92636c69a6cc097ba1d569 RLBA-2022:2656 new packages: dovecot Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-3.el9.x86_64.rpm 2c39b06a722d87d0262a19a7b5d72ec98bc4b0ab48cbe2960c765750693a8194 dovecot-mysql-2.3.16-3.el9.x86_64.rpm 820f838180757f9cc0b5f2adc64f176abb447de9d234679870686d72f134ee8a dovecot-pgsql-2.3.16-3.el9.x86_64.rpm a4d3d949a8430b9e49070439eb631c1b8c43575a7e36d2aeae1864058a499eaa dovecot-pigeonhole-2.3.16-3.el9.x86_64.rpm 80b8e921a4ff9587540944b37cc6b1841262713093780f4a748f6a759212eccf RLEA-2022:2665 new packages: libmypaint Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmypaint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmypaint-1.6.1-7.el9.i686.rpm 51cad28a7f1142e61ac6337f0bc6bc0dc0c8476939f2ca1bbdf1acc907f9632c libmypaint-1.6.1-7.el9.x86_64.rpm 23c0f7144d499cbc64e419f15ac14cee29235dc1442229729baee9f275c623e1 RLBA-2022:2671 new packages: network-manager-applet Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for network-manager-applet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms network-manager-applet-1.24.0-2.el9.x86_64.rpm 3349688bd0bf2e67a21fc1cdcacbafea60121491e05405ab51366a6e610820c0 nm-connection-editor-1.24.0-2.el9.x86_64.rpm f60aede93f5db1d749f5382ec9d9ecddda5fbab4419a59a8744c50144de6f4ad RLBA-2022:2672 new packages: varnish Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-2.el9.i686.rpm 5f61249518cca85e1848f0a73957bb62424b37d02193a68df9977c95cb122d72 varnish-6.6.2-2.el9.x86_64.rpm c21c7a8a12d314a74ab5d6700cffb9baf51dc783a40afbf251cd5062c86c6d52 varnish-docs-6.6.2-2.el9.x86_64.rpm 3f22aa3c71466e1c8a0e1c56a88f3cb77d6051bc1908511a1ca07ca2c8c42f2b varnish-6.6.2-2.el9_1.1.i686.rpm c068a1f9d3a1c249487d18db2f18b2012bc8c6cd9b8ee37e136cdbf6469b5d9a varnish-6.6.2-2.el9_1.1.x86_64.rpm e59a3aff50bf54c2855693ea6a88f52aadd286ab784af4b9c19258dcdaef326d varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm 1f4218dfac56d7056b83497444bf39bd2dd07bceade816145460324491df49da RLBA-2022:2674 new packages: pykickstart Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pykickstart-3.32.5-1.el9.noarch.rpm 20d37d564f5a63e2deaa7735eba47249f52e9560b62b92c5ca7b9aabcd2beccd python3-kickstart-3.32.5-1.el9.noarch.rpm 038133617d4bbc31ad6667cdd1276d65ef2ec6b86d1e7e0308d694774059bfbd RLBA-2022:2677 new packages: motif Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms motif-2.3.4-25.el9.i686.rpm e730cbb22299ea8b2a69b524348bb5ff453e35a364da0791f48afa38e8046683 motif-2.3.4-25.el9.x86_64.rpm 2e4342237857e7ed8e223f55c634e62e3c2360b0e18410755a4796b1ec8750bb motif-devel-2.3.4-25.el9.i686.rpm b8d52d9cf34809c78530d8723828969a7de0cf1b5fecb5f9c3f2f5221bd1829d motif-devel-2.3.4-25.el9.x86_64.rpm b2f6cc3c61b4d09dd8fccfd6c5255dea58c1ee1b9bbb723b09dc0bedf152927a RLBA-2022:2683 new packages: gnome-tour Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-tour. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-tour-40.1-1.el9.x86_64.rpm 06f94affc6d53fa83634c6690388bcb4c0af60341c9e8b1b7a61fa6ccc6b495b RLBA-2022:2689 new packages: dnsmasq Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnsmasq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dnsmasq-2.85-3.el9.x86_64.rpm 9cd7f1bf95adb17d0981b56172040969babfe679da55e2078c82e24a911c5b68 dnsmasq-utils-2.85-3.el9.x86_64.rpm 7ec6533072bdf856b9badfbbf8047e4592bbee880c92347268cf12f4e5448db2 RLBA-2022:2691 new packages: rear Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-11.el9.x86_64.rpm 4e1c0b9922c743806075c151db4a8bc5fe0e9bbf9f68fdf2b3264f22d6208852 RLBA-2022:2692 new packages: rasdaemon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rasdaemon-0.6.7-5.el9_0.x86_64.rpm f8b23bf7c7c2624090e96a2739569dbab5920c5c3e22cbd6166829afcb39caf8 RLEA-2022:2693 new packages: mozilla-filesystem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mozilla-filesystem-1.9-29.el9.x86_64.rpm 13a83690c79366d0be7f19950202584af1dcf9188b745aaa80839023a33618cb RLBA-2022:2699 new packages: console-login-helper-messages Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for console-login-helper-messages. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms console-login-helper-messages-0.21.2-3.el9.noarch.rpm 8cc20a47e156e173ec29c1961ba706927405b2ae0a2e0ee2e988635e142e0d17 console-login-helper-messages-issuegen-0.21.2-3.el9.noarch.rpm 5e920565c8ddb65c92f3104d18a181dd6d4e4f59a956357db159148a19ed47a8 console-login-helper-messages-motdgen-0.21.2-3.el9.noarch.rpm 2ffdfd0a2c3221f3cdee6a0f225b5ed65087d2286ff4f7e2d6e2fac4525c888f console-login-helper-messages-profile-0.21.2-3.el9.noarch.rpm a9372e6b88b92ac1703350564644a9e1c07b2b80f32937361a75af7cb002a087 RLBA-2022:2700 new packages: rust-bootupd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.6-1.el9.x86_64.rpm c711fe1a3725b4cf498e6eb70aae414ac11dc164d617dcd2971f3aed066dbcc1 RLBA-2022:2702 new packages: rust-afterburn Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.2.0-2.el9_0.x86_64.rpm 3199a7a2992c5ee0129910f4a7c21a1adb8ef77a27a83e58d76d165622cb04d1 afterburn-dracut-5.2.0-2.el9_0.x86_64.rpm 95a5a48d567ac96fae5eac6620b6257241d74a2597a5b9773e046c5d3b852f5a RLEA-2022:2703 new packages: mingw-qemu-ga-win Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-ga-win-103.0.0-1.el9_0.noarch.rpm 924c3fcabc171a637960cabe083154fc9b2cb02a6a586c9391779bddc1a71adb RLBA-2022:2704 new packages: gimp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gimp-2.99.8-2.el9_0.1.x86_64.rpm 839f14b0950bb008a4c630ab49c639a294ec3a6b73cb9f4edf4988a0be82a42a gimp-libs-2.99.8-2.el9_0.1.i686.rpm ad7ddd7ff2363468f9db699fa8afe530c92b670793599601b3a63080213b6e56 gimp-libs-2.99.8-2.el9_0.1.x86_64.rpm 0be43df5794b7032c36f0ed4b4e1b4e98c2f773bfbca053ee00c111e2e81c0f3 RLBA-2022:2723 new packages: anthy-unicode Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anthy-unicode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anthy-unicode-1.0.0.20201109-7.el9.i686.rpm 63ebaafffbaddc07ee93c18b122903e0a9c1419dffb04e24e7bb6830f3d3453a anthy-unicode-1.0.0.20201109-7.el9.x86_64.rpm f02b92a00830c45624ced8ff53a7960aa46625d831b596603ebac8425e69006c RLBA-2022:2744 new packages: babl Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for babl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms babl-0.1.86-3.el9.i686.rpm a42a8eb1dd6685f8e3305c2c93d6fc341b481c649d09772613854c30521ba03d babl-0.1.86-3.el9.x86_64.rpm 625371a5108ab431475637aa21d20f09752c86aa7c0a925b40584d7c225b2ea6 RLBA-2022:2746 new packages: bcel Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bcel-6.4.1-8.el9.noarch.rpm 2beeaa1796a81016404a30f1cea2bac39ecb3cd3cfc90f40c5e979c35435b9ce RLBA-2022:2752 new packages: boost Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boost. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boost-1.75.0-6.el9.i686.rpm 6e56f78751301d5d3e05a32fc04a87661dc441dc90c294ff6c56e086546e9c19 boost-1.75.0-6.el9.x86_64.rpm c980fd99d6755fa033e45454fbe8111b00ac00fdc437eb4e071aa92a43fa3098 boost-atomic-1.75.0-6.el9.i686.rpm 942b1ad050d6b2c3ad373e291b28eaf182c32a97f955b67f323e049c3ad968d7 boost-atomic-1.75.0-6.el9.x86_64.rpm 4372ac3d5a355c212358b9345d90ddaad6896bac8cdb9234e934247031f740c4 boost-chrono-1.75.0-6.el9.i686.rpm da77c3f2f8b21070e8cfa67fab344f2bbeda7deec6ade9248a0bcc202007a25d boost-chrono-1.75.0-6.el9.x86_64.rpm 2c26ea8079bda4a745cbad97ee87b2882a03297d0b01266fc06494c3a4876a8a boost-container-1.75.0-6.el9.i686.rpm de90bc4c9e6b4a20149dc145757178ddc4e68d9f3f6795eb23ee8bbcbe4ab559 boost-container-1.75.0-6.el9.x86_64.rpm bb7d7f527256fe4c8d93ae80d47d7a793309177e2eb3e52741e299c802bcef72 boost-context-1.75.0-6.el9.i686.rpm 1cadaf79589f8fc577dc0193451719f4699eb329382939dcf00e56d3ca78e7d7 boost-context-1.75.0-6.el9.x86_64.rpm e0bcc5077175e2d7077c20866e9c8b065c08d1f55788c4c32de21a5e3262b6f5 boost-contract-1.75.0-6.el9.i686.rpm 88204396fd106b0d027a099a6830d329f95db73218ca7113fa3bf2b4518f1e4e boost-contract-1.75.0-6.el9.x86_64.rpm 21b24563f15737dbb5497ca5e572de9c51483c90ae11963a5cd4b8ea0af68587 boost-coroutine-1.75.0-6.el9.i686.rpm 975606fe17d7d1584d0bc67e5468f250cdcba95b1f2ad5143544231ae77ca6ff boost-coroutine-1.75.0-6.el9.x86_64.rpm 12012fe3b323dab4f683f503e08fca1193bee9cf5ad6fcc9924d5d028c6dae6d boost-date-time-1.75.0-6.el9.i686.rpm bf6159298bc1e8625a85dfc87f57ebcc2f49c7dd727b71bdf4bb0c098ecbc097 boost-date-time-1.75.0-6.el9.x86_64.rpm 18ddbc20be8652d959ce5d1f06d0c645b75c34c09bb8aba7a9b6bb32c2fd1bc1 boost-devel-1.75.0-6.el9.i686.rpm adb2759b0ff9ef10745e8eebc89be48eeadf147e7dfe1936f2807c48b21594bc boost-devel-1.75.0-6.el9.x86_64.rpm b14adc76c98872dedcd96cfccad972a6fe5a9c5db334ee9267e2090063251715 boost-fiber-1.75.0-6.el9.i686.rpm 2ee59f3cc0c8440a63b2f9703716dfb9d45a653594487a429566b86badc59972 boost-fiber-1.75.0-6.el9.x86_64.rpm b0878675b810a788a1c34c07d49c8bbe49b7c0d1d02f5288643d7c4305f3c491 boost-filesystem-1.75.0-6.el9.i686.rpm bcdb37bdb6c84f9dec7e4b3a764630247bcfe6b9919449812cd2ca42cf8f0369 boost-filesystem-1.75.0-6.el9.x86_64.rpm 4fe4177f0f3f2bd3bf50c3161056823f57788ac9186ba50099df8019f9ebdf3a boost-graph-1.75.0-6.el9.i686.rpm a46c27a1d0192f07340664b6f611017293d99e165e9c2ea5fb783068e26442cc boost-graph-1.75.0-6.el9.x86_64.rpm 7f28d3b2cc3f7c66e3a37111324bfb877ce42fcdd08ae0e87b0ef3c33d75496b boost-iostreams-1.75.0-6.el9.i686.rpm f401d094dce5a23b10b389145e4778c5a1f7bd5e58fc1dc5e7116ab7e6b0613e boost-iostreams-1.75.0-6.el9.x86_64.rpm 8e9d08ce0594d78c8e6eefc6b6de258250273b5dcede7e199b8a9c7ac3fe0fb0 boost-json-1.75.0-6.el9.i686.rpm ea92a58225f8279bf974034b2d285128097419ccc3d3e1436af8d1938f1b8e86 boost-json-1.75.0-6.el9.x86_64.rpm d67e8476feef99fa5ee178784ed8418f411836f4ed9e8badbf3390a8f9ecaa79 boost-locale-1.75.0-6.el9.i686.rpm 0b14314f95172551cb4d81912e9f427a92f59696ebe10cc8b52b30c59cccd8f2 boost-locale-1.75.0-6.el9.x86_64.rpm 8f1f9467ddc9f49321e645acd6c31b4eb930bead9bd78420afa7352c61b90b8a boost-log-1.75.0-6.el9.i686.rpm 51650e509a12487a63783fc895b060d9541b55a6b00f6c1d6474a22397639b98 boost-log-1.75.0-6.el9.x86_64.rpm 1212dd390ddaf727e2faeb3b145ab59db1ee57832310665b578daf42434784f7 boost-math-1.75.0-6.el9.i686.rpm 1e12e807ee744d5d329dc9061385271060484c23b361a91d557bf25b466fb6ab boost-math-1.75.0-6.el9.x86_64.rpm d336f6077834cade56425cc9f04909d8d82bcd0d77d74f47b38301fa121000e7 boost-nowide-1.75.0-6.el9.i686.rpm b645d74a06a61958d679f691ca2eee91dde4cd6d24ce0429a111b64f7d96b9bb boost-nowide-1.75.0-6.el9.x86_64.rpm 312db07b99e0ad39438e54e111005c478abdedb21ed564d1cc206164c43b27f1 boost-numpy3-1.75.0-6.el9.i686.rpm 3fae4b78690e67e1cf1c395dc9e72c7af67af710f77e5c5a5e610087f4d988e3 boost-numpy3-1.75.0-6.el9.x86_64.rpm a832772d13a38a30ea84b1d7cfb57dc5ec33fb0dc6edcdca6c26a22c81fe0c75 boost-program-options-1.75.0-6.el9.i686.rpm dfc5156b7f70d2a97f1078bf83909488e5d9e7d5a0103c55e2a5d58aa00cb16d boost-program-options-1.75.0-6.el9.x86_64.rpm df80db04ccfd08c74981997300540572feb9d79f0affa0b69db4f6a632c56c80 boost-python3-1.75.0-6.el9.i686.rpm 9f2258bb03cbf98b30500e0bcec29fb65f2692d6694d2e8827ba78f1e5f8130b boost-python3-1.75.0-6.el9.x86_64.rpm dbe9985e8e7433d20e7e57fc1a77d0c17501a98b7ee1c0e76a0667a89c42b7ee boost-random-1.75.0-6.el9.i686.rpm 2089d93beb204560e84a0af7f43caeb3b65574089b4158f73fc621481c6229e0 boost-random-1.75.0-6.el9.x86_64.rpm 99aad0758f7f84eb8e009eba615ad162d5e7e7af1095fedeebb81cb5ebea117c boost-regex-1.75.0-6.el9.i686.rpm 8c362939a95c67bfcac6e185718397a939d4aeaa1044ce2e9924ac6440680e2d boost-regex-1.75.0-6.el9.x86_64.rpm f58b5ae42ff2300ee3679819d77d65cacf838a25661e37e9768e769e7188ac18 boost-serialization-1.75.0-6.el9.i686.rpm e3f5f34e5798b47da17db457e95e8103f011a0483db39146b09bd46fbb739c6b boost-serialization-1.75.0-6.el9.x86_64.rpm 5adea712f121e760b4ec9e2ef335083adb2ef9d12331dc0b6a2283986d0fb903 boost-stacktrace-1.75.0-6.el9.i686.rpm 91463c0afbbaa34a3c088709b837279a5829bc14e1b2bb2a7352fdcbf0aa696e boost-stacktrace-1.75.0-6.el9.x86_64.rpm 5ae12107e09f9633df90a93a993365ba0c34203f1d859e1b1445063584e5198a boost-system-1.75.0-6.el9.i686.rpm ec27cbc95ba8a046223aa76c221075fc10b6ef9e92863c37270e71d28777fddc boost-system-1.75.0-6.el9.x86_64.rpm 032af5ac0b10bd82ac1333fa9f3d22757d8bb3979526e65c82049a084eddce66 boost-test-1.75.0-6.el9.i686.rpm 822d3add8a3d05d794b37a66112aa49712cfc9fa2cfde7c3e4f15c2c1f033226 boost-test-1.75.0-6.el9.x86_64.rpm b0934c46c347f905ef9d26cd00febc3b91b1e2b680915d06fe144ccc1d8b494f boost-thread-1.75.0-6.el9.i686.rpm f2fe8c442bbed5e90a75c28dc166f6de8767b67453f958a4d8cb1a205c1f8b78 boost-thread-1.75.0-6.el9.x86_64.rpm 89a7082a9cff82d5c258e52f50147b3a4b420e4309973f64c7d8a3b776ae0ddf boost-timer-1.75.0-6.el9.i686.rpm 0ec6f66a2afc4963c1e7b3503ff95efdab555f895125b4bc39936894e8822612 boost-timer-1.75.0-6.el9.x86_64.rpm 4950d0ac1601c6b6734048c892c66771bfb841b5cfe6beb9809d9f44858367e2 boost-type_erasure-1.75.0-6.el9.i686.rpm 08ccccd31d1f8414bde69a90dcfc50a83f0bc039205aeea2fd8320b5a0727012 boost-type_erasure-1.75.0-6.el9.x86_64.rpm 0d0a34110e0f172c1d127c23daa2f90520f092437d98f1a7e7dc7d5cb5112d2e boost-wave-1.75.0-6.el9.i686.rpm 533371fc30083f17816410a252a180d32ccf37bbf2109f48fdd41a0a400e75a2 boost-wave-1.75.0-6.el9.x86_64.rpm f4b0508f404566a66345dd49ea2cec48221aa23cf2b75e5ea55b502fb6c9701f RLBA-2022:2781 new packages: cscope Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cscope. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cscope-15.9-12.el9.x86_64.rpm 51ad3702bee812e55ac45b81fadd1e556403da6909e3699214e5c3bb7a1a423b RLBA-2022:2790 new packages: desktop-file-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for desktop-file-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms desktop-file-utils-0.26-5.el9.x86_64.rpm 2527ab023f1abd2db88be111c1c12ab6effd2ff13f8a0500afd8dd4ca9e68417 RLBA-2022:2813 new packages: flatpak-xdg-utils Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak-xdg-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-spawn-1.0.4-5.el9.x86_64.rpm e8346e79f2804834a559ff287316d8f5981d2bbf6af0670943cbfe90cef9632e flatpak-xdg-utils-1.0.4-5.el9.x86_64.rpm 0f99f80eb29a29a4e076dd67af43272727885a729304dabfd99e2cb812db1eda RLBA-2022:2821 new packages: fribidi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fribidi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fribidi-1.0.10-6.el9.i686.rpm 470f9fb6538f895de18ac1b386a9c347202ef13187273e9ee723fc604d0dfdb8 fribidi-1.0.10-6.el9.x86_64.rpm 640aa214f7bd93f0ea9cab7799625b93063afdea7d31e5a273f7000079b11785 fribidi-devel-1.0.10-6.el9.i686.rpm 6da7294235ce8a2552eb86eeeb50500428bd2167f21c78eef825aab26bdf5e54 fribidi-devel-1.0.10-6.el9.x86_64.rpm 973e3989e7142e902cefc81d71f40ec76386056d2dc62dd3e2c99b9d99001fb3 fribidi-1.0.10-6.el9.2.i686.rpm 34e056cbd3e37b9cbd1da8430012d747b45d0eceaf9648f2cb507c6527a1539c fribidi-1.0.10-6.el9.2.x86_64.rpm da453272ba50af82b42370ab516b4de94977072a4069f657c84e5c357d572bc5 fribidi-devel-1.0.10-6.el9.2.i686.rpm 223dcd2aea91860af3b6e68ec99631a3bce23a1c4c752296e6dc2af0b3f16870 fribidi-devel-1.0.10-6.el9.2.x86_64.rpm 4a6b9992cc89bc774d8141080df63af1516eefcdfe6450ec85da36fd47e3e51f RLBA-2022:2859 new packages: gnome-screenshot Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-screenshot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-screenshot-40.0-3.el9.x86_64.rpm bf864fe21fb68bc41623afa5e2c3c642981e619b0ca3129960d77bcf2df8ece3 RLBA-2022:2860 new packages: gnome-system-monitor Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-system-monitor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-system-monitor-40.1-2.el9.x86_64.rpm d322b6ab3bab57ff10b6a42cb70e7ce798599c148e9cb376bebadd92a3ce84bf RLBA-2022:2862 new packages: gnome-tweaks Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-tweaks. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-tweaks-40.0-6.el9.noarch.rpm 6b77b7e1bb0b491b113ad40afd62501acab1c36b7dcab4a052a6585ad9ac73ed RLBA-2022:2890 new packages: gvfs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gvfs-1.48.1-3.el9.x86_64.rpm 192e140c7aee453c738bc63706d6b0e84d9a615e85fd497e36369b01aeae9fbb gvfs-client-1.48.1-3.el9.i686.rpm 25e10d00b57906af74bbf31aa938e3f0b19b5bc8cf556c414aa85fc2a5e9432e gvfs-client-1.48.1-3.el9.x86_64.rpm 454f039e34f6b11dd077590e627c6b7a20fbbf3ca8f1f8e4d4b5edded0010dce gvfs-devel-1.48.1-3.el9.i686.rpm 316d37055e6a44d78f27ecdda8c0cf204f4b4aed78db2540836e56e2e7df68a2 gvfs-devel-1.48.1-3.el9.x86_64.rpm 29476517d27f5dd9cee0337409284216bbe4c32fe3041d29cacbb1492cebbede gvfs-fuse-1.48.1-3.el9.x86_64.rpm 04ec79ac674308f91aa1e57ce8c730daaed6e6b2a0f3b977b681487e0a650f5a gvfs-goa-1.48.1-3.el9.x86_64.rpm 57c90cc0037990ea045b92311654b214e0b0d48b3b98dc99774da7934deb8ac6 gvfs-gphoto2-1.48.1-3.el9.x86_64.rpm 82aa2b5014970c41dc731880b2bbb49cf6be905efc44efbac81b925539ef8982 gvfs-mtp-1.48.1-3.el9.x86_64.rpm 124e42697ae0030f5524cbb6c308a80362b49f10e61d30c947922284aad92ee0 gvfs-smb-1.48.1-3.el9.x86_64.rpm c7a7215a551100095c8a28291188301da80b3c8ea62fe83cf14f8f4c91f984aa RLBA-2022:2871 new packages: google-noto-fonts Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-fonts-common-20201206-3.el9.noarch.rpm a8bfb90be7ea0f2612987cba93ff5852aad702a58294bfc625a1ef60504c64c8 google-noto-sans-armenian-fonts-20201206-3.el9.noarch.rpm a1e9e24034a98e9389e29d2591e69543b47a52e44de70ce611112e9969a2c313 google-noto-sans-avestan-fonts-20201206-3.el9.noarch.rpm e4be3b09dccada97318a64eb389f012000bd34b709e3bb411987f6ccf9d6809d google-noto-sans-bengali-fonts-20201206-3.el9.noarch.rpm 0e953e28bb61285dbd891243d5f980a041f5f71aa1e46a18cf4531d4b4f702b3 google-noto-sans-bengali-ui-fonts-20201206-3.el9.noarch.rpm 5e743aae45dd1c43f41c1b43a8c37ddd12c02e41a53131b5f5821acc95d659d8 google-noto-sans-brahmi-fonts-20201206-3.el9.noarch.rpm 1bbca7fdac53c6b5dd939861b45acc50f7b8f6fb34f43dc4311dec232e422098 google-noto-sans-carian-fonts-20201206-3.el9.noarch.rpm ae0817cd06e41eb6b182ba6f333e219318072cea66c5cecb9239c78837dedbc7 google-noto-sans-cherokee-fonts-20201206-3.el9.noarch.rpm ce89d4d0e275de48af732082a3cb86c2c31d4a25f337b74310ba6d06c2965275 google-noto-sans-coptic-fonts-20201206-3.el9.noarch.rpm 915df0c4645a4a867a0d257ff79f3ecacd396465cfd1ef7854819ef79b28c5de google-noto-sans-deseret-fonts-20201206-3.el9.noarch.rpm 0e0108d974f556c848033c27eec5c49cb426c4dc3e310642030fb26139c41466 google-noto-sans-devanagari-fonts-20201206-3.el9.noarch.rpm 7305c8e243de0bf2eb56b3a1385efb8464cc691dca0b21833841f614a00d5d38 google-noto-sans-devanagari-ui-fonts-20201206-3.el9.noarch.rpm ec83d97316b4d9817a248a1219e172f3c9faf389e8f0e8eaaf8123dfa3e29660 google-noto-sans-egyptian-hieroglyphs-fonts-20201206-3.el9.noarch.rpm c3e2763c9c403b0e79746efc4dc33ea57c27b1dec4acf0a7e6403a2cbe7b40fe google-noto-sans-ethiopic-fonts-20201206-3.el9.noarch.rpm 546d7fe7463d0648d93468508ff21ccf24b7ae84345801a76f7d4fcfe744be07 google-noto-sans-fonts-20201206-3.el9.noarch.rpm ae9f99e70fc15fb601ab08fff4297c8cd6455fa7645702115122a63289ded908 google-noto-sans-georgian-fonts-20201206-3.el9.noarch.rpm a5a354ac019d2fdfee9d937fd68858f13bc4d6e69336942a7e5e0aab2c74db44 google-noto-sans-glagolitic-fonts-20201206-3.el9.noarch.rpm df4914f52bdbf8728408894af9e17354ad342441f422b2f5c80f7349d9e1f88e google-noto-sans-gujarati-fonts-20201206-3.el9.noarch.rpm 2fdcfebbd955cf0bfa65253ac364471e75f61276d384906247460df6d8eed1c0 google-noto-sans-gujarati-ui-fonts-20201206-3.el9.noarch.rpm 0e6b4e2eb28ac886eaf311fca7886115ad6c97e4810360664c8a5cc237d7d839 google-noto-sans-gurmukhi-fonts-20201206-3.el9.noarch.rpm 6ff96e2a6ba9c64b5784cf3cb973aba36f686551a46e7cc87ffb055475cd7bd0 google-noto-sans-hebrew-fonts-20201206-3.el9.noarch.rpm 48f2448c34b9b89ca6aebec68de557dcb0d8a66ecc26315a48549a8ac3d4234e google-noto-sans-imperial-aramaic-fonts-20201206-3.el9.noarch.rpm cb129b006c95141da79db043dbe8a94d9adb5370e50c6dd81657fe092011184f google-noto-sans-kaithi-fonts-20201206-3.el9.noarch.rpm 1a49de7f49b147618e999c002c4ddb90de7c1a2d04f863b152736764876e6865 google-noto-sans-kannada-fonts-20201206-3.el9.noarch.rpm d09f2cca441def1c7191f72f09641b11549dadc9b91790c38a27730ebaeb9a5c google-noto-sans-kannada-ui-fonts-20201206-3.el9.noarch.rpm 9cb1090e24906794744b8fbd61085cbb15f4bad5402d107edfb66a7ee14c6e81 google-noto-sans-kayah-li-fonts-20201206-3.el9.noarch.rpm d15e6ddb5dddfca706282a102d6a2c6f783845498c228074b79f6d48607a44cf google-noto-sans-kharoshthi-fonts-20201206-3.el9.noarch.rpm e6eec1c838bec1a16c8741c94561fac58196c1f5b8855bf6c822bb8cfb543743 google-noto-sans-khmer-fonts-20201206-3.el9.noarch.rpm 4e376d907081e1492838ecbd77dc7db6fc93fbfbeefb61be3426578c8d247680 google-noto-sans-khmer-ui-fonts-20201206-3.el9.noarch.rpm 39693e6301bbcb50bdf0205f3f012448c1108abca4621629865b58e55ee10278 google-noto-sans-lao-fonts-20201206-3.el9.noarch.rpm 6811b3f83f25db4b8b3b8b016b81e859baa03a21af9d87a6713a769b33f522d8 google-noto-sans-lao-ui-fonts-20201206-3.el9.noarch.rpm d838265869cf8c907b1eaff6f0c84911220259b01e0f5801dafcfe5deddd68c4 google-noto-sans-lycian-fonts-20201206-3.el9.noarch.rpm 76f326ffea0bb5ca8789d08f9b4b47c70c5d627b18864fe6124a87a1b1fbc0c0 google-noto-sans-lydian-fonts-20201206-3.el9.noarch.rpm db3d946ebb39d58c56642d7dd95431109e805adbb653edc8d648ffe309ece517 google-noto-sans-malayalam-fonts-20201206-3.el9.noarch.rpm 5ca53d6023225c51964a9ffdd91e82f1368b6e483a0a1e95dc7040bb5c707254 google-noto-sans-malayalam-ui-fonts-20201206-3.el9.noarch.rpm 5a7e8ca26caa958ff76b5e2c45b1aee17e14a227f99c111510dd3fdd2b40761a google-noto-sans-mono-fonts-20201206-3.el9.noarch.rpm 59620b099a0c697039e30d078109305bfd693471f98f1277acda6e6bb3fa43d1 google-noto-sans-nko-fonts-20201206-3.el9.noarch.rpm ea4de34806aaa6e42ae581ca812d69cb00b9f66eadd1debbc4ea824683ee2f2f google-noto-sans-old-south-arabian-fonts-20201206-3.el9.noarch.rpm 54c9834c3ff8ab8ac7d6815f65786da0df1cf6e87a1fbcfef8c016a9f8fce7ca google-noto-sans-old-turkic-fonts-20201206-3.el9.noarch.rpm c1655e72c7bd03c7d5217c527c485cc3854a596df83f3859e08e0a1786b891a3 google-noto-sans-osmanya-fonts-20201206-3.el9.noarch.rpm 64de7cf019a1a3847c0d9b6c3e3405216848875e07c936efaa5a026c7556132e google-noto-sans-phoenician-fonts-20201206-3.el9.noarch.rpm 1cc279f4df79d26b8bca443bfab6278cdf8c7e48f47232cb9d93650508742e59 google-noto-sans-shavian-fonts-20201206-3.el9.noarch.rpm 158a4b65483866ab052b0e9b2e0ec395f5f2f57d6e9d82513b511426392fba1b google-noto-sans-sinhala-fonts-20201206-3.el9.noarch.rpm dcf0b96e190fedb11c7562ad122e270ec5e20f549cb1f046477022db037eb172 google-noto-sans-sinhala-vf-fonts-20201206-3.el9.noarch.rpm d16d66225be0e0d43bace67f09a282d9abe7ee73bbb4c7d645029ead12d15779 google-noto-sans-symbols-fonts-20201206-3.el9.noarch.rpm 3b41a01546208a27d619fa2d6d111e0c696f39a1af9ebffa1aee849b3a8b12d8 google-noto-sans-tamil-fonts-20201206-3.el9.noarch.rpm 00c802ecc667f1d3cff4c72fdd33fee15b4c730830eba3f6697046ef3e78b843 google-noto-sans-tamil-ui-fonts-20201206-3.el9.noarch.rpm f03a2b22d6a059ad493706a65d198ccd68aaa6c8b4013236e526087cc2a21ef3 google-noto-sans-telugu-fonts-20201206-3.el9.noarch.rpm 4e04909028d4254b90effa51545bbd001e43a0246b0dbf0ec73eb194a96d7306 google-noto-sans-telugu-ui-fonts-20201206-3.el9.noarch.rpm 3f7fc630fdd79d6710d462307cb89e77ba4a6afde81eaa6499395d4f270c0e24 google-noto-sans-thaana-fonts-20201206-3.el9.noarch.rpm 70b6dbf450d75ac6b505b1b651c0ec77fd284a15f8038fbdae0c42b3ccd99848 google-noto-sans-thai-fonts-20201206-3.el9.noarch.rpm 0c42d390c523272b0794ff561db4b6502a10fa279827ffd1912118410f4ad3a1 google-noto-sans-thai-ui-fonts-20201206-3.el9.noarch.rpm 6ae75a4ffd514b0aa88e2c950644372e92b5ab042aa8979395d63427521f841c google-noto-sans-ugaritic-fonts-20201206-3.el9.noarch.rpm c77d845a91bba11e1c04a46064efb4cc3673564c39c8dd00c13131298f981246 google-noto-sans-vai-fonts-20201206-3.el9.noarch.rpm c32d420f22fa1b0eaac7e1ec38d19db34591e91cb259f70a2aca8f1f2a193e4f google-noto-serif-armenian-fonts-20201206-3.el9.noarch.rpm 455d5825330efcdde8a3ad3450b746b92bfab9b237747dc8fffb662ab7af906b google-noto-serif-fonts-20201206-3.el9.noarch.rpm 8f79012f90202c5120c1a180a0ef598ed1a184ca56b60491f39b5ed93a606fd2 google-noto-serif-georgian-fonts-20201206-3.el9.noarch.rpm 20f968c426daa7ccf39b76482a79644e0941130d1d965b5f3c9563bdcce2efa7 google-noto-serif-gurmukhi-vf-fonts-20201206-3.el9.noarch.rpm 58c87658ae6c10c1c3db79715bebf6a2b813cb8ee7d3c2cb50cfd3f0454758c2 google-noto-serif-khmer-fonts-20201206-3.el9.noarch.rpm ee107e896b0741e3b661e8d7ad192cb9f0340eee6e780d0472de66b2799e7d6a google-noto-serif-lao-fonts-20201206-3.el9.noarch.rpm 24505c5f02d48d18f13933899386b9abbbcb4bb51a6024ad8509ee2705da1eff google-noto-serif-sinhala-vf-fonts-20201206-3.el9.noarch.rpm 2889d33838eff3bffd3b586b4bafa72828aa8c94782d1f72b0b2168d1cdea59e google-noto-serif-thai-fonts-20201206-3.el9.noarch.rpm ada2ee6b36ce8e76f50eec3e3d655ddd0396b8ee77b7d8a65b3fcdd7a0463b12 RLBA-2022:2893 new packages: hexedit Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hexedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hexedit-1.5-3.el9.x86_64.rpm 153461e9e7effef245997da3c9b478ecd4c830c72d475f0ab2fc1bc8fbb8753f RLBA-2022:2894 new packages: hicolor-icon-theme Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hicolor-icon-theme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hicolor-icon-theme-0.17-12.el9.noarch.rpm 44dd63517f5ccdae99824ba5a6581affa171b0c5905a24ecc9d2a1bae565717c RLBA-2022:3061 new packages: i2c-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for i2c-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms i2c-tools-4.3-2.el9.x86_64.rpm a77d8c2ee5ef198eab9633b7623b933d242d1595bcd9f8072ba00259ebd26f43 i2c-tools-perl-4.3-2.el9.x86_64.rpm e4fb19a351f06e82cd2d87239f04dafbe641a9e68c095b346731481d8df5ff88 libi2c-4.3-2.el9.i686.rpm 22194db1d39ffcc744c42bf7000841480129b05679ce14e705d8911d6f7c1b3a libi2c-4.3-2.el9.x86_64.rpm 7c4bb67c60b88415a46b5d82bd8fbcf095f337e2d892eca75e3ce7e581f564a2 RLBA-2022:3143 new packages: libXpm Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libXpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXpm-3.5.13-7.el9.i686.rpm 4c5e65d9a2fc116152d5b562341a414262b3be6c2e32ad2181f827c5451f4482 libXpm-3.5.13-7.el9.x86_64.rpm 33abcb614edad694ddc9987f0c661f5242c8b90360f570c28150890f7ee8d6b5 libXpm-devel-3.5.13-7.el9.i686.rpm 1f96881a468dd3d18c45ce61c7eede51f89c0e94391b927739d98e89382c13cf libXpm-devel-3.5.13-7.el9.x86_64.rpm 06903294e37c22901528b1e007803796d1c86a76d6c2c21932e9cb45c6fb3d19 RLBA-2022:3175 new packages: libestr Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libestr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libestr-0.1.11-3.el9.i686.rpm 21e495939f2a55dfa747e06acec992dfcef6524da8752627c057d91c0a4ab9e6 libestr-0.1.11-3.el9.x86_64.rpm 42d961876d6f685c0e9ed814a721b20c2e6bba3c234d1ae5d7fb21816e6dfd4d RLBA-2022:3256 new packages: libtiff Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.2.0-3.el9.i686.rpm 2fb4ee9aebba9dec5ef60b4e14f3df1eea9b8262910bede8e5a2455072699930 libtiff-4.2.0-3.el9.x86_64.rpm 1b175ad5a8ad418c470ad3176907fe43f4c3f0bae4aedb9bbdab970b1a721c2b libtiff-devel-4.2.0-3.el9.i686.rpm 4758cd71cbb182981e4e8918518a3b098ec2992f4bef4ffa881bce31865d77b0 libtiff-devel-4.2.0-3.el9.x86_64.rpm 8a35d0950ca177c4096eef39e97b898fe73137c2f8ebcbd86e81f53bf37fec84 RLBA-2022:3271 new packages: libwpe Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwpe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwpe-1.10.0-3.el9.i686.rpm a9d3d64199ce2053eba07641400fb76c6aa7fcfe3018228fa5290520eec57342 libwpe-1.10.0-3.el9.x86_64.rpm ee16e7187536370bcf50ce7d0a21b10b087e1df842565b3039b1ddfec28f4bd6 RLBA-2022:3279 new packages: libyang Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libyang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libyang-2.0.7-1.el9.i686.rpm c2d0341d8e902497898814cbb17d6073e75c17a250c9e7765e83c13056c6062e libyang-2.0.7-1.el9.x86_64.rpm faac667b188304db98c4ef0ee2c9c94627b3db102fd325a4de9ffa3126c77821 RLBA-2022:3283 new packages: linuxptp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms linuxptp-3.1.1-2.el9.x86_64.rpm e0fd2d3dc314605adc38d6c6974e0cf6a1cb72b2c92f9a207c8a9e70614847a4 RLBA-2022:3317 new packages: memcached Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for memcached. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms memcached-1.6.9-6.el9.x86_64.rpm 23f5898c17e10852c959acee8fb9f8ef8115bed0dd8c4eda932086abee4411a7 memcached-selinux-1.6.9-6.el9.x86_64.rpm f58dc3c11e410514bf1ae7c3bc9064b42c5934988933075f46c9259704760eff RLBA-2022:3319 new packages: mesa-demos Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa-demos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glx-utils-8.4.0-12.20210504git0f9e7d9.el9.x86_64.rpm c75a83da2fdd0ae2c4c575a5b2ecbc779a0f38136f78cfcca9e9bd83d1b962fc mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.x86_64.rpm 2519e3f4a4e64d80573088f0e5d0afaee1aadd72d0740841428f752b3a3dce1c glx-utils-8.4.0-12.20210504git0f9e7d9.el9.0.1.x86_64.rpm 4bca2a9207bf337a972d9da4cff424e84d9a5db33dbb3d43781ad7b6f040a779 mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.0.1.x86_64.rpm a9a4fde82c80da96167bef4983924cf21bf84b46ef4a1770db55861b8a699c25 RLBA-2022:3323 new packages: mingw-crt Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-crt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-crt-9.0.0-2.el9.noarch.rpm 97bd1036be28d62d6c3cd9236815d0c50b82d33f24703f15d063220ede1b42cf RLBA-2022:3324 new packages: mingw-filesystem Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-filesystem-119-2.el9.noarch.rpm d7e89a72daf90367078951559ed0230f6d7b9a3a7586a6dbeee74e8564c6a5a6 mingw-filesystem-base-119-2.el9.noarch.rpm c63a593e2be0c490cc63d37ba4a5918c66dddecb9dc7be4b503b8301c5a12671 RLBA-2022:3329 new packages: mod_auth_mellon Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_mellon-0.17.0-6.el9.x86_64.rpm 83acce59a0bc2b14e115a163b9e82d912c101c1eab83ea43e79483ee4ff46892 RLBA-2022:3339 new packages: mod_security_crs Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_security_crs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_security_crs-3.3.0-3.el9.noarch.rpm 13bb61fb300c7a67b7fbb50861489ea05add0363ea6025f0f8d38fd499f6a348 RLBA-2022:3392 new packages: openjpeg2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openjpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openjpeg2-2.4.0-6.el9.i686.rpm 84cc657ebf017e944950c3e3a99672dacb3e4cb900297c65ecc6ac7f8e1b6122 openjpeg2-2.4.0-6.el9.x86_64.rpm a1ff83896899d34681e729b1cfee5f8d9c7f769f802f5b54bb9781f819957bb0 RLBA-2022:3631 new packages: pki-servlet-engine Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-servlet-engine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-servlet-4.0-api-9.0.43-4.el9.noarch.rpm 3f808c1b7dc192eb13958b4b7dad0d8b5833e978594c921232b2ed010d56b40f pki-servlet-engine-9.0.43-4.el9.noarch.rpm bc2350f08e4ca1f97fe8dfee27240e7f4fb9a4fac342ccc0425ff9c32009942d RLBA-2022:3642 new packages: poppler Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-12.el9.i686.rpm 78db34ad6e3e9bd77e4fa0e19f77b0b6739b3e6ec109b3b6fd76a82415e12f6f poppler-21.01.0-12.el9.x86_64.rpm 18fd7f5209755b145d523d305f900ca11a393c35b711da5902fc85db39bdfe5a poppler-cpp-21.01.0-12.el9.i686.rpm 87569d100bcbb79f67e65939ba09592fc8d4c960395f1a338c14e449aa6e740d poppler-cpp-21.01.0-12.el9.x86_64.rpm 52c26fb209ef63a62e8399641fce4f8f87f4662d1290a173120417c1f191726d poppler-glib-21.01.0-12.el9.i686.rpm 3a85cc47fe4fb4e5c810a3860d34c7eabaa10e24f0cce8fea04bc292fdee738e poppler-glib-21.01.0-12.el9.x86_64.rpm 06cf367d138624fc9f15d7803f9cda28e823aa7575f56971f01dc4b9b5677c39 poppler-utils-21.01.0-12.el9.x86_64.rpm 2be4571777d7925f19631c21d087639486260267a0d7bcaa500d49a44a5579ea RLBA-2022:3645 new packages: postgresql-jdbc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgresql-jdbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-jdbc-42.2.18-5.el9.noarch.rpm e59b40159b9c5a040052f1cdccfc3abbc4491622c7fd656e0e5edf9d66ca8ae0 RLBA-2022:3654 new packages: pycairo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pycairo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cairo-1.20.0-4.el9.x86_64.rpm ec9f36ed6bd1b4e10ca6b9b6443fba966653e32f5ec53676feb65ca446904b98 RLBA-2022:3657 new packages: pyparted Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyparted. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyparted-3.11.7-4.el9.x86_64.rpm e9d92042bad6f87a29b2cd535258b4482c0cfb0a3b97d0ac14b60e5d9a85416e RLBA-2022:3704 new packages: python-rtslib Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rtslib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rtslib-2.1.74-7.el9.noarch.rpm 9d18834ebe1fa96b2ea7ed1743518b42444cbd2ce551a7836c712875c8a468ee target-restore-2.1.74-7.el9.noarch.rpm b79cb278217979834774b9c793eaa46c14f0400639e5943d8636a4c5df1860d6 RLBA-2022:3715 new packages: qt5 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-5.15.2-9.el9.noarch.rpm ef5b8996f7f22358e1c9af6747950422aa18bbbfc954a4063e5c95b67ef0b1a4 qt5-rpm-macros-5.15.2-9.el9.noarch.rpm 9e2a2ebbcd71777737a5e541178bbfa1513ab87b956e571ff7d37a668c6dc128 qt5-srpm-macros-5.15.2-9.el9.noarch.rpm eb93bc9a5fc016105534145167bb98da641f0638ba21f867dc6a636ba8186695 RLBA-2022:3717 new packages: qt5-qt3d Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-5.15.2-9.el9.i686.rpm d9382ea8abea96e5edfa2ebfd8c0267ee7d0e54482e93c33222c6127d80208b9 qt5-qt3d-5.15.2-9.el9.x86_64.rpm 4b3192c2df9c855e1cbf9d6c94c397a9e0ac1cefd5743714650cba0ac4e5fa60 qt5-qt3d-devel-5.15.2-9.el9.i686.rpm 8e358dd38cd8b54102a5c473f014af5491b60b8b251fab4dcf47d45809f23f19 qt5-qt3d-devel-5.15.2-9.el9.x86_64.rpm 583ae00c44b9ae48d8c35a32a99fd90a7418dba74576afd31dc79ff8f4669cd9 qt5-qt3d-examples-5.15.2-9.el9.x86_64.rpm 4d7009cff4b250e645eab00038402dd9f509982e6ac8d45fff0feb1de6bcee6e RLBA-2022:3719 new packages: qt5-qtdoc Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdoc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtdoc-5.15.2-5.el9.noarch.rpm 867375710867d29a4245b72f728ceb6422d18e99dc45a196561ccdd36a41715d RLBA-2022:3723 new packages: qt5-qtmultimedia Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtmultimedia-5.15.2-7.el9.i686.rpm 23c9307f6bf94858aac03d600397e022bfb9f08293798d8f7db8667fb607d8eb qt5-qtmultimedia-5.15.2-7.el9.x86_64.rpm 6900d7e34fd943deebc75c56738bd997d89f8ba1437655930d9febaf620b2feb qt5-qtmultimedia-devel-5.15.2-7.el9.i686.rpm 3f922d23fc713ad55d6b8c02b42271cdce4fa246f886f86957a7eaf25ee188a5 qt5-qtmultimedia-devel-5.15.2-7.el9.x86_64.rpm 0f4aa9785a7c77e9201efe51e969d6460cd57dbdc14ab90c09a91d67d3aec898 qt5-qtmultimedia-examples-5.15.2-7.el9.x86_64.rpm f8304e81c3f23258cc1671683892cfc14cfb62a9811fcacb65eeb98fd617699b RLBA-2022:3724 new packages: qt5-qtquickcontrols Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtquickcontrols-5.15.2-6.el9.i686.rpm e32c44f03d89d23a843ec5dd6df80e7fda6c093b5ec37455dd07f838dbf7e6cb qt5-qtquickcontrols-5.15.2-6.el9.x86_64.rpm beb789c9a9e339114abaf68daccedfc153bb49cf5003b54c106f4e02fa3669ec qt5-qtquickcontrols-examples-5.15.2-6.el9.x86_64.rpm 228b544d3ac41e6e8463c6c54e76d864934c52232c962426243d49d2c088fae2 RLBA-2022:3726 new packages: qt5-qtserialport Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtserialport-5.15.2-6.el9.i686.rpm f83d2493528d3b7d163b780fafb71b5d8c92f64ec5de5638a05919b940bab07e qt5-qtserialport-5.15.2-6.el9.x86_64.rpm 0a4c77bee81debafe00b1b64cf1cdc0950b4817814c579a5d1220e7aa9f0ffb7 qt5-qtserialport-devel-5.15.2-6.el9.i686.rpm d5a89f5a28853cf0b4b9291e5b23411265e3a11adf70903ebfd194952a25ea86 qt5-qtserialport-devel-5.15.2-6.el9.x86_64.rpm 6a72b72a007e5affe10b67516ad9c8ac473a6882d23a194246758bdf3faabb74 qt5-qtserialport-examples-5.15.2-6.el9.x86_64.rpm b9f70a3149f3b48158aa5138e674602254b6b5179374e0a2cfae30d7ade88a40 RLBA-2022:3727 new packages: qt5-qttranslations Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttranslations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qttranslations-5.15.2-5.el9.noarch.rpm 2d5fe3f4e08553925accaecefce6cc0b6f2284e845c6fbbaa88fafa3afdf7a16 RLBA-2022:3728 new packages: qt5-qtwebchannel Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwebchannel-5.15.2-6.el9.i686.rpm d1c9a72472e558ca374b09870f128ad49cfff5a110cf7b35d2b7817ced105509 qt5-qtwebchannel-5.15.2-6.el9.x86_64.rpm 5d6c878724dfbc2ac968bad55c44578f5077d532f5724fa6941c5f1dcba91069 qt5-qtwebchannel-devel-5.15.2-6.el9.i686.rpm 6c19be00a10333346f57693eb06c4ed44ea795c98e08878c4f41990a4821e957 qt5-qtwebchannel-devel-5.15.2-6.el9.x86_64.rpm 4d511673a9e725a55bf58e427c1d06e897ae1fa02b9a0a3e48443b965546df0f qt5-qtwebchannel-examples-5.15.2-6.el9.x86_64.rpm 2eb6ce8dc001c299aa873a97cb5210b7a71b7b7100bb694e49d1a8f677ce6d00 RLBA-2022:3729 new packages: qt5-qtwebsockets Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwebsockets-5.15.2-6.el9.i686.rpm c8b02528644dfcb17d116c83a1b85b878bc14157d423daed4732c47162ad13dc qt5-qtwebsockets-5.15.2-6.el9.x86_64.rpm 3e096c45bf4086beb9cbe06bdc1f51596bf6b9ed690676e1fbebaf893db40219 qt5-qtwebsockets-devel-5.15.2-6.el9.i686.rpm 97584a21ea6e18e85dbf46d358a21927a7837ca38780ab77921a6aaf4c0ffb83 qt5-qtwebsockets-devel-5.15.2-6.el9.x86_64.rpm 9b040d44a722501190961c6fafd4253195a5567a43205e6fa07bfd8929bd3439 qt5-qtwebsockets-examples-5.15.2-6.el9.x86_64.rpm 4a6e3c53eb96600095f002048a90324c3c41d097a703817d24d7cfc672281371 RLBA-2022:3730 new packages: qt5-qtx11extras Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtx11extras-5.15.2-6.el9.i686.rpm 2785902956e97ea300f0cd6bcb4bb04e46953d88ca0840ce4e15c3e5a2939dce qt5-qtx11extras-5.15.2-6.el9.x86_64.rpm 3447fef1246ba6c3976a975f33f57ebafbde689a35f7f300d9a04bc1e51b3162 qt5-qtx11extras-devel-5.15.2-6.el9.i686.rpm 5d7d5487f1c9e494e20e665cb54f5325a4b2e3a4e163414cb4b4bcd337a37289 qt5-qtx11extras-devel-5.15.2-6.el9.x86_64.rpm 5077c028499401be4f5820a93d578b756f6692edc0a46559585cb47f125b11ea RLBA-2022:3731 new packages: qt5-qtxmlpatterns Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtxmlpatterns-5.15.2-7.el9.i686.rpm e7072dd982005d92198e1dbc14b72df31ae13eab0c5b3c392683148307fda00b qt5-qtxmlpatterns-5.15.2-7.el9.x86_64.rpm b82f91df297ff754a89acd240623899f81ce0f0dc015ff5215a327efe7d8f959 qt5-qtxmlpatterns-devel-5.15.2-7.el9.i686.rpm 82e449ace654d3729cef2b5b938fd627b96c5254cd6b2d6dc5a49af49eb848d1 qt5-qtxmlpatterns-devel-5.15.2-7.el9.x86_64.rpm bac0a0751e36e8213ccdfb091ee8f5226d65cb30bbd6bd3bc9df6d451aebbe88 qt5-qtxmlpatterns-examples-5.15.2-7.el9.x86_64.rpm 5211e35f2169c0bf43886488b35fe0772e264ee0006d3ab48955cc418f416b87 RLBA-2022:3778 new packages: sip Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyqt5-sip-4.19.24-6.el9.x86_64.rpm 73804c4490149ba2e6af3f93174936b600aa34a9d779cbfd94fc1e637d144077 python3-wx-siplib-4.19.24-6.el9.x86_64.rpm 175bd7d1fad5f528a97efdc77c6054a574076653a54f93cc11513dd222c620e1 RLBA-2022:3740 new packages: rig Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rig-1.0-4.el9.noarch.rpm 1d5f6db928a0b3560d7632a663efa9fed24b37b30f88af2bd9eb98a753720cec RLBA-2022:3754 new packages: sane-backends Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sane-backends. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sane-backends-1.0.32-6.el9.x86_64.rpm d2a41ce0293b48f4ac0a5acc8e8e27cc80a520df8465858a835418d2107c292a sane-backends-daemon-1.0.32-6.el9.x86_64.rpm 4cef86a9559671816fc74ef804d51c274ec58a6f20c1d0f297148eccef0b7210 sane-backends-devel-1.0.32-6.el9.i686.rpm 18f9102cd4965e737b3aa1fe90e1276ef047c646ee483814301cd6a9fbe0338f sane-backends-devel-1.0.32-6.el9.x86_64.rpm accfe11d52e276229679eb0cad2bd27b482aca8288565bf9b1975b3e835f2528 sane-backends-doc-1.0.32-6.el9.noarch.rpm 27d411bd9527a941218ab02c5e886f083596eb49604dcda9898d3bbdf70115c1 sane-backends-drivers-cameras-1.0.32-6.el9.i686.rpm fb7ea4d8135ecf2e38fed46a44bec5b666c201929fcf1fb27e52fa97d0f4e164 sane-backends-drivers-cameras-1.0.32-6.el9.x86_64.rpm 98de2a90d6d3279f4b8abbe00b03222f1b19a9effd357c288ea11c863e267385 sane-backends-drivers-scanners-1.0.32-6.el9.i686.rpm 45970cf88e71a5333099e5e17c89d520484bdb5e0459dfca21ae21640f4cea37 sane-backends-drivers-scanners-1.0.32-6.el9.x86_64.rpm 5c946834fc1d2fd666f11ce929af6e65c67f2aad9566c0f4411d81f8326221fd sane-backends-libs-1.0.32-6.el9.i686.rpm 15eb0ecaed82a765498b9e0493c117b077062dded2f2a8a7c7bf0320b712fba4 sane-backends-libs-1.0.32-6.el9.x86_64.rpm b46667562b5c95c81c4d756286b8029722d7a36ffb55c218631bfabd12be25f4 RLBA-2022:3762 new packages: sblim-wbemcli Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sblim-wbemcli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sblim-wbemcli-1.6.3-21.el9.x86_64.rpm c4ecc62edbfed00eb36d0ef1b404eb8f024c6485f05a4b88585d0bce02073eb8 RLBA-2022:3796 new packages: stratis-cli Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratis-cli-2.4.3-2.el9.noarch.rpm 3c38fc123d04f308e8eeb5dd713dd2749d732cfee60cc8e63fbb8fbfbc7970bd RLBA-2022:3797 new packages: stratisd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratisd-2.4.2-3.el9.x86_64.rpm 68db1ff86576f30a6c7608b733e186aaf758d304f2f4aadbac6e0b97470888cb stratisd-dracut-2.4.2-3.el9.x86_64.rpm b504a339d63411143ab6fc2d369730123a3dcfbd0242bcb5cadd62576cfbca72 RLBA-2022:3799 new packages: sushi Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sushi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sushi-3.38.1-1.el9.x86_64.rpm 2223d53b0dc581c0b76b8819c65b4f152af06fb66ddc8643f9668dec19802316 RLBA-2022:3814 new packages: tk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tk-8.6.10-8.el9.x86_64.rpm 26d970bb0bc59969ed5c4f96c95e942d9e04f63ad846bcc1ffae5d7a33f29360 tk-devel-8.6.10-8.el9.x86_64.rpm 6a53def3a77e73c99fcf8745c9e816df3ba21755a93af65a03c0493deaf42d88 RLBA-2022:3836 new packages: virt-p2v Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-p2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-p2v-1.42.0-6.el9.x86_64.rpm 69ddee1dfa86627d4486aeafc9033ee14bbfde77be41e863a2c9a2675a9ef5aa RLBA-2022:3841 new packages: wavpack Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wavpack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wavpack-5.4.0-4.el9.i686.rpm 0c7590a9828d6db99e110ac0728764665b5cd6fff892b4b1274ecd7e1efb9be5 wavpack-5.4.0-4.el9.x86_64.rpm f7f3dae7f2522fa67a0406dfeb90e2ed9019bf7abb44af9d4ff3ccd448f777ca RLBA-2022:3844 new packages: waypipe Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for waypipe. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms waypipe-0.8.0-2.el9.x86_64.rpm 12c711bd2d5bffb805a7ebebe25ffdce917967f9ea73361122e4830d402b1c33 RLBA-2022:3847 new packages: whois Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for whois. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms whois-5.5.9-3.el9.x86_64.rpm bbc101eb76bbad8f5842db57412073f382099c6c3a1e2b9e92f9c3befde753bf whois-nls-5.5.9-3.el9.noarch.rpm 4c244a11ef584a6b09e0d0f73992e3cddfba94b5e0e154505e36d3391ac864e9 RLBA-2022:3848 new packages: wireguard-tools Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireguard-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireguard-tools-1.0.20210424-3.el9.x86_64.rpm 2f31a6758368b85920c1c57236c60725536402a0e538a406d22e56072127f9ac RLBA-2022:3850 new packages: wpebackend-fdo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wpebackend-fdo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wpebackend-fdo-1.10.0-2.el9.i686.rpm 56bbea271f817c31837f5a708d801a21ca07cfa5884e3e36d7fc56c34abe55f2 wpebackend-fdo-1.10.0-2.el9.x86_64.rpm 938ff9d6348e2a7bcd181fd9c3b73dd2e63edb6472f19e5cd7c3f9031d3ec968 RLBA-2022:3859 new packages: xdg-dbus-proxy Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-dbus-proxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-dbus-proxy-0.1.2-6.el9.x86_64.rpm 25f02ba273428798c990c8e3896385111c8c65ed4be52afbbee922bd2e0a9296 RLBA-2022:3887 new packages: zenity Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zenity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zenity-3.32.0-7.el9.x86_64.rpm 01aa0dcf84b8da3e0c0c015cbaf20d1521f3386daa7d1899de75b70eb774f0de RLBA-2022:3888 new packages: virtiofsd Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.1.0-4.el9_0.x86_64.rpm d9670be88706d6e45479d301c2f0dcfd26a0fe80f2f20bfad8150ae082dae1fa RLEA-2022:3889 new packages: libwmf Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwmf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwmf-0.2.12-9.el9.i686.rpm f76341407b0e38a9d22d8720fc29ac63b907506ac4073822d0c67ef177c57090 libwmf-0.2.12-9.el9.x86_64.rpm a542c20c4dce5bc60c8a0752b80e5f70d10c7f3185dbc469110405e5ee95a712 libwmf-lite-0.2.12-9.el9.i686.rpm 4ebb0bc080e9552f0783ad300a5ded14211e8545468c7c7b8af759c3672506e0 libwmf-lite-0.2.12-9.el9.x86_64.rpm 9e3a5e47d659066abe6709b1031c70aed4375abf59de34177bbfec52885b6326 RLEA-2022:3891 jigawatts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jigawatts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Jigawatts is a new package introduced in Rocky Linux 8.5 & 9.0 to facilitate the use of Checkpoint Restore In Userspace (CRIU) from Java. rocky-linux-9-x86-64-appstream-rpms jigawatts-1.21.0.0.0-3.el9_0.x86_64.rpm 0917fb310b48fef4eced1ce0f5ac2df28ba85a6c2602baeb048b61e5b673f925 jigawatts-javadoc-1.21.0.0.0-3.el9_0.x86_64.rpm 46ecf85caa7949dbdc8ea5eb2b5d05a3a5a962fab0b5d06c03ae6326ed805c4c RLBA-2022:4577 cockpit-session-recording bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list the cockpit-session-recording packages contain a web console module providing session recording configuration and playback. This module allows viewing and playback of journal-stored terminal session recordings generated by the tlog component. Bug Fix(es) and Enhancement(s): * Enabling session recording configuration does not work due to Rocky Linux9 SSSD files provider default (BZ#1075542) rocky-linux-9-x86-64-appstream-rpms cockpit-session-recording-11.1-1.el9_0.noarch.rpm 35e331f468c36666c7454ad976c6828330a470f80371454856ff181714d73db5 RLBA-2022:4578 tlog bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tlog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tlog is a terminal I/O recording program similar to "script", but used in place of a user's shell, starting the recording and executing the real user's shell afterwards. The recorded I/O can then be forwarded to a logging server in JSON format. Bug Fix(es) and Enhancement(s): * tlog causing SSH to not reliably run commands (BZ#2077459) rocky-linux-9-x86-64-appstream-rpms tlog-12.1-1.el9_0.i686.rpm 8e43ce39374653b11f1eb5317f93ce7d55bc4c1b6e94bd57157d4c1f57731c6e tlog-12.1-1.el9_0.x86_64.rpm d0f110a7f95b5ee8fb78a272d9dd96ba1c0b72c59e08fb7baab1a30261f4fd65 RLSA-2022:4795 Important: rsyslog security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Security Fix(es): * rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms rsyslog-8.2102.0-101.el9_0.1.x86_64.rpm cd3c5a024f28e5cd3b1287f06974c56b0bad054b5b9b46ab7e0b5c294425563e rsyslog-crypto-8.2102.0-101.el9_0.1.x86_64.rpm 5af0812d0799c0e23b9ea2a35ed4935a9f38f59eb3133eeb11ae464e883365cb rsyslog-doc-8.2102.0-101.el9_0.1.noarch.rpm 901e74c21a66e351856b5d89f44c37cb93b53a829190913b1903002c626b521c rsyslog-elasticsearch-8.2102.0-101.el9_0.1.x86_64.rpm 763b78e2de86dff9c979ac1ff8c38805a65cbf83a78f523e08d173df6702243a rsyslog-gnutls-8.2102.0-101.el9_0.1.x86_64.rpm 20dbf6aa53b2cda60a0386d5baf915bbd3fddfa0c5fa285396c4764f52886de7 rsyslog-gssapi-8.2102.0-101.el9_0.1.x86_64.rpm 74c93207c6df5a8ac75d42c550ddca57e640c9f5537c5f729c7a0755dbf46d6e rsyslog-kafka-8.2102.0-101.el9_0.1.x86_64.rpm 3d0e8da77f3ccbaa5839c6cf09401150f9be3805de1edc95a9cdf618348f9c86 rsyslog-logrotate-8.2102.0-101.el9_0.1.x86_64.rpm 36f3315a2bf44d0c07e8cdedefbd5c3a983bdcdb29b8b541957230e246bb27a7 rsyslog-mmaudit-8.2102.0-101.el9_0.1.x86_64.rpm 438e1cf2c24e03cff46498eb042d87360957cd3b227c1beeed82347c46e80d77 rsyslog-mmfields-8.2102.0-101.el9_0.1.x86_64.rpm 496417386cb90892cf831081a2b0bc1117995b763c777c9febd979cf0e859433 rsyslog-mmjsonparse-8.2102.0-101.el9_0.1.x86_64.rpm 1aa748d2ec6777fd7eb37117a89f294f202108438382ded44aa7050cc059c564 rsyslog-mmkubernetes-8.2102.0-101.el9_0.1.x86_64.rpm d2cd71e516bfa1c1dc076b9d8d8dd6bb5bd685102b710794f75fe2e0ec85925c rsyslog-mmnormalize-8.2102.0-101.el9_0.1.x86_64.rpm c3e488761681d3cdf404a4efef0f5bd1435eebc819734220ee27b523a5143eba rsyslog-mmsnmptrapd-8.2102.0-101.el9_0.1.x86_64.rpm aeea30571c815d3187e1a6e2d6c5c8800836b68a4b4c725a2080485404ff8443 rsyslog-mysql-8.2102.0-101.el9_0.1.x86_64.rpm f879c8a85bb785347b3f7966661ce74d384e941bc9dd27d94ac08700e4305360 rsyslog-omamqp1-8.2102.0-101.el9_0.1.x86_64.rpm 5f5d04e3e10ce5bf384913e95a177db808496062d44e199511d6f095cc85d731 rsyslog-openssl-8.2102.0-101.el9_0.1.x86_64.rpm b7f1ef0bd64adf0fc14670e3582b608d1828fca4fc32bcbde7fabfb3663d9673 rsyslog-pgsql-8.2102.0-101.el9_0.1.x86_64.rpm 2ff93ababd1408cb6bfd82f0df26cd363a0e8901becfcdb8287efd86c615d58a rsyslog-relp-8.2102.0-101.el9_0.1.x86_64.rpm b58c119284dfc8081c210b00d00df4cbc2e3fd46a60366589d0caadc4ca16eef rsyslog-snmp-8.2102.0-101.el9_0.1.x86_64.rpm dc7971e62b54235233138c4cb12d48ba853aed11bf811c93f989fe83c1e3edb8 rsyslog-udpspoof-8.2102.0-101.el9_0.1.x86_64.rpm ca8b86ed47fe06fc03d76c1db88b076ce94083869328f98c683b885ef108b4b6 RLBA-2022:5213 gnome-control-center bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-control-center package contains configuration utilities for the GNOME desktop, which allow to configure accessibility options, desktop fonts, keyboard and mouse properties, sound setup, desktop theme and background, user interface properties, screen resolution, and other settings. Bug Fix(es) and Enhancement(s): * Update timezone map (BZ#2099773) rocky-linux-9-x86-64-appstream-rpms gnome-control-center-40.0-23.el9_0.1.x86_64.rpm a642ba1c421bb42b2611de182f18129222eaa47938c13ae30f03a8549584f0e9 gnome-control-center-filesystem-40.0-23.el9_0.1.noarch.rpm 620f11fd9136f7413690aee2b0c3d957bbfde13fb9b2b383c26d78600d293e8d RLBA-2022:5256 evolution-data-server bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The evolution-data-server packages provide a unified back end for applications, which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications. Bug Fix(es) and Enhancement(s): * Backport patch for Google OAuth2 change since October 2022 (BZ#2081793) rocky-linux-9-x86-64-appstream-rpms evolution-data-server-3.40.4-3.el9_0.1.i686.rpm 55361c00ec450b047fc08f0a43a86e7340d66236babd81a3239346b0b7e09dda evolution-data-server-3.40.4-3.el9_0.1.x86_64.rpm 908e80ea8685439fff9cc9bc750f0cbd085ba59e1a70a5b4606194a6d11b227d evolution-data-server-devel-3.40.4-3.el9_0.1.i686.rpm 5e7ca044a64654412cb310e5e1e9ff90341f5238a864f26dec70b5ccddede3c2 evolution-data-server-devel-3.40.4-3.el9_0.1.x86_64.rpm b3b61289e5392057b7e7fadaec17a3dbb3f648819fb1ba40776b5b71175fc31f evolution-data-server-doc-3.40.4-3.el9_0.1.noarch.rpm 7341109627dcdf7b421cb5252695b0f95fac3e8ba678d1085bd4b0583270ad6c evolution-data-server-langpacks-3.40.4-3.el9_0.1.noarch.rpm 8ae1af914ea4034ae8823e7f347fdb999c7f6e1f18f6d4d3ef9cc81cbadc1d0f evolution-data-server-perl-3.40.4-3.el9_0.1.x86_64.rpm 3cb88357b78ce8aa0fdb5886fe6269d61512f85046bcd2ff21d2a9572f10c310 evolution-data-server-tests-3.40.4-3.el9_0.1.i686.rpm 7591bfcb5d46222bde499dca7f40a49b99ac7da8290957b0b403018e58aca2de evolution-data-server-tests-3.40.4-3.el9_0.1.x86_64.rpm c0216e4ae08b2c2965e504f893b3d093eba66591d02a7f56ee0dbe3caa1e229e RLBA-2022:5259 systemtap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SystemTap is an instrumentation system for systems running the Linux kernel, which allows developers to write scripts to collect data on the operation of the system. Bug Fix: * [REG] systemtap: return probes doesn't work for symbols in kernel modules. Note that the issue persists on the 64-bit ARM architecture. It has been fixed on the remaining architectures. (BZ#2083727) rocky-linux-9-x86-64-appstream-rpms systemtap-4.6-13.el9_0.x86_64.rpm fe36f5ce41be5b86b32a3b43628ef41dff30f0b86da47e10e12d6ac0edf58b2b systemtap-client-4.6-13.el9_0.x86_64.rpm 9fd5015703b6a2f7a9cc67daa6a569f3976ab8259a2f3ac5443d8a16c197b56e systemtap-devel-4.6-13.el9_0.i686.rpm d6dd7f1f952e76f4871ced8b0e126dc7517fe7060c6fd7207281dfe2265c324a systemtap-devel-4.6-13.el9_0.x86_64.rpm 9e8c353ea58d26d35f74ff0eee989fef251bd8817b99e6703b14144a08413d2c systemtap-exporter-4.6-13.el9_0.x86_64.rpm 51b7054336ba0e3d1c4a2c1b938c714dd4a4e3baff36ccbbd520034c66ff1450 systemtap-initscript-4.6-13.el9_0.x86_64.rpm 72f61cff66738d843306221d9e120403854f14c22868133c1643828bbde4aa75 systemtap-runtime-4.6-13.el9_0.x86_64.rpm 6513d29b9c14d81cc3f490d31a3d0c18979fca33a753e8269f9f53ded36f8988 systemtap-runtime-java-4.6-13.el9_0.x86_64.rpm 5672ea610c5465296ea126cea6e9f0cb6eaf516d3c8dc84e0d055f49bf8ac6e0 systemtap-runtime-python3-4.6-13.el9_0.x86_64.rpm b8e2f00ca1bbc774a8a361873bedabde952d2996aa48f574dc00db6414d1ab57 systemtap-runtime-virtguest-4.6-13.el9_0.x86_64.rpm b50617982052f1a95ae85d7b86bb3284f1c1b53115b7ff900490911d4caf454f systemtap-runtime-virthost-4.6-13.el9_0.x86_64.rpm 180d35c58ae92f44308bb6d20e88c5996af3a6072fab9791902cea41372ff48f systemtap-sdt-devel-4.6-13.el9_0.i686.rpm 6b941d43d8ecb18d4641545b33d48e4f791fa25b840dc6303be9e5b2800ad81a systemtap-sdt-devel-4.6-13.el9_0.x86_64.rpm de4a57f712771c4850d70f8b7b44d3ea65169906a7898c6548ab5517a185eb3d systemtap-server-4.6-13.el9_0.x86_64.rpm 7b6200453553bf3d8de5f1e7020920b03e617015c7671ee948a4423c979a54fd RLBA-2022:5261 libvirt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fix(es) and Enhancement(s): * Allow memory prealloc from multiple threads (BZ#2075628) rocky-linux-9-x86-64-appstream-rpms libvirt-8.0.0-8.1.el9.x86_64.rpm 98004c062e2b4b2ae8d5a4280973b89955b33e69732ec7ac89dab9af7a51cf39 libvirt-client-8.0.0-8.1.el9.x86_64.rpm 8b33305ee2c63116e3fbb3429a7777aae7a2f56c939f9e45ef1c48009c6afa64 libvirt-daemon-8.0.0-8.1.el9.x86_64.rpm ee6edf505d780b9299675c4a7110625c1f6f9e26f15abbe847b7414d9c4d5c89 libvirt-daemon-config-network-8.0.0-8.1.el9.x86_64.rpm a4621e3d5add23ae8c1ee961177caa39cb51ad47d7008f32e57915319fd54452 libvirt-daemon-config-nwfilter-8.0.0-8.1.el9.x86_64.rpm afb576f2f5b439698c2d2c1fd7ed3b602d6d8857934c782dbd33d0fdeb826cbb libvirt-daemon-driver-interface-8.0.0-8.1.el9.x86_64.rpm 9279266f77773df3feecb4e5409ff305695c71f49eb3ee43d6deea23160ceac7 libvirt-daemon-driver-network-8.0.0-8.1.el9.x86_64.rpm 93dfdf106c987f022a736efada04b7e54006e7a7ac5a75520432ec3f57084e12 libvirt-daemon-driver-nodedev-8.0.0-8.1.el9.x86_64.rpm 60729cdd8973d322380fa540e9d247715cfc92a89d46138df675bf107b2158a7 libvirt-daemon-driver-nwfilter-8.0.0-8.1.el9.x86_64.rpm 57413fb88038355175ece15ac2b4afd53b1e3876f73f93846e1e19f031297c52 libvirt-daemon-driver-qemu-8.0.0-8.1.el9.x86_64.rpm 5124d7bd712c77f06a4c7ae8a508d4a43f87696215f6889e96d1ebb5a0f483b9 libvirt-daemon-driver-secret-8.0.0-8.1.el9.x86_64.rpm 617fa31bf039448fe270073ad7782dab56f4c2cd8a708ea0646543a33e912e48 libvirt-daemon-driver-storage-8.0.0-8.1.el9.x86_64.rpm 3f584c7f098459f8a1ec709f3c8617615491b771ab707e1dd7e97605cd9d00d4 libvirt-daemon-driver-storage-core-8.0.0-8.1.el9.x86_64.rpm 241f060f99e6c7a457767798a5da77429917d39540fefcc548ac48f2ceb61334 libvirt-daemon-driver-storage-disk-8.0.0-8.1.el9.x86_64.rpm 1e50a39e9b113264c7de701b045f0af7c5e1032c3fe6734f4ad852e638974a97 libvirt-daemon-driver-storage-iscsi-8.0.0-8.1.el9.x86_64.rpm bba804a615351d9343b9f03620bc7632bfc668c380c50b2d82aa284fd4cde402 libvirt-daemon-driver-storage-logical-8.0.0-8.1.el9.x86_64.rpm 552828c36ed3e7e2cb4b685477c2a7bb6d0abde8979470d9452aaf4606767f91 libvirt-daemon-driver-storage-mpath-8.0.0-8.1.el9.x86_64.rpm 1142f3a7eb75a06be1b283cd0949909485f07bdd3f8d85c7bb421902627a1375 libvirt-daemon-driver-storage-rbd-8.0.0-8.1.el9.x86_64.rpm a3c9159681c7550a287801f75e57bff3b3881ff727560159e63cba4378e8f7df libvirt-daemon-driver-storage-scsi-8.0.0-8.1.el9.x86_64.rpm b89de3978f33d9e5fe255483e7d075e6d4b37cb39dfd29ec46311c694e6f9277 libvirt-daemon-kvm-8.0.0-8.1.el9.x86_64.rpm 0554077fbb57de8ff86763fe2a23e299d510269a3660eff0f3e096d2530d3f12 libvirt-libs-8.0.0-8.1.el9.x86_64.rpm 041a093d57b29d79186482f0e181abe533a581bb10336669177757c5bf00fb8c libvirt-nss-8.0.0-8.1.el9.x86_64.rpm e72a3d30bcf3caeeebd1db0d760941cac22c99ae16f840d0e61f674f5c14e289 RLBA-2022:5262 lldb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lldb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LLDB is a next generation, high-performance debugger. It is built as a set of reusable components which highly leverage existing libraries in the larger LLVM Project, such as the Clang expression parser and LLVM disassembler. * ppc64le: lldb loses connection with lldbserver (BZ#2079140) rocky-linux-9-x86-64-appstream-rpms lldb-13.0.1-3.el9_0.i686.rpm 14eac078e98ba2f3f50f5c80b8b21f246b5b54a95cfde01549b9a2164fffc7e5 lldb-13.0.1-3.el9_0.x86_64.rpm 29bcb3a5c2733933c325e89af900324116433fd8d6c65feb0d4c1a67a058d679 lldb-devel-13.0.1-3.el9_0.i686.rpm 084314fed7e5a21507c3804e3c8dbc2588aac97d51d52f86fe8e0ae541c086bf lldb-devel-13.0.1-3.el9_0.x86_64.rpm 9130646f47d02627f0a0fb4039778b52e2efa0816b81b8d8669024352567669a python3-lldb-13.0.1-3.el9_0.x86_64.rpm 846ce14c346f5a5225e91360bc218deb16405dc060dcd9cefddabe33f7b1ff28 RLBA-2022:5278 gnome-initial-setup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-initial-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-initial-setup packages provide the Initial Setup application for GNOME, which allows for quick configuration of the operating system after installation. Bug Fix(es) and Enhancement(s): * Update timezone map (BZ#2099793) rocky-linux-9-x86-64-appstream-rpms gnome-initial-setup-40.4-1.el9_0.1.x86_64.rpm 29c3cb1264328cf1fef573fefe971df4bb4478a4573ebf6a95f613f545ffe8da RLBA-2022:5375 libtimezonemap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtimezonemap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtimezonemap packages contain a time zone map widget for the GTK+ toolkit. The widget displays a world map with a highlighted region representing the selected time zone, and the location can be changed by clicking the map. Bug Fix(es) and Enhancement(s): * Update timezone map (BZ#2100451) rocky-linux-9-x86-64-appstream-rpms libtimezonemap-0.4.5.1-11.el9_0.1.i686.rpm f24147be72682d75f7d6989de2a5bf4e0ffb49cbc096becf87f3e8ac11b28819 libtimezonemap-0.4.5.1-11.el9_0.1.x86_64.rpm 2b678931f5a40d97267cbd3d0d65ebf7c784ae84767903d058449d8b5c05d3b2 RLSA-2022:5716 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: OAuth account takeover (CVE-2022-31107) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-7.5.11-5.el9_0.x86_64.rpm bed43fc28c1e3b5adb9cedd98fcfb5d497a2fef5a3a0ffd7c4e17fcc2991b48a RLSA-2022:5799 Important: go-toolset and golang security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang, go-toolset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Clean up dist-git patches (BZ#2109174) * Update Go to version 1.17.12 (BZ#2109183) rocky-linux-9-x86-64-appstream-rpms golang-1.17.12-1.el9_0.x86_64.rpm de949845f936a45e13a53266f8e73ed761e7a995151a978d7c862b9f4d9f4115 golang-bin-1.17.12-1.el9_0.x86_64.rpm 7d8c78b0d43c040fe6628cb54044104b437cd3cf2ab2be983fca1c17b1554a05 golang-docs-1.17.12-1.el9_0.noarch.rpm c5edbe53296c7b6aca91bafe3c35b2a6b87d88a75090a67c41f3c2448d165dfa golang-misc-1.17.12-1.el9_0.noarch.rpm ec766f14dd7085757646cc6a34c3603b3d04cc704f26ed225013f89c8e7a0c07 golang-race-1.17.12-1.el9_0.x86_64.rpm 86e6d2b2e191933032fe454c576a4182bee5313dd5948f47c9a8f3c81d035dfd golang-src-1.17.12-1.el9_0.noarch.rpm 6768e808193c1df29b6c884def38a8ff6bcc8d524d5d34b339aa01fe034a334d golang-tests-1.17.12-1.el9_0.noarch.rpm 0a8261818dc8a9424ad10a50c9b7d4d92a4d2ffa96271fd316d5061845c3bf95 go-toolset-1.17.12-1.el9_0.x86_64.rpm e90e9179029077ec3201ad075fd3be19930ef4103d3fbaa283c205118ec2606f RLSA-2022:5904 Important: php security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: password of excessive length triggers buffer overflow leading to RCE (CVE-2022-31626) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.13-2.el9_0.x86_64.rpm b05b8dcae3dc8c3b94dd980d2ad8823a87d0633eccc70232d7ee12711bc7cf40 php-bcmath-8.0.13-2.el9_0.x86_64.rpm 42a0dde161fb5d072b0d066ab565082b15c6ce2ff3e416bfa250dec16b3beda8 php-cli-8.0.13-2.el9_0.x86_64.rpm 1321c2f68a1a719eb692744d96055b7866dc7416916ac486323e0e30043bb9ec php-common-8.0.13-2.el9_0.x86_64.rpm b08319f99eefbf0abbf26c5333ade446e250400224eac6730f5047664453f74b php-dba-8.0.13-2.el9_0.x86_64.rpm 53cf4366b176a4b2145d094070de76c4ec30ca3c5d583629076ae55631edf585 php-dbg-8.0.13-2.el9_0.x86_64.rpm f3136ab5fe91692cc983755189f8ff264ac31d25642bdaec95ffc5f11925cd6f php-devel-8.0.13-2.el9_0.x86_64.rpm 71ae98ec6c20cf039ffedc4d0711f0a98f95c82434cf0e24c30750061e20f30c php-embedded-8.0.13-2.el9_0.x86_64.rpm c19345bb33b2c5dc3505061bc8f90c74eb175b4173fc07d4581ef7b98a75551c php-enchant-8.0.13-2.el9_0.x86_64.rpm 632078f70a46a5f1bdcaaf8e2cb9135778749d1f91767549fe2bc5e5411281dd php-ffi-8.0.13-2.el9_0.x86_64.rpm a1cb316621500ecad7e7c8ce937f77cbdf88e0a5d99da4b45e6053b390df6639 php-fpm-8.0.13-2.el9_0.x86_64.rpm 6abf5ff4a650cf921cc4949a0fa95689dbff3f446255b335552d0541886fc4df php-gd-8.0.13-2.el9_0.x86_64.rpm 60dabcdc680ac563a9ed88ac9f04279ff8bfeae143c8d5ad8b12db0b375844c1 php-gmp-8.0.13-2.el9_0.x86_64.rpm 608b0aa6d410ab0aea87b766b66e00e5d59a1e16ee07c2939bc5fc8ce015d2c9 php-intl-8.0.13-2.el9_0.x86_64.rpm e4b9f1c0134155e96f8db86db3ffa0352876c9e4e38b8eeac9fbc3b4ae31e6b7 php-ldap-8.0.13-2.el9_0.x86_64.rpm 41cafe63bff52244ab50a973922d9957e6ae5a3f7a6296b13d1d22b5b0b20d0f php-mbstring-8.0.13-2.el9_0.x86_64.rpm 5d07f220631e9d0f26eaa3084b263bc507f8d275cde3ba8a991aed16216610cd php-mysqlnd-8.0.13-2.el9_0.x86_64.rpm aaf855748b1128bb4da49956957249a6b99084e1bfd2715cef32e5af146172ef php-odbc-8.0.13-2.el9_0.x86_64.rpm 4519ab5932dccbfaab953b2d24130b758b3c01f3d2e6b20c8a095faadc6a1446 php-opcache-8.0.13-2.el9_0.x86_64.rpm 43a7e045aad17369dae98ae0ee666b8e4c92361af39780e5bdbbba80f66a9668 php-pdo-8.0.13-2.el9_0.x86_64.rpm 1ac00f52c70d31f4c97a45fa9d5a0a9a31e8e00def24b286abac1ea42f912ad2 php-pgsql-8.0.13-2.el9_0.x86_64.rpm d8e8dc693e7563d6d93646b3c73747fa39f08c3a976e0eb7cef6352c4a37f969 php-process-8.0.13-2.el9_0.x86_64.rpm f756a1a35803f2c183a5bcf881a2f61751d34498159091072e8a689de134ebe3 php-snmp-8.0.13-2.el9_0.x86_64.rpm c46e4bf45da150938cc45d0144a5486e5c74316f495912668749ccfa7452be3c php-soap-8.0.13-2.el9_0.x86_64.rpm 2ba7ff76ffd84ab4a473cf5382bd437ecd4ec8c0566816333cf0d8f9ab159f7b php-xml-8.0.13-2.el9_0.x86_64.rpm 5aa6b5fadb43a0abb753fe2cff590598d722def51c78a4b5eb5166d508a265b4 RLBA-2022:5946 rhc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list rhc is a client tool and daemon that connects the system to Rocky Enterprise Software Foundation hosted services enabling system and subscription management. Bug Fix(es) and Enhancement(s): * Cannot install packages with package-manager worker. (BZ#2083361) rocky-linux-9-x86-64-appstream-rpms rhc-0.2.1-8.el9_0.x86_64.rpm 593d626a752e6b74849815e2ba5a8bc260e309a2764dbf16ba4f086b479d826d RLBA-2022:5947 virtio-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es) and enhancement(s): * virtio-win RPM for Rocky Linux-9.0.z (BZ#2082607) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.28-0.el9_0.noarch.rpm e551782527c8123c63ea60a0a08693fbfffd0dceaa1026dfe2669e57249d61fb RLBA-2022:5949 fapolicyd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fix(es) and Enhancement(s): * Faulty handling of static applications (BZ#2097734) rocky-linux-9-x86-64-appstream-rpms fapolicyd-1.1-103.el9_0.1.x86_64.rpm 178ca47fb8efb9038744cf777276cda6c8aba100391001f0c339d4e5c82dccf3 fapolicyd-dnf-plugin-1.1-103.el9_0.1.noarch.rpm e262f3d189014f2a7fca9f8c1cb4f69f363ebd67dee9891dbe98621cbbbd47ab fapolicyd-selinux-1.1-103.el9_0.1.noarch.rpm 2424d02dc33c2d04fa1da7ecaf4263e0ed3354738c3fef925b8fc195a6defdaa RLBA-2022:5950 Rocky Linux-system-roles bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux-system-roles package includes a collection of Ansible roles and modules that provide a stable and consistent configuration interface for managing multiple versions of Rocky Linux. Bug Fix(es) and Enhancement(s): * storage role raid_level "striped" is not supported (BZ#2098223) * storage role cannot set mount_options for volumes (BZ#2098224) rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.16.2-1.el9_0.3.noarch.rpm cb32503e5bdc9b3248b5bc1cb2a6be4afe2e2398eeca3c50f7d8247ff826a98b RLBA-2022:5951 podman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Bug Fix(es) and Enhancement(s): * podman implements and/or uses the deprecated SHA-1 algorithm by default (BZ#2069279) * Regular rebuild for 9.0.0.2 (QR) - podman (BZ#2111620) rocky-linux-9-x86-64-appstream-rpms podman-4.1.1-1.el9_0.x86_64.rpm 35ff8b02c2bf95f493cdebb64759d75ac9b7fca7adca48d10103f36d40149e65 podman-catatonit-4.1.1-1.el9_0.x86_64.rpm 10e0dd9a34d190cb3df586306d8e2de8bef40436a219df8e6aac2b351bc58005 podman-docker-4.1.1-1.el9_0.noarch.rpm 18a96274fc27dcc07f9c296b3065c71861976de1678ef86830cc00cab0d16fc0 podman-gvproxy-4.1.1-1.el9_0.x86_64.rpm 74b6516e1dd9e0c9eef5dc0ee03fa46a2817d80553a792b9d55b45980e177dc9 podman-plugins-4.1.1-1.el9_0.x86_64.rpm 6ab744728aafb476a5c645ddf9dbec1887163fe689004f8ba1b204c6ac659665 podman-remote-4.1.1-1.el9_0.x86_64.rpm 97074a18f266afc51538f5be0036b1443cc71c4ad40d217aa54841bd21eb95af podman-tests-4.1.1-1.el9_0.x86_64.rpm 6a2f966c7a62d3eb400ba2923d32a27de4daa9dbfa22d678ea5406524fd2a849 RLBA-2022:5952 crun bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The crun packages contain a runtime for running Open Container Initiative (OCI) containers. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - crun (BZ#2111621) rocky-linux-9-x86-64-appstream-rpms crun-1.4.5-2.el9_0.x86_64.rpm 9bf534ce38fe7bcf2d57a7f8b1dc4f9d2944f1c4f47be64dc688b3bf0df2fed8 RLBA-2022:5953 containers-common bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - containers-common (BZ#2111737) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.0.1-36.el9_0.x86_64.rpm 16eaca5d5dc6d118e2c19e36a7e7929b60b996a3234d7fd9ace7b9db3c698830 containers-common-1-36.el9_0.x86_64.rpm e1ce83fbbaf5d2f528aee4878270f46bb8afc50460f671c5fbb6bfe95852686f netavark-1.0.1-36.el9_0.x86_64.rpm a5cae22c83b55097b05b661210ac1319ef9fa5300e633e459caa52a0e9af0c08 RLBA-2022:5955 conmon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The conmon packages provide Open Container Initiative (OCI) container runtime monitor. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - conmon (BZ#2111624) rocky-linux-9-x86-64-appstream-rpms conmon-2.1.2-2.el9_0.x86_64.rpm 702443c7438dcd81926c3a03e47bbe806e4846c0cbd0d2828d34b27c38fe487f RLBA-2022:5956 container-selinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-selinux package provides SELinux policies for container runtimes. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - container-selinux (BZ#2111625) rocky-linux-9-x86-64-appstream-rpms container-selinux-2.188.0-1.el9_0.noarch.rpm 96d3a993976aa93f0093efd167a9dc6b58c020c4e0877b67543693dfb9f1bee8 RLBA-2022:5957 buildah bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides command line tool for creating Open Container Initiative (OCI) Images. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - buildah (BZ#2111601) rocky-linux-9-x86-64-appstream-rpms buildah-1.26.2-1.el9_0.x86_64.rpm b7dc8d502041ce859a17b900358f53dd17980e0150cd2f72e09b771ddef0ee00 buildah-tests-1.26.2-1.el9_0.x86_64.rpm ee6c7dd50858872c10830ade26c1f8652583399fcdf4733e4dbffbcd7de5eed6 RLBA-2022:5958 skopeo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo packages provide command line utility for inspecting images and repositories directly on Docker registries without the need to pull them. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - skopeo (BZ#2111623) rocky-linux-9-x86-64-appstream-rpms skopeo-1.8.0-4.el9_0.x86_64.rpm ff9cb6e770993c9b43480465f8bb486518cbf228731e47522f3d8ba37f1be02a skopeo-tests-1.8.0-4.el9_0.x86_64.rpm e436caf4290fc6d68c1a0a14a4475b6914ee2987f001428736e09d420f6f1074 RLBA-2022:5959 oci-seccomp-bpf-hook bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The oci-seccomp-bpf-hook packages provide a library for applications looking to use the Container Pod concept popularized by Kubernetes. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - oci-seccomp-bpf-hook (BZ#2111626) rocky-linux-9-x86-64-appstream-rpms oci-seccomp-bpf-hook-1.2.5-2.el9_0.x86_64.rpm 723cc9e671ba7376b66b617349183e44dd6af73add86132714dc2ad8c1fcd0a1 RLBA-2022:5964 nmstate bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * Support OVS rx_queue in Nmstate (BZ#2100471) rocky-linux-9-x86-64-appstream-rpms nmstate-2.0.0-5.el9_0.x86_64.rpm de1a54ab6cab55e9f1a1110a9151e5fbf8691a29967bcdc2f71be1debbf22680 nmstate-libs-2.0.0-5.el9_0.i686.rpm 80758b4edfa7bb94c361b1887c17b356c97fdefa2ca58a3be15f43fc62c07f6b nmstate-libs-2.0.0-5.el9_0.x86_64.rpm 33f4f382d6e810a14f412bc5ba1e63dc873b28d7e4842b5b9fb741d174d010af nmstate-plugin-ovsdb-2.0.0-5.el9_0.noarch.rpm f86047eba7932bc0f7c890aebac01443ab88937fe462d5f1a8765e8c8f93a738 python3-libnmstate-2.0.0-5.el9_0.noarch.rpm c8ec97e21fc5e73bc93963c177a955414b33e53dd8727a5c7e49f0d9e849b8cd RLBA-2022:5960 runc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - runc (BZ#2111622) rocky-linux-9-x86-64-appstream-rpms runc-1.1.3-2.el9_0.x86_64.rpm 652547c45184447ad29fcce7495764de8e68e1fadd2080342b578aa5531a3a68 RLBA-2022:5965 edk2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Bug Fix(es) and Enhancement(s): * Add Rocky Linux 8.5, 8,6 and 9.x machine types to firmware descriptor files 50-edk2-ovmf-{amdsev,cc}.json (BZ#2109988) rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20220126gitbb1bba3d77-3.el9_0.1.noarch.rpm af5b9043dcd31aa7ac3a4fa92ab67afc86647c95de3f958fe249ef9edc55393e edk2-ovmf-20220126gitbb1bba3d77-3.el9_0.1.noarch.rpm 16db6e9ce1a016b0092ab91faa739c430c5847f3dc50a99548a7a0a218971607 RLBA-2022:5966 alsa-plugins bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The alsa-plugins packages contain alsa library extensions for the Advanced Linux Sound Architecture (ALSA). Bug Fix(es) and Enhancement(s): * Add alsa-plugins-pulseaudio to Appstream (BZ#2112090) rocky-linux-9-x86-64-appstream-rpms alsa-plugins-arcamav-1.2.2-8.el9_0.i686.rpm ccda1efaa0420b6008ef634d7caf9d5dd0c49f3a894753492e7bb3610b46fb59 alsa-plugins-arcamav-1.2.2-8.el9_0.x86_64.rpm 454f5224880980b8a0bf3a8ed8c498ba7a735fc821cbf9c9a32fefd78580f1a8 alsa-plugins-maemo-1.2.2-8.el9_0.i686.rpm 2110bedea68f352b1d2457d32acc4086de4bf1072fdbabfb0bd4db9b41c6bd45 alsa-plugins-maemo-1.2.2-8.el9_0.x86_64.rpm c3756c252860a3d381f4beb9db6c48376f32d0df3f0b383f4887349593d48b3b alsa-plugins-oss-1.2.2-8.el9_0.i686.rpm 2332961a6006332da74cfd64870cdcad8cc3a356b077e077bb5810dd71683230 alsa-plugins-oss-1.2.2-8.el9_0.x86_64.rpm 3ff360ff6f3e17f1c24461953b1068465921dee5f50a0c49d15f8ef8ee245d22 alsa-plugins-samplerate-1.2.2-8.el9_0.i686.rpm 1f33c5b051cceaf11fef37b1d7c965a0cb58299b77b368895d8e01e176a43433 alsa-plugins-samplerate-1.2.2-8.el9_0.x86_64.rpm f7ee360416054d788fd4b9ec8f3cda1b925dcec8c1bae198d0e93f1bb9d4a296 alsa-plugins-speex-1.2.2-8.el9_0.i686.rpm e25d1801bd7865c8e90f61dd7e0061895a7e1dee40404d6232eea097e2dfe6b3 alsa-plugins-speex-1.2.2-8.el9_0.x86_64.rpm 38d677d43b2950d8e73b1d7134b4b2bfc7703337af4911738938bcf76da77b7b alsa-plugins-upmix-1.2.2-8.el9_0.i686.rpm 535b3c8e389515fbc239d64f1b37e6205dd23db46539dec8a20121ea58a1b2ee alsa-plugins-upmix-1.2.2-8.el9_0.x86_64.rpm a07b145da0f3aa94163a4c78c5f0adc4a89c05fd1748fc99c63c9a99de64bfbc alsa-plugins-usbstream-1.2.2-8.el9_0.i686.rpm 584ddd374e26c5132b22dc89cf28ffcbde25adb1c157125a440f7e5007aa7c63 alsa-plugins-usbstream-1.2.2-8.el9_0.x86_64.rpm 14611265e462e34526532b953eca427c506e6a2797cd417f58996307046a44ff alsa-plugins-vdownmix-1.2.2-8.el9_0.i686.rpm 28cfca75031e6f1c2ec20f197346b1612cabbbbef35ff21998f3bb7303e1dea5 alsa-plugins-vdownmix-1.2.2-8.el9_0.x86_64.rpm 5307779a4a185fe871e454f1483ab446ccdd6408e7893058d72bdf9bcfdd2b86 RLBA-2022:6004 qpdf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qpdf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list QPDF is a command-line program and a library that does structural, content-preserving transformations on PDF files. Bug Fix(es) and Enhancement(s): * FIPS breaks pdftopdf and bannertopdf. (BZ#2106940) rocky-linux-9-x86-64-appstream-rpms qpdf-libs-10.3.1-4.el9_0.1.i686.rpm 272a784dd72f5eb8cdae831031c57b825d8204bd3e0d48d7da6e84d194966397 qpdf-libs-10.3.1-4.el9_0.1.x86_64.rpm e8859c50f3a854095adb85a4f5a1d48f26a26eda22551aa73e5dcec49a039092 RLBA-2022:6070 vulkan bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The vulkan packages contain the reference ICD loader and validation layers for Vulkan, a graphics and compute API for cross-platform access to modern GPUs. Bug Fix(es) and Enhancement(s): * Rebase vulkan-loader for 9.1 (BZ#2070308) * Rebase vulkan-headers for 9.1 (BZ#2070309) * Rebase vulkan-tools for 9.1 (BZ#2070310) * Rebase spirv-tools for 9.1 (BZ#2070311) * Rebase spirv-headers for 9.1 (BZ#2070312) * Rebase vulkan-validation-layers for 9.1 (BZ#2070313) * Rebase glslang for 9.1 (BZ#2070314) * Rebase shaderc for 9.1 (BZ#2070315) rocky-linux-9-x86-64-appstream-rpms glslang-11.9.0-2.el9_0.x86_64.rpm c8dbccc607a27a387e608a02b99c5abf05ab5e6f1ff24ac0d667fba7f8b60510 glslc-2022.2-1.el9_0.x86_64.rpm a6798010b73847c8ceb4f3d15126146aa6affe6547db6490eb517cd1f8c04a0f libshaderc-2022.2-1.el9_0.i686.rpm 16797c0755e1d93243695d42e1ce7c20f7b9c01c1356c94e383888297bd636c9 libshaderc-2022.2-1.el9_0.x86_64.rpm 9689c3e7dd99fc5cfe8f3fe8cee2ed638914a118e5708315686bd3b9206022dd spirv-tools-2022.2-2.el9_0.x86_64.rpm 6478564b9511ebac66c35bf147dcc569eb4ae5158ab93d88526692b76fa62c50 spirv-tools-libs-2022.2-2.el9_0.i686.rpm 367df804739336229b392330627d1fde218fef969e7858b307974d5e6292a68a spirv-tools-libs-2022.2-2.el9_0.x86_64.rpm 2d04b2afc5e659f6efb6fd00cdc38c5eba4ce6ffbd6cd63cb2dc3913bd5c8e25 vulkan-headers-1.3.216.0-1.el9_0.noarch.rpm 8eafab57b219f294b411742436ccaff622b6093713ed719f71a5e5817031a2e9 vulkan-loader-1.3.216.0-1.el9_0.i686.rpm e436daa9d614a268e545cdf2f54d6c5483ad12f4c43549b5ecb4227f205d0b6e vulkan-loader-1.3.216.0-1.el9_0.x86_64.rpm 6453bc72ad99907388d7488970d8de6cc9167fde33e745895ffa8caed3af9d3b vulkan-loader-devel-1.3.216.0-1.el9_0.i686.rpm d63fba1a0416f9da918a3c3639a0a19e99a59f65b7ea629c19f118ed5d8441e1 vulkan-loader-devel-1.3.216.0-1.el9_0.x86_64.rpm 5264d8556294f1cc5ff759df81d71a5e50930d4e266f72432632133e7532c2f8 vulkan-tools-1.3.216.0-1.el9_0.x86_64.rpm 94e5475a8056e5b6a82132b864ed489acd2a208786d4b11f2d24ef02b4664d32 vulkan-validation-layers-1.3.216.0-1.el9_0.x86_64.rpm 50add2e56f3ba889c33fb9546989ff3b00ea814abfc26fa78ce8bc48c42ebb12 RLBA-2022:6130 gnome-kiosk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-kiosk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Kiosk provides a desktop environment suitable for fixed purpose or single application deployments like wall displays and point-of-sale systems. This update provides a new subpackage, gnome-kiosk-script-session, to aid in deployment of kiosk sessions using gnome-kiosk (#2119427). rocky-linux-9-x86-64-appstream-rpms gnome-kiosk-40.0-4.el9_0.1.x86_64.rpm 78d5e5cf20ed651e34938c1ce2327878521fa64e77179ed835a5b5bddb880297 gnome-kiosk-40.0-4.el9_0.1.0.1.x86_64.rpm 3b5fe97407268d86c0090601c0f86ce2e2ca4a6b8268fa0985430145e1e13948 gnome-kiosk-script-session-40.0-4.el9_0.1.0.1.noarch.rpm 2ed3016d9661c036a75165d23a3d4164041fb59fa2e6ed9f43e7a85b789a4ee1 gnome-kiosk-search-appliance-40.0-4.el9_0.1.0.1.noarch.rpm ba70cb9a4ebad087da5bb73caec55285a90b1aa39c012192e11f06e8b915ab28 RLSA-2022:6358 Important: open-vm-tools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm 14e870f20c2163ba1fc314a3ce818378e2330409dca36831cf16dc2d69721ff1 open-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm 4950860a38fee70512c079aac8dde7d1a56eba6ce0f38f17d183864e251c8761 open-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm 964296337de92413cbb489b72929346acadf4f8e6b82a51cfa82577148af750f open-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm 255dd0ab249f1a1056c37b161248982d60ce8cb518a68bed0b4d50e390994111 RLBA-2022:6584 gnome-settings-daemon bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-settings-daemon packages contain a daemon to share settings from GNOME to other applications. It also handles global key bindings, as well as a number of desktop-wide settings. Bug Fix(es) and Enhancement(s): * System registration via GUI with activation keys fails with "Unknown arguments: dict_keys(['enable_content'])" (BZ#2113960) rocky-linux-9-x86-64-appstream-rpms gnome-settings-daemon-40.0.1-7.el9_0.x86_64.rpm aeda0508fe0e3fd5a7ade34794d30b6cc6a303eb8de402ec6e89fd561cee275e RLBA-2022:6587 qemu-kvm bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * PXE boot crash qemu when using multiqueue vDPA [Rocky Linux-9.0.0.z] (BZ#2095795) rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-6.2.0-11.el9_0.5.x86_64.rpm 93383b2331d7d32c4c45d4fb870ec4c2fb27aef9328f9982a085359819798e62 qemu-img-6.2.0-11.el9_0.5.x86_64.rpm 2a8e2f2caf06d45741d5e98c5b9220f5b62bf4bd1918248fe227f00f66ad8808 qemu-kvm-6.2.0-11.el9_0.5.x86_64.rpm 1ef6f75677e436d9329e30c535a26d8410db39475cb23565fb499c409df64f0e qemu-kvm-audio-pa-6.2.0-11.el9_0.5.x86_64.rpm 58b93849fc630484d86c2b6160488b856a7e9c989d1b912a54fc521ccc1f0ac7 qemu-kvm-block-curl-6.2.0-11.el9_0.5.x86_64.rpm 3d2dc6eaf791fb0045b7b2b7fecd8712a5628ba811c644074c0359c419dea5ae qemu-kvm-block-rbd-6.2.0-11.el9_0.5.x86_64.rpm d977e1f4752af7bc5c1f39a3989fc3b52e774d8c6c566e5eeee89db941c8cbd6 qemu-kvm-common-6.2.0-11.el9_0.5.x86_64.rpm 14a837db353157c996737cd619032c466b159e9d6e84be858d171de9f69f8ecc qemu-kvm-core-6.2.0-11.el9_0.5.x86_64.rpm 920383963a526d27380cc655c064740e0fc1296e6e414625b457d2cf3e0c0a22 qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.5.x86_64.rpm 578e2b3f23ee17c56f9bd8ef2ac82069e052daedb5999c02020ddc08cb4c9ca5 qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.5.x86_64.rpm 83948fe3930c1fd014efc6a70049ad458bc9e63aeb37afb0ded3eddec4aa5647 qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.5.x86_64.rpm 8e98b8f8bd22dd61e1306fe6522afec9ebc3f2a89321e126caef22195d64c685 qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.5.x86_64.rpm 6f1676ec9fa11cadf16e024cc8b376a6e81f2375b4c5402b864051e1732d274f qemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.5.x86_64.rpm 0036b818100164a114c63c7542afd630226bf2dce36de548870ee5c32978bedc qemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.5.x86_64.rpm 8e9ad994a1eff2f1091f6a44083d3c63e01b09606b3f570e8072ddbd5ece64b3 qemu-kvm-device-usb-host-6.2.0-11.el9_0.5.x86_64.rpm 76f8f21e2be7d2488b25be02848aa901e26f52af51152d5a0ca4e5458dd80799 qemu-kvm-device-usb-redirect-6.2.0-11.el9_0.5.x86_64.rpm b795e9986ae9260b1594bd3e43a8abb64d26eb7f732058e4d7b7c57c31303d52 qemu-kvm-docs-6.2.0-11.el9_0.5.x86_64.rpm 59125cb22cb75e0438b2798453d81f7b1bfdb8f2bf10e7f09fbfaee21e074847 qemu-kvm-tools-6.2.0-11.el9_0.5.x86_64.rpm b3186b5560ba388af9c0a5e64c19b9adfa99347d05912c6ae6af32ef783a9980 qemu-kvm-ui-egl-headless-6.2.0-11.el9_0.5.x86_64.rpm c24f8cefc331806e19a257351cdcf3cc806da74305a31fc1a55443a871149107 qemu-kvm-ui-opengl-6.2.0-11.el9_0.5.x86_64.rpm a2c3965b155eb9187e3de84399c12a76e1da2327690cc52f952e71dcf68ec0b5 qemu-pr-helper-6.2.0-11.el9_0.5.x86_64.rpm 24d34b8b0699bb97e63b942c1927459aa888ae37e5ef60c74752fe24869d5409 RLBA-2022:6589 cloud-init bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es) and Enhancement(s): * cloud-config will change /etc/locale.conf back to en_US.UTF-8 on Rocky Linux-guest-image-9.0 (BZ#2096196) rocky-linux-9-x86-64-appstream-rpms cloud-init-21.1-19.el9_0.4.noarch.rpm f035c37a384bfd3e18f2fec0d9525abf2ea4d79fe322cf02bd2a05b7ed155f1b RLSA-2022:6595 Moderate: nodejs and nodejs-nodemon security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.16.0), nodejs-nodemon (2.0.19). (BZ#2124230, BZ#2124233) Security Fix(es): * nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788) * nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469) * nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807) * normalize-url: ReDoS for data URLs (CVE-2021-33502) * nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace (CVE-2022-29244) * nodejs: DNS rebinding in --inspect via invalid IP addresses (CVE-2022-32212) * nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding (CVE-2022-32213) * nodejs: HTTP request smuggling due to improper delimiting of header fields (CVE-2022-32214) * nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (CVE-2022-32215) * got: missing verification of requested URLs allows redirects to UNIX sockets (CVE-2022-33987) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs:16/nodejs: Rebase to the latest Nodejs 16 release [Rocky Linux-9] (BZ#2121019) * nodejs: Specify --with-default-icu-data-dir when using bootstrap build (BZ#2124299) rocky-linux-9-x86-64-appstream-rpms nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm baae7248b9111a1bd6870c8c17318226d48283fe5b2cd0102c46d830785e3dc0 RLBA-2022:6593 conntrack-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conntrack-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use. Bug Fix(es) and Enhancement(s): * conntrackd returns "[ERROR] unknown layer 3 protocol" (BZ#2127125) rocky-linux-9-x86-64-appstream-rpms conntrack-tools-1.4.5-10.el9_0.1.x86_64.rpm dc8538ac8a282ea0df3c6ad324daaa077aed5e462e2423e464150d2ddfcf3835 RLSA-2022:6634 Moderate: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_0.i686.rpm 872b916490cc40108fd646d386af4c2a2a65df975babd39b69ad13b1ec4bc3c0 webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm e196bbdf8a915a6b6d5b348fdeeb7a597035df53cca8541e6b1e4d6da17f5813 webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm f15a6f3822973260c1975eff5865e284b7aecc1aa2de852f4ef510bfa2a2b523 webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm ab748c506ccdedf9666698214f327e6d52006444d4e384bf6ffc8f567ac1dde6 webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm dd6da27e90d7d78e50c7398e68f3994404f215c4827a3d77ea4c0e8d351d3200 webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm 9c260995745c498ce2fc385a03fae62f2e4e37c31678cc143a503fe3a206fbf2 webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm 4de3e869e81cddee604debd719935b340695560e4fd3bff21881ee98ed5fc632 webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm 4f4a8b5bdfe76b2e9dae8776c316c370601a984175cc6f698e3da5ca9d1af02b webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360 webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795 webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439 webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496 webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm 43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3 webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm 543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm 671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm 29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca RLSA-2022:6763 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080) * bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) * bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-1.el9_0.1.x86_64.rpm 2d26d4d035be28042465c476bc28833033ffb34c2e5ae9ad6c695995816e87b1 bind-chroot-9.16.23-1.el9_0.1.x86_64.rpm 74cd4a2085d301225fa285f45ea7a14a3a8dcba1c0cd23a27f74f6b34adc4843 bind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpm be6b79a1404d7949e534caa844871fa6c78f6b9149f1193a478c02e37e02bb91 bind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm 1e901b5474c96d3c5949f866bc87d5af5b9cbd6c03598dee38c9a0bc438df16e bind-libs-9.16.23-1.el9_0.1.x86_64.rpm 1b0fb7295537b47953c09d7d2dbf1ce26d6aed622c21318e6e513bcedc970146 bind-license-9.16.23-1.el9_0.1.noarch.rpm acbe4a59bfc223de0f9135924140f253713be5432ad8b885412dc1b4ae67cd39 bind-utils-9.16.23-1.el9_0.1.x86_64.rpm 8e24bf54cda11c22bbce58d299c6da28853abfc182edeca3406cd78e2213e703 python3-bind-9.16.23-1.el9_0.1.noarch.rpm 932f0052d8d1176dae602955dfdf8464fd11ce03c650309ddc6b6d3a78388bbe RLSA-2022:6839 Important: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.2-1.el9_0.2.x86_64.rpm 784ed4400d815935cfb84b9c09442ac6304b2ded5b240e726b6a95a3b8d96a96 RLSA-2022:6913 Moderate: .NET 6.0 security and bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.110 and .NET Runtime 6.0.10. Security Fix(es): * dotnet: Nuget cache poisoning on Linux via world-writable cache directory (CVE-2022-41032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm 0745ac5a604765033c10528e9331a92804e823cd13e1458c22dbe365fdc89974 aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm 107485dc5f876aa30882ce388e7969a5b6753741e062444ddf557eae4ad183a2 dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm b77e5e0af328d3e96e666e900215c1d38439b24f639baee1054e995d17a88f48 dotnet-host-6.0.10-1.el9_0.x86_64.rpm 5d9d9579ea8910ddef699322d27044930e71ad8b5bb91ceae70bfbe6207bf538 dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm 5685658913ea505987c2da26d474ffa3dcaf3af56289eb4bc496c7e09d7c0df7 dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm 872bbdea053a3d2f3e764e7056f4f6cf2f14ad068e45e1ef47b2bc7523932253 dotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpm f3c5d2fb50c4b452e11efd7dc3c4ce0fabe8715ff2d13796a83e03ec569ec2d2 dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm f5312bcb2659439826f8bd82278f0d0bc2efb433f8b87ed4418bc3810381d3c0 dotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm c585d34fed556b39355bd1bd3b1326b69898a5d2bce57d81df90672d8fb39190 netstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm d17c751115d5daaf74f95c001180295dae1943343ce1ef80cd72323915ff6cac RLSA-2022:6963 Important: nodejs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.17.1). Security Fix(es): * nodejs: weak randomness in WebCrypto keygen (CVE-2022-35255) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nodejs-16.17.1-1.el9_0.x86_64.rpm 2278e79f3aadaa28931de78db9e890ac82553acc8ba380433a5a6fa131036cd6 nodejs-docs-16.17.1-1.el9_0.noarch.rpm adcce25d4697191527b4c4908e1617343f61e6d9a3998699f9e7ef52b71ded55 nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm b61a8d920ae8f4ef3e8769fc5506a519100cfc743ebe1fa9b5c2076d7247033b nodejs-libs-16.17.1-1.el9_0.i686.rpm 19cbad9719b729bdaa4d2df0c96a70996cb55ccbc88de8f9e56b1d82eac12650 nodejs-libs-16.17.1-1.el9_0.x86_64.rpm bb526a53a4b5e3fa1a3452af1faf4f21d892074e594b61f4e5862d99281d0c9c npm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm 54356bd5e3d79f3f2d8835808baedf471ef4440027871c1e63e941af02578daa RLSA-2022:7007 Moderate: java-1.8.0-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm abada409bd9bf98cbd218078a91ed9ad327d93a8455913ce1f7c4e4b19e9d740 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm fe446cc4177b5fddbbff5acebd761c85362300a0049e0c03fc75e0b89e659a17 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm 8930b34d8ec3292a1c77070c163a885c7dee35fc9de97d3b4227783d0687a02c java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm 82c4767f34d650089e3529a6bbe1415f170ce05364cb8d3a64a62115ea7af99b java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm 04320449a5be8ac2a7584ff1ccd7fcab82707df2abef3a664819152670d9549e java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm 5e35c84d89f3e291c02fef7ad562135b30e4f94e421d40f285c6898b74c8469b java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm d35cc3a8ea603db0ad18aa0e6cf25bf62cd34221df120bd0de12f92e9356b771 RLSA-2022:6999 Moderate: java-17-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 17.0.5) [Rocky Linux-9] (BZ#2132934) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm 46acc4abfad0f661fa4d8027d9e7a19fdfa2f505886a355ef6bd0f88c5c174fc java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm bbb695a9d23499bb43bc329daf4896647c2393f9a729c10cf586eb336ae6ffd1 java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm fa7125878fe5bc61c502dd4e8b1cdc7b09f4f29be1d6812f911ce6cbb03463c3 java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm ff00e96f980f7d4baf9d5f1a7da903852422f9af55fb60bf5298e571fcfcdabb java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm 7eb53a717f2c7506cceb468ecb3f0b935051aac0b2d6ce2c3dd137af76274dad java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm 8980f7b36ff8f91233c6aac845d44afd797b3930875083e43a046eb9a47c371b java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm 65b9548ecde39e55707cdc0af9a7da4e64b3cf4117be0251df0c11163117b926 java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm 51d02ef14be0e37f9bd3919d0a2e65dcdb95a934ac5de4fe6c30024945c31ab2 java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm 9d3c5dc1331c348d415834bb32888412482a5bd3056c111ca675cff8104fec42 RLSA-2022:7013 Moderate: java-11-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-9] (BZ#2131865) rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm 893816e958bccf06147219a0b371d7701115eaa5ef2364d5b83ea195da0ef942 java-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpm 21746432ed09d1f36b0b9f73fd15ee9d9e0f5c92c5a041fbbfce701d6ca5365f java-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpm 18c10cc300fef70ecd579c4d3ad01dc2ad38f4339ec399a5e6b925d0374f9223 java-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpm 7322c3ca6c8c48920cf99e788ba6a68cedd2c711d8eb8ecdbfdcf8d7979eaab5 java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpm d0972417ffe7d14ab87ceddde1e8d8f43bf9cfad5035bc42866642339f494c6f java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpm d446e7f03ba2742157d30d53e563347b710f441162dbfe85ad39c4576a14602b java-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpm f89c9553c55791d48f49968a6eef07dc5a98d03888cc96535c27e9b63006065b java-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpm c976c8b472d40cd92e2d5f1c97d718ddbd14d971ba5e9a7b57073ffbc51f7ead java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpm 94caf27f12c22e2d48e68cf354c652f3290d82cc93c01f66f433beec546b4969 RLBA-2022:7327 ansible-freeipa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * Creating a POSIX trust agreement using 'range_type: ipa-ad-trust-posix' in ansible playbook is not honoring 'range_type' (BZ#2132968) * [ansible-freeipa] Installers: configure sid generation in server/replica installer (BZ#2132971) * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132977) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132991) * ipaconfig does not support SID and netbios attributes. (BZ#2132997) rocky-linux-9-x86-64-appstream-rpms ansible-freeipa-1.6.3-2.el9_0.noarch.rpm e56602ce3d3535d54dc1901bc4ca49ff5479c22101ab2a8790a849d1f27fe423 ansible-freeipa-tests-1.6.3-2.el9_0.noarch.rpm e22bc6c31205fb1a3ff9999ead5cc89a0ba1c3abd8dc0644bcb581846320a1f9 RLBA-2022:7328 virt-who bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-who. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-who service collects information about the connection between the hypervisor and its virtual guests that are present in the system and provides the subscription manager with a mapping file containing the hypervisor-guest pairs. The service periodically queries the hypervisor to report its guests and changes the mapping file accordingly, making sure that the information stored in the subscription manager is accurate. Bug Fix(es) and Enhancement(s): * virt-who reporting always the same VM's when using with Nutanix Prism Central (BZ#2127044) rocky-linux-9-x86-64-appstream-rpms virt-who-1.31.22-2.el9_0.noarch.rpm ce10f96abec24b76307cdca5012a57725d103a8637b024426f1a036122ba8197 RLBA-2022:7333 rhc-worker-playbook bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhc-worker-playbook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rhc-worker-playbook is a Python-based worker for Rocky Enterprise Software Foundation connect, used to launch Ansible playbooks via Ansible Runner. Bug Fix(es) and Enhancement(s): * rhc-worker-playbook throws "DeadlineExceeded" errors and fails to send playbook execution status back to the cloud (BZ#2137008) rocky-linux-9-x86-64-appstream-rpms rhc-worker-playbook-0.1.8-2.el9_0.x86_64.rpm c7a0dbf833a461a76e223c8da4ac8cb438c76d3ee01aaaa064fe0367ce875619 RLSA-2022:8054 Moderate: webkit2gtk3 security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_0.i686.rpm 872b916490cc40108fd646d386af4c2a2a65df975babd39b69ad13b1ec4bc3c0 webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm e196bbdf8a915a6b6d5b348fdeeb7a597035df53cca8541e6b1e4d6da17f5813 webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm f15a6f3822973260c1975eff5865e284b7aecc1aa2de852f4ef510bfa2a2b523 webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm ab748c506ccdedf9666698214f327e6d52006444d4e384bf6ffc8f567ac1dde6 webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm dd6da27e90d7d78e50c7398e68f3994404f215c4827a3d77ea4c0e8d351d3200 webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm 9c260995745c498ce2fc385a03fae62f2e4e37c31678cc143a503fe3a206fbf2 webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm 4de3e869e81cddee604debd719935b340695560e4fd3bff21881ee98ed5fc632 webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm 4f4a8b5bdfe76b2e9dae8776c316c370601a984175cc6f698e3da5ca9d1af02b webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360 webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795 webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439 webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496 webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm 43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3 webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm 543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm 671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm 29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca RLBA-2022:7092 java-1.8.0-openjdk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This erratum reinstates changes made to java-1.8.0-openjdk in Rocky Linux 9.1 GA. The original builds for Rocky Linux 9.1 GA will have been superseded by newer binaries released as part of the October 2022 security update for Rocky Linux 9.0. For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm abada409bd9bf98cbd218078a91ed9ad327d93a8455913ce1f7c4e4b19e9d740 java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm fe446cc4177b5fddbbff5acebd761c85362300a0049e0c03fc75e0b89e659a17 java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm 8930b34d8ec3292a1c77070c163a885c7dee35fc9de97d3b4227783d0687a02c java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm 82c4767f34d650089e3529a6bbe1415f170ce05364cb8d3a64a62115ea7af99b java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm 04320449a5be8ac2a7584ff1ccd7fcab82707df2abef3a664819152670d9549e java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm 5e35c84d89f3e291c02fef7ad562135b30e4f94e421d40f285c6898b74c8469b java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm d35cc3a8ea603db0ad18aa0e6cf25bf62cd34221df120bd0de12f92e9356b771 RLBA-2022:4030 new packages: libreport Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreport-2.15.2-6.el9.rocky.0.2.i686.rpm c38686e3614b77ed2922ae4fca255249e8af48e219a756c1715064dc7ca9b5d9 libreport-2.15.2-6.el9.rocky.0.2.x86_64.rpm 022488dbe01df2f8d818b9a856bf245a2e6a6f334b53edd16c6211db69a50ca9 libreport-anaconda-2.15.2-6.el9.rocky.0.2.x86_64.rpm 690c68b193d87653fc8af880cfbe9137a8ba1773e3300db8879ebaf9b259ebf6 libreport-cli-2.15.2-6.el9.rocky.0.2.x86_64.rpm 8bfa81ef801e4cbfb1f019b2ea2351428af897c7b4f5d69a6831f757520d4911 libreport-gtk-2.15.2-6.el9.rocky.0.2.i686.rpm 6d091d1edf3c38036bc967ec69a3d8fe432e118f6d16d8befedafb70a07d0b8d libreport-gtk-2.15.2-6.el9.rocky.0.2.x86_64.rpm 0eb7dc3ae9c2fde8716247315f7903eeb4fa8af0b658eb23a340c9df0421ed4e libreport-plugin-bugzilla-2.15.2-6.el9.rocky.0.2.x86_64.rpm 37eea7b13a977bdbef9a903abe53892c0aa882d4dafe55d06208711a8ccd8337 libreport-plugin-reportuploader-2.15.2-6.el9.rocky.0.2.x86_64.rpm 2cb6d5a3a3719d6b8e8dd58ae4f991e56304e778f9d921ea1fef76e7cdc7bc7f libreport-web-2.15.2-6.el9.rocky.0.2.i686.rpm 88f3d650ed1881a24edb2313b929940f660e92ec91b63cf682bb50fd98fbfa6d libreport-web-2.15.2-6.el9.rocky.0.2.x86_64.rpm afec7d83f71054ff5e2df4c9d51d1305e4f110afa5965335b0c871aea358fa75 python3-libreport-2.15.2-6.el9.rocky.0.2.x86_64.rpm 605271935faca31cbab931dcd876d8ea33c222d3dedfd0a6ccd8894d871313f0 RLBA-2022:4067 new packages: fuse3 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse3-3.10.2-5.el9.0.1.x86_64.rpm 3a71de05e60717315f24b150c0f6110a34e781771d49e4dd28495c5e72ad01ce fuse3-devel-3.10.2-5.el9.0.1.i686.rpm 75b39dc6f49580c98027542016b56b56103dc825297ed6a05dfb35c26de42d32 fuse3-devel-3.10.2-5.el9.0.1.x86_64.rpm e4ab36efc623607abb7ee5457daecf8666e85ef8c3c0b8d2261e4bbc5b5d1e45 fuse3-libs-3.10.2-5.el9.0.1.i686.rpm c794e0bd6042e9f70a44c2ba068c0974f7553be73309f5ea49fa9258f063343e fuse3-libs-3.10.2-5.el9.0.1.x86_64.rpm 695ab0f604f02ed2b9a8bd0245cf0a9ea80f8d1bb01f6b88bd17498662d10c30 RLBA-2022:4203 new packages: lua Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.2-4.el9_0.3.x86_64.rpm 9b9247dd77c68e135da37e03d53c011f8d879f369a45bb7cbd275a51c6f97824 RLBA-2022:8272 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-40.el9_1.1.i686.rpm 809dcfd1bb41816d5633c66b90ac759cbb40cdb33cff1c52bb1b114b0956e55c glibc-devel-2.34-40.el9_1.1.x86_64.rpm 7e7b8ccf16deb632f4d20b56b0a6eda9704c6255b2c04386b9d4e65ad378fe7a glibc-doc-2.34-40.el9_1.1.noarch.rpm 1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab glibc-headers-2.34-40.el9_1.1.x86_64.rpm c4edb39982fbcd3975b254a378b452ea1d73b94f8db90b01027c749c749a9e17 glibc-locale-source-2.34-40.el9_1.1.x86_64.rpm 045c95d9ff47011ee0225aea5115ddbe42fea8c3bc129b9c0d3cb2fea1a7a7e3 glibc-utils-2.34-40.el9_1.1.x86_64.rpm be083837ee6d4762cde490f3b9cce8421f1f0d2d3d79611e7ec8df1a540d0d7a RLBA-2022:8290 expat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.4.9-1.el9_1.1.i686.rpm d56de768135c8173e1a48fd540d0d95c0e6f222c8ace97b3065c3bca57c2f615 expat-devel-2.4.9-1.el9_1.1.x86_64.rpm 442a1d6ce6f18fe5e24d2816d8781dd54885432cf72a77f0ab3945a68117049b RLSA-2022:8299 Low: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: bad local IPv6 connection reuse (CVE-2022-27775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcurl-devel-7.76.1-19.el9_1.1.i686.rpm 7ad05dc436af09c7642094ec4ad4eb00e84f3473b51d0bba0f55dbd7d76d1d33 libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm aec15566a0f096caa322970eb819aceae4520f8feac9ed3ec46a649bc6d7ed00 RLBA-2022:8325 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.7.3-4.el9_1.3.x86_64.rpm eccbe135e9df9e1c11bb358bf5acec78bb2b12d26be98a1e013a3170e3efce1d RLBA-2022:8327 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-12.el9_1.1.i686.rpm 921151c64773074869b8df7f17977e220c78b208d5b2148198755ec8cfd9f3fd systemd-devel-250-12.el9_1.1.x86_64.rpm 9561845b251615a5715cf19ae5ac180cf2f72cfd4b93e6472db40a1663802123 systemd-journal-remote-250-12.el9_1.1.x86_64.rpm f3d437b037773dcea88ddf212091b9a55471acb33169138759be996306050b81 RLSA-2022:8353 Moderate: python3.9 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python3.9 (3.9.14). (BZ#2128249) Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.14-1.el9_1.1.i686.rpm 48fd68110090a368bf2f23454cd5fb4227ddd7e312101d3415b2868257198b9d python3-devel-3.9.14-1.el9_1.1.x86_64.rpm beabc37d468844e408deb670ef0497adc44d7a14060b9f41beb213445fbfcdff python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm b952c1061c4c06a74066ee00a44b763a940fffc7f5a7b373d45363581345b5de python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm 6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279 RLSA-2023:0334 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Intel 9.2: Important iavf bug fixes (BZ#2127884) * vfio zero page mappings fail after 2M instances (BZ#2128514) * nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359) * ice: Driver Update to 5.19 (BZ#2132070) * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588) * drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619) * updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914) * DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213) * No signal showed in the VGA monitor when installing Rocky Linux9 in the legacy bios mode (BZ#2140153) * Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168) * ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976) * fatal error: error in backend: Branch target out of insn range (BZ#2144902) * AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217) * Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910) * Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605) * DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm d7078b07a7d3258bce301881d95cd531ff4bf1738589e0a8eea3c2d613ccd242 kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 67aa047e3741025beed60b1174d9b45adff970ee7a205d258536d1618223c768 kernel-devel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 6e452933e721e2eb77ae23d9f06c570b204bccd4b84e2cd3ee217550e57c5486 kernel-devel-matched-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 8e5998e8aa9b0dedbaf2bc9ecb5901e31b225ed4865a32958f1c596176467cde kernel-doc-5.14.0-162.12.1.el9_1.0.2.noarch.rpm a30caac1765a17513658b6ae7859056fef19c282f1e637deba66186dbf46279d kernel-headers-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 716500404c0b33b144109d2f2a970799ed5b1df3bedc8047d4c80ff291c64ba6 perf-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 08e73b8611cb057252192d7d645427449a8014b78ec0368105fdb8c7b4fff82d RLBA-2022:2329 new packages: gnome-control-center Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-session-40.1.1-6.el9.rocky.1.x86_64.rpm 8dccf0f721843777180534415dd263fc13928f7e5f0fce7cbdaf65d86ee38538 gnome-session-wayland-session-40.1.1-6.el9.rocky.1.x86_64.rpm 0028de11fb85de213dc99a86161d8ed3751323842f056b2801df93a8c576d01d gnome-session-xsession-40.1.1-6.el9.rocky.1.x86_64.rpm 7d15bf23ab26edd27fce86270f23558415238305d1b97d9b4b96989b1a378fc4 RLBA-2022:2402 new packages: ibus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-1.5.25-2.el9.rocky.0.1.x86_64.rpm c477e9eb2a472e503bc451c92f80f350d870d5246d8e2eea0d8ed8230d85eeb6 ibus-gtk2-1.5.25-2.el9.rocky.0.1.i686.rpm 562473b4b79b840e4c3e38100822f1bf0cda1d6f0fa70b6835481e756f0d6575 ibus-gtk2-1.5.25-2.el9.rocky.0.1.x86_64.rpm 135672c41ba069be017a4f1bbf084302973f19c205f438085e5f528e49878fb9 ibus-gtk3-1.5.25-2.el9.rocky.0.1.x86_64.rpm ca4e328bbc820b7e7dd0aef7f09fc3abff550c63e6b200dab27dfca22f27af3b ibus-libs-1.5.25-2.el9.rocky.0.1.i686.rpm 1906bb921e345ee20e87b8cf8bf81f50b9d9823b7efab6a3001183ef9aa8eca8 ibus-libs-1.5.25-2.el9.rocky.0.1.x86_64.rpm 8ff44621304d495b9159ca2528cf919079db1180352ed7adc7a068e9ae32b078 ibus-setup-1.5.25-2.el9.rocky.0.1.noarch.rpm e6a45e6240188ac1099f5568ae3f32aaea6f6913d58666208bb93c48b714f42f ibus-wayland-1.5.25-2.el9.rocky.0.1.x86_64.rpm c4f36e5bf45cde39822d5e9a4a153ff4e248412e8bc01547537f22344b71f3b6 RLBA-2022:2421 new packages: net-snmp Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 45c7fdf8bf7ac6873f0836dd4b5b9359ad1426f8e0b7c2dc50db7b4b24c5e77c net-snmp-agent-libs-5.9.1-7.el9_0.1.i686.rpm 34386bc8151023ac08fed088cae847fbcdf6c225b30a0be60ecc837cd66ff27d net-snmp-agent-libs-5.9.1-7.el9_0.1.x86_64.rpm 5c34051105cfeadcc20cd1b0ee7a657ad7964a91a7d4d6e4bb023aacce2a7173 net-snmp-devel-5.9.1-7.el9_0.1.i686.rpm e9b29003e4aa7b52ebf51da7323935394bd2d3c96ac4d1bc8109e59ae0eefe4a net-snmp-devel-5.9.1-7.el9_0.1.x86_64.rpm 68cbf14158d98027adc73958b26b40b5e19d4e11d077c8822baf6a0f5c984462 net-snmp-libs-5.9.1-7.el9_0.1.i686.rpm 112c41409b7cfd1bd61ed78e827fe263dd12b507c97126b6be17478ddd96a32b net-snmp-libs-5.9.1-7.el9_0.1.x86_64.rpm 30715b3db6c7797ede2f3014db8a4b367d64ff5176173d6fd752b2dae9351d0c net-snmp-perl-5.9.1-7.el9_0.1.x86_64.rpm da1af97bfa7c44f028e4b574657a69d62143d9fecc996c76911ff79bf7d98b99 net-snmp-utils-5.9.1-7.el9_0.1.x86_64.rpm 63c6fec11b84ca7b9bc0dc713db458663a9f44fd91f6b12dfe4581fc4fc66d1a python3-net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 0f91007d6139d5d60efabc69cfa31f1b78b9f5188ec70235502c5609524ac0b5 RLBA-2022:2555 new packages: anaconda-user-help Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda-user-help. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-user-help-9.0.0-1.el9.rocky.0.2.noarch.rpm 951fd0ff610db3ed38639c69e73a74d9d84ddc30e44ad9a2447a6dc3beb894ef RLBA-2022:2854 new packages: gnome-kiosk Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-kiosk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-kiosk-40.0-4.el9_0.1.0.1.x86_64.rpm 3b5fe97407268d86c0090601c0f86ce2e2ca4a6b8268fa0985430145e1e13948 RLBA-2022:2856 new packages: gnome-menus Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-menus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-menus-3.36.0-8.el9.0.1.i686.rpm 7989199ccaed9e11a494bdcdcaa38d0706125f316f12aa7373594d8551722f7d gnome-menus-3.36.0-8.el9.0.1.x86_64.rpm 6b88244d31330181f3a10b06acbac9a32d12d37d31cfdad2baaa8ce3bba38063 RLBA-2022:3565 new packages: perl-Sys-MemInfo Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sys-MemInfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Sys-MemInfo-0.99-18.el9.0.1.x86_64.rpm 81c5b24e72d8dfb697055cc2147b97d187b6e4275c2dae71f414a5f3b3f0fe0f RLBA-2022:3621 new packages: perl-threads-shared Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-threads-shared. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-threads-shared-1.61-460.el9.0.1.x86_64.rpm e574c136c044d3b1d6cc2fbd28d281fe71b1de81d2c563dd83c35acedfcb81cf RLBA-2022:7975 pesign bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pesign. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pesign-115-4.el9.rocky.2.x86_64.rpm f58a827f01ec2de0fdaef956a6ec4a2434028f22b26e4c963f2df1898e0e754e RLBA-2022:7977 anaconda bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 99b32e80363e1b4fbe9b91e29cee253f0fe2ba256565937f8c4f501089316d5a anaconda-core-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 615e02d7e64b2d55e3dc1a5fa5cca598cfba5ddf27bf730ae803df518a653aea anaconda-dracut-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm e47b708e1074dfb5aa25922b88596c2d1e123664022f5047631bb4bb99b0daaf anaconda-gui-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 2b7eb7f19a8b9c91e843b2c3c4f53da68b4456d704aa1a7b15eff7fab29f78bc anaconda-install-env-deps-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 9cb5df84d09c1ea4df72e679bb259c829fb36b25b2ed13fe1a10bbf565857354 anaconda-install-img-deps-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 25b52d9354bd0eb8a2f09d769dbd8d5b6647dcea6024d95809c57ef3624ebe8b anaconda-tui-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 1583115806140f78358772f3b3a5c19f3b288febb8229745de7a1daca3467b49 anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.i686.rpm 7bece75c388f61a9562bad90c37c6aad6b06d4446cfb8c7c39ff4a1f14237acf anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 86435a5f2c484770637d2f6ce92f11001b2be5d681a069f3392536ed1e5f25c7 RLBA-2022:7981 fence-agents bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm 5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a fence-agents-compute-4.10.0-30.el9_1.1.x86_64.rpm 987cdfdcb4cf9924bb79f8450816d0d9d9c64a16e68b9ee9216aa28b2e504140 fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381 fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm 5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e fence-agents-kubevirt-4.10.0-30.el9_1.1.x86_64.rpm 81f39692a3915637682b3c922fab5f48cf18c63836b45a075a16d72196cf9871 fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm 8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8 fence-virt-4.10.0-30.el9_1.1.x86_64.rpm ad8079229d80d22fa0b8a61057b51407ad042735f9265cbee09e8c01d2b02744 fence-virtd-4.10.0-30.el9_1.1.x86_64.rpm d38c221fad37130c267cb2e09f09e54c7a1661d8f391298aa667b988f94416f7 fence-virtd-cpg-4.10.0-30.el9_1.1.x86_64.rpm 7311bd308b7fce7626e1f1efceb4a2ebe51142076cf4d47af3b383af25d612a8 fence-virtd-libvirt-4.10.0-30.el9_1.1.x86_64.rpm 7c7a047976567520da46e488d7770e91a655a19440cc4afce78756c6125c7571 fence-virtd-multicast-4.10.0-30.el9_1.1.x86_64.rpm cb792c9a484d9d15cf5973d6a91e80650cb25bd23d2769ed7eb8852605304c6d fence-virtd-serial-4.10.0-30.el9_1.1.x86_64.rpm d4c34e220f40da921730f096c90d89a975509b4d566b16599c7bee32dbc69aa2 fence-virtd-tcp-4.10.0-30.el9_1.1.x86_64.rpm 641685476e28e6708dc334ca1aaf3a92ad48ce39ce395796d44e85e77b7bf30a RLSA-2022:8003 Low: libvirt security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313) Security Fix(es): * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-8.5.0-7.3.el9_1.x86_64.rpm c708779a396e230d2c5b07e0bfe51cd01f49ccbd4c83869d8073d60d6370dd64 libvirt-client-8.5.0-7.3.el9_1.x86_64.rpm 7e78e4b314f9391dae14046061f56a0877ba5d2fa8fc6c80e50ef539c8cb8643 libvirt-daemon-8.5.0-7.3.el9_1.x86_64.rpm 48b52a90c97c6b7ad233f63d5e89b6e755018153285734c21f78660409585d1a libvirt-daemon-config-network-8.5.0-7.3.el9_1.x86_64.rpm ea06d4aa7466a860568cd37e88f867968d093a0323d9f4d47a57c2bbeb18c91e libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 420ff2d0519c7e21815e4beb165018e69bbdc52f3bf3c93b961e9873a55eecae libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.x86_64.rpm 7e3a7d4ecf369c032a337355427483db927474305d71c1815f888aa28197a218 libvirt-daemon-driver-network-8.5.0-7.3.el9_1.x86_64.rpm 3ed76de2a5b5b77ace56a63991e4b9f57579d0419976dadd00cece896e6be893 libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.x86_64.rpm ca05c2a76e07f5ff4647ce9db4ad488a0d4f02a7047be7d15618e969a6a1961b libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 792d48eae60612d2edef25f085c8d1508d110d575b40c3c4a1631ca7177d4b1e libvirt-daemon-driver-qemu-8.5.0-7.3.el9_1.x86_64.rpm b0f28d516b0edc48b0b922dfafa3eb67df028ef014c04e355f31e80aba6005da libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.x86_64.rpm de5bb1b4844f9ff342ccc76b99404624c2d77209c7c4de29253080dcc85c6ef5 libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.x86_64.rpm 11d28b80a7e3f9d171f9d48637e61241c66003ae24366dbe34328c0595e37b7c libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.x86_64.rpm 37d0168e2a00cf5e6928bb0a5bfda4b762fc83455f8d60dd9ee459a0cfc95167 libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.x86_64.rpm 24e8e44a9eae16af22f0a4612baaba359e4df0efa8197bba24b03ce0ad2072bd libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.x86_64.rpm 4019867e2bdd85da3b6fd73d8649fa476875224fae7f21d06c84af2778797e5d libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.x86_64.rpm ac268085630e07135f22f6d3224469f1b1fed919758eb843017c3356e41e153a libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.x86_64.rpm 43a2dd82596de9414d0e7ada2acaaa89d864a20c5b42623b322ec4b86b0890ec libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.x86_64.rpm eb0ac684f2d54aa112510c00b04ba8fca6043aabc83f5b6d3052b5659e701037 libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.x86_64.rpm 92c62e1ff027648c615425c0b1969373bba89fdc99e4c6a95d84be5e1a806c15 libvirt-daemon-kvm-8.5.0-7.3.el9_1.x86_64.rpm baaf46cf94b070312b786a26aa1f21c16d1e17e7a6a7bf6217b7a0cad0cb3bf5 libvirt-libs-8.5.0-7.3.el9_1.x86_64.rpm 676aee21a6ccef29385ddeb6118c7e29c2ca4250acf8ea9af15905ad3ea44e0b libvirt-nss-8.5.0-7.3.el9_1.x86_64.rpm d829f341c6a3e196c3b05e1cee3af14c96f9fd387883a4d76f5afc45af0ccae4 RLBA-2022:8019 lorax-templates-Rocky Linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax-templates-rhel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-templates-rhel-9.0-35.el9.rocky.0.1.noarch.rpm 21755032c1358c5b4158aab1b33f69170abc3e2cef712750649bebc9a1a340c6 RLEA-2022:8056 cloud-init bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cloud-init-22.1-5.el9.0.1.noarch.rpm 48a72ce9513d28c13d9f123b03a052bd85bcdf4649719d633fa289156fcccf9d RLSA-2022:8098 Moderate: toolbox security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms toolbox-0.0.99.3-5.el9.rocky.0.1.x86_64.rpm bd913e084c6d6803a2dfd59172bbf60202a95cac6b24c656a0d27aa702a71491 toolbox-tests-0.0.99.3-5.el9.rocky.0.1.x86_64.rpm 1b612a312b05fd540aabfcc82aa8a4d1e2b8d45c753951e35d2b431a42342d97 RLEA-2022:8115 WALinuxAgent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-6.el9.rocky.0.noarch.rpm 501a4f5489c03ed59a40579cf6cdeed009f96611fe28bf503287e28a0236c52c WALinuxAgent-udev-2.7.0.6-6.el9.rocky.0.noarch.rpm c4660dbbb81bfc4c3451bb7e69545ca5ee0d9cc25ec35ad6e1ac44686c211d8d RLBA-2022:8131 scap-security-guide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.63-5.el9.rocky.1.5.noarch.rpm d25e55b0936f63aa3bc9bc9de03bda04af5646550fc368e573e58f67b389fbc5 scap-security-guide-doc-0.1.63-5.el9.rocky.1.5.noarch.rpm 6fc56d2b8816c953f3d5fda8398da171e882a39cbb263282c8fb1f4d06d0bc64 RLBA-2022:8216 openscap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openscap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openscap-1.3.6-4.el9.rocky.0.2.i686.rpm 5b38ad0c1ff384d6cd88d8597cb68f120509d566b60c2f66b4741a5750f7362f openscap-1.3.6-4.el9.rocky.0.2.x86_64.rpm ab8c555b76148d7ffd349fa2a4e120a5866946d20326392c4f1bfa6902b524c5 openscap-devel-1.3.6-4.el9.rocky.0.2.i686.rpm c5a1ead630c70e6ccf4831bc5b402e5c57436a4f0824e532918973e243418520 openscap-devel-1.3.6-4.el9.rocky.0.2.x86_64.rpm 54b869926c61b27d71b208aac30563e8b90b31f3eb7e9eafbf7d10fbf470ffc9 openscap-engine-sce-1.3.6-4.el9.rocky.0.2.i686.rpm 69bc52a237757caca71d2808980312efb0ee32451745fa82cd590a026e1137c9 openscap-engine-sce-1.3.6-4.el9.rocky.0.2.x86_64.rpm 50aaf2509d7de254b068ba1c3b01d572fbce6d4c8dcc3e4c72a832a6bd9d41a8 openscap-python3-1.3.6-4.el9.rocky.0.2.x86_64.rpm aab5072ea1f18ac6447421310a9f9eed71cfa58c6749f8702bb6a3a07afd6ccb openscap-scanner-1.3.6-4.el9.rocky.0.2.x86_64.rpm f6e22578df21082a4a88811ce3cafafddb22b1261a1dca68648b9d2a93f59a55 openscap-utils-1.3.6-4.el9.rocky.0.2.x86_64.rpm 3afca1f33b0eff5470c8f41a132f4e20ccbe9c30ef39c9450fdebe4dbb946b14 RLBA-2022:8225 hyperv-daemons bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyperv-daemons-0-0.40.20190303git.el9_1.1.x86_64.rpm 9ad347656af733f0c9d08193e6de68afe2f1c24128adff9fe1cfc78b21a25721 hyperv-daemons-license-0-0.40.20190303git.el9_1.1.noarch.rpm fa9059871f00dc113015c27e01e5388e9a52d1b097cd94109f4d4a4bbc886694 hypervfcopyd-0-0.40.20190303git.el9_1.1.x86_64.rpm 617d5a94fef2e4b902531feddeed690e976e40c53b42044290243a3dbfda1ca2 hypervkvpd-0-0.40.20190303git.el9_1.1.x86_64.rpm 8a55232a6b273932785b24fecb7d71713c578450117e564480c98318e426d17a hyperv-tools-0-0.40.20190303git.el9_1.1.noarch.rpm 0140116450ab5a94be5e1d93e8a9fd4694bc666bf0a2ac5c3c1f43eac4fd85c9 hypervvssd-0-0.40.20190303git.el9_1.1.x86_64.rpm 3efd684f075bee685a748ab5aee1f363a971517d20dc2d4135cde72c0b07cefe RLBA-2022:8236 fapolicyd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fapolicyd-1.1.3-102.el9_1.7.x86_64.rpm cd924613bfa40361bd6fc83f191d0731e67b05452dfa0a8df8e70e889d5c8640 fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm 2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d RLBA-2022:8438 osbuild-composer bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 9.0 (BZ#2136533) rocky-linux-9-x86-64-appstream-rpms osbuild-composer-62.1-3.el9_1.rocky.0.1.x86_64.rpm 5fd3dd03308ff4fdc0425624faf133682b8ae2fcb10253d14e75624cebc71bf1 osbuild-composer-core-62.1-3.el9_1.rocky.0.1.x86_64.rpm 97adf1242eed105452bdb0cec262c4b582211965251fdd616768163093d7edea osbuild-composer-dnf-json-62.1-3.el9_1.rocky.0.1.x86_64.rpm c7914c05891ea381cc5fb9cac010bbd7cbe735d82c37dd41d9250176f388400d osbuild-composer-worker-62.1-3.el9_1.rocky.0.1.x86_64.rpm ee80f68d07cb1eb06425f3fceffaa9d8e8449b51bedb85e5a30d9da21f016aee RLSA-2022:8444 Moderate: keylime security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: exception handling and impedance match in tornado_requests (CVE-2022-3500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keylime-tenant-6.5.1-1.el9_1.4.x86_64.rpm 74d2ff21c54cd23d1f2756838008f2640b69a17b4de8070de7c282b47eeaeb43 keylime-6.5.1-1.el9_1.4.x86_64.rpm 4ebeccd3fa45154859133692dd6e8e7f2ae6b60b4451f3294956928ab32b336c keylime-base-6.5.1-1.el9_1.4.x86_64.rpm 44389a08b4c3b149c3432bd37888893de9bc2c3261069d71a0e873224add559d keylime-registrar-6.5.1-1.el9_1.4.x86_64.rpm bc7a81d8e8e9e3547550806883103a9cbc1d95f78b84494c940912a65bbdc91f keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm 2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac keylime-verifier-6.5.1-1.el9_1.4.x86_64.rpm 22b126056912799186d289c10e59d6c86b3a802b7fa697722a19fac6a166fb16 python3-keylime-6.5.1-1.el9_1.4.x86_64.rpm a289908636025492c0a33826cb1057d77c797d8e52dc02d0779f3e844055d470 RLBA-2024:9287 postgresql:16 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm 44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8 postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm 6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259 RLSA-2023:0608 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.7.1-2.el9_1.x86_64.rpm 9a19eb5d598812f59d555f6c0588407309c085cf931767ee8eff0a9d2a21a6b4 RLSA-2023:0611 Important: git security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-2.31.1-3.el9_1.x86_64.rpm 1fd348be808204fc0ec966cb3f802924f7f28a240b13346b0920fd9226cf8d25 git-all-2.31.1-3.el9_1.noarch.rpm f6c54c0220a9bd68de0e305812df87264fd521bb08820715cf9dc1071291f511 git-core-2.31.1-3.el9_1.x86_64.rpm 7fd603310562ee6c65ee45d73d7797fd1b886cfa0a64d3365bf8a0265cbec2c2 git-core-doc-2.31.1-3.el9_1.noarch.rpm 45f316d495138f8be8ffe7388e1c19f8c21796c460a85e639e75678c106ce58c git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm 81046539f39daedada507d66e7d7cf6ca1511a199a40601f510b8f69bb61299d git-daemon-2.31.1-3.el9_1.x86_64.rpm fe8b6288f08ef1128956ace1230730b2bfaf09a95aca7ec6f093882e9a63acfa git-email-2.31.1-3.el9_1.noarch.rpm 70d637c668eb2f9e960961aae8245a6bde1d4d0f46698d9327f807cfc1c34546 git-gui-2.31.1-3.el9_1.noarch.rpm a2cf17eeca58483f8543fabbe00d271789e3b4f10c1319900c95da45924af047 git-instaweb-2.31.1-3.el9_1.noarch.rpm cf3ec0c9c039068358e74dddfc4d2fbfb53352f58a1045df21a51753a8ddf8ec gitk-2.31.1-3.el9_1.noarch.rpm 2de11da7c71d9d9ba0c74776e512ebb9019a637d0d1c1bc849e6615ca0cc597c git-subtree-2.31.1-3.el9_1.x86_64.rpm 79483d59a6386ea967a8bf104c6882a71a4165fd8a08ea8bdefe7cb8fbd53da1 git-svn-2.31.1-3.el9_1.noarch.rpm cfb06cf9a2ea4ffc9626bee74546252fa10d2c7cdf31e71c6e7c1dd456cd5950 gitweb-2.31.1-3.el9_1.noarch.rpm 730d688af3395f1aaaddc4df6c48afbffa83d9edc6ce4198a2642560e8ffcfb5 perl-Git-2.31.1-3.el9_1.noarch.rpm fe65cd3944f1c22159235b304df53845d209bec44b2c7932055152898179d500 perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm 55754fdb2a22c8039445f3c63291adfd309e2a3746f20309d20926dc75f10c82 RLBA-2023:0669 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * SELinux prevents smbstatus (executed by Insights) from creating /var/lib/samba/lock/msg.lock directory. (BZ#2136760) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.43-1.el9_1.1.noarch.rpm ec275286c991f4b745e1d772d063292a5a43bdabcfe832eb41116cf9e83a8626 RLBA-2023:0781 .NET 7.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166776 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-9.1.0.z] rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.3-1.el9_1.x86_64.rpm 8d74085987d0ca148e5d3efabe9c5c594884ba3e4849af8010e5a6b76163efcb aspnetcore-targeting-pack-7.0-7.0.3-1.el9_1.x86_64.rpm 82198a380750546bf594dc1e7c414763328c57352174a7af1cb93c4875aff801 dotnet-apphost-pack-7.0-7.0.3-1.el9_1.x86_64.rpm 0fa38121471632bb00f5bd89c3c2a5bfa03fc86d4b825ac70117380788f042fb dotnet-host-7.0.3-1.el9_1.x86_64.rpm 935c287837d4a432fda9bf5ec46f1ff7d0757bcfd8ce6ce4497bd770aef8018b dotnet-hostfxr-7.0-7.0.3-1.el9_1.x86_64.rpm 292c97ab6ec6cbfba273d424c7bbbfb9f17d0bca0431d4c8da0bc208ceb1e2b3 dotnet-runtime-7.0-7.0.3-1.el9_1.x86_64.rpm ff594ff0f646a30a2df056db825a7faf4e3f237d7721d5cd72aa28fd06089301 dotnet-sdk-7.0-7.0.103-1.el9_1.x86_64.rpm bbb42bd873f8bbcc947d4efc529e76ef711ea6f75b0f4e69d2b7b5498663d611 dotnet-targeting-pack-7.0-7.0.3-1.el9_1.x86_64.rpm 1367f3d48df2baa2cb540e141e45ec875183aa7714cb88b972ec8b7f85b8c80f dotnet-templates-7.0-7.0.103-1.el9_1.x86_64.rpm 0d1eda4deee9f044bdd596d447bfd741b41860b2d7cc0e3b5e9fd75577708afa netstandard-targeting-pack-2.1-7.0.103-1.el9_1.x86_64.rpm 8a4b18610827db7e9bd67baa84e5715f5eee76c244405c951af3076539413533 RLBA-2023:0782 .NET 6.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Bug Fix(es) and Enhancements : * 2166770 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-9.1.0.z] rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.14-1.el9_1.x86_64.rpm 6d3550fac0f794bcd60b016851ffc020d2e2383cc36980248354bbed4b97e27e aspnetcore-targeting-pack-6.0-6.0.14-1.el9_1.x86_64.rpm e10002387a96cd906d844d65278ef886fa3c03312e4748a0e27719d8dd4058d5 dotnet-apphost-pack-6.0-6.0.14-1.el9_1.x86_64.rpm 3e8d84d3e1447ec293fb85ff3a651c1d074576e73db9062d41b3dc398bb0d5e2 dotnet-hostfxr-6.0-6.0.14-1.el9_1.x86_64.rpm 4327a8ccea25d032b12caaff4e53796a6e0d1b64f80c625364665061b1e4a788 dotnet-runtime-6.0-6.0.14-1.el9_1.x86_64.rpm 4654059f94716cd2bb67e4dac40c86e8028e764bdd6feb77bfa159d04397d32e dotnet-sdk-6.0-6.0.114-1.el9_1.x86_64.rpm baf52245bfc68db77c75c68991ba63ddd0921bce8c1b838f5279518d0117187c dotnet-targeting-pack-6.0-6.0.14-1.el9_1.x86_64.rpm c0a0af82f1fa6f12e0bc9e13aaaba055c36cc70b7e6f6df8b589df8c65d7405e dotnet-templates-6.0-6.0.114-1.el9_1.x86_64.rpm f6a52d8ad8eb0ed59bb55d57adf8aa97571f3cf54bcc11dbc94198b9f54bb2da RLSA-2023:0810 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.8.0-2.el9_1.x86_64.rpm be6f9252b2b58f1d6db0aa56a75a6858027604a69c62688ecd2052a603fc2076 firefox-x11-102.8.0-2.el9_1.x86_64.rpm c3dfb1d07ef389a4d9c1523e8ec02a840217d46d7b3f32bf21e31d7a813c1361 RLSA-2023:0824 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.8.0-2.el9_1.x86_64.rpm ee0236a731da14a7dfc78bd0b7554283e35908f0459b67b5464507f24c226bae RLSA-2023:0903 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm 0ba47951b812a1b238f8644bd539de823aeff91f869f75c5a279f1dbe36676d9 webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm f00132e4938cfef7ac2dc522d80a44444d6a02a090693b4dfaf57e7c1a8dc4fd webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm d6aa5b7b626bd571abe15f9d6f4860b724883069e1af9c59133310f952021638 webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm f9bca967a8fc2772b1803e12bd69dd1f956a1da3ab713d3290eac80188a2439a webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm 0daf588685caf28e8aa9c929107b19e01a69e5b3e558d2979692e36444d02c44 webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm fa1a001c089a5fc19521593bf134d6c9b26a65bd5a840407f08adbcd483fc71d webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm dc78f39eca36f81e1f003a4de9f92fa06c4547153be3d7630b31404fcda2afce webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm 36ddde218826001fb8bc8d30abf64280f0219574378da5b46de5d411ccb91e1e RLBA-2023:0973 scap-security-guide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2169441) * Rebase SSG to the latest upstream version in Rocky Linux 9.2 (BZ#2169443) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2169445) rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.66-1.el9_1.rocky.0.1.noarch.rpm 0192f846a671af536e035e8f528a8c6e73f15499b9b9f31cd771725a2908bbc3 scap-security-guide-doc-0.1.66-1.el9_1.rocky.0.1.noarch.rpm 0dfbfa1c875e964115e043502af0a65eead70d1e1028e10a0dd8d32367ef134f RLSA-2023:1068 Moderate: libjpeg-turbo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c (CVE-2021-46822) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libjpeg-turbo-2.0.90-6.el9_1.i686.rpm 76394adb6682caefc4ac48ba6ec5308c1583d8c93e64993e248f0b6d3061e25b libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm c68c08fb07237db183473d39d98173881b89e595cb75345f92488e99280c95e4 libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm 14179002231a67b6280f275c0894fbd36101981641c8b6c02bae849eaa270541 libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm 969335187349c8981fb76cceb807a5d3fd4cdc93e79177796f120bf95ac8b119 libjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm e7980527a6778d1dabd71de991d7fe27acb72f4a5c26ea17d2f9e91fe2b3eebd RLSA-2023:1067 Important: pesign security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pesign. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pesign packages provide the pesign utility for signing UEFI binaries as well as other associated tools. Security Fix(es): * pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pesign-115-6.el9_1.rocky.2.x86_64.rpm 2879481369fc2706539a86c005a3cbd9f01307657e56584aa3b6b661a92f723d RLBA-2023:1244 .NET 7.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-9.1.0.z] (BZ#2175027) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.4-1.el9_1.x86_64.rpm 884dc4c45a6b3f6dd727007ac5286130a45d7742755cee88577c3e47dd1af41c aspnetcore-targeting-pack-7.0-7.0.4-1.el9_1.x86_64.rpm 655a5ac2173b2ea716e5cf046abc81c1b4d7effea9409d882397a972269d6d2d dotnet-apphost-pack-7.0-7.0.4-1.el9_1.x86_64.rpm 53b4f12386aa8238ada6e3930ad64e715c5da2f217c3a32549b3545717e0f238 dotnet-host-7.0.4-1.el9_1.x86_64.rpm e2a2108c282f8f165efff8fe0a757d732f789a493b2ff99f77ef8e9bbd9c65af dotnet-hostfxr-7.0-7.0.4-1.el9_1.x86_64.rpm d1f203efe2857577be6c90da1604e69da70141656b53e997d6aa2868af819b32 dotnet-runtime-7.0-7.0.4-1.el9_1.x86_64.rpm fc3f2f4c7a90cdcfc08809f96b537629e86c9c7ad336fece6427eb9027bb11e5 dotnet-sdk-7.0-7.0.104-1.el9_1.x86_64.rpm 298e415b0171c015ed3ac610b47f365a42b0cadf55798b3c4e4cbcef6d9b6f87 dotnet-targeting-pack-7.0-7.0.4-1.el9_1.x86_64.rpm 9383641bbee8d533ed259ba96e3ab85b341069c24a5cd7aa95142b23669bac19 dotnet-templates-7.0-7.0.104-1.el9_1.x86_64.rpm da78f1b77136613f1a2e139834e1991bb1a324bd1f35b7798fa0319deba2c638 netstandard-targeting-pack-2.1-7.0.104-1.el9_1.x86_64.rpm 0036392fe67c142d59737a20590dd4d374b4423acd163034749b0404c7147612 RLBA-2023:1246 .NET 6.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.115 and Runtime 6.0.15 [rhel-9.1.0.z] (BZ#2174986) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.15-1.el9_1.x86_64.rpm 3347349797afd3b3c1b87e5d9a109158cd94f66c9c0df364e75e4e1d2961d471 aspnetcore-targeting-pack-6.0-6.0.15-1.el9_1.x86_64.rpm 9f12b7b2fb812b17c805fbb79ea3fa27ac1837b7e4c6e86432e30c8e8fa7c60d dotnet-apphost-pack-6.0-6.0.15-1.el9_1.x86_64.rpm f9d269693d9ffd0b673739f296b717fbe51ba037e2651e57e13d35f3590b7fc6 dotnet-hostfxr-6.0-6.0.15-1.el9_1.x86_64.rpm 392ae47ac3a96f62db4dc3b08159c04f88ab234b916dd8c4aba57ef4908b17ce dotnet-runtime-6.0-6.0.15-1.el9_1.x86_64.rpm 842311ab2deacf80c5c7a9e9f7c5b176b7dac648dadd68f80fbb5f6a9d55b923 dotnet-sdk-6.0-6.0.115-1.el9_1.x86_64.rpm d353ac37d20a8dea9995baad8117cc570fc572611d5fcfafaded915d1a6e7b9d dotnet-targeting-pack-6.0-6.0.15-1.el9_1.x86_64.rpm d881f4fd2c081412d551914b94ce84441e973dbccf53b1a13f6cfee949f08365 dotnet-templates-6.0-6.0.115-1.el9_1.x86_64.rpm 8d6613cf3daca5e8eb38c841e568274366810998baef612bb98ad3209eafdd9b RLSA-2023:1407 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.9.0-1.el9_1.x86_64.rpm 1f3fd730d156e1782c4881dc6ebf771c8c27ce06069b6afd2d664e9f1f192ec2 RLSA-2023:1368 Important: nss security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) Bug Fix(es): * In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434) * Need to update FIPS review comments into NSS Rocky Linux-9. (BZ#2177875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nspr-4.34.0-17.el9_1.i686.rpm 3e9cbba181ad2f7851caf1546c40c1e90da92ff5753a515b9a36ed9c50271116 nspr-4.34.0-17.el9_1.x86_64.rpm de99df7d4caff58c4a5288adec6cb39e344ff7599777243dedd7944bb7678179 nspr-devel-4.34.0-17.el9_1.i686.rpm 5259f678aca5e60a1522f3361a0dd04d0433ce972091c53bf9b469cb4a2edcb5 nspr-devel-4.34.0-17.el9_1.x86_64.rpm 1d8231b3421fe93c06c1bed961436931428ee04e155c2d8d5b93cb52986bb026 nss-3.79.0-17.el9_1.i686.rpm fd7eeb200eeb7d906c53faf440a79dd5f73fa40b8845586d39302b13364ce640 nss-3.79.0-17.el9_1.x86_64.rpm 7b71cb9e5bb118de415b45986dd1d7fee4ded9e05653147112e3c349668dc543 nss-devel-3.79.0-17.el9_1.i686.rpm 4e3f1de7a8664b38f3bdc009918a6111e17b27eee998818d554fbae98fdced2b nss-devel-3.79.0-17.el9_1.x86_64.rpm 22585267843d5a07a194725198d1c4d04759326b7e54f1d3ec78aafdfae35830 nss-softokn-3.79.0-17.el9_1.i686.rpm 768f66fe3edeaebab823395b374ec926b3c91830364835c888c3ac6a98ac0fe5 nss-softokn-3.79.0-17.el9_1.x86_64.rpm 472379214f891f44b0111bfd7ce68824eb70796a4743711ec9a50bee68d3d94d nss-softokn-devel-3.79.0-17.el9_1.i686.rpm 80fef195b0643b7bbf8abbac3f3df61e7a25705c99ab13c7fcc8308d47d4d3e6 nss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm 3f423695fa16882d7101e75f0b686aafdf34135dd7134d1778ed8fbdeb44f19a nss-softokn-freebl-3.79.0-17.el9_1.i686.rpm 189f7dde4c240821e354cc63ddbcf63dd2ca349e92c6a2428d03676e2cbbb58e nss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm d58d9ec4eb8a0bb425263efb128678ad7af4161d346815c4b40fe729aa4fe423 nss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm 1706c6b5afecc85da98350a9b5804cc56db41ef0fe358fd4243465dd40f0cb5f nss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm a53071f1e5757630c72111fd81ef098ee6e441b6672daf758232cc3c25c74713 nss-sysinit-3.79.0-17.el9_1.x86_64.rpm c4801d54126d031e7a12f4f39b6b328fafccc30809e2a590b4ffdebba88567ae nss-tools-3.79.0-17.el9_1.x86_64.rpm c39002379894982a792562e20a3b3625710137eca8216d4df16ca56cfa611102 nss-util-3.79.0-17.el9_1.i686.rpm d09fddb012a23d2b60e0be3e248fa32cfcaa9914455ab5962910d6df965d350b nss-util-3.79.0-17.el9_1.x86_64.rpm ce543f74dba29482790816ca43ff1d308e89d08a9246b89c76bc88e19fd19769 nss-util-devel-3.79.0-17.el9_1.i686.rpm 75681e8cf6222147dd5caa834ed9a0384010609fbaa5e6f8e700686a866e7a0b nss-util-devel-3.79.0-17.el9_1.x86_64.rpm b8f2ffecbdf0243d731845b6f9542cf155a457ce69efce04d171d79e724d1b93 RLSA-2023:0946 Important: openssl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) * openssl: NULL dereference validating DSA public key (CVE-2023-0217) * openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000) * In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003) * stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008) * In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010) * In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012) * In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015) * In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017) * In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019) * In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170) * Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010) * OpenSSL FIPS checksum code needs update (BZ#2158412) rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.0.1-47.el9_1.i686.rpm 17bc0d5769df372510d9c14c3e2e99a81d242d8416cd359b707adc0774747a5f openssl-devel-3.0.1-47.el9_1.x86_64.rpm aeeff49fd81a7185b664c2001a1462ecefc6f077afe2892fda7ef2b205ae4191 openssl-perl-3.0.1-47.el9_1.x86_64.rpm 9af60eb73db63e790f746b7a8d29ee7c52ab0cf9b834df07c2a4477b2d8451bd RLBA-2023:0947 ipset bug fix and enhancement advisory Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set. Bug Fix(es) and Enhancement(s): * systemctl restart ipset extremely slow restoring large saved set (BZ#2043008) rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-7.el9_1.noarch.rpm c6b353b8305a632f943cc583d6eccc8a5200ef9b9172927565f006e5d44058db RLBA-2023:0949 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * ebtables among-src partially broken (BZ#2136584) rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.8-6.el9_1.i686.rpm 852130b8e23c4644f99de82940934707a266be64dad156180db64f78b5113f23 iptables-devel-1.8.8-6.el9_1.x86_64.rpm 1b4fb2d1cb2166532be03e9283298f7e415f8f3c03e7eb15646f379fd68c0ef6 iptables-nft-services-1.8.8-6.el9_1.noarch.rpm 1d6b000608ee5c08e9433e434fe818c6bd7414ab775418e7a195af00e5701a11 RLSA-2023:0953 Moderate: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.14-1.el9_1.2.i686.rpm c42490b4eaf04c0d16244809e1619c42398010db85ee97c7eaf9671c48b2b915 python3-devel-3.9.14-1.el9_1.2.x86_64.rpm 1b8a7b2b64858b877d163d6c6c0f3383eb2c82bfb75526024e3a7074fa03bdb5 python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm 0caf2ccd01c94547498dec8683053ff68adc4145a78347e891bd21f942c2c624 python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpm 8c1295c94bea9fedb13b7154d2ff121c6ae51dc0e767221593129ca3ffc3a304 RLSA-2023:0954 Moderate: systemd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) * systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-12.el9_1.3.i686.rpm 1df2fcec62f2c59d6164ed5013923427267b0ce180b38ab417a7c18a64137ee2 systemd-devel-250-12.el9_1.3.x86_64.rpm d61c188a279c79e01344d02373b750f4a14b283f5fe0e75fb69c77411859fff5 systemd-journal-remote-250-12.el9_1.3.x86_64.rpm 79f375287305a3a536a7b0b34f16627c021f1723fc1abdac247e074196d83946 RLSA-2023:0957 Moderate: lua security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: use after free allows Sandbox Escape (CVE-2021-44964) * lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.4-2.el9_1.x86_64.rpm 08ea59847e48d1e94c58d3f8be4eab60be02f66883429fdb79c711a5f3f0faff RLSA-2023:0958 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: no check if the return value of XChangeGC() is NULL (CVE-2022-47024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-20.el9_1.x86_64.rpm ecb9078bca6357278341911895ba4dbe2565807d9eda9be3cd7d822751e48917 vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm dbfee7a023eb444a484cbf31805bb52eb2ad1d4ea3a5a891cd8ef78dc2672a11 vim-X11-8.2.2637-20.el9_1.x86_64.rpm 720fb5f4e53bdc791360f2e7260aa223d69abe462fd7d60bd804aa6c6017cbcb RLBA-2023:0960 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * selinux-policy AVC denials during ipa trust-add (BZ#2168961) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.43-1.el9_1.2.noarch.rpm e1c40431b1dd691ce3e287db8da0359adbbbf311cda207fae8a358f51d9cdac8 RLBA-2023:0964 libvirt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fixes: * libvirt doesn't catch mdevs created thru sysfs (BZ#2141364) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083) * qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410) Enhancement: * Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094) rocky-linux-9-x86-64-appstream-rpms libvirt-8.5.0-7.4.el9_1.x86_64.rpm 57a3167b3cba57e16e0143fcbca907b123d3b20b4c23b5075b18543792ee85c3 libvirt-client-8.5.0-7.4.el9_1.x86_64.rpm 3220cacbb995fb62c90b0a73de1c823c7b9eb6a643bd89ee2eb5f878b4b81f14 libvirt-daemon-8.5.0-7.4.el9_1.x86_64.rpm e96432441a860d4e978865352a881bb54d790a58c4a7538b06bae73e3a549a6b libvirt-daemon-config-network-8.5.0-7.4.el9_1.x86_64.rpm 20bb239425b9962aceafc9c4dd6a96c75bee4a9b0db2752ed32a4d9d163bb20d libvirt-daemon-config-nwfilter-8.5.0-7.4.el9_1.x86_64.rpm 87bec2fe43f1f842288ba9dcb3e6840bafbbc5aead3f766b7e0f928ae0c7cfb6 libvirt-daemon-driver-interface-8.5.0-7.4.el9_1.x86_64.rpm 380273e78bd4408ec37f7360b06aecb2c911011dfd54194abc481a8261ae853c libvirt-daemon-driver-network-8.5.0-7.4.el9_1.x86_64.rpm 6980bcb2f8ab6f01bde49dab89f0f1919d16a73a33040c0f584d1db9c04fb317 libvirt-daemon-driver-nodedev-8.5.0-7.4.el9_1.x86_64.rpm cf5e2b276124ec165a6189df87c1ab74fefb417768e0d0897d4935a21e8808f1 libvirt-daemon-driver-nwfilter-8.5.0-7.4.el9_1.x86_64.rpm ed2eb26159abc683f58df74c365a67be78998b18f5e842a5506e5b38b8fe575a libvirt-daemon-driver-qemu-8.5.0-7.4.el9_1.x86_64.rpm 35f6218a1a1b3b2713d2ade31c119ea016f0e1dd0e278eeb6532fa5acafea738 libvirt-daemon-driver-secret-8.5.0-7.4.el9_1.x86_64.rpm 4bea5b106c1d9b2e1e5709c6e42d1637b9b395a63de055a407c17cacb98144ad libvirt-daemon-driver-storage-8.5.0-7.4.el9_1.x86_64.rpm 8b0c96d055e5193138b87f57a1e9485d4ff9072d992f8f9e5ef5201942eee911 libvirt-daemon-driver-storage-core-8.5.0-7.4.el9_1.x86_64.rpm 5b6daa4a7d930663981fcc5680f29c409e6b4940d6a9ee71fbc63536abbf3297 libvirt-daemon-driver-storage-disk-8.5.0-7.4.el9_1.x86_64.rpm 55b7f1616b2e42eb6ecfdf8e8e2b9ca637269b4a84e2ad7ed6e957adaac4f42e libvirt-daemon-driver-storage-iscsi-8.5.0-7.4.el9_1.x86_64.rpm 12a1858f54c45044aaf106d31906ed99d95aa5e1eb3025bebfa22e0975f0aa5b libvirt-daemon-driver-storage-logical-8.5.0-7.4.el9_1.x86_64.rpm a740964d7ab2cdfdb0a5d50d1a9de9cc42298727066f0258b1c7f1560a0c8fde libvirt-daemon-driver-storage-mpath-8.5.0-7.4.el9_1.x86_64.rpm 1c7a4077827efcad0e5001788a8f9dff6621aa84352f381416b69452b4978f2d libvirt-daemon-driver-storage-rbd-8.5.0-7.4.el9_1.x86_64.rpm a84dec6f2988295b9333b14012beb50ba8bf113a30627b78d51d963f816e1896 libvirt-daemon-driver-storage-scsi-8.5.0-7.4.el9_1.x86_64.rpm 0c706fa0b5a287bb7a561f633f0b508e082b3110d94d3757da6087404dcb3ada libvirt-daemon-kvm-8.5.0-7.4.el9_1.x86_64.rpm be6bb2de5cecee95649c6ca0048d9186629444145c8d836510b791a42dcf18b1 libvirt-libs-8.5.0-7.4.el9_1.x86_64.rpm dfae7c46013b26d1a09431c781b2b9aebfb68f1995865fbdff0e12cbfad4ac0f libvirt-nss-8.5.0-7.4.el9_1.x86_64.rpm d559b9698a318c831d66b881a3af4dabd2975c0b0d1a539c0fdee4bd0ee5709e RLBA-2023:0962 cloud-init bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug fixes: * Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153183) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' (BZ#2165942) rocky-linux-9-x86-64-appstream-rpms cloud-init-22.1-7.el9_1.0.1.noarch.rpm 1108613c461841b1268e21cd769ed37d771c9185588399e0d550447cbc35fba6 RLSA-2023:0965 Moderate: php security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667) Security Fix(es): * XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454) * php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629) * php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630) * php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631) * php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.27-1.el9_1.x86_64.rpm 6e936eee74340e5a2ef68ff7dcc084d25575f3be5b9e8b5da01a0fc973043c7c php-bcmath-8.0.27-1.el9_1.x86_64.rpm ab39a03f649a9de6ff338ae78c9bbffec3651f0826f6a1d8fc9ea8fba0cbd2f2 php-cli-8.0.27-1.el9_1.x86_64.rpm c1f75ef714cbbe0a99b674ae251b8f62f53604cd494ff27e701ccf000410adcd php-common-8.0.27-1.el9_1.x86_64.rpm 470dd54da09171a89720667bb6f0093ff71c18de31505952d95193645bae5d20 php-dba-8.0.27-1.el9_1.x86_64.rpm 552df425057f413fcc56503bd09645df2e29a0c79ed182009703e523415fa542 php-dbg-8.0.27-1.el9_1.x86_64.rpm 3bfd5ebd7d87c3ddcdbf83b1b03553e4a0939ab940231656e3342e62d5e5a38f php-devel-8.0.27-1.el9_1.x86_64.rpm eff522c315d36b6ca261703e53b734abc0ccd43a5a3adae9453468cd9516defe php-embedded-8.0.27-1.el9_1.x86_64.rpm aea94e12b69410a12a4b65fefe8813fe1047adb9ccb5c9cfc07b3d709fa5fdbf php-enchant-8.0.27-1.el9_1.x86_64.rpm f18ae2a95314760ee773d89b392ce9c674d26951d1662df5b7a4b374d03490d5 php-ffi-8.0.27-1.el9_1.x86_64.rpm 59616f998f32268cf0d55afc1c031b8552a820027935e08157e6efbaf8c1bc0b php-fpm-8.0.27-1.el9_1.x86_64.rpm cb413faf20308620ef17dbd247e8fec107f882c461505c0514fa9758cdd0a7e2 php-gd-8.0.27-1.el9_1.x86_64.rpm c6d9808434fb1566dc684f18ece56020732611f2d92aed186fe4ae82eaa61481 php-gmp-8.0.27-1.el9_1.x86_64.rpm deba46e9d780608626fa328093eda3970bd637b9e6713a8ebb646a81ee38b456 php-intl-8.0.27-1.el9_1.x86_64.rpm 03708d625478cb954ee5583da8745c333682773bc00337414cdee2dbf054654e php-ldap-8.0.27-1.el9_1.x86_64.rpm b9781557ac23fc73645c2193b563564718e1b0a70d9140061551125ea59741e9 php-mbstring-8.0.27-1.el9_1.x86_64.rpm 1f0861a211a8ea03969d9b967a3d1734eeae37680a364f3f2c2e556482d22d63 php-mysqlnd-8.0.27-1.el9_1.x86_64.rpm 10e5b013f0166dfa6cf64a89da9093e247b5d303899adedcb5f146576c7af21e php-odbc-8.0.27-1.el9_1.x86_64.rpm 41ff36835b0709066711b9e7a4596027c4231bf330df0564db42529c27e6365b php-opcache-8.0.27-1.el9_1.x86_64.rpm 6916caceaa2919b7a3858390beb8377ca0ee40f4b37a284a134fb97b8bedd0ee php-pdo-8.0.27-1.el9_1.x86_64.rpm 42e7826396f1a8ec2e1fb18cf5cfe0b991870e747d80c90b2a107c8b820ba78d php-pgsql-8.0.27-1.el9_1.x86_64.rpm fd7cadc0491362b8141920538a9782cf588984693d56f2831e89e64054533f44 php-process-8.0.27-1.el9_1.x86_64.rpm 0d7d7a1308e21ef4704b22e436fcc01d720c3a0740c09e2ef0192995dd8d2c44 php-snmp-8.0.27-1.el9_1.x86_64.rpm 0613c9fa7d3caea73d293543c1c515b86f6216012368275977da6aafdf94a5dd php-soap-8.0.27-1.el9_1.x86_64.rpm 467c032468810f9a9815a17371b48b7654a912893d6149d73e60da5850a67b5e php-xml-8.0.27-1.el9_1.x86_64.rpm 5f3af1b9950f82465fda05ea6f20aec71c9a53122ea57cc77ee74bcc6f0ea97b RLBA-2023:0968 containers-common bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Update shortnames.conf. (BZ#2158512) rocky-linux-9-x86-64-appstream-rpms containers-common-1-49.el9_1.x86_64.rpm 8795db0690ba77f4e97782fc178b53581f82ba0a989b41834a03d99bc809a3b2 RLBA-2023:0967 udica bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The udica package provides a tool for generation SELinux policies for containers. With udica, you can create a tailored security policy for better control of how a container accesses host system resources, such as storage, devices, and network. This enables you to harden your container deployments against security violations and it also simplifies achieving and maintaining regulatory compliance. Bug Fix(es) and Enhancement(s): * Bump release to preserve upgrade path. (BZ#2164991) rocky-linux-9-x86-64-appstream-rpms udica-0.2.6-30.el9_1.noarch.rpm 2133a41838dab65ad8db2f8933766eb8953f07c03e479fb5dbb4f413d6eec1f8 RLSA-2023:0970 Moderate: httpd security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760) * httpd: mod_proxy: HTTP response splitting (CVE-2022-37436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975) rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-7.el9_1.1.x86_64.rpm be77545283eaa94ee8f4b8677e7cd540bbe40a45f3cd3e3367b1173db3ebbda7 httpd-core-2.4.53-7.el9_1.1.x86_64.rpm ff4803f8b9c698e90413034d7e16d78439ba15f346c676caad2d2241be632c42 httpd-devel-2.4.53-7.el9_1.1.x86_64.rpm f62954406eadb85cad7b882e8e0d8deb27556c204adf9957b34e9da0519d3c4a httpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm d95490f97281d675b284a5d9e5620b2e4469f188176ad6a9fafcfabd049fa169 httpd-manual-2.4.53-7.el9_1.1.noarch.rpm 6c42f3d57a0a3480478753f17c63e90523e2b232eac7132379fc6ca9d55cb466 httpd-tools-2.4.53-7.el9_1.1.x86_64.rpm e2fa756359c33ce3350e46bcdf3bf5cebc69c2d674ed07520e918dae9176fab6 mod_ldap-2.4.53-7.el9_1.1.x86_64.rpm 90d24163651f5a8ca7e59c0456455bc05590bb6d629abe5d6444f0199ddf4fb9 mod_lua-2.4.53-7.el9_1.1.x86_64.rpm 2957b20949445ccc2844bf9bfcec2ae2f7f45f4fed4bb40e0a1893296516aeb1 mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm 264a4340280a1b041a67b8bf6b9bba42f03d95c08f7e7aec9195b3fc24b303ec mod_session-2.4.53-7.el9_1.1.x86_64.rpm 74fe0e842d0f724837798401405740ee7bd63ff1b443bb166ab9d33ac44e7e9e mod_ssl-2.4.53-7.el9_1.1.x86_64.rpm d4cccb00b014dec5b48c791c30f782340fed7edd3fa3b0c9c8f2fcd15c15a8b9 RLBA-2023:0972 WALinuxAgent bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. Bug fix: * /dev/disk/azure/ is created as symlink to sr0 or sda and not as a directory (BZ#2168913) rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm 5af51818d1c38b70b1dc2994e9ca7a8bd6a72bc1a413afa8667982513a41d727 WALinuxAgent-udev-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm 8ae764d4370c2d8c4f42b3087561ebc2fc77e19623aead53884b774e846ebfc7 RLSA-2023:1337 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.9.0-3.el9_1.x86_64.rpm 5dbd79fe888aaadcc13d1700b2a91d7df197145776c8125680d29dcaa3c9a82b firefox-x11-102.9.0-3.el9_1.x86_64.rpm 571c301f6130899c57adfbb891dc0a800a9e24cdd9aaa62add6e1364bacfcb1d RLSA-2023:1670 Important: httpd and mod_http2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd, mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-7.el9_1.5.x86_64.rpm 183ebb744b109133015141c33750d7881ef29c2c90b4a37193b0fe08bd0066d3 httpd-core-2.4.53-7.el9_1.5.x86_64.rpm 2157d121431693b2092c522e836d0fe7f39a6f3f78f5233706fc9ff9268556b5 httpd-devel-2.4.53-7.el9_1.5.x86_64.rpm 0b1b747dff809e5e15cf9bd7535773e8eb7f470d2ce72d9e741549e690d97603 httpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm 434ef5817087d04dc9c4ad74f4cd8c000da031bce2248c29302f7278c02cc29f httpd-manual-2.4.53-7.el9_1.5.noarch.rpm 2ebeac5aed899c14b49856ff8a9ef34391dca4cfe9465215a44bdd131b570afe httpd-tools-2.4.53-7.el9_1.5.x86_64.rpm c170cd77505c1070843712be0cb62831e9c9b479967689b5fd55baa5f0d0ba7a mod_http2-1.15.19-3.el9_1.5.x86_64.rpm 945dbbfae5bf5291fb6c7132eb6c34d09f09e90ef935915a5804b97de5ce34c5 mod_ldap-2.4.53-7.el9_1.5.x86_64.rpm c69b735f0fe584050d143c4a71e24dcd760e8460ae2f44e6bbd86a958bf6acf7 mod_lua-2.4.53-7.el9_1.5.x86_64.rpm 696e5e1a81a907eb850bd89399984e07f3ca5b4a78b6a193581e0962db481792 mod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm b3ae614753b0ca018178a7c0609cbe1b759e61e9c72158bccf4403215d1b519a mod_session-2.4.53-7.el9_1.5.x86_64.rpm 4697ccc2b35556ad9516e63bc9424c472427f683751554ae9a1d11d22a6ed9b2 mod_ssl-2.4.53-7.el9_1.5.x86_64.rpm 944adb6abad6c2367d7ee30896186e9656084d99f1c55ab43a9acca76e675566 RLBA-2023:1756 .NET 7.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.1.0.z] (BZ#2183592) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.5-1.el9_1.x86_64.rpm 7be96285ff00ac0b571fe978e2c59120232c420867f5f46d03dfc00855aa90ea aspnetcore-targeting-pack-7.0-7.0.5-1.el9_1.x86_64.rpm 1d142f98871151b134807309a953b4295847757e7b3ffe5f4a95d7d2bf2213b2 dotnet-apphost-pack-7.0-7.0.5-1.el9_1.x86_64.rpm aaf2ed50fdbf6aaf5a695fcf43d14c9cf86195927a49bdf5287f6cd02ecf76a3 dotnet-host-7.0.5-1.el9_1.x86_64.rpm 463f8236639a2815118b81b9ed25325862aa7cb30e92a134795be352efe3dd4a dotnet-hostfxr-7.0-7.0.5-1.el9_1.x86_64.rpm ba8c98b2a7068c7800bae9e864b9627741bf30937807bff653cc7a0f26e6c53a dotnet-runtime-7.0-7.0.5-1.el9_1.x86_64.rpm 1429180f71ee4f027ec77a6f42cc66b4d6624e5a07d481e6c1e70ad1819ba61c dotnet-sdk-7.0-7.0.105-1.el9_1.x86_64.rpm 7d8a1bafeb2d7c410fe71e51af9ba0190df33a88886f26ecd638b66341b72b4a dotnet-targeting-pack-7.0-7.0.5-1.el9_1.x86_64.rpm 779ed5f89d63a4834a4517cbd4e58856acb577328a7bfcfaa75102121b40aaca dotnet-templates-7.0-7.0.105-1.el9_1.x86_64.rpm f7b6cfaf0fb748be8e6a890aea472e47d7d2cf7e30c80cf0c36949d12985d095 netstandard-targeting-pack-2.1-7.0.105-1.el9_1.x86_64.rpm c5000d6b44dfb59cfc8dcd99d1dfd1e77458f6963ee41b0f1b4367318d8b78bb RLBA-2023:1758 .NET 6.0 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es): * Update .NET 6.0 to SDK 6.0.116 and Runtime 6.0.16 [rhel-9.1.0.z] (BZ#2183583) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.16-1.el9_1.x86_64.rpm d43ee9d3cd4deea5ce74fc19a28b8f3382ed5203e903a79b0e6cd17748c12f60 aspnetcore-targeting-pack-6.0-6.0.16-1.el9_1.x86_64.rpm 8f5fa49f9f580bafefc67e8160faf4aeebcda6e1aea6ef5389015a9c2490bb41 dotnet-apphost-pack-6.0-6.0.16-1.el9_1.x86_64.rpm cb523fafdaaf016dd135300071cb864d0d3aead770296857f9454870cee21f66 dotnet-hostfxr-6.0-6.0.16-1.el9_1.x86_64.rpm 31169c86ba49746c6344503e36f042fdc5d4fb86b761ff147d2a248fb2260fa8 dotnet-runtime-6.0-6.0.16-1.el9_1.x86_64.rpm 161734b887337c8a13ee91d5ed2eef26c327ce5db695f3fcda38e5e5a373c2f8 dotnet-sdk-6.0-6.0.116-1.el9_1.x86_64.rpm e2fe5b22e7a1c785988e291bdea89b633e1340aa03583f5029a8621793622365 dotnet-targeting-pack-6.0-6.0.16-1.el9_1.x86_64.rpm ff9c3d55e4c80d13f630d17afc0cd06dc81ef29f22773b2a9c3c4f5f71b2e2ed dotnet-templates-6.0-6.0.116-1.el9_1.x86_64.rpm c7eeedf70bf6fb2555c7ad1e975eb47d102d992c5069044f490578fd0a4b5d9a RLSA-2023:1879 Important: java-17-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186804) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186811) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186807) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm 4e87fe43167588c98b34ea536987099840c4afa9bb7077a8d3cb99cb89a25a4f java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm a843368e5c5dfb12fa63f6559769a54edb61b04e2b85b5771ee15d6baa522729 java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm 13bec13c7ad1598288168c612882315062220673325ab479fd56b264d6e4315c java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm f52eeb243c1c52f9aea6f87dd634494a86fd30ea57d04df9a1f5ad25ca2ee341 java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm 5f5f49eaed774a85ae7b6c12084b47526ba5926be203cad8b82ce744e3d7a9cb java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm 0646059998f75171de747fea74108c5bfd231d0a0d773e108d3a7ef459c3341f java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm 124cabe6e47e757074c59ca70889b2bc90ff5de15ec9f090cdd5d8f700d87352 java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm 9dc6fea58049b1ff69cbcd98df0bb433d7e6bf9550c549ccc61850862b73a802 java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm 12478dc71ae3d2aeec06e3285ab89e1a1f760a5d0cbcf0e2ba7aaa1c9e8c4c37 RLSA-2023:1880 Important: java-11-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpm 07b1788ec367da3590ca1e8f28a189e4b6093d6de92ba1eeb5abcb19373bb82b java-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpm a15eaf5b078c9c5b2c057d23c1b02b8e19095d7c462bf971ac55fb47b9fc1bdc java-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpm 9da3667e598d2052e5358f586434f13befc70d7c39d8b6a16adfa6d3ee3cbc60 java-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpm 04af1b29209a0854035ee6dc3ef61dd99486e2d14d4685361bbee65f2e537046 java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpm e27228183316b84a1ba807a6c2200ef5d29b0e8884755d6d39edb1e3533cc044 java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpm bf8ad95245b853cd621bfc69e9d80eb1c2525ba753642cddba45835de3d8a3cb java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpm eab1430c33d3a2d156da285fa61e31ff94fb871cab987757054c86ec2d2844d1 java-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpm 70df124380575bb1eb58aafeb2bf1be84ceef96f957899001f42153455be738d java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpm 8fed70a0919abad76e2f623dcbdbcc843988fc2bcbaa2e501030b78646b40d7e RLSA-2023:1909 Important: java-1.8.0-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024) rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm e5d71065577dde54cb390075336e02cd3e50b7c23dff9e1f470418d2c8187d2e java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm ea5f08818b4dbab7562497daa8f7105e608dcf73ba580d51ba57ecdd1fe52d7b java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm 5744f9bb42afd85ed795d49ab0e44d707b7bd8bcbff597dd0cc366759ebe25c3 java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm 6fb95376dc06f8727f601a99b3a911e3358ee490376ea654e1b039dabceb47d1 java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm e7aafc93beb0b0aa72525a52420286d5caa7c1729dfc23747641f1aa1008f061 java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm e8ed0f2151577dac7f6666ac58778d9ae76dc81a7a286d72df5607b03fd6bb52 java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm a71a8ea5be7a44355557d9dcc767b61e0cedeced41925dde267f0975e0265495 RLSA-2023:1809 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.10.0. Security Fix(es): * Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2023-28427) * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp (BZ#2186102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.10.0-2.el9_1.x86_64.rpm add6a1ab8f47c33aef7d09e7f9368d33fa2874722635b0332f5a6d808347f9d2 RLSA-2023:1918 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.3.i686.rpm 5c342f110e58012aecd1c636547e731f4d4b91fe0dbfeee2a53a02cb4b3590e2 webkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm 2083a9bcd1a5391202e744dfb9cfcb8cb7a693a9e4c9e9eb7a43347a68abffdd webkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm af3568c9576b799b32244d2714c77434b77c61938db1ff73ab53accd04b6ad3a webkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm 1b5141cf0645582e06fac4123989824b2c211663fdb55891e7d451d227c4ca0a webkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm 150eab2166f75bfce4acb05e2f1db4485f3fe99974568e76ef24496a113e4bcb webkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm 53c439a0fe85632e6302704d0fdf7b76655ea182650cb6ce47ca1c74dff3c26d webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm 5a7e0a3f0a8f0ffcb8dadf600dfdcbfe3bc60aafae5ba4588102389ceecdf9be webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpm aa52f2e3fd8e11981662df5946792f94ab16398b6e738a11c9e180f853e85268 RLBA-2023:1779 nss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * RFC5054 groups are occasionally allowed in FIPS mode (BZ#2180924) rocky-linux-9-x86-64-appstream-rpms nspr-4.34.0-18.el9_1.i686.rpm 32dc03324a78b17641a4d0bf308522a8c3d9fbc5ccdd8a8eebc16ce8059d5a63 nspr-4.34.0-18.el9_1.x86_64.rpm 54bf7721b9211bae17a39abf00fd2f277fa17832dea3373efecc02a07693e35b nspr-devel-4.34.0-18.el9_1.i686.rpm a8c12537ceaccefa83770bde083654cce939af08e968d09bb05e9add2a7eb27c nspr-devel-4.34.0-18.el9_1.x86_64.rpm 6cbff63fd99df9ebe43198faec44a91f55be5e72b702633f0d2938d162a786a5 nss-3.79.0-18.el9_1.i686.rpm b6f9249336d8725838d54557f50b4604f83c49c97282d95f6db6ecc406e56058 nss-3.79.0-18.el9_1.x86_64.rpm 861d1df85972ff033d3c80e51df0786a16bb7eb065597793e932c28ba9d06922 nss-devel-3.79.0-18.el9_1.i686.rpm e23a708d2dd5d4d83349a12b43933ec6847bbab51abea7fb032a3e49fe9ee723 nss-devel-3.79.0-18.el9_1.x86_64.rpm 24c17017d11d109ffa1a6942cef0d41d91da768121c38955671466601cfa98e0 nss-softokn-3.79.0-18.el9_1.i686.rpm aeb5f8a4b90b4cc3196d010de8a9a952d8c808d72e942c67a7e5446a80bf38b7 nss-softokn-3.79.0-18.el9_1.x86_64.rpm eb0e6ceca59abd45058c4c6e1cc11234b2197e4883f48ea323bb0bb85268f6ba nss-softokn-devel-3.79.0-18.el9_1.i686.rpm 159ecbfbdaf52315d3cc01ef63806e1cb519c5837c4c1b37f79ae63e16b6b722 nss-softokn-devel-3.79.0-18.el9_1.x86_64.rpm 0712fe035d3c8cc1e275b65976f6fc1f17f53c188d083755113a9a5cd2fc96f9 nss-softokn-freebl-3.79.0-18.el9_1.i686.rpm 3ebc9e1800b9fdfd3d41b14ce6dfac4ae52c084be508657a9dffba3de11214b3 nss-softokn-freebl-3.79.0-18.el9_1.x86_64.rpm 292ff920e8f0f826f0b688727c684193035d0c3d99d3c4ecb066c08b60bf1cd1 nss-softokn-freebl-devel-3.79.0-18.el9_1.i686.rpm 2cf9fb4f8fa799acebd87add27ece6aadd32d729ae30c7b8d587bdd15e1950db nss-softokn-freebl-devel-3.79.0-18.el9_1.x86_64.rpm 561089fe686a08d14d342dc549e669c3e09c1e7ac765cf49e32022dc4a1a3374 nss-sysinit-3.79.0-18.el9_1.x86_64.rpm 4ba942b7afb60392543a7980509d46830015dc4cc51d17160dc567c149160801 nss-tools-3.79.0-18.el9_1.x86_64.rpm d6dd87880a0d8f89e20b36c8897ebed0b031e953533793741569816375e62969 nss-util-3.79.0-18.el9_1.i686.rpm ae42405c92567f6168628ba0bbed18e82267ac1ef12cf5de4e51f18efbaf708b nss-util-3.79.0-18.el9_1.x86_64.rpm a593cb870784733e2e614122b36eb1c72fbfa0e8cd7a94cf692ea522d18bdb14 nss-util-devel-3.79.0-18.el9_1.i686.rpm 32c315dc1a24c468af32469b96ab1b78ed9cfac84b61f36d14ae750bb8772297 nss-util-devel-3.79.0-18.el9_1.x86_64.rpm 0f12d730f6e75ad3406108f69a9256d6c2c32e6fbd45eeed56c1ac1def69be7d RLSA-2023:2074 Important: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-6.el9_1.1.x86_64.rpm 6ce822afa9ffd07b47b9e06d18b68f3a79f36ae80990ea900bfb1152acfa8697 emacs-common-27.2-6.el9_1.1.x86_64.rpm aeefc75141b367025bce09b94626d203b5dfde34fbafb0d0473a541379caf2f4 emacs-filesystem-27.2-6.el9_1.1.noarch.rpm 948154bc7cb631093e374e98bfa15d767aa94b301e41697a097e8c4ec77f78ee emacs-lucid-27.2-6.el9_1.1.x86_64.rpm a1b498eacae205bf012e2a71ab74d4738df389ce32c5fec7a63efd9461bffc43 emacs-nox-27.2-6.el9_1.1.x86_64.rpm f19ce6bb52309c07d74ee87364be221387aa685811122717383578c6b397ab67 RLSA-2023:2078 Important: libwebp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-6.el9_1.0.1.i686.rpm 30a3caf13a4f74a70361f3e91cde738b04228c83c93424995b8b8f86ed32716e libwebp-1.2.0-6.el9_1.0.1.x86_64.rpm 6ec56e54fd04fa7ead4e4138b12ad8e7e61aeb7cf00dbb16a2eccb456e8980cd libwebp-devel-1.2.0-6.el9_1.0.1.i686.rpm 5a51591cdaf4c29ca60d82312e047296c50833650e8a9f11973273d1cb37a9b0 libwebp-devel-1.2.0-6.el9_1.0.1.x86_64.rpm 985fa5c4eb7835e0e0fbf772ec3740ebb9f7408cb910e81b4c4c4552895673aa RLBA-2023:2480 libsepol bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.5-1.el9.i686.rpm f9ab384c1398ed2b4b19323860e5c1cc01d72ee55acf5476feea500a2633ccb8 libsepol-devel-3.5-1.el9.x86_64.rpm 95adc4102e6f723ee4ffc98dd800cf96ce36d5aa65a9dcb05295368ec41a18eb libsepol-utils-3.5-1.el9.x86_64.rpm 87dd56404ad9bd0da000769df96d863d14560e55d2079f9be6dcc1676cdf89d3 RLBA-2023:2495 dnf-plugins-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dnf-plugin-modulesync-4.3.0-5.el9_2.noarch.rpm 3fd73dbfc5e2c7105bd0641d4ae0004521cc9006e9491e9f74714537154072f7 RLBA-2023:2514 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.8.2-2.el9.x86_64.rpm 316b60f3bdd036694de3a0f2ea3b2afe956b3043d2d4c2e7f4f06237611038d7 RLBA-2023:2522 gnutls bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.7.6-20.el9_2.i686.rpm c6acf7b5d13150d3a4b4a8efc9cc147866a444986d794011225bc80eee364207 gnutls-c++-3.7.6-20.el9_2.x86_64.rpm d841d90b0f2dd159e5b713bd6ac5ba231b51f8197de99592b9240ad0f0e26d8d gnutls-dane-3.7.6-20.el9_2.i686.rpm 4633e19ec7bcab63d49f3dafcaed7c92c9634309ebe7db59043d09f4dbd1c280 gnutls-dane-3.7.6-20.el9_2.x86_64.rpm f9f5a889f61529b908f5b6435dd8a475db2074fbe8e62ae5fd0f22bec4567b48 gnutls-devel-3.7.6-20.el9_2.i686.rpm 903238a033bb7394cf7bb41c01b85922675c7f61836db44ca64a0aedbd958a16 gnutls-devel-3.7.6-20.el9_2.x86_64.rpm 2c571de05c31ca87814628c613e75029fc13fa3d3d53b3d222cc86c05f3b9ee7 gnutls-utils-3.7.6-20.el9_2.x86_64.rpm 62839cf565b209b58df56130b8116008cfcb3d728b12121d71faaf8d5fc1f298 RLBA-2023:2558 libselinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.5-1.el9.i686.rpm c3e4abc755fe6820500ccc1902fa934683eaae7f85216db7f9b37e27bec17b49 libselinux-devel-3.5-1.el9.x86_64.rpm 845392300eaea3fd7380494764d97a12be77fa17842ebeaad8eff83c2f98bb8d libselinux-ruby-3.5-1.el9.x86_64.rpm 642c6ab8d17417fd7217b2acb6b921742861d366fcc0d49069baffa1cbae835a python3-libselinux-3.5-1.el9.x86_64.rpm b6771999c7f2e696e99ed26a0afffaf90053516789200a987eff014d47cee91d RLBA-2023:2564 sudo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-9.el9.x86_64.rpm d6f58b9924913d1d2a849c1e459cd4514162d3a981cece1861e721eaca48d80f RLBA-2023:2580 setools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setools-4.4.1-1.el9.x86_64.rpm e988ecf8de30e6b6991a597c61e8ac7871f4c5975c864ff0a09d75cd98001f65 setools-console-analyses-4.4.1-1.el9.x86_64.rpm ed18df75cc4f173cf78effc9d5ff6dcaf89ffb4397d10a223cc9ce681d8abe21 setools-gui-4.4.1-1.el9.x86_64.rpm 3665323f74947f92df1eac33ad5dcaa62354711a5fb204e3f925415579a7c233 RLBA-2023:2586 ipset bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-8.el9.noarch.rpm 0deae91c87bd6dbbeb32e3c99d50671e940034daf74c4d29f369b5344d73461b RLBA-2022:2502 new packages: bind Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-11.el9.x86_64.rpm a8d1296d08517d516e670123500ed9c4c8a2107b223c863308b56e6ed379e191 bind-chroot-9.16.23-11.el9.x86_64.rpm e6ef7ef18d69f5974d9cf33bc5b819dc11c528d6c7e3ef4d9c8a599648dce99c bind-dnssec-doc-9.16.23-11.el9.noarch.rpm a5f226a1a4a2c9c3f51e41f04d0d66781e389aca7694b69ae5bdc2286e6b3f0f bind-dnssec-utils-9.16.23-11.el9.x86_64.rpm a9ba37f7fede188be363ecda1321107f933e713bfde057f2f8a8475db7f09d3c bind-libs-9.16.23-11.el9.x86_64.rpm 591e9117f9c44a5069315ab1bdaeabf97b74944894395782727ec0d5141d2bce bind-license-9.16.23-11.el9.noarch.rpm fc991dde107e33d0627e78b03fe21fc928e4acbf2321e7a895f273f8f9bc18f3 bind-utils-9.16.23-11.el9.x86_64.rpm 287585889b2403ae676416563165ba0f2304ca267f3f80db8c2abc3768f92345 python3-bind-9.16.23-11.el9.noarch.rpm e688f8107e5e1dda75532d0499479704716333b226dd895b49f3dfbe6bb34509 RLBA-2023:2223 anaconda bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 54c9d7f9fe1b481e76221bd21386f2829c50aa4a6c60af4be9a14a8451435b1e anaconda-core-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm dbeacba732218426047f6c6cc076b307afa0331c4a2b5cb72eb34890b060f4a2 anaconda-dracut-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 8144d8e56e0b7bc781d68fe28c905985bc4514cdd0422bcbc6c4a93ca02bc14d anaconda-gui-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm d634642ab61b3e4ab1f7ee7235e55bcb4e327819172978925d37c9fbd73f2174 anaconda-install-env-deps-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 8e4d14f4601e5e1bb2708eb72b8a8b0028cb7150915c9d4a33c5807e95783216 anaconda-install-img-deps-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 8797d8750a8696ffb6d7ad2231e4554bedbbfe6673286564e0ce8ecbf2b04954 anaconda-tui-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm e36166e60626a5a3fd573b9b1c7e42ec08ace4b50e70dd7cf5c0c923e807c632 anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.i686.rpm 4ec773b37f06b8a5087f7bc56b4b207c53b0a0f5cc8776b48fcc1f964f85098e anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 91d72a13fbd49e27c007b923b75c8e1adc90f47e662fc43dac64f2ebc1857954 RLBA-2023:2388 python3.11-wheel bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.11-wheel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-wheel-0.38.4-3.el9.noarch.rpm bf1517b971f93cf8961d83da4cd7a90331ba0d532b5e9973cbea7712a19903be RLBA-2023:2243 python-simpleline bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-simpleline. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-simpleline-1.8.3-1.el9.noarch.rpm 22635604f9ffca3523c145ccdf34874415518d41da078aabd40510b37f00e51f RLBA-2023:2279 plymouth bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plymouth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plymouth-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 60dbaddf05cbfa0ea7454339f4e11c6ede27efa758db231d0cf7917416bf8d99 plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.i686.rpm cf76cdc500d5622c265524c60363c798315cc24547325e4ec21ec81184fce148 plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm b31c29de013473c4dc49683554d2de8fe7e9e6d676f8a469490edfc00954fcbd plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.i686.rpm a1794ab4c94d933a24a2d7e6954d5ea36592b5914a33f2d4765b32bd4983fcf9 plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 1d1fcf50e92d223ea3cbb8a7ef58d681213a6dd607a21b5d5c52d0fc2c71f0ad plymouth-plugin-fade-throbber-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 9a1694bf6496a7b7f140b1d7fdf903bb5223eb9f4817b763e40b3a06b416fa5d plymouth-plugin-label-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 0e89c1a4bebd7705113beff5625823d29260567c973d651e43d0b783ab3360f3 plymouth-plugin-script-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 1e57f496e07feee5f77bd781029fcec5a2681682b458474be17a3f759a9890c0 plymouth-plugin-space-flares-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 62b6d1b69d4338134acb1ebcd27f265528fa76298c941073de454f19361295ed plymouth-plugin-two-step-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 87d20a83b210dd1eebfefa22871eaec804397edd393184fb928b8460678df1f5 plymouth-scripts-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 62c529b96b0a2f1a0581a9c71cab7f1b18a6cac41634e82abecfae432dc4c89e plymouth-system-theme-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 8664eda6ab102023f8b02c4bf9162e47ec66580b7dee997943038598f5a9619e plymouth-theme-charge-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm ce653d1f6ac5c514034a05dafc89d5683b724a15ebf63ff60b7c2540134c620c plymouth-theme-fade-in-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm f9364fae1c106304fb0004744aa0a0e4777240764a66528d1236d8a00882c119 plymouth-theme-script-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 687b1df162135ccda37f9176984eb70dba956c86bdb8d4311d058933ba18230d plymouth-theme-solar-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 94cf695347a057e071205c5f6f7d849698797b44b8b8dd58721915ec7c126ad8 plymouth-theme-spinfinity-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 0b00b3806c17881ad627144a066b12fbc22fbd92c1d3d8f0198cddc6ef09ab6a plymouth-theme-spinner-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 4391e018054cd5a4811ae8fc188a810cdd4c64f531c8d4a141b80a00c8d67768 RLBA-2023:2301 libosinfo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libosinfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libosinfo-1.10.0-1.el9.i686.rpm 66348f2e468fec8187c69f64963120ac79813d180d9e97b4688f72027be931c1 libosinfo-1.10.0-1.el9.x86_64.rpm 97e51c58fc9cb62d715781d2067567563e398733ec62ab5b2d7ef60e386d67d0 RLBA-2023:2352 nmap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nmap-7.91-12.el9.x86_64.rpm cd1cdb3c688544b13929ab38db8553ad587d8831ac1a28550d937750bfed5049 nmap-ncat-7.91-12.el9.x86_64.rpm 348a404c3c9a8cdb742c64f928ed3b7136cc306dfc93c5e2df689b31eea082d2 RLBA-2023:2372 perl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-5.32.1-480.el9.x86_64.rpm 94a5d236293420446362349755f170b5b53febb4950d2efbc99fccc9335f793e perl-Attribute-Handlers-1.01-480.el9.noarch.rpm d1f4a9c2d5f81921a9ffe0b13b7034e90af712362513b86888291ea806b61f76 perl-AutoLoader-5.74-480.el9.noarch.rpm 7347b9759e1c2a384111e48c02a6353bbcf9667e8e0133e2148594350b32a340 perl-AutoSplit-5.74-480.el9.noarch.rpm 7f6b6224eb1c384402fdc319838891a9d9245ba9431ec79b21f7b13215653b8a perl-autouse-1.11-480.el9.noarch.rpm efc1be61589a9c0d48c8934bbfb869d5e5dd2039bde7cec6f5a350e5ec9d33d9 perl-B-1.80-480.el9.x86_64.rpm 99faed8b5d89f73650d47848919af1c6a6b799942ddfbd5472f0fe65bc1285b9 perl-base-2.27-480.el9.noarch.rpm 3b53f8a351745d9bf4de41c0f0d0ef43bd194e2bc7c6972e7d6d8172c2340bf0 perl-Benchmark-1.23-480.el9.noarch.rpm de810ce6c52ead3159ebf243a798475596c7a023802997765179df57255113b4 perl-blib-1.07-480.el9.noarch.rpm ddb7e5ed5541955149aee9cf3cb057c5053b375fe7b6e98f32f8c7b8a63b3908 perl-Class-Struct-0.66-480.el9.noarch.rpm c8a3bff8d7e21f49abea233942748f9ae7ec658d3cdb49820af3a76f85733883 perl-Config-Extensions-0.03-480.el9.noarch.rpm 2d5e95a24dd1322458c4c5f07fd431ea82ff8285fc0bbdd78f5b71eeb76fd100 perl-DBM_Filter-0.06-480.el9.noarch.rpm c4af9a314ce43e1bbb106cab69fe02fdc16fdb9f2f6e9bdc802406184f6dc0d8 perl-debugger-1.56-480.el9.noarch.rpm 49f4de633bb3467b162b02295bc516abaaeabe82cb424dde1f3a1ae1fa19b7a4 perl-deprecate-0.04-480.el9.noarch.rpm 8ba53da836073c2cc8e3bacd5b5a19b37ab59517c3cd8631d848b82e125f3578 perl-devel-5.32.1-480.el9.i686.rpm 041d9cecbad5e31cadd15eacca9dc5781c6b3bb62ff83d19b5d8cd9fc3148329 perl-devel-5.32.1-480.el9.x86_64.rpm 7324e2180003d31f54b440b08fdc696254cd95c931bf74789a46b4b6a50b37de perl-Devel-Peek-1.28-480.el9.x86_64.rpm 0ccb88be268732e148307f52693b5f873e9828d1b1308def53fdcba5e42ab49f perl-Devel-SelfStubber-1.06-480.el9.noarch.rpm 66b416b0ce956f65660b841127d003ddfeaf996ec6cee1cf93d42de1b74d8144 perl-diagnostics-1.37-480.el9.noarch.rpm c57f1156d07d3621ee67535c0dde41e163a6efa8957f62d078463f4065ce69a8 perl-DirHandle-1.05-480.el9.noarch.rpm cfb9547d1e62831d3d3c88b5433ba100482c55f3989f106c634e6ac87ba8ae12 perl-doc-5.32.1-480.el9.noarch.rpm b6c4a329edf55fcb6bd099d649ea6ddc62087cdcc36894faa17a1b0bdac1e30b perl-Dumpvalue-2.27-480.el9.noarch.rpm 1dc13897ca380a1a320c71b6aea94420cf1f9d5e36a8ecfc31a99fe6a5964147 perl-DynaLoader-1.47-480.el9.x86_64.rpm 1d6ee829a9e2e595aff4a219bbf59f8749bff522fbc36fcafbcf78f0a1ec6a02 perl-encoding-warnings-0.13-480.el9.noarch.rpm e36ab1bc106b2e074ca40f63eee52ff2858e2afdce8d043f5f1a0d669759b3f0 perl-English-1.11-480.el9.noarch.rpm 2362f0eb50c750cf5797565ce9d4be5cbbfa2d26908e5d58d3a17b66295d72ca perl-Errno-1.30-480.el9.x86_64.rpm 700022aa75d2d106fdee3df39f20557293ded1a952ae95a13bbddab6791319c9 perl-ExtUtils-Constant-0.25-480.el9.noarch.rpm 2e009264bf2f2514b133d43ff7f61773d767c485b22d05edd165300a82afb8f8 perl-ExtUtils-Embed-1.35-480.el9.noarch.rpm 5cde3cdbd81515a40fb3f1f0da4466d179b6ffef498d6cc42eb5244fef0b0ab1 perl-ExtUtils-Miniperl-1.09-480.el9.noarch.rpm 83039ae58b9530150eee8b631aedafb8d29513b5e991d57ccd9467b5060bd15d perl-Fcntl-1.13-480.el9.x86_64.rpm bae8250bbcd49755f1eaf1207175e99dfee0da5468f678f12ec6171b256147a0 perl-fields-2.27-480.el9.noarch.rpm 76cac5d12ac373bea045887fa3ffeec90753595b0a3e33a82096de9a91b80c27 perl-File-Basename-2.85-480.el9.noarch.rpm c12cd8a1f9cdb36167ec18052570c262d638f7beae75a9baa1a11000a4363d6d perl-FileCache-1.10-480.el9.noarch.rpm 714db3471f7ef030379f128ed30ee69bddb551aab2ef42dad651953e0ed9a404 perl-File-Compare-1.100.600-480.el9.noarch.rpm 9a357dd4eb0aef091a7060c94e917660569f60316e33c134615aa33b100a882e perl-File-Copy-2.34-480.el9.noarch.rpm 6bc5e35791b393071048c82f95096e4ea9c73c981f5613bb1cf48a13a67dcf04 perl-File-DosGlob-1.12-480.el9.x86_64.rpm 68d932cb5b96380b0ac5b4e4ef127a113b1a8fc298fe92518261b8f9f366d0d5 perl-File-Find-1.37-480.el9.noarch.rpm ac1befaf722fa0f28eeac1b7f0a65ec3a25df05e3c649a38127104c6c865c6cf perl-FileHandle-2.03-480.el9.noarch.rpm bfbe39be10d6956483eca796999057bdc5b1350590984f26268c9d4587521400 perl-File-stat-1.09-480.el9.noarch.rpm 19ab7ad87b1e2b552bdafdca83bb3dc7b94aa03da510349c3de9856393546050 perl-filetest-1.03-480.el9.noarch.rpm 45bc8a4e2124248b83295143d4c1deada0ef5fecd9cf6445631ceb6ddb3014e9 perl-FindBin-1.51-480.el9.noarch.rpm 5cd48fc587dc0881f727b4d2fe1d81baf069332896330a4937688340c9980719 perl-GDBM_File-1.18-480.el9.x86_64.rpm da0b9036d895c3286ed4859ab4b41c922dd7b4432864cf652fa163aa86291ae2 perl-Getopt-Std-1.12-480.el9.noarch.rpm 2a38cf27519b015671e635b22f87b9dd57f7b1144575de404e94edf1faf90356 perl-Hash-Util-0.23-480.el9.x86_64.rpm 55d6e171c1eafb2f10c1f84d90677227376a8db733b1641adc550c38bf70dcde perl-Hash-Util-FieldHash-1.20-480.el9.x86_64.rpm 65a0370c439ff3c896279b90a4a3df4ca56db29280490c5b40c905ce4b743144 perl-I18N-Collate-1.02-480.el9.noarch.rpm d9925a9c1638b4a2f88db3a848a93151770e3f3d69d6df6df405cceebec0be86 perl-I18N-Langinfo-0.19-480.el9.x86_64.rpm 52c0093b2fec90a165921f58fa1ff729bcc9471833d801bfd90465ba0852580a perl-I18N-LangTags-0.44-480.el9.noarch.rpm 994759ee44724e33d06a843246ba901d3e73246683a2fe174403315e838ebf85 perl-if-0.60.800-480.el9.noarch.rpm 6ba860cd8b6b5868409c588a3590d7ccc74320cada5697965c580fbba911474c perl-interpreter-5.32.1-480.el9.x86_64.rpm 48be4441392b922d8e4b210709c89125580fd29c0939b87121343b6d92570e35 perl-IO-1.43-480.el9.x86_64.rpm d152d311217849d6b2935e8ced8bb088233fb2ee66d536124ef76ac245eb4577 perl-IPC-Open3-1.21-480.el9.noarch.rpm 3a17a9eeeda5c65b615e2f9b589437e3afb150ce2efd253be48018d28075095c perl-less-0.03-480.el9.noarch.rpm 269725c12a49e4059547ac130326ae181f30f0dc5b1881a5f2b9c3e8f50ebd55 perl-lib-0.65-480.el9.x86_64.rpm 698231b31fac26e9dc45a5f562be19e1ba65af3da44ae896638e0d9e526f8817 perl-libnetcfg-5.32.1-480.el9.noarch.rpm 04d62cffeeadd167a0954f59b007545cffee2d289e002eabb5d718ac10b57007 perl-libs-5.32.1-480.el9.i686.rpm 22fe6d75ad5bef03f8c21f2454302ab59f393fd2d24d33752e8346226a44ebb4 perl-libs-5.32.1-480.el9.x86_64.rpm f4005cd076b4775f6c53001ee16cf9bc845a9591d1eed8b2446e5af96a22a7a3 perl-locale-1.09-480.el9.noarch.rpm 03e50df7e763237c3b748bc2fcd5a936ceb8006eaecdc1165dce2e6caf543a53 perl-Locale-Maketext-Simple-0.21-480.el9.noarch.rpm 30fe47a550a53f8daaa34a84048ee69258253d14945e1f602afb5fbe679d6f95 perl-macros-5.32.1-480.el9.noarch.rpm 0dab660a3812292c63b707790a66095fbcea7b9d3d5fbd0ce283e6b99899b311 perl-Math-Complex-1.59-480.el9.noarch.rpm a6b7733f8e9d56a23440cb475b9a38d2794ce1c0713ffba51ded261d1d28fbec perl-Memoize-1.03-480.el9.noarch.rpm 5bc240f7b37d6b3f64c6001d5512d2f0ac15b341d68cad001e6c5622a0132fb5 perl-meta-notation-5.32.1-480.el9.noarch.rpm 70778f015f2c9ca8401c3cf9de1308bda3775bc5ee6635450d186f90472f719d perl-Module-Loaded-0.08-480.el9.noarch.rpm 2bb8172777e705adae838cf965ed6d84d2896c3baab11c6273d95f49eebc6235 perl-mro-1.23-480.el9.x86_64.rpm 0eca17afcc5d58777af3e5f47e5470782589281c1de499ce54ef7a0fb4fe15df perl-NDBM_File-1.15-480.el9.x86_64.rpm 8c647acb7333df3c4d9e0ba02f2db231dcc0d38a875372bc859adbd283b366d0 perl-Net-1.02-480.el9.noarch.rpm b3ef3a983682cecfc5fb5e89b1097cee5db138e4698c7996e16eff11c33c5389 perl-NEXT-0.67-480.el9.noarch.rpm 577634a9d6f9a93b855a6b2b686b92fe984b88d24de89c9997d537b0fc7395d9 perl-ODBM_File-1.16-480.el9.x86_64.rpm bfe7784b17ac72818aa768b4767656c7b7a5d9a7a5465d59874caef27157aedb perl-Opcode-1.48-480.el9.x86_64.rpm 47cb0310d5d7e950e6d3b44a3107402c5c2c81b7a210eb1b3e270a704526e93f perl-open-1.12-480.el9.noarch.rpm 36474f1abf3287f04125fcb1a0eb3860142065743d5809dd18da4cc2e388469f perl-overload-1.31-480.el9.noarch.rpm 86e81019a9d34e5b442c644d646867a3486f03588dcb0909b7741b2d7be45504 perl-overloading-0.02-480.el9.noarch.rpm 1533cfd300c111eab1eb788403ac1990dda59f72b29843794fb39f7d63c1e5b8 perl-ph-5.32.1-480.el9.x86_64.rpm 51c726f911259c0273e2736755b8c54db1b0577b605e744f1c8bb5d2954cf5cf perl-Pod-Functions-1.13-480.el9.noarch.rpm 650cb07e6ab665545b996c570034b99dc6493c594e732c0a77ba7f56294aab84 perl-Pod-Html-1.25-480.el9.noarch.rpm 34feafe912987f3687cfeddab3a36cbaa63d41872a809dbf3a2014b7638a14b0 perl-POSIX-1.94-480.el9.x86_64.rpm f6636b41662d8fb5658a12a1e5e4bc4819f6b4dabd20cc19124532e0f48ec813 perl-Safe-2.41-480.el9.noarch.rpm 37ab81439bbcd02ba3668ee5b05addc74163112b97af268363d3856e5c3af2d1 perl-Search-Dict-1.07-480.el9.noarch.rpm fe604f03dc4b678f1ebc3041e6dea92bd2cab31fe73be961b4c52526c304ecb3 perl-SelectSaver-1.02-480.el9.noarch.rpm 76330165d2749c19db9c50204f24c0e676b58ec59eed8171b2a99509d2ec3733 perl-SelfLoader-1.26-480.el9.noarch.rpm 897df9a3b29558541e34aef84cf33b9e8a1839dd9474dc29d53343ad4b580834 perl-sigtrap-1.09-480.el9.noarch.rpm 7ca83ca840589fbb713ef26f6440ef1a2fff1d95dae4c06d62b0c9e8bf544f55 perl-sort-2.04-480.el9.noarch.rpm 2fc28ba6de294a466d75af54df9390092cf8112a8c27734dd64d94b45b819c1f perl-subs-1.03-480.el9.noarch.rpm aa0b2cd1144aee6b2909a5bbaad3cdc52581f53ace67228168f9652c3257bc05 perl-Symbol-1.08-480.el9.noarch.rpm 1474d70a0119a9dfc0ecdba989ae0449a1f2175b236f24cdaff55eca0602b955 perl-Sys-Hostname-1.23-480.el9.x86_64.rpm 8f051a17381e4304803d21d743e19611a1f4476b190b3ad941eb2ba33331bd3c perl-Term-Complete-1.403-480.el9.noarch.rpm 90e82576af4e7c7cf9eabb5ecfca6323131404b918822c7d774fd0a6778de364 perl-Term-ReadLine-1.17-480.el9.noarch.rpm 9fcc7beffb95adc50d1e4b9ec52f10d34828450a7858b11a81791a1008739303 perl-Test-1.31-480.el9.noarch.rpm 92bf645d7c09a0083bcf162db4fdc97470958d41d0d4db12fae2b89325553ac0 perl-Text-Abbrev-1.02-480.el9.noarch.rpm 5a18b8dbf9e189bbc8aadaf6444ded909e0b97f771eefee8e283a08c0d01d374 perl-Thread-3.05-480.el9.noarch.rpm 57ee527cfa6d0317f5ab553e50762b31df032891e6c5971880b5db09fdc30020 perl-Thread-Semaphore-2.13-480.el9.noarch.rpm 774433a8ba97eca77787d1f7292c669dafebde90646a5bdbcf7f7231f704d4e9 perl-Tie-4.6-480.el9.noarch.rpm 61361c44ea1a84fe370915342f777ea94343eac073847c5e00988e3040387f02 perl-Tie-File-1.06-480.el9.noarch.rpm bada1de8ef1a1d1a104f6a7bb401fca6fb4fd2c71d8d37c019227d5df68f3884 perl-Tie-Memoize-1.1-480.el9.noarch.rpm 8c6b6caae23015662428c588244d95914176ade8d53a67512ccfd0a87b5fda36 perl-Time-1.03-480.el9.noarch.rpm a7e63bea9f76ce41cb4d67eca3ebe54530013aa8f98a65a255fbb4cc3d3b9fe6 perl-Time-Piece-1.3401-480.el9.x86_64.rpm 1699a12a17765347ac90fbebc002a93993368fe44cbaa6036074c4d4b563d0aa perl-Unicode-UCD-0.75-480.el9.noarch.rpm 776cc367d35603c62d44d8b3d70d34358c3315a0fafffa9a5ae20b350c75c643 perl-User-pwent-1.03-480.el9.noarch.rpm e3e51d13355900c4bfe483fd125fe769ecadb0ac717edddfaa09b90e86e3fb13 perl-utils-5.32.1-480.el9.noarch.rpm d261c14a4610551a868464d3416bbf3cf6b2616495382cda1c8693a79d80b67b perl-vars-1.05-480.el9.noarch.rpm 6a89349944d7969aa8ca1ac6f87384cc74ab605ccaf4379455804ff5e901cf69 perl-vmsish-1.04-480.el9.noarch.rpm 885e0a4817490c030b470515c1aef8490175a013eec37c11ef5e2ac110bcdadc RLBA-2023:2160 capstone bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for capstone. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms capstone-4.0.2-10.el9.i686.rpm 8529abc8e2f8715b4c9219dfceb4a6454e7fa11a49f1cfa216a2a043160cde68 capstone-4.0.2-10.el9.x86_64.rpm 64bf1e7b9165e88d94499fd96d101e7a97007f5a4131d4c4860fcbc2464a2f9c RLBA-2023:2186 augeas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-3.el9.x86_64.rpm 878347c8f91aee2180839b458d957aff6378cfe6195c36fe286faaf27594d1a8 augeas-libs-1.13.0-3.el9.i686.rpm 64ebcddda882555442ef01802adc0678ec75cc1aee11d672b4ecfd81851681de augeas-libs-1.13.0-3.el9.x86_64.rpm 65de9c1aadae07e7f8b62436062b34a711583711f5f37b992bdc7d51eb79ae37 RLBA-2023:2390 varnish bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-3.el9.i686.rpm 751573ca6f0f38d546a3a5af1737a75fa0596ef36193c8db83ccc6db2074e2c1 varnish-6.6.2-3.el9.x86_64.rpm 99ea5fe35727445b627888597eaa461c8dbd67f56aafee27659a661d582987ab varnish-docs-6.6.2-3.el9.x86_64.rpm b69dff9c003b879416d8165a4d0985c7e28929991f67cff3f032508c440ae3d3 RLBA-2023:2402 maven bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-interpolation, httpcomponents-core, maven-wagon, maven, google-guice, jsoup, jansi, apache-commons-io, apache-commons-lang3, maven-shared-utils, plexus-utils, plexus-classworlds, jakarta-annotations, httpcomponents-client, apache-commons-codec, plexus-cipher, atinject, javapackages-tools, maven-resolver, plexus-containers, jsr-305, cdi-api, apache-commons-cli, slf4j, guava, plexus-sec-dispatcher, sisu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-cli-1.4-17.el9.noarch.rpm 0256cd4929509de69b612a2a198b286106f234ff9bccc20fc9536e896019b297 apache-commons-codec-1.15-7.el9.noarch.rpm c8d353deaaab985d4e54a5ea6fcf91eead1dfecf27fa3c315fc449e846afe7e4 apache-commons-io-2.8.0-8.el9.noarch.rpm 0ff32544fd571e05db2fa7d66490f8f72545a22f6c6ecac04bcca3c01e348f46 apache-commons-lang3-3.12.0-6.el9.noarch.rpm c85e547c1de396d0bcccb97ad289a21ab3f82ae794c0df65f234f681cb06cb8b atinject-1.0.3-6.el9.noarch.rpm 28fdd8eef912fb2cdb8f6be65271904d3242e89092280352a85d9290aadd0035 cdi-api-2.0.2-6.el9.noarch.rpm 18165f017a3a4eff6831b6eb9d031bde1f35e6dc4a4b744c8024999e1bebece9 google-guice-4.2.3-9.el9.noarch.rpm 148074c471a1bc938eeada2dae6f84642971fcc9fe1e55b8b25f7b180f2cb0a3 guava-30.1-6.el9.noarch.rpm faf48d962bcd88e632899ddfcd99f0430136c2fa0f6fe9bd3f9f88182683a830 httpcomponents-client-4.5.13-3.el9.noarch.rpm 71fd80f9de11e828a1471a40140c90133f81e062ce74ec2fc12803fab297707e httpcomponents-core-4.4.13-7.el9.noarch.rpm 5c7fa4374d88b03ac66ccc9b8e8e28c824637390e47ee1bb43f66d0c7a2fc7c6 jakarta-annotations-1.3.5-13.el9.noarch.rpm 441505298839dec09e5866d37fd02c70935990102e9970ad583db159492eae7f javapackages-filesystem-6.0.0-4.el9.noarch.rpm a1a1fae59af48ce72d029f342bf2021d2c84f5c3b13f95e5118952134cbd32c7 javapackages-tools-6.0.0-4.el9.noarch.rpm 6bce582734079cb02963b39d547736b6546c7125906459abd591c01a76971b32 jcl-over-slf4j-1.7.30-13.el9.noarch.rpm 8ab3b83a0fede6d0a6c7bfd8139f62c33f668e976eec42affc83e81d13dac966 jsoup-1.13.1-10.el9.noarch.rpm c8bd1377015450ae65bd8b875ef87e0b29a026347cdcbc7621d54415e89c0f81 jsr-305-3.0.2-6.el9.noarch.rpm 1546f4a64091b52e4c521a862813ad28700d141e50a30302c34147c3889e9905 maven-3.6.3-15.el9.noarch.rpm ab7dd6668c353233ff479c2e7276f14a59913208ef012d76f4bd045748a97e24 maven-lib-3.6.3-15.el9.noarch.rpm 61f07bd619548b4378e96b3095014e592979b6f1b7a0fd8598ec102d43429d31 maven-openjdk11-3.6.3-15.el9.noarch.rpm 44f618c6eb344a66cbd768127f9c0fff14363379569737b8ffcc79821248cd9c maven-openjdk17-3.6.3-15.el9.noarch.rpm b3ac1f6d7c43cc2264ff82da6ac227322bcda819cdfc4d0547fb7a4d841b35e8 maven-openjdk8-3.6.3-15.el9.noarch.rpm 39b19c699df73b947f89903e032c34f7472c9ca59a4d81d7e2c8ee170d1fa7da maven-resolver-1.6.1-10.el9.noarch.rpm dfd77cf0c0ff35b49c5ea6a8a408ff59d83f8e4e135d9194f5db890c2300af44 maven-shared-utils-3.3.4-3.el9.noarch.rpm 24a55717a2fc384bcf1e692c88a3c1efd2dcc0eb56fd360637a17641f3095273 maven-wagon-3.4.2-7.el9.noarch.rpm 71f7ecc1e7e182d65d7f3e2dc0842c1f5f554c8aff8e9129ecd5bdac63b55f9a plexus-cipher-1.7-27.el9.noarch.rpm 4d006a3e01f59db51154475df079fb6e0709c78ace9f80e0f93a0fa9399d8380 plexus-classworlds-2.6.0-11.el9.noarch.rpm d96083367fea8b1d9815b5b17cdb08ca8d726f4f0c5477e1e2ad04ce902abf16 plexus-containers-component-annotations-2.1.0-10.el9.noarch.rpm fd965bbec2f095b6cb953767a123a37e6de79064d20c652b68604649d47b3622 plexus-interpolation-1.26-11.el9.noarch.rpm 94d70b0d15c62b94f8fb5e16f4ee97a39576312800161d90cc7f47eadc0a3985 plexus-sec-dispatcher-1.4-37.el9.noarch.rpm 77895175d3d631b568859f15a9b048f0de7942af0204622ed14c1b26f20b2014 plexus-utils-3.3.0-10.el9.noarch.rpm 9662f2350e069e100f6930d8941e2cee21155ed7c6ae354135e26dc8cfdb3674 sisu-0.3.4-10.el9.noarch.rpm 5b6197bbcaa82c35da6445a83bc50896a9bc0a84619362a6c30ef40487ed9291 slf4j-1.7.30-13.el9.noarch.rpm d6612b852596eb13dffec2111f299481742f302a0df2d5b177f4c1a791b810db slf4j-jdk14-1.7.30-13.el9.noarch.rpm 3634c3d5b2b9b91f4bb1c781b50eafc9e9f7a3b4f5b0cdb177b9bb5d0658e67b jansi-2.3.3-6.el9.x86_64.rpm a78de66c7209680061436c34b5a7135b02f9eb343d583f73625b25ff2444cf30 RLBA-2023:2430 python3.11-psycopg2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.11-psycopg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-psycopg2-2.9.3-1.el9.x86_64.rpm ee69663b503b756ba7e73c26750fd3a5ae365bcb42fe5f171344c0b401d89ad9 RLBA-2023:2635 .NET 7.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.2.0.z] (BZ#2183591) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.5-2.el9_2.x86_64.rpm ff1c2ed8baddce700a04e5aea4608c698ed231bcf73e690331cb7805bf6419a8 aspnetcore-targeting-pack-7.0-7.0.5-2.el9_2.x86_64.rpm 1660272c4be02801af8ccd5e482dc89fd00942b8d55354ece7e49bf105a2b6e6 dotnet-apphost-pack-7.0-7.0.5-2.el9_2.x86_64.rpm 64177ee30383313ea4ca14f1b651303e6e2b5ed444d8dcefb4073eab9d958873 dotnet-host-7.0.5-2.el9_2.x86_64.rpm 09f13802f53f392da1cbea34456dea2db4a5b86130387b2ca86a4371ba5a86ff dotnet-hostfxr-7.0-7.0.5-2.el9_2.x86_64.rpm ba147b5b08a201f1488b3cda4a994182ecff09d10fa53085dcb486a14974617d dotnet-runtime-7.0-7.0.5-2.el9_2.x86_64.rpm cc046fb06747c4941f8f6b97b8708c676d7b05c6e5cb5352c3ceac2a75fbdb26 dotnet-sdk-7.0-7.0.105-2.el9_2.x86_64.rpm ad32e9f6eb2ba9b2e80b484d649a91c4c1e6d60e12abc61584569aa4b6051502 dotnet-targeting-pack-7.0-7.0.5-2.el9_2.x86_64.rpm 6085d01ea41a9f5fc06b403562109d68c264a6606fd8181704236b11aaeff009 dotnet-templates-7.0-7.0.105-2.el9_2.x86_64.rpm 380fb51156678e89fead07a639bbdf7b62eb8e61c57c223ab26bb92d17898c51 netstandard-targeting-pack-2.1-7.0.105-2.el9_2.x86_64.rpm e0be21428a7f4224db6068d129cdae949d828bc55e4ad520a5247eb9d4b1b9f7 RLBA-2023:2639 java-17-openjdk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189326) * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186803) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186810) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186806) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.7.0.7-3.el9.x86_64.rpm ae9eb82d6013ac02868240492456bb8c2649642f76d960df50e31170c52c5605 java-17-openjdk-demo-17.0.7.0.7-3.el9.x86_64.rpm e80cbf1cb30586e7bed4f7623bd25bbd4235c09b10e88c6f8e8e305b138ecfcb java-17-openjdk-devel-17.0.7.0.7-3.el9.x86_64.rpm 539ca2f0e08d59f12828b2bbcaa15d6adef1eac8e1d79801522a61c0e355f284 java-17-openjdk-headless-17.0.7.0.7-3.el9.x86_64.rpm 39d1796524c2ab82904a80fe705c6acfb6f463831a01e4ced84770eb1e0d4011 java-17-openjdk-javadoc-17.0.7.0.7-3.el9.x86_64.rpm 6ab2611e087d598662947987f9917b2c282ffe2badcc014ea4c546ba7c75013f java-17-openjdk-javadoc-zip-17.0.7.0.7-3.el9.x86_64.rpm bfc9bcc7a2d9327bd70effb25c0f6c3ef3f2c28772ac4ffb19d3e30587f41761 java-17-openjdk-jmods-17.0.7.0.7-3.el9.x86_64.rpm 15c8e0b859274cfa5edc8d4e7d24eafce275bdc1ebeb3c6c7ac27c812232bbdb java-17-openjdk-src-17.0.7.0.7-3.el9.x86_64.rpm 24d4b6ef66823fd011c2e8c414b0cd4f8e1d56ec22300f322e74d093a6223724 java-17-openjdk-static-libs-17.0.7.0.7-3.el9.x86_64.rpm 61172b99cecdc1d96b74e2ed7562c4bdaf0699cc57115e57dd460294dcafd362 RLBA-2023:2640 java-11-openjdk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189325) rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.19.0.7-4.el9.x86_64.rpm 3b81cb31ca7b60aefcf86732fc72afe9be5208426c7551b448f3e045b94e3a4b java-11-openjdk-demo-11.0.19.0.7-4.el9.x86_64.rpm 4cbb607d0ea430db7591919fd1288882d20be9a2e213860d69a6f62856165b32 java-11-openjdk-devel-11.0.19.0.7-4.el9.x86_64.rpm 13c6c72e0e108623a1a2e7920e7beacc6980fe40a6bafc4e94421e80f7bcace9 java-11-openjdk-headless-11.0.19.0.7-4.el9.x86_64.rpm a7cd5f37cc56598250b142d0ff58519ea79c1fb02c785f121fedac532f95b085 java-11-openjdk-javadoc-11.0.19.0.7-4.el9.x86_64.rpm 7e3d770d856b05185c528e94d64597bfcddebc1b8e631c3d008fe0cb3926e3d1 java-11-openjdk-javadoc-zip-11.0.19.0.7-4.el9.x86_64.rpm 785f76e26ffab484f84c39dd9788e332f5db9c574880bf12cb4a1a438774faf1 java-11-openjdk-jmods-11.0.19.0.7-4.el9.x86_64.rpm b0b50ac57bd38d225dcf84cc25c248fbba96b901a0c3c6f4c5723113fa5e586a java-11-openjdk-src-11.0.19.0.7-4.el9.x86_64.rpm ea7a3257e9455a016b1e7f2da0503e4e7cce740807d9d63422634664f169796e java-11-openjdk-static-libs-11.0.19.0.7-4.el9.x86_64.rpm fec4252ba2b5149c91b317f662019c59a429fcf1c795ab79c51811cf1cf33d4c RLBA-2023:2643 util-linux bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Bug Fix(es): * Backport hint about systemd daemon-reload (BZ#2180441) rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-11.el9_2.i686.rpm f6af8044ebe46df5d7a08b41edc4cbe34bfe37e49cdb87e1d0ca7fce805a80a7 libblkid-devel-2.37.4-11.el9_2.x86_64.rpm 26d008f911df4a06a37516c6d02be87335b22eb45418efb5a89f7a333f592e7a libmount-devel-2.37.4-11.el9_2.i686.rpm fdf9fee96aa26f9f8ad5e83be70c8b1b5ce00cc14c997d584df60d7b8369394b libmount-devel-2.37.4-11.el9_2.x86_64.rpm dbefcf0be87637b25a19f447b1685cadcba2f4ac2c15fa178c010756afba055e libuuid-devel-2.37.4-11.el9_2.i686.rpm 8e33dc534ad224cbfbd1fbe7d8ef092f807a9695ac7444debc1540e6045215e8 libuuid-devel-2.37.4-11.el9_2.x86_64.rpm 96054824a7a93ce9a6ffe3bacf20f301d947d8ea270e556c662186404c3a965d python3-libmount-2.37.4-11.el9_2.x86_64.rpm 4862f817cc9b180f346fe67bcb57431bbe3874c70f606a773994743f0c151918 uuidd-2.37.4-11.el9_2.x86_64.rpm 67497fb5eced621e99237f202dad9768bd7950b6722726d8f11f488db52825ff RLBA-2023:2174 libvirt-python bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-9.0.0-1.el9.x86_64.rpm 263200cd884b50b6777ccecae3ebfb4af21fd7e93facf7e0fed6b674b3a4fd2d RLBA-2023:2232 gnome-software bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-software-41.5-2.el9.x86_64.rpm cfb7719701c1a2709dc41062f0274a6496c0158565c115bd66cf0f7fbf0613dc RLBA-2023:2332 gnome-session bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-session-40.1.1-7.el9.rocky.1.x86_64.rpm 3440d0bd76789bc611a2f928118d12b95e9cf8112737128ebbec361bece3918f gnome-session-wayland-session-40.1.1-7.el9.rocky.1.x86_64.rpm d85cd9a2b4f1e1cd5cf3c07b8ee70812272b6126874f1acecee40ce59aaf3657 gnome-session-xsession-40.1.1-7.el9.rocky.1.x86_64.rpm 51b7122ecb77badd7cbae1443ec04d4b15859a1308c82019b8e382c1862c6844 RLBA-2023:2348 swtpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for swtpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms swtpm-0.8.0-1.el9.x86_64.rpm 5eb01dd8584a5049fe99ca0bae3a344c2ac1209bd16ae5e6c7affbcb6d54ea1c swtpm-libs-0.8.0-1.el9.x86_64.rpm 10e022aec0504ea5429d99e5f33baea9f278c1ee43bd4dd012a5cbeb4a5f0e48 swtpm-tools-0.8.0-1.el9.x86_64.rpm e0e25c30526267a12c61655d6437ce906bc25c1ab2dd3ba22bb856fad5dd961c RLBA-2023:2427 python3.11-numpy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.11-numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-numpy-1.23.5-1.el9.x86_64.rpm 152062112a7873942b65072a46bb4cc782806eb083b02c6ad9d66781d02e372d python3.11-numpy-f2py-1.23.5-1.el9.x86_64.rpm 1c9d6aaedd2e9a23fe8599a2e89df2eae1be741069ab2a2f05a9a05e5b87f611 RLEA-2023:2439 tomcat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.62-11.el9.noarch.rpm df8ceaa641e4a4c1c20427f6653c7a46d25b6fe857b91236ae541a734bf15183 tomcat-admin-webapps-9.0.62-11.el9.noarch.rpm 35f3a73db547a12da372dd45739d99125e7bdfe66057868b02115499960deccd tomcat-docs-webapp-9.0.62-11.el9.noarch.rpm 5aa02026c680a2425aef89bb159de769e635fbe1b313fc0b3871347730d9ddaf tomcat-el-3.0-api-9.0.62-11.el9.noarch.rpm 8920ed1d8510665b40f6cb100062afbdde10ca7dd75867bb9565ebd7466b2efd tomcat-jsp-2.3-api-9.0.62-11.el9.noarch.rpm bc18baa41267f1be7a56480832c133da8bd4d5ded1eb7997ebaa502d0a8b4375 tomcat-lib-9.0.62-11.el9.noarch.rpm 26cbf617902b9a5ee92ed4b223fe88091aa441adda30b0a2887b8b498c4619fb tomcat-servlet-4.0-api-9.0.62-11.el9.noarch.rpm 6e85705c742bcd7f5b61d7219bc5f2b1f813d4d0f6c6aa1b32fbba7e34d1b68a tomcat-webapps-9.0.62-11.el9.noarch.rpm 5d6287b0a8534434381d7ef959676a64ee793c56102d53d85d7a5822187f5920 RLBA-2023:2622 pipewire bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PipeWire is a multimedia server for Linux and other Unix-like operating systems. Bug Fix(es) and Enhancement(s): * Audio sound can't output unless switch device manually on Orchid Bay MLK. (BZ#2180869) rocky-linux-9-x86-64-appstream-rpms pipewire-0.3.47-3.el9_2.i686.rpm f0e145c1ddd11bbecf9c53299502968bdfcfe3177b9d7c98b139580bf1b8cb1e pipewire-0.3.47-3.el9_2.x86_64.rpm deb3fb0d3b1a6e6927ef70efe5f1c7d5b4f56e885659bd84490f6b3ab2ba8112 pipewire-alsa-0.3.47-3.el9_2.i686.rpm e26d6a1ac900790aca8c0a2269eda0cfa8c76af48cb96ecb51598736648305e1 pipewire-alsa-0.3.47-3.el9_2.x86_64.rpm c8101bf20b093c8f791f696f3ee3a282ee4885f9c0ec5162a5e53df255b4bf55 pipewire-devel-0.3.47-3.el9_2.i686.rpm ffe02e45e62bd8cacf89c2d7ebd639c06bf62e472757132c0a5ebc3748796d41 pipewire-devel-0.3.47-3.el9_2.x86_64.rpm 3add690c6e66b7679c8a5de993b5d56929f6cc71e12e222144718603cdb2d0e2 pipewire-gstreamer-0.3.47-3.el9_2.i686.rpm 838e6d64bf2fa01ded1641e959e58f8cf31bbf7630c7ea13fd8e3ab38f2ab6ef pipewire-gstreamer-0.3.47-3.el9_2.x86_64.rpm 3256144b1bb3e2c07f3df7eee2104d7a21596097514a04e99718a4ded25b3cbc pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.i686.rpm e960af264c197d697c6e3e6d57d8297c69065fac7d04ca2ac11e0e5778878f5e pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.x86_64.rpm bf8779782a4c8c61c10b4f8693f6183a83b0a1e5cda967190ca99dd64aee0d67 pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.i686.rpm f89a1b86113af7c7e2dfbdf170d2c3995ee0fd7ff2e5c34a642cf783b4c19425 pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.x86_64.rpm cab1562091604d1145f9d857dfdd297a9543fb6721a3a79bb5615a270cec79eb pipewire-libs-0.3.47-3.el9_2.i686.rpm bb8211b84ae1cc6e12d509a5dfc6a45b819f53fb3f19c07a963817ed43c08026 pipewire-libs-0.3.47-3.el9_2.x86_64.rpm 59a9e208e3739d2b1cab08ba2071f8ec6f9162c21e2ac5e9f754e5f15ad61c4d pipewire-pulseaudio-0.3.47-3.el9_2.x86_64.rpm f4eec78c14c28f6e9a8ea50c68d56d0df6a75289f1dd9984b0ce0baacc3b41ca pipewire-utils-0.3.47-3.el9_2.x86_64.rpm 5d5b48df2378c4590cca81591a0413945e1ed2c017c57407dc7fdf8b526ce906 RLBA-2023:2630 crun bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The crun packages contain a runtime for running Open Container Initiative (OCI) containers. Bug Fix(es) and Enhancement(s): * Could not find symbol `criu_set_lsm_mount_context` in `libcriu.so`. (BZ#2184222) rocky-linux-9-x86-64-appstream-rpms crun-1.8.4-1.el9_2.x86_64.rpm 1f67eff45da5f7a0712fc9cda18dd25dbeca41349ff8043a56c6918e6480b7f1 RLBA-2023:2631 fuse-overlayfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program. Bug Fix(es): * Rootless podman with additionalimagestore does not work on Rocky Linux8.6 (BZ#2185133) rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.11-1.el9_2.x86_64.rpm 7fdfa1b0c40f09c00502997d47788d75233a882ebb8bc96f509a507bdaedc6c0 RLBA-2023:2636 netavark bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Netavark is a rust based network stack for containers. Bug Fix(es) and Enhancement(s): * The --dns-add command is not functioning - netavark. (BZ#2188566) rocky-linux-9-x86-64-appstream-rpms netavark-1.5.0-3.el9_2.x86_64.rpm ba50fd3e86220df6f228978a2ea03f9372e13b50f5f6b9b6ca4975ab695bd6ed RLSA-2023:2655 Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20). Security Fix(es): * c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904) * http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881) * Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918) * Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936) * Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920) * Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nodejs-docs-16.19.1-1.el9_2.noarch.rpm 3f03aea4f319170206cf7312fb3edc0d20e95e7c196ff2a9638b04d4cdfdabda nodejs-nodemon-2.0.20-3.el9_2.noarch.rpm c31ae00cb453cf07ab8e679c615fd412c87d8faab3b24a1f162824a6310dc4a5 nodejs-16.19.1-1.el9_2.x86_64.rpm d8e13a42016b0781b34e399c82b13809912968b98a5acea57ccb5b32b0441d90 nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm 212c18f45e0ab01a82c15fc4df739eb095519182b10efcf468ed98397d83ccf2 nodejs-libs-16.19.1-1.el9_2.i686.rpm 8bde566a861d88c8eefb820fb6ce9e31d7fe5939306026d4c21721535f48e3b0 nodejs-libs-16.19.1-1.el9_2.x86_64.rpm dd864feb184b7b6fa3393b554a18f6627f463a23e285f208ca6c47aa67b116ec npm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpm f4e210497e2cc86395dc1c042489cb8279854b459b1fa355b6b204c2e6e7c584 RLBA-2023:3144 httpd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * mod_rewrite regression with CVE-2023-25690 (BZ#2190324) rocky-linux-9-x86-64-appstream-rpms httpd-filesystem-2.4.53-11.el9_2.5.noarch.rpm 4c7a90692ff9f0e2fdc3536f7538aed28d0ea09ff95d34bc2c15ff16e2610d26 httpd-manual-2.4.53-11.el9_2.5.noarch.rpm ee0f420fc411e6ab15e10d6b62a98e3d3bffedc30fc0dcd05cd0d27635a0c14b httpd-2.4.53-11.el9_2.5.x86_64.rpm 590f46f669fab5f5e24e4c62f82818c9262627380b350ba028c7ffc27e621a13 httpd-core-2.4.53-11.el9_2.5.x86_64.rpm 9c19882d69d86b1a2de3951efd5793627605592237d8f7512671f37a1ebe4245 httpd-devel-2.4.53-11.el9_2.5.x86_64.rpm ee00ee8ec9a4af5cc342c152a1dae286618b9f0a3bb4bfc2962f9abb3cf05f3c httpd-tools-2.4.53-11.el9_2.5.x86_64.rpm fc30292d98b046de28f8bf9dc2f0f2fca5656451c9ff54d360a1289e323797b4 mod_ldap-2.4.53-11.el9_2.5.x86_64.rpm 2aefd89e88d3034d08a7ae1c40a2e93773856a7f8355b29827cbbd366f18b9f4 mod_lua-2.4.53-11.el9_2.5.x86_64.rpm ccfdea219d19d747a47c2ee6860c2d12355159595f89e0f4d53117f687428e86 mod_proxy_html-2.4.53-11.el9_2.5.x86_64.rpm 92af0a2f73e83d6f98ae8ac0f4a2947c10957877ba72a3500bad6179e1169c81 mod_session-2.4.53-11.el9_2.5.x86_64.rpm b24489af91fa5b4228c7ec9885da97cde7d3006fcb4d565c1d68975eca610776 mod_ssl-2.4.53-11.el9_2.5.x86_64.rpm 23e85be6a80567686a66db6a7f16f7333d1c13717d525bce16867d892c5637ea RLBA-2023:2578 file bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-file-magic-5.39-12.el9.noarch.rpm a5bd2fde9fa423a2fc00c2d1d458fd6ba8851acda5e72018a55bb1968ac76358 RLSA-2023:3559 Important: c-ares security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms c-ares-devel-1.17.1-5.el9_2.1.i686.rpm 4f76050b95dcfc6563e6451612787a8e5a797e1ae8ad8ca9b1f98becc3fbc044 c-ares-devel-1.17.1-5.el9_2.1.x86_64.rpm 80f651c56639c3c05acb548249f75365e54e865eaacba2c9e51488ddbd2322bc RLSA-2023:3432 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373) * webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.38.5-1.el9_2.2.i686.rpm 68ceb1e81999ef058956e6706910d470287df33c9f413e007789986451e46e4b webkit2gtk3-2.38.5-1.el9_2.2.x86_64.rpm 4e9d993b96023fab0384b89dafbc97a06cf56f3d49f90677fa2d9dbe338cb9dd webkit2gtk3-devel-2.38.5-1.el9_2.2.i686.rpm 4ea140a97ef2c965e4b3ee73de2ff050d58efd84e0c993912ebd078232c67dd1 webkit2gtk3-devel-2.38.5-1.el9_2.2.x86_64.rpm 33f7aadbc437651978d4962357618e8e4ea69735f77cbe1a7630a69187303d6d webkit2gtk3-jsc-2.38.5-1.el9_2.2.i686.rpm 35b2db998e9a597a98ab4dde3bb05fb83e9aa12bf9cf6d38ccedd2d8469e0c98 webkit2gtk3-jsc-2.38.5-1.el9_2.2.x86_64.rpm 6a670d5353eea8fe70c7f2b6cc5e04dd54451f468e4d43a4d68ca4c9e456d40b webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.i686.rpm 45adad3805b8690983fcf4a1724eb50f5fb051f40cd6780c93a1ad13e277190f webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.x86_64.rpm 4c50fce181b5d69b80de6f75dcf89dec553b25e0b64a658c0bdfcd16d3176cc0 RLSA-2023:3661 Important: texlive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for texlive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. Security Fix(es): * texlive: arbitrary code execution allows document complied with older version (CVE-2023-32700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms texlive-20200406-26.el9_2.x86_64.rpm 60108a6ab4a63d03ddace1808cd11e1272cdbc0de1ed2bf41c0c3a356d54687c texlive-adjustbox-20200406-26.el9_2.noarch.rpm 6d4f02f9ee8d19fbfbd4e71b7bfba0e54f88bab9077472c74dce8e57feac98ea texlive-ae-20200406-26.el9_2.noarch.rpm 0e5f2275eb4cc96f4ba92969e92fdde555f437c003701fef49173650cfc0f223 texlive-algorithms-20200406-26.el9_2.noarch.rpm 58d95ea8f47d9b5d77f340eaff98a773197562dae8e3b4a943e6492aa62c4e6b texlive-alphalph-20200406-26.el9_2.noarch.rpm 86acc890e9ab1f17aa2908f3c8289ec1654edbdc653623e89e6584a31c5f856a texlive-amscls-20200406-26.el9_2.noarch.rpm 43c7e33aebb1f4057e5b4dcc54941bb9a1118d3a7ca0fe86f6872e1e6b90ff6b texlive-amsfonts-20200406-26.el9_2.noarch.rpm d91416f97810defce446a42d40b06ef8882b7162bd6891b1436e75e7acdc6212 texlive-amsmath-20200406-26.el9_2.noarch.rpm 585b075056e6b0f10d3c6fd1e1a08f5e2433079361b07d94c297555099de9b3b texlive-anyfontsize-20200406-26.el9_2.noarch.rpm 3dd0f72667faf6f73dcb115cb4a7d804d318135ee3b6e501922795a1bd68ff67 texlive-anysize-20200406-26.el9_2.noarch.rpm 64d885c080bdbe7fbf6275cd49a2a2eeaba1fe146999ad7fd7c1385f8d3d0f13 texlive-appendix-20200406-26.el9_2.noarch.rpm 2c065f84fe328ff12a180b0410ad8c9d8f647784d212e956c49de5b149f0e73d texlive-arabxetex-20200406-26.el9_2.noarch.rpm 0ea391ee3095436be0f01a28c00ddc2c6dc3b5c22dd96e20d90f2729b5ac6eb5 texlive-arphic-20200406-26.el9_2.noarch.rpm 122bb21c0ca2af17f202d188d99f6f694224d6884b9fc131ceffc0ca63060456 texlive-atbegshi-20200406-26.el9_2.noarch.rpm ec46918c4dfe0a42953cb17a542b59625a1db04faea90b7fdd05a223e1d82711 texlive-attachfile-20200406-26.el9_2.noarch.rpm a9a79bf6e5a3c5d904ba90a2b86d41269b0503a6670225824463ccde5dacbe37 texlive-attachfile2-20200406-26.el9_2.noarch.rpm 58339c347ee3cf355954a21c76847784ee140ba3abab64be7933cc6963d7f6b0 texlive-atveryend-20200406-26.el9_2.noarch.rpm 86c65cb63a2d1f4094e646f16ec03698e40247c6c8c94d15a8fb7829f3416712 texlive-auxhook-20200406-26.el9_2.noarch.rpm 297ca2612e03dd4e90927ddbfd61cf8591555ffab8b4f1929d7949e4727957bf texlive-avantgar-20200406-26.el9_2.noarch.rpm 9baa4f50affbdb31c1e71627935a79735540a80abcb8bb7806de12307f49fd53 texlive-awesomebox-20200406-26.el9_2.noarch.rpm 7feef124ad5b974fdf900334d6cbcafc2726611cc00ef4cfc40c56d8c83dab3a texlive-babel-20200406-26.el9_2.noarch.rpm d1b5794ce58678d526382767ebd1c4e874d817916386d3888d0068f59405df93 texlive-babelbib-20200406-26.el9_2.noarch.rpm 2a4ebf895368ebaa60ffcc3989aa7577e7d42cf041418f7a728213581b39202c texlive-babel-english-20200406-26.el9_2.noarch.rpm 0c4dcd45da12bdf6f5f500d203128e14020f6b036ae9cf19b944fd752a79610a texlive-base-20200406-26.el9_2.noarch.rpm 5f048b57fd669b9aa75d8b91aded83298b2f945831a0d16ac9aff6f3117af22a texlive-beamer-20200406-26.el9_2.noarch.rpm 689a20f496dcc12706dfce35613f21aac28ef55d6983247678e0eee9fd9fae0c texlive-bera-20200406-26.el9_2.noarch.rpm 26a05f194de9b4d6daa04d9542514bae797304a384519e652665e931ad7bbba4 texlive-beton-20200406-26.el9_2.noarch.rpm 5951e1eb7fc4e15bb458f9fa7e5cf009f11750b6bb2ebcb30b65e52fb2f79607 texlive-bibtex-20200406-26.el9_2.x86_64.rpm 1b4621b7884600b46bc028bfab0ffd81d12b8f0fc28b01193e0509a7400b85bd texlive-bibtopic-20200406-26.el9_2.noarch.rpm c419a993a7bd5dda2805cf0a647a7919ec29ab71a668a0e7d4887f129c3649f2 texlive-bidi-20200406-26.el9_2.noarch.rpm 984f0ff5695c2a64313f499e55566157e41c6d18c936527d1e642e2d2632d2ef texlive-bigfoot-20200406-26.el9_2.noarch.rpm 5fd89c231f05c92e91271f74d361d0baaf3104373981ad5a63af617941b0c823 texlive-bigintcalc-20200406-26.el9_2.noarch.rpm 91dca903a80452df1f087853d3fbac079f1a0b7cfbca03e49b342562d3e604ee texlive-bitset-20200406-26.el9_2.noarch.rpm b12312d898718b19c4bbd96cba6312441499a9df4e03510854ef9d68250fc472 texlive-bookman-20200406-26.el9_2.noarch.rpm c43afc998ac7768ca6eaec35932ea89301fb3b80783db401c0c7938df88c167d texlive-bookmark-20200406-26.el9_2.noarch.rpm 01927654cbe2bd665681fb4fd15a283545988736c7fd272e24e1cca38853782c texlive-booktabs-20200406-26.el9_2.noarch.rpm a541ba77ad923dee9da9d83cc868f99a9062c4d6ed8b23849722c62eb67e2910 texlive-breakurl-20200406-26.el9_2.noarch.rpm 4b185811dfd594dd61e55664535e1f10299ae5f86b82205ba66a1f3a47faa3eb texlive-breqn-20200406-26.el9_2.noarch.rpm 02c3b5863a15c49fb66ecd7f2a9d37754d551904c4bcef5f70f5769925fb455c texlive-caption-20200406-26.el9_2.noarch.rpm 486a4fb1e0ff2442e1ba305d7af61be1c28921f20eadcd1536dd7e228130ba6f texlive-capt-of-20200406-26.el9_2.noarch.rpm 6b5088c002cadaca4256d380371e7c2e4d0c2a5b3e3719911cb9dcd0c5b2b4a1 texlive-carlisle-20200406-26.el9_2.noarch.rpm c020d9e9acd8f4a62cd2849931858cae9d72cac95254a8576cce505a5dd755d5 texlive-catchfile-20200406-26.el9_2.noarch.rpm 1636188835bae616c23ad36ebd1305771be390d9d1485363784ebfe8c1dfea3e texlive-changebar-20200406-26.el9_2.noarch.rpm 416ac6a9cbbf7fe09a0a1f78397ff50d0c458bc179fb804c9c61639686d692ef texlive-changepage-20200406-26.el9_2.noarch.rpm 65ff875334600c0c36f450ee6eb2b29681e7264cf9cc9fc785a9f138bada832b texlive-charter-20200406-26.el9_2.noarch.rpm 11f85ff46de7e9995031fb5ed3a17f1df87b22dc3e08fb2570337fbeeb01402f texlive-chngcntr-20200406-26.el9_2.noarch.rpm a7f9b5e0ac7f4081cb26967f2e3a421f3ba0f6982c59d974706d104056aa7323 texlive-cite-20200406-26.el9_2.noarch.rpm 8743d0cdf8c1ed63733d4145d0e2fa84db80a4337a007e6190c0d2acc4f595a0 texlive-cjk-20200406-26.el9_2.noarch.rpm 3d579c2589b206bd14d3ec24de1f4dd7c39c9d1a5953801b93e8bc1dcc55a4f0 texlive-classpack-20200406-26.el9_2.noarch.rpm 8465513baa88586d52cb61267f5f794d445b8ecb71ee2ef093166f4b71207a6f texlive-cm-20200406-26.el9_2.noarch.rpm c017b06c1ecb8f1204c2b577424fa669535faa5bf3a5e5642d91f60885d67fdb texlive-cmap-20200406-26.el9_2.noarch.rpm 0526e22e9f6060ea2517c60529d7853450279157f106edc6026ed51d22f5c75e texlive-cmextra-20200406-26.el9_2.noarch.rpm 6e0655ec2603445e6ecc838b5e100ba98caf8593161b7bb3dc56a50254d18c2f texlive-cm-lgc-20200406-26.el9_2.noarch.rpm af57311edb6998e0fff98986ca525594e813f582bb4ffae194dc90cc2e968dbc texlive-cm-super-20200406-26.el9_2.noarch.rpm c580d7d62dd83fe9f6021ac3bf61496a539f3143fcddf6251afce6b08f00dfa9 texlive-cns-20200406-26.el9_2.noarch.rpm d7794e0143d9e8b18173b811240b47438eb13b10fa6a67e2bfb1f012d7096a10 texlive-collectbox-20200406-26.el9_2.noarch.rpm 559e84fce146e274f6f0cc15ff7d3ec71701402ffeb9e1ebf04eecaa6a34a2cc texlive-collection-basic-20200406-26.el9_2.noarch.rpm b0a3633bd87d1ce814586fea80c58d9fa6c5c9d3ae2087d6bb52a5d1f13df2be texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm 19a4831cacb8accacebfec5877a0c6b0b0e8b6fa518b02c180dad75db5e93062 texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpm 38e2788ebdfdb4d485a12f7b50cdf2adebc2fd7eefcae75399453448c4a7c4ce texlive-collection-latex-20200406-26.el9_2.noarch.rpm b3254e8c64e81688630c1946bca2451ce5573fd3eaa7f0bac61e7bcd224a12f1 texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm bfc8fbf8a8650eb46780ac89bc568cd9d0c080f2e37343a979d235b804247441 texlive-collection-xetex-20200406-26.el9_2.noarch.rpm 0148dfb10bac9b417442e67702471cb84946ec32e8873d9ceaddf33b3e24e0c5 texlive-colorprofiles-20200406-26.el9_2.noarch.rpm d251d7c85e5334ef84518f1c76297af996e8c96d67f1762d12612b356e95eeab texlive-colortbl-20200406-26.el9_2.noarch.rpm 001fb501f175f0090cb11df0f62fbb46c8af46d3f5061d4c984ef8bfbfc4aac7 texlive-context-20200406-26.el9_2.noarch.rpm c788bc1926d8f4b451239dbc65794074ca728b0aa446deeb6f1ccca5800854de texlive-courier-20200406-26.el9_2.noarch.rpm f745a451606d384782292fc35531e1f6a02978be472e101f08731296b467c39e texlive-crop-20200406-26.el9_2.noarch.rpm ce32588f7075f45782c91dd91e11767ac33ab1be06c141d43b62452179ea6acb texlive-csquotes-20200406-26.el9_2.noarch.rpm 2ddf4b6c6a58e48248529013db3cf15e71b4ba48b35cf95aa2f6091039197545 texlive-ctable-20200406-26.el9_2.noarch.rpm da2ab9bee9ed86dc8e58d731966847165b20cafdc60f9c156309bc2d1297dec1 texlive-ctablestack-20200406-26.el9_2.noarch.rpm 6c2c480b946e69fbe77739c45765c7c8d7e2d0f69a19920913d53b5d937e190b texlive-currfile-20200406-26.el9_2.noarch.rpm afaf2a9336cc2ce05fffdcfd86ae2b595becf83c16157253a79d73e3653f2d5a texlive-datetime-20200406-26.el9_2.noarch.rpm 05820370e807ecb69f084fbcfd4a8fae7f45f852e21e325f74bc4f1d980b8510 texlive-dehyph-20200406-26.el9_2.noarch.rpm 97170d0e1c6140553b0d43fec54024356a70950ddab7cb0dce01ebf427746f2d texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpm 36d8d5e11a9d8a4c9e38ed80418c4221ef7d2b6b46a4eccaa9a9766e304e2059 texlive-dvipng-20200406-26.el9_2.x86_64.rpm aa8a9c9b659a720a2088e2d3c506eb3ea3ea316395f1b35d67531802232fafb9 texlive-dvips-20200406-26.el9_2.x86_64.rpm d52ca8286874a72f1ba5ba49788dda9138f5de64d5f54367d5dbe9ef2bd5d160 texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm 46d1465cd21640fce6fb3e0605abe3310884115833d5d1a60e95d99ead7280e9 texlive-ec-20200406-26.el9_2.noarch.rpm 006c1b278002e33d84adb1a6a968c52c350c2337136414151a3a8da214d25bf8 texlive-eepic-20200406-26.el9_2.noarch.rpm 56c9d6d1acb33bce0f44ecfa8722bd916083dd4ba49faa4f479ab743e9128429 texlive-enctex-20200406-26.el9_2.noarch.rpm fd84731dd5f3d6d44debb9a582d03dc74ba3d74b3a0810e1184bfaf491041b6e texlive-enumitem-20200406-26.el9_2.noarch.rpm 7d1e058d3158a372d3040d39f303225d43e4fc316548d08268bbf3d84a5d02e6 texlive-environ-20200406-26.el9_2.noarch.rpm 4b761db594fcbb6665498f1a7e5b8ecf5a9e336387a9e974002067362a80e4cd texlive-epsf-20200406-26.el9_2.noarch.rpm 8a87af6c5905f9b7bae196b8d3ac036cfd08c6f592539a4813013e691809150b texlive-epstopdf-20200406-26.el9_2.noarch.rpm a577e117fa7940b564aca15d6cf0ee9e8960504d4996078ddb20b57935fbd65e texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm 449d699aaac1f384824e7b65cd60bc0e05efd59404ceb658821fcdf802e109c9 texlive-eqparbox-20200406-26.el9_2.noarch.rpm fadd75e159f5860449893cd400f912f20a4faed31d5ec48aa1ed13b40bfdb8a2 texlive-eso-pic-20200406-26.el9_2.noarch.rpm 24a80022cc910d3644dd0dc1f9998908e6b0f3c228ec7f90735033bc64c58d28 texlive-etex-20200406-26.el9_2.noarch.rpm c51e11c43e5d252bb39a1de0b35e9b67d3bc4b16dd6b5d1c0f8f813f451b7f70 texlive-etexcmds-20200406-26.el9_2.noarch.rpm 7e51748ccf98e2308207104fa2f7041c760ba0966b5c22b47730da495703961e texlive-etex-pkg-20200406-26.el9_2.noarch.rpm 8fb36d83f36ba0e1e5ed8bec1245f58f88e1a9a5bd00b6e5011a50ada82dc49e texlive-etoc-20200406-26.el9_2.noarch.rpm ea5076e5da4c816f4e92c72474b12711e307252e130e82742d3fd51b7ffc2b92 texlive-etoolbox-20200406-26.el9_2.noarch.rpm da771c9966a1e1a9c6adeed4a60cc86312fb0935cc4d14896bbb30c339385c19 texlive-euenc-20200406-26.el9_2.noarch.rpm 970ade54d56e602192f747fa0db08c6cb215a2245bb9cfc6e729a908ed937f81 texlive-euler-20200406-26.el9_2.noarch.rpm 169724ff1218db73a181a8d407925b13aa4417f0c3be3be582a4bf1038c79355 texlive-euro-20200406-26.el9_2.noarch.rpm f21baac3bdb1947741938f9709d288a2b718a63e35c6739e919c2cb573d04956 texlive-eurosym-20200406-26.el9_2.noarch.rpm 9ec53d8fb247e24f4784ee8d8ed5a7acbc9398b267fa0a50892155c27fb768a0 texlive-extsizes-20200406-26.el9_2.noarch.rpm 5e69eaf5aa10de9d2c5299b0b36f2cba5153daaa31361a54b44084930e17643a texlive-fancybox-20200406-26.el9_2.noarch.rpm 7b4ad804d51a36c51deb03b28565da93019eacd2cfdbee9b66fbcfa3f98ea8c0 texlive-fancyhdr-20200406-26.el9_2.noarch.rpm 39d6e75f3ac9d17d57be25af3c531c1c660b1a49aca36aa6b9092fccc0696511 texlive-fancyref-20200406-26.el9_2.noarch.rpm 44f966adf527e29e6a98f0341a86b3fb0eb1a76e607ae89f11aa49cd7f13eedb texlive-fancyvrb-20200406-26.el9_2.noarch.rpm fc2e0ffde8c569faef018c9dda7aad27c033464beecb927ddd6b89ec9a4fa501 texlive-filecontents-20200406-26.el9_2.noarch.rpm dc1e85161bab85c3f8fc1100c8622d9843da47f6e49d88c564e5317a4753fd07 texlive-filehook-20200406-26.el9_2.noarch.rpm d2277530dbf008d8d8fc5949f98bbd8a152e814b99754740113740d17e662709 texlive-finstrut-20200406-26.el9_2.noarch.rpm 54fcb36f9792ef435d4a38e44fa8d2e3227d5493c27a5f9397cb51cc579d8347 texlive-fix2col-20200406-26.el9_2.noarch.rpm 39e020cdec8e391d454c65598d80408977def538f5a6c217622bea4eac39981c texlive-fixlatvian-20200406-26.el9_2.noarch.rpm bf93d3ecde4f1064a31be3ba966beb2364ecad64555d48406f0415aec519eb64 texlive-float-20200406-26.el9_2.noarch.rpm fdf4d00b413dbb017e8a14e3e733991248aad1a850d9755b180e5494c6e42b65 texlive-fmtcount-20200406-26.el9_2.noarch.rpm 82f5bc6d726f535d614b10e0c2689905bb3c76da83b477dc3333f1f61e3a6518 texlive-fncychap-20200406-26.el9_2.noarch.rpm d20a2f19d727da4f89ae2a0c92c136ce6cd45839948e7ea95fa12893084a20f3 texlive-fontawesome-20200406-26.el9_2.noarch.rpm fb9cb62ad2c9b516e5fcc23126a6c2337be8ecaffd3872c2f8ada0ed2d3ef0d8 texlive-fontbook-20200406-26.el9_2.noarch.rpm 180807f4b5546d4e0d1093ed43fc47c70d3dbd240adfb3a45ea1620d316707fc texlive-fontspec-20200406-26.el9_2.noarch.rpm a000a185eea80b6b8cc2ce1c7e3e25a8f6c65967d72dce7749cbafaae0dba330 texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpm 6a5a93041a688cb572a3cb2dc30bebb01552031ec6b97f304012995316b6c6fe texlive-fontware-20200406-26.el9_2.x86_64.rpm 45864095c13affbb5fa5eecc14ccea85a2db5470f003a373c0eff8a3d2d3aa81 texlive-fontwrap-20200406-26.el9_2.noarch.rpm 302006f0760750bbdacbf72ba9feb8fde8925c90ee58513a81cc00df19c70884 texlive-footmisc-20200406-26.el9_2.noarch.rpm 5b2384fe196f8941c2ff7c3d655897acedeed0257ca5647e06698f12c1973d7b texlive-footnotehyper-20200406-26.el9_2.noarch.rpm 53df63708e1c0e0b019c88f1ce0ed1a1acdab4b0368134a712a72f22e4310dad texlive-fp-20200406-26.el9_2.noarch.rpm b473ea6fc993bcdd49977df19659cfcda1308e2092c4a2fef4fa463d2de5e2d4 texlive-fpl-20200406-26.el9_2.noarch.rpm cd84781d505476cb55487d7c963476a506ea760d096ee984a9fb8bd55ba31357 texlive-framed-20200406-26.el9_2.noarch.rpm 8228491088a87e477cd3b99af64afe460cfa6babb23e4c3acd0e6e01cd2a0478 texlive-garuda-c90-20200406-26.el9_2.noarch.rpm 595d387978c6a6c33f6d023f3d1571320bc02be9f4c40c407ef3484e6b0f6e0a texlive-geometry-20200406-26.el9_2.noarch.rpm dc85e33d0da9c3211e9b9f5a686199c83995023ada0e74fd469a2e2acb55deb9 texlive-gettitlestring-20200406-26.el9_2.noarch.rpm d26c39599b40d40ea775f4ef8efa957b39a6a8319560599198988975ec7ad96b texlive-glyphlist-20200406-26.el9_2.noarch.rpm 43191b6dd19b34f7d5f7fae6f63e4750435f8241c15f975e64ac37f5369c5210 texlive-graphics-20200406-26.el9_2.noarch.rpm 4b2d970026c0350d420362e2592aefb0e98fe918509360ebbbbdd64dcc8a7336 texlive-graphics-cfg-20200406-26.el9_2.noarch.rpm 0788edf7816bb05038caa7c01a7f129fb5d693e74014d3b9c3cc804cf52f6ae9 texlive-graphics-def-20200406-26.el9_2.noarch.rpm 0e8a7fa6acd8b8f8b44229c222bee5c70900b237ed74fc3c678b7742a43cd2d6 texlive-grfext-20200406-26.el9_2.noarch.rpm 22b329af01b39b6f528f52cbc724d76b13d28cfc7ba105f4d2dccf40e7a22207 texlive-grffile-20200406-26.el9_2.noarch.rpm 395af471bee15a0b7440eb7bb9954d47fcc83f6229bd8e22b66e2d75f967c41c texlive-gsftopk-20200406-26.el9_2.x86_64.rpm 3e8103d5ce22dde159ef1586d99524f705fc8168fc9590435f6f2bf6ecf6a7e5 texlive-hanging-20200406-26.el9_2.noarch.rpm 8e9f0c856317a3c533e5ab14472051582c0a6674cea9ebb25e1d3d8425181ec9 texlive-helvetic-20200406-26.el9_2.noarch.rpm f9475695df951548035b403b62dc3e97dd7ec508e6ab9a0a8fd630283220e8a5 texlive-hobsub-20200406-26.el9_2.noarch.rpm dd335e5fc44c1182d8d778de4022d8fb74b63d8cfdc088b7101e7aa0bfd120ca texlive-hologo-20200406-26.el9_2.noarch.rpm 4b9ca6ea1bbdf640c44daacb8723267cdd9607f80bc1eaeab886300e2a43e4d0 texlive-hycolor-20200406-26.el9_2.noarch.rpm 344a577e449dc44138ea56777489b1ec6c8dcb85a113841f8248d27a38a86a49 texlive-hyperref-20200406-26.el9_2.noarch.rpm 6411e9a2560c03bef2afef2a854d22353f91d22542dd5a5304788de260511a24 texlive-hyphenat-20200406-26.el9_2.noarch.rpm 05f3caba181ea2dc3b6617b36be70d7ed357c8f878a7c89e8584258e6e8b8f28 texlive-hyphen-base-20200406-26.el9_2.noarch.rpm 3f95e2f4bae719ea2268aaf9e9da393453bcb41c1856bcbcccf0ad5a1d4f3647 texlive-hyphenex-20200406-26.el9_2.noarch.rpm fccb9a6f270e87b22d65d4a65234c499e0bd410337526b92c15d6f5b6421c987 texlive-hyph-utf8-20200406-26.el9_2.noarch.rpm bc82c07ef99b434205a830ceae31d2cfa648845f8df8ca5804aea9a26b28cfbe texlive-ifmtarg-20200406-26.el9_2.noarch.rpm 50c285893196d6fec1d07a1dc0151c79b17eb16f382f6707e7dcd0f8040d8656 texlive-ifoddpage-20200406-26.el9_2.noarch.rpm eda3505030f0d98ea65f9642e73cf5c038d1761f032ec1e96e7f920895bd01ce texlive-ifplatform-20200406-26.el9_2.noarch.rpm 64d52e620b7d3f452ac107b7d5b95b57a5a13d6b6506455911774a1f718081f6 texlive-iftex-20200406-26.el9_2.noarch.rpm 19428a52ae650e90a905ee27eafaee3d9cbe672ec517c534f11055d8cd581f1f texlive-import-20200406-26.el9_2.noarch.rpm 31ba34b06a34a79b56bd6f83327bf0f1b072d9b29db5b995c21c27f73bc8e2b6 texlive-index-20200406-26.el9_2.noarch.rpm 29a6ec63378929256c8bf32875cc4126fb434d7a4c383393a05c5d9c23d2f3f6 texlive-infwarerr-20200406-26.el9_2.noarch.rpm edc04140e1f05f0091376bdfd98f4a7caa093b8010fd1a309badf20e038e7374 texlive-intcalc-20200406-26.el9_2.noarch.rpm e6c35901e74bbea7399368a77e1a5a1469aa3e152504df0442dbd87c2269857a texlive-jadetex-20200406-26.el9_2.noarch.rpm 4d487dfba9f233897e579e9f2a332780bd5e34f17fa23aad5e4484e926c83d39 texlive-jknapltx-20200406-26.el9_2.noarch.rpm 2afdc954af0157965d5589d42e1f35ee4bc6c392ee4f4059ff1dee26b2e090db texlive-kastrup-20200406-26.el9_2.noarch.rpm ab88740de273e415fc889cbef65614481e49187bbb7b1a1a69d87faea75950fe texlive-kerkis-20200406-26.el9_2.noarch.rpm 6094f28a2c9d51c9e3e733dd5c22c039ef2b002d281044403517b206bf03efef texlive-knuth-lib-20200406-26.el9_2.noarch.rpm 9196f2910bdf84136153e7420007fcd2392940f168960dfeca859e98230b9a07 texlive-knuth-local-20200406-26.el9_2.noarch.rpm 36d671b60b5038659caac08cb4463d439e0424d8848fe1fe62f3647a2022cf35 texlive-koma-script-20200406-26.el9_2.noarch.rpm fc543d1a003b9921960e929f7310f9e790242c01b988405450afc05aaeb36a15 texlive-kpathsea-20200406-26.el9_2.x86_64.rpm ac1518d30ff82cb577d4008822b324f52940b2ba463404b028e4b455bfcd5b36 texlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm 6ecae951c220bea9499cc15377478814865b3d1b887d34415bccbd8ff8be1379 texlive-kvoptions-20200406-26.el9_2.noarch.rpm 79032a80c89a6e5de97499d5e7c128dfeb0ea4ce4bc95fee4b8b62d4da8b6a49 texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm 5c50da1090e58df6d52792dfe0057335ffd45491cc76321a3bdeb62c1cd51c5a texlive-l3backend-20200406-26.el9_2.noarch.rpm 56ca49747c7d7ebd6db81a42d1fb079030b61c023b7af72189efa5014d209bba texlive-l3experimental-20200406-26.el9_2.noarch.rpm e65ba88c88670f3adde6f8b27c1742559d86e6ff47b2b9de151b1fbeb8bc1b8c texlive-l3kernel-20200406-26.el9_2.noarch.rpm 3a2447f545b36fa4bf6fc737265033872b9bb63ebfcd8620af8c29a7a38389e5 texlive-l3packages-20200406-26.el9_2.noarch.rpm 2d6e6e88fcf798596a8faac323cba21c375ff7e83d91505acf0fbfc992a01357 texlive-lastpage-20200406-26.el9_2.noarch.rpm 4ad3a44cec321e75765137519c6005c402c1270eecbb038bce24600368744b41 texlive-latex-20200406-26.el9_2.noarch.rpm b063633b4ed6f62eaeefb80660f41d111c0b7bce9f328980a38175b172735832 texlive-latex2man-20200406-26.el9_2.noarch.rpm ab52803148219e2ebe3dd03387f26ced77ab13c3c78da35c582b457bcca491fe texlive-latexbug-20200406-26.el9_2.noarch.rpm b984cbcbf1779fa2785e53f8d77644317f5d88d860c8c44bba0ee8534339bce1 texlive-latexconfig-20200406-26.el9_2.noarch.rpm 37fc6fe968d7b3674d52f9efe0a3814403b501b72d19ea8a0c4dc2bffa1dbc0a texlive-latex-fonts-20200406-26.el9_2.noarch.rpm d73aeb000f00a12a2873fa917e5f479d1477f3d4544f1f19e95e379869a7ab91 texlive-letltxmacro-20200406-26.el9_2.noarch.rpm 6f1c6453364c99d3b5d7d81f8458fb31434c9fd0a27bf6236e3ac5cd0dddbf57 texlive-lettrine-20200406-26.el9_2.noarch.rpm 854f53ca99f410da37727d6a783b13823d2e8a62abebc21111378cd87ade1f04 texlive-lib-20200406-26.el9_2.i686.rpm 4cd3eb36f712f10970013d32b63af9bbc29cf1b512f5c94b60f5a0a64fba57f7 texlive-lib-20200406-26.el9_2.x86_64.rpm 2dbe2fd7b8c5c7169a9708d66a1cdc619a1392e99ec296a178e90d54acbfd0f3 texlive-linegoal-20200406-26.el9_2.noarch.rpm 0779ff9546cbd8ddcbad1d0ac44e71fb77b4989a1f78b3e945327069b9a933d1 texlive-lineno-20200406-26.el9_2.noarch.rpm 5a7b93c21e7848aad3c06cbfeb1e15dc098b1ae544025ab69a089e6c1f34e697 texlive-listings-20200406-26.el9_2.noarch.rpm 3f6482b511e8409e9914a35fab52b7700c7bc25d9f329e54643b78c6cf333df4 texlive-listofitems-20200406-26.el9_2.noarch.rpm 7c20bdc3abe55e71c92c45908ad48654b32c02f504476dc0cc87a9d7b7732652 texlive-lm-20200406-26.el9_2.noarch.rpm 5f1e615d2a2e70a909308389a21b657a5cd61053164a2a2f73b8d82c432096e4 texlive-lm-math-20200406-26.el9_2.noarch.rpm 6a883f1400cf5eae2066676a20b1781e00ccbc5243963c8ccb8a8257b5d7d771 texlive-ltabptch-20200406-26.el9_2.noarch.rpm 2819acf95e6368c625560ffb7f97592640306d2566d615b46b7949866a39ca30 texlive-ltxcmds-20200406-26.el9_2.noarch.rpm 16775e164a5eef183f4ee82e0be53b82c17172efa3a7b44f57d16a232a3a64ab texlive-ltxmisc-20200406-26.el9_2.noarch.rpm bfaab03ee83d20a4b819c62495f2fbb077c484b0f87b8335bb4da2e4b5b89923 texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpm 15bb43efa3fe476ab2fe84f2749b960b1120a6ef127ff99d8210dbeb2c3922b5 texlive-luahbtex-20200406-26.el9_2.x86_64.rpm 1eaf3795aa903f226d89ae31eb1672ce2c4ec7d883d84c0668c591de59915007 texlive-lualatex-math-20200406-26.el9_2.noarch.rpm 255dd994a2743ac8c42b7dcde7ca0d9c47191532e17b99be41679584e7823942 texlive-lualibs-20200406-26.el9_2.noarch.rpm 50b504f163d7343698605c54d0e1bf65697184aebd778edabe7665129050cb57 texlive-luaotfload-20200406-26.el9_2.noarch.rpm aa25b422b53f1f109f366e6247f559b42a825b7adcd75c08706c82d4560e63b0 texlive-luatex-20200406-26.el9_2.x86_64.rpm c050d76c24403b70229278dac6a5f3c4f3f689fec06b4eb562eeea007d3da318 texlive-luatex85-20200406-26.el9_2.noarch.rpm c8c75b5ea789033a257f5c843eabd01d408a22fb02161251c7d17b0e2efc872c texlive-luatexbase-20200406-26.el9_2.noarch.rpm c550ea4e29f7ba1cd10ea2040fe0104ec3aa33bc4707e5f52867dcf03de5a8a3 texlive-lwarp-20200406-26.el9_2.noarch.rpm fbe5dad8cc727014a5acbe5dd63c196e7d78d0f5fe46d539101bc214cef5d01a texlive-makecmds-20200406-26.el9_2.noarch.rpm c75a2b6ffdf01ef89539ace251096d44bd6f6232fd69b5ccf3388ecf5c5cad16 texlive-makeindex-20200406-26.el9_2.x86_64.rpm 4d2ecf65c06865881f964c7876cf1d79d18ba1122c7dd65d53d283acf1bf0aa8 texlive-manfnt-font-20200406-26.el9_2.noarch.rpm 556e5b51385a5eca059b43ee4c13dc75e12439a136ebac8355db8c3c2ea19c60 texlive-marginnote-20200406-26.el9_2.noarch.rpm e24e011577aa1015470915775b2549dde648d3571c455153f2b9ffe2c2bc596a texlive-marvosym-20200406-26.el9_2.noarch.rpm a695a6f40ebbceeb2792fc0cad1334353c9737de3c64d123f42f68c6e7946032 texlive-mathpazo-20200406-26.el9_2.noarch.rpm 645670122881a3bf1e1616fa7cabeaae83b6b91f42367a3280df855736f65baa texlive-mathspec-20200406-26.el9_2.noarch.rpm 4c73c2c468960936a3e29db015274a7123d9b35617bb702766b102efcae141c5 texlive-mathtools-20200406-26.el9_2.noarch.rpm e5b6346dc7c4333b6379d124448364dd486ca500b15a219ca31e614cdc7b125d texlive-mdwtools-20200406-26.el9_2.noarch.rpm b3f48feed5ad30419fcb3810fba00e98a9ae6613181d2b46c9737460ee9613e0 texlive-memoir-20200406-26.el9_2.noarch.rpm 62624cccb871c4c640c9c4e32a14dd26f8e37dae0f6a37fc9a4ff7575509f92d texlive-metafont-20200406-26.el9_2.x86_64.rpm 3b59036a1a375596de1309c01a92452bcbb6466f8e37d085f20d6747b5eb6919 texlive-metalogo-20200406-26.el9_2.noarch.rpm 72b6c5e380ab6b2d5600b471ba1f3c412855cc21cbd096d27556c6325738dfd1 texlive-metapost-20200406-26.el9_2.x86_64.rpm d9e0016ceed20174bd3598bc3b9c9613dd40147d7fdc4203ce7e71e7ffcbb0d4 texlive-mflogo-20200406-26.el9_2.noarch.rpm b5b683d354b1d9a0153fdba2bf15cf5b5096434b49c06f4536b45768438a853a texlive-mflogo-font-20200406-26.el9_2.noarch.rpm 49261d9ddf3cb4506164f61c94a20885a3c6bcb121b342d5ea8df8f646abe55b texlive-mfnfss-20200406-26.el9_2.noarch.rpm 9e45dee63a5da8d4c21a5988006a3fa3b0b494a510b3a088e89d6a949b8cd01f texlive-mfware-20200406-26.el9_2.x86_64.rpm f09099a375fc351169f11d6d606c484516a9f0d34be8a2bff86371d960479824 texlive-microtype-20200406-26.el9_2.noarch.rpm 391e607dfd24928550002fa516286a530d8e5e0e3d9feaf6f8e4366bbdeb0c10 texlive-minitoc-20200406-26.el9_2.noarch.rpm 17befdd8e57c27f684f035594a29737dec49b3ac7007c486fd8c34a4f05b6b98 texlive-mnsymbol-20200406-26.el9_2.noarch.rpm 505a2be01ecb725b0afe35c96d5c793f7c2b42f241a347be96065e188bbc2b91 texlive-modes-20200406-26.el9_2.noarch.rpm 24f06702e5055418852b4f50e2f048e240198f6d504e16b3d16ec27278f62a66 texlive-mparhack-20200406-26.el9_2.noarch.rpm f010dcb30c89dad5aff80679384d935553780f712f311f9f754b46fe2a53a6e9 texlive-mptopdf-20200406-26.el9_2.noarch.rpm 7ff2ad0a95c1edb354e96724d405eb637aae48c330a957b4a43ab17b8612149c texlive-ms-20200406-26.el9_2.noarch.rpm ec592f65006dedbfc348b060206142c84f1bca5280e66d47ceac0b191662e6ee texlive-multido-20200406-26.el9_2.noarch.rpm 7d64c4530a810f17b3fa859e5f3ead0790c2ba917f6901560d8866e841b33e94 texlive-multirow-20200406-26.el9_2.noarch.rpm c48207b6144ae3ce30a0d57b2353ec22c55859c9d677563bc42dedd0fafe44d2 texlive-natbib-20200406-26.el9_2.noarch.rpm 64bd14a79cb843546c7151d83186a4bdf5569450dcfb93d935a9862bcbe7a27b texlive-ncctools-20200406-26.el9_2.noarch.rpm 5505cf68ea4f457309614d0952b7505376b98e6378484fb214086a92844dd371 texlive-ncntrsbk-20200406-26.el9_2.noarch.rpm 60c68e0cb14721a39ae665528282ba815f4cc188034eaaa03052bfb4b0143a89 texlive-needspace-20200406-26.el9_2.noarch.rpm acec4ed16a1d35811dd27faa02df4cb921909df6d7cc727947962c691217c3ab texlive-newfloat-20200406-26.el9_2.noarch.rpm 02c67032cbb8d5110fb9abf6306f517ac1dea940288d6adc7f6b9c2dd11170f3 texlive-newunicodechar-20200406-26.el9_2.noarch.rpm f90779d3c92e14f0a646088647447da9af582ce3244dfa251ea574e6675075a9 texlive-norasi-c90-20200406-26.el9_2.noarch.rpm ea342c9053b669b5c2b3c34427f661a283d31099055ae117d0c5f9e12c75b92e texlive-notoccite-20200406-26.el9_2.noarch.rpm 111eee59d052578d65ae454012e387f8275c39e61692298d95a805422723578a texlive-ntgclass-20200406-26.el9_2.noarch.rpm 4cfdebdd0626e49672077607ab5509edd6cfe7f0d8dafcd73330f1d225490e51 texlive-oberdiek-20200406-26.el9_2.noarch.rpm 01cfd047d1b5100f1d94bac430ae496ab958c054c2f9ec202a6cc07d6b6b1c2e texlive-obsolete-20200406-26.el9_2.noarch.rpm 3c064b3872f380f56068bde7245ebbe452c61054b2efe33ffad9a3c85a20d43b texlive-overpic-20200406-26.el9_2.noarch.rpm 207f7b054a3a3a79f85249fba452330b55d399956a34894fc538f501042cde19 texlive-palatino-20200406-26.el9_2.noarch.rpm 00972655f9010f893365bbd3591422b81fca37473c8c337e1978292004712cd1 texlive-paralist-20200406-26.el9_2.noarch.rpm 4c362fab0d771a5f8cf8e4a019ad60290b12bc1cfcfdb448ac67479142a6ff85 texlive-parallel-20200406-26.el9_2.noarch.rpm 1c828a2af36ab7b26a99b7ec5882f9949cb7415abe803bef00f75a6fd8417118 texlive-parskip-20200406-26.el9_2.noarch.rpm 0406b8a7309faf590ad6dbfbac13e15e0dce933ee45960180b7c988b31122fb5 texlive-passivetex-20200406-26.el9_2.noarch.rpm d37faafd0f88721e02567ee2c15e9a1bfe780607f26c9553fe662d60a38bb3bb texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm c33d1ffd3c9e3ebe809bf86d69a80d29a0584d1700af4440913b7317915f5981 texlive-pdfescape-20200406-26.el9_2.noarch.rpm 097ba346bc9027d3a938cc139af59b2725f03b9fb53f6eeb5fd0495edc472fb5 texlive-pdflscape-20200406-26.el9_2.noarch.rpm e2f19ce57aee871a43907bbfc139604e8f65a01f0838cd123ab56c6153d789a0 texlive-pdfpages-20200406-26.el9_2.noarch.rpm c22b0aa7fd6f21f178d836ed7e14f486551ea41246456bec8fa3fd34cbda79be texlive-pdftex-20200406-26.el9_2.x86_64.rpm e1606a19d16c883efdd94ed43e9f82951524f27428321a8c7bde0270bd0deac2 texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm 883852cacebd0d3ccc9ce249ee8388b8f44fcfcae5ccb7ad31b2e72528c724fb texlive-pgf-20200406-26.el9_2.noarch.rpm b5e59619ee2e8769774761b7932c395035dc6ab3fe5b73c0943ad5b212fbb340 texlive-philokalia-20200406-26.el9_2.noarch.rpm 73462ccbd4310c665aad526b8f574d4e847632680d6c84ec9cf7c064af26b6d4 texlive-placeins-20200406-26.el9_2.noarch.rpm d204ce581902435988f899d7169fa45a2c637ede85b2a4c5180f415074c7e530 texlive-plain-20200406-26.el9_2.noarch.rpm 923df8da1c940cd640c25237336896409cc5672dd1544e43ec197c47a9aaa8c6 texlive-polyglossia-20200406-26.el9_2.noarch.rpm a7bc5ec7eeb3718df403409ce7f2a508300b0cbc7936764fbbb5c33d62d3046b texlive-powerdot-20200406-26.el9_2.noarch.rpm 4cc00c57ae89048b59b62ec98104071bda7e8b8b15c2baf15a951a35ce5f6133 texlive-pst-3d-20200406-26.el9_2.noarch.rpm 9310330cbb7037b193f84bda71737dd6c4b210c3dcdbe7dd46381bc1dd5956f7 texlive-preprint-20200406-26.el9_2.noarch.rpm 1028eaddaa14d2c5d6e95644613990fa598b4d121ddac805554f1356f7769a35 texlive-psfrag-20200406-26.el9_2.noarch.rpm 45ae355bc8bbedf4483651b0171a9b80bdee05a933c17ce55e1f7f8e60e898eb texlive-pslatex-20200406-26.el9_2.noarch.rpm 40b2dc0796e86c3ef6012eea3cde8ccd735c782713ac1764583016d74ff809ab texlive-psnfss-20200406-26.el9_2.noarch.rpm 919f97a9507bb7657eedc137efd779f9ad213538625d125a8e8b3d0a37223182 texlive-pspicture-20200406-26.el9_2.noarch.rpm 8602188413d9cf032acc5d77b3599f50ddc52cc31e25c371f4e34fa2553ea591 texlive-pst-arrow-20200406-26.el9_2.noarch.rpm 4df90976ba94dcdd8839b05fa72726b732b8171aaea5759d3c2246828bb176ba texlive-pst-blur-20200406-26.el9_2.noarch.rpm ce8d8b5cb065c5412627b1c76faf47b5d03a786b1daa0a6f56b019c495f3fc91 texlive-pst-coil-20200406-26.el9_2.noarch.rpm 1e964b457cc2020a57c52a3b5776a0626017af4cfc65a65ad123c8e758b7b912 texlive-pst-eps-20200406-26.el9_2.noarch.rpm ecc8e735e324bf60d0320513c4d7b4a29916e4a2eed314ca2c2e5ad5fbd7bd41 texlive-pst-fill-20200406-26.el9_2.noarch.rpm ebc2b65731ed93449573007263bfa59cae9fc844ba8ac3c757796968be2e69f7 texlive-pst-grad-20200406-26.el9_2.noarch.rpm b2485ed626587c0727c84131d1e350019298c103db6ffa849e19a8651f9543d7 texlive-pst-math-20200406-26.el9_2.noarch.rpm bbd29a4a4bc55b534f158d29c976c08f6df3868c430a6b61cc9b907bb83f4a08 texlive-pst-node-20200406-26.el9_2.noarch.rpm f98ae6ddab4ef518482c2bb798f25140612955cc6a87df998d3b85eec4c818fe texlive-pst-plot-20200406-26.el9_2.noarch.rpm ef7d6866faf457dda9b5d7e3874fe42fd7ca45e6a894dd1365ca60598869051f texlive-pstricks-20200406-26.el9_2.noarch.rpm ad2b495d83833b37b17581b18747f446e7afbd1b5ea9ea9fe1df92cce1f0a340 texlive-pstricks-add-20200406-26.el9_2.noarch.rpm c7184f253259b6ba54f02a52c5588c21c12ed22162c8ada53c8e147589ab178f texlive-pst-slpe-20200406-26.el9_2.noarch.rpm 0eb007824550dc469117766c9ebb7a78b44e5341668f40d66b19e1be4b669c1a texlive-pst-text-20200406-26.el9_2.noarch.rpm 9b5a510eacd68ed138b8bb42b58c9d4e6c91ba4fceb6f47fb98c17088900a572 texlive-pst-tools-20200406-26.el9_2.noarch.rpm 19d6f75405b4993c9c30d0f6c1efb171ee91bbf6d64e4c5b7d8a334ecc58b709 texlive-pst-tree-20200406-26.el9_2.noarch.rpm ef3a56a686188fd2aa2f3ed1f88733890c7292209e41cdbed61c3b8be63d8ae7 texlive-ptext-20200406-26.el9_2.noarch.rpm e9c686c31ca4c70196bd591a9ecfd7d02e66795a4c064e15be63bc9f9e20e8eb texlive-pxfonts-20200406-26.el9_2.noarch.rpm a52b73dbbbf1e7ca6bf5f8faa1e88ee7525d2474195d7dc044a6d74370f5d349 texlive-qstest-20200406-26.el9_2.noarch.rpm e60584a6240a1c8ec120a3b5547583d44e501183bcaab5d681b7a64fdfed664a texlive-ragged2e-20200406-26.el9_2.noarch.rpm 4e6f37584d3b1c0890b8b534bd898cc3abfdf30197c0ad1a4dd5cf76e75f7506 texlive-rcs-20200406-26.el9_2.noarch.rpm 480a2c2281bb800891c33eb420c3801933190acd3d38018ac041aef38ca4e313 texlive-realscripts-20200406-26.el9_2.noarch.rpm ffc104da2f7ef3c479000b6b0e57b9a501fcc6910f2e8c098c4e21194b46b152 texlive-refcount-20200406-26.el9_2.noarch.rpm e15f1e4b513fdda1564f22c74ab611653a6c6635476106b04e2d9c7067ea2983 texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm 1e5165aea9579efc91ab6787f2bedee20136056cac5bc82c06acb6ce0fd123ed texlive-rsfs-20200406-26.el9_2.noarch.rpm cc5cd9dc0a2d8682f728f6edc7e79d2b3fc749397eb7353d20ea23061b590090 texlive-sansmath-20200406-26.el9_2.noarch.rpm 2e216d9ffd08b4e6ab6a10e4f3a4ae1654e1f8d94f8ee88c1fb9f85a7d801c04 texlive-sansmathaccent-20200406-26.el9_2.noarch.rpm 81a0618954ec131f5f3f2d06e54a3aceedfeb13e0665ab273e623f9528389e70 texlive-sauerj-20200406-26.el9_2.noarch.rpm 5c917b3166fa6fe1e41ea73deaf1c6a821ee4aa7d7940dbbec66060433844501 texlive-scheme-basic-20200406-26.el9_2.noarch.rpm ede136fe8ca00362364234c82393df3c750818f7c6fa5a8f79a77f6d4dc6c1b2 texlive-section-20200406-26.el9_2.noarch.rpm 03348837342b83e3f2e026706b96d6bc051afdc65380ce2538af115d3c1d8d85 texlive-sectsty-20200406-26.el9_2.noarch.rpm 0d0fc4c628cffae1d57e45a3e107f2fa2c16762c7cb84cd9881daa354bc78669 texlive-seminar-20200406-26.el9_2.noarch.rpm f37b05a79cdf47a78a8ef55791833350d4e3dc56a0ce9c213afaa92fe36154e3 texlive-sepnum-20200406-26.el9_2.noarch.rpm caa9405985cd6a2871fe7def3b2ab10867a355eb7bcc71bab12da7b5de081143 texlive-setspace-20200406-26.el9_2.noarch.rpm e4ec78b22399c46760194eeaeed18ce28ef471ad13ed0679a0abcc54d4add1d2 texlive-showexpl-20200406-26.el9_2.noarch.rpm 3bd7d71e74fd6aa26f0706e2d9c80309ea85349a72eac08be211c9e44fc4fc48 texlive-soul-20200406-26.el9_2.noarch.rpm d6be885683614eaca3fb48324b8c1dc8e1e8004db2cf11ffb31b0e3a7bc30f20 texlive-stackengine-20200406-26.el9_2.noarch.rpm f9d5ff13e93303f1c4a33ffcae7aab4b7c019359fef0b5f8975cf58ae721776c texlive-stmaryrd-20200406-26.el9_2.noarch.rpm df568a3c2f17bfab7804e0580c0befde99662d095db59fa70bf76cf3c2bfb8c5 texlive-stringenc-20200406-26.el9_2.noarch.rpm d414ca79ea2b5c09f29112180e6bf9e137f56be49a98eac8793222947ba7d0b9 texlive-subfig-20200406-26.el9_2.noarch.rpm 51c955014b29b3e8b75e9701033d3132ef14cd4944d6feee43de6320284e9081 texlive-subfigure-20200406-26.el9_2.noarch.rpm a845cf97cc04ee425eadf772eb0fa3364b88f6f8272dfc264fe76b44527cd67d texlive-svn-prov-20200406-26.el9_2.noarch.rpm 485e27454610fd51ec6dcdb32e2ea4d6cad7398893d10e268ae51ee9fc36912e texlive-symbol-20200406-26.el9_2.noarch.rpm 3fea8fb7b06074d5def096ef91b1d1d7e066c1189153cf851be2a08e3f3f10fb texlive-t2-20200406-26.el9_2.noarch.rpm d5c17ef9428a3f055274bed676a7eb6bc7cb29720957fd7ac52415d2ac5bb753 texlive-tabu-20200406-26.el9_2.noarch.rpm 2153b613048039cd6718f1180f8184b9dc4b7f31bdcf9eb6c51ab982008faf4b texlive-tabulary-20200406-26.el9_2.noarch.rpm be5a4b56c2a43b619bf09385be4674464399f85d9cc34bd813398dc301784f91 texlive-tex-20200406-26.el9_2.x86_64.rpm 5afbd69fb792054b4f59dc2415d8260ff9b40699a7d1be703bd01d558d2d2800 texlive-tex4ht-20200406-26.el9_2.x86_64.rpm 0d9939dd9ff97ef577a2ecc81e0c38531bcc0ba28433b1160eba28d1b7068326 texlive-tex-gyre-20200406-26.el9_2.noarch.rpm 8855140140dfa0a9657ff8c96f23a1c77826d6f1e2ad93af72cb1f546a2c9766 texlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm ce497108ff7f2ebd3458922d35d9363f6cb7d6a66c6e23933312a983cb0bcc0b texlive-tex-ini-files-20200406-26.el9_2.noarch.rpm 387deb6ff47caa792bae8238a7c8111d18c0de3525c4bbf80ccf2222134b5a63 texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm ff14b7f06ab7993aacf8ea2ee6cb7b7a83aee72f1b4346f9b172d6d5411df6e6 texlive-texlive-docindex-20200406-26.el9_2.noarch.rpm 500415a75e39cae5e6f1f1eb9d3c142e7aa2c21c39e0cf0dccffcd473e00030d texlive-texlive-en-20200406-26.el9_2.noarch.rpm 70357e73a25ad39bd0435edebb1f29c5e0e437d7e8c0203ed7edc0f3725cd9a8 texlive-texlive.infra-20200406-26.el9_2.noarch.rpm eb2ee9b8ac0a323934ea25a19bd17a6198642d64a9a30180eddefeaec60d3b48 texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm 998b8b4556fafd23d20ed0cb6f284236da346de0a4fbdc60a77d1a13afc34ece texlive-texlive-scripts-20200406-26.el9_2.noarch.rpm 747e286024c89c06665cb175b9630c19b3decaaccd62122c564cb65bc7607fe2 texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpm 800e05259e19c25b3921810b6ad3982290aef4b4cbc0178dde70120ce1d7ce1d texlive-textcase-20200406-26.el9_2.noarch.rpm f0ecc8a93ea55ad33fd6ebbc7e395425430758f465fc1987c99269744a1435bb texlive-textpos-20200406-26.el9_2.noarch.rpm 055d44969981b56d95e461b9f6674de4084b7028a1bec84d0d75de5df3ebdd72 texlive-threeparttable-20200406-26.el9_2.noarch.rpm 7e438bc123b5049181cc650db0e3ba6a0360eded92cef30689c1635284c54972 texlive-thumbpdf-20200406-26.el9_2.noarch.rpm 429c2cf247d681e77de5e8cf8c981793016d018ba5cf1bc8cfe030b3e5015a21 texlive-times-20200406-26.el9_2.noarch.rpm c74914c85802f971e569cceb30185dadbc07b88a772e26e41eeb5256e17ea915 texlive-tipa-20200406-26.el9_2.noarch.rpm 2bd8aeb4d1262f43ab0c624ec4b32166abeb5eedb02d804bb9f12b51acb2b070 texlive-titlesec-20200406-26.el9_2.noarch.rpm 351a2b8f0a5123b7ae152a3b0de5fbd4e076568a9dd6fe35d47f4512d93c6c08 texlive-titling-20200406-26.el9_2.noarch.rpm 2e297e33d720dee2e920b8a00bcbd5c0613638917c3b367944f2bbe39a32db4d texlive-tocloft-20200406-26.el9_2.noarch.rpm df3e6b2f7ccd65a291412460603f59b6f3ed2f225b1f15e4301f66777ac3631b texlive-tools-20200406-26.el9_2.noarch.rpm 33aa90f8db04c800f57c3e63d3d5ee4fe9ef0c8be6297dbcef6a67837ee268ca texlive-translator-20200406-26.el9_2.noarch.rpm 1ee0ea37acac5767c03d86fae7290965c61c11627f0207713ee1012e43947007 texlive-trimspaces-20200406-26.el9_2.noarch.rpm f57e7c3234f0995728d24b969f2843bfefa316bb429b9cac0d0dbeb5425e2769 texlive-txfonts-20200406-26.el9_2.noarch.rpm 0872e0a788ddd216c157ee54e7504b3b256f3e9facb6837ce1e456e952ae1631 texlive-type1cm-20200406-26.el9_2.noarch.rpm 3d902a971f7f7f50fdf3ec1e7969570462ea9f201c3878fee9aa10fca1a36859 texlive-typehtml-20200406-26.el9_2.noarch.rpm ecf60e540159e528dd5098b5902e554c32589e90f88b532c62ff19906dd7586c texlive-ucharcat-20200406-26.el9_2.noarch.rpm d6eedbe8dcaa524d14f78a2b8bcb9e29ce1faac07aa247b2671fbf8c1a93fabb texlive-ucharclasses-20200406-26.el9_2.noarch.rpm 9e1a532deb2488048cbc37029357280511147bfc19ffa9bb6d4a248d6eca6f1d texlive-ucs-20200406-26.el9_2.noarch.rpm 49caca966ed2e6b67b13d33431a6fa20743ea5a99b8bea95865bc1ca66f75e90 texlive-uhc-20200406-26.el9_2.noarch.rpm c20064eed30375a3faa72d71b7d00739acea66199db9ea1f961f6de0b3636cdc texlive-ulem-20200406-26.el9_2.noarch.rpm 0c63998654e44cc09eba5c9554b6b608621e31f1d7be93160eee4b898621ee2b texlive-underscore-20200406-26.el9_2.noarch.rpm cb40c140ece4d8594ed54445cda1d235fde08a3913d4afb7c02f5d1097957dc3 texlive-unicode-data-20200406-26.el9_2.noarch.rpm d00187613d949b72e6216abe62305b6d2941e3cd116f9172d7b5d0fde96ebfb6 texlive-unicode-math-20200406-26.el9_2.noarch.rpm 8c1bed59d556e6c86fdaa53fd664025070dd42910f23a52d1dfe67b6c6c6727c texlive-uniquecounter-20200406-26.el9_2.noarch.rpm 508ad1d6dcf8714bfd5213e5acb6bb94c8b563138550b8d194947ada8fc10e36 texlive-unisugar-20200406-26.el9_2.noarch.rpm e8ca282eedac5e8d3dd0e3340a91815d3ade6c53f9d263af3d5cf0e0b463e487 texlive-updmap-map-20200406-26.el9_2.noarch.rpm 5fad6e40d4c63dfcd0af95fa90c64b64d9eaf2a0ca60cd81cf35cac7e9f7a2a0 texlive-upquote-20200406-26.el9_2.noarch.rpm bc452f128bddd5e2df1029487d9d09f59d0ed49afe700e2cd333dcd4e216919b texlive-url-20200406-26.el9_2.noarch.rpm 33497019a706702a6b2d02015b2e582aecb7ade1f31ca5634820c1a88af36caf texlive-utopia-20200406-26.el9_2.noarch.rpm 6625c4e76b3d12f23effceb20c3e49d3d58364ea1a1d197e57c14b144315cbf0 texlive-varwidth-20200406-26.el9_2.noarch.rpm 57aca925fb1b47244bf69e3fbaf9ed3a3bd18bef40d3578bd41e51f69777e399 texlive-wadalab-20200406-26.el9_2.noarch.rpm 1fa5e69baf3dc9c7692180fcaac9965ba4c8c39bafd4107aa8605a18f4e7ffa6 texlive-was-20200406-26.el9_2.noarch.rpm fc2749002d953eeca306e8d35d98d0eb1ecf399bd2c8502daa2f0b12db77782c texlive-wasy-20200406-26.el9_2.noarch.rpm 2973fb004de30e6feb825b2b9aa32fc7aeed0ac8e4eda2aa5903bc28ecb1b5b9 texlive-wasysym-20200406-26.el9_2.noarch.rpm 5616c31dbf873308aa6bba9905bd041037d28d67b00d8b6d2ce71041c213054f texlive-wasy-type1-20200406-26.el9_2.noarch.rpm 15aeb7d75c47ecc58ccd79d6e68ae7d31a6e609ae7c783c1e3a5a9d3f32b3549 texlive-wrapfig-20200406-26.el9_2.noarch.rpm 08623204bf9e3884661f0a054d74ad25b176fbfca3aed86ccf0d759586e6f0dc texlive-xcolor-20200406-26.el9_2.noarch.rpm fa5b4aa161603fb74552cf8abb34818dbe8406a8ec95a573327cfb3aec5c8f7c texlive-xdvi-20200406-26.el9_2.x86_64.rpm 71a58eef758fb16b74dd5e5a014a1b90a955e423bb3dd6fd504d8328a5eb34ee texlive-xecjk-20200406-26.el9_2.noarch.rpm 97a53f2a4528066ce6a59b15d44c099d4e80e42e0470f90066d5fef70587310a texlive-xecolor-20200406-26.el9_2.noarch.rpm 0a28e96f5726e0ed6564c798495790bfad7408b4de4df39020e3e27784c8bd97 texlive-xecyr-20200406-26.el9_2.noarch.rpm 0c715eee13c9322ffd8c1b01b8d469bd4abacd4a4ae6b020942927dc8ccf8618 texlive-xeindex-20200406-26.el9_2.noarch.rpm 40b83f135c66909761b1444db8772744698a78d29a7d3e5405d45e96ee14647a texlive-xepersian-20200406-26.el9_2.noarch.rpm 7f5de39d6a965a1cd777989d19c841c615581e08ac2ac4ea28329290520d187e texlive-xesearch-20200406-26.el9_2.noarch.rpm 765cd9681936a516d971f9f7f8742c7cb202a5db7f53df76177a5ce318263c89 texlive-xetex-20200406-26.el9_2.x86_64.rpm 5b1cde1a2991fec95cc3bcb27686d604c2ca3e27c6e8bc59d9c1840854e3af6e texlive-xetexconfig-20200406-26.el9_2.noarch.rpm 7564779233c89db70092a225715f58c14f13d20a65ee1232a2e5b20df95e7e98 texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm 85788f5bf110c69a49350ed62aa8b33686841f4d4f1c24640f3b837eaab3a4f6 texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm 1b2c310869ac6ab28b9cdb91a84b0cef1ce76221565834eb7ffbc9a52c594cb6 texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpm 694719b79406420094c4a7b44526fcc0b77a89d39c761c62bc5ad2f919b80015 texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm 538a8250f2607d1cb4fbb235a77c58317ec110027b660179b51495d76790501b texlive-xifthen-20200406-26.el9_2.noarch.rpm 0ba2ee16151f459c2bfe8b84692ae444ae48c3105eea02d73c1d768bd347ec14 texlive-xkeyval-20200406-26.el9_2.noarch.rpm 6b41cba9d7d40ad8cb2ddfa0392d0ecbd1f6cc9c9fa12218e93b2c15c2618c13 texlive-xltxtra-20200406-26.el9_2.noarch.rpm 5ef1db7a00104b724947a1c3e2bfe7ad465b156543c912a9c229351b4b1294c9 texlive-xmltex-20200406-26.el9_2.noarch.rpm 5ada743716865fcf9bbaecbb6487e4a6c91f45aad8ee926b03cdbde48b62023c texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm 40ae4f2459893173e7b7c41e367ca242f43a3c76257174ce05bcae56991ce737 texlive-xstring-20200406-26.el9_2.noarch.rpm 871c5b92e95f78de4a01b3031097b55e74bbde9e1bb0bb411b78b0443f87a143 texlive-xtab-20200406-26.el9_2.noarch.rpm d13ee62293e06a02cea5574f30393a2c4ecd14bf84cfe9cf6a183433adbc8356 texlive-xunicode-20200406-26.el9_2.noarch.rpm 6b715ea0ebed5240acb14e1ff52b5e21c0a7e4aa3bb9897505826b440c996967 texlive-zapfchan-20200406-26.el9_2.noarch.rpm e3cc769e55dbb178db61a7b17af417d63614c4f504e13605967edf717cef5eef texlive-zapfding-20200406-26.el9_2.noarch.rpm f09bbaf2e10cb50fd98d76eaa38a44b000b613f2b987410c9a012533918e1f20 texlive-zref-20200406-26.el9_2.noarch.rpm fe83c13a357e42b5361cefd8933b65ff43a39edf148d2aa50f9f3c2a56582a13 RLEA-2024:9453 nodejs:20 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * Crash when running Node.js application on ubi 9 (JIRA:Rocky Linux-58721) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2024:10787 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID (CVE-2024-10978) * postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code (CVE-2024-10979) * postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes (CVE-2024-10976) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd RLSA-2024:10788 Important: postgresql:16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID (CVE-2024-10978) * postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code (CVE-2024-10979) * postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes (CVE-2024-10976) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm 44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba pg_repack-1.5.1-1.module+el9.6.0+32421+7c015469.x86_64.rpm 9c7871759688428d1a5595c09ea668b57d143a59f80717028131195b2d811b0c postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm 6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259 RLEA-2024:11235 nodejs:22 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es) and Enhancement(s): * [Rocky Linux-9] nodejs:22/nodejs: Rebase Node.js 22 to LTS version [rhel-9.5.z] (JIRA:Rocky Linux-67327) rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:1443 Important: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * undici: Undici Uses Insufficiently Random Values (CVE-2025-22150) * nodejs: Node.js Worker Thread Exposure via Diagnostics Channel (CVE-2025-23083) * nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap (CVE-2025-23085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:1446 Moderate: nodejs:18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * undici: Undici Uses Insufficiently Random Values (CVE-2025-22150) * nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap (CVE-2025-23085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:1613 Important: nodejs:22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * undici: Undici Uses Insufficiently Random Values (CVE-2025-22150) * nodejs: Node.js Worker Thread Exposure via Diagnostics Channel (CVE-2025-23083) * nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap (CVE-2025-23085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:1743 Important: postgresql:16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm 44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba pg_repack-1.5.1-1.module+el9.6.0+32421+7c015469.x86_64.rpm 9c7871759688428d1a5595c09ea668b57d143a59f80717028131195b2d811b0c postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm 6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259 RLSA-2025:1741 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, postgres-decoderbufs, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd RLSA-2025:7426 Moderate: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * c-ares: c-ares has a use-after-free in read_answers() (CVE-2025-31498) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:7433 Important: nodejs:22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * c-ares: c-ares has a use-after-free in read_answers() (CVE-2025-31498) * SQLite: integer overflow in SQLite (CVE-2025-3277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:8468 Important: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, module.nodejs-packaging, nodejs, nodejs-nodemon, module.nodejs, nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-20.19.2-1.module+el9.6.0+32143+ae966e5b.x86_64.rpm 215b5c308a209a8b2539fbaf5dddb2e2a7d1cb6397b33e8909c43cd701fa5ccb nodejs-devel-20.19.2-1.module+el9.6.0+32143+ae966e5b.x86_64.rpm 961c1eb6439e9dd2b0f13cc88723986b074724bac186d03614656f74dda6924b nodejs-docs-20.19.2-1.module+el9.6.0+32143+ae966e5b.noarch.rpm 52da7e7239bea77e8c0951f05b3a564bbbafcd2ec99e1c976beb1bcb12f18c62 nodejs-full-i18n-20.19.2-1.module+el9.6.0+32143+ae966e5b.x86_64.rpm 328464d5bc3076c68b69bc4fa0a62ec3301b7d7b90d2d334143f3852e349a131 nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 npm-10.8.2-1.20.19.2.1.module+el9.6.0+32143+ae966e5b.x86_64.rpm f766a0571694f2fdc65bee67d662b85b59ea64dc0eb26afcab5d10b47c41ba36 RLSA-2025:8467 Important: nodejs:22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:11802 Important: nodejs:22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nodejs-nodemon, nodejs-packaging, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.6.0+32494+726e9034.noarch.rpm 787c364b5cca1c605e187829977aab85ba73f1c4cab92f980cbd61a7c2b351ab nodejs-packaging-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm c333390ff2cf335b6520b56d5977fefa685bc2cbe63507b88d84606f60f7e856 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32494+726e9034.noarch.rpm 4966a7bce540e0ef7b4db930da40b969a81fe35fe86a7e57943cd2a06b5a07ff nodejs-nodemon-3.0.1-1.module+el9.6.0+32185+bd121a25.noarch.rpm 6f60d28a39e3a61d88488fc343cdc91f7f4491c3c049cd7b6f78d0209e618b3f nodejs-nodemon-3.0.1-1.module+el9.6.0+32143+ae966e5b.noarch.rpm d98b8d4ec1de433413fa16e593f5c0d452475ff006ee8e09f91faa78cd41f181 nodejs-packaging-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm a2fedaff8ed92adeb63a32e97cb93d5adc75eed09f0fb399864fc526926762ad nodejs-packaging-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm befc37f243b8784030cafb7e8ce15f5a430a832518d1eadde4f814902f916202 nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32143+ae966e5b.noarch.rpm d7249c5a14816f6a769b6a013bf0906289dd2b584a3c5386b6834c07454634ab nodejs-packaging-bundler-2021.06-4.module+el9.6.0+32185+bd121a25.noarch.rpm 18b7a248a582e47d333a2bac9064d6df824cbe8e0dcd56249f16196e31ea4808 RLSA-2025:14416 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.14.0-2.el9_6.x86_64.rpm a00cb800c70ab64b15000c3a6cd128d93681ffd96716a56845c12ed22a41745c firefox-x11-128.14.0-2.el9_6.x86_64.rpm f0e47c92c03886250234b16b6f29e0d6b18a3a6683cef9fa9b8ba8d4ce767a5d RLSA-2025:14827 Important: postgresql:16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, module.postgresql, postgres-decoderbufs, postgresql, module.pgvector, pg_repack, pgvector, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715) * postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.6.0+32421+7c015469.x86_64.rpm 44f2f1e9f722a609f8b16b45e5259da038693fbc405e69d7b14718469b2897ba pg_repack-1.5.1-1.module+el9.6.0+32421+7c015469.x86_64.rpm 9c7871759688428d1a5595c09ea668b57d143a59f80717028131195b2d811b0c pgvector-0.6.2-2.module+el9.6.0+32421+7c015469.x86_64.rpm 5afce869157e22defd5621fdac042a86d099faea11dbd23704218e2342f53247 postgres-decoderbufs-2.4.0-1.Final.module+el9.6.0+32421+7c015469.x86_64.rpm 6c0d28f9696b70cb64bf1ea575a6154a3b5f70c1ecd5e0dbd4f9d538c0fa7259 postgresql-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm ecbc350ef3bd072b8e6da4c81c3f70d0c9c96a7e303a5fff9bd5aed6b627b922 postgresql-contrib-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm cab6ad04f5f5b7049bfa9e4537d7c5fd0530ac7390916063e31ba174b2fd56f7 postgresql-docs-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm f92cfcb433c9c128055d1b47581793b8896436d032a7dd72384c227351eae7f8 postgresql-plperl-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm efcb0ef045230105066c0a92e7cc635f9105353bb7a3fe33db256c5aab9af9ff postgresql-plpython3-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 2f28994ea7ba885045fbb615f8e9a3338d467e3cf76c29f6eda1b3cb9987f992 postgresql-pltcl-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 729f9964a9b24fa32a73771a41882ee5ef3ff9bcf10a87a04f67827c3d1bfca6 postgresql-private-devel-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 4182daa15e8bbe8f1f77342d64667f2ae64a2419343b6d55365f00c1f3c7f19c postgresql-private-libs-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm b250913e162dc556e12789da5c0d8533fca6eda2d29a9a37d657fc86211f6f51 postgresql-server-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 3208974c0672ba6402a4fdc373c1867487533822f0c29eb09d5afe8a8e31d2a0 postgresql-server-devel-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 592497af8fec129b741bcef1c8095e2aa4dad071fb6ccde40f5d7b7ee8e55d26 postgresql-static-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 3a9f59ca2b46c8278f88e456221b59521e93006523bd2e88c06cc7d2efd7c2e8 postgresql-test-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm 026e61cebef8c440d347d9fb16950cc2176d48406013f87a4bf170696ce18c1a postgresql-test-rpm-macros-16.10-1.module+el9.6.0+32421+7c015469.noarch.rpm 4ada8834c4c16c97050d8df55fc77ee721f57437361c5e3f95387dde7b299fa1 postgresql-upgrade-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm e4e9e7247245caec00687d42b6a4185bb90439e23d4113f4f9329ba680e96693 postgresql-upgrade-devel-16.10-1.module+el9.6.0+32421+7c015469.x86_64.rpm d354bfdaa625726a9ffe6f9b73c3cc3c085c4213ed2aa3c767214655825eb0bd RLBA-2023:3731 krb5 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * PKINIT module initialization fails if a well-known MODP group cannot be loaded (BZ#2209715) * PKINIT: CMS SHA-1 signature verification cannot be allowed in FIPS mode (BZ#2209717) * Make ticket signature optional during PAC verification (BZ#2211388) rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.20.1-9.el9_2.i686.rpm 423d2b587d56ac0301d527189b012696b7aa99dd02fa8e8de358a47e69723fd3 krb5-devel-1.20.1-9.el9_2.x86_64.rpm ebf85e5d850e4d02a13aa028e709983d65829a80422d24d950844127f6db5188 RLSA-2023:3147 Important: apr-util security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for apr-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. apr-util is a library which provides additional utility interfaces for APR; including support for XML parsing, LDAP, database interfaces, URI parsing, and more. Security Fix(es): * apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms apr-util-1.6.1-20.el9_2.1.i686.rpm 025e1c288aa9d2bdd95c3af0a8d8bf29df0b3c47fca1dce2d89282ae2935a99e apr-util-1.6.1-20.el9_2.1.x86_64.rpm a2e36b65ea809a0f3109a1f1e48e418651d72efd3806489ce6c1f01c9ee11617 apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm 96bfba7a875ae5522e5c3b670a40912bf7cbfdd8cdaf3eef179109037622d19f apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm 08cb535b0e2e733faf60c121deefd92786c667ac011e30f3439d1adbb8855405 apr-util-devel-1.6.1-20.el9_2.1.i686.rpm 144f7b405e34575bd7fb52ab53e71eb04011f384228e81621389402f6ec08d30 apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm e40e92ae468c02d09c2cfc4586b3cb291270d5e11032fa13d3bdfa6c0e7ec5de apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm e1616d1c4c1aecc2bd015fec9dee520713a10a836dddb78224d8c9c7f9ea096a apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm 9f06de3b2f3c15222ce8922a59d6d8281408bfb543905a50debb290673331d3f apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm f5533d062878ee491627552a0b1e48d32cd4a1e3ca2ce8482dcd8d55d3b9f1d9 apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm 267b4fd421b0796dc864fefcefc25dcab74e8773cfc90d97e1e0c31e292a7af7 apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm 4425dc475f32ed789c59f313c72258d620231b33a42461865badb1d2b6199151 apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm a55c136788b18d94f6daa8340d5d83a6812fbcc3f0653fb4e8c6bd676789b3a8 RLSA-2023:3587 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.12.0. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.12.0-1.el9_2.x86_64.rpm 38d3108be48db5b0b72539815eeac50fa19abaab3c9adf8106c5678ba43880b1 RLBA-2023:3712 linuxptp bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Bug Fix(es): * ptp4l not able to recover from errors on netlink socket (BZ#2208210) * Don't re-arm fault clearing timer on unrelated netlink events (BZ#2208265) rocky-linux-9-x86-64-appstream-rpms linuxptp-3.1.1-6.el9_2.2.x86_64.rpm b31c54177ca11c225210e4583f4f50ef621e990d2434c32fbf39904eb4278f35 RLBA-2023:3721 ansible-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es) and Enhancement(s): * ansible-test: Fix vendoring support rocky-linux-9-x86-64-appstream-rpms ansible-core-2.14.2-5.el9_2.x86_64.rpm 408bb6eaec63e1ccb940c0fb35efdf5e767d1c14d9035c7453934a504c8d8923 ansible-test-2.14.2-5.el9_2.x86_64.rpm b875f745b9f28d3b064f8cd17d5081ce6669ac3de49e1fbac004d758ba1a671b RLSA-2023:3923 Critical: go-toolset and golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for go-toolset, golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402) * golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404) * golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405) * golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.19.10-1.el9_2.x86_64.rpm b18c663f7c932e10004181efc2790aef320b1227213b13c46ee6b7ac7ff3bcf3 golang-bin-1.19.10-1.el9_2.x86_64.rpm 2f3b0ac988259da21fc4a4343ac01d9e842bfb5ab03659396f3ea150113a2c6e golang-docs-1.19.10-1.el9_2.noarch.rpm f13da42269450bbd760e96548ecf979395c5a235dda03801a21a4ef595f68977 golang-misc-1.19.10-1.el9_2.noarch.rpm 1b553ecb1d2cf30dfcf5252933ef1dced2234408cff090c186b4e1d98f7a4166 golang-race-1.19.10-1.el9_2.x86_64.rpm ddd8825766d02b8f0330f0acf89d607b1de9c53d797a1d5583dae6d9e90cae04 golang-src-1.19.10-1.el9_2.noarch.rpm 6017b1aa6dc6661868e6bf2c443af54982dfc73f9078b4fdbab5a3bb52998195 golang-tests-1.19.10-1.el9_2.noarch.rpm 4c918bd80d40bf8ddb1c12d4f5809faa346292daed691511808692710ebaafc8 go-toolset-1.19.10-1.el9_2.x86_64.rpm 69c95eb5a1d3ed7f2d87dd40233e3fb3a9cc2b1d635f1293b836240f237f205b RLSA-2023:3948 Low: open-vm-tools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.1.5-1.el9_2.1.x86_64.rpm ec2f977d437b3b3f1b86bdbb8e817f6481cbef390ae24dfd7df79d6bb7da5730 open-vm-tools-desktop-12.1.5-1.el9_2.1.x86_64.rpm c6e12901888737aacb747e4cc5422c2c3607faa37cfe19751283c39b6ac69fe9 open-vm-tools-salt-minion-12.1.5-1.el9_2.1.x86_64.rpm 3457b2540bb62345612aee9e112563b30e9ae70cb22aa9a8ff8bcc98f9d477c6 open-vm-tools-sdmp-12.1.5-1.el9_2.1.x86_64.rpm e7fbe86d51f3e67e42a59a8c58f7c1232f95bbd72b92085cd2db06f416ae5f40 open-vm-tools-test-12.1.5-1.el9_2.1.x86_64.rpm 2c4ccd88ed04b84056bd87d74fbeb9c20c5b09e2b248358bea59df919ad1cf9a RLSA-2023:4030 Critical: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: account takeover possible when using Azure AD OAuth (CVE-2023-3128) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.0.9-3.el9_2.x86_64.rpm 198cc24bc72bbc55e6ebdfdfb464c74ee584a58f7f8dadbc580245844db21621 RLSA-2023:4099 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-11.el9_2.1.x86_64.rpm 00192b7f42a86854bc750189cb1a8cc64294d7d7abdd0408eb7bcacca4853d3f bind-chroot-9.16.23-11.el9_2.1.x86_64.rpm 6332182bf6202c8ac4fc513aa4a636590cc78af610e75d34bc2f1b1da221751f bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm 619e25a841f104d76eeed2139a438e3d47302318eb143d73428a3b025201ae00 bind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm 6f4daef396587960ce972f1bc27b4e0cdf18768a94b26769cac28cadf965d358 bind-libs-9.16.23-11.el9_2.1.x86_64.rpm 9e410cedf417d88f0cdc1b953d63a412499c75d04a9e9205b4ba21b6925ef03f bind-license-9.16.23-11.el9_2.1.noarch.rpm 1cdb4051deaed39ff89e96a2e9a8235af331cf28fc8c77ec2f41cc88eda98530 bind-utils-9.16.23-11.el9_2.1.x86_64.rpm 73a44b80541b9c9c6f0929cb8d155e96703aaa04d29426d16e13459fd303c613 python3-bind-9.16.23-11.el9_2.1.noarch.rpm 9c850d2bb211ab45477a3a18ee59931f011b1993d22c9831e2bb0e33888a774f RLSA-2023:4178 Moderate: java-1.8.0-openjdk security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-9] (BZ#2220662) rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm e72a5c6769e621d5e095a55540a275399d6858831955c9a3bcfc3087361c0fe5 java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm 74026380889f60033d36c9758402ab4172456f5791a52fc0dd41a2f1cbdc1209 java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm c6716a507cbb614c018c1b6493884d4f4808838ab3ec26b12662aabc29c2f753 java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm 8c334b8b4e0a910546ef0ccd281ece82ea8ae3e2e622c3d4370de1a05afee4d9 java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm b5e39c366b1d4539a4b44607cc756218c8ca7ac87b0801a15743a1a1269db091 java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm 0b6ccc2f05590f4b3ad0c39b80740421dc94f07dfdcc6e265e4b9cd1e8bccb7d java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm 6db056f7fa19681dd06852a93f9d5720c5f31cf886681a97a66571cdb6f038c3 RLBA-2023:4374 java-11-openjdk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * The recent OpenJDK 11.0.20 security update accidentally removed a runtime dependency on the tzdata-java package. Installations of the package on systems that did not already have tzdata-java installed were left with missing timezone data. This mistake is rectified in this build. (RHBZ#2224428) For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.20.0.8-3.el9.x86_64.rpm 35ceef7cc9f3c8e3059cb547c2c42ae25fc05297fb7b22297b347651d19c8413 java-11-openjdk-demo-11.0.20.0.8-3.el9.x86_64.rpm f3aa9dee6aaef3d82791f7be3ebcacbf1b3fe30c1d9bff3740e796b54dc868ee java-11-openjdk-devel-11.0.20.0.8-3.el9.x86_64.rpm ffb78cda1474cdacae155883b75092b8e68b6c00b37edec7086dd4f8c77263d3 java-11-openjdk-headless-11.0.20.0.8-3.el9.x86_64.rpm d286296da8b8c8aa5befa707af931a264f551a1fb191748b57318af0e37ce331 java-11-openjdk-javadoc-11.0.20.0.8-3.el9.x86_64.rpm c6826fadd7b415a310410f8e8a37999b8c756e32aac595173b439f03b25be26d java-11-openjdk-javadoc-zip-11.0.20.0.8-3.el9.x86_64.rpm 6abf017d2a373a138fdabb4822a0fb6649b057807f90caed2904167dc0127ce6 java-11-openjdk-jmods-11.0.20.0.8-3.el9.x86_64.rpm 9fbacbd1d6070c757a88a18d6ed655dc0b4be7cb562920a9cdb8a7035e608861 java-11-openjdk-src-11.0.20.0.8-3.el9.x86_64.rpm adacf4c3012c7d5e80e3d1c4e49067b3dcf6efbd8590c5deecc0cb2d084797d9 java-11-openjdk-static-libs-11.0.20.0.8-3.el9.x86_64.rpm aedb8d0a43dc07178fd023aaddaae73c8738965ace056499592d1da68afb7227 RLBA-2023:4375 ostree bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * backport https://github.com/ostreedev/ostree/pull/2874/commits/de6fddc6adee09a93901243dc7074090828a1912 (BZ#2224105) rocky-linux-9-x86-64-appstream-rpms ostree-2023.1-6.el9_2.i686.rpm 747e2be3560f4ecd9b49ed63940d92997e4a4b207c67119375e302e6158f8f1c ostree-2023.1-6.el9_2.x86_64.rpm 0f30b965cf6a892b71215353c0a7162a5a09ed024e3b3774a36676852423ef58 ostree-grub2-2023.1-6.el9_2.x86_64.rpm 2be3823f8a3953ab05c7a2770a7bd8b4a280cdc48e2acf553bbd5adee97c0ee6 ostree-libs-2023.1-6.el9_2.i686.rpm 41d3ec4ae2fe02b392db626fb56725099c54cd2d77c56e03ff10e5b2cbe95494 ostree-libs-2023.1-6.el9_2.x86_64.rpm 85805e28384fcb598c577e934eebe212927c39e8597a0eb3adf6c58a922ddffe RLSA-2023:4201 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435) * webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm dc34bf349a6ee0a95bbf0263698e34acd29b1ac72465ae3e7acb032adcc299b2 webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm b025681bd3f30e209a8d3ca4f9a716a68818ee4fb527f466ab43298e46908a6b webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm 0bd2d728e1b34637162dbd9d4683acf52d3b74c8533750635c564929c62253cc webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm 056420f51e49ce46ad081147e555de80f800394a700f0ff641554b7de966e5e7 webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm a186b6cf0cbff1d01888edf490b1b0583ae72f1e4317bd5d27fb258fd5a0bf8b webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm 2395030cfa42488d7c4c64a702499fbc9363f985027c3eb0f223c8aae6d63499 webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm ae54f67d81b22ebdaac3a5ee0feb4d97999fb8ea7dce97d636f8037477aa37a0 webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm 6ae004f1ea10a2e6a42e8f224d0c8785d50d4f6cd180aa979668b4a374eec955 RLSA-2025:14862 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pgaudit, module.pgaudit, module.postgres-decoderbufs, module.postgresql, postgres-decoderbufs, postgresql, pg_repack, module.pg_repack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715) * postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.6.0+32420+37c3e639.x86_64.rpm b5b607114ff4e7bcbd0cfc96c249d4db4bd941191f0ddbb909d2e1ee328645b7 pg_repack-1.4.8-2.module+el9.6.0+32420+37c3e639.x86_64.rpm b1259ce7a8aeae8a6528e850ce9ccb5f6e3ea537104e7640dd641b193b6409f8 postgres-decoderbufs-1.9.7-1.Final.module+el9.6.0+32420+37c3e639.x86_64.rpm 878a7923a0aabfe8460e2b231bce254e3776bd94a0ffebf9f3b5f24e0196b1bd postgresql-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 4d315962aa5b49e19f83d5f438c243bec7b6dfb486e5b7d3be692c9ccbfc77b8 postgresql-contrib-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 87305ad2b6abeb88c10fb610509ed50bb411f0a4bbaddf61704f68e3119c4e73 postgresql-docs-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 68814668bec5e30b27f7596988b6256119d1621f6acd6f0963befc7c533db0e4 postgresql-plperl-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 90db611e7e38ad765ad520d6f6a0dfdc3cce8336e5378c7e1a00ceb37f8fcaff postgresql-plpython3-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm e73492a81b9b8b75062290e41ffc73c14e91fb0823c600d52dda398276cf5680 postgresql-pltcl-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm f57e4b4945da9a2b8cf8ec149fff9c3e14fb70954ee1a2b870c7bc93f3cdc06b postgresql-private-devel-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm e70afd15e4dc173988aea53ea2f23522f40f9daa430b4ce528306b02d967352d postgresql-private-libs-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 4671fbd04a5c152a3bf700cba85583413dca4996bb4766a92abe11734b30ee46 postgresql-server-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 235b5977b28b4a00ba5d49ee4411e0f9368bc723970142b9b1c290c6e3dcf428 postgresql-server-devel-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 979eae07d2082df0a74d6b5fa4d43af9179c74c53a3cc27ec5c69737c7f29066 postgresql-static-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 5a18b96893661b5e44f79093425196eab09f1e6610faacef3e22c9c57e442575 postgresql-test-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm f924ee1050c7bda063cfd0096fca89932fc3220ffe35d976b64de179aec5af9e postgresql-test-rpm-macros-15.14-1.module+el9.6.0+32420+37c3e639.noarch.rpm d13023d84387e2a9c60e1a83a46165600a07b9806c6dd6a17c1691bda8b6cd07 postgresql-upgrade-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 0e6b2c11078ed96106972767fffdd8369dce31ce956725e52cc8ecee8852bbe2 postgresql-upgrade-devel-15.14-1.module+el9.6.0+32420+37c3e639.x86_64.rpm 9f0fe833bab71f316451cb657f7fcb7383ab76e8ec87f5493c8b58bbcbabc677 RLBA-2023:4370 pcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Bug Fix(es) and Enhancement(s): * pcp hacluster pmda doesn't report dc status properly (BZ#2222858) rocky-linux-9-x86-64-appstream-rpms pcp-6.0.1-5.el9_2.x86_64.rpm efc73172098610075af75af9c7a64cdd7fd0ad98c61b1c36a733c3fd776a5242 pcp-conf-6.0.1-5.el9_2.x86_64.rpm c034795910bfbe9e57a29d32488ae38d9c4ba1ff808d8fca06e14181a2d9c113 pcp-devel-6.0.1-5.el9_2.i686.rpm a4fa415f87fede4ba8aeb2255c6ca6f6fa87e1bc9fb973f0fa359d144a4cb923 pcp-devel-6.0.1-5.el9_2.x86_64.rpm 429d5805ec0107beaf8ec1d5a043093732aeee4a95afb78b41ec970471fdf0d7 pcp-doc-6.0.1-5.el9_2.noarch.rpm 1ac71cadba70e99cdc664394b81705857c28cf8dc04d171a0c3264d61c00498e pcp-export-pcp2elasticsearch-6.0.1-5.el9_2.x86_64.rpm 410f2e27221985865ca93d8f893fcb856e15a59f61ac1bfacd42c9a3b268d0ec pcp-export-pcp2graphite-6.0.1-5.el9_2.x86_64.rpm cdaebb6489a6dfd2ad0a1939d0e49515ec5e0c7b8d2cdc2b0898cc8e06298546 pcp-export-pcp2influxdb-6.0.1-5.el9_2.x86_64.rpm ffc86bc9a3bfd462f11582ad3adb7859fa72bb308d41696a19b2abc8fe2b2d23 pcp-export-pcp2json-6.0.1-5.el9_2.x86_64.rpm 5d02bd570f01b578882336781c9fbb4ae6aeeefb1f7ceea3166de673153fcd52 pcp-export-pcp2spark-6.0.1-5.el9_2.x86_64.rpm 55d46ff7be399da6e17358003eb2cad8323bcdf839298c67f2514443f4367d7b pcp-export-pcp2xml-6.0.1-5.el9_2.x86_64.rpm 6735e6771d70b61f784e4bbc9fe9bcd83f186b012fe889fd6203c215c9db2af8 pcp-export-pcp2zabbix-6.0.1-5.el9_2.x86_64.rpm 36705211351fee38316f01237f3d1bf402323316261cfb4674d9553a238e91db pcp-export-zabbix-agent-6.0.1-5.el9_2.x86_64.rpm dc269b2319ff947dda67dbcfc66c80d3891ad1fa0a0c11150402bd73db0bc770 pcp-gui-6.0.1-5.el9_2.x86_64.rpm 802dd59a32521cb8c897ea32dc75cd6289a8af98bb06126239f5cf8a6d9ab33f pcp-import-collectl2pcp-6.0.1-5.el9_2.x86_64.rpm 5a1df0483e2a45a4e0f9d8eb9c33c7b9a4d8277de2541b71f2e563e82dbd5dd0 pcp-import-ganglia2pcp-6.0.1-5.el9_2.x86_64.rpm ada8ccab9fb57d3a0e2f1002520d4300bbee02b2471dbcace8b064b6902505f9 pcp-import-iostat2pcp-6.0.1-5.el9_2.x86_64.rpm 6410b617304ef03edc9207a24673eb754d723b28dd50c2666507a44780a9494c pcp-import-mrtg2pcp-6.0.1-5.el9_2.x86_64.rpm 46dca1fe9c12ea5f2be21285fb8d4bda79a05c6c7a2736c984eb1890fe71ed38 pcp-import-sar2pcp-6.0.1-5.el9_2.x86_64.rpm b9b756b96853be83d91f550437f5f431b465c19252e5d19a30427811c6ebb7e8 pcp-libs-6.0.1-5.el9_2.i686.rpm ad55db9acfdf30612e601a70e0d98697aaf496ca90521f90817fb431a675900c pcp-libs-6.0.1-5.el9_2.x86_64.rpm de2e2535f4d187190e66661d244140ee9a783b4910a04967b109a169495c221d pcp-libs-devel-6.0.1-5.el9_2.i686.rpm 46614f08f65f15de6484bef4278ea80d03d5aaf9299852b905c6498b8c978b24 pcp-libs-devel-6.0.1-5.el9_2.x86_64.rpm 68ac27f709e9be4a4c278eed0892e89a3e2680711e1dfeebb11135328afa9099 pcp-pmda-activemq-6.0.1-5.el9_2.x86_64.rpm d34fa54152c4f7e770bfb56eeaad0852dce7f7a83bc40eeb31d8f15dbe0aa729 pcp-pmda-apache-6.0.1-5.el9_2.x86_64.rpm a2db26a17543b50927a58dbc3aec2c249557b13bdcf252021c660ce867313bc0 pcp-pmda-bash-6.0.1-5.el9_2.x86_64.rpm ba7f0b20909697b78ecf8d0383322b8ae9ae02208d97931975b73ebd826c8528 pcp-pmda-bcc-6.0.1-5.el9_2.x86_64.rpm b494ee73dff57b01c423d730c67c948d275e89e07c01484f09cf4779fa779f4a pcp-pmda-bind2-6.0.1-5.el9_2.x86_64.rpm 6592e079e51206fe25f8b1d8df78e78cb17f56664eb45d89a08949652ce8c050 pcp-pmda-bonding-6.0.1-5.el9_2.x86_64.rpm 23d25afbf7fe2fb8fc68ea338722d0706d5a9840022eb3f0841a72fcf3b82d28 pcp-pmda-bpf-6.0.1-5.el9_2.x86_64.rpm 610481ff5c9af95058266cafee643cfb9ffb3f890eda8d009e81bf7b7b1901e9 pcp-pmda-bpftrace-6.0.1-5.el9_2.x86_64.rpm 467294d6bcd9df700fbdb383c9bd2b4c2e12fb50adb6fa1058a99853c19cfe50 pcp-pmda-cifs-6.0.1-5.el9_2.x86_64.rpm 0c7602c592a457080e4179a9a0fb09cc6e850de0021412c5fccf8fc46af5684b pcp-pmda-cisco-6.0.1-5.el9_2.x86_64.rpm 0d4b79bdf5353f9f7d2df40965b6ff1640875183a75eb3c95ece25dacb53a8c4 pcp-pmda-dbping-6.0.1-5.el9_2.x86_64.rpm b8233efc9bc2e54d362bcd7d0e489f8c42dc469e00a81de0dfd598ecc005e20d pcp-pmda-denki-6.0.1-5.el9_2.x86_64.rpm 038ce31e64ad26f5036eb1804548e43920d6c3a55b9a6a61b43a9db6961f12c9 pcp-pmda-dm-6.0.1-5.el9_2.x86_64.rpm 7f4ff77b4094d9a0b95f8d76b23be7b2807d2d195eae246a084ae42fe42dde50 pcp-pmda-docker-6.0.1-5.el9_2.x86_64.rpm d2a4dbd4dd90bb121dfc10b3c427a84f2b7cd75f60fe3756f47efc3f984b7ec0 pcp-pmda-ds389-6.0.1-5.el9_2.x86_64.rpm 9a2a6592b639a5d9596455c0c7a100a8a9a8ca5b107e21b5af3e1b77dd1abbc8 pcp-pmda-ds389log-6.0.1-5.el9_2.x86_64.rpm b6d5747c9da77bc6240232218f3778fa2cb3de23591ea7525cfa3011ef3a10c5 pcp-pmda-elasticsearch-6.0.1-5.el9_2.x86_64.rpm a83bb386328859735517797e483b1a6f1a217f96bdc6d30605783fb914b799d3 pcp-pmda-gfs2-6.0.1-5.el9_2.x86_64.rpm 3a1466cd147060e5812ec989c8cdb0a3cd52a6dc3903342698611013ba7de389 pcp-pmda-gluster-6.0.1-5.el9_2.x86_64.rpm b194c8edacf9e6dc1922eca81d122b050184d821cb200fd3893191bec261f5ff pcp-pmda-gpfs-6.0.1-5.el9_2.x86_64.rpm b31d96e0e429820ec816be7e67b4faee92612096807bb729b82904a88462d242 pcp-pmda-gpsd-6.0.1-5.el9_2.x86_64.rpm 67913261b31acd722ea411e2351b4d471ef5de8c68d8f7ba485bd655c50c3fdc pcp-pmda-hacluster-6.0.1-5.el9_2.x86_64.rpm aabefaf20b6e88a1b1889c0814dc44a1d1ca0e59b79fc7dbc44566148e6d4187 pcp-pmda-haproxy-6.0.1-5.el9_2.x86_64.rpm 27d943aca00f5737ea55ac208794fa40b522a7c75ccf5e8a44ae2d362cb85e32 pcp-pmda-infiniband-6.0.1-5.el9_2.x86_64.rpm 5eab55c138dc1bc1e97e09bb21eda75515d729ed60e724456aea6b2b98213177 pcp-pmda-json-6.0.1-5.el9_2.x86_64.rpm dabe200b343131c474663c7dd865a0ffa7e0700c3651d831047720b54bc3b607 pcp-pmda-libvirt-6.0.1-5.el9_2.x86_64.rpm 6b2ac5ba8ce94330224ecef9c01ef30533281f48a160a19c9ff5aaa8a9c97966 pcp-pmda-lio-6.0.1-5.el9_2.x86_64.rpm 6f2ff540d8ad870ab2d701f671ddbe37118d4186ec41e2c16b3732f5061624ce pcp-pmda-lmsensors-6.0.1-5.el9_2.x86_64.rpm 9d0c54eecd48381f89609c3656abbf7c5a13db47703d8e8ebdd6057868c8bc3b pcp-pmda-logger-6.0.1-5.el9_2.x86_64.rpm a2601b79f2b71577016f1172568d74aca179a0a3f56f5103c7b4f4d001518025 pcp-pmda-lustre-6.0.1-5.el9_2.x86_64.rpm 6337b28b138b653fda835e16bc57ea1dd71ac267e622adf4e8f4193664409c7b pcp-pmda-lustrecomm-6.0.1-5.el9_2.x86_64.rpm dccf972542442753eb11d9361fd0d3ff384538a56934e219c4ed1bffa5f102e5 pcp-pmda-mailq-6.0.1-5.el9_2.x86_64.rpm 8e40be49b9dd9ff9ac0cd973fdbfe25de22ac8faec52b61fef958d85305cca38 pcp-pmda-memcache-6.0.1-5.el9_2.x86_64.rpm 71471e52916ed1e1e0a59c5dca3dab26c5cf1b70f0acf66c8c795214655642ef pcp-pmda-mic-6.0.1-5.el9_2.x86_64.rpm f5d227aed2585548cb1ebf3273709f9abc949fd74407a0fa4ef0c618afb730a0 pcp-pmda-mongodb-6.0.1-5.el9_2.x86_64.rpm 60cdcfbb4661d2e8ec36bedd63c32a82f49ab97a2459fcba1b3dc3824c43f3c8 pcp-pmda-mounts-6.0.1-5.el9_2.x86_64.rpm 0ee4fc926777b3940f1aced582215499ec69abca1e5b58ce9c401bef89eebba1 pcp-pmda-mssql-6.0.1-5.el9_2.x86_64.rpm 0347666dcd615081e41e2255a4ff6b2a3cb9b4a9aa5c44fc768fc32daebb1688 pcp-pmda-mysql-6.0.1-5.el9_2.x86_64.rpm 2129a629a188fbd77f292c62ab5ddc9e6f1e6d12a2c8505a5a8502bde4039f36 pcp-pmda-named-6.0.1-5.el9_2.x86_64.rpm ce33623c553be10bb772bbb6e35ee4a9e519e2e05822fe7b0726e742f32fef4d pcp-pmda-netcheck-6.0.1-5.el9_2.x86_64.rpm 8e5b555312a13a0bfda314aa31beeb0c32c7bcc4b5af94dfeb86ac0f8c49cf56 pcp-pmda-netfilter-6.0.1-5.el9_2.x86_64.rpm f3eb4c10ec9e5ba6077936ce5d91724699f0627c48438caafcfe9c4cc7478468 pcp-pmda-news-6.0.1-5.el9_2.x86_64.rpm e54ab7bd5e6fe555decd686f21c6098b2d704bcec52d2774a275a363168699a7 pcp-pmda-nfsclient-6.0.1-5.el9_2.x86_64.rpm d73bc32dabeb13cd64adc0d8dad49f888c3b32cff68657279c35e39fa7e3de81 pcp-pmda-nginx-6.0.1-5.el9_2.x86_64.rpm 5101ed720a5ceb748b89d7abecc28f4a244666eba8309ce303f8fa31e667c6ec pcp-pmda-nvidia-gpu-6.0.1-5.el9_2.x86_64.rpm fbcd9d569850f258939d7712ac84e3091387ad26a679cbb0d1292324919c7b08 pcp-pmda-openmetrics-6.0.1-5.el9_2.x86_64.rpm 8eb310c049b76fa5700a4b9ade86723c89b5ca09e44614fb01a5f594f0823e5b pcp-pmda-openvswitch-6.0.1-5.el9_2.x86_64.rpm a90ea120d174537d3795f415616027bffbd2c011bc537db20da79f00412eeefa pcp-pmda-oracle-6.0.1-5.el9_2.x86_64.rpm a3fee86c66fa1392bd340d6ae6346058dc51578b9abb016605631000cad3a10b pcp-pmda-pdns-6.0.1-5.el9_2.x86_64.rpm 3d27489f3be689b46016cfce8a63922b1d2e5cde5de823ace5a72b7cc68bd0a8 pcp-pmda-perfevent-6.0.1-5.el9_2.x86_64.rpm 72c64979f429d48e871555fcc887bbe9c7e9a8b7dd55822485be028b6e48662e pcp-pmda-podman-6.0.1-5.el9_2.x86_64.rpm 1fa39d896eebf75d0f56cad66204868694a7308d77a4d32f344c749ef39bf6de pcp-pmda-postfix-6.0.1-5.el9_2.x86_64.rpm 48d81f2ae128c311e0fc5a9770c4226fbe4c8714680ba74c6b77db0e67233b33 pcp-pmda-postgresql-6.0.1-5.el9_2.x86_64.rpm 6dbab8cda5cc308388ccd56cd5403b170b4af698db133b79c05e0af2f3c3d007 pcp-pmda-rabbitmq-6.0.1-5.el9_2.x86_64.rpm 397bc80635bd87e21b1ea94bc6cea95791f390e0f2022af3188b3ce615ca350e pcp-pmda-redis-6.0.1-5.el9_2.x86_64.rpm d16dd727a4ce3667dc3890910c494983e41888c86db5ac6a1fa5e926b4f24863 pcp-pmda-roomtemp-6.0.1-5.el9_2.x86_64.rpm 52c7d92aa3776eb927afa318cedb357fee8d99aad002e35d8b0b2afd75de824b pcp-pmda-rsyslog-6.0.1-5.el9_2.x86_64.rpm 648578b1810c0fb9e1ef282ab0400fcf36ffc18ce0813683ef589181e4c26cfd pcp-pmda-samba-6.0.1-5.el9_2.x86_64.rpm aab8fa5d5ac72b10886d53649c7c4276b952d27031e53d51c8ffef490aa7203c pcp-pmda-sendmail-6.0.1-5.el9_2.x86_64.rpm 84fe4252b49e4a66f73ffec4ad4e266ddaf0161687108c90b35959565eefafa1 pcp-pmda-shping-6.0.1-5.el9_2.x86_64.rpm 88def4c33b9a69180a1e30835bbc1e1deef1301dd5fa462c8a25b3ecc2ef786b pcp-pmda-slurm-6.0.1-5.el9_2.x86_64.rpm d7486ba815184c3a36b90dc0d7f7e1cbacfea6313db4d74a0edfcfd037cb7450 pcp-pmda-smart-6.0.1-5.el9_2.x86_64.rpm 3bdc25fa80c2469d11e0ce0af2632988a1f09fd38841c2c9d864cac682e60cc1 pcp-pmda-snmp-6.0.1-5.el9_2.x86_64.rpm f48be492161af69cb262f590ccf3d805ed0aca746502709e55de746280a248e6 pcp-pmda-sockets-6.0.1-5.el9_2.x86_64.rpm 420619fccba79fe4eb93779a3ed8c1f946fc4b322f4d4510a6fe451e4f2b51e9 pcp-pmda-statsd-6.0.1-5.el9_2.x86_64.rpm 5c89643e8d62e218b163fb68a6a395a153fdda8cf3213b7a39b6a7cff4fb3658 pcp-pmda-summary-6.0.1-5.el9_2.x86_64.rpm 2f3148ee069f87707f1c5257e307a5789baec9fbf105d75103a2d19bc0799416 pcp-pmda-systemd-6.0.1-5.el9_2.x86_64.rpm c27b03466c8a534d78641432bb94ffec9306c8e1ed582d49376672bdd0e4cd04 pcp-pmda-trace-6.0.1-5.el9_2.x86_64.rpm 1333aeeb8101e41ddb26922435a2b6f136cdc5789e72b5809a005d2148a34e22 pcp-pmda-unbound-6.0.1-5.el9_2.x86_64.rpm 44310839328a144ffb1cd7c66b3dd510607bff22e3262de1905a17b3d060c81d pcp-pmda-weblog-6.0.1-5.el9_2.x86_64.rpm d419b9161e3752520a3e25cac4286642e808ca4a6382dde04e586cc6cce53b7b pcp-pmda-zimbra-6.0.1-5.el9_2.x86_64.rpm 872cbe9689fce80f1d7adfb98be053708625cd91222d8eeb0e07c91c9f17f498 pcp-pmda-zswap-6.0.1-5.el9_2.x86_64.rpm a1ecab777a30d23432d38ba3a4432f8b62fdabeb4ad37a1fa7a501ce7c1c347f pcp-selinux-6.0.1-5.el9_2.x86_64.rpm bf7224ba117d31fca6a0fa38b1b68f8ef1ce716d075ad353c549754a1f947c48 pcp-system-tools-6.0.1-5.el9_2.x86_64.rpm 6b70ee032d3d0855e41f35713ea872077de4bc84e6f6d329d4fa4ce5783124fe pcp-testsuite-6.0.1-5.el9_2.i686.rpm ba9cc512829000ae1357009343f5758a0cb13581460652abed98f095de67b9e1 pcp-testsuite-6.0.1-5.el9_2.x86_64.rpm 23023a08fe8848fff89ffacdaedd075c0b64a8c143a55fb5dd98e3a3bb17c537 pcp-zeroconf-6.0.1-5.el9_2.x86_64.rpm c3f4bbe552f31395e85cf57f3c67b74353ea5298f498bbdb6e44242778b0d5cc perl-PCP-LogImport-6.0.1-5.el9_2.x86_64.rpm 9449f72d93e44f6d0d9b436f1d83398b8e7c0b5668ef3f9eeb60f839879c4b91 perl-PCP-LogSummary-6.0.1-5.el9_2.x86_64.rpm 34da646b9e70709d5bf1e808807b168f9add2509513413a47b4cc8db36ca5a20 perl-PCP-MMV-6.0.1-5.el9_2.x86_64.rpm f37854c61720ad5c6d613c687eb89375485bb7639456d2bd39d119a162cf53f6 perl-PCP-PMDA-6.0.1-5.el9_2.x86_64.rpm 7a507bfdf44509470c9816771382ae5c0f7c56b3b8f0be2e46ff472c5756a32f python3-pcp-6.0.1-5.el9_2.x86_64.rpm 083101b59a7bcdfee4425c03e322ea53f3ab0a1145223dc34d8e37050e6bff9c RLSA-2023:4462 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.14.0 ESR. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.14.0-1.el9_2.x86_64.rpm 0064dfc397c76c3480e31e48ceeaef75a4c43255e0f5783507b7938b96fd2ae0 firefox-x11-102.14.0-1.el9_2.x86_64.rpm d78d8fd2b1f4ed6de359b72b361f34669b97bd46d6089c2ebcd517abf9879492 RLSA-2025:14878 Important: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715) * postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.22-1.el9_6.x86_64.rpm f8c2b5c47eac3aa25c3c344d4919997b386ea3c48d33db4de260c4f4fe7a66b9 postgresql-contrib-13.22-1.el9_6.x86_64.rpm beb538ffa1ebd97e636f72be07397c9293bd34c33354c790f4008d19690c4383 postgresql-plperl-13.22-1.el9_6.x86_64.rpm 9457d3c9e2125185a11db80202f5323026b0560e705d344332884beb629715df postgresql-plpython3-13.22-1.el9_6.x86_64.rpm 57a32e006b064864fa6c8d3bbf53f0ff3ddd34c6cc975ff5a72be99b9d7fa7eb postgresql-pltcl-13.22-1.el9_6.x86_64.rpm 5e5bb3001f05db7fdac1121ee668c591a992f0afc652a72d7211c33d440291fe postgresql-private-libs-13.22-1.el9_6.x86_64.rpm 008bb2f25a360d4f44e30076fe71883fd6603fbc686c57181fa53fc53aa310bb postgresql-server-13.22-1.el9_6.x86_64.rpm 052e56fed09d1d1834eea851120cd443e50319aab693ae891c58c3682974802e postgresql-upgrade-13.22-1.el9_6.x86_64.rpm 430ed6db1584335bcb360872c4caa4c5f24c3f6b8275ec3a4aa4a0e6c5d98c06 RLSA-2023:4499 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.14.0-1.el9_2.x86_64.rpm 3d9c1e8839f2818aeaa5c4fea6e5e948845fa3d93bbccb55bbe67801d99488a0 RLEA-2023:4366 alsa-sof-firmware enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The alsa-sof-firmware package contains the firmware binaries for the Sound Open Firmware project. Enhancement(s): * [Dell 9.3 FEAT] - New MB with AMP Codec Change on Maya Bay (BZ#2218951) rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm 42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117 RLBA-2023:4365 cloud-init bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix: * The system did not generate SSH host keys and lost SSH connection after cloud-init removed them with the previous update to the cloud-init package. (BZ#2217065) rocky-linux-9-x86-64-appstream-rpms cloud-init-22.1-10.el9_2.0.2.noarch.rpm ceb7cd0bf27e1b4a8bec4a619227dfec7ca158288b9c623066d1c62b3454ad1f RLEA-2023:4372 WALinuxAgent bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. The WALinuxAgent package has been rebuilt to include the new subpackage WALinuxAgent-cvm. (BZ#2222947) rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm 4109c3f9f6167c0a910ad05d7d2b00fd7a36936a512a7b6b98b4a68d0a0156d5 WALinuxAgent-udev-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm 80b4e9bca7804e88cf29197abb27e6f802a9c0e3404a9270c7b18793578a5d5f RLBA-2023:4592 nodejs bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * nodejs: Coredump during --force-fips (BZ#2227919) rocky-linux-9-x86-64-appstream-rpms nodejs-16.20.1-2.el9_2.x86_64.rpm e42a9b9650cca99275ac97cd40b96a8e55e577f68a1142f93c1ab3615700ccdf nodejs-docs-16.20.1-2.el9_2.noarch.rpm db6aa3445e6355e7533e98d9bf0588ecd409427c907b4edf9f04ace0bc6edead nodejs-full-i18n-16.20.1-2.el9_2.x86_64.rpm 7f00bb635b1f5ff8eacd87fac0520d254382fd9334c6d35961ef7467354d976c nodejs-libs-16.20.1-2.el9_2.i686.rpm 38dbeb9ed25f5afe765828ad568c3d3842a359ea1aaa58483c975efca49bcd76 nodejs-libs-16.20.1-2.el9_2.x86_64.rpm f02193bcd47c79f60a0453ea5bf5d50b494ff6c5a6ed5250233d4895f8a689a0 npm-8.19.4-1.16.20.1.2.el9_2.x86_64.rpm d2b0f36dd69add0b05c91c9720fc1483e2a3495dc627001f396ef58626fbfd9a RLSA-2023:4634 Important: rust security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. Security Fix(es): * rust-cargo: cargo does not respect the umask when extracting dependencies (CVE-2023-38497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cargo-1.66.1-2.el9_2.x86_64.rpm 81a1fd466eb40011c219accce4194a8cd0070c0fc759eff2e29f0aa5f188b23a clippy-1.66.1-2.el9_2.x86_64.rpm b60c9b4e12b9f4a00a933ca4906959e8fafc8b51d62c84b77e602fcbb0d8233c rust-1.66.1-2.el9_2.x86_64.rpm 63c1e59419adcee2eb7c88538312e2b966a38519040b6d885084c533a03a7c90 rust-analysis-1.66.1-2.el9_2.x86_64.rpm 2f5f936e87947b8cea32837c46446e98b4bc52dd40e5bacd14a2c358eb7dd05b rust-analyzer-1.66.1-2.el9_2.x86_64.rpm 8ce8841ede82f5cb4b46d7173917d91e539eced3cbe504243903ef5c4552ff0f rust-debugger-common-1.66.1-2.el9_2.noarch.rpm 6509fe6d48ec51e2f647c5ce6da22a347ebde6df8de7b3352bf2f2e5340d4fbd rust-doc-1.66.1-2.el9_2.x86_64.rpm 7b77cb493c34269ee82f8cdded77b613e0f55abad51d29382d51b6a6bf730703 rustfmt-1.66.1-2.el9_2.x86_64.rpm 726744afacd945ce2e6d3e8d34fc1aaf97c723fcc49c2a7e664bb60a459f5aba rust-gdb-1.66.1-2.el9_2.noarch.rpm 23b3e744c1150a6ffa575a9b79fb24d9d4a05a82b2007bf5c6c6dfb4dd310af2 rust-lldb-1.66.1-2.el9_2.noarch.rpm 2a244b546ffbec93c0a373c97b198fea95d260e3c22d530b5e18a8807d03d1c6 rust-src-1.66.1-2.el9_2.noarch.rpm 7ded2d934d158a2ede2af4b4672eac3c740d5288330521a209491feb75701507 rust-std-static-1.66.1-2.el9_2.i686.rpm 9f004f22a39ad07f5f74736ceca255ecd5f82fa6ef45bf36b24ad8e96899920a rust-std-static-1.66.1-2.el9_2.x86_64.rpm 21952294f0ba4eb300cabfbc0657d6c22720d523cccef4d5ff073420d45c8a66 rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm cda250ea5f74bd9b242df3f712fcdacd2d85598a4fd0b4d3a60523622e053740 rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm cbe5aa0ca5cdc1739bc546ccbdbe9dc9c824e65b1bcfbeb41c9a086762e03997 rust-toolset-1.66.1-2.el9_2.x86_64.rpm c64c1ca156b02432568fcdba6894e11fa364f76c5e0f381847021312b5c94fac RLSA-2023:4569 Moderate: dbus security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms dbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm 2682ef845404706c4f4cce5ff12039dd755f6ddb58d0c9a6917d7d767f2234ef dbus-devel-1.12.20-7.el9_2.1.i686.rpm dd448e55477ec686434d4fe234dff899239ddf945780bbd139128d9cb3e7b2fa dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm dad9a295748e339f36433f54d0bd55cbce4a6a54f2de09d45033ce19a84e2d27 dbus-x11-1.12.20-7.el9_2.1.x86_64.rpm 42d3c4ec7042bf5208a9b3276b73848ecd2315c50636123ac0161655a7170c92 RLSA-2023:4571 Important: iperf3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: memory allocation hazard and crash (CVE-2023-38403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-10.el9_2.i686.rpm 7f075299078b153968b736a2f961ff4d0321f7aed476bb447ff5601f1f14df2e iperf3-3.9-10.el9_2.x86_64.rpm 0965fd9b63ddb36610b465cfe6b95f4fbee658811cdbb04c9f4e7dc9db34bf7c RLBA-2023:4596 thunderbird bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Bug Fix: * TLS broken for POP3 and SMTP connections. (BZ#2230038) rocky-linux-9-x86-64-appstream-rpms thunderbird-102.14.0-2.el9_2.x86_64.rpm 23c0f4952a70cb7171c8546aa118b57d5dba6b75f29718263748bd425c9753e3 RLSA-2023:3595 Important: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.16-1.el9_2.1.i686.rpm 81634c4262a4944830a25a6b06c0d586d119e45b4193587fce50c44d60a28c5c python3-devel-3.9.16-1.el9_2.1.x86_64.rpm c91735cbd56db64b4d5cb27defe81a6fe2b8da7db777e59a3ebc3aa7a9faf4e1 python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpm ac677835c540fa0a96279d254749bd3b3ee84dab7bee51e4d6826019221ca7f5 python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm aa57dbab5adaa4444d9287ae233ffc0a90edb3a41d9cddcfeedd649910eb7b30 RLBA-2023:3730 avahi bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Bug Fix(es): * [Rocky Linux-9] Avahi-tools package built but not shipped. (BZ#2204487) rocky-linux-9-x86-64-appstream-rpms avahi-glib-0.8-12.el9_2.1.i686.rpm a42712c3176a297bc30ac7b397e6954a644898b378eebe5617fbfbef8b1356c5 avahi-glib-0.8-12.el9_2.1.x86_64.rpm 8a133d5c385e147023b5c385d0621d9264da4fa24f83cea9b02a31e48c63cc49 RLBA-2023:3732 selinux-policy bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Missing type transition for cloud-init to create /root/.gnupg with correct label (BZ#2203797) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.11-2.el9_2.3.noarch.rpm 9e86f62c40e241267b1d9026cfad65170b8147f3c38dbf2a3cef4afb308c05fd RLSA-2023:3423 Important: cups-filters security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-11.el9_2.1.x86_64.rpm 015ef7ca12e9a9fed0072ebdd50379f3ab19aa28d85b8db96b6ec79d7d66dd1a cups-filters-libs-1.28.7-11.el9_2.1.i686.rpm b1c315d2aee7866fa926d3bc7f0a10cffac55716ddd2347fc73800d8fc64d699 cups-filters-libs-1.28.7-11.el9_2.1.x86_64.rpm b5d57ea1e0a737820ce27a926e2decdbc1e50ed7592af954b940ab4cd24a98c7 RLSA-2023:3711 Moderate: libtiff security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281) * libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795) * libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796) * libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797) * libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798) * libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800) * libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801) * libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803) * libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-8.el9_2.i686.rpm 2c3e6b252e4b58e4dc0cabeb8be81de1cbd82d74df373222ccca8e6402721f3c libtiff-4.4.0-8.el9_2.x86_64.rpm b72293f66532108a05f92261731658359c97103fed7a0c65a0605613c8df8d07 libtiff-devel-4.4.0-8.el9_2.i686.rpm 8464c176b0ad99eeb97ac9ee487fcb055a5bfadacad56b8f103e09cb7344c07a libtiff-devel-4.4.0-8.el9_2.x86_64.rpm 7a2af83f48faeeff8f7050f7f3c99a97af72505a9f98563da28c3d68bb7fee5d RLSA-2023:3585 Important: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.2-2.el9_2.1.x86_64.rpm bb5004b65e6ed8fc8c5d14f21309fe38aaf78ccb13936f22f4faf8e5ec1d1249 python3.11-devel-3.11.2-2.el9_2.1.i686.rpm 0ace6acc95186337091f4ab632b9dfa8cc60ec2b7364157a87f06679fab89e4a python3.11-devel-3.11.2-2.el9_2.1.x86_64.rpm 0ed5c7724577b7fd9d5b5c9950c65161ee35ad748836b8a83c696d05811cdadd python3.11-libs-3.11.2-2.el9_2.1.i686.rpm 883760c8131df37fd968f52cc969c106c0a37db905e35e888fd6000ccc505e56 python3.11-libs-3.11.2-2.el9_2.1.x86_64.rpm 57656d41c3cbe800787be9d0f53f5006d75a0fc7bd055ed15b7490ae0597c9cd python3.11-tkinter-3.11.2-2.el9_2.1.x86_64.rpm 0a74181c20b442214a032b9d5f633d2abaf1bf1a214a24310dd9f3a210b32fc7 RLSA-2023:3715 Moderate: libvirt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es): * libvirt: Memory leak in virPCIVirtualFunctionList cleanup (CVE-2023-2700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-9.0.0-10.2.el9_2.x86_64.rpm a8a77b731f8d1b064814830e827d3b202365b3a9313a8a52ee7afadb71988e32 libvirt-client-9.0.0-10.2.el9_2.x86_64.rpm b91541ed580e9b276af05f804603cebaee385b1e1a5f92185d9b08cd0f2572a3 libvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpm d6456c7427ef1f55d8a848dbca911c57a45081b8de681ae88bb293e0707ad1eb libvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm 74921043c4b765c8147f358a5b4e39a3dfe9e8b90d4913c73e0ca1e2a24ac2a1 libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm 3be08a0bb256e830db8f6cb6d651f1884cc59ff076197e50586655839d40fc3b libvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpm 4877035c9bc64347ae4aab73506326febd45b7e015b9ad03851176d7fefdd2f5 libvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpm a1b9decad4b8192a06d90d4ef84831df2f8d5ea74a3e06e70beb7c16e950f012 libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm 834d2167a390a0b6c1fec5726823a56d18b7b1a1d8dabc96335870db1c22ae3c libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm 71519438408501cfc73706084f5839673d9e3f96ab8d7efbb5677c6191491ecd libvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm 80d4f346434b9574c15c809adc52cd7a1895e510546cb4d89e7ae6dbd35df310 libvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpm f70e594708c22c9066bbd2b6533136b78e1ae31dbda21feb21e67f7422283342 libvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm 8a7984d868b512a320a90f0de38f939ce73f24859e7a882a7ab1fc1d072da638 libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm 24864e01713548226d7f67f54b16c0a0717b7a6eac81ed7d4a60634fc6e5c71f libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpm 0668fbe4b77ac970bfba8f63cc5f79f557d835df25f13dcc9f2f457b58c23a21 libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpm 5b96e19eeded9f5a3df4cdea3dd9b0f749cbdb1bb4f9944443ee669e8068b4fd libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm d8aee17c72e2ec4546797935d09e9fcf2e34e84e10fc13d84c1c60504b925213 libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpm d6d1921cd347bf4a19b4d5fa102c91b867a2f0c3c982096cb6303b1c8df7544c libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpm 3706ab8e224f54cbf042958a73082aad07e90cf902773af49aa81db8028b4718 libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpm 4a5e65092e7bea0333538dc3539df2b80fd93db3317a043ce8819a7642fea52c libvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpm 15f73cd7d9ecf9d906e796e6764f53cd8b38c5c663543e8b4fc163541435c972 libvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm de961cfc3263cb757231188d5eb3fea9ca40596ad48a84d7dee3bb4f79e6f501 libvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm f15ca5831dc5b43272ce70bbca281d9f241d67b26e1c4c147a9c41eacdcaa252 RLSA-2023:3714 Moderate: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: schema_element defeats protective search_path changes (CVE-2023-2454) * postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.11-1.el9_2.x86_64.rpm 2c335535b43ac494c65174295c5800c3092409ba18aae46c8010147db20ca72c postgresql-contrib-13.11-1.el9_2.x86_64.rpm 1b01df0e4a0a2baf991f632283bd4550b8e01f7fb3235a6cde6b29b2e17aec2b postgresql-plperl-13.11-1.el9_2.x86_64.rpm 12f73bebbdbeeaac867033b60d0818c6de3d570ba0afedb0431fbb5f7f0f7900 postgresql-plpython3-13.11-1.el9_2.x86_64.rpm bba6d017fe1fc66e29b2cfad4d5e4ee7645850707f8a67d0201d9c7fc11aa5cc postgresql-pltcl-13.11-1.el9_2.x86_64.rpm 1389ac60eec38264397e072c6416dee8c5a4ecf01514dc6be50d8f4e33daf81f postgresql-private-libs-13.11-1.el9_2.x86_64.rpm 2dfa6507ec488ce782a939e85bf715f44150bc52ade99637f4d87ea71936d866 postgresql-server-13.11-1.el9_2.x86_64.rpm ad4bbfbb1bdc6bcdb3737715cf7dcdcd189d76c31de0f911f7c055f2801cfb10 postgresql-upgrade-13.11-1.el9_2.x86_64.rpm af2c51af7127d188e565e1d2081e72e0f8df2bb09344287c19e47bd0bf61e5e4 RLBA-2023:3720 criu bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The criu packages provide the Checkpoint/Restore in User Space (CRIU) function, which provides the possibility to checkpoint and restore processes or groups of processes. This in turn allows improved fault tolerance or high availability (HA) of a system by restoring a failed process to its state in an earlier point in time. Bug Fix(es) and Enhancement(s): * Containers migration "podman container checkpoint" doesn't work on Sapphire Rapids CPU. (BZ#2203235) rocky-linux-9-x86-64-appstream-rpms crit-3.17-5.el9_2.x86_64.rpm 28d2c9cbe1e57c919b77608d96f65084c7483610f542869aaa30e216f1584500 criu-3.17-5.el9_2.x86_64.rpm 4d8f96c132b3879ac0c1842247269aaf5738bf16ff7131ea0f7e4222fc5b6dc6 criu-libs-3.17-5.el9_2.x86_64.rpm 97e155ce0cc795306d175f97a607af91a054255577a4bd80aa20041f85205312 python3-criu-3.17-5.el9_2.x86_64.rpm b3caeb4ecef91cbdf75b34cf9153e36b26b800f5a089962841253d6c283cbebe RLBA-2023:3710 virtio-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es): * [virtio-win][NetKVM] The minimum(32) of RxCapacity in 'defaultConfiguration' does not equal the minimum(16) in inf (BZ#2203205) * [virtio-win][fwcfg] Fwcfg - Windows update reports errors (BZ#2203207) * [virtio-win][virtiofs][nfs] overwrite confirmation during copy > 5K file to the shared directory -nfs mounted (BZ#2203209) * [virtiofs][virtio-win] Give some hint when start virtiofs service with device is disabled detached (BZ#2211912) Enhancement(s): * [RFE][virtio-win][virtio-fs] Add host UID and GID parameters (BZ#2203228) * [virtio-win] Add WinFsp code to virtio-win source RPM (BZ#2208395) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.34-0.el9_2.noarch.rpm e9cbb63909176930d6932eff316b6152c7ad8f57838cc235b8a4cb083222119f RLBA-2023:3717 passt bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges. Bug Fix(es): * With passt-selinux installed, installation of selinux-policy-devel reports harmless, but confusing syntax errors (BZ#2190510) * Reinstalling passt-selinux package leads to temporarily disabled policy (BZ#2190511) rocky-linux-9-x86-64-appstream-rpms passt-0^20230222.g4ddbcb9-4.el9_2.x86_64.rpm 8a9db681596c8f5b341a58caee000a746a75edefd399e534de7d349ecf6b6174 passt-selinux-0^20230222.g4ddbcb9-4.el9_2.noarch.rpm c542f3f907b9aa6d40ad11ded502d8d94ba0b0e8872b0bc0414e571f880c27ed RLEA-2023:4865 new package: gpsd-minimal Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gpsd-minimal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gpsd package provides a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location, course, and velocity of the sensor available to be queried on TCP port 2947 of the host computer. This enhancement update add the gpsd-minimal package to Rocky Linux 9. (BZ#2228096) rocky-linux-9-x86-64-appstream-rpms gpsd-minimal-3.25-1.el9_2.3.x86_64.rpm 56ef72391b9cff267c64992a11c928f45f3ecdd158ef1858b8791c22721e61ea gpsd-minimal-clients-3.25-1.el9_2.3.x86_64.rpm 3010805c5ba0a5752f2fe9fcac2b79c43d73c2284e6d9d32eeedca6065efdce9 RLSA-2023:4838 Important: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm 7cda2a4598214fbe6c70fe5dd6cc2a36dae24088903770e58444102d1f6d1a1a cups-2.3.3op2-16.el9_2.1.x86_64.rpm 531724a8ae36160e584d3fcdb03b73b0287c58aaa886aed0188f8c78e345fc21 cups-client-2.3.3op2-16.el9_2.1.x86_64.rpm f74c34e6986b8ebbd010341e14af3a725631894ad1b5e5d28288630acc2644a1 cups-devel-2.3.3op2-16.el9_2.1.i686.rpm fda77eac7a6ff6df06a6cca01324da7c63bb4dc5f3060944ce1f8816cf59e687 cups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm 6e4f54aeeb62a0eb0c597fe1a7e147aac519b6598de47249e82d39ea9ff635b6 cups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm f3c1294c63934c7e217144bae2b4b3610384e114ece1f461c9d354f721f770de cups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm 90228174babe7346e41a851809c8cb1dabf7ddd8938a5d5df18acf9a76d271ca cups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm f13113593a1204619e01056f72efa3fbd02d643222c24ecdb2e67a824df55d57 RLBA-2023:5075 sip6 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SIP is a collection of tools that makes it very easy to create Python bindings for C and C++ libraries. Bug Fix(es): * sip6-6.6.2-1.el9 introduces a regression bug when using sub-classed C++ exceptions (BZ#2225605) rocky-linux-9-x86-64-appstream-rpms sip6-6.6.2-1.el9_2.1.x86_64.rpm cc6cdfbb5a4d821edd105d53ebb71bed180dca6dd388e6133750204005e322e8 RLBA-2023:5298 fido-device-onboard bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fido-device-onboard package provides a rust implementation of the FIDO Device Onboard Specification. Bug Fix(es) and Enhancement(s): * Update FDO to the latest release (BZ#2224364) * Libvirt FDO installation Failed to instantiate TCTI (BZ#2231069) * fdo-aio can't get started (BZ#2233734) rocky-linux-9-x86-64-appstream-rpms fdo-admin-cli-0.4.12-4.el9_2.x86_64.rpm c9fcbc32b5ec0180408e71ee2c933b556bcef3f60e086baaed812b925afe6061 fdo-client-0.4.12-4.el9_2.x86_64.rpm 9aaf8db2c15f2c65ebc60a301ee744eba7d418fa5033c4819647eb4a79ce89c3 fdo-init-0.4.12-4.el9_2.x86_64.rpm 5b0095e29385f3038759b743c76c94114620f0da1c19ddc373940da63461af64 fdo-manufacturing-server-0.4.12-4.el9_2.x86_64.rpm 8476e07978ee2fa573960f01f1dd74406a84f41e4f9b9aedc4ef048c0807e37e fdo-owner-cli-0.4.12-4.el9_2.x86_64.rpm 99f72538a125a66b51b119ae84dc7b87fb25b0cf8a6ff126d2cbd47609454970 fdo-owner-onboarding-server-0.4.12-4.el9_2.x86_64.rpm 25cee59e2a40457fd7ab526444228e34ddd92bc77934882b95673d00b6870ed8 fdo-rendezvous-server-0.4.12-4.el9_2.x86_64.rpm b27b8df882874b8a6079325e13c3dda1cf7b4b6bbc1338ad098dc4acf952d0b0 RLSA-2023:5313 Important: open-vm-tools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: SAML token signature bypass (CVE-2023-20900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.1.5-1.el9_2.3.x86_64.rpm 8b0e2c92c3d412bdcacb82820d6cca832cdbf677228706d955aa76d2cc0028ef open-vm-tools-desktop-12.1.5-1.el9_2.3.x86_64.rpm 829f763816665daaa9191f7e4d1d49be43d678f991b9ac811293d39ea2983990 open-vm-tools-salt-minion-12.1.5-1.el9_2.3.x86_64.rpm c1a3079f293a9975a802ce8b251527d0684bfcff1fe66cb46cef04ccc20a853d open-vm-tools-sdmp-12.1.5-1.el9_2.3.x86_64.rpm f66254d5b386682e855dbd70a41038e109f52ba30f95e0ee7432a9a074e8e75d open-vm-tools-test-12.1.5-1.el9_2.3.x86_64.rpm 6e53446556360cc7d1a2487e76d0e416ad0491aecbcc572d3c561c92a25b8324 RLBA-2023:5088 389-ds-base bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Bug Fix(es): * Paged search impacts performance. (BZ#2231841) rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.2.4-5.el9_2.x86_64.rpm cb7b3ef3d2fa74fbbcbb0fa1266d47db7003530140e7ba717e183dd291dacd3d 389-ds-base-libs-2.2.4-5.el9_2.x86_64.rpm 955f13209762844a699d09706f26016915c324e736509009bd163cfb42c5d26a python3-lib389-2.2.4-5.el9_2.noarch.rpm 945dff6c303300458854a513cd69fc7e83d16cd7fa5eb720312bd71d75d4a53c RLSA-2023:5214 Important: libwebp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-7.el9_2.x86_64.rpm 2e6565c2ff97f2fbc2633e6bdfcf8e877b17567142e6851743419632d437cb15 libwebp-1.2.0-7.el9_2.i686.rpm aa103fb08f6af44316ea09febb058e68cda3e8fce292f04553e167a3c7651fc8 libwebp-devel-1.2.0-7.el9_2.i686.rpm e01b01c776fc949a649c7a981e9f404acd2fc33216f3cd266d9602b28b7621e8 libwebp-devel-1.2.0-7.el9_2.x86_64.rpm 6fd011aba4d88178a9bb1864a6c3a4b905a1456033051a1d862c784702362dd3 RLSA-2025:14983 Moderate: mod_http2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-2.0.26-4.el9_6.1.x86_64.rpm d22323f44476dad45389a06e3ee8a907d691385e07c513f64e44bd97cbdfc7b9 RLSA-2025:16046 Moderate: mysql:8.4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mecab-ipadic, module.rapidjson, mecab, module.mecab, module.mysql, mysql, rapidjson, module.mecab-ipadic. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688) * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699) * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575) * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092) * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077) * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085) * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082) * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087) * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084) * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__mysql mysql-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 7c36b6f2ead48bd52b1c004bb15840bef0739b9f7426d2ad964136b09d56f264 mysql-common-8.4.6-1.module+el9.7.0+40027+0df0d4e0.noarch.rpm ff73ed8e7d10291e4aef5c0886c5f5bbf3f9caab7850d766392e2d915d071735 mysql-devel-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 4f1cd3442f8c8b4bc63e687711fe1bc50afc0ef4440a9e874a5c9cdaaa8a228e mysql-errmsg-8.4.6-1.module+el9.7.0+40027+0df0d4e0.noarch.rpm 0467ee97c83781ecd099390f45b16b34b1659983792ca90508cd1ca75847b455 mysql-libs-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 23dc973983af44527f3b544c83e0c7529280838e052c5e5f842a11fa9554c42b mysql-server-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 590e89562a3b2d47519e1a1a19fa7fe217d055229046430b4afd1cefcf4f76d7 mysql-test-8.4.6-1.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 26c69942e843dd25b17601ffca1b1a37fdf743198cddeed3161900197f001965 mysql-test-data-8.4.6-1.module+el9.7.0+40027+0df0d4e0.noarch.rpm 9eb1198951ee7b8f9cd0d175c7473f330218627bc1856b05dab0fd86c55607c3 mecab-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm 355af28fc740c2f9bd77e40daf39253b621b83defb0e47516246e5e2222ca44b mecab-devel-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm 97981caf9383f3546c68e18c5465ddc1b65a194bdf0bcf2d725e276a058b71e5 mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 7366b9dd824100c2130f78e43d9ef9b799f61934961736e3e1456abef4a3bf09 mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 3f2d04c54ece7fe5e19ac3bb076b4614722e37c476b38c80b3a6f1924325d9f9 rapidjson-devel-1.1.0-19.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 6401561c10fdd4e51de5661b88bac12d5a9e20e2f738f90c429c73eb3c4fdf32 rapidjson-doc-1.1.0-19.module+el9.7.0+40027+0df0d4e0.noarch.rpm 558fcd49446a50ffea6aa4b19088b8320790c540f80e469ff9a170af7e1f2a34 RLSA-2023:5924 Important: varnish security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-3.el9_2.1.i686.rpm 7233021549a34421e686c1b2041001f2e66a76d323c434200548f0fc136bafda varnish-6.6.2-3.el9_2.1.x86_64.rpm 457a433b4426ed3bb128133a55c73525fac2d9381a33aa6dab6f00cd1a6582b7 varnish-docs-6.6.2-3.el9_2.1.x86_64.rpm e3d545fffa2b3a9bf7293f0714473a4707c30edd31240321f044c3cf856f0578 RLSA-2023:5765 Important: nodejs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) A Rocky Enterprise Software Foundation Security Bulletin which addresses further details about this flaw is available in the References section. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nodejs-16.20.2-3.el9_2.x86_64.rpm ced322c092ff463d444f77af4bd48ab75a8607decaeea9e15e42300c70af7c0f nodejs-docs-16.20.2-3.el9_2.noarch.rpm 6519a5202ef9875196bc6d369af54179965d66ab6eb35bfc757cc6c99da2a0f7 nodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm 6eec823fdd34632fcd9ac6572915be04be4c833e212987c9d9872103fbf23d7a nodejs-libs-16.20.2-3.el9_2.i686.rpm 2c48b577714f68bb6a9b7ecdea021c2f80c8a20546c7df9c1112e37f99fe7c9b nodejs-libs-16.20.2-3.el9_2.x86_64.rpm 694650198c13598b8b37fd7167585b6a83817ab0141642530478d5e6a4de8b95 npm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm 1216b64a82539aa829391769be7245a4b51360bf27bcdbe68c2b5905b6082ed1 RLSA-2025:15007 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.9-1.el9_6.2.x86_64.rpm ad79012ad1da97954908c14a2517b84adb93c06e1fe955eeb450ccaefac333ac python3.12-devel-3.12.9-1.el9_6.2.i686.rpm 23525e0c3ace9847f43ee0838804a2e6cfcdfffb46dc781b454d5f38ba6e7c8e python3.12-devel-3.12.9-1.el9_6.2.x86_64.rpm ca7c2a9fcb4a4157ff981662ff73db504bf9ce2de916752648e8c245175cadae python3.12-libs-3.12.9-1.el9_6.2.i686.rpm c53790bbc9f00ac4981339ff07ab664e437f6e34e794c3ce636555d804b93dbb python3.12-libs-3.12.9-1.el9_6.2.x86_64.rpm 72a8789c36aa99ded1879147305c85cfe96dc282c02999df73d17e335f9d9e05 python3.12-tkinter-3.12.9-1.el9_6.2.x86_64.rpm 62afe3fd3bb3c5ee6d002d18073c8186523a73604e37c289aff46736ef2a82e9 RLSA-2023:6120 Moderate: nginx:1.22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nginx, nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm 75c275d990f8b94673a639173c737ef4ddfa631f17ba633f06362a584d2e62e9 nginx-all-modules-1.22.1-3.module+el9.2.0+15280+45c505d6.1.noarch.rpm c65080a4654ddda5a779f24c5f11293e9695de7f56ff6ff5881faf513485bb79 nginx-core-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm 36ebeeda10a6e15d28ede515bfbc6cc95db0b2d873215f760bd492a7f1489569 nginx-filesystem-1.22.1-3.module+el9.2.0+15280+45c505d6.1.noarch.rpm 44fde61969cd1dc7e1faaca0ff91eeaebae7a702955ff128965dc937ad48c85a nginx-mod-devel-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm 75de918eaac360658b0a21e9c6696cf8979df6de1a7e584fabee87dee008176d nginx-mod-http-image-filter-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm c9ee4273d64ab462d56f3793c5f4b500fddf9e24beb6368d71cf02243bf57acc nginx-mod-http-perl-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm 1254685241f1233c6a74bf04c909fd4168fa4cff325642768a91e5d54ca8859e nginx-mod-http-xslt-filter-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm 793100ed583ca3b0d55a7deca9fe5155fa7bd23de329e43ee06945ae906c9bf6 nginx-mod-mail-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm b96c8a7dbce7f763914981d73c1f0a111f180ed79b7c8d203bb6480b494f598f nginx-mod-stream-1.22.1-3.module+el9.2.0+15280+45c505d6.1.x86_64.rpm ff22f2dc7090e3dc97fc39afc00ba274b0fc691f89d90bca47d50dc43759ad1b RLSA-2023:6266 Critical: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * SQUID-2023:3 squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) * SQUID-2023:1 squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846) * SQUID-2023:5 squid: denial of Service in FTP (CVE-2023-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-5.el9_2.1.x86_64.rpm 00ec04dfd1657bac0e911783a26b8210d140c5d1bfbe455ffa3f076896377f24 RLBA-2023:6412 alsa-sof-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm 42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117 RLBA-2023:6536 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-11.el9_2.x86_64.rpm b6edc3804049080df6d087f0bd453af4a7c2c8d4b83a3f24b22e8d224ae4a30f net-snmp-agent-libs-5.9.1-11.el9_2.i686.rpm 6f1f9205b2ecc1eb595ed55cfa5434a8e2243b38f289a7215d6859338273628f net-snmp-agent-libs-5.9.1-11.el9_2.x86_64.rpm f7aa2cb858fbb65de89a4921f50b281c9230c466c246edf241acb6ada62b7e6a net-snmp-devel-5.9.1-11.el9_2.i686.rpm d15e205f970491ddfe874c82b727f2642edbb27c1078d5a92a978c90eeaaf505 net-snmp-devel-5.9.1-11.el9_2.x86_64.rpm c683d10535307d6c2198dd7d3e0849dda282babd6fc19d5ff1055159cc0d18d4 net-snmp-libs-5.9.1-11.el9_2.i686.rpm 8bf90a3594c43ab7ba9968f9cf5ea468c9fcfdff171c1ddd8a1288b16d176290 net-snmp-libs-5.9.1-11.el9_2.x86_64.rpm c204dcbaca9bb5f87edf637cc4003fd122b9a5ac7b047d0f63619b6c83ad9d3c net-snmp-perl-5.9.1-11.el9_2.x86_64.rpm db5d84b120c02f82675a8082dce9b9306ee207ca6a66328cb7526a80f6843fc8 net-snmp-utils-5.9.1-11.el9_2.x86_64.rpm 8c895d0081ebc31a42be374d5318b1adf1a2de5fbcee600c1f35017d1db5427f python3-net-snmp-5.9.1-11.el9_2.x86_64.rpm c72f48985c2ff0563775b1031f2e79d8ff9362b78bb6b60486a60bf62cf13210 RLBA-2023:6552 scap-security-guide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.69-2.el9_2.rocky.0.1.noarch.rpm 4cd3d4080048693c8c5692900785d5e9a9c6322edc941b06dfd85c12d8ea1374 scap-security-guide-doc-0.1.69-2.el9_2.rocky.0.1.noarch.rpm 6f437e6c8514a35a8b6e138c1c28a79900fda10ced1001c26ca0b1877409d37c RLSA-2026:6923 Important: nginx:1.24 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nginx, nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647) * NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654) * NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784) * NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 2ead91879a97e7313476e065e332f55b4f568948be8668495b711f12d802e7d3 nginx-all-modules-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm 4bfbd54a55ccfd6122590d6622f17a4b20d755fe672451bd07fdbbaa1eb141d8 nginx-core-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 35c6aefd449cbc497e82203ecf4340eced4acb8e0311c3a51789a946cac93af6 nginx-filesystem-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm 91e78a263a9a39bb2cdb77cf05eb463ada7a1704c875f1abf39f3d46f2c54770 nginx-mod-devel-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 90782c83e70099d51f328b436b2697b1d7c15d454f1032dbf7676908e288c594 nginx-mod-http-image-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 347756de538c5c34ccb8d4a5b2650b86c680c11060174ff8c8897c02da0ced6f nginx-mod-http-perl-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 3d3528c490fa82a1840d8c05603972715550f6e9349ab5bf4d329b7e56d7b89b nginx-mod-http-xslt-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 39ed4fc5eef4c94fcf030fbc910783c06c9c1c99f5f3275b41e88aa0d4411dca nginx-mod-mail-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 5c42710e27529ea5533f1e367ab04f325499f6e8b4268d2c5f18c491347f9cc5 nginx-mod-stream-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 6fac18b9f06d8855aad7371c3b47b86f0205149462b67dc3d8cb8170ea7167b3 RLSA-2025:15010 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.11-2.el9_6.2.x86_64.rpm 430a76720c4b569198eddf3f416d9970cca108cd1eeac2803771749f6a4c014b python3.11-devel-3.11.11-2.el9_6.2.i686.rpm 5140a31d2c806f07466c0d7220b560b8c66001ff62dca8adea45786fe8821f1a python3.11-devel-3.11.11-2.el9_6.2.x86_64.rpm af85d3075823c96698067f9f3de2a8a932880f01cb88904415074fc33f34d32f python3.11-libs-3.11.11-2.el9_6.2.i686.rpm 4812f1d423cb9fced65a31359bb4df66bfa7921373a95bd81c10ab56e6069164 python3.11-libs-3.11.11-2.el9_6.2.x86_64.rpm 8b2621fdac868bf29001848b2cf85658687ba5bdb5b5782bccd0604231d5ea44 python3.11-tkinter-3.11.11-2.el9_6.2.x86_64.rpm c7d4a31d8dee783f26e0dc54e9e76d3e130fbc9f4b9ed692534d4991cea26273 RLSA-2025:15023 Moderate: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) * httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.62-4.el9_6.4.x86_64.rpm 2c5849062a04a3ba0d601f0ad04042ed7a809ef4072f22e854f51240b6d96375 httpd-core-2.4.62-4.el9_6.4.x86_64.rpm 8ad7355caf30e2f78048fdfc7c83834a40b6546cb955b749ba455bbf206554cd httpd-devel-2.4.62-4.el9_6.4.x86_64.rpm 95efb101a916e053c90a516de64494df425da187a7cde40c23e0b8629eac7c0d httpd-filesystem-2.4.62-4.el9_6.4.noarch.rpm b23106e51f644e8e76d1c6355b9c62454909a59c45686da4abc9193c9da60425 httpd-manual-2.4.62-4.el9_6.4.noarch.rpm a4125b78553b9e50a7709a872a0f5af27651c5c2b194a15f44e66e3a926b2379 httpd-tools-2.4.62-4.el9_6.4.x86_64.rpm 21acc6f8d8298efec1daedb5d3c9ed4bccb38db7e15e25107274e85c6b3313b8 mod_ldap-2.4.62-4.el9_6.4.x86_64.rpm e46d27d3d865f247b3a58f937d0cf00e66afd4a9e55872fa79d8127703cd68ad mod_lua-2.4.62-4.el9_6.4.x86_64.rpm ca21e192b9d436ec4b4b77efc1314dbb165d575e46125db7d94e9bd64a9fc61e mod_proxy_html-2.4.62-4.el9_6.4.x86_64.rpm 74e0175a510857c3df76f50ce3f40001dd69e18b759533ae23538fea8c6d8e61 mod_session-2.4.62-4.el9_6.4.x86_64.rpm f00b5bcd150b1b440ce5f0d33fdc6b6d5759a662f2b4b8ae7d7e5ba767d55dcd mod_ssl-2.4.62-4.el9_6.4.x86_64.rpm c5f7bdb262012e89fa979895fe837600f2a10e9ffab98815a135a238f3ad8f47 RLSA-2025:15018 Important: udisks2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for udisks2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libudisks2-2.9.4-11.el9_6.1.i686.rpm 0447a15f0539281347e3c24b614242a8cfe2f5eb097cb928b06f1f9f84f310ea libudisks2-2.9.4-11.el9_6.1.x86_64.rpm 51bef46e0b76aec0813beedee3b4b0c0bb95d49bf9d31cb6a584079994f878d1 udisks2-2.9.4-11.el9_6.1.x86_64.rpm 3ce269dc48aa64436110d56fd0be1be2a1c7a0417930306ac1682e0fd179cc7d udisks2-iscsi-2.9.4-11.el9_6.1.x86_64.rpm bdecaf74f159884785615d59b1d8245e7f767f6820958ab86832672acb83a4bf udisks2-lsm-2.9.4-11.el9_6.1.x86_64.rpm ec32b34e6a68bc385724e34a4be073deafe344a1a0063fa4e2bbdfa89f6f3d2d udisks2-lvm2-2.9.4-11.el9_6.1.x86_64.rpm 449514711c88c45de15931e120f5cf59d056b9b354d392a5053fda5cb05898dd RLSA-2024:1818 Moderate: java-1.8.0-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.412.b08-2.el8.x86_64.rpm cdfc0ad20656f71dffb322efce1b227a7ce619ec6cdc62237533bf9792363ff7 java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8.x86_64.rpm 0e801f51e388a5bd6321dcc5f249d505460f3b1b812196041351cce09bb495f2 java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el8.x86_64.rpm 348acbfeb7ba2d5ad5f968e26af7fc24e9c1b9402930256f41579e43dae25cf1 java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el8.x86_64.rpm 782e5cba63ff1fbc6daf4be612f922692bf4db0f87d3d9e6e19266982ce42a83 java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el8.x86_64.rpm c83652f7eee7b65bb3ec10ab7c5b00a205cf09c8e6b2522a9c42c6bac0e438ba java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el8.noarch.rpm eaf1f90cb72e07a468fa57053e6b3b0e4e4d200eda8673370f7e24bc0acd9d28 java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el8.noarch.rpm 74b073d5c8d7f8122e3d5aa07eb178c2fa2552c8bb59085676520bc6b8c74581 java-1.8.0-openjdk-src-1.8.0.412.b08-2.el8.x86_64.rpm 7b5a496e52977224d6b9b85fccbb66fa92bae70e01855f6ffa1d1a432477d9db java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm 04c3bd756ca8c6c5e8c5d121fbac3fadfeb62209682ef253fdacb4430e63f6fe java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm 8cda4469b372c76da0932a9d0f092d1b846368878aaede237c460bde21a32289 java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm d912010173461b29d8efbd64f6d55fca4af3ec4817cf239054f38aecac368eb1 java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm 1855ef52d2e8f68508b4ccfe458d44c0578be566b3446d8bb8aae54f68bdc434 java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm d85f668f7812cd642f9816c9390f9bdcd44942b097957c2b6252ca1dec519279 java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm df6abdbb98c05b41936348d87f018ef61940f446cf5f1c9c91e4e924accdddfd java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm ae95d1546ed41b0636e5923a5819259b33592870d69a264e40439183b6bd4294 RLSA-2024:1828 Moderate: java-21-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.3.0.9-1.el8.x86_64.rpm 86299a5f185d7d326193f7bf08a6a85a7f398cc50b3cbf3fafdd07ab318e69c6 java-21-openjdk-demo-21.0.3.0.9-1.el8.x86_64.rpm 53ca3b2c3bdafa4e5faa6eaf21761f8e406b2772bd4967e4a075833eda6f57af java-21-openjdk-devel-21.0.3.0.9-1.el8.x86_64.rpm e842a7459e0ef075733a53dae81cffccec0351701fb4e590d71e02df707348cb java-21-openjdk-headless-21.0.3.0.9-1.el8.x86_64.rpm 1bf3c3382a09d8bde5513e43c09b12390cf35b5b8568f012cf8c2f764d9015d1 java-21-openjdk-javadoc-21.0.3.0.9-1.el8.x86_64.rpm 7c65bafd67d4154d0c5a9c733823cb106795ea072f90f3ced9555b5e5f093149 java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el8.x86_64.rpm 61544f06cab93caf776cb02600b73e28b86e4c47c83bb1f53b5efda95029d0c1 java-21-openjdk-jmods-21.0.3.0.9-1.el8.x86_64.rpm 397de99d61a3de6c826ff71b5e7f28193a8b9281b46cfa7652bc05803a82682e java-21-openjdk-src-21.0.3.0.9-1.el8.x86_64.rpm 38f6cf6b4b7b39ae7d285d9a6fed6f1f093fe17b827d1c5a40938b81a1b709ae java-21-openjdk-static-libs-21.0.3.0.9-1.el8.x86_64.rpm 8139711c595986599a3ba03b7a717f3206191daa823658e04d46cf996092855f java-21-openjdk-21.0.3.0.9-1.el9.x86_64.rpm 3e23ce536bd1824c4defdc09aad82b37f883c25dbf9a9fec6e67052c5c52399e java-21-openjdk-demo-21.0.3.0.9-1.el9.x86_64.rpm 89c9ca98661f6a7cacf7f9f78a59caddd74affbfbfe5ee9e5b772c97004ab71a java-21-openjdk-devel-21.0.3.0.9-1.el9.x86_64.rpm 26386e2829715739156d101ac2495c7bcc2b9d88f636fbabb494f364a7dede7c java-21-openjdk-headless-21.0.3.0.9-1.el9.x86_64.rpm 70b51b6a7cd8bba111465ba9328aeee15f3297e168147b37221640871bb9c5fe java-21-openjdk-javadoc-21.0.3.0.9-1.el9.x86_64.rpm ab7a6396c3ad381f371090a4152b18a5b457701e6fabc23f756e32795a235893 java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.x86_64.rpm f8733dfaca359c0a16d1da5d285c18e64beb1b2996cc82833ee37a3512c7e8ef java-21-openjdk-jmods-21.0.3.0.9-1.el9.x86_64.rpm 1288c4c52121c4959f0c6294e2b78d6602d662a4e4f5e4189f43ee9ec76e68b0 java-21-openjdk-src-21.0.3.0.9-1.el9.x86_64.rpm 02b0777997debf47248f7e356df771d7f72e1dc485963ddd86a1eb0ab57adf44 java-21-openjdk-static-libs-21.0.3.0.9-1.el9.x86_64.rpm 240147219f0a746fa2a62f6115553cfa9ca7b51a8a5c44b9ad6f1d02b9d2ea7a RLSA-2024:1822 Moderate: java-11-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.23.0.9-3.el8.x86_64.rpm f33e4f6371ec37e621fbc8d943f419198e8a87f4f67240cff36bb5020ca75b97 java-11-openjdk-demo-11.0.23.0.9-3.el8.x86_64.rpm a5ebb35f56e508df070c1c86ae9e005048921a546b99359bf1163370f6a6047c java-11-openjdk-devel-11.0.23.0.9-3.el8.x86_64.rpm b9613d7ad2ce4fd1f55a8e10a8640cb49f4def9b488dd50a762b70aa0f354dcd java-11-openjdk-headless-11.0.23.0.9-3.el8.x86_64.rpm d09f0cc7823f24ff9d8b2b89bd1c29e1c50b816d64b8df1ed9cf8a855103680a java-11-openjdk-javadoc-11.0.23.0.9-3.el8.x86_64.rpm f4f1081faa8c4490b411109f9f25de3eab2e14bf0a17182ebf55a05ace71a612 java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el8.x86_64.rpm efa58a38125cf810c4c9a588c7f1ed0226e1a9e9c70ebde7a681260202bf27fb java-11-openjdk-jmods-11.0.23.0.9-3.el8.x86_64.rpm ed0d5880f4c26c8b3347f342c3629af23a67e21ee061564b2ef3deb811c93d4e java-11-openjdk-src-11.0.23.0.9-3.el8.x86_64.rpm 016955775051b0af23ccd483e316b9b791f95622ab11cc784801a3e9c7b19e50 java-11-openjdk-static-libs-11.0.23.0.9-3.el8.x86_64.rpm 90ac886534d52ef309cc70b1bdf6dfeb95b9831bd0b94495b994b26f09144b63 java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm a8bee5a8b6e0935a55721b02c6787ba3129352adf813ace86396069e8442ab8b java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm 35d3c8c1f64ecfb257ff90be8d3160fd307d522c4005a94e6194195c0c363b22 java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm 83512f4c7823e0fb7cf1cfa1dc7386faf739541dc4f9bdb08ef8fcd36ccf220c java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm 4becbe62a7cb1c09a0c8476f850135aa1972af8143ade34981d7b1dc42702eae java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm 436404efaa47f005a0f00b632b9d510546614723b2e9002b4adee284652ec99c java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm 471dc2fc606c7d5ee1b033d86d887e45545e22239e41896d614fad0b8e562f35 java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm f5e6d8b770382620d6087e4bb77ba40dc571813acdaaf01bd9aca10aee47fa81 java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm 126877f791bd1b035188e7a8b0b219e1146d0b38612eb03ddfd3b9676d0b5fca java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm 3104fe342fc99a27056d781f9026c41f4d4e0f773975b41051a2c39ab85a1d66 RLSA-2025:15019 Moderate: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.21-2.el9_6.2.i686.rpm 8588c7df6acc678b3e06811fb3a23f27a8c22b82cd822e68e5e1bc94b49860ed python3-devel-3.9.21-2.el9_6.2.x86_64.rpm 400a9f784684c91cfb2a3bb5261e63e6fe6ec4980a8a16b2d9a5052ab184c570 python3-tkinter-3.9.21-2.el9_6.2.x86_64.rpm 69bd1b5bea72e249a511ea28141019c3175e1da66c16973b4bc972d1887f1a9b python-unversioned-command-3.9.21-2.el9_6.2.noarch.rpm 03be55458e8b7c6426fab849e681b0a6994c6163a6c5e2126cb56229642fd998 RLSA-2024:2758 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743) Bug Fix(es): * ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009) * mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235) * [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673) * system hangs completely - NMI not possible (JIRA:Rocky Linux-30678) * ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm 9b5b7012f7779a771f60f403a2a23d4e2bfe2a1183bc18362c650a3a15bc4f3a kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm efecfb852fcefe18069273cc671f18d8226e7e2e260d62164e6bb9e3d593338c kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm 576d205326a864027dc2810fae40777861a64944f6102c0bdea7d89f527dfb2a kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm 70605c8e540df200c306832facc6ccebc9651aab266c1438393c5fc700dc7845 kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm f035f49ab6e5cf0139e6fcc4208d8434dfb34ec0677ccdd3d62bd5ea873c6a2b kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm bcd7bed269b0fddf53304a153658552b5c15d17edde61e37ff760f9d4dbf2dff perf-5.14.0-427.16.1.el9_4.x86_64.rpm 5483769fecd0c1bb52552c5c783d6ae3d149a9915402e17d615a67e77997ea95 rtla-5.14.0-427.16.1.el9_4.x86_64.rpm 8a06d9a7398e409d83f742a79fbb3eafc41a5d4862f6ba00e86ed2fffb0b5c23 rv-5.14.0-427.16.1.el9_4.x86_64.rpm 9f3fee42df3cb74c085f0e6fa529de1118a7e661010fe2636a89f2f1fe8c75e3 RLBA-2023:6611 lua bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.4-4.el9.x86_64.rpm 84a2d73f003fe6fd69dffb84fe66dbd44495bf2b565c8a85ab71e1a013875472 RLBA-2023:6684 dbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-daemon-1.12.20-8.el9.x86_64.rpm 789f3c6e76a03f06b661f1feca2d24adc586411b83c0efd91ce83d003b671619 dbus-devel-1.12.20-8.el9.i686.rpm 9a2a1a09f2e05711d5096d851b7df9b4f5114bf870caa58b2b34e8801ae00d02 dbus-devel-1.12.20-8.el9.x86_64.rpm 5c616199864626b03feda48135bb6887f20a871a97ce8edeeeddfce43f941fb0 dbus-x11-1.12.20-8.el9.x86_64.rpm 71c739ee4a535b97b40de621b758a88be78a71ef21b1cbcb9fa96d711753e51f RLBA-2024:2397 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-311.1-1.el9.noarch.rpm 83c1a42d6cfc3d2728cda5fdb9d7ecaa865df2d34ef87c61cfa6498b22252dcd cockpit-pcp-311.1-1.el9.x86_64.rpm b1d59b72484f46bcaf2f95174dee1d44f6ae9d0d31735e2bf9375d6abcbdb5ab cockpit-storaged-311.1-1.el9.noarch.rpm 4d9be377e995f5c117c3d47ab518dcd5c9ac70b811371b571d13549649e1de47 RLBA-2024:2402 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.35-2.el9_4.0.1.noarch.rpm d0ac8b03238a61fb728f82021746c0fc9c80c6cb62679090555ad8c346c38a6c RLBA-2024:2403 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cpp-11.4.1-3.el9.x86_64.rpm 298cbccf8768fae253209641cdea3bce81b652f78c7c1178b1f907ce1f146246 gcc-11.4.1-3.el9.x86_64.rpm 44ff2c768848a786c1a737005e503c14fa047319ec19dd3d4e10af603cb3d8cb gcc-c++-11.4.1-3.el9.x86_64.rpm cc84b7f4df78e85cf055adc5d4c56a98524e58c5263b934c5caaf2d5a9807446 gcc-gfortran-11.4.1-3.el9.x86_64.rpm dbee18a4d3d12f717bfff4df208e4932e5bcc77ba3574f693278d1ba96397c66 gcc-offload-nvptx-11.4.1-3.el9.x86_64.rpm 320172a4c7a22a09f46f5ac4cd3c6b89e823ab1803ddee7d24eee013bc3d6b2b gcc-plugin-annobin-11.4.1-3.el9.x86_64.rpm a116385451e828a33ec377da8a265436c6c941ab1487cb579528445dd02ee638 libasan-11.4.1-3.el9.i686.rpm a3604e623848b721f89e31c9295764b357e4fcc301452214d06c4f91706b067d libasan-11.4.1-3.el9.x86_64.rpm c72fddd916c15f948c5f9a7ac5192f498f43b9bf8553b5347812734aaaa92896 libgccjit-11.4.1-3.el9.i686.rpm 76ed9df8df17a157c171e8078168cfb812d45290c2ae0c89fccd566137838d7f libgccjit-11.4.1-3.el9.x86_64.rpm f81ea6fa882c7d7309d5965d263b6cb8159501d3bebdf657752b347e4213ed1e libgccjit-devel-11.4.1-3.el9.i686.rpm 76c91bfcce6d836c65a687455742d47978f9f6395b28086e30b63319b1f5cd1b libgccjit-devel-11.4.1-3.el9.x86_64.rpm 03ba9e92a1542d9f8503036da559e70c0990ab5182247d9461708b34be54ed6c libgomp-offload-nvptx-11.4.1-3.el9.x86_64.rpm 773f34667e021eabc24a85cf1befc44a13630827237b98dd0732325a39dd8654 libitm-11.4.1-3.el9.i686.rpm ad8160d8ef1ae66758373bcf501efc1da4495bdebac12c65ac5e0b3abe12be8b libitm-11.4.1-3.el9.x86_64.rpm ab319a06959d29801519e9d3c159f5be00fadf9297d24db27710ab32620c660e libitm-devel-11.4.1-3.el9.i686.rpm 5bff22d7cb10b953ef48f66ccfedae4402f87734379d8a51f80727356afc2930 libitm-devel-11.4.1-3.el9.x86_64.rpm e53817b57f720b6d33b9b7726ccde737d20ef54d98520215f772af88a05989bb liblsan-11.4.1-3.el9.x86_64.rpm bd3e48bf281cdbb13460052762839db3a5da5a33d034d4f2ce2fcc046852a74e libquadmath-devel-11.4.1-3.el9.i686.rpm 05d297634f1136ce0e052e96cbb5f629c93ede26bf15768f8c6d30b45826724f libquadmath-devel-11.4.1-3.el9.x86_64.rpm 7fdbf636758fd4a5961092c3715c2c321632d49a06c5f40b19876735697c0960 libstdc++-devel-11.4.1-3.el9.i686.rpm afe2fcca9a5e6fd8a1ce48e7ef600a088f85ada5745dcf5c2d76b2dfa6bbd92b libstdc++-devel-11.4.1-3.el9.x86_64.rpm 8cdf0dbc08b88670e85087cf6c577e2b1e8cce4a4ad56053f4475955a4ee681c libstdc++-docs-11.4.1-3.el9.x86_64.rpm 002c032ecb174b98babcaf22c4537899b3ccc3f168866829b52229f0734b03a7 libtsan-11.4.1-3.el9.x86_64.rpm b58c83417e42dbe90b33026b8687f4691cbdc31714a2e92cafb060245c41d274 libubsan-11.4.1-3.el9.i686.rpm 1421821662d0e331b7a96097d00103970a8e07e6fad853bcd4e320e58151e01c libubsan-11.4.1-3.el9.x86_64.rpm ba9dbf19955f2f3664cc0562aa6b9a606bcdb8a9cf6f4427bef91cdb8f40a1f1 RLBA-2024:2411 e2fsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms e2fsprogs-devel-1.46.5-5.el9.i686.rpm 0187446cc4eb6bb3561534fcc87df748af101af7c842737249b294ef916013e2 e2fsprogs-devel-1.46.5-5.el9.x86_64.rpm ee8f8dadfaed78631142761287e91b2368419edfaa1cf8deccf57047ebff1f4b libcom_err-devel-1.46.5-5.el9.i686.rpm 14bd56419ae4accd1697ba56961aedf3993bf2431553a7cebdc88b9ec9ced5d0 libcom_err-devel-1.46.5-5.el9.x86_64.rpm fd52e043dd3c1c50de3c38c52b9ed407fa50fcebaa68f410bcf43742c495e83b RLEA-2024:2424 libnvme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libnvme-1.6-1.el9.x86_64.rpm e4f3e844d9e977455d24daf58da0633b0f044805702cb3d7f6cf4bc68f139b66 RLBA-2024:2428 glib2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-14.el9.i686.rpm c55094b15804237fafa83aecc36f8f718a9300dc7ebda626fcc39ec8efb14b12 glib2-devel-2.68.4-14.el9.x86_64.rpm 17c38749b910b54187c222e5db88f3cae3427d577c020caeb95bdd3142d6a48c glib2-doc-2.68.4-14.el9.noarch.rpm 7feea8b72925736dc5f8f1a5ba3e251372af10ce1587c3582c3926c1bf8b7275 glib2-tests-2.68.4-14.el9.x86_64.rpm 3801190b855a519ee9cadd17b9a2640d1aa2e49622ea159ea94efe819069a12a RLBA-2024:2429 rdma-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rdma-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibacm-48.0-1.el9.i686.rpm 63d954da1e64c0df0259cb4791a1b8375bd54f0f20515f61bd16d70b3186d78e infiniband-diags-48.0-1.el9.i686.rpm b16269c09c271de3b79d63e26bb8cd25bd8ac5d121779a1d3963660b34c64955 infiniband-diags-48.0-1.el9.x86_64.rpm 0149cc535ac9f7e486181210d42229389706349fc7de8eab2bfd05ebd5a57a12 python3-pyverbs-48.0-1.el9.x86_64.rpm cca587ecede6121412d30bb6ff5e23706180616ba983cb5c9f0cf60f004f6e37 rdma-core-devel-48.0-1.el9.i686.rpm 835decf10fef36adf99380ef0d3530498e4f37be6037b72bb76f3735717463ee rdma-core-devel-48.0-1.el9.x86_64.rpm 048c876d7719634fecae62d7a36399cc7b69751e3b0ee5b5c1d6cda4c99e9a4d RLBA-2024:2427 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.190-2.el9.x86_64.rpm e7d2586c9d72aa384fad234895d6bc18c8fa365002256847618beea363c723b7 elfutils-debuginfod-client-devel-0.190-2.el9.i686.rpm d0c4b5ea4dbd177dbed773cd52523ace99f8322bd9cb9a71e21b8758399310d3 elfutils-debuginfod-client-devel-0.190-2.el9.x86_64.rpm 6ce71c022318fe3ba2974cf768ae522fa20fe4a662e6a8a0731ac2cd13d3e3be elfutils-devel-0.190-2.el9.i686.rpm e6563f871a80d2eeb5fbc04a3465c9be31645e41f67d98cb3fae1afce4492cba elfutils-devel-0.190-2.el9.x86_64.rpm 8677c3d96d39598ad4f17e67a95183cd7b8fedba42d5f65feee257cfb483a809 elfutils-libelf-devel-0.190-2.el9.i686.rpm aaed9969768ba945ce7bb0ebe88cce9f0c862882c825275fed9d8e8ccd23469f elfutils-libelf-devel-0.190-2.el9.x86_64.rpm cfd03142fa4907668d0295760235ef74ad8b9c5cd88a4be58278c9f10fe75a29 RLBA-2024:2439 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.6-1.el9.x86_64.rpm 1d8cb078b1bb1af095eb65709e0b23fc022ec6ac0035aa13e35387856b59209c RLBA-2024:2440 libsepol bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.6-1.el9.i686.rpm 48b6e2b8e7646480dab106f2a7a10ad32ea7b672ecf7d5d9328562931616f4b9 libsepol-devel-3.6-1.el9.x86_64.rpm ff527e80a3ffc2ca8fad962653da008ef0fb7b702afa2738deab1b4372dd3815 libsepol-utils-3.6-1.el9.x86_64.rpm 3c5d988deaaa1085d982761663b710be948b2fedaeb6019ec14dd39f84a9d20b RLBA-2024:2452 acl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for acl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libacl-devel-2.3.1-4.el9.i686.rpm 6886d15092afdfa2eb87e85db61dad3da04c64cad9f52e023bb215d66478d5fb libacl-devel-2.3.1-4.el9.x86_64.rpm 4abe90d1bda0b88a0e9a639a57820ad6ad048c30f3cf55dd2c609262880c5637 RLSA-2024:2463 Moderate: systemd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-252-32.el9_4.i686.rpm 40f8714499adb8fb06e8c36410fb17f1552358a7fdaab95f2bd0b8c8f974176d systemd-devel-252-32.el9_4.x86_64.rpm 91e80d328f4020b39d0942dd6f39650040ea6228416c86c6c08ec2e27a549896 systemd-journal-remote-252-32.el9_4.x86_64.rpm 0c73a04132b9d3d63e98e471c84875242fcf7ca504d3886bc5850b690b6ee07a RLBA-2024:2464 xfsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xfsprogs-devel-6.3.0-1.el9.i686.rpm ad524b979526977c1c20c9dca74d44de3f95de7aa0d2db21a972caa111a55acf xfsprogs-devel-6.3.0-1.el9.x86_64.rpm 80dd1917b602975f9172afc44eb286501a27bd8e37c88b73e028543536b4575e xfsprogs-xfs_scrub-6.3.0-1.el9.x86_64.rpm c863e0efccf3b33e0bcea5108bff362dc12f9f1a21892ed26f5df6b8a0300a72 RLBA-2024:2494 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms firewall-applet-1.3.4-1.el9.noarch.rpm 6bb702cc5d75e37d1057ece6383cd2c850cfbe2da1a8769fc6bca4ec1bfa5d5d firewall-config-1.3.4-1.el9.noarch.rpm ce71f1987c6b3ebf2bf867c0c50fc799e0f021a387878fb188d5b52d0540481f RLBA-2024:2496 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.10-2.el9.i686.rpm f9491c2b95683c3dd268f45f319a91e22be5317ea97ccd75eb0d665fea96a7ec iptables-devel-1.8.10-2.el9.x86_64.rpm 96fb37209b049ccebbdf14a36fffa7f5f67a757c4a4e49c361e8937e55fc271e iptables-nft-services-1.8.10-2.el9.noarch.rpm fcc2ec478dc3b803e81290be3f6ea665dcd7f529d7e63a7a21f38cb255584435 RLBA-2024:2497 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.23-2.el9.noarch.rpm 0b2cc3f57c2419929177efe6b42a565c54e76c2abf405e805d28201873518ca7 lvm2-lockd-2.03.23-2.el9.x86_64.rpm 9bad2f64771f9bd486f16bb4266721e57b0ac15e1582ee775dfd3e6bed4ca7e7 RLSA-2024:2512 Low: file security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats. Security Fix(es): * file: stack-based buffer over-read in file_copystr in funcs.c (CVE-2022-48554) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-file-magic-5.39-16.el9.noarch.rpm 215cf022e30326cfe1a5c9967fddd18a2226ddf7d7c2fb40b1e90d8f615efde8 RLBA-2024:2518 expat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-2.el9_4.i686.rpm 56c587f7f61a02f7e6aa4287ab2bb501446f32958a09b044cffd1a4bda6fceda expat-devel-2.5.0-2.el9_4.x86_64.rpm ac2835b64426a47aef2eddbd0f55b3e0b6ec238b60cfff2d1a325b238ee79ecc RLSA-2024:2570 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) * gnutls: potential crash during chain building/verification (CVE-2024-28835) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.8.3-4.el9_4.i686.rpm 38972e0001b05bbeb2d24b78b2ffcce680c5a16a28fa51ab76c807067908576a gnutls-c++-3.8.3-4.el9_4.x86_64.rpm d6956dfacd00ca5f8dfd681e0d183f0c0ab66d328545183b42b7281687c1b9ff gnutls-dane-3.8.3-4.el9_4.i686.rpm 1162aa1121563f5a25c6b940e105690f341eb7122b5e50333e58bcf92e8617a5 gnutls-dane-3.8.3-4.el9_4.x86_64.rpm b2ac545db9452572798225510df814d3790acc99fc7174d0eb68d9c59d79e437 gnutls-devel-3.8.3-4.el9_4.i686.rpm 588d88835fdac778514efc1a5e2b31d414224e1170cbe4b5e66d2983e97d6c3d gnutls-devel-3.8.3-4.el9_4.x86_64.rpm 615c3aa1a2e05120c9dbcc6f9f1468d3e7a606f13374a95cd16a6b8956054d82 gnutls-utils-3.8.3-4.el9_4.x86_64.rpm 6d0cfb6d8ae5472e1ec2a8a265b5059c4bd7b9e98f6b02ef0e1352777b14d706 RLSA-2024:2571 Moderate: sssd security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) Bug Fix(es): * socket leak (JIRA:Rocky Linux-22340) * Passkey cannot fall back to password (JIRA:Rocky Linux-28161) * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:Rocky Linux-27209) rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.9.4-6.el9_4.x86_64.rpm 5c0feafe14d240ce0e632aef0456d25c4b9fff06ffec70b893074aef24bc8cd7 RLSA-2024:2679 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-6.el9_4.i686.rpm 1eca5890eaa14c34da208f4b9e520945d78ea8eb2059e8bd902be66d3e2c47ab libxml2-devel-2.9.13-6.el9_4.x86_64.rpm 0a2bf7f9d1dae671d4d30e81fad0aef9891c4d4d53a2619fd98cd6394b397cd5 RLBA-2023:6326 libstoragemgmt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstoragemgmt-1.9.7-2.el9.i686.rpm 8805e23dae5e94fef215f2284795fe92b837509fe5c1ad85e65071907c1f5038 libstoragemgmt-1.9.7-2.el9.x86_64.rpm e45695642aefccbd47448251350ad9e52c4a26e5fa7079475336f84b46a933df libstoragemgmt-arcconf-plugin-1.9.7-2.el9.noarch.rpm f7ed4701fa76d9e000ef842281589abe3c9edff5a9e2fb3e3d9f320f304ce8ab libstoragemgmt-hpsa-plugin-1.9.7-2.el9.noarch.rpm dcc94143a6578ebd3cd5bd1f19914be088c2ac1d41f61ff1cb76b75b41a310ed libstoragemgmt-local-plugin-1.9.7-2.el9.noarch.rpm 0680f88fe5eb1d1752d104e0bb296d7c5c3df092b9aaed82d15d6031d6f1cc99 libstoragemgmt-megaraid-plugin-1.9.7-2.el9.noarch.rpm e5a19d43c9933cd7ec24639163bf57b56c2e7c5ed0cfa2a278a7391cba33c825 libstoragemgmt-nfs-plugin-1.9.7-2.el9.x86_64.rpm dd6c3cff6a8b3309f194b3de2e7bfaf8919f74e4daea911e4d696c7c11002d88 libstoragemgmt-smis-plugin-1.9.7-2.el9.noarch.rpm a31abbd78835c0784323432e50a852c9123afcccb2ec15483ca531a3fbfeb072 libstoragemgmt-targetd-plugin-1.9.7-2.el9.noarch.rpm a0e48390a638586f2e653065536f867ea9b2ba199b536f2d59e3271c8f25d54c libstoragemgmt-udev-1.9.7-2.el9.x86_64.rpm 89eeb19c0887ca1bdb75cf3da6badeb680cbf43ded07f8a85c1f81392ee6a277 python3-libstoragemgmt-1.9.7-2.el9.i686.rpm 55257a9c62cb711287c3f7ee13940f14fa546c625302a76f6e041d8aff0b4d06 python3-libstoragemgmt-1.9.7-2.el9.x86_64.rpm a2b8bb126e65cd44d4bf23f102de96373d2085e2035cb9d12deb4f7a5108056c RLBA-2023:6381 libwebp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-8.el9.i686.rpm fb5f4bbab3ce289b4d6fa2342c41826d9da4c44f0b9f0e3da1b0ee499422bd63 libwebp-1.2.0-8.el9.x86_64.rpm 2546a9c3b973cf0f33c23f9d0801d76eff889ff690338340bfd5f5c8fc11c6cd libwebp-devel-1.2.0-8.el9.i686.rpm 0dc17b2cadc6c573bf09cbebbe052ae62f424de400eef4088674e44fb982c574 libwebp-devel-1.2.0-8.el9.x86_64.rpm 18f3a779ccb3e69d1a08cc2aaffffbc1c5982996df56dbc78b445ead194bdf69 RLEA-2023:6416 libblkio bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblkio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkio-1.3.0-1.el9.i686.rpm 9f0d84987e77ecc1b4220bc82c156c4fac1214f9bc5c89d3629b634a590bf2a6 libblkio-1.3.0-1.el9.x86_64.rpm 409639d9cb0a17dc362d8c62a109dde5c4dac60ec8ff8551d94a3ea87319129b RLSA-2023:6518 Moderate: flatpak security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. The following packages have been upgraded to a later upstream version: flatpak (1.12.8). (BZ#2221792) Security Fix(es): * flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console (CVE-2023-28100) * flatpak: Metadata with ANSI control codes can cause misleading terminal output (CVE-2023-28101) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.8-1.el9.x86_64.rpm 480f7919802a060c42446eacf5b02bc4b793e29b8c306317b25287c835ff510e flatpak-libs-1.12.8-1.el9.i686.rpm 9a12d94219b28d85dfcf0bcbd874fedbdaab5a25076d37a62c910bf7cc603f22 flatpak-libs-1.12.8-1.el9.x86_64.rpm 8d0e99f0580fade5e6eb7a5806f59b42c8e8cd407eb97c1b1860f4da696285c6 flatpak-selinux-1.12.8-1.el9.noarch.rpm afaeeef88d4c5849a3ccc533a7ffd2ab98c392dbb88e4abb370b9e76ddbfe5e8 flatpak-session-helper-1.12.8-1.el9.x86_64.rpm 180ce4c11e02442957453159f17b0ed960a61d57678b6e4e0ba48315278955ce RLBA-2023:6537 librelp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librelp-1.10.0-5.el9.i686.rpm dabddcb362be000147aab4e214ee63a8060af485a9608503a1587e45a38d135b librelp-1.10.0-5.el9.x86_64.rpm 1d51bb81626315669ab07610bec760d4d0e1c469da28b49a5242681185993287 RLSA-2023:6551 Moderate: yajl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: Memory leak in yajl_tree_parse function (CVE-2023-33460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yajl-2.1.0-22.el9.i686.rpm 86745e09d48757f2394c83aef0f0659f1a9286fb9e6597b9377968334de7912a yajl-2.1.0-22.el9.x86_64.rpm 01f37c41e967b2c966ce4fec0de572168de96be5887ae2abd9b83b623e01e1f4 RLSA-2024:0951 Important: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.14-1.el9_3.x86_64.rpm ef3a92748f4cb8ceb9c609b77e1c47f7d357786bfbd7be78ced97babbe06a52a postgresql-contrib-13.14-1.el9_3.x86_64.rpm 2c296c76d9ac1238fc95ea0a5d6d138f183f726e8e098e36984a1f10e42a3bac postgresql-plperl-13.14-1.el9_3.x86_64.rpm 07d929406b1079b272d7503ef685dcadd4b7ae77a5e321f766c3e6539c165115 postgresql-plpython3-13.14-1.el9_3.x86_64.rpm e2934532f1475c9bfe78895eb9d8bb76258a4960d857d70493d358583748dda9 postgresql-pltcl-13.14-1.el9_3.x86_64.rpm a121308825ed44009495411b9ce0e3597e5d017a46a5066768de9e6afd35dd17 postgresql-private-libs-13.14-1.el9_3.x86_64.rpm 084616fbd615fad54b1bf6b3092329fbe3830673f6eb11f1a011f17a828254fd postgresql-server-13.14-1.el9_3.x86_64.rpm 932e69f7c683d4d7ebaa1e4735e025229513c3b1f29f3632f98f69bf4d451ead postgresql-upgrade-13.14-1.el9_3.x86_64.rpm 8ff487b9c98e630140d01e75ff7e542d2fb1f9007aa75e63cd92ef4f3c280cb1 RLSA-2024:1691 Important: varnish security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-4.el9_3.1.i686.rpm 686f39e23a6338230bad0d0a86bd354fcc67d47f32a31458bc6f8d907aa37780 varnish-6.6.2-4.el9_3.1.x86_64.rpm 0c412829f752f79f0d621f0fea8567d9afc6a5a4d40d3d298080bda6a3b97234 varnish-docs-6.6.2-4.el9_3.1.x86_64.rpm 18762b709a7af6125177f3a2bb26741471c5106b7bc452063c45c6b1303201f7 RLBA-2024:1736 .NET 7.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-9.3.0.z] (Rocky Linux-31202) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.18-1.el9_3.x86_64.rpm 1d5a70ba4bf52fc51773782c79650dde9042e62b5f3cc39ed7d246f60db1db1f aspnetcore-targeting-pack-7.0-7.0.18-1.el9_3.x86_64.rpm fca3f282779e37c5bb618b948e70e4b07c390c6eabc4d71a58df7613055d5f32 dotnet-apphost-pack-7.0-7.0.18-1.el9_3.x86_64.rpm ec97277a460804965aa6f7a7594787ddfc6048e8b465c08f173b33607097a77a dotnet-hostfxr-7.0-7.0.18-1.el9_3.x86_64.rpm 131920e7ff4e122d1e79376f2fa817a3b7a2569259c79908383c1721249b5bc1 dotnet-runtime-7.0-7.0.18-1.el9_3.x86_64.rpm a1dffa34165645e6e47ed12ff5e06fe7e83a474c02501055bef54f367ed774c5 dotnet-sdk-7.0-7.0.118-1.el9_3.x86_64.rpm af79f766f5f22a7f3b8bb34ba0cca8c4ef2906c9e061006ecac00bb91adc622a dotnet-targeting-pack-7.0-7.0.18-1.el9_3.x86_64.rpm 7a56553a2f344b735d4f4999d08b164f6cd3fcbc71f93fa0aa62799a16a3f231 dotnet-templates-7.0-7.0.118-1.el9_3.x86_64.rpm 2d72f9097d9cffc37e03a68e89b120479d18eb9ea098a2e3e021671d6509eaf3 RLSA-2024:1750 Important: unbound security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. The default combination of the "control-use-cert: no" option with either explicit or implicit use of an IP address in the "control-interface" option could allow improper access. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged local process to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether. To mitigate the vulnerability, a new file "/etc/unbound/conf.d/remote-control.conf" has been added and included in the main unbound configuration file, "unbound.conf". The file contains two directives that should limit access to unbound.conf: control-interface: "/run/unbound/control" control-use-cert: "yes" For details about these directives, run "man unbound.conf". Updating to the version of unbound provided by this advisory should, in most cases, address the vulnerability. To verify that your configuration is not vulnerable, use the "unbound-control status | grep control" command. If the output contains "control(ssl)" or "control(namedpipe)", your configuration is not vulnerable. If the command output returns only "control", the configuration is vulnerable because it does not enforce access only to the unbound group members. To fix your configuration, add the line "include: /etc/unbound/conf.d/remote-control.conf" to the end of the file "/etc/unbound/unbound.conf". If you use a custom "/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this file. (CVE-2024-1488) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-3.el9_3.5.x86_64.rpm 779a676b0c3f4e86a7e9012134f6d06ea556ce5405764b5a3052726e07ca11b0 unbound-1.16.2-3.el9_3.5.x86_64.rpm 741e1b5b59468d4fb26e1e7a1097bc1f66eaea18564799b8e50b9223d4d0fcfa unbound-libs-1.16.2-3.el9_3.5.i686.rpm 3a04e0cc8e55df00b2ed31fffb3e545407a151ba89bd24d0474143a84d6e06db unbound-libs-1.16.2-3.el9_3.5.x86_64.rpm 1e87341a97cc10cf26d45c6e766061f51ccdd2dc65ce149821de5152948850dc RLBA-2024:2152 poppler bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-19.el9.i686.rpm 69ae8b81a8323bbc93b442108276719d21d788ec782e98c0de5bf784ea4d4715 poppler-21.01.0-19.el9.x86_64.rpm b1d2349e296261b031808815925632cfb0e6cad3e8a3515537c06db005a5693d poppler-cpp-21.01.0-19.el9.i686.rpm 4d40458b9bf34803156c493050380412ab4be9614dabcd805fe42d6d26dda044 poppler-cpp-21.01.0-19.el9.x86_64.rpm 5b9551656aa5339d9cb958cdc8a4d9855eb948028cd3a23f7d3b5621e5d686e7 poppler-glib-21.01.0-19.el9.i686.rpm 7ba399b2b5562b3a8239cc25169589bd6dd19d21430e8b3042876109c6903031 poppler-glib-21.01.0-19.el9.x86_64.rpm 1dd2f238b654e281a2248dc462aa8de18d1134451d84ca1bd650d5e0a08fbc40 poppler-qt5-21.01.0-19.el9.i686.rpm 7dfcd8d5b574da2340804ae14134bdd0b5ab5f86f483aecb025a98f074fd4a09 poppler-qt5-21.01.0-19.el9.x86_64.rpm 6b380d09a4412f33e8197cddb913c3f042fb5ab538eeda1fb9761df17eea9bfe poppler-utils-21.01.0-19.el9.x86_64.rpm c0522813e70013e254b713512f69cd5aa54eb5830739c76c6123914e07f5e190 RLBA-2024:2166 xdp-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxdp-1.4.2-1.el9.i686.rpm 7c2db5e1d6568e9a6952ccff0ac88668a3b30d5f5d175fd8422d05c5e1638290 libxdp-1.4.2-1.el9.x86_64.rpm 6258c83e49e570e6bf768a861b5ddc7a25e7de02270549cd0e3f8b8370d847ce xdp-tools-1.4.2-1.el9.x86_64.rpm b4e2a304c87931610b3c8a6a0a81cd72a4d95118a80b39cb9023abe1753bcd16 RLBA-2024:2200 virt-v2v bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.4.0-2.el9.x86_64.rpm 5616c5baa93b0b19b80d84a813e8973578df9f8d3ad7e9ea7d4281215560c8b1 virt-v2v-bash-completion-2.4.0-2.el9.noarch.rpm a3ca56a8b66cc26fae9432fb53d735e7b6285751419fed180c642445166032ab RLSA-2025:15011 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm 5035405750e88496d570b1e473833c924912ab5953e20a8f7f4b451b79599b23 kernel-debug-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm 26bb6cf123869849acd79c6a17a64a3a41f689f0882660816709d426f5e9ea99 kernel-devel-5.14.0-570.39.1.el9_6.x86_64.rpm c13b722bae7022bd9ff0f5882247d1f8dba4ad3da9c769ffdddf25d7d4f8f262 kernel-devel-matched-5.14.0-570.39.1.el9_6.x86_64.rpm bb16b0bdef3c5c956d3d3b26ee092ac7ad5052f9a39869db35d0bd5c7046e2b1 kernel-doc-5.14.0-570.39.1.el9_6.noarch.rpm 8fa74d4797e2556ec070436f565738c60349f59ffdbea2446fd8a14360107dfe perf-5.14.0-570.39.1.el9_6.x86_64.rpm b424886fbb79dc8bcca7c836a7e22f0de99b4c09b3cfdf4a96a569b18f889c5c python3-perf-5.14.0-570.39.1.el9_6.x86_64.rpm f86cc8dbb7f59ec43d568fec263c9af0d68fcb803b834fc6eb162de28093caea rtla-5.14.0-570.39.1.el9_6.x86_64.rpm 1feace139086da3d8dc2851adc4655d2f2e8e80fed7fe5dbf256b07a65809b75 rv-5.14.0-570.39.1.el9_6.x86_64.rpm 562ab49e96f50e2e68bdc6e01e763f699135c64509f47b748ad9a19186a959e8 RLBA-2024:2196 ibus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-hangul. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-hangul-1.5.4-9.el9.x86_64.rpm 23f5a2f547e4d4f7aeed18396f28d6c6ea697cd2037aac640fbf57cd7ea909ac RLBA-2024:2235 ostree bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ostree-2024.4-3.el9_4.i686.rpm 5888e3f4e887378d1288a4d310ff403b5d1dfa64f1f3002243ed9c10f1b7f513 ostree-2024.4-3.el9_4.x86_64.rpm 81bb522fcfb4e7e5804785d4eb2b34dc0fa8a11ca86b84865cb947be2f8e9e06 ostree-grub2-2024.4-3.el9_4.x86_64.rpm 8dab825e0d672726eb18e7a237ae3be1f6aa15ba847fc5f2607cde9087a7f680 ostree-libs-2024.4-3.el9_4.i686.rpm 5ff642599b10f2db6d8596595f316a758e02f09733cacd6cdc7a83c6ed2e82e1 ostree-libs-2024.4-3.el9_4.x86_64.rpm c363677100f62b72d042d8c1bfa3056c4645778de96ed859e5dfc9712549c09c RLBA-2024:2256 criu bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crit-3.19-1.el9.x86_64.rpm 3e385bc32296cbb7a420b30a2292a43c7f149671f9ef151a48d76c9a2d8a4132 criu-3.19-1.el9.x86_64.rpm a1e64388669acc439304a309a7c7ebc7824c049d07680114a5dcb0fca8a8413d criu-libs-3.19-1.el9.x86_64.rpm 98f9ea659eaca393facb1aebb84ff817a35921f6547767a901def4f94ebc0586 python3-criu-3.19-1.el9.x86_64.rpm 0859e177a3933c19dceecf895e9802df825fa87dc163076879fe74e3d66882ca RLSA-2024:2264 Important: edk2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235) * EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763) * EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764) * edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229) * edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231) * edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232) * edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233) * openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20231122-6.el9.noarch.rpm 0a445bdca139371c3ad501c3f35ea2a64e58a9b6b18c734c70e441b838408b8a edk2-ovmf-20231122-6.el9.noarch.rpm 4c5983e3bd7aa795f76f6b36fbcb0c3b01e79b5829de3dc2cdf289e3b58d51d3 RLBA-2024:2263 mesa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-23.3.3-1.el9.i686.rpm 70551ab8120da29f2e7932c51b80006af2bfb2f1477cf8d0e01d0e884382b2f2 mesa-dri-drivers-23.3.3-1.el9.x86_64.rpm ee41fcb7775fa5e0027f2c65f239010fee488cd0cf55f38df13823e12c455357 mesa-filesystem-23.3.3-1.el9.i686.rpm 2db45781f595ff0d537c52e9d4b8d8184de1766765a5e86524636afc338dafe9 mesa-filesystem-23.3.3-1.el9.x86_64.rpm a3d22d1ca9712e8ff03e09d16c5f523f5b36226b65e82c32513e01b6426c6b58 mesa-libEGL-23.3.3-1.el9.i686.rpm e4c1a103e79f13f80ffc233836b390c78455308d7f32498da51490e21cbf1242 mesa-libEGL-23.3.3-1.el9.x86_64.rpm 950674058ea01ebdc7af8b8be751a515da094a7486b75ff164cd10f656e76a95 mesa-libEGL-devel-23.3.3-1.el9.i686.rpm fd2ded4f7afd4bba1e3fd3fe2d6ef3145512c6c6467ea590c2470dbc039d4327 mesa-libEGL-devel-23.3.3-1.el9.x86_64.rpm dbcd26d625da67b640ef95698170bc0db253d2f0ff5ecea444587a5ca0b9fc7a mesa-libgbm-23.3.3-1.el9.i686.rpm d53b4ca964653fc4008e78314c3a8cf8359bf564cb591d62747eaebdd8252a59 mesa-libgbm-23.3.3-1.el9.x86_64.rpm 8a4751848270baf338bb5c78e06e0450c376e8771d917c10b7d12af6028fe29b mesa-libgbm-devel-23.3.3-1.el9.i686.rpm 5833f5d7b579a65be535e6be3b9559e101664ea5f81a6dbb12c687d6f2f9191e mesa-libgbm-devel-23.3.3-1.el9.x86_64.rpm 4c66b8ce5088481c1ec1c1ae64e8bff042e6331fb5b48e7893d1d389d0907825 mesa-libGL-23.3.3-1.el9.i686.rpm 1fd6d400349a2bcd05b98220d477eef973e930c2a540d8aa34260c6f96e0484f mesa-libGL-23.3.3-1.el9.x86_64.rpm bb290ee83674d5690164a12ba481914a1ae06fdbeb23a14015e32c1b270be537 mesa-libglapi-23.3.3-1.el9.i686.rpm b7ddf0ddb03b3f556253800a5516ea24e7c5e3c0075ec5f500999aa96bc15585 mesa-libglapi-23.3.3-1.el9.x86_64.rpm 220e3a0c0893e2f38425e9618ed4195bd56cd381f9f5e3eee684c3b6b0a3c9a5 mesa-libGL-devel-23.3.3-1.el9.i686.rpm 6cf43b6c30555d388edf9b66bccdb111e6df5aa145d333c2e6635432460f4843 mesa-libGL-devel-23.3.3-1.el9.x86_64.rpm f375fa51771ebdf838828e2744c2ed2364fdc2e9386b3e1cde5c5322bdd91ad9 mesa-libxatracker-23.3.3-1.el9.i686.rpm 687b332be509e70a4abb5f5b97300ab9515e154f4a7480ff9a96974ef3dbffb8 mesa-libxatracker-23.3.3-1.el9.x86_64.rpm 2258f5866aa200063cc099ccdf08f3b64c385afbc80251889518850b445f2312 mesa-vulkan-drivers-23.3.3-1.el9.i686.rpm b8dfc1f8dd76dd7cf83bed567235a13d169b73aa183df70a0f42d3de712f3299 mesa-vulkan-drivers-23.3.3-1.el9.x86_64.rpm 012a0e87e5659f4aa3ebfa58e3b8462d039fbd9a62d945aa4d4a0684e3f738cd RLBA-2024:2268 anaconda bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm a01134c2eee632f1356dc45482fc44739f2a5ddab051dfd9b42598a2d8840708 anaconda-core-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm f9ce79cd4a6d6ef74d6bae8887da4ed1f65b13ca87c2473883114a542c22b98b anaconda-dracut-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 7497dc08812bd2e851ddc0edb43aff0d94a792710dd16a4c07c01e592f74e036 anaconda-gui-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 7a377708ec099150ffed020fadae6e1b33ed5505bae831d397addb69e06156f0 anaconda-install-env-deps-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 956775975f3a7a158f25efb052e10c696c932a85f9ac44e7a9ac52b539e1fa61 anaconda-install-img-deps-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 7950aa6db669165289c77f5692354b1961f1a24c38471b4358fca8514849acb8 anaconda-tui-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 12e512b6ac828ee35ffe532c494dd943c8631e69b1f5d21e255a746d6f1d3895 anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.i686.rpm 79922676230af124538bfc73d70a7417af049ba9f6333543e9656a798c1af2fb anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 241d097f68b31e410e8f252f39ef8b091c201d3447638b0c62ebfcd07a2c5463 RLEA-2024:2269 nbdkit enhancement and bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nbdkit-1.36.2-1.el9.0.1.x86_64.rpm 8efe4eb9fdcfd71bbdd640194bf827d4339e9e18aa8671b83814ba7367f583cf nbdkit-bash-completion-1.36.2-1.el9.0.1.noarch.rpm 3e3a167c8a926a782f993f47a247e85aa2f0d72b7272305873a4fd00a1112890 nbdkit-basic-filters-1.36.2-1.el9.0.1.x86_64.rpm fbf3e07693738f4b3721e8f904beb9d2718d5425c6d6bde679332dafb433b850 nbdkit-basic-plugins-1.36.2-1.el9.0.1.x86_64.rpm bfff09c2ea33919cae617fbd9b9574ac69b51e0a0765624ba16c72270cc12eb5 nbdkit-curl-plugin-1.36.2-1.el9.0.1.x86_64.rpm 6c83c81aa25bca04e634288f465f931e49931d9e3619115fc37295bb4704bc77 nbdkit-gzip-filter-1.36.2-1.el9.0.1.x86_64.rpm 955252174e441cfffc6f9632049f24113c7d41185ded54323fe687d3a174e079 nbdkit-linuxdisk-plugin-1.36.2-1.el9.0.1.x86_64.rpm 6ce576759c79a409deefd2b8b34a560dacf00f77bd98317f992d732f00141f66 nbdkit-nbd-plugin-1.36.2-1.el9.0.1.x86_64.rpm 1aa12859a5aa2034c990a9e33bf4ddd929a04d0da54b5d1acd2b503def69006b nbdkit-python-plugin-1.36.2-1.el9.0.1.x86_64.rpm d54191ce6de49440fb1fe19776c34993cfa824e4354f1130c9f672ef3b569140 nbdkit-server-1.36.2-1.el9.0.1.x86_64.rpm 19511c3ef573c7a9f991192c0caa73f0c01dd4675be9fcfedee6bf3652a66ca1 nbdkit-ssh-plugin-1.36.2-1.el9.0.1.x86_64.rpm 1cca7ad14e7e6b3f5140bff14f5ac88b1da853af64c267bbefdea78a50619a7f nbdkit-tar-filter-1.36.2-1.el9.0.1.x86_64.rpm d7e8c3fa580fff3c7769e4269500f05fb5e67ec45906c8cee8639d09f20775af nbdkit-tmpdisk-plugin-1.36.2-1.el9.0.1.x86_64.rpm 63278db7e4ebc24d8c670cbc9186c2215cefa26e263f46dba41c7f661371e749 nbdkit-vddk-plugin-1.36.2-1.el9.0.1.x86_64.rpm 9348ed528f21b5c3491d6e23d77fc92b05324958126e8438e82754fdbc0fd596 nbdkit-xz-filter-1.36.2-1.el9.0.1.x86_64.rpm 751ef5a0fe56bea3a5250c8a4f6b93f370e85e3352f3856805bcdf008a45ce1f RLBA-2024:2305 graphviz bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for graphviz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms graphviz-2.44.0-26.el9.i686.rpm c1f3c0fa460a3d65b0132ed3ec565446cd1c79cc72a0b7b59240682b09c58f8b graphviz-2.44.0-26.el9.x86_64.rpm 31a674d1d3f543f7bd6d6da6694e3d267dbd1b04ca5e739ba0bdab6bc0411d97 graphviz-doc-2.44.0-26.el9.x86_64.rpm fb3fe805038b2814ac3cd2e615572435b8f61962df818070c8239c60d728d7bc graphviz-gd-2.44.0-26.el9.x86_64.rpm 9bae60111ba4eddb371becb3f0b072830f1d435ccf11d0de37e4257f26374c33 graphviz-python3-2.44.0-26.el9.x86_64.rpm dd7b46b10807ae826f02c9d347dfae2f7f721ac7dda9a21bf24d3a13b0fd7401 graphviz-ruby-2.44.0-26.el9.x86_64.rpm 4e21e7893761f113044c77b8e2cbee7445d2ef1e80605dd0fb5fb2aa031abd38 RLSA-2024:2287 Moderate: gstreamer1-plugins-bad-free security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474) * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475) * gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476) * gstreamer-plugins-bad-free: buffer overflow vulnerability (CVE-2023-50186) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-bad-free-1.22.1-4.el9.i686.rpm 3b909543e9f75c0576f7b20e19fb13bb75b9b0eda730de0f6bbbc133bc56694f gstreamer1-plugins-bad-free-1.22.1-4.el9.x86_64.rpm 3a4be8dde26179e64a28bbdbd7b0cb51a5e9db72aa4d8768577871dc19d54fdf RLSA-2024:2295 Moderate: libjpeg-turbo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c (CVE-2021-29390) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libjpeg-turbo-2.0.90-7.el9.i686.rpm 831d5ca6678ebb931978ccf295c9ffb5a687251f3254f84ecc15d1023692ebb3 libjpeg-turbo-2.0.90-7.el9.x86_64.rpm fa94c3ec7cc34480d79e592b373eeb54ece8a68e7b925fe2de187db274ca0cbc libjpeg-turbo-devel-2.0.90-7.el9.i686.rpm 1ddcc7067159eb5dfb2efc746f61fd76c4796dd1f2b4da4946c818190f939987 libjpeg-turbo-devel-2.0.90-7.el9.x86_64.rpm f966f03fa1eac090b08cba4b36f870631be6e04f5e05e5dd312c58a4be1a2360 libjpeg-turbo-utils-2.0.90-7.el9.x86_64.rpm 35bbb0413cf6457d3d6c556596808ff6a6f747f92369af5a674d19fe299aff1e RLBA-2024:2327 PackageKit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for PackageKit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms PackageKit-1.2.6-1.el9.x86_64.rpm e921da4bd750ba0e5c5dbf5569d805b2ff46c97e28703d7e254e9ab979e1f2b7 PackageKit-command-not-found-1.2.6-1.el9.x86_64.rpm a21839e4c9fc9bc242da74188046aa901ea3324db288580629509ede38b9df60 PackageKit-glib-1.2.6-1.el9.i686.rpm d387e143bd6ade53904b6c09ae02b9c17992e12c2945dabc7de24d4cc8801e44 PackageKit-glib-1.2.6-1.el9.x86_64.rpm 157e526759c77fcaf80d28e299bf65f2ce7d74cdd0dc551d0240cb5305c5b9d0 PackageKit-gstreamer-plugin-1.2.6-1.el9.x86_64.rpm e8b8d386d22c126c28d4ab1d674f678faf6de47e98534ea5a4ee1076d559e59b PackageKit-gtk3-module-1.2.6-1.el9.x86_64.rpm 88febda059947723449072f7a3b10116f840e7698e7662fef9d3589796c9b987 RLBA-2024:2371 dovecot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-11.el9.x86_64.rpm b9ee3ee52898fd90e6a763e8089ea5f57ce6cd622f71d362534864d56ded822c dovecot-mysql-2.3.16-11.el9.x86_64.rpm 21bc6de0fa1e27918d7da9568e94acc78007aecf14c069ddb8fe096053560c60 dovecot-pgsql-2.3.16-11.el9.x86_64.rpm d750cf689170a04267e987bb5dc2abf579eade21d7e61e890cf4a1941449de28 dovecot-pigeonhole-2.3.16-11.el9.x86_64.rpm 6ce671e38fa7851af6af17ec1a9a5f7c9b50e8f117ef7d9a3ce4f4360744f783 RLBA-2024:2383 freeipmi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeipmi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeipmi-1.6.14-2.el9.i686.rpm 57cfdac9ad635b81796f6b89d01670af881f50fdb9dc0a2dcb5304300b8b1dd3 freeipmi-1.6.14-2.el9.x86_64.rpm c101b6450bc64ea9fec4311b208160a4815171ae15b02488046923ab4d6d4ff3 freeipmi-bmc-watchdog-1.6.14-2.el9.x86_64.rpm 49663005b1cb9eb0461c22379795ccf189989ffef0667f83ad6e0c14512cd40a freeipmi-ipmidetectd-1.6.14-2.el9.x86_64.rpm b464b8c31d7611d816eabeacd9867ea0c6cfa10587d339f7ddcfb9f99e413a0c freeipmi-ipmiseld-1.6.14-2.el9.x86_64.rpm 2fced69e71e87e35ea2c1fed2d0357e510dbf4c0755370c1f92cb8e2b11d4674 RLEA-2024:2546 389-ds-base enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Enhancement * [RFE] allows plugins to log multi-factor authentication notification (JIRA:Rocky Linux-30588) rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.4.5-6.el9_4.x86_64.rpm 01d20c8f6cf05a2a3af4ae9fa3c673c2905b31b94255bfb1770de6bb48dcc3d4 389-ds-base-libs-2.4.5-6.el9_4.x86_64.rpm c86d09ee97ccd6e6da389aaa1e9d1c599deeaaa5bedf0e365e11f2401ffe07d3 python3-lib389-2.4.5-6.el9_4.noarch.rpm 189ee6d2588cda76ccae2b209590f1c800d421c68974ad2e7b24db101a251aa9 RLSA-2024:2551 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind-dyndb-ldap, bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) * bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) * bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679) * bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517) * bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) Bug Fix(es): * bind-dyndb-ldap: rebuilt to adapt ABI changes in bind For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-18.el9_4.1.x86_64.rpm ff5356f634bd4693b674cb91b3ea54dbe293f920dd141b37ff311c90da0bf73c bind-chroot-9.16.23-18.el9_4.1.x86_64.rpm e7c7e3cdd5d09d0cd8ace6c0bb8bed0bf194f14df984c529f29fa8ebf0311abb bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm 327b2e07d775badbe551eedd8600184d08a85faaaa26a6e6dfd40f267f0d7a6d bind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpm 57777a5c12156b59facd216d9cb7bfa2a1f52b737446b2e6cfcf2333d86a60e1 bind-dyndb-ldap-11.9-9.el9_4.x86_64.rpm 97ce51116c0af3106d55bc8e84927acd0c5e2c808805105a4f8fccfffbca372c bind-libs-9.16.23-18.el9_4.1.x86_64.rpm 2010fad6e6f94c7ec4b0c98d5d3467a71b1a37160237da86f65dc96e0049ce3c bind-license-9.16.23-18.el9_4.1.noarch.rpm 95fbd7bdfe547e58cf2a1bcbe1e122cb0de6e3fd82009a2daf0baf5a10e4ba41 bind-utils-9.16.23-18.el9_4.1.x86_64.rpm 80e30b094df3dc3ac74b4c47aa3b80275d56013d879a287cdc4b2adb05c6137d python3-bind-9.16.23-18.el9_4.1.noarch.rpm 8c5c77d619fa4721dc5d996b281cd864b9cb654ae22a2793e9186382b90a5315 RLBA-2024:2554 .NET 8.0 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8 to RC2 (JIRA:Rocky Linux-13785) * Update .NET 8 to 8.0.0 GA (JIRA:Rocky Linux-15860) * Update .NET 8.0 to SDK 8.0.101 and Runtime 8.0.1 (JIRA:Rocky Linux-19803) * RFE: add -dbg packages to ship complete symbol files (JIRA:Rocky Linux-23070) * Update .NET 8.0 to SDK 8.0.102 and Runtime 8.0.2 (JIRA:Rocky Linux-23804) * Don't set a locale when running msbuild Exec on Unix (JIRA:Rocky Linux-23936) * Update .NET 8.0 to SDK 8.0.103 and Runtime 8.0.3 [rhel-9] (JIRA:Rocky Linux-27553) * Follow-up for Rocky Linux-22734: CheckCertificateRevocationList flag for SHA1 CAs [rhel-9.4.0.z] (JIRA:Rocky Linux-28344) * Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-9.4.0.z] (JIRA:Rocky Linux-31208) * Update .NET 8 to RC1 (JIRA:Rocky Linux-4073) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.4-2.el9_4.x86_64.rpm 68247549e343d71f173105da93f02a322365b7a752ded567bd1f6b5f92e37cdd aspnetcore-runtime-dbg-8.0-8.0.4-2.el9_4.x86_64.rpm 466033e45416c4527dea15454d87e412ec159b358d2ee29de76f295129e2cad1 aspnetcore-targeting-pack-8.0-8.0.4-2.el9_4.x86_64.rpm fcfe21fb4553e152b047e30c28433ae0a116235ca603d2ea441d3bebb71a38f2 dotnet-apphost-pack-8.0-8.0.4-2.el9_4.x86_64.rpm 2ca1684999ff0058d12cdfaead4ebfb1299737c2b3e10e8c4dae463d1347504b dotnet-host-8.0.4-2.el9_4.x86_64.rpm 36afb34730c2955f5a131c8233ad384cde0a8f3bc94360de11b8c8d3dbdd0ddc dotnet-hostfxr-8.0-8.0.4-2.el9_4.x86_64.rpm 34aae2c4897d3efbc5bb60a057a389c5cade14a42bfc061545644ac2763f4329 dotnet-runtime-8.0-8.0.4-2.el9_4.x86_64.rpm 8ed6977fa5c824a27b8db2ad4ed29b6caf6d7d49167611dc8a01adc205fcc72a dotnet-runtime-dbg-8.0-8.0.4-2.el9_4.x86_64.rpm ea2f146ff29925dab6c872ec0e689d582948171f42ec23fce320690d8e020e1e dotnet-sdk-8.0-8.0.104-2.el9_4.x86_64.rpm d6375955edc464c888fa3b46ab210ea793f664ba63308f8c7df8ac9e1839bb87 dotnet-sdk-dbg-8.0-8.0.104-2.el9_4.x86_64.rpm 890a4689882f9f3e08b30f1cc9b27b150e169231a66e789f04c7191abf356f47 dotnet-targeting-pack-8.0-8.0.4-2.el9_4.x86_64.rpm cd026a47586ef76850ba43ba9b79177bc302eb25ddc0902b35488a22ff9a1fa3 dotnet-templates-8.0-8.0.104-2.el9_4.x86_64.rpm 6aa81c31e6cac852c0a38810e3902db5dee1ba3e1a0a2061519e9a219a73e276 netstandard-targeting-pack-2.1-8.0.104-2.el9_4.x86_64.rpm ade49c2384930739bdb73e12c7d4b1d0bb3ba2edb6358dfaf6dad2a1c48be4d5 RLBA-2024:2552 .NET 6.0 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23 (JIRA:Rocky Linux-11675) * Update .NET 6.0 to SDK 6.0.124 and Runtime 6.0.24 (JIRA:Rocky Linux-14451) * Update .NET 6.0 to SDK 6.0.125 and Runtime 6.0.25 (JIRA:Rocky Linux-15349) * Update .NET 6.0 to SDK 6.0.126 and Runtime 6.0.26 (JIRA:Rocky Linux-19801) * Update .NET 6.0 to SDK 6.0.122 and Runtime 6.0.22 (JIRA:Rocky Linux-1995) * Update .NET 6.0 to SDK 6.0.127 and Runtime 6.0.27 (JIRA:Rocky Linux-23785) * Update .NET 6.0 to SDK 6.0.128 and Runtime 6.0.28 [rhel-9] (JIRA:Rocky Linux-27541) * Update .NET 6.0 to SDK 6.0.129 and Runtime 6.0.29 [rhel-9.4.0.z] (JIRA:Rocky Linux-31198) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.29-2.el9_4.x86_64.rpm 17b228de59b8c94d8cb61d0eb2a16af231b9d423a9d8f3f817bbf1a6337dd679 aspnetcore-targeting-pack-6.0-6.0.29-2.el9_4.x86_64.rpm d96cc4608d3d116655183f76b5c08f03183b804294f084aa7f8c42c20c542e58 dotnet-apphost-pack-6.0-6.0.29-2.el9_4.x86_64.rpm 823ac89826b19fc4ff04181dd9db9fbcbb7601de8e73a113da689dd744bd90f5 dotnet-hostfxr-6.0-6.0.29-2.el9_4.x86_64.rpm 8cdf34440a40f985f08ea7b3d6729f18564424ce1a21c6746f0739401e3d0621 dotnet-runtime-6.0-6.0.29-2.el9_4.x86_64.rpm 8cb366c17c492b796207df8fc3ab00dbfe29ba67e89f189082404df817a2212a dotnet-sdk-6.0-6.0.129-2.el9_4.x86_64.rpm d8213ff06c9eccd32e31fba3ad25b3c666218d36e64ebe736397104ef6c85226 dotnet-targeting-pack-6.0-6.0.29-2.el9_4.x86_64.rpm 082e82734c331b7b941c08d8cb85509ae411f5511fd846b05dc132edbcb9613c dotnet-templates-6.0-6.0.129-2.el9_4.x86_64.rpm 2226817e8fe6514b06ab59306a6366830cc452ff84a96496ed7a47d6f618d877 RLBA-2024:2556 nmstate bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es): * Support checkpoint on rollback when using global DNS of NetworkManager (JIRA:Rocky Linux-31190) * Include driver information in systemd network link file created by `nmstatectl persist-nic-names` (JIRA:Rocky Linux-32330) rocky-linux-9-x86-64-appstream-rpms nmstate-2.2.27-2.el9_4.x86_64.rpm 6e80e3a32be70a97cbf32851413c63b014795609bf860459f191a2c8699df68f nmstate-libs-2.2.27-2.el9_4.i686.rpm af121d597d105f1faa8ff7bee8358330ab8e69c6afd38317c23847ceee00f2ba nmstate-libs-2.2.27-2.el9_4.x86_64.rpm 84aa3b9b00d4d3439b67b4454b67c76606123de1633e1bdbf20f1cf0fd6d9dcd python3-libnmstate-2.2.27-2.el9_4.x86_64.rpm 75902b35b54912e82b9b8b94998c7779cc49a45b3423e0bffebc57724bc276f6 RLBA-2024:2558 ipa bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Enforce OTP for ldap bind (in some scenarios) (JIRA:Rocky Linux-23377) * Unable to re-add broken AD trust - NT_STATUS_INVALID_PARAMETER (JIRA:Rocky Linux-29745) * Backport latest test fixes in ipa (JIRA: Rocky Linux-30905) rocky-linux-9-x86-64-appstream-rpms ipa-client-4.11.0-10.el9_4.x86_64.rpm 2b1ec80adada5a3bef696e1ba376093f2dad187c976aca5c193c30956711394b ipa-client-common-4.11.0-10.el9_4.noarch.rpm 25445b81e0565d116c83e7afddcfcdddccd3811cc91078c7a488f6830d6acfd6 ipa-client-epn-4.11.0-10.el9_4.x86_64.rpm 24c62c9037e6996b9a6ae702ae49ad390f88062cae08ebf7aa2fa150b88a7a3e ipa-client-samba-4.11.0-10.el9_4.x86_64.rpm 4c6b98103b2c2462c73cd436321e6683026b39bb979a180b5d457c89e3a52f34 ipa-common-4.11.0-10.el9_4.noarch.rpm 452254b526e22d696f8dbb2099454e104265e443087d9afcb1a09a975e8e91c8 ipa-selinux-4.11.0-10.el9_4.noarch.rpm ab510d78193d25a80dfffb8c59bed7175db9158e0da47c68a9ec192adf977ebf ipa-server-4.11.0-10.el9_4.x86_64.rpm 942e676508ae99c4ff78859ccc1bc079b87a6f36d77730c02be961dac9660284 ipa-server-common-4.11.0-10.el9_4.noarch.rpm 187f9e8edc4db8c3ce605bfb848f9cf29932bf67a8fcd728a6b0d41df82703b9 ipa-server-dns-4.11.0-10.el9_4.noarch.rpm 6aa42fa1a7a59a2e16e6b522e8009b0bc481cc9581491a60532d1ce66bff9331 ipa-server-trust-ad-4.11.0-10.el9_4.x86_64.rpm 21c46669d2b1b55d4b419e027f9b3c20c121e3a9f60c6e2d7dcc85a18663b8fd python3-ipaclient-4.11.0-10.el9_4.noarch.rpm b2fa9e5b95c4243a3fcca3da4f1eb66015cd9dcc986c54f51f71e326ba0ae43a python3-ipalib-4.11.0-10.el9_4.noarch.rpm a0a4644338e142be85f05d926b4d3004fd4f5f02da4c41c4e29e88a974d914f4 python3-ipaserver-4.11.0-10.el9_4.noarch.rpm 0e8240b50fa26ebd5ec78067ebf5fad0f73f7dcbd799410d996c8f0f1360e870 RLBA-2024:2561 gnome-shell, gnome-menus, and gnome-shell-extensions bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-menus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. GNOME Shell extensions allow for modifying the default GNOME Shell interface and its parts, such as window management and application launching. Bug Fix(es): * Qt5 custom window icons are not displayed in Activities overview or window list (JIRA:Rocky Linux-29659) * [RFE] Group GNOME Settings, Tweaks, Extensions in the same categories J (JIRA:Rocky Linux-32792) * [RFE] Prevent workspaces from collapsing when more than six are present (JIRA:Rocky Linux-31885) rocky-linux-9-x86-64-appstream-rpms gnome-menus-3.36.0-9.el9_4.i686.rpm bafcea2a63881ca54c0d0131dc19dca356d8dcd442c8d59d095088ac90a75f6a gnome-menus-3.36.0-9.el9_4.x86_64.rpm 2946865956bf836fca25e34ca9a6fb51c140ab0ddbe1248137d979e849c23bdd RLSA-2024:2560 Moderate: libvirt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fixes: * libvirt: off-by-one error in udevListInterfacesByStatus() (CVE-2024-1441) * libvirt: negative g_new0 length can lead to unbounded memory allocation (CVE-2024-2494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * libvirt: off-by-one error in udevListInterfacesByStatus() [rhel-9] (JIRA:Rocky Linux-25081) * libvirt: negative g_new0 length can lead to unbounded memory allocation [rhel-9] (JIRA:Rocky Linux-29515) rocky-linux-9-x86-64-appstream-rpms libvirt-10.0.0-6.2.el9_4.x86_64.rpm 24682bd3c590ec592ac88f5bf4e9fa5aaa227fddea73447cca9417a952d2e358 libvirt-client-10.0.0-6.2.el9_4.x86_64.rpm 8e50fc70dd9f48c8a89bea6d9f931fcbafbb9a7f6112caad2b5ab83979fa7b07 libvirt-client-qemu-10.0.0-6.2.el9_4.x86_64.rpm deda1aeb0f1724e372ccb1f8d4581377dbd276263e973337f600985bb5f6956e libvirt-daemon-10.0.0-6.2.el9_4.x86_64.rpm 7ef581303c48f746f3a23841a6ad9ddfbeb23b7679f97b26c7ea4a8eeb624aee libvirt-daemon-common-10.0.0-6.2.el9_4.x86_64.rpm 9e9a63a26d44d4269bc7063c221353b6b35ad052c09cdebf8a21bed35c62e0d0 libvirt-daemon-config-network-10.0.0-6.2.el9_4.x86_64.rpm 6cff19719fa1da685cc3af7061a01b54b59f1ddba696fc5e21332ec1692ca5b6 libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.x86_64.rpm 1211b36e98c51755f692b343796957b44bdda48d65a7849f9be74e3553fd708a libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.x86_64.rpm 5c4ca04366599229d88526fbdd8309df71d89dd230e66db7d7bb67231e949662 libvirt-daemon-driver-network-10.0.0-6.2.el9_4.x86_64.rpm ff040fff8f47005caa117ef3460d4cf8a75f398694f1bbe1c17336b40a5e90bf libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.x86_64.rpm 14cfed91f58b30813654257bc6f70b1aa2d7ebbad33e6474fb3188f0429854dd libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.x86_64.rpm 1d0dd317d07342074687a683b01075ed86f942896c40d01486d2dd8cf01e2ba3 libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.x86_64.rpm 1100759f762df7cb4552f5068757d483aab1ee6ee8a99e23e35bcfbf1d63ae03 libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.x86_64.rpm a3dc4d127f3cfaa524dece51ab41408ed856b60063f147a52f61da4bb33330dc libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.x86_64.rpm eab63e60eaf661012827edc9b2a0c61d31a047289c939350833224515700fb79 libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.x86_64.rpm d9e97b6c7751b967873be75a103096b736447900f40634314409f66c6fc58892 libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.x86_64.rpm 8726b7dd22ed77086cd77d4dae410788ae3ce23ae11f19e1ed83fa357994ebf7 libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.x86_64.rpm 35bfcd1d2a0b1fa36c1603d35fe455f73d18f4023457b250d00218f718920469 libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.x86_64.rpm 8041b91626c17f4b7fdb79707bc2ab4aff2227ad45a84dfffcdd785f4d58e2d4 libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.x86_64.rpm 0e6136fc5051512cdde299892c648d937197a31027aa158e3d16c01b54f2abf3 libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.x86_64.rpm abeb2247b757fbe997a969e463b974938bea9af6c444e15c29891db34ec6fce7 libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.x86_64.rpm bb9ec1fbb59d0766d0979a4928de4d80b706ac505a44fc62f2f2d1387536660e libvirt-daemon-kvm-10.0.0-6.2.el9_4.x86_64.rpm d380f0a9675f44ff0bc87c0d572d7884f8127e859bf74e7915836f12332ba59a libvirt-daemon-lock-10.0.0-6.2.el9_4.x86_64.rpm 513b842c42d9eeeea58aba1da9b655260c4124430fb8f22b9e10433b86cb4796 libvirt-daemon-log-10.0.0-6.2.el9_4.x86_64.rpm 8c07dc1f28058f2c858ee94abcd40c285ffac32aee418f111ff1cf29e508f6f3 libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.x86_64.rpm 96442b82f8fb45f98c06c1217511df1f3c723c48ea9bf900d7f5a917038b5177 libvirt-daemon-proxy-10.0.0-6.2.el9_4.x86_64.rpm b300346986c61bbc23db11ce11cedeea41fb0e6106824bbf877a9b9709415fed libvirt-libs-10.0.0-6.2.el9_4.x86_64.rpm 2825fb4b0de31926f9b3e28cd7fafd8311e17a792946890148935b36664cdeec libvirt-nss-10.0.0-6.2.el9_4.x86_64.rpm f34c46c3c5272841bac7b25e293a1764419ee94acf422087860618effe511411 RLBA-2023:6386 clevis bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-18-112.el9.x86_64.rpm cd5c910ce2197de9c9eff81a6a724d97b015be3c171348275f1163be3bc8ade9 clevis-dracut-18-112.el9.x86_64.rpm 3a478838dec635284bda920cf96b257f9af567fa567bb8dc82d0775f89b169d2 clevis-luks-18-112.el9.x86_64.rpm bb8f24292570e92fe28edeb74c7154c8469b5e126a8732413945addc435b4f40 clevis-systemd-18-112.el9.x86_64.rpm bc29b699e8605bd21acd3a64c71fdf5f620111382aa9d94cf618141126f2f152 clevis-udisks2-18-112.el9.x86_64.rpm 1bd5159168ca4b962131126491bd7c2bfee9a06e1d3c41f607100b46c5db5543 RLBA-2023:6393 python-into-dbus-python bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-into-dbus-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-into-dbus-python-0.8.2-1.el9.noarch.rpm c03ec819385af455e16dae173980766c1c3d9339d91caacab86c1494162e7519 RLBA-2023:6439 gcc-toolset-13 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-13.0-2.el9.x86_64.rpm 4bbaac816b4a4735c71ff1481d6505b24c0ccd1faecbf03440be75d9393ba124 gcc-toolset-13-runtime-13.0-2.el9.x86_64.rpm 3013e8e455a6592f03de4e6ad307a6c424d4dfb0bcedc7d34016412a0c56c872 RLBA-2023:6509 libcanberra bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcanberra. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcanberra-0.30-27.el9.i686.rpm 4e2d51050e4db63f9e84b1b0f8e799aafd7ab2313b62e3c4e496e817813c863c libcanberra-0.30-27.el9.x86_64.rpm 8aaf22d266c8a35420e78ce34099de8d326ac6c3ca57e96cf47792564132e76a libcanberra-devel-0.30-27.el9.i686.rpm e80fe45f382a40ed647bb7d7b3338bbc6a8e5301c12c68e9de9a6fe22d935bf4 libcanberra-devel-0.30-27.el9.x86_64.rpm 15963dfee97969f034e662bd51fe9284fc2d26ed4c8f6d64ed358ff29c984809 libcanberra-gtk2-0.30-27.el9.i686.rpm f6a59ca5d262325afd42112faed97736f06faf489a64c7c918a0fa9c22fbf9d4 libcanberra-gtk2-0.30-27.el9.x86_64.rpm b090278aca96bd282fd4f582441240a97e95aa7b1ac73be668725b8002b92919 libcanberra-gtk3-0.30-27.el9.i686.rpm d8ce788bda5dff30fe3f8d51762094649ab5786f64a82d5fde55d6d32bd6f524 libcanberra-gtk3-0.30-27.el9.x86_64.rpm a66c2e98e5cc4057416998aab54ffa4e163d3c9659c22556868c65721ebfa306 RLSA-2023:6539 Moderate: perl-CPAN security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl-CPAN. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The CPAN module is a tool to query, download and build perl modules from CPAN sites. Security Fix(es): * perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS (CVE-2023-31484) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-2.29-3.el9.noarch.rpm 32a57e85561085a1d806deb5bf09136d04f5359ddf93a199528458cdd36858a6 RLSA-2023:7712 Important: tracker-miners security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tracker-miners. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tracker is a powerful desktop-neutral first class object database, tag/metadata database and search tool. This package contains various miners and metadata extractors for tracker. Security Fix(es): * tracker-miners: sandbox escape (CVE-2023-5557) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tracker-miners-3.1.2-4.el9_3.x86_64.rpm 0411d95e8c060d48de8b43b029d7be5ced601113e6647bd2d9cd7d089cfb9b1a RLSA-2024:1139 Low: keylime security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keylime-7.3.0-13.el9_3.x86_64.rpm 42c14697ef33763b278e9850b8ea2dc9b4affbed3cff9adf402543cbd2061b82 keylime-base-7.3.0-13.el9_3.x86_64.rpm b5da47d8af8c84fb6c8d7ad9d5f3e92333ddcaf29afe0e75a1bf2213de4edccc keylime-registrar-7.3.0-13.el9_3.x86_64.rpm 5c0dad0347f2a52f6b98f6770d78ab8c012e96a6b85a7bf15835dd6980f01f89 keylime-selinux-7.3.0-13.el9_3.noarch.rpm 57b1e41bdbd0e16b92c9b0f3757175bb57dab1d970cac3c683e19deded286166 keylime-tenant-7.3.0-13.el9_3.x86_64.rpm 601203778673c0de3b44af00a03c5f42af38d52dd125742578029578607189db keylime-verifier-7.3.0-13.el9_3.x86_64.rpm 743138b708f866bb0f427c907b6e96b47dbe99a3ab6725483efa3934377e249d python3-keylime-7.3.0-13.el9_3.x86_64.rpm ea2650d29050d0fd1f13dd7ff8efc171816ddda337f79e1b282685a0aa2d871e RLSA-2024:1436 Important: postgresql-jdbc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql-jdbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database. Security Fix(es): * PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE (CVE-2024-1597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-jdbc-42.2.28-1.el9_3.noarch.rpm a97cd36e3e785f022e217545ffe49816bd51f07e1f3f920e3b59f262f98c5195 RLSA-2024:1502 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list grafana-pcp is an open source Grafana plugin for PCP. Security Fix(es): * grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-2.el9_3.x86_64.rpm 982033ce0dd9ab3c0fb45cd612c689b67251c3775804652fe5599d01f6bf6fc7 RLSA-2025:15099 Important: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * linux-pam: Linux-pam directory Traversal (CVE-2025-6020) * linux-pam: Incomplete fix for CVE-2025-6020 (CVE-2025-8941) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-26.el9_6.i686.rpm 9b252982471cc7bc5beda80927619d10d8f96d8c3f9cf719baf4e0b955060b44 pam-devel-1.5.1-26.el9_6.x86_64.rpm a698cbae7824e23ea0d2ced2b64ce687fff5589e506499546f32a59da236b382 pam-docs-1.5.1-26.el9_6.x86_64.rpm 94418fded6d6671efbc69951d6fbf6f1f61b613b32d005ca5baad781ef8fbe86 RLBA-2024:2058 nss bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es): * valid signatures shorter than maximum length are rejected [rhel-9.3.0.z] (JIRA:Rocky Linux-32160) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-7.el9_4.i686.rpm 488873001440c569629ad050ea08a7f3d341fffd3d199bb35bb8415e3239bde8 nspr-4.35.0-7.el9_4.x86_64.rpm bac72510acd9d28a658797730a4e075f2e86de2b70c5f54eb99ddb193794881b nspr-devel-4.35.0-7.el9_4.i686.rpm 8d693e2f556b7e93a15de69f3807139966711bd64163dfc6619b01725958611c nspr-devel-4.35.0-7.el9_4.x86_64.rpm 1e8420a7a937982bc1d8a2a476e0358a929b16442bb07051c2ea1e22bff9c1e6 nss-3.90.0-7.el9_4.i686.rpm e99299a267a84809c659f93a44f92350d1472ccc43cfe8c69b196fd61279cdd4 nss-3.90.0-7.el9_4.x86_64.rpm 85de577728d21b47e726baae6ab01f0d19de52b5a2db8c9e228dafcd4c3c6ee5 nss-devel-3.90.0-7.el9_4.i686.rpm 217475a68a4fbca8ce8af92593bff9878ea15f21cd4073a83a84811fa08d066f nss-devel-3.90.0-7.el9_4.x86_64.rpm 43cc3cd6d47a1bb5761939540ee21be0f767553e0429573d4952349661bcca62 nss-softokn-3.90.0-7.el9_4.i686.rpm f1705aee9ec3a0fb53631789f760b19215c734e79ad7269e04dbe08cae402f6c nss-softokn-3.90.0-7.el9_4.x86_64.rpm 5645929dee8519e877425ee52709391e526a8732c0dfc31f347d83c2bb91b28f nss-softokn-devel-3.90.0-7.el9_4.i686.rpm 59774a654458da28ac6639ad9710e6313f1aab7632e34ed18d68fe429b13065d nss-softokn-devel-3.90.0-7.el9_4.x86_64.rpm 389d4a4a9aeaeba7c3eb455117a0b22b34b3c0cce42aa30f4d2d4713162f35f9 nss-softokn-freebl-3.90.0-7.el9_4.i686.rpm 9c25f09d16e33b9d93b103d9662195b62b75df6f1748510b0537935e980a26b1 nss-softokn-freebl-3.90.0-7.el9_4.x86_64.rpm 406777813ebfdf93acfbb4acabe98a247f00b329337b191ca036c5367bac3b0a nss-softokn-freebl-devel-3.90.0-7.el9_4.i686.rpm 30ae6a07505120f8788ad9d30ebdcc73ec4c941e5dd398357ddbb5e4146faf11 nss-softokn-freebl-devel-3.90.0-7.el9_4.x86_64.rpm bff7640a5d35d90d4d56682872e72cf0d35157c141862704b56aa520f6c97930 nss-sysinit-3.90.0-7.el9_4.x86_64.rpm 825e160077ef15081bb87dc28f5efe7a8b29a579be3406f60d60e40c04428eab nss-tools-3.90.0-7.el9_4.x86_64.rpm e5ea98329ce0fe6782014eb622fdfa8c09ea5cbc4749aed2c2c04337e91ffe16 nss-util-3.90.0-7.el9_4.i686.rpm 48b74a1590bd8d4c05f20072dd8d863eb168918393f803d1f38de401c1544f0b nss-util-3.90.0-7.el9_4.x86_64.rpm e2fe12e79cd81b05c87c3c589ab71fe39e3d6b073e3ba50360c0111efb8ba0ec nss-util-devel-3.90.0-7.el9_4.i686.rpm f93988f229bc8b5899490357bedb6484044a692f98ae2e210f9864ef7fa5f9c9 nss-util-devel-3.90.0-7.el9_4.x86_64.rpm 32b931be252c026b3892b276ee8ba0a38c07a41f30ef14bb2db84c6ff549ab72 RLSA-2025:15608 Important: python3.12-cryptography security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override (CVE-2024-26130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-cryptography-41.0.7-2.el9_6.1.x86_64.rpm 1745dcf7b0f08dfd245e81cfb30a3047c9d2bd5c59351a4afa2ab767529e6af2 RLSA-2024:1940 Low: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.10.0. Security Fix(es): * Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.10.0-2.el9_3.x86_64.rpm c472debc16f3129fc5bd0269674052ca56688c27f9958449d8a5ba2b4765642b RLSA-2025:15661 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097) * kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) * kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm 263f7eaa1d7df363f758812328d7bc665d898e2116f8f130c64e5a1cba6eac24 kernel-debug-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm ff854c952b867f64cc8f13be5b5c415792a35da6b982de52ca2c87b0c54076eb kernel-devel-5.14.0-570.42.2.el9_6.x86_64.rpm a2cbcd56e375c5426aeaafb86ee7022d3838f22d246568992d91ea0393e7c56f kernel-devel-matched-5.14.0-570.42.2.el9_6.x86_64.rpm b9925ff1c671f7aac83856355b1b776a192da8cc1db50307c8546a193a5bba1f perf-5.14.0-570.42.2.el9_6.x86_64.rpm 01ad4a8d99d37c4de6c9275bb085e6136f7157ba5cd89c6fdb972ef49e8ee2a1 python3-perf-5.14.0-570.42.2.el9_6.x86_64.rpm ddf126230c7916950bb255fd8215fd0506dfffdf01c0ed5369035b40ab09d55e rtla-5.14.0-570.42.2.el9_6.x86_64.rpm e249e64e83491a47f0e18c8bca192668e8d064801cbb40c456a751dee9c5195e rv-5.14.0-570.42.2.el9_6.x86_64.rpm 01eeff3e454af36427c9e7d83533d717931bdccbf41a219722ab914bfc4a2cb7 RLSA-2024:1908 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.10.0 ESR. Security Fix(es): * GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-115.10.0-1.el9_3.x86_64.rpm b0cb77b4c408cd1fc3329faa92daa264b69b3c411a842c802bc98334c58075de firefox-x11-115.10.0-1.el9_3.x86_64.rpm d2fa8ddecfefdaa9ffee1fdf3095ac43e14d567aa0fe9190ebd5fa331c7f5bbb RLBA-2024:2087 container-selinux bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-selinux package provides SELinux policies for container runtimes. Bug Fix(es): * container_init_t does not possess ptrace process context (JIRA:Rocky Linux-28925) rocky-linux-9-x86-64-appstream-rpms container-selinux-2.229.0-1.el9.noarch.rpm 23fcdc1a28ba41e39c0e86c95de99fdf055e29b89c9470f215d43e3b7aac86a1 RLBA-2024:2124 crun bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.14.3-1.el9.x86_64.rpm ecd5b6920a01bb91750e93345e50933f007bbe6a79460679fd7e1217e7a663e0 RLSA-2024:2135 Moderate: qemu-kvm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019) * QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255) * QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088) * QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683) * QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.x86_64.rpm e4dc18ff42db1045a8546e0408eef79a6bb9c8f7883e42fe0df66a1b4e99d344 qemu-img-8.2.0-11.el9_4.x86_64.rpm a59485d9bb1d91db6adae2b12bcf1e61509d252e0cd54c2d24865d6942753476 qemu-kvm-8.2.0-11.el9_4.x86_64.rpm a575b25366c4792b905f9be6a00bf659592be6bdf5020a1e0c929130f3243e0a qemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm 8a53ef8ad8bfb49c5c5fe86fbd2afca67ecbd9dacae8f390a31f0d29efbeffcd qemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpm 0306c0985da977432371ba36d84dc81e90c0486c5a486b9262a5534b7ce5484c qemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpm 5b5135158b5d413b8605fa9d5670d5d7d1559067c5680d1c6e24fe6668394fc2 qemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpm 9f29cda87f94aecd3a4373ea6e253319b5236e39ddb7b357b9586115f8ab3ef2 qemu-kvm-common-8.2.0-11.el9_4.x86_64.rpm 583b6783e6da3370bf949d0d029cf5c2616747ebb346e52d8c1cbab07899698b qemu-kvm-core-8.2.0-11.el9_4.x86_64.rpm d1e50b8f614e218ae0224c5478256c696b2dd7a207a620d96798f2e4165b9942 qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm 7e66b489d170a88cf39abb588421ab53fb673176a3fce84c3fefc03e1fc1e2c1 qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpm 3750ad7813b7500fedebcfc19a2df8faa2c5e2337470ddac992d1e045bd46d55 qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpm f5e41cf525b801a8727a5732435eaa02db6ff98da4ed34d7d87a2fab8c07fb7c qemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm dbf5ca64ac195bc9eeed55783f49ba9564dcd6bdbe4665fcabcd909fc2e5983e qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpm 8661f7808d105e3cd65e0a7be7766f1846f0e589a87fe0b42ea9e4b6e658decf qemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpm f36749ba070619a7889ff57a7957d25dc00e3816360c8dc0407c9a0da42e7d34 qemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpm 65679a6ead56003d88dcdd0ba67f35e37192ae732097049898eabeb63a489b03 qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpm 1a06ba68a27ed21324a671967df9cae61d8c03b03626e9b36e14cfef6b109bc3 qemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpm 4def2825ea394653b252fdf7a206b4cc347d94a0ebdf49e454f05b55af9ea2f3 qemu-pr-helper-8.2.0-11.el9_4.x86_64.rpm c955410a50930069d51291a17b11e0d125087f8475b183c65b41cf03c15d7210 RLBA-2024:2140 netavark bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms netavark-1.10.3-1.el9.x86_64.rpm 3930b7b71f2714b01f80f03c8c8193cbe7fc8241a8a6a70fe59d9409fd875642 RLBA-2024:2150 python-virt-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-virt-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-virt-firmware-24.2-1.el9.noarch.rpm 7289c515d4b9d5ff4310d3393da999961f672ad405eb739a077e8a9e26c82ebd uki-direct-24.2-1.el9.noarch.rpm 02a2b3a5c2ab365b89df826f49b77c431d8612ec2f46f15338bd74aa8b98556d RLBA-2024:2155 python-drgn bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-drgn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms drgn-0.0.24-2.el9.x86_64.rpm e9098de326fb4bb31f5507ea8755985bc486d3dabbbe37687bc59bef0368839b RLBA-2024:2168 libva bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libva-2.20.0-1.el9.i686.rpm 5119c02902a717ab17197436503f20164a622c088adc5356630b515534da4384 libva-2.20.0-1.el9.x86_64.rpm a2014d21610d80b058a9273014b178be75097fe3a289bde8fbdf85b312187179 libva-devel-2.20.0-1.el9.i686.rpm 8f99f2a0bedb273947ae4e30b5e760c753892e9e0ef6ed2c58c696e6d3a40367 libva-devel-2.20.0-1.el9.x86_64.rpm 8acc7fce3826ff25a7c38adead37c7de899a17c95e4e886fa61aa8dafdd463e9 RLBA-2024:2189 systemtap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemtap-5.0-4.el9.x86_64.rpm e1d976d2fdf38cd9026e70ced91497cfe3b36e84fabc5b23a6ea8050bccf089e systemtap-client-5.0-4.el9.x86_64.rpm a510df8e414922f023cc6e87fade7dd7a365f76ca9a9a31a27ec42974e9b0f58 systemtap-devel-5.0-4.el9.i686.rpm 639cf682a932ef3134681d9a9789b5f60975dbecf8fd7934003aafe8b7e12480 systemtap-devel-5.0-4.el9.x86_64.rpm 035e13552d7377f9148c49ed373e725ab7886f651695e0e757359ecaa8eae8b1 systemtap-exporter-5.0-4.el9.x86_64.rpm 35ed3505793e0783ba068e44b8606a556d9d972fc66f675d3c24a7aaee27fc67 systemtap-initscript-5.0-4.el9.x86_64.rpm 8c281ad469c9dd3dcffd5ba019f2d93632b499f5ef0c7db888cf8126d82e7b88 systemtap-runtime-5.0-4.el9.x86_64.rpm 956ed46a0bf0361f8d05db1c791acd777daeb919600ca559dac161fe4d96b7ae systemtap-runtime-java-5.0-4.el9.x86_64.rpm 1fe0ad7a4c2cd90478910e55d042de0143d3fd3d6eb360fac85c62bb1bf757f4 systemtap-runtime-python3-5.0-4.el9.x86_64.rpm e77e4ddc6451f146c3f0efa74c21947a9358d1c61ce4910f3f99e9592139e3be systemtap-runtime-virtguest-5.0-4.el9.x86_64.rpm 4a4699a4f3c2d4c5067bfb08f5f5cef5c0de1eacecc72827c6965be0e83e8ff0 systemtap-runtime-virthost-5.0-4.el9.x86_64.rpm 7fb89e1f9a6ad7f283bf45ed7d07cc679f0e872ee7f6ed06f75eac06f9f9bcc3 systemtap-sdt-devel-5.0-4.el9.i686.rpm 82f7db579a88973c8085b54b82c5136d86ae7bae45abec22fc979f93ad5cafde systemtap-sdt-devel-5.0-4.el9.x86_64.rpm 039f0303924727ed2daeda9b49ad94aee9a6d249b32555d06303dbadde77991b systemtap-server-5.0-4.el9.x86_64.rpm ea7ee884657511f3bb06ba7c6c93cec3f2b23799eef31e845feb1b7ad9af2cba RLBA-2024:2194 lorax bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-34.9.25-1.el9.x86_64.rpm b7e7b9690f84d43390b2ece6edbea6593968167be9e2d74c5f0bc75298ff9e62 lorax-docs-34.9.25-1.el9.x86_64.rpm 5648279159c5c2acc11eaa41c9a15049a2b03c94e466eccff35d46962ec3d342 lorax-lmc-novirt-34.9.25-1.el9.x86_64.rpm 1e80c13b3b6935e921fbbd69c33532edd5f9844c072f404304ca37527e05924d lorax-lmc-virt-34.9.25-1.el9.x86_64.rpm 49a9baabcde364871ecd77f0aea76e6acf962b684bdbaf06f8bd18a149ae7f23 lorax-templates-generic-34.9.25-1.el9.x86_64.rpm 2665b0d5ba4a4182f18d10d77fa96f39930bb8a27271a2ad2207e018a69ed4e8 RLBA-2024:2195 checkpolicy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for checkpolicy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms checkpolicy-3.6-1.el9.x86_64.rpm 79477f5854e481a8f5da7f040585833de443558d65d1945d2db96e82cfd29fc2 RLBA-2024:2192 mstflint bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mstflint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mstflint-4.25.0-1.el9.x86_64.rpm 4d27e49c0a97fe90faa63b021b2061f4d8bd06d59b17fcc11cca6363fd8404ec RLBA-2024:2224 cmake bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cmake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cmake-3.26.5-2.el9.x86_64.rpm ba07770c6a3b01bf5b38cf3840a4b7e421f0707a8209a704791001624dd6230a cmake-data-3.26.5-2.el9.noarch.rpm 0891cd72c726424f908ad44a60f30905af559b9a54c9a89c158970fba2f22278 cmake-doc-3.26.5-2.el9.noarch.rpm 62372082180fd51232c7236289e70da07d2f54fdd18a981a1f0fa1de6eb8611a cmake-filesystem-3.26.5-2.el9.i686.rpm 9fa2f9ff5fa71cdfa03a34248a7b18288d91293b59be2df8eebad65e19e2abf1 cmake-filesystem-3.26.5-2.el9.x86_64.rpm 7685f02b8265fda0ad7cc3f5f939f35fa373c8326b6fb285636a0a309ccbea7b cmake-gui-3.26.5-2.el9.x86_64.rpm 5258abad357e5fc560b69ca97ca19da35dfe0c75e9cfc573afd01ca5c90825c3 cmake-rpm-macros-3.26.5-2.el9.noarch.rpm b0733f65960914c27083e9eaeb3bd7ab30eda6ac62419573362300fcb7ad2500 RLEA-2024:2221 gcc-toolset-13-annobin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-annobin-annocheck-12.32-2.el9.x86_64.rpm b2119bdd933b9d0eb5880209e7622cd42add0301f26970770e8d4d7353c63dc0 gcc-toolset-13-annobin-docs-12.32-2.el9.noarch.rpm 3e518b37b2c7bc956973266cf35ba42c010207a1b5aafbddc2ad70b3c25a19ad gcc-toolset-13-annobin-plugin-gcc-12.32-2.el9.x86_64.rpm 4057364ea5e6c91645dc618da1a44615f4993e23fc2d8dd80e0bc627ce1ff34a RLBA-2024:2220 ipa-healthcheck bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-healthcheck-0.16-3.el9.noarch.rpm f9f342d92518b6473ceed9322542feceac762abd8575a1a301ad71ae74967f00 ipa-healthcheck-core-0.16-3.el9.noarch.rpm 0a04ad57dfda6d0a7193a6a730e310fa4f96211e33bb125d747b3b34adad4f6c RLBA-2024:2227 rhel-system-roles bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.23.0-2.21.el9.noarch.rpm 6b94e2bc5347199adc46239fb4f406922209efdb7849231fb5a6ed37eded7f6d RLBA-2024:2240 git bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-2.43.0-1.el9.x86_64.rpm 82047539b88e6d2a28111f0f0c7c1c98878358ff237259cc95437071ff8837df git-all-2.43.0-1.el9.noarch.rpm 6264b4bc6a668794aad97a12f08d779362b07837ba7c295d8d249f65e2585ddb git-core-2.43.0-1.el9.x86_64.rpm 426f2f968935392ebc5bd58dbf3bed8aeae970dd53853a5cae8efed44d5af850 git-core-doc-2.43.0-1.el9.noarch.rpm 11cf184fd9c6688e2527aec0ec02bdb9a43299dd622ed94ccb692ee7ee0ef4f0 git-credential-libsecret-2.43.0-1.el9.x86_64.rpm fb67c4b3a74d18473885ab94e8a603eabd129470d8f35c7f134da0fd1ba86ffa git-daemon-2.43.0-1.el9.x86_64.rpm 3f18dcb59117f915321553ebebb38ddd9fc513433923bbcba06eceb27c37306b git-email-2.43.0-1.el9.noarch.rpm 4469ab8fa2b21ba709c59403db2fe454b8c087f27556c7e4fdc6edf755ea6c13 git-gui-2.43.0-1.el9.noarch.rpm c16a96386551279568ac2c635f67531657219d15d5a17a37f1c81eb7f1bd2cd5 git-instaweb-2.43.0-1.el9.noarch.rpm 3a830fe0c6b179d0c8405ff2f91a395ddbefd8a8aaf9e2a755e9861da28f1992 gitk-2.43.0-1.el9.noarch.rpm 702a75a03b0244841eea17cf1738cc46143958d6b50f2ee419c1d734b248ef03 git-subtree-2.43.0-1.el9.x86_64.rpm 20752fbcd8a66c811c750a4a333cea38af12a71de50e9abe139faa8fb71e9b26 git-svn-2.43.0-1.el9.noarch.rpm e294967b42e02f2978b07ee85dc0ddf9d1fb81c3c687f3d15b53f8aca792f927 gitweb-2.43.0-1.el9.noarch.rpm 75e1d568039679493d68d6418f1a9194c8c6e88acc06f550a76a16c4e8d1ed59 perl-Git-2.43.0-1.el9.noarch.rpm 8f6b026ced005bff7287f283fabbd051424d06457cf51ccdabb7b41ccc3d97a4 perl-Git-SVN-2.43.0-1.el9.noarch.rpm 76a9f34a9cf7b44e127bc04320f4667804bdae5097904bfb13f705f0fe171c90 RLBA-2024:2251 resteasy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for resteasy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-resteasy-client-3.0.26-19.el9.noarch.rpm 049591647ac2b508ee051042ff5075efa33ea5218eb46986e31d7d1fb1b7d09b pki-resteasy-core-3.0.26-19.el9.noarch.rpm 33d8f3eb91874c11dbbff9329811009b2242375bd3fb694856a6df7988bb5fc0 pki-resteasy-jackson2-provider-3.0.26-19.el9.noarch.rpm ca163d7c77cd13b13aa2e3a56941d12dacedf8a29a127e118417ba833bcf1bfd pki-resteasy-servlet-initializer-3.0.26-19.el9.noarch.rpm dab9c5e990dcf685fb73067f4db0e001f235f36293f3c7da887274920dac0a39 RLBA-2024:2248 gtk4 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk4-4.12.3-2.el9.i686.rpm 9d17f5bb1d23794cc9cb8f16958128d753f1dfb07221daf18fc19a97500766fe gtk4-4.12.3-2.el9.x86_64.rpm 346234a863d3f4161192266c4234c260f0e486b9d47b22c2104a24bb545601b8 gtk4-devel-4.12.3-2.el9.i686.rpm 76606ea83ed1fc0559ca605556675392d0bd709dd3e46dac3f3f8b7c333281ac gtk4-devel-4.12.3-2.el9.x86_64.rpm e78120420d5d42352b4c5d7ba6d0f9d8d6be464979a0dac8550f01082bfc32c4 RLBA-2024:2249 debugedit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for debugedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms debugedit-5.0-5.el9.x86_64.rpm 68f6898f82bdbc760d63ba94fd732e6eba7e9f830c17a63ddb1daf7ef66d4aa3 RLBA-2024:2250 pki-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.5.0-1.el9.noarch.rpm a003500fcea4d6ecd42f11d187b2798e8f405c2c25946642bef395dc1bf8cf13 idm-pki-base-11.5.0-1.el9.noarch.rpm 32f22a1326b1b36b6e562ded29d7212bdca19c58763bc22d22ae84c61c73ede9 idm-pki-ca-11.5.0-1.el9.noarch.rpm 2353075e0b25922fa9d63ecb833358a97058b9277e1000e0f1f7a4642a40bda0 idm-pki-est-11.5.0-1.el9.noarch.rpm 83134bb398c38cf98ee77ffada8961b20bb67e7275678ba92d59986a279d4054 idm-pki-java-11.5.0-1.el9.noarch.rpm 179d8521150ae769194f3c24dd95f1dde5cbdd10a15bcc08790666a093bbb5ee idm-pki-kra-11.5.0-1.el9.noarch.rpm a6010777eac229e33cb0e35ea134001b64268fc6d3a7a855a6bc1a7aa35d621b idm-pki-server-11.5.0-1.el9.noarch.rpm 899cd816d3123cd15a36ddf345669d88f01c104baffd373786de58a9e66a6c3a idm-pki-tools-11.5.0-1.el9.x86_64.rpm 17354e85a678beac1f7dd28f440db40f1130f551ab1a3fd9f50ea73a4f0d793c python3-idm-pki-11.5.0-1.el9.noarch.rpm 49ab99c6b596b5393d39fecb1f322adc4423e6b24b5719e4573293260926b8ff RLBA-2024:2265 NetworkManager-libreswan bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.18-2.el9.0.1.x86_64.rpm e8dcf0b2276c1ff2b83d5e7f4074bab0525e4c4b1f5e813166dbbd50cc5c32b8 NetworkManager-libreswan-gnome-1.2.18-2.el9.0.1.x86_64.rpm b0289fa65b10285dbad854b39f32db98de5562e330e637b27f3cd107f9093c68 RLBA-2024:2271 conmon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms conmon-2.1.10-1.el9.x86_64.rpm 391c45ff77cf158131d76e88be05ef9751baaacf0b44e3ff97444fd9688d9940 RLBA-2024:2267 passt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms passt-0^20231204.gb86afe3-1.el9.x86_64.rpm 301c1eff80a20e2f9fcf5684c1a9d0026335b419cf9e0b959374d8ea4b974351 passt-selinux-0^20231204.gb86afe3-1.el9.noarch.rpm 2d09c644801dbaa4454086546ac7e3b95833bbe5034b285d3232fb41a80c2013 RLBA-2024:2281 virtio-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.38-0.el9_4.noarch.rpm 761a7ff242e6278a206a38af0c56e3eb08ce696f5183545ba43bdd58d86e9444 RLSA-2024:2278 Moderate: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.57-8.el9.x86_64.rpm 47249e8b9931ce64829761a7f1ad02fef0af9b838b4ed3185cffee13ffe5ef1a httpd-core-2.4.57-8.el9.x86_64.rpm 28ca7e85f34005fbdbeb8e683008aa351cc932eea3f8fcac893415240bb8cc2f httpd-devel-2.4.57-8.el9.x86_64.rpm 063801a4b727db25053215e7abb72d6fab79293730e7df0b57b0612bc65381f9 httpd-filesystem-2.4.57-8.el9.noarch.rpm a6954de6f5771746b49faaeca1a3856cf8cbd4cde336e25fbdfee5d8af47adc8 httpd-manual-2.4.57-8.el9.noarch.rpm 0f3a9604599a1ab41e26bba6af81625b98ee2604b72fc6b7de7c684626def9fe httpd-tools-2.4.57-8.el9.x86_64.rpm 35f81828a42e0e53aeb1d7516d7b041a958cc25a12b54a40142ba4ed81c8caa7 mod_ldap-2.4.57-8.el9.x86_64.rpm f1a0c1896048a18c1cfd20078f6db8dae2d307594b0f6a43feb18bc12536f7ad mod_lua-2.4.57-8.el9.x86_64.rpm 3238f1f065de01959add1322018d152cac7f3aca914c68d566bcf881d5bf6802 mod_proxy_html-2.4.57-8.el9.x86_64.rpm 89799c4a426f372db5215fe572d380c1ddb40001db341702abd723fff6309c4f mod_session-2.4.57-8.el9.x86_64.rpm 78d29186f06a51d2da3e026c6269587cc1847e03798573abf9cd513f6bc316cb mod_ssl-2.4.57-8.el9.x86_64.rpm 30ed46404c44402cca3fc893657c826e31f6c9f8695fd6bc48229e545944ebfc RLBA-2024:2284 pipewire bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pipewire-1.0.1-1.el9.i686.rpm a2a9dc4529315daf00570585b510b032b870125b462894f0a20d6c67d55b897b pipewire-1.0.1-1.el9.x86_64.rpm e9cb9ca8d23a09e15963f7c02e7899a63ad1a2bde0b15b0c0d0e6aafc3f97a9f pipewire-alsa-1.0.1-1.el9.i686.rpm 3daae36d688d4e4e0ff0185fb28e29945907f0c0f23f95d0d1028ae2e64c3cca pipewire-alsa-1.0.1-1.el9.x86_64.rpm af56603a4c3601a6762365fbf3b461f66bc1e9f28afcc7a7111e75e77fbc1b22 pipewire-devel-1.0.1-1.el9.i686.rpm 7a3de72a09e96aea9b5a26e2b2ef8961afca06e9f99aec01231b2eef6cf48828 pipewire-devel-1.0.1-1.el9.x86_64.rpm abcc4ac67914514464331101c84a18bc03846a26948e03a15bc31946e0d2f23f pipewire-gstreamer-1.0.1-1.el9.i686.rpm 168746a7009ffb4a63c7f099ce096f978b42a4f3cb67562c831507d59899af7b pipewire-gstreamer-1.0.1-1.el9.x86_64.rpm 7366d6d5be108ea4988c033ca2929bf07188bcc6cd83b048fd15b586443c5cf7 pipewire-jack-audio-connection-kit-1.0.1-1.el9.i686.rpm cb4623ee3555e35b0b5db0dc9046d46289b73e5a9cb88fc0049abcf5f4568a8b pipewire-jack-audio-connection-kit-1.0.1-1.el9.x86_64.rpm ecbc4b29eae3d7542890c7f6f5d50c8ce63f081571d69ff6d2fbc92aa6f21424 pipewire-jack-audio-connection-kit-devel-1.0.1-1.el9.i686.rpm a021974ccb72b432e0cb9ab8b6d0282c4745378b36e29f8ff03b1f8fbb29551c pipewire-jack-audio-connection-kit-devel-1.0.1-1.el9.x86_64.rpm 3bc848ff07d3ff9a4a1fbbc7c191d02a97c917231eec17a5ece25df1556aaf3a pipewire-jack-audio-connection-kit-libs-1.0.1-1.el9.i686.rpm 20cf1069fa5a11381a8089dd7fccdd403cc20aa6e09baae01701ed8cd59ce84d pipewire-jack-audio-connection-kit-libs-1.0.1-1.el9.x86_64.rpm c9114c3bf386afa9586983980af3f9b0fdfad9728bf858e85c51e6e6acca63c1 pipewire-libs-1.0.1-1.el9.i686.rpm 38ef3a34b102fc89638e116bdc06b4a280cd89e384fc94b06c482f2409e5875e pipewire-libs-1.0.1-1.el9.x86_64.rpm fb799685b89502a91ae07345900eaf582bc1b4e0a314724383711a448d81dbec pipewire-module-x11-1.0.1-1.el9.x86_64.rpm e1f42e830c5efa8205975e4bb7c86e7da1e3c96b903946f14cd3c57e42495529 pipewire-pulseaudio-1.0.1-1.el9.x86_64.rpm 4622ed4cdfce03a3cb942aa1f9d5f6cb45aa66a4c9c6873678cf54d2f0c8d85f pipewire-utils-1.0.1-1.el9.x86_64.rpm 210405632604fc422130e376df06618c13c982a12509d55f3860912c99215587 RLBA-2024:2283 rear bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-24.el9.x86_64.rpm d735832fce28f2098f97dc2e34ec5a05007c6a5447a870304162056a4dc9187b RLBA-2024:2291 boom-boot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.6.0-2.el9.noarch.rpm e73ec96e5d76b93cf0885b9dbc61699fc8b7ecdf75820f2bca5dc3fa290c00fa boom-boot-conf-1.6.0-2.el9.noarch.rpm 1429315550655a70db2a373d112cbabb25139dd6846a4b78775d8afd947479dc python3-boom-1.6.0-2.el9.noarch.rpm 8aba695c6682e7460ce0b18ad9bc2ef0ecc9f7ffcea61f382d74d1e5b6b76666 RLSA-2024:2302 Moderate: gstreamer1-plugins-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer-plugins-base: heap overwrite in subtitle parsing (CVE-2023-37328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm 99a46557e593871452defd764667b95d9b99d32b181b001d4490b90b7eabb630 gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm 624ad80a70d26242b95f2856fbc93a4aae0803ee1e22d782639fed6f5be102e0 gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm 219951a3e647657822208d08f5cce68e0365193f2e5f77f78dc1943056780703 gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm af8a6b6d642654ac3a04df92bd695762112eff941f20626e9ed95348098a16e6 gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm 6c1741c4cbdfab62008c3366d01ba2866a7cf3c32a7ce4fae03d419d39be2c18 RLBA-2024:2306 tomcat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.62-39.el9.noarch.rpm fc35da66f8fb2c300398d62efe850f2c6b9b4e56125cadb0929fd6ece99fffc5 tomcat-admin-webapps-9.0.62-39.el9.noarch.rpm 7474e0395b579ba93a49bd7803ce04eed2392058b689dc6f92eba6dfd123bbad tomcat-docs-webapp-9.0.62-39.el9.noarch.rpm 6f61f06bf3d3961ab8ec7dacd936f71499e1d63eae6b1cb9129501371e48c8a3 tomcat-el-3.0-api-9.0.62-39.el9.noarch.rpm e7d2c9064855fbfef013ea8ee6dc220f2fc16792b3e0f52aa5cb852119a135aa tomcat-jsp-2.3-api-9.0.62-39.el9.noarch.rpm 9e382c3942d6994c2352d0a69e0ace5a830fec7cc12f46f4e85beb3262b5c385 tomcat-lib-9.0.62-39.el9.noarch.rpm 76bc1a62d9272fb3581be15f61c22ebd352865c9d2d637d3f2b1c67888d5b0dc tomcat-servlet-4.0-api-9.0.62-39.el9.noarch.rpm b1e8cb4bc321aa1c9f588dc3f129dd1bbf8eae89a335fa990229da82c68d886f tomcat-webapps-9.0.62-39.el9.noarch.rpm b0c91faa2a879e50e85bc8d0b7be95d40a14b37a4a8a81761549c608be90708d RLBA-2024:2312 python3.12-lxml bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-lxml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-lxml-4.9.3-2.el9.x86_64.rpm cf9119305173378f3614be1da24d6444dd4d646f9d6cb44d64b9dc218631c763 RLBA-2024:2314 python3.12-cffi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-cffi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-cffi-1.16.0-2.el9.x86_64.rpm e73ae03307079cc9fa9dc61b7353382f41d937a79cff4855744cc2d8d5ece8b8 RLBA-2024:2311 python3.12-mod_wsgi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-mod_wsgi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-mod_wsgi-4.9.4-2.el9.x86_64.rpm 63b72bf977d8925ccd3c671f32e76a89e6a7efa71009729df551b20b26a4e088 RLBA-2024:2325 python3.12-pycparser bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-pycparser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-pycparser-2.20-2.el9.noarch.rpm 9f389ebe3db0f0e73044b8f7be99d3bf74b14e0ea2b9a194d747468a864cbce9 RLBA-2024:2326 autoconf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for autoconf-latest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autoconf271-2.71-8.el9.noarch.rpm bdf580e92896fdffd985af615c90f927ef21e51dad75c2971bf5b4c6a0e5f52c autoconf-latest-2.71-8.el9.noarch.rpm 0c53fbc8973aaa6779e784a39c1ea82cd3e01ea8e552c6075c9c9e873084134a RLBA-2024:2329 mingw-qemu-ga-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw-qemu-ga-win-107.0.1-1.el9.noarch.rpm 8c300ee1743ef5ce5d24cf7c0d5e94cc2ab57ea916a1a00b72f3e10384ef373c RLSA-2024:2337 Moderate: python3.11-cryptography security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. Security Fix(es): * python-cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-cryptography-37.0.2-6.el9.x86_64.rpm a01713ce78376c67697be7db182e4f36b733fc67af543e43f4c9b8bc25031cb6 RLBA-2024:2335 wireguard-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireguard-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireguard-tools-1.0.20210914-3.el9.x86_64.rpm 9b2010e03fc76de4f3c630236aabe25c95f9d8d09fa77087bd5111912a3f3048 RLBA-2024:2338 virtiofsd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.10.1-1.el9.x86_64.rpm 9a821845325fb5482070bb132f88c64bbceaa18734b631f6e4bedb6f47f6f41c RLEA-2024:2351 rust-afterburn bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.5.1-2.el9.x86_64.rpm b80275800eb3fb6c5142dc57b6216a02a16bad32b9e41e4f5295899a900f11a9 afterburn-dracut-5.5.1-2.el9.x86_64.rpm 007514eb74487dd5a84761739564cede0b0cddd095b67bbe39fcf71bbf731184 RLBA-2024:2354 certmonger bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms certmonger-0.79.17-2.el9.x86_64.rpm 016d89830e0d220c1ffffc2c004a95d45e49444637953e52edf0e65ecb1e0fae RLBA-2024:2352 libfprint bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfprint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfprint-1.94.6-1.el9.i686.rpm 075251b588e71a1e334cbe9cd6afb6b0f5f72a34b9ac3900432b4b543ccff3ce libfprint-1.94.6-1.el9.x86_64.rpm 7f79a434cfc40ce01bae3ab11f6885e0d95425160f07f8732ed3f66bc8b1855b RLBA-2024:2362 squid bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-12.el9_4.x86_64.rpm c55c41498482cc686f1220dfa7cd3d956750228b97816ccf5fe06be823c8e197 RLBA-2024:2361 cyrus-imapd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.1-11.el9.x86_64.rpm 62602c0e629f554f36537a143af2cec6390871573aa9e45fe9d92ee7e9cdbeae cyrus-imapd-libs-3.4.1-11.el9.i686.rpm 9fe4977abae9776ee0afaa0f1d0f5aa70eda7ab3365124d90537131aca264212 cyrus-imapd-libs-3.4.1-11.el9.x86_64.rpm 6d13b2610c0df2e686fefcb3f50cca727f4c406f630496dc2ddc2200440cdf08 cyrus-imapd-utils-3.4.1-11.el9.x86_64.rpm e26155bb0a882e7a2e438c9cdb4c3d292c5251d42e49ea410807d66001d42353 perl-Cyrus-3.4.1-11.el9.x86_64.rpm 538265a8a751c829459a1b490f844a4f19588d14482e1812437e407e5d7fef87 RLBA-2024:2359 cockpit-session-recording bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-session-recording-16-1.el9.noarch.rpm 10931a009aafe5af63220916026abf1ecca34bd31bea5a234db9bd14afd97559 RLBA-2024:2367 tftp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tftp-5.2-38.el9.x86_64.rpm a84488cc0e9a174e4ffad97fe52d98e897438ea2927d0951fd96d7f5aa4ae01a tftp-server-5.2-38.el9.x86_64.rpm c75514ea4b434cca4d9da3e299054809467d867f62e16aca5dfc0ccd1be488ee RLSA-2024:2366 Moderate: freeglut security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for freeglut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list freeglut is a completely open source alternative to the OpenGL Utility Toolkit (GLUT) library with an OSI approved free software license. Security Fix(es): * freeglut: memory leak via glutAddSubMenu() function (CVE-2024-24258) * freeglut: memory leak via glutAddMenuEntry() function (CVE-2024-24259) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeglut-3.2.1-10.el9.i686.rpm 74c47d07a5ca209ea2be085216ffb5e7104b759047313eade4b01cef043695ca freeglut-3.2.1-10.el9.x86_64.rpm 7d27717e88edcb760d8c38a2e9230cf932f8cccbdd49916661b7fee649584058 freeglut-devel-3.2.1-10.el9.i686.rpm 5a6fdb49ef1777bec686325d12713887a586a99d50bb2aa8e8094bf63249448d freeglut-devel-3.2.1-10.el9.x86_64.rpm 8e3c747e36e8b9e504e4bc152a67429156946a670293e4f9f1127827fe94438b RLBA-2024:2370 synce4l bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for synce4l. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms synce4l-1.0.0-1.el9.x86_64.rpm 552ed778b51a5f1c4078dcdc21bba91db9fa1e0fa3f13126796883396196f48f RLBA-2024:2372 sgpio bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sgpio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sgpio-1.2.0.10-31.el9.x86_64.rpm 2c9b2dc5b631cd20393d1de8bd525273b0c6307025e73f8005fd2e801ce7fc92 RLBA-2024:2381 rust-bootupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.18-1.el9.x86_64.rpm aa8423808dbafce09b3fff863106b45a1382c119983f496469834b1a8369b8d2 RLBA-2024:2388 fuse-overlayfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.13-1.el9.x86_64.rpm 42edb4465d7bef9283de5bf783665f7036de514d5851a8759440c4141f273e0b RLBA-2024:2390 ibus-anthy update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-anthy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ibus-anthy packages contain the Anthy engine for the IBus platform. This provides Japanese input method from the Anthy library. Bug fix: * Previously, users were unable to switch the input method engines from ibus-anthy by using the Super-space key if the input mode was the default Hiragana. This problem has now been fixed. (Rocky Linux-24804) rocky-linux-9-x86-64-appstream-rpms ibus-anthy-1.5.13-4.el9.i686.rpm 68dc9ca190bdbbef0e856f5a7ad2847b1731ba5a0b997ea4a8e925dcceb46758 ibus-anthy-1.5.13-4.el9.x86_64.rpm efd7e8ac7ba7280887a34154cf8f4dbb2dba6308e7e28c1d5e602558d223de79 ibus-anthy-python-1.5.13-4.el9.noarch.rpm aa7c1c507a88c15972bb29f44e9a149f5833ef2be2c1982cbab44faaee328039 RLBA-2024:2547 sushi bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sushi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Sushi is a quick file previewer for Nautilus, the GNOME desktop file manager. Its capabilities include previewing documents, PDFs, some text files, sound and video files (using GStreamer). Bug Fix(es): * sushi will break if WebKitGTK is uninstalled (JIRA:Rocky Linux-28362) rocky-linux-9-x86-64-appstream-rpms sushi-3.38.1-2.el9_4.1.x86_64.rpm 2ef072e9fccfb8050eab51dd365d9eb39c9370b21462c726e96d5c4dbf506a09 RLSA-2024:2548 Moderate: podman security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fixes: * podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) * podman: buildah: full container escape at build time (CVE-2024-1753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * liveness probe not called by podman when using httpGet (JIRA:Rocky Linux-28633) * Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:Rocky Linux-28629) * [v4.9] Backport two docker CLI compatibility fixes (JIRA:Rocky Linux-28636) * Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:Rocky Linux-14922) * Need to backport podman fix for SIGSEGV in Rocky Linux 9.3/8.9 for UBI based containers (JIRA:Rocky Linux-26843) rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-3.el9_4.x86_64.rpm 83dda3781bcf6fb15d0ffc81fa2e5ba3224fcfed61afd40f0123c6d36c5c7b79 podman-docker-4.9.4-3.el9_4.noarch.rpm b923e8837bc7f916eecfc1e426ed28442d9d9167126668c301c837e0a1a9be50 podman-plugins-4.9.4-3.el9_4.x86_64.rpm ae700303ac9fd359f631a4e9f28caedb46a8b51c9335fe64528d2c39cfed4cc1 podman-remote-4.9.4-3.el9_4.x86_64.rpm e5513af566e2334ee02a5e98a6d5270ba5ef6d1d7e259e3c4fd096726e85c79c podman-tests-4.9.4-3.el9_4.x86_64.rpm 66463c8fcce0d880a1de9367bb16eaae13082ae9fa40c785817891a93a00b9ca RLSA-2024:2550 Moderate: buildah bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Bug Fix(es): * TRIAGE CVE-2024-24786 buildah: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] Rocky Linux9.4 0Day (JIRA:Rocky Linux-28230) rocky-linux-9-x86-64-appstream-rpms buildah-1.33.7-1.el9_4.x86_64.rpm 05749800baff333de4aa4ed733c05ef60cbd247157ecdc22aa7a1b96af0ac9f6 buildah-tests-1.33.7-1.el9_4.x86_64.rpm 7d5b120399c1701146ce958e4d75a0a523fd0dd5e5c0a60bc4e559ead70c50c5 RLSA-2024:2549 Moderate: skopeo security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) Bug Fix(es): * TRIAGE CVE-2024-24786 skopeo: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] - Rocky Linux 9.4 0day (JIRA:Rocky Linux-28235) * skopeo: jose-go: improper handling of highly compressed data [rhel-9] (JIRA:Rocky Linux-28736) rocky-linux-9-x86-64-appstream-rpms skopeo-1.14.3-2.el9_4.x86_64.rpm 871acd34f5da528059aee2904ce025346920665c969a9d0b054d36ce6d75eccd skopeo-tests-1.14.3-2.el9_4.x86_64.rpm bb9a8e42487189e4a1551867d4b16223bc25bdb7b327b7a1998bfe6795e8ca1e RLBA-2024:2555 gcc-toolset-12-gcc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10. Bug Fix(es): * [Rocky Linux9] Backport PR libstdc++/113960 (JIRA:Rocky Linux-30832) rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-gcc-12.2.1-7.6.el9_4.x86_64.rpm 9f2c6b488abb038d625125a710260e73592e117a084225558e1f1de349ad5d9a gcc-toolset-12-gcc-c++-12.2.1-7.6.el9_4.x86_64.rpm 36c15b067c418f064f4165e275cfd1df796534a1346f1c853b5dae87f221a504 gcc-toolset-12-gcc-gfortran-12.2.1-7.6.el9_4.x86_64.rpm 364778466faaa84d7a5e811644ce9be9ccef700b460b05f756f3d38f0a05c45f gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el9_4.x86_64.rpm cadc2a0330ba24bb919d047e6ae22563fcce0de4d85766380c8d58dd444ca501 gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.i686.rpm da16430386dea715d8f1b8e598adde0545eed1ec0175db8047fe4a28e32669e3 gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.x86_64.rpm c2b108e979c559433cb8b379480848550f44310c25b08501e9f8eac377b6e1c3 gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.i686.rpm 613804da7cbff3561156f039471fe6e3a329845f56b49a47c4d05f463d87642c gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.x86_64.rpm dfd010fb221946ca42eab83d3b9c5d77657d34c8b67378798dd7bb62190f1da5 gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.i686.rpm 298b45a22ece729671b64d7a6b1382220bb5e044fbfcfdb0ae224786d2418f13 gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.x86_64.rpm 37b37f3b89ae430bbe1a7dc8932876aa742f7ba5f875ad16449b80386faeee78 gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.i686.rpm 43a9fe2e0ad7f2922bba5a5da202461dd0acf369a0b397e0c399febb7c8e62da gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.x86_64.rpm 7d0211424125687b8755155cd6b96147dd9d78ababc80466bba438d1a47b1b35 gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.i686.rpm 714253be93b950d852cb09c4c6b6ab9a4bdefb16a762a711d77d13f8d4b69a65 gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.x86_64.rpm 02ac0170723b508ed472745fea2c9d48a8cd7445c1f8cbd987e94ff64d3dfed0 gcc-toolset-12-libgccjit-docs-12.2.1-7.6.el9_4.x86_64.rpm 4dc581fee056211cf68cb6844baa13e9b36bc2160884ca12225dd65600ab2643 gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.i686.rpm 82bde850523ac60da6196e158513c6c7700ab63974e8e70a01fd1d4a4b84d426 gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.x86_64.rpm 304d9bac53dfe3fe48213e5f919016d3884671c77106898295e4dfab502d4bcc gcc-toolset-12-liblsan-devel-12.2.1-7.6.el9_4.x86_64.rpm 6be32b0a39a2dbb3b3fe443eec881db1171f2f77e8062cbf3e6daf42bd0735c8 gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.i686.rpm a18d09dc6c55cc17c733047da08aeb72e0225760241eebd066bc2545a9e279cc gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.x86_64.rpm e0817048a87f97bec36c2c9e97a52559047bfc51afd9f3069baf4111a38a89df gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.i686.rpm 28eecb68f8ef7c62f7bf6ae1d659198800ee9569166083c4c506209a205d9aa3 gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.x86_64.rpm 84b0a4ee292d414543037846b4b0c7cb500d03fe840f07a71d6f3a8154bbab76 gcc-toolset-12-libstdc++-docs-12.2.1-7.6.el9_4.x86_64.rpm e5303e338d2c6d26175a56ac827e360959a63787163c44d39f17d8e37be2c488 gcc-toolset-12-libtsan-devel-12.2.1-7.6.el9_4.x86_64.rpm ff4f7b39a6c0ec414b7e040100e3f81cc424a57d5dfe986cac6dff694b8198a5 gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.i686.rpm 6134994a009795f02d01309443f63bc821fc3fd83a8c7b6869e9f8fdb6e3bd94 gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.x86_64.rpm 4e56c3968e3dd518ed02a55a55485d76e906e0c11b419db372a18e590b8f488f gcc-toolset-12-offload-nvptx-12.2.1-7.6.el9_4.x86_64.rpm 3a53e4194612954e04572f55abd6d5d30311305cfbc4bc798afff60f95e8536a libasan8-12.2.1-7.6.el9_4.i686.rpm 854509184fd9788ed5e6e623d6dad04eaacc10bfe9cb1f740ff20ee82fa875d6 libasan8-12.2.1-7.6.el9_4.x86_64.rpm d4cfa8881e0847c4448dca785dafab05e24bb8734ce2b0184e8629e11d1effb9 libtsan2-12.2.1-7.6.el9_4.x86_64.rpm 9a9ecba0f67aab62f83d2b37efb0c7a38a5cc84f49b46c665c135c58b1ab46b7 RLBA-2024:2563 nss bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es): * valid signatures shorter than maximum length are rejected [rhel-9.4.z] (JIRA:Rocky Linux-32161) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-7.el9_4.i686.rpm 488873001440c569629ad050ea08a7f3d341fffd3d199bb35bb8415e3239bde8 nspr-4.35.0-7.el9_4.x86_64.rpm bac72510acd9d28a658797730a4e075f2e86de2b70c5f54eb99ddb193794881b nspr-devel-4.35.0-7.el9_4.i686.rpm 8d693e2f556b7e93a15de69f3807139966711bd64163dfc6619b01725958611c nspr-devel-4.35.0-7.el9_4.x86_64.rpm 1e8420a7a937982bc1d8a2a476e0358a929b16442bb07051c2ea1e22bff9c1e6 nss-3.90.0-7.el9_4.i686.rpm e99299a267a84809c659f93a44f92350d1472ccc43cfe8c69b196fd61279cdd4 nss-3.90.0-7.el9_4.x86_64.rpm 85de577728d21b47e726baae6ab01f0d19de52b5a2db8c9e228dafcd4c3c6ee5 nss-devel-3.90.0-7.el9_4.i686.rpm 217475a68a4fbca8ce8af92593bff9878ea15f21cd4073a83a84811fa08d066f nss-devel-3.90.0-7.el9_4.x86_64.rpm 43cc3cd6d47a1bb5761939540ee21be0f767553e0429573d4952349661bcca62 nss-softokn-3.90.0-7.el9_4.i686.rpm f1705aee9ec3a0fb53631789f760b19215c734e79ad7269e04dbe08cae402f6c nss-softokn-3.90.0-7.el9_4.x86_64.rpm 5645929dee8519e877425ee52709391e526a8732c0dfc31f347d83c2bb91b28f nss-softokn-devel-3.90.0-7.el9_4.i686.rpm 59774a654458da28ac6639ad9710e6313f1aab7632e34ed18d68fe429b13065d nss-softokn-devel-3.90.0-7.el9_4.x86_64.rpm 389d4a4a9aeaeba7c3eb455117a0b22b34b3c0cce42aa30f4d2d4713162f35f9 nss-softokn-freebl-3.90.0-7.el9_4.i686.rpm 9c25f09d16e33b9d93b103d9662195b62b75df6f1748510b0537935e980a26b1 nss-softokn-freebl-3.90.0-7.el9_4.x86_64.rpm 406777813ebfdf93acfbb4acabe98a247f00b329337b191ca036c5367bac3b0a nss-softokn-freebl-devel-3.90.0-7.el9_4.i686.rpm 30ae6a07505120f8788ad9d30ebdcc73ec4c941e5dd398357ddbb5e4146faf11 nss-softokn-freebl-devel-3.90.0-7.el9_4.x86_64.rpm bff7640a5d35d90d4d56682872e72cf0d35157c141862704b56aa520f6c97930 nss-sysinit-3.90.0-7.el9_4.x86_64.rpm 825e160077ef15081bb87dc28f5efe7a8b29a579be3406f60d60e40c04428eab nss-tools-3.90.0-7.el9_4.x86_64.rpm e5ea98329ce0fe6782014eb622fdfa8c09ea5cbc4749aed2c2c04337e91ffe16 nss-util-3.90.0-7.el9_4.i686.rpm 48b74a1590bd8d4c05f20072dd8d863eb168918393f803d1f38de401c1544f0b nss-util-3.90.0-7.el9_4.x86_64.rpm e2fe12e79cd81b05c87c3c589ab71fe39e3d6b073e3ba50360c0111efb8ba0ec nss-util-devel-3.90.0-7.el9_4.i686.rpm f93988f229bc8b5899490357bedb6484044a692f98ae2e210f9864ef7fa5f9c9 nss-util-devel-3.90.0-7.el9_4.x86_64.rpm 32b931be252c026b3892b276ee8ba0a38c07a41f30ef14bb2db84c6ff549ab72 RLBA-2024:2553 bootc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Bug Fix(es): * Update bootc to 0.1.9 (JIRA:Rocky Linux-30879) rocky-linux-9-x86-64-appstream-rpms bootc-0.1.9-3.el9_4.x86_64.rpm 8533b58441c913bb8553e324a84c8e29585ac3dc473fe7ec765732decebf6082 RLBA-2024:2557 containers-common bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Update containers-common in 9.4 0day (JIRA:Rocky Linux-33394) rocky-linux-9-x86-64-appstream-rpms containers-common-1-91.el9_4.x86_64.rpm eff1ddc99c483dd29413211b68cccc739a89cd48ec9d00edaaf4f81109ca9b99 RLSA-2024:2559 Moderate: python-jwcrypto security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards. Security Fix(es): * python-jwcrypto: malicious JWE token can cause denial of service (CVE-2024-28102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-jwcrypto-0.8-5.el9_4.noarch.rpm 844dc0be5135fbfbfc8cbcb3caf9ce32004a4e0fe21027488bf6228a6c233701 RLSA-2024:2562 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289) * golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783) * golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.9-2.el9_4.x86_64.rpm a19c070fe42d179715bedd1a5197be88cffc5b671e89180247a63397f8000214 golang-bin-1.21.9-2.el9_4.x86_64.rpm c3f3320e40ac1922fc60bde63ab166aa859f7e02ab8d3050dc8508aafa9931ac golang-docs-1.21.9-2.el9_4.noarch.rpm 718d0316eca0de8a185a556dad03012571f2d47436d869ecdba2476e4445e1ff golang-misc-1.21.9-2.el9_4.noarch.rpm b7882278474d687f205b3baeb6573632ca32ba57433c0b52fc0ef4888054aa99 golang-src-1.21.9-2.el9_4.noarch.rpm 375661970bb5076d90abec7d1ef8b7dce01091bbf9e3f8e0d756edd482f12d95 golang-tests-1.21.9-2.el9_4.noarch.rpm 037fdf82dde931093600dce75a1515140edf6c12f30520ff2ad1a15312c4eb2b go-toolset-1.21.9-2.el9_4.x86_64.rpm b8f79327f17b24597bc7310b6435790d2391ce948aa2fc236c932c02648fd940 RLBA-2024:2567 aardvark-dns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The aardvark-dns package is and authoritative DNS server for A/AAAA container records. Bug Fix(es) and Enhancement(s): * Update aardvark-dns to 1.10.0 for 9.4 0day (JIRA:Rocky Linux-33099) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.10.0-3.el9_4.x86_64.rpm bb58e7560f283292893c4f8705a75198f4cb532c16637286064a43e4750c0a12 RLSA-2024:2565 Moderate: libreswan security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). Security Fix(es): * libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.12-2.el9_4.x86_64.rpm b42fea1432a4d5382233cfd82eb10d06d85c62c2680be69a47a937590874ee7e RLSA-2024:2564 Moderate: mod_http2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * mod_http2: httpd: CONTINUATION frames DoS (CVE-2024-27316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-2.0.26-2.el9_4.x86_64.rpm 1413a4e111a921f4d0b632da9c00e38fe96a59e2cf3065cabd95759bd92e976b RLSA-2024:2566 Important: pcp security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: exposure of the redis server backend allows remote command execution via pmproxy (CVE-2024-3019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcp-6.2.0-2.el9_4.x86_64.rpm fa44c07005ec324159056ed889ef90984647ff4135d08053ee4f99a318f312fc pcp-conf-6.2.0-2.el9_4.x86_64.rpm 5948d567e38935059ba9b70703e6a46726a2f8e7a5564f9387a12b580c3f5c0f pcp-devel-6.2.0-2.el9_4.i686.rpm dded1bf57323409ec60cc6c5fb393315098012792c41c07e999e1268361618f6 pcp-devel-6.2.0-2.el9_4.x86_64.rpm e62c5578cc69340f65827e9476ad2a2a0f8efe6557e13404f82398ee473f6fb3 pcp-doc-6.2.0-2.el9_4.noarch.rpm 9904aa28f0a12feac60148243c0130f406a88bbcf9b04ffbb871b98b6bfd2e79 pcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm bcf2f80c4b5bc65f4786d82a2453ca6603a920e7c14bda47d1d9834dd4c6534f pcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm d75da034087628f17203484436a916a340d38dad324ba62c2fb69f463980fe69 pcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm d5f32b1abdbcbd9efd9543aa564f78cd8d590fb923f4447d08a2a4da3b56358f pcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm 60aa1bca05545d9082edd902e4cdb152db8c54b840df19d0df3dc98ff86c2e4c pcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm 522e1c231a524d08a1c8aefbb98b95ac6f25fe9b0c8ae14e1598914ea1c9203c pcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm 66aa4e733ae4be3d8711b0cccd3cddac859b102820ce09afba51eac4bf5ad523 pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm 7864479d459340b76c90812b3887e10ae95f3bc4f115a17b3cabc3d7ef9de4f1 pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpm a647417d2c22e69116e4b0952cd4553b766e55649bbc9d83234583d3ed100d55 pcp-geolocate-6.2.0-2.el9_4.x86_64.rpm b345a444491f6849279fcca5f2b2b609add1c34d505d5b0057e3df8620d0dd3b pcp-gui-6.2.0-2.el9_4.x86_64.rpm 004f4064fb624a7f0eeb58b74972eee22e6d12c79b76dcf9a26738cebdb03aee pcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpm f2389224a90e6af5ea0eb021649f6cc7455e094b81b12de46622dde1c2f9f0a3 pcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm da8564dd1390d0fb8068f15cc50c340a46613f3fdf4f901dc6e039d21c5d8961 pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpm d84172248850213f41358b88160fc3751f34f215bf2a9db590feab93b4641816 pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm 588a24d7b2374aabeee44217a6fd188f9646dc1ed5965db2b088725eb472ad19 pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm ec7f56586e2728b00c8e261e2bb52da13ab75a3c96081804be2251f22a133bd3 pcp-libs-6.2.0-2.el9_4.i686.rpm 48cbb79b130eb5c7c0f046c7313a92ba668588e8d3edb1bfc35a04dcef145c9a pcp-libs-6.2.0-2.el9_4.x86_64.rpm 55d503ff4a012ce229ee6b45780c95824bea60cfb5d2f9d3b788cba57908ac36 pcp-libs-devel-6.2.0-2.el9_4.i686.rpm e5247dc61d1cf538e0f5262a12a75c08306adefdbd1827e95c264ffb7303809f pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm 084cf6ac20c310c8ee16a021dbced7969e3ec40476acab4a5c9b4091fe0942d9 pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm ab405d81c52749418c66a7cecee98712df19eacbbbaf3e3d4d95cc58c1ea24e8 pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm f69608de1d216a94eb89259dbf041fa6421d591dc1740d07566cb5ffed3e2c9b pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm 2a23436c3908ccae2d11499325a4668b3f82c14e372ff2aec5774c042ef4e57b pcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm 06adde62361f8c5320a51ae9ff68c191cca3b195193bcd50670c66e837a87954 pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm 8e6904674ac61d53c9e6d79f09df53a6b84d6cdcfbb1af668e9a058cb97a79e5 pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm fa941b1dc97fded31e57eca4951688105fac9eca8d1fddd02a144b0cdb81f36f pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm 3868252de1e00f757e46ebcebdb985a44f5f520f1c9223322326e3eefc13b448 pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpm 1c426dcbe13cad16aaf6aae4b67ae56d2d670af08a0573acad88bf888f931b37 pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm b55fb322f5a8489201119506c5d852d306933d84d5907e6d29a56434799d47c6 pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm d14cc1a180de33c2051c4013e33ae72e352354901e6b079343e612cf4096cb8a pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm 43abe10a5ed2e4bc43d41c7c166b0a05999f9b1f7895fc4a3463347ce56f6a5a pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm 09f7f66b54f6602ce5e674127a408be9e4e7d186eb79eeabb846c99717d23a15 pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm df24c289977983947271d1fc36afd011007b428ab24c18ec59d1ed7872982aad pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpm b9fe0b9d274160586639b86bfa25a8bc4a0f5e85bcdf1b9ecbd045c3e11720a3 pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm 3c7acc9762ea82f5b03e1d69e45604a334997b8dec48c41a6d13495c7a2e34ed pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm 0d18ef04429219c559d4838fb928c17e231242e1d7dea975f3e1db9d30f79ee2 pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm e725bb41748e39b0b5759d4f215e195f4f4f1c04ee242605610f014c932705d7 pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm ac81f72003a60e6b69c8e7e2dfece1276ac2cf5509603295bf86b181baeeb388 pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm 515dd10c8db179401bc915664e4a188ca8cf024969a12f042363ff82395a97ca pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpm 40c43563e8be95c1fa90ecfb961667c587848fd23fe217e75a2568d3ccac3df8 pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpm 77d920db9d884ae336259e1bda575748caa3b310f09e8adfb99193f61013e5c5 pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm 3d04c09fe2ba97bc1829304193f023433602d3cb4971d7a5f48446c9f7736c5d pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm c5c24d867accde6c689d14045bb1633c01cc4456a7799ec1a99f0226cddb776d pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm 5296cf993faa004b4f84da71f9b036fe749c0af69d71c7462402f20dce540f93 pcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm 073fdcd61d19e581f726d91ad56f9cf0af7fe9272961c18ba925302aa78ea078 pcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm 70bf049517481408068d9911a32eff856fcafa43e00d950e1248ab9106642b17 pcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm 9df2a74e54fcc42a7e7d618c4605fb44dbfd45129456c70edafb157693b9ae86 pcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm ac13d7fe83e7aace6b5a17479a4315583945a84d5e109f3c257a6c171cf439f8 pcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm 6815ab8280350cf4707e45c9e0170ea0aa914570fe9e478181587e8f1d6cf150 pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm 78940fa3ee09678bafe3a91b745802a638a580aae08ed6222bceb709c9b32436 pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpm 362cdc6b90e3a85c80d35b506df550f44de6060a2deef039fc031199d6abad5d pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm 5528eb056d78b9e3a8b02798fca14483204e8e5f5275e5940ce5ab8b7cd4daeb pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm 9c963674ed5df44982ebd7119832f9bc221c9da2bc2f333ec112c4936820064b pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm 9061cf3540230bb78682c5ea5d12c486e9bbc90d1a68e5a499ab47f016478c03 pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm e01a4cfc3e52718b025a8250b2f84e4b4a287b1db6860e82d9aa402ca5633577 pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm 33d336ad9f5cb40e46458cecf1c4a8856424ebdea944c75fc32c17a7fed841f2 pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm bc59ea1ad3896eecc9a38503cc99fa721d6626dc6a7d59d5e4015175bbdd5e97 pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm c93e85e9a85d0c149bc654a9764018df52de44eb5aba37c5dfbfdfdd319bf362 pcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm df215afc73de88407c960e0f32d1dc83d7e3bb016d8782c78d1c9460fbaf2546 pcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm 15c35855f72d4864d239c0e2f26ce217fe1d172058ba5dd6c926e3d89811da36 pcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm 146c1c85fb0628c43797743fa29739a296dcdbfe2771a30d7e003556e489cced pcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm 7e46b539c63eb6f4f6e29e9f9029f40214d443d0664499f4f525f11115223aa2 pcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm 34655b0a8418dddb518cc718149d9a2eaaab8c1842c4dfb9a86d5fdcf11b47b6 pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpm 30e9d05476c7e2802689a27e346a05c69a9c4b8bd92ecb8be09897020827bf0e pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpm 66dc374f119f1b3d3b6250c8c1aadbe76d9da5eb9e5e1db7a0dcc9c32af9c21d pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpm 84f9b6940413e7e32018b4682446906fb1b4f5f7114080b8f0922b10fef83cea pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm 82b5327a67ed0f2facd4f8177bbb8ed77240b912acb66c0f6bd881d7477b6da9 pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm b5af9e21efd29380f19597dd9ffada0e3d85386d2d8c6eeab0ce20b043b3d31d pcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm 163da278aff79d292cb3be2b4f100cc1c42e2ad02bba65c52b43fb5e736d8ca2 pcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpm 97d7ba3a820c986a422797da081d068afb38ca920e97ec57be8364fc122b9272 pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm 345a05dd34abb769512be8e9487dfc598c0b979c7cd8d6949590510fdf717425 pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm 2a8e4f48216a18f8eaf2ee86286bc5ee7a91f62deb12a99072fb2559d4693ee9 pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm 06eb437ff1ed26e9ef1a0fe267c37999db95222c3447f92f0b42a71217f56872 pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm a7b9f59607c84ab77ba2c38b1c2d93e4a64b24449f7382354a82ec6a7b8a1a26 pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm 435afc7a90544b15b474e1936891274384c25894e4fb779231dc0413acba540a pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm b1d7556eb5b52691b2d78df1c3d48ce144ae0eb55818425c1bab529bf69d0e5b pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm c6e5d3cb5155116b2309aab1860f69cd245e52815f30a329066a04ffa77488b2 pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm cecdb6729832b5e8827b5cc479d4f5454ca2960d7ffede54e6e572995662d1aa pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm 827a977fe13b90d308faed5c8559ceff0cabd0d6e3919ecaf7fe142a4fc1dcc7 pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpm 01b8fce4627e2022994518b034baf45181db02779e840a71f91069a3c4cf7171 pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm 58c63cca622097aec0266afb1199f2e1a6851fa75825e4fd1c311964d8dadb3f pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpm 94f0d05e8be8207d431135b304a82b68fc30f685952d1ce591f9c3c9a16b5da1 pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm b58ebac5e7a16d3a1dfe7eaa91ca1c59dec96643f17be2f1396c4800b40af970 pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm 3c7d13b69db15a71ac4f0c60013e536ad780daf25f7477d5cb81ff8e9bbcc0ce pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm d7b519b4fa83f7b54ecad45876dd00a78eaa5415a100b7a1e44741e57bd7cf22 pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpm 37bb607a31e569f9d44524293c52b2f1a6450d953f85aad55d47fc81c392d263 pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm 8d6333d419f39aaa91e0e1ed02c06688fdeb0c549c3f17bd923dd1d95f832e13 pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm 5809c2dbc7efa7c3f12ae8aa0dbfdd71801686a5d84dc2e14d5f16f63fa2a35c pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm 23a93287a2a034dadad100ed2385ea6b5cc883a1054c91eeea11c5dac9bef83d pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm 29b99b7d8ccf3d685adf5d60be0d59f30a770a4de8b7a9be4a24b9a81b267be9 pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm f30d8399f79f58b7aa317088a3f5e5f043801f9d32fbaa1876e882c461241955 pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm f9d1fe3b8d7e08ce5dbd2d4cf319e9995556e4fab3d0a9dcb298f395bd3278f0 pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm c037ac8044a5f2248ae03ab1193eadfb29a926cc82c253728ebff86894ff4a84 pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpm 54570dd9a2e826a1e230d62c08fae583cec4286b2a7e40f94090496595a7be0a pcp-selinux-6.2.0-2.el9_4.x86_64.rpm c31732adc527bfa41b2b8c8cc503cc06ba301d1c7a937d4d139b7600201244f6 pcp-system-tools-6.2.0-2.el9_4.x86_64.rpm 1588c060dc26d8ac252843ac9674d69bc7dc42208d07c1c36c7fe1d43a61aa73 pcp-testsuite-6.2.0-2.el9_4.i686.rpm 30c2a1bc9f682d3fbb25cabdb6dcc7b334ca309f4622a575653506eaa3162405 pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm e85f9f95870c66745fd7420e7fac49ec2ee5ed49924155448c02d9e504983a7b pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm 56811f9031d1f97b11311bb1ef53f838a4bb67a82424227a1e216bcb1a3c0d2c perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm 6e9074da6b62995a03860a62caae68fd25f5e13d190745e22b2ffa25d7e949c4 perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm eca0ec18445f7dcdc7561877269563f48f2ed7fc8c837bfc8c17b59baf580289 perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm d5c40fef2cef125a86e83a02237ed77a2df7043ae0104f5c06a94a3dc1ac678c perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm 61d98112309495836db49b49858f8ccbdadc8b66e1356bc82fdee492a510257c python3-pcp-6.2.0-2.el9_4.x86_64.rpm eda19fc392dc0739479343a1d5f2333450853bfc54bc8779ddcfaa9b03769798 RLSA-2024:2568 Moderate: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) * grafana: vulnerable to authorization bypass (CVE-2024-1313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.2.10-16.el9_4.x86_64.rpm 0d359286f86415f70e39564acdcce57a59fa2ad6db03659465702aa0fc805c1a grafana-selinux-9.2.10-16.el9_4.x86_64.rpm 30d1d434e0728fc4f454e655eced40aed1c1d72dac8834621eabbdc8756b9468 RLSA-2024:2569 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list grafana-pcp is an open source Grafana plugin for PCP. Security Fix(es): * grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-2.el9_3.x86_64.rpm 982033ce0dd9ab3c0fb45cd612c689b67251c3775804652fe5599d01f6bf6fc7 RLSA-2024:2616 Important: tigervnc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.13.1-8.el9_4.3.x86_64.rpm 4a42a6d384b74851f7f97aec4f99a63d5da39d488d01e5901f984fa400b4a690 tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm 23da0f5abe9fe31adb2483bb5a4ab9ae2a374f49e07f5607f81c8bfe34302d7c tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm c1e45b115039fd364994e37063f9243d99e62464a1b72952d19c668ae8560052 tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm c672e105567f8253b2e6cb299a70b1242fa8144820032512cbec8523f636290c tigervnc-server-1.13.1-8.el9_4.3.x86_64.rpm a1e7d1be87d4a7242da86ca36dbe196649a037956c71d0e7ffe286926313de13 tigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpm dbd080f0847c5957a71a682a50cfaed447c296f7e5b27ce76e49c1ae4428ceda tigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm 09811f39cb86771a4933d09cb2644a4805e5a478b2a524eabbd3408278dae051 RLSA-2024:2724 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288) * golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289) * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.4.1-2.el9_4.x86_64.rpm 3a6b6243c4e6dd743d7d96c3f0d83de92bf34f437433b5354a183e746a651ca6 RLSA-2023:7711 Moderate: apr security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for apr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines. Security Fix(es): * apr: integer overflow/wraparound in apr_encode (CVE-2022-24963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms apr-devel-1.7.0-12.el9_3.i686.rpm c939f32e12ea315cd2cbd841c280a4bcd67d4ff3d068cb10abf61e8b5ea4c909 apr-devel-1.7.0-12.el9_3.x86_64.rpm 5e2d28fbed04de9f9f94976472b89e639b205c8939877c97a5195745dc7fa35e apr-1.7.0-12.el9_3.i686.rpm deda142bdd430e67a5dcff481377ec370f621efea6ba46093f2af16699e831b8 apr-1.7.0-12.el9_3.x86_64.rpm e7ce248c44636a9b4bf9198ee46a03c242c28a4162a1dd95591f462fe707f738 RLBA-2024:3624 scap-security-guide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9, Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.73-1.el8_10.rocky.1.1.noarch.rpm c8eef99c5996627e3a404153bc2f73a4836341709dce142050bd4474ba27af57 scap-security-guide-doc-0.1.73-1.el8_10.rocky.1.1.noarch.rpm 9fbaacc8aa3af879614aae1023d9c26bd59f7db3bb634e32bef9b02ef58bd5d2 RLSA-2024:3619 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm 628af278ae6ba45e16a38d2e7afa1333eba3ae86ed54d81d054fd42d152c3acf kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm 059e2f8de6c421fc96c2c6725a0b9f033de07036fb9cd5ebdcaf8eddc2a1fcd0 kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm d0b6c8a572195063442b48af90a3301a6e3ae6c3a54036199c38c53d643ee251 kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm 23120b0e425a57351cc60b66c97e06d8657b5ea013e00f8cefaef61630c8a783 kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm d99616b2822ff0b4626083b178efe574cc9d92e89e18ff6c7d455da5470577a0 kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm 8901960c1df3b20fa6c83d7c1a679ce2a7d1c9e5a1b7ef332657d20341bfb350 perf-5.14.0-427.20.1.el9_4.x86_64.rpm 6ad18582e54fa4ac74abf9e3a7113580d49e81e08c56af604942f27af19af64f rtla-5.14.0-427.20.1.el9_4.x86_64.rpm 7cf8d34dee4145bfe90a2bd01e43afea9d8fcdc3770293ea1b604152fe4a1ea4 rv-5.14.0-427.20.1.el9_4.x86_64.rpm 3e7ec6fefc32ab0e7ec3116d1162ca0a971cefa7ee91cc981b6dfc666121b348 RLSA-2024:3339 Important: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv conversion to ISO-2022-CN-EXT (CVE-2024-2961) * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-100.el9_4.2.i686.rpm 409dc1fc84309846212381084afe162c9a9c06c45a920a877112b605724d57a1 glibc-devel-2.34-100.el9_4.2.x86_64.rpm 4cb2e4d2d97619e5a651fe4e5af4e79c405c72b4183ec218e4a9fa2c73713fc4 glibc-doc-2.34-100.el9_4.2.noarch.rpm fcc55cfb3aba7f9cf7e49f55eaaa357883cf9d18d38c6411e33a2298e0675fd1 glibc-headers-2.34-100.el9_4.2.x86_64.rpm 492cb1100131cfc054bdbac8706138f9965775ebd032983c56b1254ccc3b3286 glibc-locale-source-2.34-100.el9_4.2.x86_64.rpm 569a1cec8cdc2ae5ef9a736b27336fe299eb378195e77e2f3d57b44b5b357c6c glibc-utils-2.34-100.el9_4.2.x86_64.rpm 6b74fb6b0cb7960573912c5adff83f7befa0d058d62f10eee09baeec5be285fa RLBA-2024:2841 .NET 6.0 bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.130 and Runtime 6.0.30 [rhel-9.4.z] (Rocky Linux-35310) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.30-1.el9_4.x86_64.rpm 9d263debe3ae2bf3dd3ff392ba3b413692a5d56d625cc50d94e8ef3067b728f2 aspnetcore-targeting-pack-6.0-6.0.30-1.el9_4.x86_64.rpm aae18477209542abc73de671d7e4b08440f0e764d3f387f71866891d91bec70b dotnet-apphost-pack-6.0-6.0.30-1.el9_4.x86_64.rpm 198b644f7cbb0ecfe948ecc287edcf7aef28781d99687f9c9f255ce61655121c dotnet-hostfxr-6.0-6.0.30-1.el9_4.x86_64.rpm 123786137ee02939c449cd590da9683c4c0afa782a34687ce4ded60d204395bc dotnet-runtime-6.0-6.0.30-1.el9_4.x86_64.rpm 91aa61241dbebc4f8dcc597aa18c68c20ef18a8326af8562db198373a08ad98a dotnet-sdk-6.0-6.0.130-1.el9_4.x86_64.rpm a645cfcd850689b62ef831a9145ae6439953dba25be870c790e5f49b58aa9574 dotnet-targeting-pack-6.0-6.0.30-1.el9_4.x86_64.rpm 4282be3d6b4f38385148926cd42930c158cf653153c17dd7dd143d6938667754 dotnet-templates-6.0-6.0.130-1.el9_4.x86_64.rpm 6838d7377587875f0b58f8da4f51ce900142c5514bc144d50866a2317177abb2 RLSA-2024:2842 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm 0b4cbcef947f1c549f610ba00a84c6b699be7fd4d42c5e96571013328e2ce34d aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm 61adab599088b9981715014cb5ecf842a00116ddfaf3b1b600a68c16ce749384 aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm 02ca27a2b4c83af45bca015b67c813b64cec78feca1af9234e2dea32cc1287c0 dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpm eb9ddafed26d23e64fed6758857685c6f3cb1c31490a74854ecbfd1fa79b6902 dotnet-host-8.0.5-1.el9_4.x86_64.rpm d91e77d16eb31b7522b7e91119783b7acbfc479597fab39739d1cf24a22a6f45 dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm 58ca03d985a3dfab567e687967dca51276074d61355b0f3ed5bbcde5944b9944 dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm abccd9482ab83340860cfef73462e8a255c00289e09b6200e4afdb64eab8ff8f dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm 938318430146ef5ab9f8181c994ecae3cf6a1f0a0eabeffe71896217ab906aad dotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpm 4cdc64099d465e5970fe8e8a1e94a45def7dac1be1e3c1e8f2c96b9b24d5a0bb dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm 20a43f38dc30d1006539862366bf41a8156439ca961a16bc22f3d5aa93d3cd72 dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm e5506fd2ed51f1913eb135e06b7b9fd42560937f46cb95f3a9a2119c28701c31 dotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm 0c6f122e952b116c84cddf8826319317a1632a2ce629196bd1703e0eb099ea07 netstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm c3a8f14afbb7d230b904571b5eb067ec8b40d9a8421d76d90daa4b42eceb3518 RLSA-2024:2843 Important: .NET 7.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 7.0.119 and .NET Runtime 7.0.19. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm 086f97e3080a68397e71e7f9f5cc38ff862e2e434f1e20e785a171425ba4dcc4 aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm 63d1a08acf0f539aa0b917e42a7b4d6982f9db5861ebc169e03e1f8d77c6c1bf dotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpm 30fbc00ce08ff40cb452b6f2293e4a1ff029fd22390f0f545cb46128780258bc dotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm 9c18bee32b17d63ebae4605f3740b3120e6c466871e30d894ba655f4489981d8 dotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpm af5aa93410564d4ccc9e355c56b038dc7ba3bcdedf92721c851b096721788474 dotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpm 7a2b0ae1fdd19418bd37ef72123c252efaaf2299f734aa92ea4115fccb7676ad dotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm 5631bda1d3ec364b6cffedf55d16c06e44d53f5330835ffab4c596a85a571f37 dotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpm 2a3c9775e361aa107e6f81f2aa5d593d1db9dfa6fc6cff12981f7d152ee62942 RLSA-2024:3754 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698) * freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.11.0-15.el9_4.x86_64.rpm 88ccaf2b6ba2c05b67c7afdce2b4dc4e5258363dee817d955c91434229c65665 ipa-client-common-4.11.0-15.el9_4.noarch.rpm c88d3f06a90408afbb5e9e3eb91c1557259b57006e4cb71614813a9320abdcc4 ipa-client-epn-4.11.0-15.el9_4.x86_64.rpm 8e1bacc213c0ed5b2c86613d9c17cd0ac6af5e0b5c06b7a13d99df654420eb5f ipa-client-samba-4.11.0-15.el9_4.x86_64.rpm 362ce0c986fedc969c04ebc7f55725b570e92192f196926807bfc716aa7301f6 ipa-common-4.11.0-15.el9_4.noarch.rpm da96d24e6a713a7771f04f8d22d2ab89f63f5c5bfd5a8a414c6a04dad1d6aaf4 ipa-selinux-4.11.0-15.el9_4.noarch.rpm ad28ef184a62cb1060d588a7ede08d45f79aefb0f7e4d4991780c12724214d1f ipa-server-4.11.0-15.el9_4.x86_64.rpm d5b0930e6d6b3d672f6486ce6a41045d7247b59ddf4bf4656bacfa9f51a69e81 ipa-server-common-4.11.0-15.el9_4.noarch.rpm 30ff94b5ed3e5cd07263da992a4930edae271f767571ab1da275cc940b3f1759 ipa-server-dns-4.11.0-15.el9_4.noarch.rpm a8e89a0540046c71954aa4cb5509c6b9cca7f0b5d5a71cea9b65b10ee0763913 ipa-server-trust-ad-4.11.0-15.el9_4.x86_64.rpm ad60d1590d07822c52e12545a6ad56d8b05e80d003e830e521d4b43a9041edb8 python3-ipaclient-4.11.0-15.el9_4.noarch.rpm 927f631377585e090059faa9925728c52d5c88bae3d8c30ad6fbef062bf0d52b python3-ipalib-4.11.0-15.el9_4.noarch.rpm 8b0578eea34d0828f2fc862cd42e15662059b312fceced5f2ad9a7737a30012f python3-ipaserver-4.11.0-15.el9_4.noarch.rpm 3817250edf5fd5e1c7d1d62e87b0d26061159d5ce7e8f2873b25a80128724bc4 RLBA-2024:3832 libvirt bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fix(es): * live-migration with NBD TLS fails with "Certificate does not match the hostname " [rhel-9.4.z] (JIRA:Rocky Linux-33781) rocky-linux-9-x86-64-appstream-rpms libvirt-daemon-10.0.0-6.3.el9_4.x86_64.rpm a80767047cd5a12b5e8ed1d68548a7aca133878f52fa377bab52b79f51ec1881 libvirt-10.0.0-6.3.el9_4.x86_64.rpm e02fba627778caa7f66a2ab0c4f4c1a30b3b83efec669feece99b8742a33ac61 libvirt-client-10.0.0-6.3.el9_4.x86_64.rpm 0f75c5ea5c588cf4b43960ea76bfc8e3cca29cec85f08c2d60d30591dbbb255c libvirt-client-qemu-10.0.0-6.3.el9_4.x86_64.rpm 42a30627839702958f0efe309223e6ea47c6f0e2eee66d115be2fb61e81e747f libvirt-daemon-common-10.0.0-6.3.el9_4.x86_64.rpm cfb0156fcf13daa439d57caf3189695ba609496cf5dca32d9e3330aaf55a6bf2 libvirt-daemon-config-network-10.0.0-6.3.el9_4.x86_64.rpm 97c835e1fda1b0abdc31a1527f0bd02dc0ee4f1ec6f4c5369e19b106ef238319 libvirt-daemon-config-nwfilter-10.0.0-6.3.el9_4.x86_64.rpm 965d40f59838ed2d7cb37a80bdb5523dd6dddd29bb40f1be28b307612413ab96 libvirt-daemon-driver-interface-10.0.0-6.3.el9_4.x86_64.rpm cce747693af00605ff319c382e20c1d1e8f1dfb0b48b840ed80c55f036405d00 libvirt-daemon-driver-network-10.0.0-6.3.el9_4.x86_64.rpm c1ea16bda8f6533fc85f9522d19febdbf8e3527c74b47e988b7a4f1cdc086300 libvirt-daemon-driver-nodedev-10.0.0-6.3.el9_4.x86_64.rpm 7e01922b7d41c655d48498d7dd0592baa1f3a6a0ad3a3ec88d54685c9c046eed libvirt-daemon-driver-nwfilter-10.0.0-6.3.el9_4.x86_64.rpm fa5d99a6cdfc62b735aaa983e5364e5ccebb801599d80d2d2663fb1330556b9e libvirt-daemon-driver-qemu-10.0.0-6.3.el9_4.x86_64.rpm c8b5b97938e83484c064ae3d309be160e220da3bc179acfab314f587c277c5db libvirt-daemon-driver-secret-10.0.0-6.3.el9_4.x86_64.rpm 1ae55f0c6dfc0840d2dffa1d88bb0de0837e777c2814660d0526aa3a95282788 libvirt-daemon-driver-storage-10.0.0-6.3.el9_4.x86_64.rpm 5dd40bae105f0dbaab5482b6353b5161905077fda909ca9fb5a4816b59787762 libvirt-daemon-driver-storage-core-10.0.0-6.3.el9_4.x86_64.rpm 3ca81560da7a53dea27392133f26dcb780d16e33240be430b424a4a7baeddf8d libvirt-daemon-driver-storage-disk-10.0.0-6.3.el9_4.x86_64.rpm b9ea42b938447b2cbb5b53dedf857d5f5fa28434649e2c09774b7f57eba125e4 libvirt-daemon-driver-storage-iscsi-10.0.0-6.3.el9_4.x86_64.rpm fb69db0f68b6263e6c910b55dbdcfaa9356d24822949a623b4241d3cdece890e libvirt-daemon-driver-storage-logical-10.0.0-6.3.el9_4.x86_64.rpm cf744fc627fd8a29d7e39e810bc32f03b3b3157e911d34beaaa12779f2fc294e libvirt-daemon-driver-storage-mpath-10.0.0-6.3.el9_4.x86_64.rpm 98963c910f4e797d1e8f20b77f7129fefa881de51ff0c723229c798532d98bd4 libvirt-daemon-driver-storage-rbd-10.0.0-6.3.el9_4.x86_64.rpm db5adf2e9286b828ffbb6b9399b00dca10cace8eb4d4940397577b28d9bfb330 libvirt-daemon-driver-storage-scsi-10.0.0-6.3.el9_4.x86_64.rpm df44a279eb8dc5c37d4717bdfcde6c23c59d56971014e07c99fb1e78e901609f libvirt-daemon-kvm-10.0.0-6.3.el9_4.x86_64.rpm f7a5a81f6667b2603765d63921a49d0a8952e5715bfe53a680fc592d4875519e libvirt-daemon-lock-10.0.0-6.3.el9_4.x86_64.rpm d45e38c335859f9ba7985fe177915ebd5f0608621852317b70713c43aca0eed4 libvirt-daemon-log-10.0.0-6.3.el9_4.x86_64.rpm 28f34157c563d6477b15b6f644e450dca0c7ada145384ad1c47eb54b7565a544 libvirt-daemon-plugin-lockd-10.0.0-6.3.el9_4.x86_64.rpm 1cf083a2206e96ddd6b043286f179d35aa2eb2e64018394ada1fb9e587ede3e1 libvirt-daemon-proxy-10.0.0-6.3.el9_4.x86_64.rpm 52c86057ae80883ee565e03c9216aa9d5a31b67f942a36f492a1b4a3f8690284 libvirt-libs-10.0.0-6.3.el9_4.x86_64.rpm f7fea0921b28774543d6e90422b6fce2c90da05ff7b0efb9deaa1b6afebb8a6c libvirt-nss-10.0.0-6.3.el9_4.x86_64.rpm 9407c56164734c15989fcd434bac81889e3663591a3700063a942bfdc330b7e4 RLBA-2024:3828 libappstream-glib bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libappstream-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libappstream-glib package provides GObjects and helper methods for easy manipulation of AppStream metadata. It also provides a simple DOM (Document Object Model) implementation that simplifies editing nodes and converting to and from the standardized XML representation. Bug Fix(es): * flatpak / appstream compat issues [rhel-9.4.z] (JIRA:Rocky Linux-34564) rocky-linux-9-x86-64-appstream-rpms libappstream-glib-0.7.18-5.el9_4.i686.rpm 82affb4d025712a8fa3a8ecd7c6af8c2d544c5b40be92dbd17a367259c8b8bc9 libappstream-glib-0.7.18-5.el9_4.x86_64.rpm b0f2a36b7271c2c10a2baf46368b465ba86cf38a44a7cd009334926de8a7d58e RLSA-2024:3835 Important: libreoffice security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185) * libreoffice: Insufficient macro permission validation leading to macro execution (CVE-2023-6186) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-12.el9_3.noarch.rpm 94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737 autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm 163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm 1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be autocorr-da-7.1.8.1-12.el9_3.noarch.rpm e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49 autocorr-de-7.1.8.1-12.el9_3.noarch.rpm 63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457 autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm 07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55 autocorr-el-7.1.8.1-12.el9_3.noarch.rpm fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382 autocorr-en-7.1.8.1-12.el9_3.noarch.rpm 5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997 autocorr-es-7.1.8.1-12.el9_3.noarch.rpm 75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5 autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm 179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm 9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404 autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm 9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm 2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83 autocorr-is-7.1.8.1-12.el9_3.noarch.rpm ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357 autocorr-it-7.1.8.1-12.el9_3.noarch.rpm 8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm 3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493 autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm 62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363 autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1 autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5 autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861 autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm 9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm 91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35 autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm 467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586 autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38 autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm 66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm 4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2 autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm 55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882 autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7 autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331 autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227 autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm 937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489 autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm 3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034 autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm 9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726 libreoffice-7.1.8.1-12.el9_3.x86_64.rpm 3b007614e5eaa178ae3b2fb7b4e5d52affdcc8ce7b32334af031b4541372c451 libreoffice-base-7.1.8.1-12.el9_3.x86_64.rpm 7a2e37f8b579edf2a0cc268a881d9f3db1e1bab92b2961980529c857f1dc2b4c libreoffice-calc-7.1.8.1-12.el9_3.x86_64.rpm c1a39798dc0e7b7e20854fbff8ccdae8f8c05524f7235678764b29bbef28d314 libreoffice-core-7.1.8.1-12.el9_3.x86_64.rpm defe4837af0860a50f550d583b1baae14a54c40372d80c7edfb2901cbbcb0850 libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4 libreoffice-draw-7.1.8.1-12.el9_3.x86_64.rpm 6d480226de9426ea7e0a145c03d06b19d5b2c557ebb836d9512f0b00b2c7ef53 libreoffice-emailmerge-7.1.8.1-12.el9_3.x86_64.rpm 67e4b5a25152e114e114b9c5d4bb8f959d1c15582c881a3df01f1e2444e74bd7 libreoffice-filters-7.1.8.1-12.el9_3.x86_64.rpm 872d04fbb4a5291a7e84a15912239f1c0d29f428433e7d6dac741de827d7e42b libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.x86_64.rpm a0f2ab7cf11da3d14c26cd17196c363e8a5251dca195eb15c8e44467e0516dfb libreoffice-graphicfilter-7.1.8.1-12.el9_3.x86_64.rpm b719c941297184f1d4b53ac750fba44d09265c4385b21081fd3b0863aeb51805 libreoffice-gtk3-7.1.8.1-12.el9_3.x86_64.rpm 6ef64505946594c77cfb2a58f82f4aecfe5468fb8d76c81dd493701e1ec2ef01 libreoffice-help-ar-7.1.8.1-12.el9_3.x86_64.rpm edae8ed15813ce9cdb66a8bbc57b97dfb5433153b128e3a35f578ef9a18ee35e libreoffice-help-bg-7.1.8.1-12.el9_3.x86_64.rpm ff411704fefa4fd8ce9637160818aa24b8ec0d27483cf217db3d83281880e44e libreoffice-help-bn-7.1.8.1-12.el9_3.x86_64.rpm 6c9e0ffdf0270aa16b08ae8d050a9bfc9fa923c47f05f8434f42bbaea4edab83 libreoffice-help-ca-7.1.8.1-12.el9_3.x86_64.rpm 6ac84f94f2fb91ad96ee1c44ac13bd8eaa30009b313032906fb466c787d2b723 libreoffice-help-cs-7.1.8.1-12.el9_3.x86_64.rpm 203491ae107d006a937324dfdc32962b9457d202a0b8b9d8197bb0f4eebe7391 libreoffice-help-da-7.1.8.1-12.el9_3.x86_64.rpm 581ee6b92391fe5c13b0fc88d8b11788a115dc67d3a7673573af348cd4c644d4 libreoffice-help-de-7.1.8.1-12.el9_3.x86_64.rpm 87288636830760d45187c312e9182f3c745a27ebccbb671faa5addc174a14516 libreoffice-help-dz-7.1.8.1-12.el9_3.x86_64.rpm c058c80cb044c44d8d81938b8b94d9d9c8a5dd11847706f6c6c89701d5be58be libreoffice-help-el-7.1.8.1-12.el9_3.x86_64.rpm 605c512db8f88336560af12f84062384009fd62110ebfdea14fd7e202d14dfbe libreoffice-help-en-7.1.8.1-12.el9_3.x86_64.rpm 55e335a10351e10cd45a071b74bf7ad354f09522dd01c2b458bfcd225e174b0a libreoffice-help-eo-7.1.8.1-12.el9_3.x86_64.rpm 729bb79cd7ec0f2cf71b9e28f3498efc558b8b8535d6607bfaabe053b791ccd7 libreoffice-help-es-7.1.8.1-12.el9_3.x86_64.rpm 149a86d49f456841d28e15c713c5c07c1e6d1e227167efee781f332220a9cdfe libreoffice-help-et-7.1.8.1-12.el9_3.x86_64.rpm 2efc8d79069a924acbbf0e70bb6e84c545a6207a5ed1f56b48b93898bb22bc3c libreoffice-help-eu-7.1.8.1-12.el9_3.x86_64.rpm 1929b55d48ae4aab894376481d658c186dad56274f4b7709e410d77cc7daa1ab libreoffice-help-fi-7.1.8.1-12.el9_3.x86_64.rpm e6949de4baccefcf1efce15b0bda4ee58ae8d897fb1e225e9a1989ebe9fec204 libreoffice-help-fr-7.1.8.1-12.el9_3.x86_64.rpm 71152131cbe8f194752c89479502fd2611a1bb3228844aa14214c832d1884c19 libreoffice-help-gl-7.1.8.1-12.el9_3.x86_64.rpm 907533153ae0e562798dd75c3e07a973deb1e43377dc9f04ccd120cc1827ccf7 libreoffice-help-gu-7.1.8.1-12.el9_3.x86_64.rpm 14abdcc657c431de56204ba02719b570f289369cb824115657855bad9c4607b7 libreoffice-help-he-7.1.8.1-12.el9_3.x86_64.rpm 77c45ceb9e369e656bbe4cd1c93c4dd895e4ad485d21d0c9c90b2c168546edb4 libreoffice-help-hi-7.1.8.1-12.el9_3.x86_64.rpm 120a49cabcbf1c05cf251b14e62b5b52877141fe97107e7919a0476b1b626d4a libreoffice-help-hr-7.1.8.1-12.el9_3.x86_64.rpm 6934cb6025cdf13855a8fcfbe8704a4ca9d11b03bcb36bcafa380f89f4d98da5 libreoffice-help-hu-7.1.8.1-12.el9_3.x86_64.rpm 9d48ad8562bc5127dbec7f029115f9f50dad01392c448ad2fabaecb13cb06de0 libreoffice-help-id-7.1.8.1-12.el9_3.x86_64.rpm 705dcd1856ffeba4483ae40d8685c64db721d61b2fe4ccb78e5eeb65cd801fec libreoffice-help-it-7.1.8.1-12.el9_3.x86_64.rpm 24af6d4bf1523fb9745c184f57abc17571c134242dc17f883d033fa74138c10b libreoffice-help-ja-7.1.8.1-12.el9_3.x86_64.rpm 8982bced28eb643c7f82e50a07dfa4716ddd25d6b1b2e1a4974022d3ed758e54 libreoffice-help-ko-7.1.8.1-12.el9_3.x86_64.rpm 7398c811ceee906274ed8ed4ba655236db15c22dcd0b043da39013224d79e221 libreoffice-help-lt-7.1.8.1-12.el9_3.x86_64.rpm 26d0b27d3dddeadb15da7c57084bbf7b48c9d54a459ae9749cc60a8be4914806 libreoffice-help-lv-7.1.8.1-12.el9_3.x86_64.rpm 986c8e4a98ffa2501ae6a37138eb4a26c58a28241a171db5bd17763865dbe507 libreoffice-help-nb-7.1.8.1-12.el9_3.x86_64.rpm 61457b58ebe8e41fbbae2519a7cf29c7d87246ffbd72ae2ecfc849381b0f5eb8 libreoffice-help-nl-7.1.8.1-12.el9_3.x86_64.rpm 00967e74c4984057a4e22eae84bcfc15a066853a387b6a982e9f4de0dde01506 libreoffice-help-nn-7.1.8.1-12.el9_3.x86_64.rpm e544721d1f38c85ac6aba372e589ee465bbad9067b074db63d7cc5815aa59ad7 libreoffice-help-pl-7.1.8.1-12.el9_3.x86_64.rpm e4d45852241f749224307e98236b63f08532ba04b12244df7b2567bcf9d93610 libreoffice-help-pt-BR-7.1.8.1-12.el9_3.x86_64.rpm bb9528834fa613f23d08d1e82777960097037d2d995545a3fb2ce11ab2fe2638 libreoffice-help-pt-PT-7.1.8.1-12.el9_3.x86_64.rpm 452d167270c52c99a8c25640c2d8ead4a9b0b2a8f1c1d83e293cc8a17210a9df libreoffice-help-ro-7.1.8.1-12.el9_3.x86_64.rpm ea828a38d0e5c9fc0b4ae7116628c64a4a8353d9d48ee11dcb9c1ed326e76baf libreoffice-help-ru-7.1.8.1-12.el9_3.x86_64.rpm 31657a2f599f1e7286b7cc4bb2eafd6125245f1d6aea83b5ab15c6d741294739 libreoffice-help-si-7.1.8.1-12.el9_3.x86_64.rpm 892aee24ff33c275c10fd728eecf7ac932de0aa589fcfb47e842a9374cba923f libreoffice-help-sk-7.1.8.1-12.el9_3.x86_64.rpm 2c3eca7560b89b470d82f353ee27ed82a19219c19620367d8ed28bc818e25215 libreoffice-help-sl-7.1.8.1-12.el9_3.x86_64.rpm c7c37588be0e709c04dc8c8a301172f3df8c3c8809f9264f54329f9fb1ca3181 libreoffice-help-sv-7.1.8.1-12.el9_3.x86_64.rpm eff99b7115f8d9e13251d2375a2a07a605628729e749d0109c42b2b22332942f libreoffice-help-ta-7.1.8.1-12.el9_3.x86_64.rpm 2cf6165514f7e7fbc17ed4fe85f2b9a3de40c4e844ba7f85e70ffebff92bcdfd libreoffice-help-tr-7.1.8.1-12.el9_3.x86_64.rpm 5ffc530e9dd2e8500a9a6a3947f039de3518b150278007589a87a52d308c9ece libreoffice-help-uk-7.1.8.1-12.el9_3.x86_64.rpm cbcd6bfa60cafb5b4f5b578b8af71eecbdfb5891102e8146632a3eb9599ce03a libreoffice-help-zh-Hans-7.1.8.1-12.el9_3.x86_64.rpm a6f5f71d104150101542d65856c74fd2995c84c83e3830dcd76ce722fdbfdc45 libreoffice-help-zh-Hant-7.1.8.1-12.el9_3.x86_64.rpm d04131a391c93176bca70447e21f2c8c2010499764e4f97426d25495e552387d libreoffice-impress-7.1.8.1-12.el9_3.x86_64.rpm 2bc5920832366c0d025ed7410c86661547e7e14d19c07c85b14e27f2509e622d libreofficekit-7.1.8.1-12.el9_3.x86_64.rpm fb628c10f9b5e589c243078c3cb0b4b2ce95eed26c31dd7f2405e3eaa8497999 libreoffice-langpack-af-7.1.8.1-12.el9_3.x86_64.rpm dd6903527bad534824952550c3645692f8f7cf1be84e54c1aad982ce27123d60 libreoffice-langpack-ar-7.1.8.1-12.el9_3.x86_64.rpm 648d5e7ebc93e0401fac229a1670173c32e0e81c85cd9c1b4ad580ca15f522cc libreoffice-langpack-as-7.1.8.1-12.el9_3.x86_64.rpm 14572dcb3e9ba281b42e26df5a4dd50f69e995ad36b82ff4881fbe287d2de760 libreoffice-langpack-bg-7.1.8.1-12.el9_3.x86_64.rpm ec806b8c1fb72b136595908f40ca61b2239eace212514bb19dc84b3a860c02d4 libreoffice-langpack-bn-7.1.8.1-12.el9_3.x86_64.rpm f1a83fe5390e44010178d2ee5c561142a208793b21915bf8b3190f3af6e0fb06 libreoffice-langpack-br-7.1.8.1-12.el9_3.x86_64.rpm dfb03536f3cd50fb0d570df177e1ddac218913be607cb89d46e50a385b7cc87a libreoffice-langpack-ca-7.1.8.1-12.el9_3.x86_64.rpm 5ab04ead959db79ba526a67335819ee99938707923bab238a215108d6cace824 libreoffice-langpack-cs-7.1.8.1-12.el9_3.x86_64.rpm d9a5488e721ebb79110e8eaf5bdf6701b4f24d7c109d447bacd59b014dcce4e5 libreoffice-langpack-cy-7.1.8.1-12.el9_3.x86_64.rpm 4ba0f191c99b28abf523fdea8aab0e9956fd0ecb35752ec61d7b09bcffa9a84b libreoffice-langpack-da-7.1.8.1-12.el9_3.x86_64.rpm 846cfc9439d2f759a1716d16b799d6dd66954587f6a0d9c885d974f34a548be0 libreoffice-langpack-de-7.1.8.1-12.el9_3.x86_64.rpm 315b66d0dedfc99362ef096b861131b9f040084697468f6839ab0685aa0a35f6 libreoffice-langpack-dz-7.1.8.1-12.el9_3.x86_64.rpm 1e769329b00284a8245a319b1f2c4bc0b91374f374def911cd7191694f44db58 libreoffice-langpack-el-7.1.8.1-12.el9_3.x86_64.rpm 31162f0ba952df5b471c35adf729364c4b2db46d8662aa86e98458126e145628 libreoffice-langpack-en-7.1.8.1-12.el9_3.x86_64.rpm 75d5b44166445959a9ad4fafbf16d7d95f30f49cd83de48fb1489dd68cbcee77 libreoffice-langpack-eo-7.1.8.1-12.el9_3.x86_64.rpm 2cdd452acf0e97a7e5fc83bd4a8f7f5dfcc1e71e0ead6695ccf9c8cce9157402 libreoffice-langpack-es-7.1.8.1-12.el9_3.x86_64.rpm 4cbe590e4a7a475d2d21b1367bbb4ea1916cad174052e1936368642f31b72be2 libreoffice-langpack-et-7.1.8.1-12.el9_3.x86_64.rpm da7abdc97fcebc3a4a34741903ca8c397c1149cab390ee5b35b7af3d0faf9eb7 libreoffice-langpack-eu-7.1.8.1-12.el9_3.x86_64.rpm e8570e8430c17c2e3cadb2abe02c7b7eb2a3478cec8cb26d409ae411b1e86b4c libreoffice-langpack-fa-7.1.8.1-12.el9_3.x86_64.rpm 02704ccf3ab7a5b28cb2dfe422742ad0cfb0d8d18b839d3f172b0f06054e2afb libreoffice-langpack-fi-7.1.8.1-12.el9_3.x86_64.rpm 196c3db1b862f7b5f6171a1d105b5232c075f1f9ed623019036eaada06a7f13b libreoffice-langpack-fr-7.1.8.1-12.el9_3.x86_64.rpm f92ae0215723d0121922417fb50fd0d11d341f81879f4ffa9add8aaf8ec5af80 libreoffice-langpack-fy-7.1.8.1-12.el9_3.x86_64.rpm 7b42d16e9fc31050d25410bcdf713e0f31d8b5606bb387b8be0114e06101d6a0 libreoffice-langpack-ga-7.1.8.1-12.el9_3.x86_64.rpm 005dfa9de5794badb471c6e34f5f7c5aaca9da04679b7a25923117552de83298 libreoffice-langpack-gl-7.1.8.1-12.el9_3.x86_64.rpm c436cf1f51b67d7d4997a07c31fbfc6a6da29d870f78dc84921276b3ff2590b4 libreoffice-langpack-gu-7.1.8.1-12.el9_3.x86_64.rpm f1c4542711028aa490ed4109c50768cbca13600704f9dbdb7f7c8a21febbf962 libreoffice-langpack-he-7.1.8.1-12.el9_3.x86_64.rpm c1a94538c22b46021b9d287aedad9a73870aabe21ff0004a70a320358997e625 libreoffice-langpack-hi-7.1.8.1-12.el9_3.x86_64.rpm 759e0e55f7105462015735d1a7873e435c64d2208ebc73c73e642dc271a0020a libreoffice-langpack-hr-7.1.8.1-12.el9_3.x86_64.rpm cbe336330e236d51ddbfb3853fea61d75b41bf7d2232ae32934116bc55fc0792 libreoffice-langpack-hu-7.1.8.1-12.el9_3.x86_64.rpm cb6253e301cd16faeddec6f0aa53d1346f5dad15f9e62ff649b4f27c1c3899a5 libreoffice-langpack-id-7.1.8.1-12.el9_3.x86_64.rpm 09f9ed7e02b94fac3cfe3bc43df7cf1e7b4205a5ae89dc864ec2249a811a55fe libreoffice-langpack-it-7.1.8.1-12.el9_3.x86_64.rpm 20dfce56504e83a91661bf04eff946b470b573c0c250f60d54e7c28709086737 libreoffice-langpack-ja-7.1.8.1-12.el9_3.x86_64.rpm 0ff735a141830ad0dc60062fbdbe182307988791c90b664f7bce15fdda1fc517 libreoffice-langpack-kk-7.1.8.1-12.el9_3.x86_64.rpm e1a10941dbcd8f04535cf5c6cbc6fbb6f94ddf0d3bb3b2ba0e1d930bd3530aa8 libreoffice-langpack-kn-7.1.8.1-12.el9_3.x86_64.rpm 2cca31cf47ecd15ad2a7a69dfe66a10de5a378b5f6bfca81c7a7689092452951 libreoffice-langpack-ko-7.1.8.1-12.el9_3.x86_64.rpm 6c9e30f870549bca436ec3529b9885e89c2ad27072572dd257bb507674af05e9 libreoffice-langpack-lt-7.1.8.1-12.el9_3.x86_64.rpm f6debf4263ee90e562069aea0fb0046e010cb66a6a1d943896bae4a3a16310e1 libreoffice-langpack-lv-7.1.8.1-12.el9_3.x86_64.rpm e1a1b5a6eedf988f8e46fed9e8df5f6b756e49b92227af60cd2871a6fac2860a libreoffice-langpack-mai-7.1.8.1-12.el9_3.x86_64.rpm cade1ab94c2f7931f0d1bf91a35bcddec0c34b20a333335f4c8188b03b672f6c libreoffice-langpack-ml-7.1.8.1-12.el9_3.x86_64.rpm 0a893756bd9595926c491eacf653940676e35ddaf5259c52571f06ff5bbb221f libreoffice-langpack-mr-7.1.8.1-12.el9_3.x86_64.rpm c7853c306be5d9962c5d9a7f18fa47e8514f07b6b8f697d7d36eb21e4cbd8be6 libreoffice-langpack-nb-7.1.8.1-12.el9_3.x86_64.rpm 8909fdac1b19337ce04cfbc6a2ca8934fe35c1159de7bfe6fb6a49dc8e8500e4 libreoffice-langpack-nl-7.1.8.1-12.el9_3.x86_64.rpm 231cc18b1fe8e285bac2a6df7117d0878b5f20f07f5571c34aa408ba6cbdb5ff libreoffice-langpack-nn-7.1.8.1-12.el9_3.x86_64.rpm a1eaadad92b435047fc20640c2edd5b94cb768b031928a3ba24cc75e6ce4af12 libreoffice-langpack-nr-7.1.8.1-12.el9_3.x86_64.rpm f6f8de0a1e1bb6ba11b7614d9c18251a48a79188771000646542097fa4a9cde4 libreoffice-langpack-nso-7.1.8.1-12.el9_3.x86_64.rpm 23eafa8eaba79c5f4a6a8acc444892b998dd2f75a2f4d5be001ab3a651455910 libreoffice-langpack-or-7.1.8.1-12.el9_3.x86_64.rpm 5bbb9b4f6ce7dde5a942a94011d103cc075ca3426a1582261411f049f674bb6d libreoffice-langpack-pa-7.1.8.1-12.el9_3.x86_64.rpm 57e0b2ce0155b5620d85d7bcfd633418744f61ebbb468ae377ebc3ff6ae1b270 libreoffice-langpack-pl-7.1.8.1-12.el9_3.x86_64.rpm 4d6cc29b8fa5c1853085d4735575dd3c62e5cc8a2e50a50dc2e4a88ec28188f8 libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.x86_64.rpm 5b4d4ee16c5e66cc6b98e356ea7105c5a0c08aa1dd1bebdb2898d4ce439edbc5 libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.x86_64.rpm 1b629f66b03552eeeb6a500b46dfecfae76119229c166567ee115c931588ea99 libreoffice-langpack-ro-7.1.8.1-12.el9_3.x86_64.rpm d7af8d5f680d9f502e4ec6ffc75b0a14dc5c1ad377c3679ac455f6c25f6d0355 libreoffice-langpack-ru-7.1.8.1-12.el9_3.x86_64.rpm 8086870fb525f10500696170bc206039c38d6744774b7af4868ec480959a1bf8 libreoffice-langpack-si-7.1.8.1-12.el9_3.x86_64.rpm 7e897171407e7478e36a86ee8ada32ad5a0e0507c23d82f8eee39403a2856fd1 libreoffice-langpack-sk-7.1.8.1-12.el9_3.x86_64.rpm 0adc158e16e36e60c5fc66c8518296bc68e8311bc1686f589567dfd55035d0c3 libreoffice-langpack-sl-7.1.8.1-12.el9_3.x86_64.rpm b99372c73e8bef38b212af800ccba4a22f8efed7bef91a67b7135c17b76bb1e7 libreoffice-langpack-sr-7.1.8.1-12.el9_3.x86_64.rpm c0f212297d79bd172437f73b1f1dfa434aca9d51608b3cfef4c34267086890fd libreoffice-langpack-ss-7.1.8.1-12.el9_3.x86_64.rpm 3332e42f61d80e273d01e9d3cb92f4fca22b5e21afbdc859f9f33c5e0dce3502 libreoffice-langpack-st-7.1.8.1-12.el9_3.x86_64.rpm 030a7d055dae13c3a864cd508367cb27271eca8a7448a3c76a2dedefa3cdea56 libreoffice-langpack-sv-7.1.8.1-12.el9_3.x86_64.rpm 9fc84dcdfab03a640098e930b2c120db8bf37257d9fc35b786ac29d0f977c797 libreoffice-langpack-ta-7.1.8.1-12.el9_3.x86_64.rpm 0fa9a579b7d22488df8f878f691b3914e4294c15d68038db2348c80aecc4cb34 libreoffice-langpack-te-7.1.8.1-12.el9_3.x86_64.rpm d49397b7bb1159ab891a04429fe1468aff45b82a7330e9acbf60fbec1c1cfb6b libreoffice-langpack-th-7.1.8.1-12.el9_3.x86_64.rpm 65e01a398a458afd6745d577d93ccb7d63cf04283c6075866ae24385909460c6 libreoffice-langpack-tn-7.1.8.1-12.el9_3.x86_64.rpm 62759c725760988d9badbcf8a1b967ff8eb8bf9b5fbeac86160d4fb95869d488 libreoffice-langpack-tr-7.1.8.1-12.el9_3.x86_64.rpm 6103bff2a92ea2ec7078068295535cf1f3c326bfaaa382f2adb1cd11924ab824 libreoffice-langpack-ts-7.1.8.1-12.el9_3.x86_64.rpm 7156148d5ada6371f0516ed49f0cbe28b176dcf593aa799f707becdd2461e08f libreoffice-langpack-uk-7.1.8.1-12.el9_3.x86_64.rpm 78f3a777a2c9b488516ca67f58a61a685c927fdb0a36ca57ea368c366b020b2f libreoffice-langpack-ve-7.1.8.1-12.el9_3.x86_64.rpm ee0708bec78003b4b38abeb5bdb7aae014376f04487d541124c103ffbe7180d4 libreoffice-langpack-xh-7.1.8.1-12.el9_3.x86_64.rpm c1ee759578fd5c06a2129d33697feff8bdbf9b8fb320dc06a1ac83f02fb9ca6a libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.x86_64.rpm 8e0b913da560599adeb90382895aef66e108953d57cf819db4820e60d3bffa35 libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.x86_64.rpm 29a22765289af180eb801eb293454de8fa7b67c46fc76e733d5de8a609659d46 libreoffice-langpack-zu-7.1.8.1-12.el9_3.x86_64.rpm 55d60bbddbb80680ea3927c2a710dca3520c105f8e1f2e1f2d6064d3fcd80ee3 libreoffice-math-7.1.8.1-12.el9_3.x86_64.rpm 267df3773c76b5ce5f5d225d659320c94043189473bd4ba394dc8d198a16aab4 libreoffice-ogltrans-7.1.8.1-12.el9_3.x86_64.rpm eb2f5d842ed71c65cf0fd37000b5a27c846fbcfb1d9b7540714aa8722c0a8d68 libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb libreoffice-pdfimport-7.1.8.1-12.el9_3.x86_64.rpm 678037a00bdc2615f4137c5830326802e6dfb96670ea2cc68faca6c5fff40a09 libreoffice-pyuno-7.1.8.1-12.el9_3.x86_64.rpm 332225a144e36b99b9819e6cf056fea3e25bfbfd29d231d65b110513c98817c2 libreoffice-ure-7.1.8.1-12.el9_3.x86_64.rpm 9d0275c9cf7a9b7500f3a405035517050f78eda7dd06e2f52adbfe86926f5a47 libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm 4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e libreoffice-wiki-publisher-7.1.8.1-12.el9_3.x86_64.rpm 34258e9883016657df63da8e0c1ca0dbfbc0edfe0294c552e834e2960376edfc libreoffice-writer-7.1.8.1-12.el9_3.x86_64.rpm 30215083d14d035af679fe90544046ea209143f6ea9d1966a9f96682a45003e7 libreoffice-x11-7.1.8.1-12.el9_3.x86_64.rpm 73e149835749d2cb85a7a24934cd902a9e870b1aacc29e8dc4260fc63ef03fbc libreoffice-xsltfilter-7.1.8.1-12.el9_3.x86_64.rpm 34094baed579d9b763243c49b110fe20fbc4e08f2053c6dc940c778cc7fc438d RLSA-2024:3837 Important: 389-ds-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657) * 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.4.5-8.el9_4.x86_64.rpm b8756f05830f380a313e3d6198721803cb11cda009f2f7dc8a877dad005705cf 389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm da228036f4e3ac4c0caf048dadbcab01e2f2f8b8f85df9ad256952aa1c2d7a81 python3-lib389-2.4.5-8.el9_4.noarch.rpm 27d33a2d083349a174462ec9dbd80cea7888b4bb05ae832ba2e68564415fc113 RLBA-2024:3839 ostree bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * [9.4.z] Update ostree to 2024.6 (JIRA:Rocky Linux-36770) rocky-linux-9-x86-64-appstream-rpms ostree-2024.6-1.el9_4.i686.rpm 6629df6cf0d37bcf958d0a8d7d1e8788cc412784418ca699c40a1265aa60bd94 ostree-2024.6-1.el9_4.x86_64.rpm 6b06ed7e922091d161692df8ff681289aabd106adbf006bcaafe9ee623a66da0 ostree-grub2-2024.6-1.el9_4.x86_64.rpm 6eb38ee30f1e37584f0a3182d721f4c0e329a13fa23dfb9b8da538dee985590c ostree-libs-2024.6-1.el9_4.i686.rpm a97ae2035c1880127b8282ec6284448897f8981cd6ad2750a5f6baebd864d01c ostree-libs-2024.6-1.el9_4.x86_64.rpm 52496f99f011314cf21e5543ce8f43a1f34d1594a8d7127c998d17bde64fb835 RLBA-2024:3821 socat bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets. Bug Fix(es): * socat: Fix peername segfaults in rhel 9.2 EUs/TUS [rhel-9.4.z] (JIRA:Rocky Linux-32914) rocky-linux-9-x86-64-appstream-rpms socat-1.7.4.1-5.el9_4.2.x86_64.rpm 1e10b565cfd9babf425bd1dd43cebfade3218b7b14fa18fcb7dcfa39996b08de RLSA-2024:2888 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.11.0. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.11.0-1.el9_4.x86_64.rpm ddd2d85b5e10080fb2d35273ec7e6561093609cef605cce7b54ff848cf7382ff RLSA-2024:2910 Important: nodejs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: CONTINUATION frames DoS (CVE-2024-27983) * nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025) * nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982) * nghttp2: CONTINUATION frames DoS (CVE-2024-28182) * c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nodejs-16.20.2-8.el9_4.x86_64.rpm ba4435a0a301b3388b63ed65f33614083a096496d1639aafe430601995bc86d3 nodejs-docs-16.20.2-8.el9_4.noarch.rpm 09a2e8c6e0929017820d939fa8c48fdea93a67d78060a5cb8da61b72c4c06df7 nodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpm 5de7fc167a4336eb263f665b9b0758459213c95f6ee82417484ef92a96333307 nodejs-libs-16.20.2-8.el9_4.i686.rpm 489ea0dcd26257d575d9711347f2cb3a7acebeda23cd3d739597bff888363c9e nodejs-libs-16.20.2-8.el9_4.x86_64.rpm 2427bf82b879735c9c42ac58ee45fbaf4a18e2aebd84943726bdecaa32978a30 npm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm 65f31e4308c217c1fc832ac5a77f0580514bcbc3dc42039eab756d73bb777ef1 RLSA-2024:3307 Important: tomcat security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549) * Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672) Bug Fix(es) and Enhancement(s): * Rebase tomcat to version 9.0.87 (JIRA:Rocky Linux-34815) * Amend tomcat's changelog so that fixed CVEs are mentioned explicitly (JIRA:Rocky Linux-35328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-1.el9_4.1.noarch.rpm 6486789bfcd216dbb9ebdbd11c28bf8d9458d90e8687aeed1235609a8da810a0 tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm 1277125340b2842599677ece2535b2fb701affd6bf0c4a3f7e6dcf879ab7faeb tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm 5ce465ed19e7ce0b812c9aea3dcf8fc7b0a82292b0b1ac6e629bd824b028fed5 tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm b31abda8887f5894fae36a62c1e7b18a6da44be8bfdf789da4d8c99c01e1b5e1 tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm b64ccb24a1da24c847f3cc1dd0cc66a2ec7ee73014e8f0010e287c6d8ac5b4c8 tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm 68f1dd7964f37139dc3c4a996aaddc3fce54c1d587908638e92ce05b4497e4e7 tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm 312fdf6582a67bc6834d115199fbcb524b1559fc114a9691d4a7cb5e4a326429 tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm cf07d722e87a9c544a5c9197e64818851479efabb085a268033b58296734333f RLSA-2025:15700 Important: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-33.el9_6.1.x86_64.rpm 02c72acb313ce5fff773ab3b19042a42b3f56004e347f4c8e406299ccea000f6 cups-client-2.3.3op2-33.el9_6.1.x86_64.rpm d0d73251aa30000866227b265c71218df6a7c90c65d54758011148365c504dd3 cups-devel-2.3.3op2-33.el9_6.1.i686.rpm 253551848dcb5ab0206f56692d70c77ed70b29c682dd2f87bc69506b165369e2 cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm 95c47135f442873b43d691c6602754ac78045fbdd69ab84cc5847842b916e511 cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm 5e8a80f892d7d9d90dd1e704de71f5174bc2972b3f858b6f085a791e852079c4 cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm 7870265e380826c8b56443580015e55b93e82fc9a2189d9241f8bf5cacd0a2e2 cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpm 09ab45ad90633975ddba630660e22211b85a66b9d9eb0a432ce6b9da89eb5a27 cups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpm 989754b505c71927647ba70912514fd8daa11eee0ba810c9b5dff73691906134 RLSA-2025:15887 Moderate: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.127.0-2.el9_6.x86_64.rpm cca51d06c8ae0dccaa67c0546659aacb29915821eaff018f8e5b80e5593c2aed RLSA-2025:15900 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Podman kube play command may overwrite host files (CVE-2025-9566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.4.0-13.el9_6.x86_64.rpm d94fed2b255a77f5f3f94c88e598fd44b8ab9df19f809fbefc477184ad8ca9c7 podman-docker-5.4.0-13.el9_6.noarch.rpm 66448fa4b091f4769a597fe67ed0f525c8d009ac8a2d4aabf6b0e464077f93d9 podman-plugins-5.4.0-13.el9_6.x86_64.rpm c7b6e5c6fea3eefcc598915007f3a2385c18900363aacdf6ead8d1d7fead170b podman-remote-5.4.0-13.el9_6.x86_64.rpm be4872257fd8e16b7bc3b1371b9ef6958c777baf8d637fc9dee5838352f65093 podman-tests-5.4.0-13.el9_6.x86_64.rpm 0a751a6acb31f3d9cd9f1adb4dac0066918e6fe75594cbb899c65247a65268f1 RLSA-2025:16086 Moderate: mysql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688) * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699) * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575) * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092) * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077) * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085) * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082) * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087) * mysql: Replication unspecified vulnerability (CPU Jul 2025) (CVE-2025-53023) * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084) * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mysql-8.0.43-1.el9_6.x86_64.rpm e002af06da4db3aa703799331daa54c9eaa3aa4073fa3b021bdfe2ab2dd82fd1 mysql-common-8.0.43-1.el9_6.x86_64.rpm 610fa74705912a3f6f9f4863977dbde64f4af34e5100e4f1e70ac0507cc2ffb4 mysql-errmsg-8.0.43-1.el9_6.x86_64.rpm 57f2a6bbf757ab40dccfcb24497570235929a7515279622ad911269d167e2bc0 mysql-server-8.0.43-1.el9_6.x86_64.rpm d34eb3941d4dba2fd36760f7f6a097fb9d5881ece5fccd6cf6e773af3b97f81b RLSA-2025:16108 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.3.0-1.el9_6.x86_64.rpm 85eb13dcd8d34c3cdb4505827b98bc8f7093e379bfe303d8dacb4ec2099372f1 firefox-x11-140.3.0-1.el9_6.x86_64.rpm 5d3763723dcc0fcc2d6c4869143af25cc177d8378e1cabd7fb7851212e5b65bb RLSA-2025:16116 Moderate: gnutls security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.8.3-6.el9_6.2.i686.rpm bd15d431f239626cca530608ae08193f43066f2ef674a1fd2a5f67a95d5bd6a6 gnutls-c++-3.8.3-6.el9_6.2.x86_64.rpm 58224090b198941d915fb9476f3c1fb45a6545603ee6244845d825b1d05e12dc gnutls-dane-3.8.3-6.el9_6.2.i686.rpm 0ba13721b25926414d7098f5835eb94a44b54df825f75e7b2eff0128975b2d7d gnutls-dane-3.8.3-6.el9_6.2.x86_64.rpm 609151b097449dfd3da8fe254731f887ddd30d81636a6aa78c208ab1707ef0ac gnutls-devel-3.8.3-6.el9_6.2.i686.rpm e10261d8158721ad5c7a8f48c34eb5924b20cac42c28b38a2c107c790d63a655 gnutls-devel-3.8.3-6.el9_6.2.x86_64.rpm 7ec3d3def423a0bb8df31bbeabe6edb921277f096d8a9075907f34162a0daa26 gnutls-utils-3.8.3-6.el9_6.2.x86_64.rpm 526692613d58edd662978f078f8e519ccaf5ab40bab17e3028a7846ccb0c98dc RLSA-2025:16156 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.3.0-1.el9_6.x86_64.rpm a7372d46d948151dbfff18d7f648bd9161e71ce4d7b447eb770056dd7531b714 RLSA-2025:16880 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm 8b0de631dde2fe199660595d727913dd4bc49c022e381b5ebf75b9810fe058b7 kernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm 893dd2163a9194f804ddbbecdd663aac55ab7a573c11ec20fc70b4d2fe30101f kernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm 6a71325d1e3793b51ba9cc975d92021e16d8e9a0f27dbe6236ca33116c6d54ad kernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm ca23b5631ad6b5e3fcae960f6a439828d67dce752d136b4d214596110f2dca68 kernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm c0858a8abdf5178c4d1147ad84829c2caffdc0c8437536a66786a18b1d26012d perf-5.14.0-570.49.1.el9_6.x86_64.rpm 11827dc402dce2d4b5306b5e67b32953d1ed64ea9b68a8c83ae81fb6e7955e2a python3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm ebc92c018aeba567287b9188ffaddc138e1aa6657199059d579a6b5597f96aae rtla-5.14.0-570.49.1.el9_6.x86_64.rpm df6a16cdddc7e5691b91b91116ddbc4b8d4b9e4082a438b6356d1a6e2aefc97d rv-5.14.0-570.49.1.el9_6.x86_64.rpm 50a420c1b40c5702e431eef04a7982cac91cefe4833a95574d54eb7594fe6567 RLBA-2024:3822 qemu-kvm bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * qemu-kvm running Vyatta hits assert when doing KVM_SET_GSI_ROUTING [rhel-9.4.z] (JIRA:Rocky Linux-32837) * qemu crash with kvm_irqchip_commit_routes: Assertion `ret == 0' failed if booting with many virtio disks and vcpus [rhel-9.4.z] (JIRA:Rocky Linux-32990) rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.2.x86_64.rpm b437690b8d37c52e2e03606e58b909ff76a36be232b5fbc00276988f2916a921 qemu-img-8.2.0-11.el9_4.2.x86_64.rpm 1676b82a9f61270cdfca8fe339eb43abe1e2e39b5648c5d7fa7275b8ee7af2ae qemu-kvm-8.2.0-11.el9_4.2.x86_64.rpm 326109b2fa5e5d11665360c7840188645662a59b389770757509f55a68628c62 qemu-kvm-audio-pa-8.2.0-11.el9_4.2.x86_64.rpm 50219d5301d6d4d338bf79d0e611fb711202c69f8afd8e454e17950ea4055af9 qemu-kvm-block-blkio-8.2.0-11.el9_4.2.x86_64.rpm b1659a62571132bafc073452595f3cd7583e40ded7f439dea5012412fdd730c1 qemu-kvm-block-curl-8.2.0-11.el9_4.2.x86_64.rpm d1da19e9cc5814e5021855b1509c3130409182129d091d13f451120d2e69be9c qemu-kvm-block-rbd-8.2.0-11.el9_4.2.x86_64.rpm 8d211a8d47aa313fcf46a5a28662f1313916402304db6a8e934dfb086a7de702 qemu-kvm-common-8.2.0-11.el9_4.2.x86_64.rpm e6f7b2a81aacea1ee33f708d84ad748f69b11e95ba5f455904da9225028175d8 qemu-kvm-core-8.2.0-11.el9_4.2.x86_64.rpm 3fd06c6f64fefe89657b2a6f171f01a603638594ff5d404e46eeae854dc85207 qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.2.x86_64.rpm fc44fafdf7b682a572ca56e0ccbb139dfbaf721afaa430200a85ad6c0de320f2 qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.2.x86_64.rpm b8289386c25940b1cebfe1243e1743d8dab51c3965ac183bd3ff4b901a516922 qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.2.x86_64.rpm 772eb33d77f4e37cc362359d5824b4f58d1ffa88d046a2ddfa4d524824f96241 qemu-kvm-device-usb-host-8.2.0-11.el9_4.2.x86_64.rpm 76fe5746dc57a543f2bcf39dedf255444b54d5c8516d7bfbfae30f6d7a40138c qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.2.x86_64.rpm a680e2db78e8855601cc4ae78e6b3a8cebcd0edc9046c3874146bc845be4ac6e qemu-kvm-docs-8.2.0-11.el9_4.2.x86_64.rpm 484d567238721ba2c6dcd30a7e1aaa3645bd5790bb812a2c33d0fdd963122e62 qemu-kvm-tools-8.2.0-11.el9_4.2.x86_64.rpm 65c99a08b0f4cacde3fbeda6482edc0d58cd4176f9a6d42d0fd4211d6fd9c95a qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.2.x86_64.rpm 46bc8480b269cbe4bdadcfe5337fe995ea7a2da0c74906f9fcfcf9a9affe1e1f qemu-kvm-ui-opengl-8.2.0-11.el9_4.2.x86_64.rpm 819c7e590fd108a3b5d72aaa9b76339ae57d532c1ff176fe80dbcbc13be9a0c2 qemu-pr-helper-8.2.0-11.el9_4.2.x86_64.rpm 35b64c5267fcb80a991ac54819ca36283abee949b8468af9e2ed823001f11af6 RLSA-2024:3820 Moderate: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm 48b60682729d7741e5de8aaeab79073b822da42d377024dc132cf6f333b11038 fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm 4bf2637c54bbd4082376ddf7037b0bd9a4f87e63ac3beed1c3cbbf452fb9c35b fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm d1355cd60f55f462eaa9bb76a851544563b3ded179c81c0061038d2b77ae543a fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm d82a6e04fdd3284fa972628e3ae020efd00b30fc3969cba40168ef4e4ceb42af fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm 3bb6c47d3435168ab44256ffa163d43755c36c96bad30fa37e931beb038e82db fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm 227e0a4ec35157579695fdb2fc6d3d8ad425c81c4be9d216d503d9554c124496 fence-virt-4.10.0-62.el9_4.3.x86_64.rpm bcf2145ad6a65935a534cad873a6c22886b86c566dd6f9b7142ff6eb8546ae02 fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm fa9b4b7aa40b1df187568973016eb7a7fd49de3638209c103bd5b7cd1ba6e736 fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm 95b8fb7ab2e1def4173976b2149b4fae0106b14782cfcae092fe7194598f0981 fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm 403e45427354a831e404a31f5b129f3cd61113056b2ac2b3a9a0b1b3525f1f08 fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm 2035ebfd7b80ee5fc9aa07d23eb6be18b42e92d7195cea48ed3e88c8d1b284b8 fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm 96d8a291a7e7748b75cc1f07dedb9f2b612142b2f8e2817e9200be752b40e29a fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm 15630f0b919f8a858022bd67544940e31ccac63ea6baf745654cc48e5502a5c1 RLSA-2024:3826 Moderate: podman security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fixes: * podman: jose-go: improper handling of highly compressed data (CVE-2024-28180) * podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * podman: jose: resource exhaustion (CVE-2024-28176) rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-4.el9_4.x86_64.rpm c6418c2edbe8e0162dc593eefdc43b471a504f6a6c5a3a058c28eb583eb1e838 podman-docker-4.9.4-4.el9_4.noarch.rpm d0f5ace10efe6e29f1926fee8fc430c205f33949f24a602eb630b920aba772ab podman-plugins-4.9.4-4.el9_4.x86_64.rpm e427810613ad81e0c365511dd3780780be2322d50df950c5db6b4c0353c812ed podman-remote-4.9.4-4.el9_4.x86_64.rpm af6db91d11ada57f24d3caf67cc07662f1f1febdc78592f38d54d8a9e0a31dd0 podman-tests-4.9.4-4.el9_4.x86_64.rpm 2b6c29aa39baf446665a8d441b26c7b4eccea6b99fffb62fbadb09ca79928f9c RLSA-2024:3827 Moderate: buildah security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * jose-go: improper handling of highly compressed data (CVE-2024-28180) * buildah: jose: resource exhaustion (CVE-2024-28176) rocky-linux-9-x86-64-appstream-rpms buildah-1.33.7-2.el9_4.x86_64.rpm f4fb43e3db04367623d85407d122b4b9f34bd022ebf34b9e78dd6aa4f26bbcbe buildah-tests-1.33.7-2.el9_4.x86_64.rpm 30a08966a0f68effbb28168cd9fe6aaa6bdbf94101873c4954c8afd94fc4c1e8 RLBA-2024:3829 cockpit-machines bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit component for managing virtual machines. If "virt-install" is installed, you can also create new virtual machines. Bug Fix(es): * creates broken external VM snapshots for pool volumes [rhel-9.4.z] (JIRA:Rocky Linux-34569) * [Machines] Can not remove Host devices [rhel-9.4.z] (JIRA:Rocky Linux-35514) rocky-linux-9-x86-64-appstream-rpms cockpit-machines-308.3-1.el9_4.noarch.rpm b761425307dd0d77b2877721044c02a5574433692981b2d3f4b87698c31dad93 RLSA-2024:3830 Moderate: gvisor-tap-vsock security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.7.3-3.el9_4.x86_64.rpm 28e857489e1e093c8cdcf83a1a0a2852528b9f70e45c7db7efbb740770943936 RLBA-2024:3833 NetworkManager-libreswan bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop Bug Fix(es): * Implement `rightcert` Support in NetworkManager-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33372) * [RFE] Support `leftsubnet` in IPSec configuration in NM-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33376) rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.18-3.el9_4.x86_64.rpm 980fe0366b02424d8daa107fc1d1d6c1c5a2a7244c96565272687001fc7ba094 NetworkManager-libreswan-gnome-1.2.18-3.el9_4.x86_64.rpm c92e7e88ebd848da29d6f0fdf2fea1c31115b1f179e052ac1f78afd4de8b3c3a RLBA-2024:3840 golang bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Bug Fix(es): * Rebase to 1.21.10 (JIRA:Rocky Linux-35630) * Re-enable CGO for cmd/go [rhel-9.4.z] (JIRA:Rocky Linux-36988) rocky-linux-9-x86-64-appstream-rpms golang-1.21.10-1.el9_4.x86_64.rpm a9551eecba99feb12b592495875bce89164a68107493e7b41282e602ce17a320 golang-bin-1.21.10-1.el9_4.x86_64.rpm bef80d844d5a1c9b3f05a087d653dc43c8c097bae16a052b81b238db44e6a499 golang-docs-1.21.10-1.el9_4.noarch.rpm ff69c8140ae0ecb7677ba476815eb08e50967019b9f9707456800a1178856ddf golang-misc-1.21.10-1.el9_4.noarch.rpm 317b9c72191ac2df4e3595710904b7edb5d079abee7ffa36b8ca258dca472b94 golang-src-1.21.10-1.el9_4.noarch.rpm 56f95700962c794033a17bbd1bc7bb1c6027191b013bc5557c02663f7dd2896d golang-tests-1.21.10-1.el9_4.noarch.rpm caaa23292ec0a5f7b2aa16ef632caf22fe814534538393dbd8455956b679aa25 go-toolset-1.21.10-1.el9_4.x86_64.rpm 39107d2ee75d81d289b463847d8801f182b1131a27df6828aff7cd3acb08f405 RLBA-2024:3841 rpm-ostree bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * [9.4.z] Backport wrap of kernel-install for scriptlets(JIRA:Rocky Linux-36085) rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2024.3-4.el9_4.x86_64.rpm 010922ba6951d923e19f4f0f31613af4fab0c92784b862cedeb1e6282a44c389 rpm-ostree-libs-2024.3-4.el9_4.i686.rpm 7a257a1d066337d226e16e9f08a39b4ae248b891e2ad62590bf674c1dc65daed rpm-ostree-libs-2024.3-4.el9_4.x86_64.rpm 05d6c8d9fe76ecd4c472287d80e8c49834595b656113fe7851f2b718eff3b552 RLBA-2024:3983 kernel bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Bug Fix(es): * [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534) * cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743) * [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622) * selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991) * [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447) * CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572) * ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512) * Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524) * deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904) * [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933) * [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.22.1.el9_4.x86_64.rpm 562d1356bf3faf117a453db1fe6db6255b7f4f64afd2c02fa91662d54d5a673c kernel-debug-devel-matched-5.14.0-427.22.1.el9_4.x86_64.rpm dbd7c9ef66797ad95b541007ae747777e691b0b3c021dd0b576aa6d24dc49db0 kernel-devel-5.14.0-427.22.1.el9_4.x86_64.rpm 9345292a92521f55ea3cd69602ad13b5007732f7bc47d67bc08ee141418faabf kernel-devel-matched-5.14.0-427.22.1.el9_4.x86_64.rpm d1d340dd587fae9c90054127b0afcf08d233d861cdb5102c67036b2e5ab3964a kernel-doc-5.14.0-427.22.1.el9_4.noarch.rpm 93d09695a1cd4c79b22a17f403fb5ce71ab5da171f7961e07263bdc51de4d9fd kernel-headers-5.14.0-427.22.1.el9_4.x86_64.rpm a405a8705edd313e9f7fc0a683ba27fb87d0cbeb4715819cea77b8c05a70a667 perf-5.14.0-427.22.1.el9_4.x86_64.rpm c2a01cae57bfb52acb9c9e0fe4784d35b14c55e11939f436b5620476d097837a rtla-5.14.0-427.22.1.el9_4.x86_64.rpm 7dc690453c59a17b45c9dd15b62d8e3c5ee438ec3c3bd1cc61b9fb85d8f67f00 rv-5.14.0-427.22.1.el9_4.x86_64.rpm 25140741233ac7238a86de6a0fd520f7a429eb9f2447bf27048cbffcaa052458 RLBA-2024:3982 selinux-policy bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * selinux prevents qemu-kvm from read access to max_map_count (JIRA:Rocky Linux-36154) * SELinux prevents the qemu-ga processes from reading the /proc/sys/vm/max_map_count file [rhel-9.4.z] (JIRA:Rocky Linux-36291) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.35-2.el9_4.2.0.2.noarch.rpm 1d4ca026702d6f688abe9a103c258df6cc93acefb9f8901ed3d790b8f371e8f3 RLSA-2024:4078 Important: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.18-3.el9_4.1.i686.rpm b7207e023f5281b37ef31495a7cd4ec2393452fee0a4e559f6f590f7d06b003e python3-devel-3.9.18-3.el9_4.1.x86_64.rpm 85757372f923972992e4d33984cc792bf3c0b7221c6d118cf0f9bbef58e37bdc python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpm 92d2051e9a06749f8e30a30d157f56c70875d5a650b27c1357aea5b5adeb6e5a python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm d0d68e30a25029016abe57dd40594b0c3c2c3dfd3ec5d3e1562106e010cad0e8 RLSA-2024:3959 Important: flatpak security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.9-1.el9_4.x86_64.rpm 7c40cea03f21e8e58e9f86bacb756859fa701ee3c84510a36d2b4235875d6d8d flatpak-libs-1.12.9-1.el9_4.i686.rpm 12d1b51e883c648126e29daf5be0a016efa799c4403bc76d69d84eb872ccab28 flatpak-libs-1.12.9-1.el9_4.x86_64.rpm b46e0dd8a3d8537789b21acaa8517c6076fd4007fd56f0203083c043386dd0cd flatpak-selinux-1.12.9-1.el9_4.noarch.rpm 9a8325519721e0d441ddb9fa187921c455f40a48843d8741ef875099ecb78534 flatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm bf0d1c423bf33e94a74f4e36b2a2eb10c0f1e1e4865aadea118f9e66473d4d17 RLSA-2024:3999 Important: ghostscript security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-16.el9_4.x86_64.rpm c01f585bbcd706c15531365f37ac5706882907b14edbc0c4b4f6e30d264cfa80 ghostscript-doc-9.54.0-16.el9_4.noarch.rpm 5bef9a89aacc863d3fd54c34036b3bf65cbe90ddad4df175dbe22a4c964075dd ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm 6d5ebff65814817fc7a92721a84fa9c4f0834014e167cfa38a74078e25ce70a6 ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm 982bcd046298a8188ab97043126952f58c119d5976f23111741e426874472c98 ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm 8aea6fc1dc98b3255fc8ac38c6ca5a44ac76f4a091c2dc7ebc516d57f688f7b1 ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm d0427782ee5ef04a8ba7b5444cbfe9d57d2de65e18cefb83e1543b1f8848d3ba libgs-9.54.0-16.el9_4.i686.rpm 10feedde37a5bcc2c71957f28ad253fd5f3ae380857e25797a0d12c57ed6924e libgs-9.54.0-16.el9_4.x86_64.rpm 39d8388a0dfa268669aeedd85778b3a819cedbf6baa526fcfb40927a482a7787 RLSA-2024:4077 Important: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.7-1.el9_4.1.x86_64.rpm 35d7a4ed0fc81ac91fde36b0b4477167b88a86e573056bc739698319bd498e80 python3.11-devel-3.11.7-1.el9_4.1.i686.rpm de289ef779de08de56ada3c2811b00cf47efb746b03d0026d147e059a7ef02be python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpm 69fcfb46b0682cba395fbbf8bb813c977f052fb8d24b06d9090e8767dfd3b72e python3.11-libs-3.11.7-1.el9_4.1.i686.rpm 6f0b436476914b31a7a09626a47365485a9a578b9ddc2e804e7b00370f0b61bb python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpm 6a5d421c27e10741ad2846a2be3990a52df6bd529a5c821328f474b32b632079 python3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm 16e9c0a15669da37e4dd9a2604ceeab1b5afe08a41327ecc2c4639ef3992998e RLSA-2024:3955 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.12.0 ESR. Security Fix(es): * firefox: Use-after-free in networking (CVE-2024-5702) * firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688) * firefox: External protocol handlers leaked by timing attack (CVE-2024-5690) * firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * firefox: Memory Corruption in Text Fragments (CVE-2024-5696) * firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-115.12.0-1.el9_4.x86_64.rpm 77c6a994ebc295bffbc74507f6ec988ac0de0c4a33ddfc748324ba010ec15b28 firefox-x11-115.12.0-1.el9_4.x86_64.rpm a8c43c47eef4ac712086a473f60ad79bae728ed80c36cb0da6d1179cc156e222 RLBA-2024:3995 qemu-kvm bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * Qemu hang when quit dst vm after storage migration(nbd+tls) [rhel-9.4.z] (JIRA:Rocky Linux-33754) rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.3.x86_64.rpm f3e1427138e901a2438cc1d8a5fe86b7a2e60f9f558279fc3551c30698625d98 qemu-img-8.2.0-11.el9_4.3.x86_64.rpm 574659b5703549ca670e436691f507690d367a1d6ba7300c9d1139ef6a7e0c24 qemu-kvm-8.2.0-11.el9_4.3.x86_64.rpm 25d652cb962064a75caec50b6bd7943b487bf9d9682226130605f8fae071c798 qemu-kvm-audio-pa-8.2.0-11.el9_4.3.x86_64.rpm 548400b68b945ef24950e2a2151261444559bb33b0c75c18dc0d2e76a137bec3 qemu-kvm-block-blkio-8.2.0-11.el9_4.3.x86_64.rpm 8b37357b84326b7f2a4122ce0228e832146ecfa647d8b4b4528f1334020c48d4 qemu-kvm-block-curl-8.2.0-11.el9_4.3.x86_64.rpm fcbf3dfc42f4662e79ab9410a420b22082cff61bc2911ab5cf6bb653ac1afd2a qemu-kvm-block-rbd-8.2.0-11.el9_4.3.x86_64.rpm 18ce5159794a71be72df674e5258f4a8248355721430e9fb85aded7f765d9a84 qemu-kvm-common-8.2.0-11.el9_4.3.x86_64.rpm 273f3aae18909a4bb218873bc7242b168d1bc99c02d341c2474478f325cf937a qemu-kvm-core-8.2.0-11.el9_4.3.x86_64.rpm e0dfa62a33b6827b475d8db55686ded62fbda9cae0ff8639f2e600f508c15a59 qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.3.x86_64.rpm 00c8684cff40ffb13b6a6d1a419c2b6508303ed94493429468a2b57f0bcab3eb qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.3.x86_64.rpm 109ab37db277be985973d1bff8b77ee7ce26bfe304b3911bc94bda7f282eaa6a qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.3.x86_64.rpm a4da8060fbbd9391cb58048ce55f3a0383956696c037b55dadb1850228556f4c qemu-kvm-device-usb-host-8.2.0-11.el9_4.3.x86_64.rpm 0ea1d9192585d4e7502b87b45cf0478656cef5c939d1aee643af3a086d6ed568 qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.3.x86_64.rpm a42079150bb5e31bea464866fdf9c5801d7ae4b68478ad25fc90b49a655a3f50 qemu-kvm-docs-8.2.0-11.el9_4.3.x86_64.rpm 2a2efaf8eb5021bfa0809f46b28646e6c4ff767958f01f541af0384588cc4681 qemu-kvm-tools-8.2.0-11.el9_4.3.x86_64.rpm 14358e878579d712911772b85da130b076606ba6a009930d29421d9e956a0073 qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.3.x86_64.rpm 01fd1283acca94b7b2c316bbdf85b0da446a579d534c5d65e6c942eab78c5efc qemu-kvm-ui-opengl-8.2.0-11.el9_4.3.x86_64.rpm 1e965ef647a593cf2182f787fdc7a94cb9b5a518ecc282f24a7c20178feeb8f9 qemu-pr-helper-8.2.0-11.el9_4.3.x86_64.rpm 69b58a2f7cbb5654f95a06e6c6f10de31504713bbb99fde282b021f5163a5995 RLSA-2024:4002 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.12.1. Security Fix(es): * thunderbird: Use-after-free in networking (CVE-2024-5702) * thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688) * thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690) * thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696) * thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.12.1-1.el9_4.x86_64.rpm 0c802f52d3fde28dd34b1c51d8fcb2d61e9c89b4034c7bbe38cfcd3e4989e3f9 RLSA-2024:4050 Moderate: libreswan security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). Security Fix(es): * libreswan: IKEv1 default AH/ESP responder can crash and restart (CVE-2024-3652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.12-2.el9_4.1.x86_64.rpm dabae4f644e4b16947be9d2476a851bffafb9dc57221825aa97ab8b8df2f3a2d RLSA-2024:4083 Important: git security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: Recursive clones RCE (CVE-2024-32002) * git: RCE while cloning local repos (CVE-2024-32004) * git: additional local RCE (CVE-2024-32465) * git: insecure hardlinks (CVE-2024-32020) * git: symlink bypass (CVE-2024-32021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-2.43.5-1.el9_4.x86_64.rpm 8ef59585e996f4957a89eabfb96e9ff7daf2e00293b85d5ec8a358c1083b9a59 git-all-2.43.5-1.el9_4.noarch.rpm 25b84903a2b7def490442e114a2ba1e252d4e4c95e303ad03546bf9d18345a94 git-core-2.43.5-1.el9_4.x86_64.rpm c516549022dae9d79803ef0c947d23bf3d95e3cd590d98de5a6e983daa4937db git-core-doc-2.43.5-1.el9_4.noarch.rpm 47ed10ce165c4988912d2a942b94b3b1a2befd965844c71b2e535c8bee1a9757 git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm 75689a49a3b63d70caceff22b12fff8b67f78fed7ec5a332f7f2402c87fbde14 git-daemon-2.43.5-1.el9_4.x86_64.rpm ba78c0ba8193726fc2a88267465fc4f58940cb7cd485bebc530f9b43a468a1d1 git-email-2.43.5-1.el9_4.noarch.rpm 2b6e20268b81eb0a5b27593c8d9a844b73090fb1ef0e5704b5fbc5a3ae7c3c28 git-gui-2.43.5-1.el9_4.noarch.rpm 28f7cea34e8a6cefd3ffa8b99874aaf102ee3eac2965f1499a5f68804f551eca git-instaweb-2.43.5-1.el9_4.noarch.rpm 23ce06e42b207d2c5df787ca81cff85f8edf0ab82dfe2cb3e03c78e0834bd132 gitk-2.43.5-1.el9_4.noarch.rpm 77e5c18ea84f4c54a5d0b6b45b465c5956a67f9849ded0a22fa811d8472f857e git-subtree-2.43.5-1.el9_4.x86_64.rpm 799b9497641fde6977e58045fd3530785e68af83879a01ec19ad67d1e49557f9 git-svn-2.43.5-1.el9_4.noarch.rpm a80098af57e692d63058ef33b891732b3ec087b091e36dcc5aa0c5e4ed8c0715 gitweb-2.43.5-1.el9_4.noarch.rpm 0112ebde98f4b70cd1a6d39fb1098d69c2cb93231f92334d1a18c192d96f6e6f perl-Git-2.43.5-1.el9_4.noarch.rpm e0476211bb7e534dcfafc4a6f7efb6537d28fff2c7f31719be75e2be17bfe83c perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm 74af8bc2f2fa67bcf371ea3c05b4c0aeec5b05fff65dc343430b535cd4f40bda RLSA-2024:4165 Important: pki-core security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * dogtag ca: token authentication bypass vulnerability (CVE-2023-4727) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.5.0-2.el9_4.noarch.rpm 1e8b80befc37d0e51d55e6f245e95ecc03f0c4972193eb4244c4043b30c37cbe idm-pki-base-11.5.0-2.el9_4.noarch.rpm 941b0e8ab1e39a2d682d9c3ae386805541bcb70d4c5dcadc8cb5469027866296 idm-pki-ca-11.5.0-2.el9_4.noarch.rpm 0c5e25e9d180c47530306f73313cb43e8fdcc1a6614a50e5a6760c069aa074ce idm-pki-est-11.5.0-2.el9_4.noarch.rpm c28c722b64a4827e17cb9ed11a8f777248c8eedcec1abf2c3bdd8d340d00009c idm-pki-java-11.5.0-2.el9_4.noarch.rpm 72790b48c935e221766118978be18a91f4e5754f107727186df52d02e28bbd65 idm-pki-kra-11.5.0-2.el9_4.noarch.rpm db035c01641c131e8622c5cc95c8944cba617fa9c12b6ec2b8e7d564c94ed457 idm-pki-server-11.5.0-2.el9_4.noarch.rpm ee7ad84da3ad56c75625210d85c47cf5087de70ee9cc7c752c97cf3f4487e407 idm-pki-tools-11.5.0-2.el9_4.x86_64.rpm ee40c35d7a59aa19b76b6b04cda4891aac6ce503d3ec879e344f651198f5e073 python3-idm-pki-11.5.0-2.el9_4.noarch.rpm 64ed511faba53264af8a77e26a70934395c6473a4393ce3de59b5d05700d8ff1 RLSA-2024:4349 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801) * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974) * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870) * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960) * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400) Bug Fix(es): * cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943) * BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672) * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220) * [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687) * ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716) * CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641) * IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669) * [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252) * Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595) * [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083) * [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953) * bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm 371fb70f025426aafc1cdcbdfd4de445759f551953c120fb608f857409a51888 kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm 43c9137ffa262abd334951055634097fb1d5fc5f38c6195e9d2d54b8274e8252 kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm 14df6ff6b3f64e35bf5445e978336da7130bb70ddb079a340612ce2d0d06fa27 kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm 039d49474496f66713bc4b27256d55abe392be490e8b8cace882fe1fd288688b kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm 0901534d845a71bcca65242bf95fd4fb1922842dc91572ab43a0af9b458e2129 kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm 4bcfafdbc77b698a74ce5501866c6f15990821120e28a1b86a5d709eb8ab26d3 perf-5.14.0-427.24.1.el9_4.x86_64.rpm 79a14e6efe5e121e99a300e25942692a889dcfebc5e826acf529084cb275cbac rtla-5.14.0-427.24.1.el9_4.x86_64.rpm 37777de8f9781b21ca8be83c1f8c7828d7b481ae7bcddb5a563070316289f1ac rv-5.14.0-427.24.1.el9_4.x86_64.rpm 2dfd6fd87b35efde85d95af3fa33c7483f6fcdb687e709b2c9503ead3b698723 RLSA-2024:4457 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Possible remote code execution due to a race condition in signal handling affecting Rocky Linux 9 (CVE-2024-6409) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm 4abc7dc9030eff016aa999d3c4271c137ad35378b23e5ba452007452affadda8 pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm 42750c8004aa10883d9be4606ee2858acfc7f96c0d7d1c911f8f435910eccace RLSA-2024:4450 Important: dotnet8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7. Security Fix(es): * dotnet: DoS in System.Text.Json (CVE-2024-30105) * dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264) * dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm aa3629a9ebf6d634e51dc553d8e79526981817373bb4bd54c6888f091f6c3d2d aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm ffb8f23092899fa008130d9886735847ae2ccd835e6d58fb8b431752877e1cdc aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm ee311689c18434646abba609cda255942f68b0ad9617bae374331ae3559ea5a7 dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpm 0537034f87a8615b3b2e088deefdf7eda27e61795f237b496116c82488913212 dotnet-host-8.0.7-1.el9_4.x86_64.rpm b5bedc3cd8e75e4f336b76e70e5c1d593cc1c115cf807fa9b7a6aa10d819f917 dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm 3e0af25f9f66dc7e3f0f5c129777f9000d552852bf4d91480c2aad3cc401d298 dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm 04f97ae2baf9a55830cb6c4db8ec20d1004ebc9cdd91619f1d883313ec21a34e dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm 0ef25e1a53403455a05ecd32e8fd5fad00e134b1738a98305b3b8e7278c514db dotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm 3a20b5d30605d206553b0cc700a8efda088a028f8b79f2b380fbe0ac930c4d54 dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm 93196ff56cd8be2c1d816930f8186c80306626a9a45d8e9959b5e9ad4bb34bf2 dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm 1659a67f21b644f634fa49ed3b7075608a1fb7244a559dcffabe0220fd8cfc61 dotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm 4229ed3b67194e42a0915d6136e24a916ce1ba0ea860b5379cb3287e746c80b4 netstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpm 45fe01f765360ec697a0bdf676d29adb3abfa611cad5dccb66305e8527234241 RLSA-2024:4212 Moderate: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789) * golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.11-1.el9_4.x86_64.rpm fdedf1db97f6b6b756f2fb959a3f2e279548adfbf843f429bba9ae93e0459f12 golang-bin-1.21.11-1.el9_4.x86_64.rpm d03519aa9ab640fad8de224114c31d7543f18d603a5334a311570b1e2cbfdcd1 golang-docs-1.21.11-1.el9_4.noarch.rpm d60529cf51d0b918c63e86e794f92736cb8344e25e37bad6aaf998e39baf8906 golang-misc-1.21.11-1.el9_4.noarch.rpm 8eb46487eaaea0d9fa339fb74bb2a3bede2a2db9eee60ea541981bd40787d10a golang-src-1.21.11-1.el9_4.noarch.rpm 623fbee54cb598e52c68a3b24cf59c9cd01e66466f43e0be238e020163ff1c4b golang-tests-1.21.11-1.el9_4.noarch.rpm f019ebf7d32fc5f45a368baf4babf5ee1b97c51d61a0f95cc19137e6cd802e0c go-toolset-1.21.11-1.el9_4.x86_64.rpm 240aba7e8ee460662b62a1ba327cd143f4941d4a835f34cb23fcc7209a58e880 RLSA-2024:4500 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604) * Mozilla: Race condition in permission assignment (CVE-2024-6601) * Mozilla: Memory corruption in thread creation (CVE-2024-6603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-115.13.0-3.el9_4.x86_64.rpm 9be0fbc6ebdab53fdd0e982e8e815c5483092e6277fdfdfeebc863e220d8f203 firefox-x11-115.13.0-3.el9_4.x86_64.rpm 8a8b891796f17aa589eb8fd814d5923b224631243b5954d7be2b841e8058ae1b RLSA-2024:4573 Important: java-21-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147) * OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131) * OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138) * OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140) * OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.4.0.7-1.el8.x86_64.rpm cc8fa7f4dadf144893a0340ea6a47c6f7ce5d3ae2cbb99593b9918f53c091ad7 java-21-openjdk-21.0.4.0.7-1.el9.x86_64.rpm 66b9432d2f9a2f6c473bed587f3add78449d89d044c6ba37a86992ca62e3b3fe java-21-openjdk-demo-21.0.4.0.7-1.el8.x86_64.rpm f9b0a73209f0f73f11e96eeed0d75c8fe8dc7db869db11458c1f8f9a4973856f java-21-openjdk-demo-21.0.4.0.7-1.el9.x86_64.rpm 9c5669552d39622e348e6e4b03445c82d5e5d813493b021eec9adc50611705bb java-21-openjdk-devel-21.0.4.0.7-1.el8.x86_64.rpm 09dd3fec685c0b308a1eaceaa092fd97a756bb11c26070f18bc12322a9fc72b2 java-21-openjdk-devel-21.0.4.0.7-1.el9.x86_64.rpm 936a0743832a80804bd199f72eef9280bf75894c3c5e20fe798457e04e6ac63b java-21-openjdk-headless-21.0.4.0.7-1.el8.x86_64.rpm 68403f0fee82de02d3ff850b23bc8089b558012d9f6d8c1ced0cefdddbbab0c1 java-21-openjdk-headless-21.0.4.0.7-1.el9.x86_64.rpm c3ee0ae4cbfd152f9a96b1976e8d0dd67212ed16df00220c6577b60ea3754be7 java-21-openjdk-javadoc-21.0.4.0.7-1.el8.x86_64.rpm 0bce9bf101d2b681418ecb905cf6db98a3fb1dbd85edc124cbc7115f82b14bf7 java-21-openjdk-javadoc-21.0.4.0.7-1.el9.x86_64.rpm 741cbd552664ddc1de8c525564e4050b8a770b679d4a0498417867ab4e0441c7 java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el8.x86_64.rpm 0b4773b2a33ca4d7b62ffecd9f25a52dab82bf272b0bb94d5475c8c6fcde606e java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.x86_64.rpm bfc36ea48faa44e1cd1597b8954b4e326f8b2ec105188f1768579c8edfa7a518 java-21-openjdk-jmods-21.0.4.0.7-1.el8.x86_64.rpm 93f2ca0b5986e1477ad4812adba2d35e91bb0bac1aab534a3d50e1806d724f36 java-21-openjdk-jmods-21.0.4.0.7-1.el9.x86_64.rpm 5baf283f9688cac7c0d2aab0cbc60061b80e078a648320b684bf1a3c03b3386e java-21-openjdk-src-21.0.4.0.7-1.el8.x86_64.rpm 7bc97da06874fd497a12f9dce18bc04cd3d56d51d2fb1e91092a0d5446dacc8a java-21-openjdk-src-21.0.4.0.7-1.el9.x86_64.rpm e30cb1f543112e5a4bd93e9a637c860c259999cfcba4f38df79d623f32ff2d91 java-21-openjdk-static-libs-21.0.4.0.7-1.el8.x86_64.rpm 52ec1c422f541c0612919bd52dd844c522733d70c3fead2e9dec52b2c6f53c71 java-21-openjdk-static-libs-21.0.4.0.7-1.el9.x86_64.rpm fe0f8ecc177a3c7eccbff2ef19cb2d13886b4813c9ab5a6e1ee6ba6c33f9a610 RLSA-2024:4583 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548) * kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638) * kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783) * kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397) * kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435) * kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958) * kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904) * kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593) * kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270) * kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957) * kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm de5a1772b9ccc009eb0cac3c3c20015aa4753f56f6ca4f1ecb715c1c0a5de208 kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm d4896fc694e10f400c4ec5aff559d0d468c8c485d3bc310db71e064625ac1b06 kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm 8132bb198e04dada22e1064302eb234e46515136bae8e1141a3c7a4c820b24bc kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm 9d6fedbb917798fe0881920b980d560177812f1df58e07d7565fc388bd1db530 kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm 929085c2d0686fa032d24108a5e4f8327d5b47bc83412c316c72f6dd7ae3507d kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm 3002310b8b878377f46fa03e9f25a72d76614ec5f3e5107d75ee501fb39f5918 perf-5.14.0-427.26.1.el9_4.x86_64.rpm d0d4d76cde216772bf2df9cb57b965b7060b8b503f9c71099f35c127451635e2 rtla-5.14.0-427.26.1.el9_4.x86_64.rpm 010a552c598b2111c2de1a804bba57d0c09f3a6058b405f90dccbc425dd85577 rv-5.14.0-427.26.1.el9_4.x86_64.rpm f1fc9d602df4cc438d200c5a589116323aab342c62bde4916d96a00d79fc6db7 RLSA-2024:4623 Important: qt5-qtbase security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Security Fix(es): * qtbase: qtbase: Delay any communication until encrypted() can be responded to (CVE-2024-39936) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtbase-5.15.9-10.el9_4.i686.rpm 0ac2eabf4591e701f2a5386aa812b3660ae69dcb3b0900c6e01aba0ac6a74e98 qt5-qtbase-5.15.9-10.el9_4.x86_64.rpm 417f1b8d14840782eea6d725164b250561667ed09c17187f9a6681645dd069d0 qt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm 0a00886aeb716a385de60c07c2d9f36e475bff80dc231a8fb6d572c4b551448b qt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm 268b97189db4faf7e9c97191ce796f8679da2583cb4d2056e78dceea4a92372b qt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm 268a9b3d3429abc2da9361ce036a50d54f635cc7be12bc92d40088a547233480 qt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm 5e37ae61a04e5fdabe3640b6644925273bbe5a756fb8541813790797dfc27f81 qt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm 665356136afca4d5cf28ef71ca6c6594fd6c658d5226424939ff3d85874f0a57 qt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm f5110b017cfa360ac3e3051cf64e1213de4f6d80958be403211731a71a137827 qt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm 4b2e4d7cafa6cc9762b6c890c774ca8fa1474fdffcb3513a316278e8cc29aaac qt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm 5e8a9d6a677033b0d4b0f5bf85f11d54af70a68d3b02ae04c98cc28fc3b6c393 qt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm cd76e2cd4dee064a5aa2d06d2073acad270ed958f5ff18f2168093d04e0724bd qt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm 1570e6e4baf8836e8f3ee2658e8d1079101382cffd9c30c4cbf26ba96e1c14dc qt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm fd900c26bc4bc21df0f7c085a8b6735819b121d39946750f2adb0d7af47ec494 qt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm 26fe4b5289d50332f582fa01cff77062acfb547f1e99c3032a85e93bd314a42f qt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm 0ad991f8fd5fe689d6aa197ec704f90554206bb99fe49598baad5f1a77a1f938 qt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm 325801f1ef38ed45f2c4392e1c40e232001773d4c6f80a06032300075e459a4e qt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm d5d3f874d10126ea677fa42f700443befff1ad68ed2f4fef48b87f84e3d3b357 RLSA-2024:4502 Important: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.14.3-3.el9_4.x86_64.rpm a6e2773b70fe97d9c5ff09b424d07d9c4ed1f5bfc08ec3cbc6bc4eec7c844315 skopeo-tests-1.14.3-3.el9_4.x86_64.rpm e6c7f40a44094466dbf007daed71aa757fdb8c4c0bb4227b16fee4bbeebf7c25 RLSA-2024:4624 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * Mozilla: Race condition in permission assignment (CVE-2024-6601) * Mozilla: Memory corruption in thread creation (CVE-2024-6603) * Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.13.0-3.el9_4.x86_64.rpm e7b227b02c43ac24f270b229e8ef4a1f81f698d37b21dc459989c1abc1c74827 RLSA-2024:4726 Important: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475) * httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474) * httpd: null pointer dereference in mod_proxy (CVE-2024-38477) * httpd: Potential SSRF in mod_rewrite (CVE-2024-39573) * httpd: Encoding problem in mod_proxy (CVE-2024-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.57-11.el9_4.x86_64.rpm ee724ab3fad6fb81cc1f645732dcc1e89b4e96ed927e86ad6cda125f57cbdab3 httpd-core-2.4.57-11.el9_4.x86_64.rpm bf2890e7bf8258e0377940241abd78c9f2bca45ef6a88976e4f73fc13e740593 httpd-devel-2.4.57-11.el9_4.x86_64.rpm 5806e6d3cfe80bec36ca6fb19f0a5c1fb9eb9d47f111a23904c6085f8f29bdd1 httpd-filesystem-2.4.57-11.el9_4.noarch.rpm 6ee4fd465f8a04ff1f6b25dde11311958b7e888572b8cc5c0cb0be722e3b538e httpd-manual-2.4.57-11.el9_4.noarch.rpm 21c834b5a13e6545517db4c24c5ca7a8abdb869a0ac7e4193e26603d16be1bc0 httpd-tools-2.4.57-11.el9_4.x86_64.rpm b5a77a636d359989d6c5d887fa2db62965e4d911abc9bb071187da1ea13fda6d mod_ldap-2.4.57-11.el9_4.x86_64.rpm f9533f85660c52750d0880f2f72a547df4d22f4fc1d0f3823a8864b6dd7b8b44 mod_lua-2.4.57-11.el9_4.x86_64.rpm 027f30aa3f4159e357cf5518c715c2f8fb0cfff25d7e078a68c877bea55ed1e9 mod_proxy_html-2.4.57-11.el9_4.x86_64.rpm a790a42c69be63cd768a2e7cb1111d3c3dc0f094f17a6c4f3cc5cd800c0f3888 mod_session-2.4.57-11.el9_4.x86_64.rpm 42c25e43fdcc3f1a6d964999497a7054f9d4adbdc339ee82885604359e83e9cb mod_ssl-2.4.57-11.el9_4.x86_64.rpm e51f98dccd9c53f572fa80f87d05a6ea1429ec0a64bcb76a83bc833edc334e2b RLSA-2024:4861 Moderate: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: vulnerable to a Denial of Service attack against Cache Manager error responses (CVE-2024-23638) * squid: Out-of-bounds write error may lead to Denial of Service (CVE-2024-37894) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-13.el9_4.x86_64.rpm 6ba51b15b2a79583aa793268b25ec5b852e0f62075d26dd5a09368b25ec92205 RLSA-2024:4928 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773) * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737) * kernel: dm: call the resume method on internal suspend (CVE-2024-26880) * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046) * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030) * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857) * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907) * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885) * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809) * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459) * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924) * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952) * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743) * kernel: epoll: be better about file lifetimes (CVE-2024-38580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm 7501833feba2e6bca698513d2141caa27abf0f20b5e0403accfb5d967a59b496 kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm 0e14d9ed5bcfb245ba21420872a9edcd7423fff0ae6a907971d53d02dd7621b4 kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm bfe2b48453bb0f715baa5ef00d0b2f23a01c50c9ea4bbaba84e8668cd14e8509 kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm 463908053f203a6261ecd337d17c484b9d3b55e0ee1ae3a07cbf85463dcf3a3a kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm 30d0217a47f24b057c73f8651c708e256671a9dd6d49f71a6023b4993474c1b8 kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm 0d85aa3f0ed601e9eddee93c5d4dfb1929279751986864e6e814a44ecb9c2ccf perf-5.14.0-427.28.1.el9_4.x86_64.rpm 427fba9902f6eb9961417cc81a558a5de0b9316773ebde3c9ccece7ba7f26272 rtla-5.14.0-427.28.1.el9_4.x86_64.rpm 55224ea72e474f20b86397c0a874df34ee43e896b16d8c222c3594402ef5ef24 rv-5.14.0-427.28.1.el9_4.x86_64.rpm dc1af64972f20582ee7f25f2b8d498022b0b1a7cae3d3eea6a1d4b7532e2e12d RLSA-2024:4935 Important: freeradius security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freeradius-3.0.21-40.el9_4.x86_64.rpm f5a35bd6b4d283fbf8862f9297fb7faccf775d56b2a4acc3489f37addff35dbb freeradius-devel-3.0.21-40.el9_4.x86_64.rpm 94ca0bdd38e8d854e3fc316e7a8182da5dd64090f582bad233e65d3e99e71d5a freeradius-doc-3.0.21-40.el9_4.x86_64.rpm ac79df76665e46bc722135c901f71fd7be932cb97cf7caa033d5e977a414c2b8 freeradius-krb5-3.0.21-40.el9_4.x86_64.rpm 3f3c7d7e61497d7a11a110389175b91905e4c2ef1b5e3dc03bef3c2343cfd0aa freeradius-ldap-3.0.21-40.el9_4.x86_64.rpm 745fd6260692b4a089efab61d4f593dff93c7e93ab7cd73bac89d4e2047ec191 freeradius-utils-3.0.21-40.el9_4.x86_64.rpm 3dbd993003ccc4b80d1a2dbbecbe74b63f27f1415d6f50ee114dddfb25c0d0f1 python3-freeradius-3.0.21-40.el9_4.x86_64.rpm 448a7bcf3a342aefa48b48a10995db03d38fc331862b9ea88b64890bb5b334e9 RLSA-2024:5363 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058) Please update the description manually. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm 2362c0e985fc0974c3ca33399a42076d70f6837f6dd4925d56f0d3e01d67b1d6 kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm af3a29fb91446ccd8dadc5f411ce8f11c59a121c7261c14e8ee62cb4bb02fb5a kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm 2f7782b3ff9d49d799111e9181bf8797d35b977a6714f9bc5a4bb98dbbdad707 kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm 2d4349833e75cf661ac3fbcdaf77549fa7ce179a8a29c46be95ea4f382453548 kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm 2051df1527b042b66548e19007a94e6db537e3f7dbd4af41238f65e4e2ac5a92 kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm 274dff5b9c627945586c3187f3e425ffe95137753bc8d3e0ed9ac65fd851a606 perf-5.14.0-427.31.1.el9_4.x86_64.rpm 5195f51a1a3976de01a82fd22a846ca82ec2704a807d754bd1f5f282d59e6130 rtla-5.14.0-427.31.1.el9_4.x86_64.rpm adde14f31219d606b35c685b316d84fb045363c81c6652524b6e5e552aea7ee0 rv-5.14.0-427.31.1.el9_4.x86_64.rpm 580a87ef2f15fb5494bf8fd2afb16d2c85649a7b6f3d04eb30d2ae4939b0b748 RLSA-2024:5192 Moderate: 389-ds-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: Malformed userPassword hash may cause Denial of Service (CVE-2024-5953) * 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request (CVE-2024-6237) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.4.5-9.el9_4.x86_64.rpm bce9ff04c0d3135dec9157ed64caac4076feeddebce7e334353d65e18462e1f5 389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm 1125c4507b053175a378cad9d75c6e19dc9ecb4e65e63f508a31a6559c9bdde7 python3-lib389-2.4.5-9.el9_4.noarch.rpm a3f42f9edcf53706f06e92172efa0483385d7bd6e0710d82da84231f6945f963 RLSA-2024:5231 Important: bind and bind-dyndb-ldap security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind-dyndb-ldap, bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737) * bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975) * bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-18.el9_4.6.x86_64.rpm 40dc2f7dd9a6820ae46c80c2dd30151a4378c327ffa70c076b3d88744825adf0 bind-chroot-9.16.23-18.el9_4.6.x86_64.rpm ce6b07e1042cfa92866ed514bfa884a80dccb911884785d2de12e4b3cab36888 bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm 16c7b39d7ecb5ba88a994ed9680042995db178b1ba6126b222cd976d12e79f9f bind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm b0e6550b4394eff5b64102b652ec8fd7e09e94d8897c0d98416ba137f7ca0138 bind-dyndb-ldap-11.9-10.el9_4.x86_64.rpm 73905fe6df833f30c3a28df5ef303130574c9f0a62d171ef7f0c2676e7707d0a bind-libs-9.16.23-18.el9_4.6.x86_64.rpm 265de3564184c21bb273ba841f6a1bdee830439225087aa033529b536f29020f bind-license-9.16.23-18.el9_4.6.noarch.rpm d7d1e7b91c5e721bfd9e93071a85cde039007382f1fbcb84160f37fdbea192db bind-utils-9.16.23-18.el9_4.6.x86_64.rpm d7def451e48f6f40e7722a5a63812c3c8499ebe71ebc79d2cd2bf594cc95c05d python3-bind-9.16.23-18.el9_4.6.noarch.rpm 144c2218b46f1bccbb2cd6686aa032ffd373527fd56193d70fe9cc143ce1a2a4 RLBA-2024:5463 virt-v2v bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible. Bug fixes: * qemu-guest-agent not being installed at first boot in Windows Server 2022 (Rocky Linux-54150) * Uninstalling vmware-tools from windows guest sometimes fails with exit code 1618 or exit code 1603 (Rocky Linux-54151) * Allow --mac gw and len fields to be optional (Rocky Linux-54152) rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.4.0-3.el9_4.x86_64.rpm 2b36c2ac4d84e2e180b2d9344ac16a169fa9e9eb464c42a1aeb031858d15940b virt-v2v-bash-completion-2.4.0-3.el9_4.noarch.rpm c7d02ea81b02613ae254616a3af388d61be7c048933a58ce6f754571d0f95280 RLSA-2024:5533 Important: python3.12-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm 377365ee95abd045fb9c876c5d355938a809c5c22c846dfcae648d74a6715d37 RLSA-2024:5138 Important: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Security issues via?backend applications whose response headers are malicious or exploitable (CVE-2024-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.57-11.el9_4.1.x86_64.rpm e2fc806a5f99cff9ab328d83871a326cceecd5dd08042124c1bce6f08c1646e6 httpd-core-2.4.57-11.el9_4.1.x86_64.rpm 2c16142ab81ce85193dcedb81a0620badb0c499c1cd5b1737f84b9272b3e5601 httpd-devel-2.4.57-11.el9_4.1.x86_64.rpm c478e339f43ff26f9d6db0368f48b08fcd5cb248d2cb3d20fda3e00740c1004b httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm 424e10e81c95deb9f77499ef52aa78ab677d8f99c0f2a2f37bd4b3ba76f5c69e httpd-manual-2.4.57-11.el9_4.1.noarch.rpm aeef24b41d955cb4b8dcd5fb9d95e5954e6b906018c28886e6d79538595d1fff httpd-tools-2.4.57-11.el9_4.1.x86_64.rpm 932cb0d7629c69cdfd4967e4fb9e54fe5525fd374875ba2ee1e120495b675ebc mod_ldap-2.4.57-11.el9_4.1.x86_64.rpm f15e65ee8661840f8830649cfeef84fdd34ebc15a0a4782a62f3b33be5811001 mod_lua-2.4.57-11.el9_4.1.x86_64.rpm dbb968ce25509f2eb0dfda6aaa81a174a32aacd2b69290bb86d193edbf1c346f mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm d0c70d2e9b3504db5fe117639415d48d3a7c837d8e6fc91fcfc00fe9d0f80b9a mod_session-2.4.57-11.el9_4.1.x86_64.rpm 8d1fb47f10c6a4c77c988639d6d01f6ebd370988be4e011d236592013f710338 mod_ssl-2.4.57-11.el9_4.1.x86_64.rpm 6e045d16afe5d6758b25ed33f5fb95b027b07eb8babeceb2515cd1ab122e17fd RLSA-2024:5279 Important: python3.11-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm 82188a2a6550cbf1e870cddc088f7c42bbb12f58281ff307ffee805fb4b57766 python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm 75a83fc726278275e32d8eedea32f8809431b4babd374b8acb1f183976f2ecee RLBA-2024:5811 scap-security-guide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [Rocky Linux8.7/SCAP/Rsyslog] Rainier syntax not valid for cron and netstreamdriver parameters (JIRA:Rocky Linux-1816) * CIS Server Level 1 installation can be started with "Server with GUI" (JIRA:Rocky Linux-23852) * Journald is not configured correctly after openscap remediation profile CIS Server Level 1 is applied (JIRA:Rocky Linux-38531) * Authselect rules hardening wipes already active features (JIRA:Rocky Linux-39383) * ANSSI-BP-028 (intermediary) breaks password changes (JIRA:Rocky Linux-44983) * CIS Rocky Linux 9 Benchmark for Level 2 scan fails on "Ensure all users last password change date is in the past" rule (JIRA:Rocky Linux-47129) * Rebase scap-security-guide to the 0.1.74 version (JIRA:Rocky Linux-53865) * Rebase scap-security-guide to the 0.1.74 version [rhel-8.10.z] (JIRA:Rocky Linux-53913) * ANSSI-BP-028 (intermediary) breaks password changes [rhel-8.10.z] (JIRA:Rocky Linux-54390) rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.74-1.el9_4.rocky.1.1.noarch.rpm f34b33940a6d5a41c8264dedd6af9f212713a982f811aacaa9f38b3a721c99d7 scap-security-guide-0.1.74-3.el8_10.rocky.1.1.noarch.rpm c42412d3eeb4d53594df49acfb94c7a2045855be3e4c798298e2db648c40ae6b scap-security-guide-doc-0.1.74-1.el9_4.rocky.1.1.noarch.rpm a0a33fcb089c7dee91759382d6f75952b021b9b732a5f1af88c1b543cab8b747 scap-security-guide-doc-0.1.74-3.el8_10.rocky.1.1.noarch.rpm 7701a99ae47fafcaef2bde75ba7a1ddbb505f91297fa7f276effb94c296bcc21 RLSA-2024:6567 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629) * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630) * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720) * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886) * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946) * kernel: KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region() (CVE-2024-35791) * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797) * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875) * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000) * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801) * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883) * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019) * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619) * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979) * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559) * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927) * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936) * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040) * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044) * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055) * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096) * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082) * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096) * kernel: Revert &#34;mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again&#34; (CVE-2024-42102) * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131) * kernel: nvme: avoid double free special payload (CVE-2024-41073) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm 2708f1af281f5179ec45a989769de8bdc33c35b548d65a98bf5a647561350e3b kernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm b0271e0bd1d54297942e7b79367af6816814505894e7927d377b4fa0d446edbc kernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm 24d02923fec85b0a96f4ee0882075707e2d55134507b6d8982e8fcea2c9be1f8 kernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm cdaec8f1b606cfd5df4539339687464c3f457419a3b10d1c6820094d2361070a kernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm c4095a1ac3f67b5c3ee8f64512726c55c21c7b17de10c5101894876f5f1ca2a3 kernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpm fcb8b1335323494f0c6a4ef2b3088536ad94c7fbec405064b9831adcdc468894 perf-5.14.0-427.35.1.el9_4.x86_64.rpm 37d304c0cc6e93772d744970477b878d8ecec22db0f268b5ad93f8a073e04813 rtla-5.14.0-427.35.1.el9_4.x86_64.rpm 1f83539e941ca8fce9241fc5b4a753478d1fcdbe72b60c8a5caaa4da674f7532 rv-5.14.0-427.35.1.el9_4.x86_64.rpm 28fe72241d609d466a970fe26216869c4295574211481bfe19e8ab3fcb179ca8 RLSA-2024:6464 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib2: Signal subscription vulnerabilities (CVE-2024-34397) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-14.el9_4.1.i686.rpm 8a72a79ada8b4c30ef44147f64f41876ecdd1e4fee00a0cbd3f7d9e5d7c27abb glib2-devel-2.68.4-14.el9_4.1.x86_64.rpm 7ef4a75f6a1295bacda881215c3f4eeead21913140ea02819aa882745dc301f7 glib2-doc-2.68.4-14.el9_4.1.noarch.rpm d0571b256dbcadbbd6dd7cb2af8b9691897050828cb9aee276fe242e68581b3e glib2-tests-2.68.4-14.el9_4.1.x86_64.rpm d48d3f9ad7ae76aa39ea1aa620a03d9596551e5154651d4a40aa60c3c4b0803b RLSA-2024:5999 Important: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.16-1.el9_4.x86_64.rpm 3134e2e1f66599bec78f9253fb3b89548d78dbfa29349ae6cdf74035394e84ee postgresql-contrib-13.16-1.el9_4.x86_64.rpm 4e203afc1a165afdb33b1eae11691d4f4b9b485184ae421b319c6e480917f8c1 postgresql-plperl-13.16-1.el9_4.x86_64.rpm 2e8ca1c831a8090e2793687ec95e78fab91ebb818dbba47064bf2ce60da44840 postgresql-plpython3-13.16-1.el9_4.x86_64.rpm 9af349f8a12763c6440b4e8709c690d53c5762fe142b905f7d963a79f8ddb8ae postgresql-pltcl-13.16-1.el9_4.x86_64.rpm bdc31de3e0a3a9dfc4f6237627b5523c2feb9ab733891122ac5a58dfaa93e771 postgresql-private-libs-13.16-1.el9_4.x86_64.rpm 2edd85939b4eb7e948b9a0ced4a3cb78c0412ab238961c426020f36e40793f68 postgresql-server-13.16-1.el9_4.x86_64.rpm d23761e5c7d995ab0c8bf9376ee8858d005e2e5dcc8f3d383d9b7505fce523cf postgresql-upgrade-13.16-1.el9_4.x86_64.rpm cd0c20e58bd73356d9552544365ea84ef238c0357df8ceb03f25ef43446a2730 RLBA-2024:6143 virt-v2v bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * [RFE] Bundle and support virt-v2v-in-place for MTV warm migrations scenarios [rhel-9.4.z] (JIRA:Rocky Linux-55823) * Re-enable Windows disks post-live migration [rhel-9.4.z] (JIRA:Rocky Linux-55837) rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.4.0-4.el9_4.x86_64.rpm 4a545de48c795bf2cc8c674dfaf8d60d466c2b746ba92e07d4805088edce18de virt-v2v-bash-completion-2.4.0-4.el9_4.noarch.rpm afbab338005883a80746c3f0ce3b42e02ce58f1a33559a90b661e3a611137b94 RLSA-2024:6146 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.1-4.el9_4.3.x86_64.rpm 9b1bf1bbfbc00d253a2a2f0867f77d66ea1f956d4bba4aa468c1912b2d94b957 python3.12-devel-3.12.1-4.el9_4.3.i686.rpm 78c890086949848e1ce4acfcd417822d90b3fcc4a48deaaded9d5e0180e947b4 python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm 451720fc2129c1a353676958acbc3317545753837dcce250f1950e03ea78ae62 python3.12-libs-3.12.1-4.el9_4.3.i686.rpm cc1e5ec4ee57ec4a6bcb79e653561d2ea11858d946cd6fac42ded2ad6fb849be python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm 60317b70b17a41d31ace3582458e3147c5ccae23143060ff3d6b36d2ab57b63f python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm 521bf8f238f75fb0cbad0f70ff2760b63e55ac65f3a6c5e6e26f154f09bc6798 RLBA-2024:6287 libguestfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libguestfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libguestfs packages contain a library used for accessing and modifying virtual machine disk images. Bug Fix(es) and Enhancement(s): * sgdisk fails with "Invalid partition data!" for win2019, win2022, win2025 guests with three additional online disks [rhel-9.4.z] (JIRA:Rocky Linux-56697) rocky-linux-9-x86-64-appstream-rpms libguestfs-1.50.1-8.el9_4.x86_64.rpm 74a042a83610f58bb2b3c966aeb8d11ccb61fe5064d6c00f73c22effebfbeb8b libguestfs-appliance-1.50.1-8.el9_4.x86_64.rpm f127b2812bbb77218e3d6186c15af49c68b9252c547af9a85c6971d86e6ae42c libguestfs-bash-completion-1.50.1-8.el9_4.noarch.rpm f808fa5130ab9d2b5f71388bf4ef4852ae8f2a5c5a8bd8fbcacfcbc5317241c9 libguestfs-inspect-icons-1.50.1-8.el9_4.noarch.rpm fa3557be8af2ac8b12b518db5fc9039fa29daf8f656aa934fe5612f10a24902d libguestfs-rescue-1.50.1-8.el9_4.x86_64.rpm 751a9426e4b5d91ae19659c2e106639b0b52a7f796b7d2d575043c437487e7ba libguestfs-rsync-1.50.1-8.el9_4.x86_64.rpm ff6ba0a98b6cc3a808d566d0bf9f9dea0c8dbde70773c426bae7895e040265ee libguestfs-xfs-1.50.1-8.el9_4.x86_64.rpm 7a34ad8fab91174715265c7fc3263b0bd8da1a891c3adf4308476700f6ef2e64 perl-Sys-Guestfs-1.50.1-8.el9_4.x86_64.rpm 6a938bb942415112cf1a2701da4e57af1681c354df9cad91e25b3246f0c91072 python3-libguestfs-1.50.1-8.el9_4.x86_64.rpm 7b83765493b55b0ef0fe84a2c41ce10804b7042401bcfe3a6103548bd6efaded RLBA-2024:6416 augeas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Augeas is a configuration editing tool. It parses configuration files in their native formats and transforms them into a tree. Configuration changes are made by manipulating this tree and saving it back into native config files. Bug Fix(es) and Enhancement(s): * libguestfs pops up error when ?there is a trailing comma after character like nosuid in guest /etc/fstab [rhel-9.4.z] (JIRA:Rocky Linux-56992) rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-6.el9_4.x86_64.rpm ba47d317f491e35066efe9f0d595f5d7c74570baadced9ec3f07ae4fe8180af6 augeas-libs-1.13.0-6.el9_4.i686.rpm 38eb60c7d70e6f35e1a7c62da881b0baf1a7a1316b24dfe08d5dc1ebf11bcf59 augeas-libs-1.13.0-6.el9_4.x86_64.rpm 2ac9a5e626ea70d1890d5ecc64937eeb9fa9c701b38722476f0e5419d3967fe9 RLSA-2024:6529 Moderate: dovecot security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184) * dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-11.el9_4.1.x86_64.rpm e2296f5adc2a56c9cc094aed17981b010ae294bc7739d64b227c4de13d85ecb2 dovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm 5d7749a0c30972971e68510b8c7b6b5526851da4ea63e1229f15bb81b33b005e dovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm 58a3790e60ac7814543450287d37e0a04cfc6e38a0c398d5fbba59cf731fadc5 dovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm c3c683af6946abcaffd4816513df5c2661d65461f1ee574f4c3c3190a8a61471 RLBA-2024:6669 libvirt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * Opening a vpx:// URL fails if the backing VMX file has a "*" character in any key [rhel-9.4.z] (JIRA:Rocky Linux-58676) rocky-linux-9-x86-64-appstream-rpms libvirt-10.0.0-6.7.el9_4.x86_64.rpm 7cb4ebd8b1c7dcd4bd307e3e6dc1b9512876423a1517ea9eba7d909059ec443b libvirt-client-10.0.0-6.7.el9_4.x86_64.rpm bd234ff2c4b9ab12d30439a4946c99933b655b43aa45d35a9e473719bf9a744f libvirt-client-qemu-10.0.0-6.7.el9_4.x86_64.rpm 0a7f5487bb13e13e9a0f0a3be4246e0b91ef78ef7e4c9af469401b5f4ab7bc95 libvirt-daemon-10.0.0-6.7.el9_4.x86_64.rpm b8ec58633eacf662b3ca629b7401c79e9b71cfa20380f89d36f6a164e36c8082 libvirt-daemon-common-10.0.0-6.7.el9_4.x86_64.rpm 552d8ab60605861dc53ae0a640af5376d7517c9be281ee32009280e49db0dbc8 libvirt-daemon-config-network-10.0.0-6.7.el9_4.x86_64.rpm c4db64802f93b48a9a271beb2f387eb377adfc4ece86be633e3e4a5e38edb7bf libvirt-daemon-config-nwfilter-10.0.0-6.7.el9_4.x86_64.rpm 00f59979dc52de395e3ff8fa58a303dcbfedbf7276862911af24fd48d87c1f44 libvirt-daemon-driver-interface-10.0.0-6.7.el9_4.x86_64.rpm 29512716d6fe50d3ee46f32eaff497986639d46cefc8f82bda82a46f4bcbe5cb libvirt-daemon-driver-network-10.0.0-6.7.el9_4.x86_64.rpm d3a2c4b8ed2510e4713e1e727094b9d766cf5eed5cdfa4b8e4eebad8db90107c libvirt-daemon-driver-nodedev-10.0.0-6.7.el9_4.x86_64.rpm 5b8ddb5bfd0fe5a6eebead1fa075e6e81a5e0d4bd7f61104b21b5efe8f58efba libvirt-daemon-driver-nwfilter-10.0.0-6.7.el9_4.x86_64.rpm 7a4369ec37f99094efb854a1d07156b0b9f3a5b7301f30bbf9186c0ca9f0c166 libvirt-daemon-driver-qemu-10.0.0-6.7.el9_4.x86_64.rpm 270bd729f6a9caf047b05d20fa8ef405af91c98aa8a4649bf75dd46b75b76d6f libvirt-daemon-driver-secret-10.0.0-6.7.el9_4.x86_64.rpm 52851bc81e41ccbe4514d19aaa701e54bdad1044a1a8f029d21020f54fd19112 libvirt-daemon-driver-storage-10.0.0-6.7.el9_4.x86_64.rpm f0d602e6e2df3ee47b3366af524bde998b0b0706e953bb8215fa3e74010502db libvirt-daemon-driver-storage-core-10.0.0-6.7.el9_4.x86_64.rpm 6d65a0ffc8735ac493a0940a0f59dac83b68fbd67bb7055d090838dd3e6d5a07 libvirt-daemon-driver-storage-disk-10.0.0-6.7.el9_4.x86_64.rpm fd3190ac41aa56c387515b8f209e09e9f2c40762341447bab318e69f3d05e7a6 libvirt-daemon-driver-storage-iscsi-10.0.0-6.7.el9_4.x86_64.rpm 9a133db155bb05ce3bdf73ee1585a98d350253675702132c9d92455833f9f890 libvirt-daemon-driver-storage-logical-10.0.0-6.7.el9_4.x86_64.rpm 3b05fa93b1494c3b5f54889c6d0b98105baba6542c1c0e61db09ee5da2b14edf libvirt-daemon-driver-storage-mpath-10.0.0-6.7.el9_4.x86_64.rpm 6d67a693e72cae9ec81925399e524b36692cb343fbb9472d65d81aea62d77e04 libvirt-daemon-driver-storage-rbd-10.0.0-6.7.el9_4.x86_64.rpm d846f0815621d8fce2d762221232455596b068ffbbc3b824b869f11b6b42356a libvirt-daemon-driver-storage-scsi-10.0.0-6.7.el9_4.x86_64.rpm 6285bcce416632139dca76828863b7d136f9efa17f7857963b7b6fba32b5312e libvirt-daemon-kvm-10.0.0-6.7.el9_4.x86_64.rpm 5843eb92fbcc41bf8479590cef5423693f92f267745a3389a335f887ea555829 libvirt-daemon-lock-10.0.0-6.7.el9_4.x86_64.rpm c0a498b29f8aae2b1e6f0c5e5e4950babb5ac31c178f9fd1e7e4a8f8d3762834 libvirt-daemon-log-10.0.0-6.7.el9_4.x86_64.rpm 00c9ed0b5e598dd3014efbff54befbb6903106e20c78515d8158159f82bd12ca libvirt-daemon-plugin-lockd-10.0.0-6.7.el9_4.x86_64.rpm 3be61fd531157e009a229a426df344c654916be543a08e256c12ce5c0b3a4c52 libvirt-daemon-proxy-10.0.0-6.7.el9_4.x86_64.rpm b75f11d831a214ddc25619e709cab46130a81857e52ca5115914f2bc2861ec03 libvirt-libs-10.0.0-6.7.el9_4.x86_64.rpm da255b1fc06e941516bd7c5e7b45bebd767e4aec5944e2f63925c1a315fddb91 libvirt-nss-10.0.0-6.7.el9_4.x86_64.rpm a6d3fb6c765bc0732efd06f09010a4ebb2aa0768684bc8211ef2dea9e3362874 RLSA-2024:5693 Important: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-1.el9_4.2.noarch.rpm 86e2b506ce80f6694357f69a310824336abd89da58fcb884a7472ccc27c457c4 tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm 60684fa05e5906fc04006ab34a27ddf06ead3379a9c73d4bd8e73c8f11dc5996 tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm b2db5fbedcd1b74219683f09ed03c5151e30773e1f9bc9caa9604501b116bf9a tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm 9e4fd3d3907a6a56b9cdca13639fde93202592b952ae0d1d4e1a249689b75e6a tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm 043d008cad3e0f4e3ae140257bf288dd1065b01496b3b40cdf1dd6889461c341 tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm 76bb272aec2e0afe13b47eda30435595309c384ab42ee3a42b517add621f3f9a tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm 70464fd366b6ea55028cb9a5e83f4d3d8c62186495a69d6b6a4905420f867c77 tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm 4a96e549feb5b49081f0cc4e0cc5e1c7e34a13e93b5cdaa0c1cda7e4399e2527 RLSA-2025:17084 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-14.el9_6.5.x86_64.rpm 6a98943af561e09b4cf134dbd72790c82969232914ef223a9ffcd1a9c619bb78 ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm 1bf756b143b60de707e6cbface9f1e4bfe99b15ea542c99410b1c6df46fb4548 ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm 17f52e599d90267f2d1ce573bfe42c4781c0e5f58e1c57017ccb4a60597a7def ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpm f2b1f713bf100b879b55b16b74c5dbbd5c6161647d92805730c559edaed256fe ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm fd135891319dcdcac2f7aa24ffcb6a2e6abd830d39a509c6d2c840b6d9b1dd83 ipa-common-4.12.2-14.el9_6.5.noarch.rpm 434ee5837d6cca9caf40c5ea3da211a69adfe4fed53e7e1c73e22a7e84f2b690 ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm 3c3fd87519f501947d834fc327401b832ea11b7170e8d559ff379e5502f5f352 ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm 83e2bd6d4e1921e6c557c3c3f93e50755ab327baed0c99f866ab050e2807abf2 ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm de8795a950c7f2ba3230ac4fc4ec1eb68dac135e04b07e3bed51ae0bed92617d ipa-server-4.12.2-14.el9_6.5.x86_64.rpm ba14fcb2e31229fb89213698e069d82546f499d8744116dd38f9b86ea7423376 ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm c03291e596001752495c4d28f21cc4d8d8d455f3f19f833ef4f7e11b2e946eba ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm feeda759aa157bffce6bc1a6f9fbf30e674d93a2747307c400ac84b5bbcb5bef ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm 608ac8f4a783bf0ff27f4e7371bc97865b029fcb3a4a29f461e073dc1f851f1b ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm 16b0269f8719aaf852d6dec9c9178eb03ef7324923d15e09aaf3a4d12ba9b1af python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpm 67db30ce3e9d7d15f50e785c65fa28d2f5ea5d8dc791ae37f6f3f6a994f2c223 python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm d85ae60ac4f7cad1fb618f9fcfde1cf02cace7064dc8293c3d133f7295095bc8 python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm c1b1b564b74859dc8cbb8c61e765fbcb3845d4791f87c4fe02c096d7652c0f35 RLBA-2024:6469 net-snmp bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * Getting "systemstats_linux: unexpected header length in /proc/net/snmp. 237 != 224" when starting snmpd service (JIRA:Rocky Linux-40403) * [BUG]snmpd segfaults with error on subcontainer 'ifTable container' remove (-1) [rhel-9.4.z] (JIRA:Rocky Linux-46039) rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-13.el9_4.2.x86_64.rpm 8b54d7d80061818c2878d03266abedabca9fd21470de7e016595fdee8314a178 net-snmp-agent-libs-5.9.1-13.el9_4.2.i686.rpm e558417f5609e91b7f211d92910216dfb6f6145f2e05c4651c8abf2e7ce91ca7 net-snmp-agent-libs-5.9.1-13.el9_4.2.x86_64.rpm 927be1e8f5de6a41a4fddbbbdb888034795d9ac2538725b6ed8dcc593ac73948 net-snmp-devel-5.9.1-13.el9_4.2.i686.rpm 360f32cb5dd05b3c0bf442eca04cbcf74d0df06523cd1b0dfe3f95f041470bc8 net-snmp-devel-5.9.1-13.el9_4.2.x86_64.rpm ac464f0cf40688ef6655e69d0282b013faf1eacbe174dfa7257637d02a0d3267 net-snmp-libs-5.9.1-13.el9_4.2.i686.rpm da24b5413d3bb11b444483296294504900da939214880d7fffbf2a89db10ae85 net-snmp-libs-5.9.1-13.el9_4.2.x86_64.rpm ed2bcef68a27a781e845df17c7b197e34f2af16edc06cd4ce3cae0dedacf21d5 net-snmp-perl-5.9.1-13.el9_4.2.x86_64.rpm 2a818ac03894cbf20b7da781cbd21dbe11333ea16bc64d7137124d200f544b2a net-snmp-utils-5.9.1-13.el9_4.2.x86_64.rpm 4b75b03163582179f21e5536787b22f9d346d9728e098b3a30dde411747d8c6d python3-net-snmp-5.9.1-13.el9_4.2.x86_64.rpm 117c24bf0b309dc9aa4edda95e294419d6453f15c82b1f580fef86ce06d16e4f RLBA-2024:6679 nss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.101 for Firefox (JIRA:Rocky Linux-46851) * nss: Mozilla: Memory corruption in NSS (JIRA:Rocky Linux-47122) * Rebase NSS to 3.101 for Firefox [rhel-9.4.z] (JIRA:Rocky Linux-46852) * nss: Mozilla: Memory corruption in NSS [rhel-9.4.z] (JIRA:Rocky Linux-47123) * NSS: cannot decrypt PKCS#12 with MD5 HMAC, not even with allow=ALL (JIRA:Rocky Linux-49803) * drop DSA self-tests in FIPS from nss (JIRA:Rocky Linux-5212) * freebl/softoken ppcle64 needs renable INIT_SUPPORT. (JIRA:Rocky Linux-6198) * nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines [rhel-9.4.z] (JIRA:Rocky Linux-53578) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-14.el9_4.i686.rpm e6e4d8c8d1a67be5d789475269692b7c1a03fd5ee62cb5784599568550f193ac nspr-4.35.0-14.el9_4.x86_64.rpm fce32babfcf598a75e01e80786626dd4d616d16a60f0bdf360112f94ba729601 nspr-devel-4.35.0-14.el9_4.i686.rpm c748d6cfd0021349d46ac4c88a2562fcf3cfc6426d83b662a13e7fffe7dfb301 nspr-devel-4.35.0-14.el9_4.x86_64.rpm 81cf4876a4f59f09bed4ee67482ea42ce1559087311aef336a2361ef34113b60 nss-3.101.0-7.el9_4.i686.rpm 864a84dd0f376180300c93212a67fe542d291fe1c71a8dc93a1a27382ac1cf83 nss-3.101.0-7.el9_4.x86_64.rpm 0ce9c005fd04cacda4ed01cf607910265f062f75a313cc52415b926803c66dcc nss-devel-3.101.0-7.el9_4.i686.rpm 29504d3424ef0ac0d900a311211f6b23626e1ee3c59531c943ea7cdebfc75f38 nss-devel-3.101.0-7.el9_4.x86_64.rpm 552628ce550730ede80af664fd1dafbcada27666f8f3b9ad22c0a019ff1e8cab nss-softokn-3.101.0-7.el9_4.i686.rpm 4a4dab1a01243373256c923d791786ca388f2504da4a0b65c67e3e2ec3797213 nss-softokn-3.101.0-7.el9_4.x86_64.rpm a8af3e5d885decd9b8160f0bb4ba22f241b559acf95c3f939e9dd885dc696f15 nss-softokn-devel-3.101.0-7.el9_4.i686.rpm e161222b6fa92658a51c867acc8410fb294db205a7a66124e360a8404310ff75 nss-softokn-devel-3.101.0-7.el9_4.x86_64.rpm 3a9dc7e163487fd7523c81dd230b0a808cf5c404869a0e845990e1af42b4f9ed nss-softokn-freebl-3.101.0-7.el9_4.i686.rpm 2d530c667fcc09f4a6d545ec75714694b9865e8459848fb68f9292d3d718c9fe nss-softokn-freebl-3.101.0-7.el9_4.x86_64.rpm ba13cb0716b92181938144c3869f0181664e6a89e3c92d3f51fd4eaaa66a7488 nss-softokn-freebl-devel-3.101.0-7.el9_4.i686.rpm 03d28172c7c15675f705768e256902a8a123f733cffc232f55483444eef3edfd nss-softokn-freebl-devel-3.101.0-7.el9_4.x86_64.rpm 4f0ee5de3273693b017cd818ecded8b921891ce9d48acc3e90144d595936bc06 nss-sysinit-3.101.0-7.el9_4.x86_64.rpm 05650d77a5b450c320a5b8ac1e1e1150bccc82baacce35c2ec063ae81dd70539 nss-tools-3.101.0-7.el9_4.x86_64.rpm 468bbb8e3f739008ce621b64a430cd831247a80bec778c7783488daa181a4187 nss-util-3.101.0-7.el9_4.i686.rpm 57ccfe83152a5d61ca83a7683c384145b2e02cb57c2f2e14742befc539379425 nss-util-3.101.0-7.el9_4.x86_64.rpm da8f3365471c5337af04eb9de452aae274c18e74fe50361a5e2776f95fa98183 nss-util-devel-3.101.0-7.el9_4.i686.rpm 80a43d609d6d5a6fd7c9d91cd6eaed0f29bee512018ceda4ecfcc6ed43907423 nss-util-devel-3.101.0-7.el9_4.x86_64.rpm 04d375ec84aed61bd7eb0a1e2f27417b30b4c7c37f227feccd6aa6103db2c5a9 RLSA-2024:6754 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490) * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) * libexpat: integer overflow (CVE-2024-45492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-2.el9_4.1.i686.rpm 2bb54e0647b4a92a7dfc2111e19f8c3b526fdfa45412cc8ac4c617b5bf2fb2c7 expat-devel-2.5.0-2.el9_4.1.x86_64.rpm e76a937e51189b76c1dd05916febffbe396f5654ff1de6e371a8b927241ce3f8 RLSA-2024:6783 Moderate: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Possible denial of service in X.509 name checks (CVE-2024-6119) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.0.7-28.el9_4.i686.rpm 8dd5aea3afbca424ae1d3ded19d5e7809984e2874e2df6cc8e1f97d55bcc372a openssl-devel-3.0.7-28.el9_4.x86_64.rpm ce8b8dff9b8b57fe7d7a0fd13ea755d1c5a54ac596b744f02bb29eee356eb78c openssl-perl-3.0.7-28.el9_4.x86_64.rpm 1342e88e5cf3cc72514ab0ec0cf0c68c0e5789ca941b7f7e23744b48e90f29a2 RLSA-2024:6757 Moderate: libnbd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Block Device (NBD) is a protocol for accessing Block Devices (hard disks and disk-like devices) over a Network. The libnbd is a userspace client library for writing NBD clients. Security Fix(es): * libnbd: NBD server improper certificate validation (CVE-2024-7383) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.18.1-4.el9_4.i686.rpm 8c7eeeeb78ec849476fcadacaa53df1ba518ad261ddc893a4004195c344ced22 libnbd-1.18.1-4.el9_4.x86_64.rpm 17f793943719191a6026854e28dc9340a616a895345030a510aa5959b07e1669 libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm 521dbf12fbb3f20accfa8c0b724f5d4c127f91a36998501a7c9c6350ee454912 nbdfuse-1.18.1-4.el9_4.x86_64.rpm 1cd2277466e539edc10b75129e20c9eda3d0cdb9d76da269462ca13c7b49ab1b python3-libnbd-1.18.1-4.el9_4.x86_64.rpm d36175ab081eb00c9094e6f8d3b3df085f95d12859a5cfe46efd3a9b1098f7f9 RLSA-2024:7346 Important: cups-filters security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source () * cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076) * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-17.el9_4.x86_64.rpm d5dbaa7ad7969c98e7c6cb505518c8f481aff0a0c2d6a08c7eb1ae9f47a18904 cups-filters-libs-1.28.7-17.el9_4.i686.rpm ff5293b83d61306b7607876443e3a40047d505647422de599146ec3273738ab3 cups-filters-libs-1.28.7-17.el9_4.x86_64.rpm fe1ac3119116b3caab42a4e81905731421575228ed39fdbf97f843597818d158 RLSA-2024:6681 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: 115.15/128.2 ESR () * mozilla: Type confusion when looking up a property name in a &quot;with&quot; block (CVE-2024-8381) * mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382) * mozilla: Firefox did not ask before openings news: links in an external application (CVE-2024-8383) * mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384) * mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385) * mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386) * mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387) * mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.2.0-1.el9_4.0.1.x86_64.rpm aa10a07a87c2fbe578b2be7bd8a669cefbbbc1014602052d6db673827bf91e0d firefox-x11-128.2.0-1.el9_4.0.1.x86_64.rpm 7bef68692434e518a30de00fc287f9abd3bc2323e3af5d8f0ee919d4dbdc5c1d RLSA-2024:6683 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: 115.15/128.2 () * mozilla: Type confusion when looking up a property name in a &quot;with&quot; block (CVE-2024-8381) * mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382) * mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384) * mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385) * mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386) * mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387) * thunderbird: Crash when aborting verification of OTR chat (CVE-2024-8394) * mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.2.0-1.el9_4.0.1.x86_64.rpm 6385865ee8d444bd8af8e8bb118b925abe7883cbf5db18e0a157923023fbf927 RLSA-2024:6726 Important: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm b069b687314fa883defca1e082876df6cc4c4c182e26b5ddec86ffcf85812c00 fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm b7b88e7bba93aa7b63bd1e4618b4de73488157658ba057e71fc9ddb2fa40eab7 fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm bae90478d1d19967e0f9458ff6a2ef3c338e64224b302243214528867168f918 fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm a03eff80500f943dd0e26ee70761005688912b863f52fb4875ce7569ec912ba1 fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm 9ace2d8439cc3bc3b87967adfa32018337db7fd7bc3c2a9ca1a5553f1e8ebf7a fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm 0cc96fe09eedcddb9e2ac8f221d4f8b50bdc47226d8478565c27e32256f0c042 fence-virt-4.10.0-62.el9_4.5.x86_64.rpm 3069f0d0f2141a44f2bcc2c37b55aed08b12375c9a40b4ee4c289c8853231e9e fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm 5b63942be9278f3684ed57c6bfeeb93d6293f27508dbad7ea30f440ae56ec76c fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm 255e180aaefeb274f89a7ebc9a44c90485eab6e45546df3b0d80e77b22621483 fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm 1d7e8c499566e7fcee25decf9840c04312b501a10e78f65cf31bf0271cf6afd9 fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm b3e7a621325b9f3a9d16252cb4c0963743fecff7d8fcf88f11c83e71455f6be5 fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm 16955ef28501e1255eb6c90d0c28ec9906c8cc889450c59119f7202939f36276 fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm f9d665b6be593708752d07430e4b166a9e3a2f9b1f7224f1514ca5801facc1e1 RLSA-2024:6848 Important: pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) * pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcp-6.2.0-5.el9_4.x86_64.rpm 95e2eb4a8a6d8cb0901130dd6105a93a6903ce3d0e73921783dc9ae51a950527 pcp-conf-6.2.0-5.el9_4.x86_64.rpm 5b3c45733e5150bfe3e8b68b87f58648df28b54e7b5bfd53f0f710e083553838 pcp-devel-6.2.0-5.el9_4.i686.rpm 08b0738c53fc35ff4038013a6b1f6363996d8f6f059817547443fa5d8918e9f0 pcp-devel-6.2.0-5.el9_4.x86_64.rpm e2e615293b7e4fa8523b5c64808d829bda4101ed20d6d8e84a2fd9ade9017465 pcp-doc-6.2.0-5.el9_4.noarch.rpm eaf354aaf12011a48a03dbd5c409f2f8bb5c6034395fe4fbf4adbc02f2215d43 pcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm d23756ff8d3166b9fec6a76ab917449526f11e728f5623e2f7c1d6e7dbaeceed pcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpm 77bada175493bbcfd323afdeb577422e4334bb7483048b4713bcbac3c3f14304 pcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm 3d5a661b5157cab345207a386351c6da9045fe15c25668d86be810b219527c08 pcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm 3fc46c349e7256336aa0e419420f38f02b9fc78397f2a822cb61a404484eb36c pcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpm 86a97d4afb6c7774a8518fd780fef319dfe4eb25dca9aa2b230c8d6646d4f4f3 pcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpm 353cc81934003682b258323d2c7175321fcc3fa1366b3b389c4b944afa9bafad pcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm 20f126099f135447ad630a0b364b6d8b5c0be6c39f8713eaf1ef5770563763cb pcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpm bb33a9d8d667945a2364aed38e04fdf933610e9e7248153c1a7e8ad97bd61721 pcp-geolocate-6.2.0-5.el9_4.x86_64.rpm b87dd79883d3a1b65b6ffe3c0cceeabda3e6a154bae0655c3314a4a9267f84a4 pcp-gui-6.2.0-5.el9_4.x86_64.rpm 5a2ce3a6288d72751f2aa005a0489e0c18b80dd7d00889e8459233c519997460 pcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpm 229b42ef0b30a6c3d8c7d7ff3e9898d26d854a4bfa4c03bc43fdf5c805f8481c pcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm df56fb63843e0e440f920778987e025164a4d7bab8dd1955d62ba1e43fc97f5e pcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpm 0c323e42cc9e31fd028c67be97606ae8de0b6da098bf978c7c8877b48956bf5f pcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpm 9dbc1d0996c78b1df80d801866802187b4763346be768186233653ac3c1afbd2 pcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpm fbb7f5d22e950a1192e9c30ee4794442efc55c13af16ab891b539955c127f87a pcp-libs-6.2.0-5.el9_4.i686.rpm 63d37d4e8206a28023fceefc9d2c85a6cf9115ca3c7c0909f2fb6dff2a2383d3 pcp-libs-6.2.0-5.el9_4.x86_64.rpm 7a268c6ef51744c6a960b4e46ee215abb339659a70038d82902fc64da299822a pcp-libs-devel-6.2.0-5.el9_4.i686.rpm 3d39bbb18f9ae60975c254e30760cc3206f97d9fcfa7fa5ac7f43be50e28b16c pcp-libs-devel-6.2.0-5.el9_4.x86_64.rpm bcd2b064564a7aae636515d350f39813d43cd22b48b48dcfcb688b9174e8250f pcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpm 7be476238c82cff028100415c659a641b93f2223d9912a4723e27906acb442f7 pcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpm 68176354f2f34b7b0fa71b501e8a1dbcf415789d5cc4cfafa1d76d567791ccbe pcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpm 208009cf7a5d9f8b1ae1513aec3c0a4843bce97de40c9ecabb0db9a48e1f30a5 pcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm e4c4f41fc69a713d5af0280fffbb39bea35018b51a919ca18644b06f2704d16d pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpm d33b8075590a7bf08051ce7574f5ae8d974568184971d4fbc1bfa950afe69b43 pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm 015068ef9c51d4e85bd2df05a911ea02f177dfd9f422ab5bcc7e384bac6780a0 pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpm 1db22bac38b56be211c9fa9f552a762474123f28d053d24a6d12752684d1770b pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm ccae4078728cf70a7df2b6a482470f2863ed839494dacd25527c82005f7f204b pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpm 02bb6cf32eab91ec45e9bbd86e2b2414d318f5df7769aaf27ed8e5d0e4e6c62b pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpm aebb5a23b9491c22b574195a7082e0323efdd22745d6e6b91a60aaf18e58e0fb pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpm d5e8666f1d32271433ccf8a626ebaf2e596ec6e8a4d00b526a4a290a5a5dfaa2 pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpm 20ee43b434c3771c82f9a1e9971f17814052ffefd71747ab4408cce3bdaa4a06 pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpm 1fe7510357e3d42aada1a55f69f775404076fa664bcc1d4af105ae83655b1342 pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm cd2127bf8e914958e3232f0480d72e232882f8164aeded5e7f60f2a67f0d3d77 pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpm 935d9a21d76ddd8d9f99671f8d5399a94b21f4a934d503ea920b547f6f9f0dfb pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpm c68c73bbb42862b78e6308d7df8ff5ae0cd64b9707b794ebccd4b54d3e270185 pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpm 913c6ba1ddf15d5a313e395fe0f8f72ba81e27fee137d862e2a720ec13ca7056 pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm 75538855892dea361282c593d1bdfbc1ecd67ad417516339200f4f8d08d341a8 pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpm 104c847cd258a703e0358a7e104b3e61eea7f097e415cdda277f4ba1bd69eefb pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm 97cb6c3d2a85dfefc3fff1aff9a163c555512598c3aa417bb7cbaa3b13e0efea pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpm d2bbabbbf41773232c30c73f0463708d000d3c025cac270e05878036268a5ee1 pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm 3c8653bab07eaa98fc26ed90223cc7bfb7597b1bd9269287e475cbd679e539e7 pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpm 440954fd3f3eaad8fd08036633433c217a92b056bc6a9d4d717e3714d6bd0534 pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpm 4d08255569e309d5eb06ced8c396c73f0df8f412a15b22f3ab114662fac2d2d0 pcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpm 08d76cb9328506e21de1d4f700bbfad56de226bdc50d1c4149819909570e9ad7 pcp-pmda-json-6.2.0-5.el9_4.x86_64.rpm 5c06591238f77d6e6257ef5cdabd02ead370a426b9e2ab86df14851d5cb09956 pcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpm e2f9b4472aeeb10a5f06753e50462b3c7cb4c7694d0f7ef70a0793647c673788 pcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm 41e879dc32a671bb1b35a74e7a4fb28c89807525d3635adbae98d6a15d94ac2b pcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpm 84600b9235fa912cc565eecfc0f86ae0687c00fbbb9060a4fc49091778777284 pcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm d2ab6a560a6e8c57e60a904f627e0fee3c497a462c56f37d70f0f016f3ba1843 pcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpm 8be95878b8bf09b0a69fe2e8d95bd024ce6dcffe6f0a9b200fcd4ce039017640 pcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm 311334d881886aec77f6b9248bfda2dbcd75aff8c62b6faaf30a478a100a1090 pcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpm 0732ecef13043b182ff4dde104b982bf4e37531c10a7e7943a08337b7362d260 pcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpm b0806ea65e4ade863a028ec9b10568bdf2bb382025b61a121f97bf0a801eea44 pcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm 39d7d9c3266b02d62cda5d8b94d5ea869fe3ccfcce52023b9e2df1231c2a7027 pcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpm f676d0fcf43744ff847f98af1ad8f61de5f5a6969063616d6b2825789f2664c6 pcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpm 02f6739bde87abf361015547b701bd8eb2ada3a41e408a63628e0f57b5de8aee pcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm 5c42d8b3aadf436b82cc1c2016d8981b1ac16b13135564187d3331361f3d1e1b pcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpm 1605afff673741ebbb996da1efbd565f4e50938ebf2de7c9b92b780c390fc3a6 pcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm 0f52aac9aa861f2f24e8d06114b5b4fdf6ce91eea5368de42b89ab722a3b4de0 pcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpm b6ebf28de31631c8cd06ef189bc24be33be75a64062d52c73382c893fc4cd52d pcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpm 40ea03e7b1a5de0b8d6a550f28fd1d0764623d772790cd66cbd0055de6a7f425 pcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm fe6b77a365e4fca41344cdea00ac57c43f3632e68debdff3e7360b518c551980 pcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpm 2a69190df90b7fe892248fb441daa26d937ddf187a08634f8158b4f4ab89be50 pcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpm 307fe3c7fe953ef53c6a7e33294f76dcfa299cd055f36874bf131acc9684cf59 pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpm 8a024ffdc716cc6af3b510b65fb3d812b5f2a3081e83c846a7dc4f2ded1db650 pcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpm 59fc862b2a1080251b8915d25f0a1bfaad585fa7a05587adc5de4c81727394a4 pcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpm c91296591ebac5c564d4d5ad8e13f739504998e33a566596f4f092f035a2d6e0 pcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpm d26758b972cefad2b7d3af104a69d98abb5ae979d8bd6b0770b50bb9eeb26005 pcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpm cba906b7128842ecc106427741d5448fc22691596ac4853b23ef5c3e487889db pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm 23fd4ef98bcbcf7582ff6282d5a0ca599736121416ad2feff8b51ecaed679147 pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpm d5b742aaea57ef9b68361ec69eb9040c528bf56ae03e69f07f893e68deb11c07 pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm 6d63dff2d9fae4d4ee20d555dc5c4ed1136a4ab653b9c95f6ee50f1062a329fe pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm 031882d9290bc707d034e9f6e10af0599cccd7f408008cae321c464f7f722f21 pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpm f90a7067827937c581d1ccda2b57852f8551a543b1ad5019b87e2a599879cec8 pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpm 4f5d8a6f07a6998c01a4e7a753d78bccbe1183049324597502d4508a42b843af pcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpm 8ff4efd94d5f3b63e851bc83463cbaf9f2a14e925d89ffef2a61493b0d52c9a2 pcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpm 039948f74b521159fd1c77cd507cfd0d6d2d547860cea98b2541bce27369ea73 pcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpm 3b8eac12eb9f5358dc36fe2216f7cc8f04f23967e8b9a8fc927744947c027424 pcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpm e3c7e6408dac9bc305b56e5e496fb7038e4e612ca99a9cf34bd2cf8e3e6610ca pcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm cfa087c363f94f53d51ebdd2e1dacf9b50af6cc68782c2eca5d14ac64d053b88 pcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm a94b75ced0b217c067af3c17e3443d4479e44dde929ceca1ecb26943e04ac6ec pcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpm ca1831bf13effd0dce52047cb86388a4671049834f7de64b99eb835244f2cd27 pcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpm 25b90c74ed5119afad4492e2a344b3bb96a3331939681699d3ed8f26aee60886 pcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm 6284294d60ae8548044fc87cf56dc3130af894fcecfd42e1ab6dedbb484976f5 pcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm 265b8891eaf75808613949f1e0910d456424ff820276cf23d4abbe8712f641ad pcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm dbd140f1353fe17dfebcf045d63ceb65f7d4d6d5ba5e5fbf6587de83a1efeb31 pcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm 1d78091d50815c2303ec70e6226cfcea989b1da060e1b8dd8fe55cb74d4eb815 pcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpm e9962da2b073cb21fede3f230c2d95441add177d0ebad4f662802238f2bfe6e3 pcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm 27b4518887d2215c6bb29841b4bf74427e0ffb72edcf8304f7761b3dd7f65e77 pcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpm 45f5c9ae82ced3964ebdf62440fbb0c1d0bd01a74fd92e81e8ae8f86ee4c8cd5 pcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpm 73fa50b4b9707a9498cf1241650d434a3b812f1647d53891b09db8c6a507dc33 pcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpm 2df06f6b4a3f6b766584a099dd8030e29d0f38de7d647a4afc2946ba9b9c371f pcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpm 03ca4bc7556c503c39a17e987806c86294178da811ff5f91f5ff2b49939ea646 pcp-selinux-6.2.0-5.el9_4.x86_64.rpm 5eb4bf342ac3d6817ace960c5fb2e9b25d6e29bcfb9387b749192bc2c7084fe7 pcp-system-tools-6.2.0-5.el9_4.x86_64.rpm d9cd6452a7c1a90ee17b86176e74dac09c0149233b6a6c94e55472d625daa7d0 pcp-testsuite-6.2.0-5.el9_4.i686.rpm 30d64f45ab4029fa18dc45e3e01a1e663bdd137aef07c7edf505cddd4edb48a3 pcp-testsuite-6.2.0-5.el9_4.x86_64.rpm aeb6992a493c09468010c49aa56ca4ebb039f3f7b2e88ac2e60630c1ee4e706c pcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm fd4b5ab0af3b254d55216e1cba87e947ac427d79cab199e009f1645b11e83aa2 perl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm 9430cdda860ec33c0b821afdec0521d310f4e7c5ce52cecf199480935627028e perl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpm e7666a0cf013bea619cf637c54df22329b6f60d05e63ee4e01bb08cb8c49c64b perl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm b36dfcd60eb5ed42617d1a3967e4b1a2f6b706e86ec7de75b0c7f412057d60cf perl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpm 321119f5720f9ab2b7a3ce43ec609a964400586c336d91e191aa5e61c19141fb python3-pcp-6.2.0-5.el9_4.x86_64.rpm 824b7c765e48beea24a55c6fe0e65148d5a335a5f268d6e060f298c5b5d93daa RLBA-2024:6728 greenboot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Generic Health Check Framework for systemd. Bug Fix(es) and Enhancement(s): * R4E 9.4 installation failing due to bootloader (JIRA:THEEDGE-4006) rocky-linux-9-x86-64-appstream-rpms greenboot-0.15.6-1.el9_4.x86_64.rpm e807daff1c14b919ac7f7c4524ec53cf0c013b966c148cee63d63aca1d16dac5 greenboot-default-health-checks-0.15.6-1.el9_4.x86_64.rpm ccc3f689978a39700d799d96fb0f7b780ec03bd368faeff31a1cb5b05fcedacf RLSA-2025:12280 Important: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for jackson-core, jackson-jaxrs-providers, jackson-databind, jackson-modules-base, jackson-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Core part of Jackson that defines Streaming API as well as basic shared abstractions. Security Fix(es): * com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-annotations-2.19.1-1.el9_6.noarch.rpm 72eded1a1c64e90fbab4ddaeb8fe861b39461255d47d86389154c517bf6fe5ea pki-jackson-core-2.19.1-1.el9_6.noarch.rpm 4652421d102d382b62774242366e892e0f06f3f8f720211c75875111aceb8267 pki-jackson-databind-2.19.1-1.el9_6.noarch.rpm 49a1942d0995df3891f564857a47579e7af45ededc4db267aaa6fdcb654e26ff pki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpm af456093e778c75f6a421336d8ca8f9ed0ab100d3fa814ee2e03f0624b4889f9 pki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpm 4a2261295e5cb8cf5d38210239105d23cb7671cc8197618e43e7702a04a2194b pki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpm 0ca8859169bb1e58ae38919af8225d3c0797cf74d0a29b90aa29afa773b36e40 RLSA-2024:6913 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.13-3.el9_4.x86_64.rpm 30dfc6e546a9f207e64fe2629b9a0dda933a0722adedebf082fa6adac6ca67da golang-bin-1.21.13-3.el9_4.x86_64.rpm c03827502d8b14fc84a22c887b847b3872e6bb077db90730fdcd7bd2fda343cb golang-docs-1.21.13-3.el9_4.noarch.rpm 27abd6bd8c1aee99e3900819c28e57c714f2ae71eb51fb8ad3edd38e7bafb588 golang-misc-1.21.13-3.el9_4.noarch.rpm 5dc9c3f58f2f5e25943d806df78a7a9ba853320c5051bef16699318fde73ca9f golang-src-1.21.13-3.el9_4.noarch.rpm a8d7c976e90684101579617a711b37c530a288f4253a2f30027633d0ccd4c0df golang-tests-1.21.13-3.el9_4.noarch.rpm a81e26d473eeedc7198881e8206f69b1ceed550fada24e0c10ff0c3ca624e58d go-toolset-1.21.13-3.el9_4.x86_64.rpm ecf7f1520c100486d32c28a04c2c7155ff1b88bcff398fb1d7ee269a118455a6 RLSA-2024:6946 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-3.el9_4.x86_64.rpm d7526c2b31dbf4411bf5d62790dcc1cda8d7daa4ffa23a3e1b060ceb6e4f29db RLSA-2024:6947 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.2.10-17.el9_4.x86_64.rpm 8a9b7eb6a15b0d7763ccad1fccd9d4e7aa8c3dd731fa5e3d5f406a5b9def9847 grafana-selinux-9.2.10-17.el9_4.x86_64.rpm 736a5c204c9ab9c03a435691f0b98f96175ab9b5e973e0aaedef45afd48c939b RLSA-2024:7136 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.4.1-4.el9_4.x86_64.rpm d0a765603b67060773cbec2fee35d6065c751bd8fc32c5d8df55823671a45aab RLSA-2024:7204 Important: osbuild-composer security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms osbuild-composer-101-2.el9_4.rocky.0.6.x86_64.rpm 64d370217664a21c571e0d6793d7d181366d475309766616d9b7643dd5876ba7 osbuild-composer-core-101-2.el9_4.rocky.0.6.x86_64.rpm 439277676386420280e2b7a1a9a4673d12d0bfdfad74f112cfa424c3f8ddf4fe osbuild-composer-worker-101-2.el9_4.rocky.0.6.x86_64.rpm dfd913342c0d8200da1820386c4cf85ba9310e57fd55e6b76fd9b2966a68fbcf RLSA-2024:7260 Moderate: net-snmp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Security Fix(es): * net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805) * : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806) * net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807) * net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809) * net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808) * net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-13.el9_4.3.x86_64.rpm 58358d6b3541c8135397fcec624d7a46c4db23189580b11368561f8eba8fe24d net-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpm 1b40b0adb59dbe8c590f98d95bcb855f686a9267a074cc134ddbc8132da37c58 net-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm c2d763881d95f22283bd7d15afa237c1d7245d30222892244435d7dd2f1fa3e9 net-snmp-devel-5.9.1-13.el9_4.3.i686.rpm dace726d840ee7ac73ac3b66f45f894c41ab77f7f16fa888445cff7c1e4b28fd net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpm 2442bc29bd63e0b5adadcfb07c9e8efcb7c48a945866429f76ab426edaf697d1 net-snmp-libs-5.9.1-13.el9_4.3.i686.rpm 1216bb0751c3c1343262465e66515c70be1067baabf03813c57ac775e8d9a0c1 net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm 150b7a4fa241bc04ec3f246249d7c24c37bf89321c97ff6d2fb5e9aac7627fba net-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm ae335e375eb8932c9a3848856640385381a29a0511558d0e778c1b72ba5fd1cf net-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm e3fcf81b898469639996e08448a0685922ad4c88136dc8f948e08f96585aa652 python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpm 9a4069302f4f864d0ec5dc5c11af68d27e92c274b752b1155d4d1a7a18e16eaa RLSA-2024:8121 Moderate: java-11-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.25.0.9-2.el8.x86_64.rpm 110885baf9fcb5196103b2e4e67d172f5b484f2f276316011e363b290a30a985 java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm e74c3155c99a81423ce7dfbd6cb7fd97df9a1a94d73d518a0ad28b4eb81d67b6 java-11-openjdk-demo-11.0.25.0.9-2.el8.x86_64.rpm b79cfc614713208dd264e07e8c120a7478c7d4d06dddce94642af1aa71297bdc java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm acf5410cb94395316222888b8b97a7c5bb7e5d10e6bd8d9247c37d940bc19c56 java-11-openjdk-devel-11.0.25.0.9-2.el8.x86_64.rpm 3f9bafb537d0c175cc0647edb8e5fa3b7764c6f3409d34ebcdd15a743aeab9fb java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm 97ccb138c41425bb5bb4a28f80431592c6cae3f18dd6cbbcea2a40ca2829d017 java-11-openjdk-headless-11.0.25.0.9-2.el8.x86_64.rpm c84c7de702ea7202d96c241915d09abb94df989638ab4f93bcc3abceffa32053 java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm 71f8e9461d7435e2be857bbf688df1bc127409cf3a743ee97f5ba680288f98be java-11-openjdk-javadoc-11.0.25.0.9-2.el8.x86_64.rpm e2437dbaf43cc89b2c790e199aa48ed4759ee8a909925d3502de0ffa026ec42d java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm 7bf34092aa2432d2959e8880353b7a2ff58d21997cd292e6e1e40addf51fb831 java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el8.x86_64.rpm e10df969ad7adfa3fafb064355271b71264dcd6b5401107e479b9f6980cd9dcd java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm 50a5b666682329d4fcd9153541f9d5a2f1aed43811243fa5d5ea0425bd54e21f java-11-openjdk-jmods-11.0.25.0.9-2.el8.x86_64.rpm efdceb4ceef619d690f3318ea74664f8140da5fc5030257458f9355998fd13e7 java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm 3586c7f355b68e7b6ae40ac1fb600714b0cc240405bf3465316ee57174807d72 java-11-openjdk-src-11.0.25.0.9-2.el8.x86_64.rpm d884d219964ba8549d268762fa7d392694a32bd46cd36d903f5bf4706bfbb8b0 java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm 723cfbd63b51308e739581a7624582e54f309d61b9b5798633e558353ca88027 java-11-openjdk-static-libs-11.0.25.0.9-2.el8.x86_64.rpm 0251eee9fd0559cb281aa5c2f42151503c5366a446d42656790bae656751826a java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm 984b18d5b12733d502e17e89282c35cd4ad01951c77cbdf7d550314231612bcd RLSA-2024:8162 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746) * kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989) * kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385) * kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889) * kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978) * kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556) * kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483) * kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502) * kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm 1e2fdc90bda20eb0783619c58ab182b0e7556c0d864781672b24e54aab08d1f8 kernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm a8f925a196819b4e9507ba828d0bbd4ff5f1a4495ea690f5e8b637b9604d35fe kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm f7a081feec37d1a0c25c82987b7e2e3b52133f3312d482915506352fa53d53f2 kernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm 3ff1485deb6f8b9625882bee0f3ded0dc3d2ea854aee47a855ba66e197ce7d8e kernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm 2679c2621e2eb427c1174729354a1a439d18f111be7d55b86f4f99b721dffa72 kernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm 8d750fa408ae7d4a4932e9c641594e99b28b73ea7b01a9062f9491925f544268 perf-5.14.0-427.40.1.el9_4.x86_64.rpm 070fe9141732806190b9f3bd69ec6aa6226b4864d3fe1543f87521900fac2de6 rtla-5.14.0-427.40.1.el9_4.x86_64.rpm 2b9e99d306fc390fd58e6071b685418c5e138214156aacc0d55a2f2560f9aa9f rv-5.14.0-427.40.1.el9_4.x86_64.rpm dede22950bfc9fceeb765c881c972b0f09f9cd42ab152dc2ac6d232d2ad87646 RLSA-2024:8127 Moderate: java-21-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 runtime environment. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.5.0.10-3.el8.x86_64.rpm 868b4ea7031d41f70a388ef4d84ccb5cb3d0f0cf282afe6cdca8a8de0f3cffe9 java-21-openjdk-21.0.5.0.10-3.el9.x86_64.rpm c258bcd8f2041349b5e7d24ade4b6fc7f451f813f93d07e5d9ff908f4a0b1d85 java-21-openjdk-demo-21.0.5.0.10-3.el8.x86_64.rpm 219784af58e3411bf9d7dddf0b70088af5d066068c1e49aba4078a58017f6454 java-21-openjdk-demo-21.0.5.0.10-3.el9.x86_64.rpm db6ab1620beee99de9ed64d9ce69ef1d6aeb188142e9b67c0e23b094376041dd java-21-openjdk-devel-21.0.5.0.10-3.el8.x86_64.rpm e85ef08b120b9cb368b58a827ce900d9efaf95b5175e26050bb8c6c588af5295 java-21-openjdk-devel-21.0.5.0.10-3.el9.x86_64.rpm 28bca40b98b1bbf314d61a3f7ba1b844e820e84853a693e6bd108c74c9bb5991 java-21-openjdk-headless-21.0.5.0.10-3.el8.x86_64.rpm 299c67d56876765637e0b24a3ca1a4355d099bf86cf3095212f8d5982c500ae7 java-21-openjdk-headless-21.0.5.0.10-3.el9.x86_64.rpm e0c77892fe58624521fe04fc409d98fddaea20aa20c8ad31d35e0d1672547acd java-21-openjdk-javadoc-21.0.5.0.10-3.el8.x86_64.rpm 540704861189690709be841e05fc5e83bc481b9ddef9782b58ea4b4f64a76c20 java-21-openjdk-javadoc-21.0.5.0.10-3.el9.x86_64.rpm 8ed46e3b6862bf2677bcd4f7747c3ebccd9da831ee326affe5fc9a4984fc85ee java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el8.x86_64.rpm 1b400d85d6fa63de39a1e5dfbb868ca1f12474543384cf95710a0ccd64d896f4 java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.x86_64.rpm 0626ed87ddc285ced1ffe8367f8e0f93ad3d349625e0ad1d2b3502c46d95c7e1 java-21-openjdk-jmods-21.0.5.0.10-3.el8.x86_64.rpm 91306042d0ac555562107a8c9c81be491176ef1df87b6568d315c4302e6f96f2 java-21-openjdk-jmods-21.0.5.0.10-3.el9.x86_64.rpm fe8d357854d0177c049fb5396016643a8acbaafa35a1db915b10ff0b72d8e2d6 java-21-openjdk-src-21.0.5.0.10-3.el8.x86_64.rpm 611921fa3599f4dfaf41fd36b32d3afab6898fea62527d0fea7072bdebd36433 java-21-openjdk-src-21.0.5.0.10-3.el9.x86_64.rpm 253e8d154fd69bfb6fd4d77aa327119f3981629c62d982a5d8a2ce84111d35ef java-21-openjdk-static-libs-21.0.5.0.10-3.el8.x86_64.rpm 70eae4c1f19f79c7086746b9b06125c1d1d07f47aadff131f9485263fb9d19e7 java-21-openjdk-static-libs-21.0.5.0.10-3.el9.x86_64.rpm 0d1899ea73eb683a09f53e66e4b9b6f7da2af039dc02cbc025b3e8b18a5cac23 RLSA-2024:8124 Moderate: java-17-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.13.0.11-3.el8.x86_64.rpm fee0c612db246a4d8aecca3f22bfe18385c6275f9acdd1cee582d56efc07c277 java-17-openjdk-17.0.13.0.11-3.el9.x86_64.rpm 5b727362c5f1ccd95478e877654ef4ad3fc8f386efb886db4f29089ee9cf8061 java-17-openjdk-demo-17.0.13.0.11-3.el8.x86_64.rpm 0e90eee05be3ab29b689d5cf6e577210354659912c4e5a2ae244690e3d31e58a java-17-openjdk-demo-17.0.13.0.11-3.el9.x86_64.rpm ff0c38a7ea5ecdb749cb4b25fc9142d4381b13f5ad92eb1b5716e0d02de6686d java-17-openjdk-devel-17.0.13.0.11-3.el8.x86_64.rpm 7a972fdde85e298d7168ccdd9f41ff4ba90ee6cff261f32f191c64d6877ca65e java-17-openjdk-devel-17.0.13.0.11-3.el9.x86_64.rpm 14efe0c25699c773be7632880c050af48a193dd8efa9373cb34acce8b07643a9 java-17-openjdk-headless-17.0.13.0.11-3.el8.x86_64.rpm 29f8d1804674ee87683a7e40ffa72705e5da07070278e68975bfe1f861cae23d java-17-openjdk-headless-17.0.13.0.11-3.el9.x86_64.rpm 959d84d025e2db8ecf677fb227f648fcef886f3c85fc870222b5e05139a49755 java-17-openjdk-javadoc-17.0.13.0.11-3.el8.x86_64.rpm fac1569226a5dc37dcc4ef0356b78321fe5cf703959968bfe77f2aeffae00cf3 java-17-openjdk-javadoc-17.0.13.0.11-3.el9.x86_64.rpm 36b994facfcf0f9e51d74d51c534a40bec69235ceb59c2c8f8e553c12cf08351 java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el8.x86_64.rpm 0f68dc4ac259dacf57e0178ba9893b2c020836120b44fa97b82b8eb27679132d java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.x86_64.rpm 12d86fc67a834257f812af6540386c29da196bef63758f59591e669e2479791e java-17-openjdk-jmods-17.0.13.0.11-3.el8.x86_64.rpm 91cebc725f4831414b0301251f8fbede0f7b0c067c77e6741069d1aed48013f1 java-17-openjdk-jmods-17.0.13.0.11-3.el9.x86_64.rpm 824aa01737a648551a651e4ac4338e7c9cb737d1b16d208311cc4d335c238a5f java-17-openjdk-src-17.0.13.0.11-3.el8.x86_64.rpm 4a37eff6e161094de0116261e0a043af4fdc30345c3e718e5e1b418a73568bb0 java-17-openjdk-src-17.0.13.0.11-3.el9.x86_64.rpm 0e78b64be07c4a312e526ab017005850c9c481ff4cfb7eb19908c09ec5da691c java-17-openjdk-static-libs-17.0.13.0.11-3.el8.x86_64.rpm b02054bf492cad2ec74b1b89ca647e945220394eac3e4beb4739f6b64835caa0 java-17-openjdk-static-libs-17.0.13.0.11-3.el9.x86_64.rpm 737dd9c131f8021b57d4fb209d2abfcd2dc3eb01b2f614fa22b8afe0043a5b11 RLSA-2024:8117 Moderate: java-1.8.0-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.432.b06-2.el8.x86_64.rpm 3ae1b5f00be4f9feb09f31cf0fe829cdeb6a3e10168350f0a9dd80764a382199 java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm ce1e777cc2f9a0187220603c0fe3426ef7b54d1e5330167aa207bca9192858ec java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8.x86_64.rpm 151e25befa2028fc6fe443f903a2f4a2f0e0eae5a569668e0484c042d91e3caa java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el8.x86_64.rpm c2a922d1093dfd17f5e49bde88080735bd677b76c2fa06d47aa0d8190c729b64 java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm af1ae314a71d8a452c4bb27f026494e59e6f8c4a3f77ed58e8637fcb110b451b java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el8.x86_64.rpm be568ecf420b6ce5e80a09cd85bc2c49b522d4a0af82fe8769a88a105562f8e3 java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm bb131c97224763c8d9eb5231d5c9f76739fa0be2d131e37b3a781fec4ed18e3c java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el8.x86_64.rpm 1494a4e5d6b76e486fd8d4f430a1378740a50fe8e9f231f79b01397f13248faf java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm 3264b27a14d9c151b6c850e295692a0c7283f6f034dc4c3f62ea9aecabedc4cf java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el8.noarch.rpm 6a647126ff148113998c546acb26f8ba304d4c1863379eb354b1ba5f7a49ebce java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm 0ff0a0c54d894f4dc8e040fbf787fdb3ea6106973bf778f78a1839da43c81b77 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el8.noarch.rpm 755ca7ead530d02c54e92182bb8f260d7689ff23c860b88c2531bb2f2ab701e5 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm 8883cac0b1882789ae7497ee0c75c432c28a4cf46b11d724b9e87103a497beec java-1.8.0-openjdk-src-1.8.0.432.b06-2.el8.x86_64.rpm 56560bc25b41135be75f40357abd4f379dc0faa3a79dbdbea33376a81f8c0d18 java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm e773b35af46ae94b8ac9217835575db9df393cb9430a513c885ba7e58881b079 RLBA-2024:7448 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es) and Enhancement(s): * glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-9.4.z] (JIRA:Rocky Linux-46763) rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-100.el9_4.4.i686.rpm 21d8d58700be77c4293ba2f131c6439e7c1a3af676c40c0d6d3702b889dcbfa0 glibc-devel-2.34-100.el9_4.4.x86_64.rpm b6e6d5d30da16bb5f1d863daa4b861a03f6fe96f519a4238580f1331df43ddc4 glibc-doc-2.34-100.el9_4.4.noarch.rpm fb09c926ec3e7e54b98148fb15c0aebf72c072d6210b2514790e22e66b1ac23e glibc-headers-2.34-100.el9_4.4.x86_64.rpm afd1d1d82cb42390c76c0d38dd62cdcb520c660cfb7ab0a79d71d99fb5f5086b glibc-locale-source-2.34-100.el9_4.4.x86_64.rpm 132d1818a9fa90e1eaaf892bd1d0fffd5bd30e0046fab97c1a21ca3086cc9e22 glibc-utils-2.34-100.el9_4.4.x86_64.rpm 1244b0d16a28a26efceb9420fc56a349af55c97c8d58fa6ddf44472b1b751592 RLSA-2024:8446 Moderate: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.18-3.el9_4.6.i686.rpm 7aa19cbdf9f8e79c2b4986e22ddec8bbf8b673197168114eab39be1a2098ccdc python3-devel-3.9.18-3.el9_4.6.x86_64.rpm 9c60777d7715807eb5c12dc60fd8e5405ff4af18d7ceb8906953dee36d8c0de4 python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpm d731e644f823934ba3418ece1ef8ff85eb6c3cd4b25d2a5d128e72653dabe845 python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpm b009c2f2e6827e3b0b1c251d7bda3958f09448b73878303249887f38fd4b02c8 RLSA-2024:7867 Important: .NET 6.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.135 and .NET Runtime 6.0.35. Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm 9e479dd5d9fb3793fcf314095da1c7e519ebdd9349f4c55adb2e3a2dc9ea6d47 aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm 618189f354fde1e7301cb5a203366e6e185061bc3f0b78662bc20926e1df2cfe dotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm 66a26d09d82af313a6c93d25abb8497c50a801f8f20afffd4ac703ce6c3bedf0 dotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm c5446406e5c8471c90c65935685fdd62e96c3bbbf08f26a6c702e8e5e0e88e5e dotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm 89d2a661a5a364d09de5cab12ff4bb247e0559d45da56c2699bd7f297ba8be27 dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm 1cff8f8755e3e46c049762693b674302cd9c78ad34b7eaaf8bae298652c5374f dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm c4c008e1ad042c7f3717b6b45a88045cdb1492fd876eae2342881286105d9142 dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm 2c895ac2c95e245baaedd40a4e3008709375c6dcaff07535dd0db20aef115c01 RLSA-2024:7869 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10. Security Fix(es): * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm be151023dd28b0cd0421ad25b15cd5ddeffdde5b05b28de2061414f3fac46ae0 aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm 661ee0fde3558ac9b4755a502179ed2e73591e838e6597239d71db948c9aeb64 aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm cc80a7a866615159f4c2d8bc2a99674f0092a0e12ae53cfcc60bda76e8b3105e dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm 5803f0250a4dbeb489b438985286d16dcaba6e57ff6473359a166f72b173670f dotnet-host-8.0.10-1.el9_4.x86_64.rpm 08c8f2ff860959bc098af13b7cdce21b42c47d5a72397ef780c337f95510caef dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm 09f0c3ba32576068bef49516b4ff8e60f89f91d6077c855fdac65098980af0b5 dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm 387f61294b40249e08677a4874ac9bdc543109359e4ac49365793a79278214ee dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm c524c782ae1d79ddd579d41694856341d7346e4f1d8aca0de4ac92844bb347dd dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm be2cc6b6a51c04665f692e6b309357c0fe8ee241f6aeb49294ab24d3786161f2 dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm 16f7d67ac6945cf2bb4d39a1374ed78fa0d5719fe03bbde5e591776d6efdd7cf dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm 347ebc4a467a57d53ebdbc7618d0fd09106021675f64fa39d50d9992055e089c dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpm 3fe134cc1abcf2ac9e8ae822038985beaa3dfe4b7f88feeb3298b0a26b33ad79 netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm f584f4afe2376105f17dcbe926a267cdcc693d837bca5424869d1c74747bd173 RLSA-2024:8037 Moderate: OpenIPMI security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenIPMI packages provide command-line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring. Security Fix(es): * openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator (CVE-2024-42934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms OpenIPMI-2.0.32-5.el9_4.i686.rpm fd6824d6d3d447f1961b06fbccd7688e78fbe15b2448697574cc05bd2f171d26 OpenIPMI-2.0.32-5.el9_4.x86_64.rpm 413ec9745f7f5bb7ed06f2b35a10b622bd0be1f2cef062bf92e2ccd2f2dd8fd0 OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm 2907e983d1a07edb393239cbe58d4f3f73d330b7e962246d187693fe902ac341 OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm e1a4ffc01f8f0b044c5fe7a631097cd635b62b95ad4a3afd27b43d3ed415b320 OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm 75b7ac015cea1afa223d343268ebf66bb29bc6654a9635db5782874e948a5859 OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm 53ba60a0be214d00f10a3d72cffafd993599a23206c9da9b110f463b9e2dddef RLSA-2024:8374 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.7-1.el9_4.6.x86_64.rpm c1c33c56f90e51077a08f0bca9d973d32aa21051e49a10fe6aec8bfb688ab434 python3.11-devel-3.11.7-1.el9_4.6.i686.rpm 2aad327b7d6c4e1033d93811dd69d7834bd67bab6341c4052a8e6b22508eb40c python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm 3b41c9ece9f07e6469ff63c33cb31a3dd04e29d470cd1a4e8a7fd123480eb2ce python3.11-libs-3.11.7-1.el9_4.6.i686.rpm ae7f52bb0b5589aac2b938985b2e09090bd32463c3ce570123776336f3d630b8 python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpm b7a42414456ba29605df122346083dcbf859e65d0556a093a156a105665bba70 python3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpm cb066effdc0e14e9672b9aed13ac2e5a9e1b8c4200056d571a510b5685e16b13 RLSA-2024:8447 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.1-4.el9_4.4.x86_64.rpm 11e7e536215c93f44bf5ea791820457a8f9b66b35f4abca01a46594be03f3d36 python3.12-devel-3.12.1-4.el9_4.4.i686.rpm c200f11e1ca17829daaa8b9089147b6c9756dcc9a7cb43b213826f65ab8c36e1 python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm 63779c05ee1e17ab367d38b24afc9a746cd780a46c5eece748d940bce5542790 python3.12-libs-3.12.1-4.el9_4.4.i686.rpm 8f44ff2118f4815a207c8eb7edc2701137903460355017a01b40d23771f60da9 python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm b466d1216de4364000b3318e063a7c5edb1948cdc58a89f3eef1c444c0b6710f python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm e0888355357ea56e884cc1cf80947995490f93bd86164f240f78748492b4337a RLBA-2024:7457 mod_jk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_jk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_jk module is an Apache HTTP Server plug-in that enables the Apache HTTP Server to connect with the Apache Tomcat servlet engine. Bug Fix(es): * Rebase to upstream 1.2.50 release (JIRA:Rocky Linux-58855) rocky-linux-9-x86-64-appstream-rpms mod_jk-1.2.50-1.el9_4.1.x86_64.rpm d274aa394a9288d4c606928d3c49eccc6344b799214bc24620ba244f81865991 RLSA-2024:7550 Moderate: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.13-4.el9_4.x86_64.rpm d6e1b36afa4d9c93e4765e7aa6055759b1bc7da4039dcf60b56f30ee83b9f0ff golang-bin-1.21.13-4.el9_4.x86_64.rpm 1ed482e0e591ad06e97d88cc73efc1c143dd3e52cd3defb27135c3955f775a1c golang-docs-1.21.13-4.el9_4.noarch.rpm 1c1a237dc9f5b2265584de5fe1e7f5fa63987ca8311b8fd271757fe01fcbf6e1 golang-misc-1.21.13-4.el9_4.noarch.rpm f32e6525a60ad978a78e789922dc56e77e866a36472e89bba3ebfe57d7845c8e golang-src-1.21.13-4.el9_4.noarch.rpm 754710a01bf5c86b04b9bc8105d470f4462a51b9d8382f21319aeed587ed34f3 golang-tests-1.21.13-4.el9_4.noarch.rpm 4c886bcd0a3881247afe3a3017c11cbe592569d38dd0be2f477d371ffbf5f054 go-toolset-1.21.13-4.el9_4.x86_64.rpm ba48844137ce6297b67d271937b3485e768dae6554ef0cc0219296e1037ffff4 RLSA-2024:7958 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.3.1-2.el9_4.x86_64.rpm fb8e557d6a380bab8aeb9e01f6009221bbcc8323c46dfcaa96e2ca70ded193b8 firefox-x11-128.3.1-2.el9_4.x86_64.rpm 281c92cade9fa06dc3dc01db2d6c020993f7dc9660173868c9b4588077a79bf2 RLSA-2024:8025 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.3.1-1.el9_4.x86_64.rpm 38fe9ff8cbacbeaae029de336f8870ede005b440c3a443ee35fc10cf7841ed7f RLSA-2024:8039 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) * Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-13.el9_4.x86_64.rpm a933f4656be7f0de80c573403258070f5bbe5a2151bf576d0e10c2b0047747a1 podman-docker-4.9.4-13.el9_4.noarch.rpm 657ab93d37122a7e279fa5993d845d8657537734bc8b39ad7a34cf0ebaee6549 podman-plugins-4.9.4-13.el9_4.x86_64.rpm 6ba01ef67374906c57f56aeda8a83c799a4e82c166d76ef5b2c8a076d6e59b59 podman-remote-4.9.4-13.el9_4.x86_64.rpm 9d794996585ee6757c4a565f6da46da9853908d0ebb42c2bf2d829431c66a182 podman-tests-4.9.4-13.el9_4.x86_64.rpm fc985ec70b2556802b1761957aac9c20e1e980da0e21bdddde19ac2e20192696 RLSA-2024:8110 Important: containernetworking-plugins security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm abab1cdb45a76b5c849198c08651e8329ddd5f1fd6e681c2c49abefa5f722c71 RLSA-2024:8111 Important: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.14.5-2.el9_4.x86_64.rpm 4eaa276c0ea97dfd33c5310ce925b111e331a3afe06d10b2a74a25afaec7a64b skopeo-tests-1.14.5-2.el9_4.x86_64.rpm 2016d0e2ddd311949c7169e2b5b67fab890b26f1722a89ba2c9b6e55daa80cd5 RLSA-2024:8180 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776) * webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789) * webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780) * webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779) * webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782) * webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866) * webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271) * webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820) * webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838) * webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.46.1-2.el9_4.i686.rpm 27448036a8ef8219981856c7ed68a2462dbfd0b0f5bf47c204343e7146a9bdbd webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm 41c9ca8f3cce181db4ac0c76798a5bf90dfb87c251916d5ca0079d7dea422ab6 webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm 698ee76d436b84b07a45696b3f1dfa9d3eb7303b44dfecbee82db592b87d1016 webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm 02fe4ad21b73b197e7f017aba38ce60bc758ebe0bda5cbd55995a445faa783a3 webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm 9a0d365826aa16462d95a309fc9740badc15192424d917ebb20a0331ac350460 webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm 7bf4bd07f566835900a681f802a855062cfe25d28abbbdea2d8cd73414af412a webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm 0deb9b3590549494806ac89f6a11487ab20c4adf7e647201d6c010d671c95a90 webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm d2f03f916d6e99edc5c1bfe629bd2273cadc36e04f431d2d879ac45fccf414c8 RLBA-2024:8454 rpm-ostree bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * Rocky Linux for Edge build with image is failing - error: Writing commit: While writing rootfs to mtree: Not a regular file or symlink: zero [rhel-9.4.z] (JIRA:Rocky Linux-62651) rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2024.3-6.el9_4.x86_64.rpm 31118a3865e97283a4b78cc5ac1d216662b8ded3c34d825850b2c8e6f62e1139 rpm-ostree-libs-2024.3-6.el9_4.i686.rpm db76108196bb0698ea697f84c6ce224a1688f68e94c8e86a361cdbad84f93ba0 rpm-ostree-libs-2024.3-6.el9_4.x86_64.rpm d33fa8522f9107d0de9012736fa1a9ead33cbcddd73c4d896f0546c216af62ed RLBA-2024:8805 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024b, which addresses recent changes. Notably: * This is an optional update. This update does not contain any urgent time zone changes. * Several changes to improve historical data and conformance. * A variety of changes documented in detail in the NEWS file. rocky-linux-9-x86-64-appstream-rpms tzdata-java-2024b-2.el9.noarch.rpm 2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21 tzdata-java-2024b-4.el8.noarch.rpm d22ef14062b63f4619e7fce194729fa90612101c7c2c2ea158ece31d98a4a2d3 RLSA-2024:8617 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201) * kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923) * kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961) * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383) * kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244) * kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472) * kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504) * kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904) * kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931) * kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960) * kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972) * kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977) * kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995) * kernel: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (CVE-2024-40998) * kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005) * kernel: xfs: don&#39;t walk off the end of a directory data block (CVE-2024-41013) * kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm b42da7717444c98699b41efa7db6ee2018b3cef59f7e746e5ae4b701772c2918 kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm 17936d83e1f5efa48e557511afcbd75059254972c646c784874796dbcf6c5d43 kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm c9114ff7e5481ca1c478e9de6c455d25f6b416164447eadc1c8d530558ec79f5 kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm 7b23fdd5d5d2c215d1bb9b3be9c360513f049369cafdd937ea6411b2c1f2a689 kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm 5108aa97c06944a0af22d535ff70b4d08b50be9bcb693de40ce79507634def42 kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm d0a8b4934b535c79bff19f87c2540a299e96bddf5a10f07893436be627342c09 perf-5.14.0-427.42.1.el9_4.x86_64.rpm 034ea3536c77a0a9712793d5bc6fc5e07abb9114ef69d7750806026a1c81530b rtla-5.14.0-427.42.1.el9_4.x86_64.rpm 1b1a336ae8060dbff5b55c3589f3e9a1bdd369c2f13ce66e15ba34cded9a0c93 rv-5.14.0-427.42.1.el9_4.x86_64.rpm f14fd33c1c6ca31d8ba8e122ac194cac979dda899d90aa6e95bbfb967a97d8d6 RLSA-2024:8800 Important: openexr security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-2.el9_4.1.x86_64.rpm a15c09469b452c2873f7832cad1d02b4894850fbf81dd37d4d80e52a0795cfd5 openexr-libs-3.1.1-2.el9_4.1.i686.rpm 405e1722c4c8fa35a98486397949ed37ee6a364fd651d73bec6b0de3aeb6d7ab openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm 2ef6b71f86446bc448e3a5d2942246dbffc18ea0db6080fc5a13694f9df36e1d RLSA-2024:8914 Moderate: libtiff security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-12.el9_4.1.i686.rpm 01ac8e4ebb906f14e83ebdab4bd003124562561720a342e57080d074bf3c6b3f libtiff-4.4.0-12.el9_4.1.x86_64.rpm d760a963c5b275793109894ef139967f9a168ccf57cf844cc7c96f32d9c4a3d5 libtiff-devel-4.4.0-12.el9_4.1.i686.rpm 81cd421c0d481c28773cb83095eb71a50326385af678c0394eb0b00df35d7a14 libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpm 97309d185e3c813e7328588e4e4eea46be1546ba90b2cfef0cf19ef7b8cf377e RLSA-2024:8935 Moderate: edk2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * openssl: Possible denial of service in X.509 name checks (CVE-2024-6119) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20231122-6.el9_4.4.noarch.rpm 5716082e60f11bdb5afb834aa9e7a69545546758a50e3f5de497ff21124083c9 edk2-ovmf-20231122-6.el9_4.4.noarch.rpm 01c5a535b13fcaa13e5d134ca94d118368f1d15fe2f030b6d9b1a1644d773c7b RLSA-2024:8563 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.33.10-1.el9_4.x86_64.rpm 8a6b806c1385c7b99aef8b70856fcecee00ad74811ed6c8ad240fb388beeb5f1 buildah-tests-1.33.10-1.el9_4.x86_64.rpm 454ef8265911f74ba1a38023abd213ddc35ab5d13d08945c7cf87f52ffafba27 RLSA-2024:8678 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.2.10-19.el9_4.x86_64.rpm 779e5ffaf315ac66b3d0a35ed68d81c510e072bdf99939e3fc43e9f8ba8513f1 grafana-selinux-9.2.10-19.el9_4.x86_64.rpm 7ddee198960050b5fd3a6410f814b6f39cd3f7448bbc27a7e9478efc670d49ee RLSA-2024:8680 Low: mod_http2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-2.0.26-2.el9_4.1.x86_64.rpm 93718ddf0a2fc81c2e556534c06e0f29905cf33b1c3421430f4a7cc3a20b8ead RLSA-2024:8726 Moderate: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.4.0-1.el9_4.x86_64.rpm e81198c0fc7c842c382c38ee6c8dc3e6fa7fe71f27780c3f089ec9293a6734d0 firefox-x11-128.4.0-1.el9_4.x86_64.rpm d76dc9f8ce5abcbb243711e99bc67c6c0804826cb38e6a059318389a04dcc156 RLSA-2024:8793 Moderate: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.4.0-1.el9_4.x86_64.rpm f2060ec5918c5e6d4e47f10c05187ecb14a3448004865f1f4adcf187ff1e47f6 RLBA-2024:9106 qatzip:1.2.0 module bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list QATzip is a user space library which builds on top of the Intel QuickAssist Technology user space library, to provide extended accelerated compression and decompression services by offloading the actual compression and decompression request(s) to the Intel Chipset Series. QATzip produces data using the standard gzip* format (RFC1952) with extended headers. The data can be decompressed with a compliant gzip* implementation. QATzip is designed to take full advantage of the performance provided by Intel QuickAssist Technology. Bug Fix(es) and Enhancement(s): * [Intel 9.5 FEAT] [SPR][EMR][SRF][GNR] Update QATzip (JIRA:Rocky Linux-20180) rocky-linux-9-x86-64-appstream-rpms qatzip-1.2.0-1.el9_4.x86_64.rpm 3b75e21e0078875871f95ff22bcc11f969b861ef836f4c4cf5b0a9c2e50b0f64 qatzip-libs-1.2.0-1.el9_4.x86_64.rpm c940c373763e0494eeb99b96bdc0a37bdb600baf71a8de0292113fb95eac95d9 RLBA-2024:9107 qatlib:24.02.0 module bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Intel QuickAssist Technology (Intel QAT) provides hardware acceleration for offloading security, authentication and compression services from the CPU, thus significantly increasing the performance and efficiency of standard platform solutions. Its services include symmetric encryption and authentication, asymmetric encryption, digital signatures, RSA, DH and ECC, and lossless data compression. This package provides user space libraries that allow access to Intel QuickAssist devices and expose the Intel QuickAssist APIs. Bug Fix(es) and Enhancement(s): * [Intel 9.5 FEAT] [SPR][EMR] qatlib: Add RAS/HB/VFF features (JIRA:Rocky Linux-20174) rocky-linux-9-x86-64-appstream-rpms qatlib-24.02.0-1.el9_4.x86_64.rpm e03575d24572e10d5919879963e1f3df5fcb995b5a996501fe4158f436cb5b06 qatlib-service-24.02.0-1.el9_4.x86_64.rpm 20273dfe3465437abe002819320da9a7771c46006976334bb3a719c9ca41b9e4 RLBA-2024:9138 libappstream-glib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libappstream-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libappstream-glib-0.7.18-5.el9_4.i686.rpm 82affb4d025712a8fa3a8ecd7c6af8c2d544c5b40be92dbd17a367259c8b8bc9 libappstream-glib-0.7.18-5.el9_4.x86_64.rpm b0f2a36b7271c2c10a2baf46368b465ba86cf38a44a7cd009334926de8a7d58e RLBA-2024:9230 qt5-qtbase bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtbase-5.15.9-10.el9_4.i686.rpm 0ac2eabf4591e701f2a5386aa812b3660ae69dcb3b0900c6e01aba0ac6a74e98 qt5-qtbase-5.15.9-10.el9_4.x86_64.rpm 417f1b8d14840782eea6d725164b250561667ed09c17187f9a6681645dd069d0 qt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm 0a00886aeb716a385de60c07c2d9f36e475bff80dc231a8fb6d572c4b551448b qt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm 268b97189db4faf7e9c97191ce796f8679da2583cb4d2056e78dceea4a92372b qt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm 268a9b3d3429abc2da9361ce036a50d54f635cc7be12bc92d40088a547233480 qt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm 5e37ae61a04e5fdabe3640b6644925273bbe5a756fb8541813790797dfc27f81 qt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm 665356136afca4d5cf28ef71ca6c6594fd6c658d5226424939ff3d85874f0a57 qt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm f5110b017cfa360ac3e3051cf64e1213de4f6d80958be403211731a71a137827 qt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm 4b2e4d7cafa6cc9762b6c890c774ca8fa1474fdffcb3513a316278e8cc29aaac qt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm 5e8a9d6a677033b0d4b0f5bf85f11d54af70a68d3b02ae04c98cc28fc3b6c393 qt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm cd76e2cd4dee064a5aa2d06d2073acad270ed958f5ff18f2168093d04e0724bd qt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm 1570e6e4baf8836e8f3ee2658e8d1079101382cffd9c30c4cbf26ba96e1c14dc qt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm fd900c26bc4bc21df0f7c085a8b6735819b121d39946750f2adb0d7af47ec494 qt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm 26fe4b5289d50332f582fa01cff77062acfb547f1e99c3032a85e93bd314a42f qt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm 0ad991f8fd5fe689d6aa197ec704f90554206bb99fe49598baad5f1a77a1f938 qt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm 325801f1ef38ed45f2c4392e1c40e232001773d4c6f80a06032300075e459a4e qt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm d5d3f874d10126ea677fa42f700443befff1ad68ed2f4fef48b87f84e3d3b357 RLBA-2024:9270 libblkio bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblkio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkio-1.5.0-1.el9_4.i686.rpm db6ad045393ea741385a432227f1d01f76fe6849b0994bd6187b4040fa2213c9 libblkio-1.5.0-1.el9_4.x86_64.rpm cf8e04ee37c96440b80c87739cc3d66127ab6345985e13abe33d9b49ab9d1093 RLBA-2024:9279 augeas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-6.el9_4.x86_64.rpm ba47d317f491e35066efe9f0d595f5d7c74570baadced9ec3f07ae4fe8180af6 augeas-libs-1.13.0-6.el9_4.i686.rpm 38eb60c7d70e6f35e1a7c62da881b0baf1a7a1316b24dfe08d5dc1ebf11bcf59 augeas-libs-1.13.0-6.el9_4.x86_64.rpm 2ac9a5e626ea70d1890d5ecc64937eeb9fa9c701b38722476f0e5419d3967fe9 RLBA-2024:9284 postgresql bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.16-1.el9_4.x86_64.rpm 3134e2e1f66599bec78f9253fb3b89548d78dbfa29349ae6cdf74035394e84ee postgresql-contrib-13.16-1.el9_4.x86_64.rpm 4e203afc1a165afdb33b1eae11691d4f4b9b485184ae421b319c6e480917f8c1 postgresql-plperl-13.16-1.el9_4.x86_64.rpm 2e8ca1c831a8090e2793687ec95e78fab91ebb818dbba47064bf2ce60da44840 postgresql-plpython3-13.16-1.el9_4.x86_64.rpm 9af349f8a12763c6440b4e8709c690d53c5762fe142b905f7d963a79f8ddb8ae postgresql-pltcl-13.16-1.el9_4.x86_64.rpm bdc31de3e0a3a9dfc4f6237627b5523c2feb9ab733891122ac5a58dfaa93e771 postgresql-private-libs-13.16-1.el9_4.x86_64.rpm 2edd85939b4eb7e948b9a0ced4a3cb78c0412ab238961c426020f36e40793f68 postgresql-server-13.16-1.el9_4.x86_64.rpm d23761e5c7d995ab0c8bf9376ee8858d005e2e5dcc8f3d383d9b7505fce523cf postgresql-upgrade-13.16-1.el9_4.x86_64.rpm cd0c20e58bd73356d9552544365ea84ef238c0357df8ceb03f25ef43446a2730 RLSA-2025:17428 Important: open-vm-tools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: Local privilege escalation in open-vm-tools (CVE-2025-41244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.5.0-1.el9_6.2.x86_64.rpm 4dd66769066dc2fd59b810c05fe12d260f14016f9345c9c32629157b5739573c open-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm 289af42aa48afe9f4afad81f057bbf3b35b39e8bf15eeddb1f275e830336f7e3 open-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm 732b95d6569ec16624945b3d9337924c7a56e270ac7c3ad241f0c60679d98a72 open-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm 95d888d7ed0f9614821c3805e0846367614e00dc204947623f4fc837d78d6cdb open-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm 2aab2fe86bb4d87213c7e3f8c080bbf76903e7221ab9612a7725a1bc4352943a RLSA-2025:17558 Moderate: iputils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: iputils integer overflow (CVE-2025-48964) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-11.el9_6.3.x86_64.rpm b982dd0f7b339830b0a1f2be251d9ec9bc9201bc6a3145ecfa11139605da81e3 RLSA-2024:9548 Important: openexr security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-2.el9_4.1.x86_64.rpm a15c09469b452c2873f7832cad1d02b4894850fbf81dd37d4d80e52a0795cfd5 openexr-libs-3.1.1-2.el9_4.1.i686.rpm 405e1722c4c8fa35a98486397949ed37ee6a364fd651d73bec6b0de3aeb6d7ab openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm 2ef6b71f86446bc448e3a5d2942246dbffc18ea0db6080fc5a13694f9df36e1d RLSA-2024:9051 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407) * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675) * Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-16.el9_4.x86_64.rpm b3551c832b05016948833ba5e0ee9473ff37926db32e6f422c916f0798334849 podman-docker-4.9.4-16.el9_4.noarch.rpm 45b183910b93c9d5565be00d2f22b2b20b7cab00bf5e320cfea56d690e8390be podman-plugins-4.9.4-16.el9_4.x86_64.rpm 43b9c53f1e3b12c4f1d44e34aec04e1a4006b804d8876df3221bfdc2e24f2109 podman-remote-4.9.4-16.el9_4.x86_64.rpm 57860fd4c0d139bf22e0891d83d98aa3dae26b57a708fa85c17ee338ec542149 podman-tests-4.9.4-16.el9_4.x86_64.rpm d51eed2da23c222aaa60285d91fd100b63444fbeaad4b5bc990ccc0e54b0bf63 RLBA-2024:9112 qatengine:1.6.0 module bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides the Intel QuickAssist Technology OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms. Bug Fix(es) and Enhancement(s): * [Intel 9.5 FEAT] [SPR][EMR][SRF][GNR] Update QATEngine (JIRA:Rocky Linux-20176) rocky-linux-9-x86-64-appstream-rpms qatengine-1.6.0-1.el9_4.x86_64.rpm a882fefc905d5f18e055a8fe6d3c89689229486d25e39772fe94b08de35ad378 RLBA-2024:9146 grafana-pcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-3.el9_4.x86_64.rpm d7526c2b31dbf4411bf5d62790dcc1cda8d7daa4ffa23a3e1b060ceb6e4f29db RLBA-2024:9186 gcc-toolset-13-gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-gcc-13.3.1-2.1.el9_4.x86_64.rpm 1465aa86aa652caea9d27af902f6c2c6dcb3695b85dd56d15d9610006d7adcba gcc-toolset-13-gcc-c++-13.3.1-2.1.el9_4.x86_64.rpm f3cd2056921f918f5550a412659e8350004ac1cd4836aebb08a6e9aab4237c2a gcc-toolset-13-gcc-gfortran-13.3.1-2.1.el9_4.x86_64.rpm 79959ebb7f255a57c4b36303cb89301ebd265d85523ed9a686df539638d7bfc4 gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.1.el9_4.x86_64.rpm a2ad5239ec3f4070e1e1b68e21730edd0464d2a7cfe6ca51bc48e95515c575ed gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.i686.rpm bd109149f28c4a5d18c0181186f306bbf914dee6886a053595a1bd51b578fbbb gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.x86_64.rpm a2225fc807afcc58842af1b09540d587bd1fa4263967c1f0639268ba7d74d3fa gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.i686.rpm 5c60bd86136c862ca19c6d4286b7144f827bce5446545270449f37cf144777a5 gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.x86_64.rpm ab334600ff4ce45cbf3dfff3dd8131a8255160d4c9cf3007ec6c1ecccabbd139 gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.i686.rpm e0dfb9115da466e6a6ce566a3e2fc6eebba04cd1cf85a10b3d562fb75009af19 gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.x86_64.rpm 3194790775ead29e37b5ff098d49406d34d4de623510bfc552cddf44b4c195c9 gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.i686.rpm 203d95f6364f16d3b9f9273f9e32953a300a7292426f77c692f3ff3c3c02b950 gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.x86_64.rpm 17fff10b3718179cd5805a19a655991791f49078af0899310e3a2104454f3ceb gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.i686.rpm 03dd9a984697fd8c1ae32405ff4e58ad748b3f8ce719260249e50b72ca50ed31 gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.x86_64.rpm 995e4fdc0af853c35522e118963c12a9ab820beec2ac9317153717c5484290e0 gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.i686.rpm d3453f4ef022af3bcfa56b85b43dc107de72cd7380b79e1c674093ccb30f9dee gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.x86_64.rpm 15ff144d59a1d656e331204c37ac13bfa7f12dcaa92768092d91115c2a107d0e gcc-toolset-13-liblsan-devel-13.3.1-2.1.el9_4.x86_64.rpm 9afc99c78b2ac38939aebf367bdb9ada3497a23de6c92e5c5947d460363f4d69 gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.i686.rpm e1e5cb7a2c82dc895287f622542fc97f4bf1818e7b37278fc7eed24ee88e1ac1 gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.x86_64.rpm 784a6ddaaa6058e39344af633afac1f813816f3e598a7437968b8b720f883dd2 gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.i686.rpm 22789092f67f2bc34d4ce619b2aba1ef554076b08de454f2b945dca5294e4e83 gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.x86_64.rpm 4da283c9291cd3f1bb3607d6d832992458c769ef8f9eca65e664562b60739f0f gcc-toolset-13-libstdc++-docs-13.3.1-2.1.el9_4.x86_64.rpm 33dcdfb8438ac8b8aecb0a069cb1eb7ada11e89145478638b9b18388f28b4418 gcc-toolset-13-libtsan-devel-13.3.1-2.1.el9_4.x86_64.rpm b6d05d0aadf761b09f90c03e7d0a1b25d049109ab0bccdb1b996026c0863f937 gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.i686.rpm 8243cfee5b5b4585b37138d109df713d17d1557583c87b11c7138eab7e3b3c55 gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.x86_64.rpm acbf918634d8fb824c7d82055411bcb843c036cd985f82e4ce36445b3dcb1799 gcc-toolset-13-offload-nvptx-13.3.1-2.1.el9_4.x86_64.rpm 9f755a062b5869e53d09c0d65fa86c641b0e11f7570ac7f70ade7cf904b520b3 RLBA-2024:9211 containers-common bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms containers-common-1-91.el9_4.x86_64.rpm eff1ddc99c483dd29413211b68cccc739a89cd48ec9d00edaaf4f81109ca9b99 RLSA-2025:17742 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-22.el9_6.1.x86_64.rpm 405377fb999d27fbe9773594c1e00d9afb1800c4b2ff55d703152b2eb0907649 vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm 0966b3881b6386c38044bdc1b78c58c890b97e52c542d515fa318edae82303c3 vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm 405993f5496c4cb615fd1ab026dc7e74b9b4f0ac04bcaaa56af1208cbc421c68 RLSA-2025:17760 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) * kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm 16c1d7c6e83b3ebf9262f0218ad1f9118396b0f153afc1d2d57e3bf9a66ec91d kernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm 9c823c7c6b236e4e8efb2ccc6656e64de6e878382b02a8203cfc3292530eb2b9 kernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm ef2b7d48f41f571244907fad587d780d2ffddccb7ded1a5bb953624ce6dd4f35 kernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm 8126ee73e866823472dc4e1e252d8cc2e9a4394c96cdb63d302e4cc4e38699f0 kernel-doc-5.14.0-570.52.1.el9_6.noarch.rpm 223d4a25b9b56285f7b929eea9b7e3a7bd824db932bf723f63b9195894d7fd65 perf-5.14.0-570.52.1.el9_6.x86_64.rpm 5c3a3704874a68b0815cff2ae1c98e2a0cd784322aa3806a04ee3c2040f8889e python3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm afe62b2ce53d56fd2786f76a0ed9b4ec9cf3c8b6ed9e28b434364bd0a3906f5f rtla-5.14.0-570.52.1.el9_6.x86_64.rpm a021f9a7a5b8ec46951dfcce764884be02cc1ac55c2fc6830c232573a8c17dff rv-5.14.0-570.52.1.el9_6.x86_64.rpm aa29104da7f671ff86819a3a7213d47ff890dd7cbcacf009ae4d3df697ef4714 RLSA-2024:9302 Moderate: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203) * emacs: LaTeX preview is enabled by default for e-mail attachments (CVE-2024-30204) * emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-10.el9_4.x86_64.rpm fa3ed83a9b3d607e31b4d53f344a3afd7a2623bef184395c2293972180b63c57 emacs-common-27.2-10.el9_4.x86_64.rpm bc6c711fa255e8cf751dfb3cba72917deca8fc645ef87d0d13af6b64577b299b emacs-filesystem-27.2-10.el9_4.noarch.rpm 85b21bc3342ea2403a9e5d7ad3df352d2948f93efef23c52a922a67fb5a24ba3 emacs-lucid-27.2-10.el9_4.x86_64.rpm 911bd89bfa1eae35a08f4d4618049f5e0ce331e1ca1387918ab76d6f0d8852a9 emacs-nox-27.2-10.el9_4.x86_64.rpm a10cd0d4af98ad6648340b2bb8efffe84a654e0904bd5aee9cc339b0d86f926e RLBA-2024:9308 bind and bind-dyndb-ldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-dyndb-ldap-11.9-10.el9_4.0.1.x86_64.rpm fa51a4fd9d6c35845930d299fd93726d09efb98906951735c39b4b7ccdf8ef3f RLBA-2024:10833 scap-security-guide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.75-1.el8.rocky.1.3.noarch.rpm 678c059c1aba5c796c670dc0e2d40dbdc68a8665b4e2949b8c8ba1ef5a2d4968 scap-security-guide-doc-0.1.75-1.el8.rocky.1.3.noarch.rpm ceea1e45622dc1d4d94b92c5eb2b1d26ff1d71cd5ee0edbb5318567be31b8030 scap-security-guide-0.1.75-1.el9.rocky.1.1.noarch.rpm 6b20bfed967ba99e1c29cfc95ad91e3c71638efdba0186a13735a6e757c9aa31 scap-security-guide-doc-0.1.75-1.el9.rocky.1.1.noarch.rpm bbef87912d5bd58cfc400695c3d51c8dafa204ed386aceb7eab2aeb23583f98b RLEA-2024:11248 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2024b [rhel-9.5.z] (JIRA:Rocky Linux-57794) rocky-linux-9-x86-64-appstream-rpms tzdata-java-2024b-2.el9.noarch.rpm 2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21 RLSA-2025:18149 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm cc6d356ff52174463c3259d4cda74819029c5357e1304d2fcb08ca7948a6e6e1 aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm b51006212a919f0d09be6c92111d5aabb7e9c8482f5c831c43e5137f8f6bfc42 aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm e8d85594c470c20fd7ba283c6e9d4cfac7726bee6ff140f89354602acddaf0d6 dotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpm 6b47236dd9a8359d07bcf196c2a208565c6bd3aa4ce3f227fbab49eb178544e7 dotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpm fddee92361bbf76791985f45ce9b32e46089c8873c01f7d5277c6aa24e17a621 dotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm 1019c44e630f517d6e347f93d2361c33b16d6cc642796ce1a319d6c20f002ae5 dotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm 1910741f7310de5e7bd1c12c42238ca4679e204cca451f8775fd8bc4334dc62f dotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpm beac1d862fb6b2c4aeace929c3e3c04bf62c173e30d7c07fa3695ab34cb46ecf dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpm 8a0331d672dd064e19440fe69d52eaceae8ce56056fc5bfee4e9b8fc276a65b9 dotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm e0e731d8178dc3379bcf9c138ed3921c888123020a8c36d95c40c76009491240 dotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm bfa9843de9d49c719a01585803b40f3a9523440166b716564ee84c0f80b14de0 RLSA-2025:18155 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * thunderbird: firefox: Memory safety bugs (CVE-2025-11714) * thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709) * thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710) * thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708) * thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715) * thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.4.0-3.el9_6.x86_64.rpm 009f365c547fdca8679e92ce6c241741b70910ac4465408c855d870bad29be57 firefox-x11-140.4.0-3.el9_6.x86_64.rpm bac45b07359028a5b83c10bffedac708d80fbb5a21b07f734ad43a340c41ef01 RLSA-2025:18151 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm 6d4475040011a06d6742d684dc9f400c4904156e6ea471c46d0fa5d750d2f611 aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm 5eeb44353ee5625967eeafa18eceb2b23e8952fcf91ea5ed08611ee511ed721b aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm 2df2d4c91c31c5f926a3dafa113ee597f513eb099da7cd20b86e8e9df784869e dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm e13984eecf93ff6509074b273038d68c0a174b1d1426c9757cef9ff290978031 dotnet-host-9.0.10-1.el9_6.x86_64.rpm 405679de0459e3dbdaaacbca6f6a8022d00318a76f8fc2bf57e9b3d379b552c2 dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm 5d9b0697a6fe9e50594ccd36ae57efb8e9ff530524108c9b357e84a0fa0ef74a dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm 1bf455bb6988b01608ccfaf51b02d9a2f49d139b509817dd50d41b90b29d0923 dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm bf30c47803564beffc04d0345089367f7ca3507833c9145bcbf8ebed523c0ee8 dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm 3116fa60894b2f3b5f569ac5b449835ff13ac3fe90c683d00fcca9b1f2e4f614 dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm 70304d3a99708775cac247efcc6c460155798a96a6c0465ebcad49192bc8ddc7 dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm 75c63fc9d6cae325b01a9483f6bcc9a4465cc90cc432340d74911acb56c0c296 dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm 2afe1a26f3eabb86747555bba367a4dcf31191e4d54051910be0a71a0e02528a dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm 5e39520701407da304c0f2e851c6097942ea4cf527fb1c8c2a265e1788ed4204 netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm 4dc0b881f6b61cca5cfc89e69660185c4a2cbdf19894f800261668516e7bf2e3 RLSA-2025:18275 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libssh-devel-0.10.4-15.el9_6.i686.rpm a96fd41045298736b05f64283a13519ae5e99653ca31944b20ba73159b583791 libssh-devel-0.10.4-15.el9_6.x86_64.rpm 61e448230e57ceb63bbf5682809c8cde43f0598dc8d7fd81081eb854befe4256 RLBA-2025:1104 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309) * Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311) * Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432) rocky-linux-9-x86-64-appstream-rpms tzdata-java-2025a-1.el8.noarch.rpm fec09a50f50a993cdadfe03b7bc1d1d1da271126daa968a6fd8ddcfb8a3c761f tzdata-java-2025a-1.el9.noarch.rpm ec47b067903f046c7fd625b1ef96d5c7b27a1f0992fc8783752a34caf36bc2ea RLSA-2025:0426 Moderate: java-21-openjdk security update for Rocky Linux 8.10, 9.4 and 9.5 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Enhance array handling (CVE-2025-21502) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.6.0.7-1.el8.x86_64.rpm 6df2370b5aa078f394b52ddb2e06a0f27ff4ce527bd844d1f4311500bf1a9a41 java-21-openjdk-demo-21.0.6.0.7-1.el8.x86_64.rpm 642af058ee4327ef19b4e6636d3d27cbbb5871d8296a130df18577c361706ab5 java-21-openjdk-devel-21.0.6.0.7-1.el8.x86_64.rpm b43b7f07195998008d8bd90a7568ed7a9dd6bf0699ae834b2565235fb6af6e8c java-21-openjdk-headless-21.0.6.0.7-1.el8.x86_64.rpm e4ab115a956b11873f7919c871800d59e9414a1a12f952549f2b19a03b7f88f0 java-21-openjdk-javadoc-21.0.6.0.7-1.el8.x86_64.rpm 0eeea0c8ec9f6ba3765b674d5dac23903bd8a235da4157a7f9a7b76a6c5b4a08 java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el8.x86_64.rpm de0a4288a1105e13c7279f622fac00ef81422007fa8c1ac298b791c105c0527c java-21-openjdk-jmods-21.0.6.0.7-1.el8.x86_64.rpm e02625364a94503d4622e5d71075953bd159d23b14ec76e16547d9d08fc5d0fe java-21-openjdk-src-21.0.6.0.7-1.el8.x86_64.rpm 9d9b571fa830d17f92a3a94d785ef56cf1820060bebdb572e1d4d0367665557e java-21-openjdk-static-libs-21.0.6.0.7-1.el8.x86_64.rpm c6e07ef18b3d2e533f39c0dbe67d616f78e75ed1112313287fe0ba2b19bab011 java-21-openjdk-21.0.6.0.7-1.el9.x86_64.rpm 143d5d4534cb105790f758eede6c958da3d7857fef970e0c0a450dcd3c5cbef2 java-21-openjdk-demo-21.0.6.0.7-1.el9.x86_64.rpm c086c7ce1f236ec987f381f26a855ec1c8c8259536e0ed713b988012bf466ae5 java-21-openjdk-devel-21.0.6.0.7-1.el9.x86_64.rpm 5fcf7a120a36c99abff3a637a42d72c99e8c5bcf1e0e4d372a19bacc8dcd00cc java-21-openjdk-headless-21.0.6.0.7-1.el9.x86_64.rpm 10d5aece80d2dffd3c33e31ff6735341bea9cb66f3880bb19e705fc40ec7cea3 java-21-openjdk-javadoc-21.0.6.0.7-1.el9.x86_64.rpm 60c8e4af0d498327f1bb679c703bbcf0dcb49e131a4aa310a1c3886bc14cdbd2 java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.x86_64.rpm 11dcb16f6176441929607447b4000462d516d85ad6a5a5247ef02dce3b853f15 java-21-openjdk-jmods-21.0.6.0.7-1.el9.x86_64.rpm d3022079ee536e74a1b84b250073e0748e496a7306ecebfa07badb1ebbee53cd java-21-openjdk-src-21.0.6.0.7-1.el9.x86_64.rpm f6659cddd5b78ef960bee368bf9f8e6f441ae36ec515df647d2ce8ca50ca89da java-21-openjdk-static-libs-21.0.6.0.7-1.el9.x86_64.rpm 3353aa449f481b17e6a83803ee866322e5a13c7f4697d88df79b728f97d049d7 RLSA-2025:0673 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs (CVE-2024-53263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.4.1-4.el9_4.x86_64.rpm d0a765603b67060773cbec2fee35d6065c751bd8fc32c5d8df55823671a45aab RLSA-2024:10384 Important: tuned security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Security Fix(es): * tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336) * tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tuned-utils-2.24.0-2.el9_5.noarch.rpm f018576481ce6921afdca59f415a297b38985bcce273d2e0d79298cae7ab6ae0 tuned-gtk-2.24.0-2.el9_5.noarch.rpm 6c47c658828f0518c6b112f2e9c021089cca4026e70a8ec35c75ad75316edaf8 tuned-ppd-2.24.0-2.el9_5.noarch.rpm 0338eb57401aeb49caa95931728048ddf7952484187bc74a82f0cbe23b6ee1a6 tuned-profiles-atomic-2.24.0-2.el9_5.noarch.rpm 5ca5290cb79e39ca7ed2f6ad66bc4cf86223a5a21091158af885d81af9055ee5 tuned-profiles-mssql-2.24.0-2.el9_5.noarch.rpm d083f4d1f2b1ad216dfc7d755193db2e7e0d1710bb7f0dd51b5725f844f87179 tuned-profiles-oracle-2.24.0-2.el9_5.noarch.rpm 8ef961e41ffb93d5c4c28107cdc7e5bdb23f5afad800b5ffd662aba82c2819e7 tuned-profiles-postgresql-2.24.0-2.el9_5.noarch.rpm c17802d666befac62640385fa52e5a67338f12ce122aa56bde01dac80c089653 tuned-profiles-spectrumscale-2.24.0-2.el9_5.noarch.rpm 983eb34db971315d8551b483b4274d87b52957a5ba5176fdd1b34541422a7ba8 RLBA-2024:9320 libpciaccess bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpciaccess. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpciaccess-devel-0.16-7.el9.i686.rpm 518b2d43a538d115ade774b28e1c46860e7e9666940186de1241d20e49b627bf libpciaccess-devel-0.16-7.el9.x86_64.rpm e2af53b1675d8237c62c82246335651eae491400003eee669dcbf06a8253e82d RLBA-2024:9321 python-pip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pip-21.3.1-1.el9.noarch.rpm 6bc98b27a014d530be724f1988f213d200751ada53380a87a634e453e0cdf9c2 RLSA-2024:9325 Low: cockpit security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option (CVE-2024-6126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-323.1-1.el9_5.noarch.rpm e1b7287af6aabbb101f9d113ab910885fcb82fdb685d919d36076a2264fa52e7 cockpit-pcp-323.1-1.el9_5.x86_64.rpm 16c2300303b4b56a6e085bbba909f77488859d9c9fc023f00b9a5c9fea3bbefc cockpit-storaged-323.1-1.el9_5.noarch.rpm e6a36f5432ea9871e970a5f407fc394ee6d85ce03589fc61938e718591cfb939 RLBA-2024:9330 libsolv bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsolv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-solv-0.7.24-3.el9.x86_64.rpm ffe4be2968ab5276e047b84d6a0d8454c55fbe90e4cca1c61d81cd2dc1a49f6f RLBA-2024:9336 rsync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-20.el9.noarch.rpm 369fb0f9ac262f87400bc5018409566e82b495effcbf7bfaa3df3a5fd58bac34 RLSA-2024:9333 Low: openssl and openssl-fips-provider security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for openssl-fips-provider, openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511) * openssl: Excessive time spent checking DSA keys and parameters (CVE-2024-4603) * openssl: Use After Free with SSL_free_buffers (CVE-2024-4741) * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.2.2-6.el9_5.1.i686.rpm 82fd93d7f932e24813b9fbfc854a7b27c3a5fa2e32f75d5ed4f46161b32c8df6 openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm 027505056b21615587a77642bcb545497d8ac4c4eb1473517a0a3075cca68cde openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm 6f667ce95a37c91683455f25e25986e6ef7b641aa5db5fa400b181e4f950a283 RLBA-2024:9339 pcre bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcre-cpp-8.44-4.el9.i686.rpm 925983157b207139580ced4fde53914478513232cfa5b06ce55e6ac34af420f4 pcre-cpp-8.44-4.el9.x86_64.rpm 5921a7ff131ddd53a092d350ea6398601ce2455441f947cb6d27aaf42a9386ca pcre-devel-8.44-4.el9.i686.rpm 80438e82a171d150e47f9117469c3af15882a529841694e0f9b48ec904c6c144 pcre-devel-8.44-4.el9.x86_64.rpm 1ab8b2c53365db6af779c532790378653f0257302d355fd57b8277bd53addfae pcre-utf16-8.44-4.el9.i686.rpm 5372824d145b1f4c3d83ae622444a230a9a996d5681744ca966051f8fddc7f5c pcre-utf16-8.44-4.el9.x86_64.rpm 80d78c80a57ea3f6aa28a02598772af9ea72a064148fbe1ede075f2213dc8258 pcre-utf32-8.44-4.el9.i686.rpm 3e01185cd2346401ca6b3ba5a855c287f3cd89957b056595da0717137a5afcc7 pcre-utf32-8.44-4.el9.x86_64.rpm 775407b7f0b2f6234f15372442a2c43aa6f9d3fe77aefdcf4d021abdbbc9d855 RLBA-2024:9337 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.45-3.el9_5.noarch.rpm 3000e1493ba0f20c4811ec309074f80f4f4c8b28bb4770c47328001921379921 RLBA-2024:9342 libnvme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libnvme-1.9-3.el9.x86_64.rpm 0c61b4357868b03e93303025e98526313a3861637523bdf71d98763086f5681e RLBA-2024:9344 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemd-boot-unsigned-252-46.el9_5.2.0.1.x86_64.rpm 1931b2c6c2f0ac888ae36d1d2c8ea62d72a0dd7bc14d7198199184ae70201f6b systemd-devel-252-46.el9_5.2.0.1.i686.rpm c89f03f678385cb69c90cd2eeb5489209a091bd7f8ee52f6c253cecb96a0dbb8 systemd-devel-252-46.el9_5.2.0.1.x86_64.rpm acbed4865022279e75512e1e9ccae1af3dc7e062a971cae75db1a25ae6266f65 systemd-journal-remote-252-46.el9_5.2.0.1.x86_64.rpm 8c322df2ae2041a92800d73b60178c0325f1db3b0d52d431463797fa5c31c2de systemd-ukify-252-46.el9_5.2.0.1.noarch.rpm 8807b637004b846e74df9a9d8b21787a524c7aeeed823461df245bb9e48533e9 RLBA-2024:9350 evolution-mapi, openchange, and samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi, samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-mapi-3.40.1-7.el9.x86_64.rpm 217db50b4c9ddb535405d615ae30fba046addd1a7cdabc6ee0f786ad5f87702c evolution-mapi-langpacks-3.40.1-7.el9.noarch.rpm d0a78e069bf02a8120540f56eb184fcd76adc5c17345b117953d43e7cf87e326 openchange-2.3-42.el9.i686.rpm 6d85ebe9d34fe254014979ef8260d957d021c618152106139006b68569520045 openchange-2.3-42.el9.x86_64.rpm 6e8fd648e9273c16d53c6a7abec67a4f5b16bdf3c94882b698fc28ae45f701d5 samba-client-4.20.2-2.el9_5.x86_64.rpm 80143b8c6fc53512165975878a0e91a635ffaf2006b3234c9518c1e65bcc4126 samba-gpupdate-4.20.2-2.el9_5.x86_64.rpm 94c3dd820a44f58d297d3e3ab7c38fe3616644176dcbf0279d22b9c7847c3f60 samba-krb5-printing-4.20.2-2.el9_5.x86_64.rpm ffcfe90fbcb155ab9a1588dee832e723ab32fb3e29254c942f92b768bd592868 samba-vfs-iouring-4.20.2-2.el9_5.x86_64.rpm a547d8822545961b927e24e0b8bdeafe816e164a07415cc01a26f57cb5e618fd samba-winbind-clients-4.20.2-2.el9_5.x86_64.rpm b6a0598fd64019aebdce19e052bebe2a4bda12eccadc05452d1915828b77d660 samba-winbind-krb5-locator-4.20.2-2.el9_5.x86_64.rpm d6b4d11eebad5dffed82babb50d0a0b70db759551bb98375ba63162964682ba0 samba-winexe-4.20.2-2.el9_5.x86_64.rpm 9e297169bf906eb597ab07403bf18c15f17c994e004063746197af2ae6911636 RLBA-2024:9351 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.9.5-4.el9_5.4.x86_64.rpm ca72fdb1bc964e29a6b73e71bf825b93026f007d7256f783634b16a9b4d73e20 RLBA-2024:9352 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.191-4.el9.x86_64.rpm 91edf911d7d4b1d6db58c25070ac994c7f81199c9c3fea357e530c59ddd07ff9 elfutils-debuginfod-client-devel-0.191-4.el9.i686.rpm ab7a3cda4d2236b596ebf6d1d375ef7112f3f34b6bba4a29daa5a015c8d5e657 elfutils-debuginfod-client-devel-0.191-4.el9.x86_64.rpm 1158314d339d38e04e3a6aa76ac88dd2f400ec03c61532c8ef4d15ab99cb0098 elfutils-devel-0.191-4.el9.i686.rpm 5f27de4f9b2bcb119ebc7349139445000633c4793eeb441e1dd656cb8f90921a elfutils-devel-0.191-4.el9.x86_64.rpm a75629f2947cb562dd8d499f2f3d22983039050447a46ec9c964358e4547ac69 elfutils-libelf-devel-0.191-4.el9.i686.rpm 322e60eeaa424fe4be390c1282effbb91204058fd411cc19cc77bbd001bd428a elfutils-libelf-devel-0.191-4.el9.x86_64.rpm 4852566a0e15039e7f5bd51c2537fe787576f0f8b5a7181e855763d6b621e460 RLBA-2024:9357 dnf-plugins-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dnf-plugin-leaves-4.3.0-16.el9.noarch.rpm a53891be9a911bf8930eb23511c355a6c5a1900e03cfd5803c91ef5b29ebe102 python3-dnf-plugin-modulesync-4.3.0-16.el9.noarch.rpm 203a598c71df38aa8bfbd666dfd5922aebd0b86d2d5cc501038eaa4b445dc5a5 python3-dnf-plugin-show-leaves-4.3.0-16.el9.noarch.rpm ce5a21a469189b7b6bd22395a4c25d7d16ef59cbcbbeeeebf3dbbb87b51cff80 RLBA-2024:9359 rdma-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rdma-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibacm-51.0-1.el9.i686.rpm aae755f209dd5d0d2b6cc1d5ac569d3e61267e45430f17a7e796cb880c4217f8 infiniband-diags-51.0-1.el9.i686.rpm 69c8bf71b0c3a353e19ca2422f97d07e9f18c7d1a58d9d8c5cbe5f412b50252c infiniband-diags-51.0-1.el9.x86_64.rpm 160b391236759b96e4e8a2bc380a55c5d92a67618830a628d44c6b6085036f3d python3-pyverbs-51.0-1.el9.x86_64.rpm 441be845bb94cf1f55ba2aaa0841442423c2881284192ebd9a534b852205f7da rdma-core-devel-51.0-1.el9.i686.rpm fef3c99e7ba10125cb4a6e097d95a4cb8ee1c214aba15a40d249d9cacf603db3 rdma-core-devel-51.0-1.el9.x86_64.rpm 8a8fd778367e825484e231d93dcbd4dfe7bfaa584b0acb3438648a2e741f09c0 RLBA-2024:9362 xfsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xfsprogs-devel-6.4.0-4.el9.i686.rpm 9ffb02f2a95daf9b0baf3857ed378bfabe81073ba490f983201d1b57cf0f4aac xfsprogs-devel-6.4.0-4.el9.x86_64.rpm c618b064e54dd2ee57ab99d6324414914c5b7784b5c6bdc331412386d85cde5b xfsprogs-xfs_scrub-6.4.0-4.el9.x86_64.rpm df241a65efba7c3e0a132f31f54c12f55873b7866b4ffa577432b3ad6f8c5e07 RLBA-2024:9367 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpm-apidocs-4.16.1.3-34.el9.0.1.noarch.rpm 7156f848480afdb16a5bfac0a87f568cde5fde52a3e0a5717ca65e9562e5b259 rpm-build-4.16.1.3-34.el9.0.1.x86_64.rpm b8f6abc253d962187052415eb1aea13e1158bc64756774c555fd80431761a600 rpm-cron-4.16.1.3-34.el9.0.1.noarch.rpm 679265d930bd3358e6ee4fe343672412e20ac04f45b2954031a3179380d84837 rpm-devel-4.16.1.3-34.el9.0.1.i686.rpm a27406920abc3f165158e83e203406534d918ee34a25548b06b2951b5dea5023 rpm-devel-4.16.1.3-34.el9.0.1.x86_64.rpm de34fade0466c69db0fe78376d7f80e0076de0d8248ea09fc878955dc2b2f109 rpm-plugin-fapolicyd-4.16.1.3-34.el9.0.1.x86_64.rpm 52bee7fea14b9d91a3d82d73f5c7530c2a787b6a471303ae33eab0dcdaecfba3 rpm-plugin-ima-4.16.1.3-34.el9.0.1.x86_64.rpm c12eb62bf5dc578476dd4f91277bc56479b8c6346abd76630470f26bd6cfc2d9 rpm-plugin-syslog-4.16.1.3-34.el9.0.1.x86_64.rpm 89925253337864666bb2230e12743e15d4158b1fa51cea6d4a7e1cb3ebd54077 rpm-plugin-systemd-inhibit-4.16.1.3-34.el9.0.1.x86_64.rpm 6fb40c9ce0573ff6a83a303103d012838f9e03a2258757d0d4a9486a99078081 RLBA-2024:9365 openssh bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-43.el9.x86_64.rpm 38adf7037510d75ccb4f2792fd725c6b3f14a27ccf248609843c1d120650ca54 pam_ssh_agent_auth-0.10.4-5.43.el9.x86_64.rpm 65055ccf0044e5e2c4851c95b4f8b79d61dd92588a6ebf9d46298a5ff4dda11f RLBA-2024:9370 polkit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for polkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms polkit-devel-0.117-13.el9.i686.rpm ede893ae2040f09541d3aafc87a31aaf638e9e743d9f00a414c6bd1a5b7d47e5 polkit-devel-0.117-13.el9.x86_64.rpm bd038b21f5bc09e9d1a5119b8bf07c4b88689300ae929cced5306335ebe1df24 polkit-docs-0.117-13.el9.noarch.rpm 8999ce993ffa8f325796979528218d48aec766b054b75e69ce6d431b3611db3b RLBA-2024:9374 cifs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cifs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pam_cifscreds-7.0-5.el9.x86_64.rpm a9aa3e3e659ad2795c69fc9eb23968dd79dd8ec93d8f8c156470f333c9b3a8b2 RLBA-2024:9376 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nfs-utils-coreos-2.5.4-27.el9.x86_64.rpm 0ef2448adde158ac4fb32a1376100864880ac4028b4d3e3d125874dcf67d5f80 nfsv4-client-utils-2.5.4-27.el9.x86_64.rpm 44affb658fd9e221b695315a94e4d1b6b70b13b2da3af77fe8bc9406a1af6b70 RLBA-2024:9377 libdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdb-devel-5.3.28-54.el9.i686.rpm 6f462101ef9194d6979a085413127a957b63bec5cd962d395018f40a50819d49 libdb-devel-5.3.28-54.el9.x86_64.rpm b0ae7c0fe86db1b885605ab6c697b3a5e848f251564e7289baadf42576175fc4 libdb-utils-5.3.28-54.el9.x86_64.rpm dc055b3b13ff65ef7931ca96961a1072c73c88a69dcfd6b47ea5dc91d26a409a RLBA-2024:9384 binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms binutils-devel-2.35.2-54.el9.i686.rpm e667ac0d57fec3f0a591986cce5ddeabed3bfb2c433e7adacc67761d81cb6ae5 binutils-devel-2.35.2-54.el9.x86_64.rpm 0a9cc5905ed4074255292ab5b6f8035c633875ab62bc32e1b28e1b7d2b303387 RLBA-2024:9387 fuse3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse3-3.10.2-9.el9.x86_64.rpm 8a988c30e93b16df00fcf9b67df680fbe79c24a73857976c17ff0117cbf0e3ec fuse3-devel-3.10.2-9.el9.i686.rpm 044fca5374d00c3616aa986332dd489212a9450eee8a48f6178e5d33020a7fa3 fuse3-devel-3.10.2-9.el9.x86_64.rpm ab79964a87316e0da27554e9c394bb774fe3a1c94e9da2a8c70932d71b52f934 fuse3-libs-3.10.2-9.el9.i686.rpm a9cd2597c0d2a35d9a6a64be6cff445bb023136e294b726bbd73aad8888e2acd fuse3-libs-3.10.2-9.el9.x86_64.rpm 53288648d76449d1bef5e7cbf93d008f1ed77fba45f51a3ea33c61952c589aa9 RLBA-2024:9395 quota bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for quota. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms quota-doc-4.09-2.el9.noarch.rpm 1ae5b46ed8b7d2f435e76518aa0f34cfaf257c9ade984221b1ae0a701030d2b9 quota-nld-4.09-2.el9.x86_64.rpm 9594208a83f093163378c90d2d53635ffd706cec042af05b2a9786782ab69117 quota-rpc-4.09-2.el9.x86_64.rpm 5824d6df10a7a2261671cc87a3241043e7fe6d4bd88364b4dc64c3f342bcfba4 quota-warnquota-4.09-2.el9.x86_64.rpm a9322d29d75b7b7c2ff4017453a08717bf933c693fa60dc5bc6f31a56c4f395e RLBA-2024:9394 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.24-2.el9.noarch.rpm e0ebaa66ba3db8385d87e680f04115a0c9973628f157232bfcb51b87678f3e77 lvm2-lockd-2.03.24-2.el9.x86_64.rpm 48eb9245d134d14929d82ec73d0a7806973f94b44541e711d9ab2d57c031e463 RLBA-2024:9403 pcre2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcre2-devel-10.40-6.el9.i686.rpm 730403487e2418ec944f8432bd97404733af71121709ed39453dc427ca0ef5bf pcre2-devel-10.40-6.el9.x86_64.rpm 6923645f11ecfd70868a3382ac17e79bca1a20c36c6a31e37b6fd50abed6336a pcre2-utf16-10.40-6.el9.i686.rpm 8020591feb8ff6cb91940bedb248bb237dd169439fa0c0a012637d7024bd10d5 pcre2-utf16-10.40-6.el9.x86_64.rpm 2b661890af3ced083d2bc35376e40a05ee9fc1b8d0fe393740a967cc72a8697d pcre2-utf32-10.40-6.el9.i686.rpm 6657cab4f4998daa875d697c3d816b6e5330c370e39fa74022ae935b75fe79a2 pcre2-utf32-10.40-6.el9.x86_64.rpm 852cb9f5ea8e0d573d1752e4630924463f7bce74db9ae647139b50cc0c15556d RLSA-2024:9405 Low: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap-based buffer overflow vulnerability (CVE-2021-3903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-21.el9.x86_64.rpm 6d10b80fd9b8d92dded3a5893aaf3bb96e72cff5a2182f1055904ac0180910b7 vim-enhanced-8.2.2637-21.el9.x86_64.rpm a12154b376e90db585728c54f971924e78ce6f30b3923ce395262dfb98ac8086 vim-X11-8.2.2637-21.el9.x86_64.rpm 6c762244d6a5ce7ce8f1345443ad9a9f23cfcdce98261848ea91e82e36529b29 RLSA-2024:9404 Moderate: libgcrypt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libgcrypt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: vulnerable to Marvin Attack (CVE-2024-2236) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libgcrypt-devel-1.10.0-11.el9.i686.rpm 8d9e92a0f188fdd97f7e71614f86287b40f46dcd17bd6813fb544811656616f7 libgcrypt-devel-1.10.0-11.el9.x86_64.rpm 5aae73b9f361eb02c6793994628d8c59f0f77b77ea520e26e78d2dbb7cb75b05 RLBA-2024:9408 usermode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usermode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usermode-gtk-1.114-5.el9.x86_64.rpm 3f2e0ded7aa2e97af952d9ff7652133512f2ad295234225500680896fb4894e3 RLBA-2024:9407 audit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms audit-libs-devel-3.1.5-1.el9.i686.rpm fb31b9d1562d964d4800b8d25b1dd4335c9e25db375fde79678764995d9c49d8 audit-libs-devel-3.1.5-1.el9.x86_64.rpm dcd0621ee8a49d2a4b379d97f8ecee3e33ade8ab07fd55ad354b400881de9dd8 python3-audit-3.1.5-1.el9.x86_64.rpm c8466f6cbe2b1e793df5c8981daf82e5fb1ddd88e509ed7dce7c2ad3ee80a399 RLSA-2024:9413 Moderate: bluez security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Security Fix(es): * bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution (CVE-2023-45866) * BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-51596) * bluez: OBEX library out-of-bounds read information disclosure vulnerability (CVE-2023-51594) * bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability (CVE-2023-51592) * bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589) * bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-2023-51580) * bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (CVE-2023-44431) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50230) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bluez-cups-5.72-2.el9.x86_64.rpm 50ff1173bc6297e01e1222d45f65aff5f4c263094f3b9aca4f47689f4d4a12c8 bluez-obexd-5.72-2.el9.x86_64.rpm 9884ffe5a5c47d416f33f3a24bc83bb45adb00bf7748f9affca648479ee1c02f RLBA-2024:9412 s390utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for s390utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms s390utils-2.33.1-2.el9.x86_64.rpm deb78656406b225e4b9fc1078ec423be4b6363376811dada4ceac262bd6123fe s390utils-se-data-2.33.1-2.el9.noarch.rpm 6272b2fe18f3db58671e6ba1b4b874693f03f65fce643501166f327e695a3ae4 RLBA-2024:9416 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dracut-caps-057-70.git20240819.el9.x86_64.rpm e72145b94a2023e82edc8f9d37659284ce7b45370a21b25fc4a4594ed4994c3c dracut-live-057-70.git20240819.el9.x86_64.rpm d266362692efb43a9102aa262afdc79bdd888feac0ecb5101bc57cfa1e7e1520 RLBA-2024:9427 curl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcurl-devel-7.76.1-31.el9.i686.rpm 654c0e951950bb43ab44813390e42da72f6755c70a40e4c6f4d5ef6ca50bc719 libcurl-devel-7.76.1-31.el9.x86_64.rpm 64e2bb78cb7c74b87fae3bf890c9e66ae381d4a48feaeb0e378ca4c02afe9a88 RLBA-2024:9428 ndctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ndctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cxl-cli-78-2.el9.x86_64.rpm c74765e471cfcaec5974dc7e50b3ac621889e648f1e59945c2e41506b7e998e7 daxctl-78-2.el9.x86_64.rpm 9b42b531d67691e63a29bc91b9a0d82c48393ac05d80f827452a4c2acc5ae9ca daxctl-devel-78-2.el9.i686.rpm e4ef49008a475394d8d751818db8e6f65e870a0fe02030af3f9915df6ebc876a daxctl-devel-78-2.el9.x86_64.rpm 93dd77cad72864155d39126aeb09737aca7ac417c89221dbd1b907dd9fc2a086 ndctl-devel-78-2.el9.i686.rpm e5d170b16a42a40c6c5eec29aa2f716be2c041a3d0c27ec1947315493ae3eaec ndctl-devel-78-2.el9.x86_64.rpm 0c736160b90c95ea52e88c5ec0e91dd8d66c0a9500e2c94d293b4fe8a92e0264 RLBA-2024:9431 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-20.el9.i686.rpm 78d3e9c923832ddf3da3ce84f1f6eba6b24a7ff2d06cf23e21eb163a87e7f298 libblkid-devel-2.37.4-20.el9.x86_64.rpm b22f7cb3e26c29e7566a851e59b46e10413034ea9c5a353c86a046da0d6dc8f6 libmount-devel-2.37.4-20.el9.i686.rpm df19a7faeb6e7ed7ab3bb5cc2bf9da1b2bb0f873d9adbf00112a32163f74e2ac libmount-devel-2.37.4-20.el9.x86_64.rpm 91b1d625fa6165900ce9fc260d5f221565ab723164174a94d9f9b04464262cbf libuuid-devel-2.37.4-20.el9.i686.rpm 6ecef49bde69399c88b33843f80c8ee401fcd0d2218a147e1b1b50541b04dd0f libuuid-devel-2.37.4-20.el9.x86_64.rpm f6fc19d10e54bf1d7a52343e2341bfc6dc9433aac0a396549d1d6083011aef96 python3-libmount-2.37.4-20.el9.x86_64.rpm f061bc3dcb00f3b0f3a80fd7327480680fb43b2ddc108e485123926f56308bac uuidd-2.37.4-20.el9.x86_64.rpm 89bd6d54e9f2a6d7e1bd031dab09d712592f7a37a2210a50f2094cbd81b0b6f4 RLBA-2024:9434 avahi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms avahi-autoipd-0.8-21.el9.x86_64.rpm 80d654f44b68ed277bbb8081fd0e24915fbe5c53f6f1a2a3535805d39b216f4f avahi-glib-0.8-21.el9.i686.rpm ffa77624afb5bb1673bfd888f361e5a302d473b7a589a46cb69b902c3f554f29 avahi-glib-0.8-21.el9.x86_64.rpm f20bc28aec19f70091a2aed8f5206e37d5ac83206edb161a941f436a90fbccbe avahi-tools-0.8-21.el9.x86_64.rpm cff0a0b19ae81b8b2300e608b2e26f5e86396dbeeaba5cae8680f614fd86afb6 RLSA-2025:18097 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43272) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43342) * webkitgtk: A website may be able to access sensor information without user consent (CVE-2025-43356) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43368) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.50.1-0.el9_6.i686.rpm 65786e98a2690424594031e5ae7052a3f0f03c6ef77c844c48bdd6d05ea46d8a webkit2gtk3-2.50.1-0.el9_6.x86_64.rpm 9b8d6d1565f846cec2e0ce9db5baf0caeb79b55d741875a78cb1ff1981508250 webkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm 4b7c141863c303daac28f6c0de9fed82cfcb91f5db4b8cef7f66c20fd28ad280 webkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm 327d7107febd053c7b09fe38326230bdc71eee831b21a557c547163072970db0 webkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm 6481669ec9bcf7899236930c5847a36584cb065c2d3d0a4d2df0e0dd998916cf webkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm d0010ceb125b74ccb74510b788d0b617b4dfeed0484ac4fbac196c19ea6d1585 webkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm 16a6c01c9d2e17698c58442cb183fdf7ad79118147479624d3bb3b4389ad8cf3 webkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm 45e4a4b875184ce1c1a560e949fdccc49d95697473648f1f1e826fa61a622da8 RLBA-2024:9437 numactl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numactl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms numactl-devel-2.0.18-2.el9.i686.rpm a1b1ca1675cd9cc9dd865216a4e0748711f2d3306cfa26aba1a9776dd8dfb949 numactl-devel-2.0.18-2.el9.x86_64.rpm ebb02768cbc58da6812a084c7d39bebe7a9b7057e04e624e2bbb40a6083bb9e3 RLBA-2024:9438 chkconfig bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chkconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ntsysv-1.24-1.el9_5.1.x86_64.rpm 2897817748c79b52ca48cf9c5a0470561d915361b1a693a081cc429c45719648 RLSA-2024:9470 Low: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-31.el9_5.x86_64.rpm aad3736f03a0b73f46ce08419121079ac5fb2c87cf41acbbcd79139f6cf58863 cups-client-2.3.3op2-31.el9_5.x86_64.rpm 2a0e28eb92125d3e8cc874aa0d536223ddb6d6bb2649f4d1979cb89e72baaf53 cups-devel-2.3.3op2-31.el9_5.i686.rpm 8555eb36114665c5623567847754746856efe403f9bdd85ccaa57a6735d14ca7 cups-devel-2.3.3op2-31.el9_5.x86_64.rpm 0fa2c92973fbb3e07be1e38ea4215d8b27790a38ede2972410ef448f46d1a6ba cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm a2a82e0a75e86442df57101ffbdd941fbfb8a94732777c1ce27f410edfef22dd cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpm a5063f02264ef89196d219b789d6adf73706b06c3c0c040a0ae85477e8599ef7 cups-lpd-2.3.3op2-31.el9_5.x86_64.rpm 6e9201b2a638a0f23e67c0ae114572efa9f3ba56faf3e4c10e8e6d6a6e1d68d5 cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm 6863d39ad08b50bef04fa41c17d07b224f8f18bd863c21cc68c2b4b47bf9d41b RLBA-2024:9471 samba bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-9.5.z] (JIRA:Rocky Linux-59912) * Package certs directories in samba-common for gpupdate [rhel-9.5.z] (JIRA:Rocky Linux-59913) rocky-linux-9-x86-64-appstream-rpms samba-client-4.20.2-2.el9_5.x86_64.rpm 80143b8c6fc53512165975878a0e91a635ffaf2006b3234c9518c1e65bcc4126 samba-gpupdate-4.20.2-2.el9_5.x86_64.rpm 94c3dd820a44f58d297d3e3ab7c38fe3616644176dcbf0279d22b9c7847c3f60 samba-krb5-printing-4.20.2-2.el9_5.x86_64.rpm ffcfe90fbcb155ab9a1588dee832e723ab32fb3e29254c942f92b768bd592868 samba-vfs-iouring-4.20.2-2.el9_5.x86_64.rpm a547d8822545961b927e24e0b8bdeafe816e164a07415cc01a26f57cb5e618fd samba-winbind-clients-4.20.2-2.el9_5.x86_64.rpm b6a0598fd64019aebdce19e052bebe2a4bda12eccadc05452d1915828b77d660 samba-winbind-krb5-locator-4.20.2-2.el9_5.x86_64.rpm d6b4d11eebad5dffed82babb50d0a0b70db759551bb98375ba63162964682ba0 samba-winexe-4.20.2-2.el9_5.x86_64.rpm 9e297169bf906eb597ab07403bf18c15f17c994e004063746197af2ae6911636 RLSA-2024:9474 Important: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.21.1-4.el9_5.i686.rpm 488b467b9db5fd9b338c9e1c1199554c6827339d3019e2d2ba156bae86f9cc13 krb5-devel-1.21.1-4.el9_5.x86_64.rpm d20f63e1703ae6720e799b5ce5407e32ad423bab8bcef3ad5b71f62b22e27ca1 RLSA-2024:10244 Important: pam:1.5.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-22.el9_5.i686.rpm 511352c9f2e2efd5888704c22e2dba5cc71dff1febf76cef995151cd034f02e4 pam-devel-1.5.1-22.el9_5.x86_64.rpm d9bbc29d818f48787ea50216e21c54d69c7c16bcca599895361ef015bb70cdb6 pam-docs-1.5.1-22.el9_5.x86_64.rpm 80601fe4ab8034f601898f55d7a2a0a6b89662d22e51f334393ad9e7ce9b5192 RLSA-2024:10983 Moderate: python3.9:3.9.21 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.21-1.el9_5.i686.rpm 2e40f536bf9840012af0c8ca034b95e0e01cedb7f624455e4c2a4daa75dd601e python3-devel-3.9.21-1.el9_5.x86_64.rpm 866c542b431bad92660f395cd656220c716e53c53587cba82d95fa7cce766fbe python3-tkinter-3.9.21-1.el9_5.x86_64.rpm 6c1e7c689f4ba924df3fc32bf96f9e4c2aaf443ed7659e7e954593950c9945f7 python-unversioned-command-3.9.21-1.el9_5.noarch.rpm 3209b97f006f84a85b39590198f389318c199000f54831c66f9b46859fccad2a RLBA-2024:11245 brotli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for brotli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Bug Fix(es) and Enhancement(s): * Brotli: check n_bits and BitMask(n) n value for kBrotliBitMask[n] bounds (JIRA:Rocky Linux-32153) rocky-linux-9-x86-64-appstream-rpms brotli-1.0.9-7.el9_5.i686.rpm edd5c058ee6840c86a98824d22379f09c8bd84e1a2a6144675212b528460f34c brotli-1.0.9-7.el9_5.x86_64.rpm 41f9c29d215d95dfcbacd5caf5e692e98d6fec29e85fde00ce7c3916a85f0902 brotli-devel-1.0.9-7.el9_5.i686.rpm 8bdd8a76fbadeda22bf5ed7e0dcc373f419660066274914bbfa74e336bf00e14 brotli-devel-1.0.9-7.el9_5.x86_64.rpm 3cfd4d6bf4d864d89d3e386f134af49836e1a82a111844c034c4419e9dcd0ee1 python3-brotli-1.0.9-7.el9_5.x86_64.rpm 6125ee8365afc657ff4d9a125ea47da01ca963cd69555a28fc7cd4362f5dfa8d RLBA-2024:11247 iputils bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Bug Fix(es): * unable to ping via a VRF IP [rhel-9.5.z] (JIRA:Rocky Linux-63060) rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-10.el9_5.x86_64.rpm d02902d97910e6ae09e693cae6397aaefc3726362d747c57fe0061f566655973 RLBA-2024:11249 p11-kit bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for p11-kit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files. Bug Fix(es): * Regression in ca-certificates from bz985428 [rhel-9.5.z] (JIRA:Rocky Linux-64917) rocky-linux-9-x86-64-appstream-rpms p11-kit-devel-0.25.3-3.el9_5.i686.rpm 4d5af37c44a70c895c9a228f89c56b8a94e93d4f76c4e36bcc45914372e58f8c p11-kit-devel-0.25.3-3.el9_5.x86_64.rpm 418ccb6de82a328821dcfe324ad08536c8a1ae161201993ff2e68f57a127d7b6 p11-kit-server-0.25.3-3.el9_5.x86_64.rpm 34c04b3c2623be1df8104e0b98bdcf9d64964c80044acdf5fb9406b5e8c7aa86 p11-kit-trust-0.25.3-3.el9_5.i686.rpm bce6079ed2422028f6d131c6f1a8991f8396b42b03363e4aae6283757a86becb p11-kit-trust-0.25.3-3.el9_5.x86_64.rpm 28548ac14bcf8f2cdc8de6832b5e8444eb390de9ce7ae5db93ccb7fcefb2a90c RLSA-2025:0324 Important: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm 7b6da89731b2aa4bfb0c5f0cb870c77e8f0cd62a1e46142235a11708d9e6e1b9 RLSA-2025:0377 Moderate: Security and bug fixes for NetworkManager Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Security and bug fix(es): * Routes in table different to main are not deleted on reapply [rhel-9.5.z] (JIRA:Rocky Linux-73013) * Route to VPN server not stored in routing table that is specified by ipv4.route-table [rhel-9.5.z] (JIRA:Rocky Linux-73166) * VPN connections do not support ipv4.routing-rules settings [rhel-9.5.z] (JIRA:Rocky Linux-73167) * CVE-2024-3661 NetworkManager: DHCP routing options can manipulate interface-based VPN traffic [rhel-9.5.z] (JIRA:Rocky Linux-64726) rocky-linux-9-x86-64-appstream-rpms NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm fb0d1d4aafbb72857ac897b67203dc776bf132c2ced87e154b6f482edc97fe85 NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm ec77b2f49b4a951326633c32806b63130578eef6e98551076c9fc1279530942d NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm 7ae76f8e715f8e9767f7930f815e7d2585136b0d0870be97d05f5c8e62b63835 NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm 12133083d8e0391337b1e5a9d8e2b07edf37bc2d9932abb22a5783ecd025b8a7 NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm 2e697f958b2a12f1811de6429ae99d262e1347ce5199817f2671ee63450f65c5 RLSA-2025:0925 Moderate: bzip2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. Security Fix(es): * bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). (CVE-2019-12900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bzip2-devel-1.0.8-10.el9_5.i686.rpm fcff6819c6193bfc7c630531074005bf18e62251185837145b3570678732680e bzip2-devel-1.0.8-10.el9_5.x86_64.rpm bf2316ed91c2b84274e54ec901dcd2b808d4836dc339bf51996851df112ba6c1 RLBA-2025:0926 iptables bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es): * [Rocky Linux-9] xtables-monitor reports error message [rhel-9.5.z] (JIRA:Rocky Linux-69283) * [Rocky Linux-9] iptables -Z report No chain/target/match by that name [rhel-9.5.z] (JIRA:Rocky Linux-69284) * ebtables-nft eats '-p LENGTH' parameter (JIRA:Rocky Linux-5825) * Second bitwise in rule may break listing (JIRA:Rocky Linux-5831) * protocol names changed to number in iptables output on --numeric (JIRA:Rocky Linux-70173) * iptables uses `_unpackaged_files_terminate_build 0` rather than removing the unneeded files [rhel-9] (JIRA:Rocky Linux-72005) * extensions/libebt_arp.t fails on aarch64 (JIRA:Rocky Linux-72027) rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.10-11.el9_5.i686.rpm 1df00f58d0e4b69b0b80e2fb736eb4e786cf1ca3a6ec413f8ab3a80d46d7f1c1 iptables-devel-1.8.10-11.el9_5.x86_64.rpm 30dca15e773f85d3c533cf43d622ffbd9de75032cc1754b488379af5a41caa3e iptables-nft-services-1.8.10-11.el9_5.noarch.rpm b33988478af6080a3b85251d2667c0d10615dc8a1af3e964a57e5adf12bc7a38 RLBA-2025:0929 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. Bug Fix(es): * Raise port range for ceph service to be inline with new ceph defaults [rhel-9] (JIRA:Rocky Linux-66205) Enhancement(s): * [RFE] Need a service to be added to firewalld for xrootd. (JIRA:Rocky Linux-45253) rocky-linux-9-x86-64-appstream-rpms firewall-applet-1.3.4-9.el9_5.noarch.rpm 132abbea4cdc0a4da333d1ee70f3c725eee01a154b95fab294c0f787cdb07817 firewall-config-1.3.4-9.el9_5.noarch.rpm b09699ed9309516c6b0d075fdf479d0a3c00156476ed58dc4250e7c81b7aad62 RLBA-2025:0930 ipset bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set. Bug Fix(es): * ipset-service - comments refer to wrong path (JIRA:Rocky Linux-5788) * ipset 7.11 cannot parse service names (JIRA:Rocky Linux-67098) rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-11.el9_5.noarch.rpm a4273a190bd94da429aac020ba17ed090fec2a926ecdfa2946f84b068a937d6e RLSA-2025:1330 Important: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: RFC7250 handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.2.2-6.el9_5.1.i686.rpm 82fd93d7f932e24813b9fbfc854a7b27c3a5fa2e32f75d5ed4f46161b32c8df6 openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm 027505056b21615587a77642bcb545497d8ac4c4eb1473517a0a3075cca68cde openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm 6f667ce95a37c91683455f25e25986e6ef7b641aa5db5fa400b181e4f950a283 RLSA-2025:1346 Moderate: gcc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cpp-11.5.0-5.el9_5.x86_64.rpm 3971c47b7a719db54e855219d96a141b7f1110afde1802d7ecbf7b440717002e gcc-11.5.0-5.el9_5.x86_64.rpm df4fbf20221f16b2ec0a09a7e95b1dcfd24d0671b495311c47219e0ddc356d1b gcc-c++-11.5.0-5.el9_5.x86_64.rpm e0fcf34c6adec0de07cac60351b84ca91964d9b562fac2ea6fd2da03ef33690f gcc-gfortran-11.5.0-5.el9_5.x86_64.rpm 99dccf59e5f52df2b6386dce7d2d2b62048014c9decd05bb81f9a958b09c1d13 gcc-offload-nvptx-11.5.0-5.el9_5.x86_64.rpm 8a0cacc9c94f0cc608c08febd444ab02e2c7f8d50986a9b2399e82b3a76c3a85 gcc-plugin-annobin-11.5.0-5.el9_5.x86_64.rpm e653c72fa5f05f7496491fc0d8df77ee4690f6d888e3e34d42b47457c6d429f3 libasan-11.5.0-5.el9_5.i686.rpm 3f82e72820dd25c1094a1017fd46003b9f160445f703a8ab55b25395534a58ca libasan-11.5.0-5.el9_5.x86_64.rpm 75fdc22cf1d46c9e1e5eb174f93d5b384667ea76135da0eb7d04230deb81303a libgccjit-11.5.0-5.el9_5.i686.rpm 0ca5d384fb1b5b6fe007fd3b245b798034bfd7a36780deba77b1f5871c6d6672 libgccjit-11.5.0-5.el9_5.x86_64.rpm 8be830c0d3c87f4133c97bb0a305421debaa193c59dbf522d86126c425e29799 libgccjit-devel-11.5.0-5.el9_5.i686.rpm 3303b6b92376ed107d7021d10f29812bfcdbd8bfddc4c19a55ad31784b3ce74d libgccjit-devel-11.5.0-5.el9_5.x86_64.rpm cb647d6c5e3dfed24c1f016cdad8b977b98d8c1895d07a790cb6f21f4a7834e6 libgomp-offload-nvptx-11.5.0-5.el9_5.x86_64.rpm 69876ec48e7cb4410adaa346b8ba78a05dac483e08ae4533ebae9c8c17b164e1 libitm-11.5.0-5.el9_5.i686.rpm 85c9e8c336dec768a6fff5c45c71a0aa51c5fabb58941b3c144ab550a44fcaad libitm-11.5.0-5.el9_5.x86_64.rpm 58838019e588b1b7b7612253b2994b79e5f46d8a8b848ac5253b5b057940a3ff libitm-devel-11.5.0-5.el9_5.i686.rpm ec020f66b5e71da328a067384db8eebb622ca2a365524df28010529e46d44d4c libitm-devel-11.5.0-5.el9_5.x86_64.rpm fcb24f164917d3899322648399b17f8021ac303ab0190c4f67db39b402b98f7c liblsan-11.5.0-5.el9_5.x86_64.rpm 9a85d37f731233a701d8cfb4e3fd501f8d7a72a5af79801303cb2f8247d43268 libquadmath-devel-11.5.0-5.el9_5.i686.rpm 04b610243d4dfb7a6bc04f55caf9947fcdd00a27fb277039380c87f95b7ad3b8 libquadmath-devel-11.5.0-5.el9_5.x86_64.rpm 64ed8ea7853eb36314aa9714a3dd5719bc191e743e79a5060790f32e9d38adcb libstdc++-devel-11.5.0-5.el9_5.i686.rpm 8dd409ea671f11c345b55ef017a0521b6b6041d9c4368d281b7a70ba001fa19f libstdc++-devel-11.5.0-5.el9_5.x86_64.rpm a9df7e426503b79954e995b927c528628053740956fad1c9dfb84ee44e06ddc6 libstdc++-docs-11.5.0-5.el9_5.x86_64.rpm 503256e2f52d035386cf38fb387de0d324b25beb982a020419e35e6e7ace3c87 libtsan-11.5.0-5.el9_5.x86_64.rpm e395d006f8d7bc6aaba68aada5eb1026eced331cb7a935a546d2005b4ac7a8b2 libubsan-11.5.0-5.el9_5.i686.rpm a62488b62e2dff9abaa14facae63b72e76bfb46a79a84525a8bf4a9b54dcbc64 libubsan-11.5.0-5.el9_5.x86_64.rpm e5775b3c432a4abc3ed0d4cb570eca52facdc0010ac77a1e08caf9b2ed7e6450 RLBA-2022:6583 WALinuxAgent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. The WALinuxAgent package has been upgraded to upstream version 2.7.0.6 in order to fulfil the minimal requirements of Microsoft Azure. (BZ#2110415) rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm 7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148 WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1 RLSA-2024:9088 Moderate: edk2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129) * openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237) * openssl: denial of service via null dereference (CVE-2024-0727) * edk2: Temporary DoS vulnerability (CVE-2024-1298) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20240524-6.el9_5.3.noarch.rpm 4028b087e6ae46a5aa42437a1a23327bd87d42b19b7c98774b5211ed6500c120 edk2-ovmf-20240524-6.el9_5.3.noarch.rpm fc0caf09a366d9af2744b360332c131580cca70d734a06cc6db99a13300aff34 RLBA-2024:9086 libnet bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnet-1.2-7.el9.i686.rpm a3f183d7d53431cbacb1973856c0cb747d6a132759ca004843b2dc65e9703ce8 libnet-1.2-7.el9.x86_64.rpm 336ce9fa67a6ea9d13f243fcd73b1cd66de1608ed62e7394484b7052f0d3e48d RLSA-2024:9092 Moderate: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset (CVE-2024-22211) * freerdp: out-of-bounds read in ncrush_decompress (CVE-2024-32459) * freerdp: OutOfBound Read in interleaved_decompress (CVE-2024-32460) * freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data (CVE-2024-32039) * freerdp: integer underflow in nsc_rle_decode (CVE-2024-32040) * freerdp: OutOfBound Read in zgfx_decompress_segment (CVE-2024-32041) * freerdp: OutOfBound Read in planar_skip_plane_rle (CVE-2024-32458) * freerdp: out-of-bounds read (CVE-2024-32662) * FreeRDP: ExtractRunLengthRegular* out of bound read (CVE-2024-32658) * freerdp: zgfx_decompress out of memory (CVE-2024-32660) * freerdp: freerdp_image_copy out of bound read (CVE-2024-32659) * freerdp: rdp_write_logon_info_v1 NULL access (CVE-2024-32661) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.11.7-1.el9.x86_64.rpm a19abdb774db4f9ba156e431bd4392742800253f3b21aa3b5ae2d74b93327049 freerdp-libs-2.11.7-1.el9.i686.rpm 1b77a2392163e8ef7c68804171592e5676153025b9a10784f288878c3e903da7 freerdp-libs-2.11.7-1.el9.x86_64.rpm 6a63cf99de98c661dff748b65de7d7b7d9795972c1009915bae80a520016c6ac libwinpr-2.11.7-1.el9.i686.rpm 9dcf5b104562b2066569076d846ad324ca6ba8629fd89837e89a845cd070c551 libwinpr-2.11.7-1.el9.x86_64.rpm 05abdd16a9c2d9214f6afc0a7768204b6c9be5ac308fd099802fd17a7a402460 RLSA-2024:9093 Moderate: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm 90752a30273b1c7ee096e697f38017b5bd7bfe60b50a55e1d31e7fed84043868 RLBA-2024:9100 sip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-wx-siplib-4.19.25-2.el9.x86_64.rpm 44ce0860bb577ba1a57c3d9367723589e4b36d641364d9ee81c9cb8044096021 RLBA-2024:9103 perl-Tk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Tk-804.035-8.el9.x86_64.rpm 0b714f0bd80798fe14e1831d6c8b024200ae8e454e33c6a7c5880b23609fa509 RLBA-2024:9111 pytest bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pytest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pytest-6.2.2-7.el9.noarch.rpm 1f1dbad89f60e030343d4d2f84e8ceb69bd5fd0590421d6e481051ad8413431d RLBA-2024:9118 anaconda bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 655e28c4795fd0b1086c7c5d34798b8725e841a4b51c9f5692d107a068aec220 anaconda-core-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 6c8b44f6feed1dd8d0f45735109f8838557ef7fc96f25e1694b74e5bef6ce1b6 anaconda-dracut-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 021675bce56ddc637310537fb1509d916874dfeb0f1c08e561f452b23a72b786 anaconda-gui-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 553cf7275d49e51987cbeaceb051f16c3dfa75805721d279b48954808114d785 anaconda-install-env-deps-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 0e983d00202a59e7d9ee42d7c83a5b1f98408d98a3c61ed7e36b607157cdb668 anaconda-install-img-deps-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm c9a863548fefda6cf5821050e7f94d941b2b486d9455580904b405c006cb861c anaconda-tui-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 149552465ebb09cce3acd64aca625628dc2be8e9d565b9eeed69021fc3e538b4 anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.i686.rpm 99cae5c51d8ee872ad6eb687fcb54858b3dd4444a8d9b24bfe6ab4f135413323 anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 0f36357e0377358d6caf826a4686a539ade1093afb3664f248e2de2404ee7ee0 RLSA-2024:9122 Moderate: xorg-x11-server security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm 001a40a96c381fe59d90decd592da9abcfb7d29ce4315d06dc4288ebe06a81e3 xorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm 6d5127ddbcd57ea9a9db40af7b8c79d0da6f12617b2f11688a966470694e6a88 xorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm 2540fecaa4ed18d4bf1d38633055a20c07a8030e19c0699325010c6eadf151fb xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm 97651b1799835e2b94b367f1311c6305cfa97129d852fad72102c24c9021177d xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm e4d144118702e7ad76239aee7e01b0f4f95617f44c422b424bf72bacd9532ed8 xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm dcca88e032ba55b8f9f855b1dffa89ac7ae6ba88df0ef6338d54cb6573c23c2d RLSA-2024:9128 Moderate: libvirt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: Crash of virtinterfaced via virConnectListInterfaces() (CVE-2024-8235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-10.5.0-7.4.el9_5.x86_64.rpm 69faaeba13ca7a3564d0764701f751f5c8ccf001106345e7860e66fdf5eb3e6a libvirt-client-10.5.0-7.4.el9_5.x86_64.rpm bbfd07fda35c8d24f5e3589900c7d5415fe73becebeb1e15760034971c750416 libvirt-client-qemu-10.5.0-7.4.el9_5.x86_64.rpm b57086d51e0a2aec4567d2b5782fddeaa8ec3a4408198818596ca055b023b536 libvirt-daemon-10.5.0-7.4.el9_5.x86_64.rpm 1b5765652def7b5374e947deddb83cf790ffa0cfb69e9115b198fcfed5eea7ab libvirt-daemon-common-10.5.0-7.4.el9_5.x86_64.rpm f423416553a6f719059b83be635d8a0698806c4ab5c0ccc311d40dfe16e080c8 libvirt-daemon-config-network-10.5.0-7.4.el9_5.x86_64.rpm b4a3e98d878a7b3c21951e9b00b4d02a96d6fc4e659a1e2ec4fc6d04e04fe8a6 libvirt-daemon-config-nwfilter-10.5.0-7.4.el9_5.x86_64.rpm 6f2987a12c837db7a25b6043f28c816015c1718c337761e0f7a2cf6c4f35f654 libvirt-daemon-driver-interface-10.5.0-7.4.el9_5.x86_64.rpm fbae450b95f9809744cf29ebb85a79ca3152848cfafa3e1752cbb7c3ee7dd167 libvirt-daemon-driver-network-10.5.0-7.4.el9_5.x86_64.rpm 51263d3e004bf5f25d7fb546f9e2bd5d24aa319d297d8f1c9f04b47c0900ffbb libvirt-daemon-driver-nodedev-10.5.0-7.4.el9_5.x86_64.rpm 8f9a49cf4fc476de98d178005c6b839900c199d45e27914e4ddba9bcf040ab74 libvirt-daemon-driver-nwfilter-10.5.0-7.4.el9_5.x86_64.rpm 2011f25c2817d3f7c5bb6e4030bf24c35a4f1dad12233d7b68e4d63bd207a544 libvirt-daemon-driver-qemu-10.5.0-7.4.el9_5.x86_64.rpm cd0ca10e762d099d8906d375819f06ed150814668f9cbe328052e6303412027c libvirt-daemon-driver-secret-10.5.0-7.4.el9_5.x86_64.rpm a800c9f4a7305d1e0663c6b22a188387cc080f4198a816150c7bc3d9df38f839 libvirt-daemon-driver-storage-10.5.0-7.4.el9_5.x86_64.rpm 44243c5a06e826bea9f0830ce35deb47a92c203b5710aa5c31f15c64109b6066 libvirt-daemon-driver-storage-core-10.5.0-7.4.el9_5.x86_64.rpm dd1bca8c933752e83d4166a70e6546fb65c564a443f50aabbac2003b6fced9f3 libvirt-daemon-driver-storage-disk-10.5.0-7.4.el9_5.x86_64.rpm 9842df083d0a14f0109a857564a88bed573bef7665574efcf7d50bbdd5921f30 libvirt-daemon-driver-storage-iscsi-10.5.0-7.4.el9_5.x86_64.rpm e0cd6da97cd8a33fb70f13be72be69b70bb12482626dadd9060659c5776b49d3 libvirt-daemon-driver-storage-logical-10.5.0-7.4.el9_5.x86_64.rpm 723d0ef7ed0a3c379f160222f72cffaf254a10e4cf81bae70be92ad0fd204bff libvirt-daemon-driver-storage-mpath-10.5.0-7.4.el9_5.x86_64.rpm c8e734fe320d5fbe7f27649ea12eeeccfbb97156dbe887c3ee571fd61fb977b5 libvirt-daemon-driver-storage-rbd-10.5.0-7.4.el9_5.x86_64.rpm 90294c2c96d41af958699c1d3d6371078ed56b17f0100c3bee32be4ea5bd4725 libvirt-daemon-driver-storage-scsi-10.5.0-7.4.el9_5.x86_64.rpm 9d2c18c9ac3a2d4a2ec21f61dd274b98a7dd70e07a75cff5df2eb09251e6bef2 libvirt-daemon-kvm-10.5.0-7.4.el9_5.x86_64.rpm 871b3c6244618e0ca3408f5898e952bfb28646839ffd17c9f52db037a6b9086e libvirt-daemon-lock-10.5.0-7.4.el9_5.x86_64.rpm e709a3c77f61592c560b4119122057bcd6fd53d611752a49fe83cfe23f1bb5fa libvirt-daemon-log-10.5.0-7.4.el9_5.x86_64.rpm 811f06778582a166c95702038958337b20d1714400a861bb321057c926607da2 libvirt-daemon-plugin-lockd-10.5.0-7.4.el9_5.x86_64.rpm c939a08f664c3dc180e971c7066c60a65947ad8d66dcc9830ac16c242f4697d6 libvirt-daemon-proxy-10.5.0-7.4.el9_5.x86_64.rpm cbe3ee28c55177e82450b7df60ae0c0140f3e4d9dbb4e8b19b3592424f7ae6b4 libvirt-libs-10.5.0-7.4.el9_5.x86_64.rpm dc0cfea0b556881d68d99cba023e190ebcdb3999279786434699a3d64d61ee94 libvirt-nss-10.5.0-7.4.el9_5.x86_64.rpm 91e775175843b383e0c97e1c03de135b359d17bba686262f5094108e5fcbe4cf libvirt-ssh-proxy-10.5.0-7.4.el9_5.x86_64.rpm 32a7ae669662bed0eca9851c7851ba324a6798d0fcfd81e60fe1b0fea125b93f RLBA-2024:9131 nbdkit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nbdkit-1.38.3-1.el9.x86_64.rpm 2e90570fc7a79107acf5384e1c8e963fdf2b19d32d685d975f60a6a6c31260af nbdkit-bash-completion-1.38.3-1.el9.noarch.rpm 86f312106dc565af59774279c61f7be9724bff8f361293885b5a628622b698ac nbdkit-basic-filters-1.38.3-1.el9.x86_64.rpm 2f25489cbed3b130fc9100e4f23edfb61afe8411523b5e5bcf39c8cfcbca56f0 nbdkit-basic-plugins-1.38.3-1.el9.x86_64.rpm 30be7a454a1f1c944cff132d1d36828b5cbf3a5bc88e548a0188c5ebe36177e9 nbdkit-curl-plugin-1.38.3-1.el9.x86_64.rpm 06d6d8e9c401a0d46ee45867dfeed3ee78dea8ec23655d8b8db7b013976354e8 nbdkit-gzip-filter-1.38.3-1.el9.x86_64.rpm d59b5adcdb33979b575f065beb3f791f03bdd58a03447d7c58b05164597d73af nbdkit-linuxdisk-plugin-1.38.3-1.el9.x86_64.rpm e738332c2d9390ed8eb00afab306d701b1725b4cf6ce6dfbcf11af7bd5f1a16f nbdkit-nbd-plugin-1.38.3-1.el9.x86_64.rpm c65600101dca40ceb7b06bd6e0e4529db50ee7b7607a2f1d8d85884e144a56c5 nbdkit-python-plugin-1.38.3-1.el9.x86_64.rpm d743f0f1f2448e622fc0135ed13eebe7b30ebb03f95c213448993459cbf153c5 nbdkit-selinux-1.38.3-1.el9.noarch.rpm 3456ee61fb57165f4580828ec36875c42b375ae0fc3b5d4f71f3455287986bc3 nbdkit-server-1.38.3-1.el9.x86_64.rpm 97b3e945f798bb5a033d1d18a3d2bc7d4c973719de23d7cacbf1bf1b50001940 nbdkit-ssh-plugin-1.38.3-1.el9.x86_64.rpm a9735f26249346268c544ff367e86744264e151529d3c83e7c22ba0651456508 nbdkit-tar-filter-1.38.3-1.el9.x86_64.rpm 56f87dbd7634e634aba50d2b44dc8b0ab5071efb35ba1952717d0af748114799 nbdkit-tmpdisk-plugin-1.38.3-1.el9.x86_64.rpm 25505da6cf4f85d0b1776630cb6c2d9231fb7a6a95f01d3a42d755c13396f1fd nbdkit-vddk-plugin-1.38.3-1.el9.x86_64.rpm c57b442c110aecce9b611302cd774f4bc8bb3c5c950600185a30831911c0a3e7 nbdkit-xz-filter-1.38.3-1.el9.x86_64.rpm 3acc1043bb7e0a2d3b27f203aa7b89b3eed349f4d1d6eae47fe96dfad9196dbc RLBA-2024:9141 libmaxminddb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmaxminddb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmaxminddb-1.5.2-4.el9.i686.rpm 9be0d7437490d05ceba3728a4b9336fa357af554caed6f158597591b218ebbd5 libmaxminddb-1.5.2-4.el9.x86_64.rpm 9d460205283f4f044c5bc016d861ad2098190cd9333db09c6c5d7c33f274624e RLBA-2024:9147 ipa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-1.el9_5.4.x86_64.rpm ad68dfbcc60bc941214fed5b58cfd8be2325563aa852fcaaeae5135e53e088fa ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm 84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4 ipa-client-epn-4.12.2-1.el9_5.4.x86_64.rpm 5acd3bee384607d33a1273676fc51913ee889e593d8ee05065e51096f92a904e ipa-client-samba-4.12.2-1.el9_5.4.x86_64.rpm ebadfb136d57fbf665b2e947612deb5ca60c531a25eaa1475e6881106ed18b92 ipa-common-4.12.2-1.el9_5.4.noarch.rpm 36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705 ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26 ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm 8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037 ipa-server-4.12.2-1.el9_5.4.x86_64.rpm bdb694b073494c919c1cc9f8a57a3e15754618fd934b138a7d78fa493714dbc5 ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm 3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700 ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm 2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547 ipa-server-trust-ad-4.12.2-1.el9_5.4.x86_64.rpm ad08b2754469eee2fd7d272d2a778660e6d81d520133e79526a6dcaebf1cfaeb python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm 1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3 RLBA-2024:9151 libnbd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.20.2-2.el9.i686.rpm a5c14b9284b034114631d2e097e536c0b8a00294fd7621c9e4651172f0cdcbcc libnbd-1.20.2-2.el9.x86_64.rpm 32ab5685280ea117ac36ef28e10da4cbda24907293fa6706a7876b7d87832570 libnbd-bash-completion-1.20.2-2.el9.noarch.rpm abf0cb7b1ffc31d9869ff0d254cb510cbefdfff9adbb82b7525154543f06103d nbdfuse-1.20.2-2.el9.x86_64.rpm d6092e996a8180f299c722c05b1bcd796c308eae35ef592c1ec431cd914e428e python3-libnbd-1.20.2-2.el9.x86_64.rpm 29469502d5515667311118cba063c2c3f4f2805ce3489a61a79afe7c56b274af RLBA-2024:9155 WALinuxAgent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm 7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148 WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1 RLBA-2024:9157 egl-wayland bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms egl-wayland-1.1.9-3.el9.i686.rpm d5726263c77217cdc490a388045d2d47f90c3757310747656f2c58e691ead204 egl-wayland-1.1.9-3.el9.x86_64.rpm 383ba8f7c8f885855c011265ab67d3ff503761154e7bdeaba4afd7a0e440535b RLBA-2024:9165 crash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-8.0.5-1.el9.x86_64.rpm 7280d2d9fac6edf3f732ca4c5902f5b65c4878885be497c8aeca6d4766672a34 RLBA-2024:9166 udisks2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udisks2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libudisks2-2.9.4-11.el9.i686.rpm d8b4cc493b888e69a13c5fb8a3f50990c706ae1ba1562c11ceeb7fdae1fa04d2 libudisks2-2.9.4-11.el9.x86_64.rpm fb5a12d99d915c161b19230c7c831264b96d337973bdd0d628b34ad3f1cf9128 udisks2-2.9.4-11.el9.x86_64.rpm ac2b76a949d69ea15309cacf6f8b84effdc91a816f5f295da951f35df22c14b8 udisks2-iscsi-2.9.4-11.el9.x86_64.rpm 94c1a91da453919de6be0c0bba9622ebca13ccbd15cca0705c8b1ae893826641 udisks2-lsm-2.9.4-11.el9.x86_64.rpm ca1622463826215ea2edd924eed7a57e94ed9f6f87cc2914421631230ec6cc0c udisks2-lvm2-2.9.4-11.el9.x86_64.rpm 64b1972bb84ffd752b34c56d20b8f0418f7a2665487b25df4dce66c13cc00ecf RLSA-2024:9167 Moderate: poppler security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: pdfinfo: crash in broken documents when using -dests parameter (CVE-2024-6239) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-21.el9.i686.rpm 1811a8649ae0f32b12bc41438e45d4d540f0e55685a06e0bade36d371c9261e4 poppler-21.01.0-21.el9.x86_64.rpm f4f588f272f2db5dc0c21a86e0dde898c187d6678bc4f6e1fa1f6f5961546d09 poppler-cpp-21.01.0-21.el9.i686.rpm d6acc74e4f903269684ba725428e2cc73dd62d3f65f23d3eacbacdd9d57a3968 poppler-cpp-21.01.0-21.el9.x86_64.rpm 726ff890ad4f80657ff5c5ef4fbbc6717b27db874e22e457e3c5975d491f9062 poppler-glib-21.01.0-21.el9.i686.rpm c70baf7cc222dd964635cf126dbdbb370a5bd40471eed5993aa6770dfccdf1fc poppler-glib-21.01.0-21.el9.x86_64.rpm 90b46b14161992dee6cd5f44310ade969bfd1e66efc51b4af05f5cad9b360a06 poppler-qt5-21.01.0-21.el9.i686.rpm 7755c75113df48e46dbc47bf2d6b1cd9c1c16bdb28f72a85699c1f0204fc5f9e poppler-qt5-21.01.0-21.el9.x86_64.rpm 63f7e34d68e28e172eb33e59faa1dda72c9a80e977921885e5d31ae6ff259f8a poppler-utils-21.01.0-21.el9.x86_64.rpm ac57b8a13a8b0abe5a7d8f1fb1bade77e60adf9710e83b3f6ba7606a6d9fd6cc RLBA-2024:9179 glslang, shaderc, spirv-tools, vulkan-headers, vulkan-loader, vulkan-tools, vulkan-utility-libraries, vulkan-validation-layers, and vulkan-volk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vulkan-utility-libraries, vulkan-validation-layers, vulkan-headers, vulkan-tools, spirv-tools, vulkan-volk, vulkan-loader, glslang, shaderc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glslang-14.2.0-3.el9.x86_64.rpm c807fb2b7a55a300724d6119b5ea2d3dd2c364215aca5e39b8fdcb4c03441cb7 glslc-2024.0-1.el9.x86_64.rpm 37de97adba307e39706fb556a0567e1d2bea1bedf77ef8b78a4521a7b5d55309 libshaderc-2024.0-1.el9.i686.rpm d84454c7dab4d2b788e9b72df994d691b6860fb9362d46aadfa861a774046621 libshaderc-2024.0-1.el9.x86_64.rpm df9493279c4a94d8761931ef74c75e4cb8044b918bded949a5d91db7accca180 spirv-tools-2024.2-1.el9.x86_64.rpm 5a585f08d78423ea1e0f74de03c71f159e3b4bc93a79f9bf4af8e1babf48ecb7 spirv-tools-libs-2024.2-1.el9.i686.rpm 4e371ef8e9337fc313ebc886c21372b3529e87ef7a6486e5f0d730a6c1de663b spirv-tools-libs-2024.2-1.el9.x86_64.rpm fc8b5729b0e3569742dfae2ab856afaf634e46f2c0fa685487a58b16057184a0 vulkan-headers-1.3.283.0-1.el9.noarch.rpm 601121cfad5f1b52648f7a100cde8414d822f62d12343c4c59e3905e2ced23aa vulkan-loader-1.3.283.0-1.el9.i686.rpm d0913e8b9e1df6d095941304a26cb6f5720d60657a20bc5a097de608b345a4f4 vulkan-loader-1.3.283.0-1.el9.x86_64.rpm b3857f4c53bbd5d6f6ded9cbb327cd79f14970b919f9e48349ec7b7d5d8a9ecb vulkan-loader-devel-1.3.283.0-1.el9.i686.rpm f4215ae279f079e14db033da3172d6ee0c0db2f676aedfb37b6e6b9662c623e1 vulkan-loader-devel-1.3.283.0-1.el9.x86_64.rpm 48e775ad62936af22e3da34fec6dd1e849570a89600be30c579e42fdef11bd4c vulkan-tools-1.3.283.0-1.el9.x86_64.rpm 3ccd475dc7def6546027158a540b23208fb77eff7491d33e3effa86dd5fe430d vulkan-validation-layers-1.3.283.0-1.el9.x86_64.rpm 64a7881829b1c9011152b156405bc1d3d2c7e0f67be2a5e69e6305e19f10c652 vulkan-volk-devel-1.3.283.0-1.el9.i686.rpm 0645da9baa144c28481c4deb872195692e288cdf5ef3738daa46f0cc0d5d811a vulkan-volk-devel-1.3.283.0-1.el9.x86_64.rpm 9956446eec8c9307fde5f7046b6285701dd902bcb86a852fa33645772803bbf0 RLSA-2024:9181 Moderate: jose security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for jose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Jose is a C-language implementation of the Javascript Object Signing and Encryption standards. The jose package is a dependency of the clevis and tang packages, together providing Network Bound Disk Encryption (NBDE) in Rocky Linux. Security Fix(es): * jose: resource exhaustion (CVE-2024-28176) * jose: Denial of service due to uncontrolled CPU consumption (CVE-2023-50967) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jose-14-1.el9.x86_64.rpm 008ef1ca834b36f258e1c1bffd10fb759010765363d14c3bd6a6baa260767157 libjose-14-1.el9.i686.rpm 3297132e1a1e9eaf2089baa775532d47bb70f24971a67e458b08371f6187c0e3 libjose-14-1.el9.x86_64.rpm d6b56b06baace8cc61a4c1a3e2a9ecbb91d209227f39aa73f930a7bb9bb1a94e RLSA-2024:9184 Moderate: gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GTK+ library provides a multi-platform toolkit for creating graphical user interfaces. The gtk3 packages contain GTK+ version 3. Security Fix(es): * gtk3: gtk2: Library injection from CWD (CVE-2024-6655) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk3-3.24.31-5.el9.i686.rpm 03d7e4dd514ef3d7ef236aefa75bda6f2a0658df0f076b662710cab670ce24f7 gtk3-3.24.31-5.el9.x86_64.rpm 6f7d4744107632dc7ce1f6cc21ca94157e58585d359cfc4f05421df1a9e5ebdd gtk3-devel-3.24.31-5.el9.i686.rpm d63f9be6455413d9d351e08b6926379ffcbdf02852ec84680531b825d2cdb867 gtk3-devel-3.24.31-5.el9.x86_64.rpm 99d3aaace71ac7898c6c8cd9f2cb3d895b0646f29ae7c7189b209022295a6505 gtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm 378fcd8b7c15778a5d74117dc7969b973614c00c073f4016f0824cf986ad2ba3 gtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm 5c94a8ed45d3b54e9e2b6b347fa7a04de51c6ac0cd7eebc9d0f59e40dcfbaef3 RLBA-2024:9189 libtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtool-2.4.6-46.el9.x86_64.rpm 8b550ee747afeee92dbf6ee69af6b70474ab4f9b4eabc49ba02f6b2114a827a5 libtool-ltdl-2.4.6-46.el9.i686.rpm 5bbc02660a221d24ad9590ffecaf5894b586b6bb94ac870845096e4401d2a89c libtool-ltdl-2.4.6-46.el9.x86_64.rpm 2225f18e23d3b4b9e886c1048c93c23c74c32753cb74112812db1f2a688eed53 RLSA-2024:9190 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.5-2.el9_5.2.x86_64.rpm 13068b3d2d159d3dd79bb8bd9292ab441e3cedec06a856108ed41b17671415ee python3.12-devel-3.12.5-2.el9_5.2.i686.rpm 27835d17dc8d471df1aa98464c3aaa5f64b080af59fa82f00b74d98f35eb05a5 python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm 2e85915155d7a00d0d450f43bd77e9af1b7fdafc06df10046080177f9a640ac5 python3.12-libs-3.12.5-2.el9_5.2.i686.rpm df823df61d3ea03fe21b4c12f67e7a0b92cd20c758e161773dc08ac626103295 python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm 734619b3748242eb68db1a140490d525d5816efa5f99e8b80768d6c4a6f2cf31 python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm 4dbf4922fa735cb19eb96909e1e999dd739f648fcd606b79af80e1faec8e8bf5 RLSA-2024:9192 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.9-7.el9_5.2.x86_64.rpm 4102b3d8fa4c7e88d42bb789af82f5eff01363fdbbc2c8e857e9007e17c1be14 python3.11-devel-3.11.9-7.el9_5.2.i686.rpm 9e0849fba38aba89b912d4d5772d7cbc27b911c0c3ef339534c2402656148ce6 python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm 9bf5ef11ab19ddbcb5a3b23314aad46ba40ee883bebd4c8e41dc4f3c2ae2e4df python3.11-libs-3.11.9-7.el9_5.2.i686.rpm 954b9a12254755d9652ffb9c600448812f8b842ad7b9f470ffef1c72d8a57d43 python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm d397384c6b20308123b4da6baf43e9b3b753482b69fc5c54e71204697ed9f1b3 python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm a7b6a3cb91a3e93d0ec42711d8ac6a0339538aa1672bd43ddd1150ddf32bae78 RLBA-2024:9202 mesa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-24.1.2-3.el9.i686.rpm f3257db32ae55c146dda3a586e72188a96a64bc66c0a25a7471a9fce98fc4f0a mesa-dri-drivers-24.1.2-3.el9.x86_64.rpm 3a3da202dc1e6d32fcec0bc684684a9991e329180635c724aa5c445464068d2a mesa-filesystem-24.1.2-3.el9.i686.rpm ebbd9ef2cd03af560c0187c69622d3276a5a734b7e0b9fb4f3b2ed06c4222873 mesa-filesystem-24.1.2-3.el9.x86_64.rpm 98f35d76801a651cc85e1981e87021221c22c4fff060c7520f7ecb5109fcb92d mesa-libEGL-24.1.2-3.el9.i686.rpm 4e2317e068ad37131a042c866a7896693a70f2245d29e3382eecc3f7bc8a1da5 mesa-libEGL-24.1.2-3.el9.x86_64.rpm 49d769cbcb60e4bdeb58579f18f8bd29d4e66873c48b2a8ccf10ff6ffc4c020a mesa-libEGL-devel-24.1.2-3.el9.i686.rpm 373b1e2d1cb41403260297e36626ad1a11c473d5869d4f3d2996bde480ca2ac5 mesa-libEGL-devel-24.1.2-3.el9.x86_64.rpm dd6a30918a61e1c44003a28cc5eae171d84386a963e9122241ed37f0fa66e575 mesa-libgbm-24.1.2-3.el9.i686.rpm c44a100cb79f67defe5e8dda63775bb2d3bc92a9570da28f0a32638ff6b352cf mesa-libgbm-24.1.2-3.el9.x86_64.rpm 7e594ffc889a99526c0962e59a61a042afb1d3887c95d96729e11e9607af36a7 mesa-libgbm-devel-24.1.2-3.el9.i686.rpm bd4624f5994aef2876b375f4b1311b0084daf3db7ce77b48ec1fa8076c2c9a74 mesa-libgbm-devel-24.1.2-3.el9.x86_64.rpm 49217541294fe91a81a39eaa03b9d9fba2201c8d0f32a37911ef17391782e778 mesa-libGL-24.1.2-3.el9.i686.rpm 7d1a7126304326bb15cb7829052ee5fc8bccdb27942e15fcc55274feadde63ac mesa-libGL-24.1.2-3.el9.x86_64.rpm 3d3b41f45a1bbb80fc21ff82e55d04745d7237a9115b6f94b0c95b2deaef1104 mesa-libglapi-24.1.2-3.el9.i686.rpm b45044aa430630b23c6cbcfa72dda5a49f75ebc2275de6f5faa623bfc4f413b2 mesa-libglapi-24.1.2-3.el9.x86_64.rpm 08a8f468aa02c2ec44fa12f4a182f08599460c42a7747f8429619a02d569f55b mesa-libGL-devel-24.1.2-3.el9.i686.rpm de698354a38dfb1aa56ed0c7c27ebe2836f1c7f470f7bab8c01c757c13859dd4 mesa-libGL-devel-24.1.2-3.el9.x86_64.rpm 0c0cc0f8fc731981a120ac3a1b79d124ae87ba1ecef8cc0cb208aaf5174ad07b mesa-libxatracker-24.1.2-3.el9.i686.rpm 08bebeec3a0dd7afe9446a9f42dca99c36f4f411fe0303609d050b0dcff4c440 mesa-libxatracker-24.1.2-3.el9.x86_64.rpm 8757b5ed0b8d577278f9f6328a744adeeb88d70d680d2fda9011a4af02a342dd mesa-vulkan-drivers-24.1.2-3.el9.i686.rpm 5986785258ae1cd61f7ea3557349b6a6f1586ec458b991b1fa503bd507f34f6d mesa-vulkan-drivers-24.1.2-3.el9.x86_64.rpm e26dec7c9dc4a0f985d23f2197d690850c3210df850ec6f3986e00b9b1aeeb88 RLBA-2024:9208 bind9.18 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind9.18-9.18.29-1.el9_5.1.x86_64.rpm 01675a7a1f0c7fc392673e4b042cd86edd01f482b313eac735bd2f6e98a88d6e bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm e5ab34561a296d37914f352154c49e2f82bca2e87f3755d57675df9b9e70dd67 bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm c944af447d7755750ca3c66653452d5eb9196100b5890ec2b9a46745a729247f bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm 2a3aa8c8bdf987e778187c892ce5eda9ac9bbad78a10faffacc5c9c38109e0c7 bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm 99a331b6d6d78f2050a583123205336d1d50218adcad3e0565133f65781cbb99 RLBA-2024:9217 corosync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for corosync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms corosynclib-3.1.8-2.el9.i686.rpm de0d63b4e975c51ff003d297e04708ced032aa5415c292c34d8e21ef664766bc corosynclib-3.1.8-2.el9.x86_64.rpm 01a5b510f35fa57470bc081c090e2b4cda9575eb6f0d754a1c70a18f15c267ec RLBA-2024:9222 libiptcdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libiptcdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libiptcdata-1.0.5-10.el9.i686.rpm ad171773fe7ea8dffb08e19b69f2bae4906212467ece6b8d2fe7505038ff2a1c libiptcdata-1.0.5-10.el9.x86_64.rpm fb547a30d0491b507bd6960fd390ebf055ffae798467f6987a8d20b7b8547d10 RLBA-2024:9221 gdm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdm-40.1-27.el9.i686.rpm ff7d599815696dedebc949ca752bd50e9a3512a766f7495ac6f6cf39d9c0b85f gdm-40.1-27.el9.x86_64.rpm 4588505dc56cab8c420c7034dddffb3debcc9bf63937032c8679bb95d4e7b629 RLBA-2024:9227 qt5-qttools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-assistant-5.15.9-5.el9.x86_64.rpm bc597b1b02bd06940b82b7e8464f819834dbf26bde91ef7e1f747ea235a84876 qt5-designer-5.15.9-5.el9.x86_64.rpm 1077d1f97c04ed763ef7912d4b1af93182269c8ef5191dff229b5e321b225ffc qt5-doctools-5.15.9-5.el9.x86_64.rpm d3b8706296c64d36bed748173ab64b5b8ec2dc659ba9121d2ab266360f1835aa qt5-linguist-5.15.9-5.el9.x86_64.rpm 55c4bb9b2fbbf4e461cce1c17dba186d7a8a37608b560526d958cfeaec8f94eb qt5-qdbusviewer-5.15.9-5.el9.x86_64.rpm ccf3ce50c721ad5cc6b75b144eaf6d5a06be52ea56b0d44fcdb3d0b032aee188 qt5-qttools-5.15.9-5.el9.x86_64.rpm 1b8400c7aae0f1932d733bd01ad97044ed2ea5fe0d4a469c5762f1deec69470c qt5-qttools-common-5.15.9-5.el9.noarch.rpm 4edf61dc600d99ef490b13b19853435fb65e83beb28310bea31777e0f815e449 qt5-qttools-devel-5.15.9-5.el9.i686.rpm 153f79dc158ad0555e8a71333f0942e91df4538aee3403f204cb89164a9e74e4 qt5-qttools-devel-5.15.9-5.el9.x86_64.rpm 8bab02972dba4f7c665106d634afad6dfe4fc25f00574ae26102f12175dd49cb qt5-qttools-examples-5.15.9-5.el9.i686.rpm 69e779fc501c7dc7e5464089ba1174f1f8a0380fb126b0fb5bce228e3413078a qt5-qttools-examples-5.15.9-5.el9.x86_64.rpm 6d18270690c0ae0f9b65cb5251cb4361dfcd3bc9538cefff6a1c3b424f2ad648 qt5-qttools-libs-designer-5.15.9-5.el9.i686.rpm 3a91a9eb23412817b5f84c20f6fb9f1cd9346c552b976f5e43097a46b085e285 qt5-qttools-libs-designer-5.15.9-5.el9.x86_64.rpm ff3f632343480bc61c2fdd2a07cc8afa0afacf0baccf0d32645952a9f9e370e6 qt5-qttools-libs-designercomponents-5.15.9-5.el9.i686.rpm e75aa47355887e3662b9d587351deea89153fa412e1d411ad795c39f4ded5b4d qt5-qttools-libs-designercomponents-5.15.9-5.el9.x86_64.rpm c1fdbf520c254f57d9ad806ab51eca75ae7cfc9b1fa6503b888d3acb2103d52e qt5-qttools-libs-help-5.15.9-5.el9.i686.rpm b9932dcd424903f7490276be825680890d069c787a4d33f06d8b74885562f96e qt5-qttools-libs-help-5.15.9-5.el9.x86_64.rpm 144261840fb75f7a9d0bb756c323ec1d703677a5417bdf307b850132ab760f0d RLBA-2024:9232 libslirp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libslirp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libslirp-4.4.0-8.el9.i686.rpm 08e79c326da94cad183c40b99590f54ae17d6e4d4cbd9bc901fcabb30c9fc1d1 libslirp-4.4.0-8.el9.x86_64.rpm 0282bb34fc3b3e987068ef397ef9f23ad6bbbac4a9b13b4e8d599245c2f94e47 RLBA-2024:9236 libstoragemgmt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstoragemgmt-1.10.1-1.el9.i686.rpm 1591e6c475c60b0b0e0e9722d5572928791e7a436ca669bc02cc4b853029da75 libstoragemgmt-1.10.1-1.el9.x86_64.rpm 5827ab4b55e35897eb2404f6edc32ad18314a6673660637c7d6d9f219107723f libstoragemgmt-arcconf-plugin-1.10.1-1.el9.noarch.rpm c62002274524fac370c0d026615edd1623aa85bda34063e74a71d29422348738 libstoragemgmt-hpsa-plugin-1.10.1-1.el9.noarch.rpm 391c0afbbb1becd70281d4ea1d2531ac0186117ad792affa5aa90f660e7091a6 libstoragemgmt-local-plugin-1.10.1-1.el9.noarch.rpm 8c91ed0ef9d072cdd5ca43800129a8d717e9a723a4c6b3098b14f1d452c3c31f libstoragemgmt-megaraid-plugin-1.10.1-1.el9.noarch.rpm d762aa873b056c09124a22c1321af2149c3692646152eb2d62ec02e62585b1f5 libstoragemgmt-nfs-plugin-1.10.1-1.el9.x86_64.rpm 8b7cc51613bf23d871f00a3e505c6cde984aa74e730623ff4e835ed11b6defb6 libstoragemgmt-smis-plugin-1.10.1-1.el9.noarch.rpm 1857c5e3f924fc46ec9f8f0ce2f78cf6b8bc3f7031927f0ec0c6bcd20d470c39 libstoragemgmt-targetd-plugin-1.10.1-1.el9.noarch.rpm fe9ec585a0c79ae862a2bc8738e187eb7173aa07784a5b9855fa46abdee58d8a libstoragemgmt-udev-1.10.1-1.el9.x86_64.rpm 775c7fef4732f6626e23308e4fceabef585c0b324f637d0630508af3ffb94528 python3-libstoragemgmt-1.10.1-1.el9.i686.rpm 020dd04b542287dbba01748fe1b3558d1b6d355138758eeb4b8632eb4c635b64 python3-libstoragemgmt-1.10.1-1.el9.x86_64.rpm a825fd68db9d57ece09502a58e050f19039af986c139e22ba756edfdf0031f30 RLBA-2024:9239 wireshark bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireshark-3.4.10-7.el9.x86_64.rpm 80f861382f9764d7284c53196901913484e29eafed1fd1be97e8b90a38d76583 wireshark-cli-3.4.10-7.el9.i686.rpm fd44ff3bd9c67fb34ce0cceab539b72c3ad60d035ae344dd8f9df1a1ddfa242a wireshark-cli-3.4.10-7.el9.x86_64.rpm 395f1c119100890198d9232db783a229cde8e9c31b845105197edd23b57ac37b RLBA-2024:9247 python3.12-setuptools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-setuptools-68.2.2-4.el9.noarch.rpm 72b7afb7b6bc572cc1605ed1a53d95a30b9c91e70550b1f2c0bedfe55ee557d3 RLBA-2024:9254 openblas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openblas-0.3.26-2.el9.x86_64.rpm 62c3226ea151d067424baefc8e85220b45fd5d6b48a3ed2122cdcbe222ca7c5f openblas-openmp-0.3.26-2.el9.i686.rpm 3a88ea407dd038b58832a859c2ec23f222d276c5b109980f6273f97e64eb99ab openblas-openmp-0.3.26-2.el9.x86_64.rpm 52ab1c3d872941c374a5940b6a1669129b2c9fabf2726ae5a3daddeb8ce3e1c0 openblas-serial-0.3.26-2.el9.i686.rpm 14cdd4ba97b1a3f0d97352f758b614204426aaeeb4336f76ea40c0be7cb09280 openblas-serial-0.3.26-2.el9.x86_64.rpm 22731972d6b7ebab58b0e3e58565a69adbbb766eb575f3b6a0959ac93aaa0f02 RLBA-2024:9252 gnome-software bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-software-45.3-3.el9.x86_64.rpm 5a56151cb6bef308b39254604bffbd6cb77450e358b424cb74674b1837f39e18 RLBA-2024:9266 cups-filters bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-18.el9_5.x86_64.rpm 3dbd95ce375f12ea388505c45df78637de2b858c9371be884a728ab44ff038b2 cups-filters-libs-1.28.7-18.el9_5.i686.rpm 9c4388d416123c31f3e5342984d125002745c28994b2d94a9febcf1aac7f05fe cups-filters-libs-1.28.7-18.el9_5.x86_64.rpm 597b1f6ff698429b3c7ae9a5367f2f66d27c41d7f20e7cd767a5943e9ed5f7d4 RLBA-2024:9267 dovecot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-14.el9.x86_64.rpm d6a5c65025d667980e27c918cdb1e3fe2b873d5afaddca22048f1fcdfbff6650 dovecot-mysql-2.3.16-14.el9.x86_64.rpm ba625dc96aeabcdd19fb029b7d15c340b00d44f177483cb96352c7c4f8b4455f dovecot-pgsql-2.3.16-14.el9.x86_64.rpm ae6092f14caf44b8082151ece9412453a35d18d5869d3b4156e5e104592818cf dovecot-pigeonhole-2.3.16-14.el9.x86_64.rpm 0f499470397080858ef5a615f117d7e3fccb30873f5bf685a4e8e282da67bf80 RLBA-2024:9271 ibus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-1.5.25-6.el9.x86_64.rpm b941f6d55ecf63f9e81095f62365de6300e0cd3c1764a9e58c42a26bd70fd3a1 ibus-gtk2-1.5.25-6.el9.i686.rpm f7fb3008f39462132cf85eda04a94d57442f5261c8541d6e9cb247901c8b8cd4 ibus-gtk2-1.5.25-6.el9.x86_64.rpm 44528e1d9fcd50578cd286e1f1a3471ac3a5fe71b81b03bb4487775ba4dfb1af ibus-gtk3-1.5.25-6.el9.x86_64.rpm 9589f52a44787b3236e027948986476afaab9fae6e5895ed95ce1430a49e152b ibus-libs-1.5.25-6.el9.i686.rpm b7fa10eb220de71b901a8338a5c6e8961a2fac5d5dd45a14c12670c2b143d898 ibus-libs-1.5.25-6.el9.x86_64.rpm d76c6b098db5dc0239fc6961fc67cb576a3aeb1863ad3d3fcde2193824083dba ibus-setup-1.5.25-6.el9.noarch.rpm 168a07536b47c23d6ffa9217d860d0bc7c6aa3da27af041226c36f3e32d91a46 ibus-wayland-1.5.25-6.el9.x86_64.rpm 42296c00e7ec49610357971f9b3704e31e7486c9c0a89e3ee061ac5420e3be87 RLEA-2024:9272 source-highlight bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for source-highlight. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms source-highlight-3.1.9-12.el9.i686.rpm 27f628f1a62589a89de662e2ed68bf4d443afdfce70f01e04301a9c234eb5273 source-highlight-3.1.9-12.el9.x86_64.rpm b64c82233488fc60c2b0ddbece160e131d3c967a97b9aa35dcdd013fe99388b9 RLBA-2024:9274 xmlsec1 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlsec1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xmlsec1-1.2.29-13.el9.i686.rpm a4d480ab0bc3974d3c595c1fddbe2a970b036624f5ae1c87930f10711674b227 xmlsec1-1.2.29-13.el9.x86_64.rpm cb86ad344c6542f6697f39a36b4d485eebc3109408fd1298e9fd62685453a382 xmlsec1-nss-1.2.29-13.el9.i686.rpm 84ea864fc0edb5d54e0f5f60f572a83a4e0772125b64bcb073709eb396b9248a xmlsec1-nss-1.2.29-13.el9.x86_64.rpm 90b7e21c586d0c4552adfc5813456eb7fae2c47db527169fe0bdda1367ab75bf xmlsec1-openssl-1.2.29-13.el9.i686.rpm 5a18de8b798b5a4e0a378cded1259b8c0a1071688f5ff427550bd7babc210321 xmlsec1-openssl-1.2.29-13.el9.x86_64.rpm f7115096e02e52940b3b7653b757fbcb8e7b1429fd13ea94343e977b7f3bab85 RLBA-2024:9289 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sanlock-3.9.3-2.el9.x86_64.rpm ed7afffa626d1b79d12f3adf599d18ede917c26d1f4123b8d452a4ddbb8cbc90 sanlock-3.9.3-2.el9.x86_64.rpm 564686f82ed32ff936f8e0c1f6b42e0ad0fbfde7a6e10d806a34226522e8a11a sanlock-lib-3.9.3-2.el9.i686.rpm b2f03dbb8a164065db96d22a95f7e5616772026df0e57104cc8e3e18bd1926b2 sanlock-lib-3.9.3-2.el9.x86_64.rpm 3b452368909e36c87ec46e85d6f7e16ff37a8116943e2d25aab46631e33be54b RLBA-2024:9294 varnish bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-6.el9.i686.rpm bef00aa960db7e0e4634a66213de2a477ec4976670e7ac58b45f6f4599fc915d varnish-6.6.2-6.el9.x86_64.rpm 7bf1164396396e5260728ce850f7cf3a2262493add7967e9ab575fb07824c10a varnish-docs-6.6.2-6.el9.x86_64.rpm 8834cfc37486bdb6b93746a93dc29a2d40835d8065c65282b6f70b7b425656b2 RLBA-2024:9291 nginx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nginx-1.20.1-20.el9.0.1.x86_64.rpm 6a85c56594eba915335e384ae5a05d105b41459fdb630482667da603b5da2404 nginx-all-modules-1.20.1-20.el9.0.1.noarch.rpm 3adf5ad07ffe60ba5499482ba564e6992aa36bb8e72ac93eff5e53e18996697f nginx-core-1.20.1-20.el9.0.1.x86_64.rpm ae61c8c146c688dada925739c58bd0e8bb06e75629d91299701f2b048f2ba3ea nginx-filesystem-1.20.1-20.el9.0.1.noarch.rpm 73805e893b600e14b42dba7626e6fa2ae072b3da578f31036dcaee05ff0f51a5 nginx-mod-http-image-filter-1.20.1-20.el9.0.1.x86_64.rpm b12e5be7bee4df5468bde5352a94ecc49e08887d906318ea38a3cdf33c2fc3e2 nginx-mod-http-perl-1.20.1-20.el9.0.1.x86_64.rpm 087c35e6476963aaa185ceed9681a44cb7be402decf842a75e68e5ba849f7dd4 nginx-mod-http-xslt-filter-1.20.1-20.el9.0.1.x86_64.rpm a174497a84c8c3b24e4630406f1eed4aeab4ff17410d2ddde837f743a44bbb02 nginx-mod-mail-1.20.1-20.el9.0.1.x86_64.rpm 368b2986c1e023d5e11652ce0fd2f29b80186d3adc7b0bef334ae235508d6840 nginx-mod-stream-1.20.1-20.el9.0.1.x86_64.rpm dfa18435d9b5e0307cd810401d1a5105b0ddda31c844f0c44d9110e5a383f764 RLEA-2024:9296 libguestfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libguestfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libguestfs-1.50.2-1.el9.x86_64.rpm a866f46919aa0cf7be464e521a30e71b221ee469021fc08ebe34e825a596c155 libguestfs-appliance-1.50.2-1.el9.x86_64.rpm 297558e5b2f758256ff68667314d3c3cd2329cfb639404f6330d062fd714e9fa libguestfs-bash-completion-1.50.2-1.el9.noarch.rpm 60a63adc6b59746e0591ee0d83af4a2d45369b6b28ff7b4b0c32c381fd524094 libguestfs-inspect-icons-1.50.2-1.el9.noarch.rpm 3fdfe6d60883a9956619e00f1d359b7a5db195f39d0dfedce1df89ea1540c30e libguestfs-rescue-1.50.2-1.el9.x86_64.rpm 1630dc6120d0fd34d3090e3daed59617fd2eb8094ccb8c78716b18ba77e242f9 libguestfs-rsync-1.50.2-1.el9.x86_64.rpm 441d8b0377080290b1d2aaf092b3210f7124da78ec294ba95e68288fc0ba153b libguestfs-xfs-1.50.2-1.el9.x86_64.rpm 8e55d427eda97781986250896bb4c0737e45367484ec44c0cf914542be29cbd7 perl-Sys-Guestfs-1.50.2-1.el9.x86_64.rpm 251582f57ad9fdf17c8bc4d3675d585cf94b2b6783423fa6d4adcbbed8db1f22 python3-libguestfs-1.50.2-1.el9.x86_64.rpm d57c371368c4a0dd4cb009b16a9b090ed0bee60a50c588ac9a43d9036ab38bfb RLBA-2024:9300 libtiff bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-13.el9.i686.rpm 6709af0f6adf0feae7d25223e901ac249a093ba01e4cc20b723fca19a066e63c libtiff-4.4.0-13.el9.x86_64.rpm 0e00ec2a40085ea5a5141f9164f6a85e5a9301881685767aff65ee07d3ebcb85 libtiff-devel-4.4.0-13.el9.i686.rpm d2fc3b25d3839b6bf573e4810d14697b1161ce7d984330e7928c14ddc952f408 libtiff-devel-4.4.0-13.el9.x86_64.rpm a34c396e6403a55bb10d432d288c2ce9388b5630734b595c13510d5205d3cb41 RLBA-2024:9305 OpenIPMI bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms OpenIPMI-2.0.36-1.el9.i686.rpm 62313413bc9ef221386f0bdf3e43ca758d48a3c7ba1af97fd3c1356357eb975a OpenIPMI-2.0.36-1.el9.x86_64.rpm 64e9ad1cd2e6780c242ed5c2a232017b72cb029b0b0de78c659233fc74c8e38c OpenIPMI-lanserv-2.0.36-1.el9.i686.rpm 14509f26046d7a85c21b0e52b5edee634cbac7b87187bbda59c8b9ad70e8d6ed OpenIPMI-lanserv-2.0.36-1.el9.x86_64.rpm ffae44ccac0d00a7d6c0a6cd6b26ddab8e49ed3e28e5d01954cf414a43bba5bc OpenIPMI-libs-2.0.36-1.el9.i686.rpm df7bde0817d51f77bae4346967c17477b84da9b1986a12615ebb8cb1f3a5b3cb OpenIPMI-libs-2.0.36-1.el9.x86_64.rpm f485ec4304ae472b6d49336a6effe4155785955208d8a9e482198cacdf176e6b RLBA-2024:9310 cjose bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cjose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cjose-0.6.1-17.el9.i686.rpm be7e040e34597922c883cfef9f3e5c4b4cd7f6a544f79569a7c8b632f3dbc77d cjose-0.6.1-17.el9.x86_64.rpm 32bcce5e5a2a7674419cb5ab59217f82c7109dfb31456347768ab32aefd8e30c RLEA-2024:9448 OpenJDK 11 is no longer the default system-wide version of Java on Rocky Linux 9 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024. As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024. Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions. See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide. [1] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport [2] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.25.0.9-3.el9.x86_64.rpm 7fe0faf5fe7227258379926610e0ec4a04cc1837b6f5cf9a3503e58e68bd5921 java-11-openjdk-demo-11.0.25.0.9-3.el9.x86_64.rpm f172b098f4a4971d31b52ff2f5a8f1ee81d1a346e55ea325fa2ce2614126f9dd java-11-openjdk-devel-11.0.25.0.9-3.el9.x86_64.rpm 25327f5caf2f2994b85e821f3304d7f3250037ab4ff68f8079a20441d8d8ce64 java-11-openjdk-headless-11.0.25.0.9-3.el9.x86_64.rpm c3c3fd483ed65034e36dbd2a6b023c3953b89cd5e65487304dd22751957eaeb6 java-11-openjdk-javadoc-11.0.25.0.9-3.el9.x86_64.rpm 65865d90d7f620b215ac234c4b510e3686d834b688ec6d01713fe88eabb25a59 java-11-openjdk-javadoc-zip-11.0.25.0.9-3.el9.x86_64.rpm 07ef90f6790172217a394fb16b2f664b80bfc5ea596d20cad130aeb6b09a568f java-11-openjdk-jmods-11.0.25.0.9-3.el9.x86_64.rpm d5130c74036bc078a2708f175f7fd31fc9199659a66012e107a0ff937760cb1a java-11-openjdk-src-11.0.25.0.9-3.el9.x86_64.rpm a95c7e5f1dd2ed0448f2193f8f23fda47f855af6a48d7e983d5bc9f818bae614 java-11-openjdk-static-libs-11.0.25.0.9-3.el9.x86_64.rpm 78d2e07917f942b6173125feb978465d8474cb197d34fe3b93388bceafba6d85 RLEA-2024:9463 OpenJDK 17 is now the default system-wide version of Java on Rocky Linux 9 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024. As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024. Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions. See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide. [1] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport [2] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.13.0.11-4.el9.x86_64.rpm 0f34cc3c03baf4609e8beb46b19b530bd7f95185f3030d6edd781735861107c4 java-17-openjdk-demo-17.0.13.0.11-4.el9.x86_64.rpm aa9351db4ef2da5dfd3e679a7abba1f6564d33283b39c4cbfd19f14b1153ab77 java-17-openjdk-devel-17.0.13.0.11-4.el9.x86_64.rpm 95aa82574310a99ef1101eb55ea8eb48286e21ebef42858213063fb29c55f7b2 java-17-openjdk-headless-17.0.13.0.11-4.el9.x86_64.rpm dde484b81487f168886e46cb5d6697d293c0a756dfae23429b1ab6cf5c67b807 java-17-openjdk-javadoc-17.0.13.0.11-4.el9.x86_64.rpm dcdb1d02117f00e2a1086e6eda9267da93c4b46bbdcff1dc69f25c11e82bd37b java-17-openjdk-javadoc-zip-17.0.13.0.11-4.el9.x86_64.rpm f001d3124c67e71ecdbe3b01a9a60941e0b7a1e19e96518a54e7892d39e5d0d6 java-17-openjdk-jmods-17.0.13.0.11-4.el9.x86_64.rpm f6a664db19e3beaedb7a9de327aa104bd389c1ec915542a8d8b5f5a3b51e00aa java-17-openjdk-src-17.0.13.0.11-4.el9.x86_64.rpm 35fbf9b9632cb508a77abb7df66eb2a4fff70a9ccc00b04644cd05b8b4d11369 java-17-openjdk-static-libs-17.0.13.0.11-4.el9.x86_64.rpm 873199af165780ad77c52c5ab7a6c58db329234547b1936fd3b14fa7286891ba RLBA-2024:9466 mutter bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter, gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * gnome-shell crash on wl_copy [rhel-9.5.z] (JIRA:Rocky Linux-62993) * gnome-shell crash on ctrl-alt-shift -left/right shortcuts [rhel-9.5.z] (JIRA:Rocky Linux-62997) * Some application popups switch workspaces and steal focus on Xorg sessions [rhel-9.5.z] (JIRA:Rocky Linux-63000) rocky-linux-9-x86-64-appstream-rpms gnome-shell-40.10-22.el9_5.x86_64.rpm 67f548570067015241f3f04ff2d3824767616cf59bce24acf4ac02ca88769ea1 mutter-40.9-22.el9_5.i686.rpm 1f800f43706f43d1f2e2c0f2c7b0cc4106b6ee24af1ef1c674eff3b55ddf2fe6 mutter-40.9-22.el9_5.x86_64.rpm e67c6c431932c34cde6b5bdfb30753bdc88c9c7259fe6f14ecfa7634bf8f35cc RLBA-2024:9462 freeradius bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. Bug Fix(es): * SIGSEGV after upgraded to freeradius.x86_64 3.0.21-40.el9_4 [rhel-9.5.z] (JIRA:Rocky Linux-61557) rocky-linux-9-x86-64-appstream-rpms freeradius-3.0.21-43.el9_5.x86_64.rpm 596870c3885eda85b87c6ecf04981cc1130a93336bda44d05c29131564e869a9 freeradius-devel-3.0.21-43.el9_5.x86_64.rpm 3a907d4ba3fe9ac6b2342b43024c94994e294a879cc6f4d7a3b9ad999d9c29a5 freeradius-doc-3.0.21-43.el9_5.x86_64.rpm 61111412bae27e076bbf9c920d63b22868b2c34d57e0185ffb35cd048c0a1e10 freeradius-krb5-3.0.21-43.el9_5.x86_64.rpm 7f91a3f7c3cbcc96eb3159a9ce3bb88e9e73321085b92f3fd5d652adfc257f4a freeradius-ldap-3.0.21-43.el9_5.x86_64.rpm b174cc55879adef04d639970e5c443ff25e9bfe02de190b447caa36dbe19df56 freeradius-utils-3.0.21-43.el9_5.x86_64.rpm 8b6bef1bf5216e67bf4b5064c06f359faf1312d4c66a52e1052f89b6c48d019d python3-freeradius-3.0.21-43.el9_5.x86_64.rpm bd8c06a933ab40dcb117f8849cd5da4503d1907928a87429c5313625711dd3dd RLBA-2024:9464 java-1.8.0-openjdk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 8 at that time, which was OpenJDK 8u422, released on 16 July 2024. OpenJDK 8u432 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 8u432 to Rocky Linux 9.5. For more information about the changes in OpenJDK 8u432, see the release notes listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.432.b06-3.el9.x86_64.rpm ae049e84e292fafa8aece776476a02166b6424257e786786ba1e1c692617f401 java-1.8.0-openjdk-demo-1.8.0.432.b06-3.el9.x86_64.rpm 814da7badf40313a19a542a951bc8f7d1952999c1d732fb1791e7652d552ebb2 java-1.8.0-openjdk-devel-1.8.0.432.b06-3.el9.x86_64.rpm 0dacf837cc717624c80cf2e4ce59f52df41c5a2be248dcded4e6d7040bc7961f java-1.8.0-openjdk-headless-1.8.0.432.b06-3.el9.x86_64.rpm 4309baf39c9aa719fdef04345ebe835332976207eefeadea83c40631fb42b9e2 java-1.8.0-openjdk-javadoc-1.8.0.432.b06-3.el9.noarch.rpm 1cc278c3e7938bd05849a810f1909cfb1c1a6bc42967e2834065b271c2bfc4e7 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-3.el9.noarch.rpm feb4595ca7a86329b65f4bc2617333aabf1b0883353f601c9c30f9d0b5301a58 java-1.8.0-openjdk-src-1.8.0.432.b06-3.el9.x86_64.rpm 890b418360b10ee129231e12a51d4cbe38fcea6036778d94a7045143a81d780d RLBA-2024:9465 java-21-openjdk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-21-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 21 at that time, which was OpenJDK 21.0.4, released on 16 July 2024. OpenJDK 21.0.5 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 21.0.5 to Rocky Linux 9.5. For more information about the changes in OpenJDK 21.0.5, see the release notes listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.5.0.11-2.el9.x86_64.rpm e45ad6858bb16e74479b2c7abac707c894563df32f05c75ddb49134da3733c4d java-21-openjdk-demo-21.0.5.0.11-2.el9.x86_64.rpm 3abab1b17cda454a706a79d18b70c3bc63c49acff20de863c610bb72973afad5 java-21-openjdk-devel-21.0.5.0.11-2.el9.x86_64.rpm b1de8c72ec3ac660398ac6ac5a06e3256923bd9d75d670e697fa3979ea2c6cd3 java-21-openjdk-headless-21.0.5.0.11-2.el9.x86_64.rpm 41a25fdf7b5fb65ff4631425257d4d28e5ce3da9726ceba2566364cef42ae7e0 java-21-openjdk-javadoc-21.0.5.0.11-2.el9.x86_64.rpm 8289d34e18c4f4f65bf8f2abf76a50efe619733919ff158e795026f13ab84f3a java-21-openjdk-javadoc-zip-21.0.5.0.11-2.el9.x86_64.rpm 2450a2cc54b812b1f694f37e5ac6fe918afe6c7073274c1babe164f97c565ce5 java-21-openjdk-jmods-21.0.5.0.11-2.el9.x86_64.rpm 8a4e36ae86da885f778175d99ba42a5b94e37f1177cb8eda887eb365aa08b731 java-21-openjdk-src-21.0.5.0.11-2.el9.x86_64.rpm 072bebcee32bdda1c3d5283d95092c3c5e3489913e7149960efe2ffb943f378b java-21-openjdk-static-libs-21.0.5.0.11-2.el9.x86_64.rpm 06205b801dcf25ae7242dd7e671da453ed4ad3d0b4a1e0d14e1488dab5f2b00f RLSA-2024:10858 Important: ruby security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rexml: REXML ReDoS vulnerability (CVE-2024-49761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ruby-3.0.7-163.el9_5.i686.rpm 9a25cd85c8d81643d7732acff97c2920430c680d8903fd6341ea8364736966c4 ruby-3.0.7-163.el9_5.x86_64.rpm 29ac14e9bcffd87508de7856c193b53f0e22636b39d89af59c975467926d51a2 ruby-default-gems-3.0.7-163.el9_5.noarch.rpm a5c350c852d7f09343cfbe00900acf0b8c3ffe3937b786bbf5ca8309e6bcd07c ruby-devel-3.0.7-163.el9_5.i686.rpm 77f612e37e230ca0878f33f0e376b390d0f49b8f95e696d7b0603ae32fdf5449 ruby-devel-3.0.7-163.el9_5.x86_64.rpm 3db34b30524335f93655071eaead8b517840fce9f7f4b4af51df9633d637e4c0 rubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm e3e15f80ecd59b2ca60e189263d7b4865372bd6c8320cee10f57e1e82b30dd74 rubygem-bundler-2.2.33-163.el9_5.noarch.rpm cdfc451d598da39186c365b98deb0e32a2948788aaba4e2d5752aa6b07f2e116 rubygem-io-console-0.5.7-163.el9_5.x86_64.rpm 29100317f2d18dab4c88fc157bc62aaf6f5820c4d1e2d95b28e37996db6870a8 rubygem-irb-1.3.5-163.el9_5.noarch.rpm 0cc27955063cd72afe8f4ffd573b57441e21d3140963c94a868fcbddd095b091 rubygem-json-2.5.1-163.el9_5.x86_64.rpm 812cfe7e839cfda9a273b74c212929c4fb1c9790a28a179efa277c9226f92187 rubygem-minitest-5.14.2-163.el9_5.noarch.rpm 6a6d491aced2d193ca00652dfbc2311ae9ba58f57e690a054bd55bc03df37b60 rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm 6013de5e545c1b1ef87c3ad43e767673a6996f4b6c72143d8cf345fb520e0d6e rubygem-psych-3.3.2-163.el9_5.x86_64.rpm 9b9347efd0e1b13fe5af28848cb1bdcc5d148f6e5db9a756184cb8caaa5e7267 rubygem-rake-13.0.3-163.el9_5.noarch.rpm 519259da5ce23051e8ca382266b33c3245dccc8161a4499c273b82421ec6125d rubygem-rbs-1.4.0-163.el9_5.noarch.rpm d48255cca59db9adf5dd6beea6976e73ca03c0dd4e8fe6739afc9ccd7341251d rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm 80e2e46213e999645c89ed3d47c633a909a2dd5e8f2994ca4b439d5689227f8a rubygem-rexml-3.2.5-163.el9_5.noarch.rpm e5887f5549ec4cbcc6aa75d30269c144a50b0aea9295883e374633b1657110b6 rubygem-rss-0.2.9-163.el9_5.noarch.rpm 3e2b82f2cf471d15f60f18485dc81f26f76b07a1336a9f44452b1f8938bd783c rubygems-3.2.33-163.el9_5.noarch.rpm 8cd280f68721ff773c87942525c71c135fc03283351831d1b5cbfeb0f6a6d842 rubygems-devel-3.2.33-163.el9_5.noarch.rpm 065382cc4ebf7923bcfd27aabb0539cb86f1ae78a65b8c40de9f7bbd68e9828d rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm b859d3f1fa8ed72ae753e4f01176b4f737d92e2aa5e428d5f68ac6e1d8506ce2 rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm 66bfc80c06ea5babd07692fd86d680b1c1f001b691429c6c65186d55965e5501 ruby-libs-3.0.7-163.el9_5.i686.rpm c9819a8286cbb452528cbb9d3a093a94f885d807236695a0f44f57bfc7ee7836 ruby-libs-3.0.7-163.el9_5.x86_64.rpm 738cead901fa2df5f68daa3758dcc3cefa4e8ee4838f03d7eb3b3b7e476132a8 RLBA-2024:9567 .NET 6.0 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 [rhel-9.5.z] (Rocky Linux-65365)Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.136 and Runtime 6.0.36 [rhel-9.5.z] (JIRA:Rocky Linux-65365) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.36-1.el9_5.x86_64.rpm c841f069d20d896bd6b57688bbc943cd984498e1dbaa169cd57b8c13e4df6e61 aspnetcore-targeting-pack-6.0-6.0.36-1.el9_5.x86_64.rpm 1fa55047642bb213e6afc028addb1a9ea2273338dbb4cdb0c50c0c74bd734133 dotnet-apphost-pack-6.0-6.0.36-1.el9_5.x86_64.rpm a67e0ffbe0895da7e95a0466c64b1a92cea16418dbdec6eec0c27f9ee61b7535 dotnet-hostfxr-6.0-6.0.36-1.el9_5.x86_64.rpm 0158f077190b91201d7216e52ce2ff2dfde7342b8ba75792a794feec0a5a9e86 dotnet-runtime-6.0-6.0.36-1.el9_5.x86_64.rpm 6e7441f5adc725272a9b966ba9766c2aef3f5a33b7f45806eff603ea3fa1f642 dotnet-sdk-6.0-6.0.136-1.el9_5.x86_64.rpm 8c4433a9f8807a72570470edb9f0bf115416da72f48766c199c3f3b8a0c4c866 dotnet-targeting-pack-6.0-6.0.36-1.el9_5.x86_64.rpm d28dcfd6c4b631012e66cd47e6227884680fd75fdff9a404c9adb67a3f81ce7e dotnet-templates-6.0-6.0.136-1.el9_5.x86_64.rpm 47cfed3b835477f82eea6d6e1bf20625af5baefe87abcbc5adae3c89e28ebe4c RLBA-2024:9683 evolution bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-9.5.z] (JIRA:Rocky Linux-62680) rocky-linux-9-x86-64-appstream-rpms evolution-3.40.4-10.el9_5.1.x86_64.rpm d6f2e51cc80592c3cf2651b0462feba05a9475b5d21cea1899da61af12725859 evolution-bogofilter-3.40.4-10.el9_5.1.x86_64.rpm 52f1faf66655a2b7999f631d9e6d7d4be1fad3b914f7038f15db9c0972b4d439 evolution-help-3.40.4-10.el9_5.1.noarch.rpm 0b54cac31f654fcac4f363a6a1f6523c97112f70b41e86a2da0fcc1acc214db6 evolution-langpacks-3.40.4-10.el9_5.1.noarch.rpm 1f82734bd3ef4790afb5754d186f24697258d96a7116afd45148963ec67e9c04 evolution-pst-3.40.4-10.el9_5.1.x86_64.rpm 3691d678f6873cda347ad212725b53239db1ae7b4e86f54e2cadd66c4d85f865 evolution-spamassassin-3.40.4-10.el9_5.1.x86_64.rpm bd1e802bf0f9c1413ab66e5df3bf0d8c979078dda49267564c034d02041bde87 RLSA-2024:9827 Moderate: libvpx security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvpx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Integer overflow in vpx_img_alloc() (CVE-2024-5197) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libvpx-1.9.0-8.el9_5.i686.rpm 44ccc6147c34f1ad83b012559e34458f44b18168b582133e96fba316ad92259f libvpx-1.9.0-8.el9_5.x86_64.rpm c28e54f6e4ee62a7e60fee71f951bffe40fdf11498e6b8e321bbbabdd9bd5067 RLSA-2024:10978 Important: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Unbounded memory buffering in SelectorSocketTransport.writelines() (CVE-2024-12254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.5-2.el9_5.2.x86_64.rpm 13068b3d2d159d3dd79bb8bd9292ab441e3cedec06a856108ed41b17671415ee python3.12-devel-3.12.5-2.el9_5.2.i686.rpm 27835d17dc8d471df1aa98464c3aaa5f64b080af59fa82f00b74d98f35eb05a5 python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm 2e85915155d7a00d0d450f43bd77e9af1b7fdafc06df10046080177f9a640ac5 python3.12-libs-3.12.5-2.el9_5.2.i686.rpm df823df61d3ea03fe21b4c12f67e7a0b92cd20c758e161773dc08ac626103295 python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm 734619b3748242eb68db1a140490d525d5816efa5f99e8b80768d6c4a6f2cf31 python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm 4dbf4922fa735cb19eb96909e1e999dd739f648fcd606b79af80e1faec8e8bf5 RLSA-2024:11111 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.9-7.el9_5.2.x86_64.rpm 4102b3d8fa4c7e88d42bb789af82f5eff01363fdbbc2c8e857e9007e17c1be14 python3.11-devel-3.11.9-7.el9_5.2.i686.rpm 9e0849fba38aba89b912d4d5772d7cbc27b911c0c3ef339534c2402656148ce6 python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm 9bf5ef11ab19ddbcb5a3b23314aad46ba40ee883bebd4c8e41dc4f3c2ae2e4df python3.11-libs-3.11.9-7.el9_5.2.i686.rpm 954b9a12254755d9652ffb9c600448812f8b842ad7b9f470ffef1c72d8a57d43 python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm d397384c6b20308123b4da6baf43e9b3b753482b69fc5c54e71204697ed9f1b3 python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm a7b6a3cb91a3e93d0ec42711d8ac6a0339538aa1672bd43ddd1150ddf32bae78 RLBA-2024:11218 nmstate bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * Disabling ipv6 on ovs-interface is failing due to verification error [rhel-9.5.z] (JIRA:Rocky Linux-60242) * nmstatectl gc mode does not support blackhole routes [rhel-9.5.z] (JIRA:Rocky Linux-58666) * nncp route-rules applied breaks br-ex connectivity [rhel-9.5.z] (JIRA:Rocky Linux-60261) * nmstate: Connectivity issue with a configuration has `ipv4 dhcp: true` and `ipv6 enabled: false`. [rhel-9.5.z] (JIRA:Rocky Linux-61899) * Pod interface removed [rhel-9.5.z] (JIRA:Rocky Linux-65031) rocky-linux-9-x86-64-appstream-rpms nmstate-2.2.39-1.el9_5.x86_64.rpm 91797a2c427d42023af2a7b9c3da1576a399f16103985b2c2efd6a27dbee594e nmstate-libs-2.2.39-1.el9_5.i686.rpm b0b34daa24bef8bc12c31203930372cacb228a6738c64514db325f3290d1fe9e nmstate-libs-2.2.39-1.el9_5.x86_64.rpm 2e4bb5b3a04834495df52ad55c6e2d9eac5d95778ae5e6c36e9e3884cb1e6634 python3-libnmstate-2.2.39-1.el9_5.x86_64.rpm 2079ab9ad2767aed2515064f21822116efa3d65f969bb2c4ffaf6733f728a152 RLSA-2024:11219 Moderate: edk2:20240524 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * edk2: Integer overflows in PeCoffLoaderRelocateImage (CVE-2024-38796) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20240524-6.el9_5.3.noarch.rpm 4028b087e6ae46a5aa42437a1a23327bd87d42b19b7c98774b5211ed6500c120 edk2-ovmf-20240524-6.el9_5.3.noarch.rpm fc0caf09a366d9af2744b360332c131580cca70d734a06cc6db99a13300aff34 RLBA-2024:11223 javapackages-tools bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for javapackages-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The javapackages-tools packages provide macros and scripts to support Java packaging. Bug Fix(es): * javapackages-tools: Make OpenJDK 17 default JRE/JDK [rhel-9.5.z] (JIRA:Rocky Linux-62403) * javapackages-tools: Include java-21-headless in generated auto-requires [rhel-9.5.z] (JIRA:Rocky Linux-62409) rocky-linux-9-x86-64-appstream-rpms javapackages-filesystem-6.0.0-7.el9_5.noarch.rpm a888ded88c325405d7bb3edeef9e1da54543f018eeb815c1505ec156310def9a javapackages-tools-6.0.0-7.el9_5.noarch.rpm 19596e1a8e86530a7a8e7614fc9413f51ebc3f2661a13dcf8d7f6cc6c8defe20 RLBA-2024:11224 ostree bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * [9.5] ostree Backport https://github.com/ostreedev/ostree/pull/3300 (JIRA:Rocky Linux-62772) * [rhel-9.5.z] Rebase ostree to 2024.9 (JIRA:Rocky Linux-68351) rocky-linux-9-x86-64-appstream-rpms ostree-2024.9-1.el9_5.i686.rpm fb7ab56eb742f2bb7c815b3b81d9b17e4598d74ddc31762835621aec8953763c ostree-2024.9-1.el9_5.x86_64.rpm da76a6c72e048a96795048b2a121e84e3836c058c40a092d1a83844112b8caa4 ostree-grub2-2024.9-1.el9_5.x86_64.rpm 97a1e8fbadd7e27c4e41b71d8e0cf6bd0decd739d966a9edf0ba31397809f5ab ostree-libs-2024.9-1.el9_5.i686.rpm bfc9ef78f9af89c68c968d63621d5f7992564bd87d9963e4b453f9660d29f0a6 ostree-libs-2024.9-1.el9_5.x86_64.rpm 39465a886eb548b4e6588b945882d3217cc3eeb7a3dc516e9f95d4a9d991b28c RLBA-2024:11228 bcc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool. Bug Fix(es): * The bcc-tools 'bio*' does not run as expected on Rocky Linux 9.4 [rhel-9.5.z] (JIRA:Rocky Linux-65192) rocky-linux-9-x86-64-appstream-rpms bcc-0.30.0-7.el9_5.x86_64.rpm 997bbef1ec36898140473c80662a11bcbcd5362fccba5a97065c9f272aff5c88 bcc-tools-0.30.0-7.el9_5.x86_64.rpm b4bb4c9beddf04080adff014cdc893f8be40a6946f372897680fdd2754271487 libbpf-tools-0.30.0-7.el9_5.x86_64.rpm 449b823363c9afbc98e996fb22be564886c50ff9cb3316feae31c445a6e949f4 python3-bcc-0.30.0-7.el9_5.noarch.rpm dca9c4ef964bd159a3ffab66aa8ac17e2450a305ff1ea772911b725a57d1732d RLSA-2024:11232 Moderate: unbound:1.16.2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-8.el9_5.1.x86_64.rpm 63d604946e0315e41ac915ae62a46a0cb5780feefdc9e783e633e28982274c62 unbound-1.16.2-8.el9_5.1.x86_64.rpm 759adfb91086882c1ece12f110c97b10836e34ed5fe53249f3fb1f0a557f1ee9 unbound-libs-1.16.2-8.el9_5.1.i686.rpm aba7529f4ac1d0284d87bfe2dcd32c8effefd9e089786d461adab50e0c3c5653 unbound-libs-1.16.2-8.el9_5.1.x86_64.rpm b0547915c6918dfbf0d0d21db6c6de8633a65c106a8afe4191f509e077869a53 RLSA-2024:11237 Moderate: libsndfile:1.0.31 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() (CVE-2024-50612) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsndfile-1.0.31-8.el9_5.2.i686.rpm 7767650e71fa0c4e60a1ebafbdda829bf5dd8b4377c5ed3e93d6c6a74851042c libsndfile-1.0.31-8.el9_5.2.x86_64.rpm ff30d83abd19537a9c052d588451755e8b1d8fb0dd82529ef71dc19f1fa28bc7 libsndfile-utils-1.0.31-8.el9_5.2.x86_64.rpm c0e96773576e9439b7fec11c42cd95d50c50761db79389c776ee6e3be3a6ac7c RLBA-2024:11241 seabios bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for seabios. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The seabios packages contain an open-source legacy BIOS implementation that can be used as a coreboot payload. They implement the standard BIOS calling interfaces that a typical x86 proprietary BIOS implements. Bug Fix(es): * amdgpu failed to initialize when multiple AMD MI210 GPUs assigned and firmware is seabios [rhel-9.5.z] (JIRA:Rocky Linux-68955) rocky-linux-9-x86-64-appstream-rpms seabios-1.16.3-2.el9_5.1.x86_64.rpm e99001e25c9dd6ef4a0336ff2c1701e444892ad6dc4a7c5c4ff345623292bf99 seabios-bin-1.16.3-2.el9_5.1.noarch.rpm 8928d209011e99e7f23d8c3a0053bc3e0a6c6c6e9a68251e2c7ef0125f288c3e seavgabios-bin-1.16.3-2.el9_5.1.noarch.rpm e34541684cb8c726bc494c91ef3fc57c134d841f496834823fcf68c7b696b125 RLSA-2024:11242 Moderate: mpg123:1.32.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mpg123. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mpg123 packages contain real time MPEG 1.0/2.0/2.5 audio player/decoder for layers 1, 2, and 3 (most commonly MPEG 1.0 layer 3 also known as MP3), as well as re-usable decoding and output libraries. Security Fix(es): * mpg123: Buffer overflow when writing decoded PCM samples (CVE-2024-10573) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mpg123-1.32.9-1.el9_5.x86_64.rpm f0b39d7451f8e981bf43035698f4f5102e8067a999e5cbcb14e7a3a7dbd40c8a mpg123-libs-1.32.9-1.el9_5.i686.rpm 91ed0a46c8067d14de528bf8e676566bdcbdb1129649a869ae0b8a19d45e17e4 mpg123-libs-1.32.9-1.el9_5.x86_64.rpm 99bc4d1b58905a0d0418216990031577a04dec76433cb3cede0eee7f73566c00 mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm abe8ea2011681d83613ae760a27443c7acdf2f047c590214c98f49ffd03b8d56 RLSA-2025:0312 Important: raptor2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for raptor2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. Security Fix(es): * raptor: integer underflow when normalizing a URI with the turtle parser (CVE-2024-57823) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms raptor2-2.0.15-32.el9_5.i686.rpm 46f70588fde2371004e52db687ac3c330186f9f76f2f47e5835422ed3c64ce44 raptor2-2.0.15-32.el9_5.x86_64.rpm 8148637e35151336d77865df95bfe868e0303042a537953f0d7273b4db20f2b1 RLBA-2025:0515 libisoburn bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libisoburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libisoburn is a front-end for libraries libburn and libisofs which enables creation and expansion of ISO-9660 filesystems on all CD/ DVD/BD media supported by libburn. This includes media like DVD+RW, which do not support multi-session management on media level and even plain disk files or block devices. Price for that is thorough specialization on data files in ISO-9660 filesystem images. And so libisoburn is not suitable for audio (CD-DA) or any other CD layout which does not entirely consist of ISO-9660 sessions. Bug Fix(es): * genisoimage doesn't work after in-place upgrading OS from rhel8.10 to rhel9.4 [rhel-9.5.z] (JIRA:Rocky Linux-74055) rocky-linux-9-x86-64-appstream-rpms libisoburn-1.5.4-5.el9_5.i686.rpm 9a05c2a6290a0b7a77b13a9f943b91ae1d1d6fe509367843c91f6c35ba76e918 libisoburn-1.5.4-5.el9_5.x86_64.rpm 2b817f8886b909c7d019c018676c0b832eb2bca710048b63e48dec189c4732a3 libisoburn-doc-1.5.4-5.el9_5.noarch.rpm 7ef427434f6cc2f95008499afd173639cc47f958e061b01216833146523ecaf9 xorriso-1.5.4-5.el9_5.x86_64.rpm f5402d307ea85081a427abf9a533ec0cf0bd6a44b176a98caa4aec0210b6261f RLSA-2025:0914 Moderate: galera and mariadb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for galera. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a community developed fork from MySQL - a multi-user, multi-threaded SQL database server. It is a client/server implementation consisting of a server daemon (mariadbd) and many different client programs and libraries. The base package contains the standard MariaDB/MySQL client programs and utilities. Security Fix(es): * mysql: InnoDB unspecified vulnerability (CPU Oct 2023) (CVE-2023-22084) * mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) (CVE-2024-21096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms galera-26.4.20-1.el9_5.x86_64.rpm 0b78850c1ab174d01bedd92644d2fc1cde8128862f08fd4100508bc7426b9eed RLBA-2025:0915 389-ds-base bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Bug Fix(es): * Wrong set of entries returned for some search filters [rhel-9.5.z] (JIRA:Rocky Linux-65775) * deadlock during cleanAllRuv [rhel-9.5.z] (JIRA:Rocky Linux-66138) * cleanallruv consums CPU and is slow [rhel-9.5.z] (JIRA:Rocky Linux-67163) * Freelist ordering causes high wtime [rhel-9.5.z] (JIRA:Rocky Linux-70257) * Some nsslapd-haproxy-trusted-ip values are discarded upon a restart. [rhel-9.5.z] (JIRA:Rocky Linux-74350) rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.5.2-5.el9_5.x86_64.rpm f1e37499168fbe013568f78443996b34453bc9327df36bf103440dbf58f6c0e9 389-ds-base-libs-2.5.2-5.el9_5.x86_64.rpm 4f935010f4e0c1222ec95cd23defc6b0fe97e24b67fba638aa24ac279602cc5d 389-ds-base-snmp-2.5.2-5.el9_5.x86_64.rpm 2949bc42fc13e91dd30c17b8562b6488df2b9ba70b7c893b1e4a5f58eb408269 python3-lib389-2.5.2-5.el9_5.noarch.rpm dd44408b0b595fffda8f1accda4d4000156e4f3cdf2e8b225fe6f0c07c19a7eb RLBA-2025:0924 ipa bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * kinit with external idp user is failing [rhel-9.5.z] (JIRA:Rocky Linux-76011) rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-1.el9_5.4.x86_64.rpm ad68dfbcc60bc941214fed5b58cfd8be2325563aa852fcaaeae5135e53e088fa ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm 84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4 ipa-client-epn-4.12.2-1.el9_5.4.x86_64.rpm 5acd3bee384607d33a1273676fc51913ee889e593d8ee05065e51096f92a904e ipa-client-samba-4.12.2-1.el9_5.4.x86_64.rpm ebadfb136d57fbf665b2e947612deb5ca60c531a25eaa1475e6881106ed18b92 ipa-common-4.12.2-1.el9_5.4.noarch.rpm 36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705 ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26 ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm 8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037 ipa-server-4.12.2-1.el9_5.4.x86_64.rpm bdb694b073494c919c1cc9f8a57a3e15754618fd934b138a7d78fa493714dbc5 ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm 3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700 ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm 2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547 ipa-server-trust-ad-4.12.2-1.el9_5.4.x86_64.rpm ad08b2754469eee2fd7d272d2a778660e6d81d520133e79526a6dcaebf1cfaeb python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm 1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3 RLBA-2025:1512 virt-v2v bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible. Bug Fix(es): * Migration Plan / vddk pod cannot remove open-vm-tools in case of dependencies [rhel-9.5.z] (JIRA:Rocky Linux-78842) * CentOS 9 Migration from VMWare to Openshift Virt fails [rhel-9.5.z] (JIRA:Rocky Linux-78844) rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.5.6-8.el9_5.x86_64.rpm 92b38043a527eb79ef3d5965bbf1375f0794f4bebcf8d6d9695970d415bcd5fa virt-v2v-bash-completion-2.5.6-8.el9_5.noarch.rpm b8669fb849e05a6db73a8af36178cad0cd4a71997a956d8f443dc03dd74a098f RLSA-2025:1670 Important: bind9.18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) * bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load (CVE-2024-12705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind9.18-9.18.29-1.el9_5.1.x86_64.rpm 01675a7a1f0c7fc392673e4b042cd86edd01f482b313eac735bd2f6e98a88d6e bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm e5ab34561a296d37914f352154c49e2f82bca2e87f3755d57675df9b9e70dd67 bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm c944af447d7755750ca3c66653452d5eb9196100b5890ec2b9a46745a729247f bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm 2a3aa8c8bdf987e778187c892ce5eda9ac9bbad78a10faffacc5c9c38109e0c7 bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm 99a331b6d6d78f2050a583123205336d1d50218adcad3e0565133f65781cbb99 RLSA-2025:1671 Important: mysql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) * krb5: GSS message token handling (CVE-2024-37371) * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264) * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238) * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196) * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241) * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231) * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197) * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218) * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201) * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236) * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237) * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203) * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212) * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219) * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230) * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213) * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194) * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199) * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193) * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198) * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247) * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239) * curl: curl netrc password leak (CVE-2024-11053) * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497) * mysql: MySQL Server Options Vulnerability (CVE-2025-21520) * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490) * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529) * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531) * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504) * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540) * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555) * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543) * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491) * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525) * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536) * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521) * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501) * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534) * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494) * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519) * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522) * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503) * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518) * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559) * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546) * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500) * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523) * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mysql-8.0.41-2.el9_5.x86_64.rpm 235a4a25de5c86a52fb7080f3f2705979c306c4c1a56aa34d8d5898a02935123 mysql-common-8.0.41-2.el9_5.x86_64.rpm 6fbc9d6ce606ab1117f51b10d4f5238daddc7512a9f6fdfbce476291d8d9c366 mysql-errmsg-8.0.41-2.el9_5.x86_64.rpm 7a63a79c21b351391c7846c11fc9cfee952ca4a727285050b3bf016ec41213f9 mysql-server-8.0.41-2.el9_5.x86_64.rpm 6628e5c2a07528191427efcc77602cd49fb3d37a03664e47a77b359583816251 RLSA-2025:1681 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-24.el9_5.3.x86_64.rpm fb11ef35fa96b1fa61a798ac856c4c996711d5a1546136a5a45af7b77d63a9ab bind-chroot-9.16.23-24.el9_5.3.x86_64.rpm 1fbfa8a427dcbd478fe3f59bf1e173747d6f37ebb4c7f7d1b05af7a6b72bc459 bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm f571985b61f890be72f6f070cfb42cf642c8dca0a5303f438f9e2d4435142613 bind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm 057b77bd05909e3810d31a6487b6860c244d82c6e6e5993a9e1eaec431be1533 bind-libs-9.16.23-24.el9_5.3.x86_64.rpm c1e198fc362a6cdbc2f3a00f671d9e80c34292930f94763fab99d611a8695bf5 bind-license-9.16.23-24.el9_5.3.noarch.rpm c4c4c242889fa4d75748628e15265b7dbc19d40115679b4ee2355f2663cf12e6 bind-utils-9.16.23-24.el9_5.3.x86_64.rpm 33f70dd2375726850c715c06b2481250774d0923176142f50dc7d82b2e6f6254 python3-bind-9.16.23-24.el9_5.3.noarch.rpm 454965885e9940851b833d59a8f15dace7d3f6042aaba3862b9f1142c362816d RLSA-2025:1742 Important: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.20-1.el9_5.x86_64.rpm 12475508121ea1d0411ccd91fce29369a885dac6f22c8c228b19e3ccff51fead postgresql-contrib-13.20-1.el9_5.x86_64.rpm 62f0c83dce23469d8395205bdbb91c17f07ee770c1426ede8a7d03c777e9b3a2 postgresql-plperl-13.20-1.el9_5.x86_64.rpm 9a588c7fbd88883a16530a7d954cb597cd8653248180eae92938c5f751cab85d postgresql-plpython3-13.20-1.el9_5.x86_64.rpm 6c14fcfa34ed041381cb56a62de98d19ba45801ff0d1ffd1643a5df84c7b7d08 postgresql-pltcl-13.20-1.el9_5.x86_64.rpm 56429951e32541c8cec675f4ac7e337c6eed612653a384545510b7133a7d0f81 postgresql-private-libs-13.20-1.el9_5.x86_64.rpm 21290dab36b52a2b7e9a9b1767cfaa0102c633281ac539d45c1cca76eab44335 postgresql-server-13.20-1.el9_5.x86_64.rpm 785e2b0393615e87e76c8fb05b5dc6d3db201f84d1476753c1d89976746eb769 postgresql-upgrade-13.20-1.el9_5.x86_64.rpm f2430ecf521c694e030963abd54e58a96fe51652f83d7e8353df94b8e7f9ccfa RLBA-2024:9087 ignition bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ignition-2.19.0-3.el9_5.x86_64.rpm 345045a8c337f8b8a06234d99fd1871f6b831aac3fed3c4d19023397a89514a1 ignition-edge-2.19.0-3.el9_5.x86_64.rpm 6d544d0718315ac7bf674f22931d68f021cf99b4388057d6a4a8ed18a0b9b60a ignition-validate-2.19.0-3.el9_5.x86_64.rpm 5e4a9003e298c464a397a35a54d06229212e801523f8bcf08c78a94e8c4469e0 RLBA-2024:9085 cockpit-composer, osbuild, and osbuild-composer bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-composer, osbuild. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-composer-52-1.el9.rocky.0.1.noarch.rpm 3d09ee06a9bd28bc891131bc5b06080d7a29bade513ebc978e245448f81bb2d9 osbuild-126-1.el9.rocky.0.2.noarch.rpm 1fa656fbf4780993db7ac95e247429b95fcb63e047378fd79401e16f6043027e osbuild-depsolve-dnf-126-1.el9.rocky.0.2.noarch.rpm 2ae11a9f0238550c58be634d78ebccabd5b2cadd3cece80197914af53a96d4c5 osbuild-luks2-126-1.el9.rocky.0.2.noarch.rpm 3b285f6931f5d6c3ad53286385b41db641cb54bfb923ccccc3c915afc19b7aa5 osbuild-lvm2-126-1.el9.rocky.0.2.noarch.rpm e2175ba6c078ab43f2a4bb8040d4a7eed96494f7576c58c19aa34467a3758907 osbuild-ostree-126-1.el9.rocky.0.2.noarch.rpm 37118f31799de9e0c1fb9320d5d9a6a17341ad8df8d4ced58603ae5718cfce3b osbuild-selinux-126-1.el9.rocky.0.2.noarch.rpm 1b21c0509ac41008e07701e845672cff53d46e54742a5d6fc0d0c35381e3bae0 python3-osbuild-126-1.el9.rocky.0.2.noarch.rpm 44a894b74e38807473ae47cd8397c3f80f74a91d2c06ee2a136648b9aab6e3eb RLBA-2024:9090 container-selinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-selinux-2.232.1-1.el9.noarch.rpm 7d4b02ee61a19c7b18ada3d509fcab9a677124155bfbc92731c2d48a4b11eac8 RLBA-2024:9094 fence-agents bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm 13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb fence-agents-compute-4.10.0-76.el9_5.1.x86_64.rpm 1cebfa38f6802d639582bc993e76663aa6d2d3d96b4a0bdf573932156df6a392 fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm 979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704 fence-agents-kubevirt-4.10.0-76.el9_5.1.x86_64.rpm 8e7a84e36d56b29c115ef6ff1ce914bc9feba4c2fea9f60a73869c82fade5b1b fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm 90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073 fence-virt-4.10.0-76.el9_5.1.x86_64.rpm 408112bfa50d8d99a3a1081008428254532c7964c4bac5aa220f0f8455c4ff43 fence-virtd-4.10.0-76.el9_5.1.x86_64.rpm b42a2c3b074f0f14241c9e798f32469351f236f93049f3d984bae92db82923ba fence-virtd-cpg-4.10.0-76.el9_5.1.x86_64.rpm 24d4dfb0ea048c3ddc63b9fad0265ef8dc5d69740dbc47dffd73ed9ae8d092b6 fence-virtd-libvirt-4.10.0-76.el9_5.1.x86_64.rpm 3d16376833af531b2e8c6ca168370b539486e5199c3ec3ccb848d612288ec4f9 fence-virtd-multicast-4.10.0-76.el9_5.1.x86_64.rpm 3a42cbf09e1a2e1cf984a0df6412c8a5a0d2fcabd8697b8dafcc2605b82672dd fence-virtd-serial-4.10.0-76.el9_5.1.x86_64.rpm 1b6d159a4422a8015a506059e74865c51ff848e0936a8af5bd6c6fc22e2242f4 fence-virtd-tcp-4.10.0-76.el9_5.1.x86_64.rpm fe5accd323eadead37a910fb95b5b0572500cb76231d54cd5459fd27dcc35c03 RLBA-2024:9134 cockpit-podman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-podman-93.1-1.el9_5.noarch.rpm 3e2b3a6a2f195881971b73c84b6236a4f23b9865e5b0c4e4c02caaa9951aebcc RLBA-2024:9099 crun bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.16.1-1.el9.x86_64.rpm 11367280a1264c51a93f4294ceef6cd8a50b06e85953c45d530946042c597faa RLBA-2024:9104 perl-Scalar-List-Utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Scalar-List-Utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Scalar-List-Utils-1.56-462.el9.x86_64.rpm 3c28f6e6e2610c33cab2282fe4db7e0d0316537e81ab33c70d9571ef4daf5db6 RLSA-2024:9102 Moderate: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Symlink error leads to information disclosure (CVE-2022-4122) * containers/image: digest type does not guarantee valid type (CVE-2024-3727) * golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.2.2-13.el9_5.x86_64.rpm 776a1adad50d599bbb42e73a7238f4dba5625ea1a8eeabc9bdd0467ab83c8ac2 podman-docker-5.2.2-13.el9_5.noarch.rpm 53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4 podman-plugins-5.2.2-13.el9_5.x86_64.rpm 6475de32f2e34ea1cb53d6f5bf38d3cb841cd218577bd2e275e30247e3458d91 podman-remote-5.2.2-13.el9_5.x86_64.rpm dfb5d2ac5934ec5f86f766c9f13016e8562ca7379de9e78d3f6d73794c7369cf podman-tests-5.2.2-13.el9_5.x86_64.rpm 0a01a3fa387d5267fe206918dfeee547fa4905c18c0b95aa6f65be29c2cee344 RLBA-2024:9108 python-podman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-podman-5.2.0-1.el9.noarch.rpm 6a8a0886b35552581b34d1a218fe592ce4963af02d7c3c45165815666870b931 RLBA-2024:9109 udica bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms udica-0.2.8-2.el9.noarch.rpm 610f5b8e97ffe4871beccf3688d9e41d2b14577d030d9e5b4d7c703572915ad8 RLBA-2024:9113 python-awscrt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-awscrt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-awscrt-0.20.5-3.el9.x86_64.rpm 37ea6507f1e7f5af1678e4b2ff33ce27d1fd2d84c91325c13397f98eca7ee908 RLSA-2024:9114 Moderate: gnome-shell and gnome-shell-extensions security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. Security Fix(es): * gnome-shell: code execution in portal helper (CVE-2024-36472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-classic-session-40.7-19.el9.noarch.rpm 9d56ad1efffb0505aef270d16fa10b925d4c464437446f9545372dfe8f74de3c gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm 04befb8843268be3768c13590e97ed0156d70f1d63f9290686936c1b10f2794e gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm 2aae479e0529020808288a9ff57b5071e086885e130a0c0b59dca6eb3e41ad3f gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm 748abdbc93f1a3be0252c7c979efd04aa01b15a32b27278520813dd025a43461 gnome-shell-extension-common-40.7-19.el9.noarch.rpm c0ed95b34ce76e52d1f7c56d574c5c17a55743ad8cd8d96a93a8f3c431f9e2ba gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm d18c87bc15410b9149a48a2ff0167bd92d1c5dd81842cfbc7041c5d3326bd65f gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm c583fc900fd4cb149cf77c1a6b7772553afa6acd6b56b65525134bea03eb1b63 gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm e969204ecfb677284ed522e5e87f41eb3ee720bbcc7e0f18bb16e83f60cf03c7 gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm fd7fff23154a2ebe2d3ec3f00fef1f39a18e4bca9014145a0608b71852a516ff gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm 2154c9b1458a62d39bc71dab882216aaea1016d5be0bc8d06e7a612298de4561 gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm f6bd4aaf4af84094c78ad1d20e98c4cb80dbea0b296aaae38f328badfc7c0d52 gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm e2eeef07eddabeeb2617cd5dc93ef46fd28cd92c0b08c1751eb8b29a4e63257d gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm 994db90c66c3279e7abd3f2b3d202b1c5f1a38e6f8b9f080441e5d904e0dcc4a gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm ee5b542877d939baad1e3e8db0421002e3efa7efd8d998223cf68f8adddd23b4 gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm d320c5c9978c03b4ad39efc47d79899bbf6949e9a35e42d5aa8faffad8ed160d gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm 6254ccc209b2c418c8056ba388644fe3074e1abc3fa32982ee7a0a55771df904 gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm 1e349076d56ae439a25f867bdeb575a5965e6299973d3c4d7233fc278c1a84be gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm 72b58c32acd2639980f9724e2aee789175da2270c0e29f3237bad5fab63825bc gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm 9053ddb883f3f6fe8754c1812e45a33572399612d819a27b493c6cc60d031aa2 gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm b435739929319521700a5baad9137e65d455c35be9816f41f09163be71e6bb79 gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm 9cb0658cf8e14a4ac58208b349b1de89ffdbf6ec26281e4c849f8cd2651441d6 gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm 4d06f40f88f8ee5c3d8c4702b5fac5f2350908c090cfb748e5f6dc1003917ffb gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm 6b46eff306b622851fc92b5262f5495fcc4a69aa4f8eebc098d51d394439733d gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm 97301e4b2a2cf09b2fd89e531318105ecd4d64581009defdd327002b9ff23a8a RLBA-2024:9116 conmon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms conmon-2.1.12-1.el9.x86_64.rpm 1c273b6c99bebdab8bbca9b03fa3523961697ac68406248e58bf62373f05913d RLEA-2024:9119 rhel-system-roles bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.88.9-0.1.el9_5.noarch.rpm db22cba6eaab627bc6e9d7530c533316da5cde071fee75a01da30d06bfbcfb1e RLBA-2024:9117 delve and golang bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.22.1-1.el9.x86_64.rpm 3eeb63858fdc51f679879469021cc0723f1e74f44c43d7c5d50c44349edf3391 RLBA-2024:9124 softhsm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for softhsm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms softhsm-2.6.1-10.el9.x86_64.rpm c1516b627a79c03c558f8a392357088f5cc53dab047d27e832da3292f8674a2f RLBA-2024:9121 gnome-settings-daemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-settings-daemon-40.0.1-17.el9.rocky.0.1.x86_64.rpm ef53ea2bccdc294ecb70c04dd6b2b4762636b71d90106abb366caf9404cb516a RLBA-2024:9127 cockpit-machines bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-machines-318.1-1.el9_5.noarch.rpm 65b8ace4816f2b5748d2bc504a8b5dd2ba3a2ac369020770a4c08e235330fea4 RLBA-2024:9129 cockpit-ostree bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-ostree-204-1.el9.noarch.rpm 8d9e7f519c13956642bdbfea9b2c3c882f7d3e4c125e88009015e15e8442c298 RLBA-2024:9133 mingw-qemu-ga-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw-qemu-ga-win-108.0.2-1.el9.noarch.rpm 98cf624f95171cbbfdad921fb95be8c075aab7970ab1a85c5ce0ff22e134b500 RLBA-2024:9132 open-vm-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.4.0-2.el9.x86_64.rpm 7e67f61e4e4aae18fab276fb30cbddaf974d1db95139f4d79eb2886186f6108f open-vm-tools-desktop-12.4.0-2.el9.x86_64.rpm b28927f0d32b1e61e6495397cbad12dcbce54f00d1a20264cc0d3aeec4550a30 open-vm-tools-salt-minion-12.4.0-2.el9.x86_64.rpm 9a80dd662605247fea513e34d0ef5ec7ce944e88b6a22f4b2db7c60baa99dc24 open-vm-tools-sdmp-12.4.0-2.el9.x86_64.rpm 0c945acce76390476ec3a19fa98d0c965c34f3ccbb4e9823687e98a341496e19 open-vm-tools-test-12.4.0-2.el9.x86_64.rpm 4175f66a35d2f04e3682b91c006b7fa42298aa0a17ebdf3b9935180137708468 RLBA-2024:9130 cloud-init bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm 8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe RLBA-2024:9137 gnome-screenshot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-screenshot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-screenshot-40.0-5.el9.x86_64.rpm a4a3df0e6ae02ca81262b9e6ac4766485d5532accbb73908303922b7363b9547 RLSA-2024:9135 Moderate: toolbox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms toolbox-0.0.99.5-5.el9.rocky.0.2.x86_64.rpm 1522beed2040e6819cbf586a99fe0d67edf4eeef5d83702bdb6d7746b33b6b89 toolbox-tests-0.0.99.5-5.el9.rocky.0.2.x86_64.rpm ab54c664f4493fbc1b186dffcaba6abb12f30e729b7b9769b3d994cd1633cdba RLSA-2024:9136 Moderate: qemu-kvm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327) * QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446) * QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-9.0.0-10.el9_5.2.x86_64.rpm b6aec138968abfb9748361a2ee14487aeb62569ce67bbffbb0150808d34f6a83 qemu-img-9.0.0-10.el9_5.2.x86_64.rpm 3bee7bf4b9fc4bb6df430a11508d46e97ca144e113be6bb016ff09e8eaf6d9e0 qemu-kvm-9.0.0-10.el9_5.2.x86_64.rpm d697468f7fe4a63bf40176a79c2556e2d40916afbe6e27b417503807992fb45c qemu-kvm-audio-pa-9.0.0-10.el9_5.2.x86_64.rpm e0ad9f64e4e8c7a8a404a5486438c3e5e1a20bfb6f74bb9c443292713b78bb59 qemu-kvm-block-blkio-9.0.0-10.el9_5.2.x86_64.rpm 9b624993d16687dc6fea42574d7eda74856ed3e4cbb0b09ca5924b663e61be3e qemu-kvm-block-curl-9.0.0-10.el9_5.2.x86_64.rpm c03ede6b75808402bcfc3e4ce42284f27d9b4e390fb844c7c5aa086793b5f088 qemu-kvm-block-rbd-9.0.0-10.el9_5.2.x86_64.rpm 212fcbf408dd454c22ff13fca6e36d30bdc2b8820020c78a95cc62b1c94eaaf8 qemu-kvm-common-9.0.0-10.el9_5.2.x86_64.rpm 74bd4f43a2e51ab2d7ce1701f75a9ee369d1e766e1f360c4f1d6c48aef95283e qemu-kvm-core-9.0.0-10.el9_5.2.x86_64.rpm 446815c893e0ceb4b73f9e33f8caa6a28c6ebc93659e50f0bfe11c66ad039163 qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.2.x86_64.rpm e77624bff0f5e1c9be0f819ad738ff99c3abd1ab00c36f0f9138e35ed2c2a1fa qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.2.x86_64.rpm 0c046c01a1c8bb36c0dea865dcb8e57560afdd69308ae1f8de756de6cc29a036 qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.2.x86_64.rpm af8cc83dea4eaf9cbc28016a75d3244b4094ac3358846f0524eb61f29667e8b6 qemu-kvm-device-usb-host-9.0.0-10.el9_5.2.x86_64.rpm 8f1f3c95590603101ac05cd8eb0c41315a0f950418380bbb28c410092ec348e8 qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.2.x86_64.rpm 0a44ad51f2feee3a4261c115a0e4ec99180f4ebd104f58e78b45b27c63634e2d qemu-kvm-docs-9.0.0-10.el9_5.2.x86_64.rpm 6cbf058372af85d5ff38d4de8fde6d1b7eeec673da2f7a3b8b16c98586644d18 qemu-kvm-tools-9.0.0-10.el9_5.2.x86_64.rpm c97c7e26bcb5d96ac998a4963b72018a6834380317efad52e24053460fe88bfb qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.2.x86_64.rpm a01a9a177bce335c7fd3934cbc9b0a572ac9c81c1b5a40543f2e2b192b048799 qemu-kvm-ui-opengl-9.0.0-10.el9_5.2.x86_64.rpm 11706725eb43cdc64f6464da7392576e4ec67ea42ed90a58aac87fc19efc2db3 qemu-pr-helper-9.0.0-10.el9_5.2.x86_64.rpm 234cdffe2fba47d414152b3599084508be0c3846af8d205a736b669e74901183 RLEA-2024:9140 gcc-toolset-14 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-14. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-14.0-1.el9.x86_64.rpm b769d196a9e6af6fb86f8e40817ca724f45b8cab61e1c7ac26b43896a2366124 gcc-toolset-14-runtime-14.0-1.el9.x86_64.rpm 56498f787358b2418ebdb7f3f7453cabd7a5d1cbe5afc2bf914685d9f4cc256a RLBA-2024:9142 stratisd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratisd-3.6.7-1.el9.x86_64.rpm 2390fc766e22716be1ee571590df5870d7dacb51a47107aff2c4dff7972324e0 stratisd-dracut-3.6.7-1.el9.x86_64.rpm d14acfd4a9124e68310e88744b335e86127e539302d7b3dc7896938fabb71438 stratisd-tools-3.6.7-1.el9.x86_64.rpm f73727e6a23795525451577b667f10bb67a552a85e78106b7e697be4aa6bf4c1 RLBA-2024:9139 gcc-toolset-14-annobin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-14-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-annobin-annocheck-12.70-2.el9.x86_64.rpm b69d3046fea69870c25fcb1b353e671703d0c18bd1f461232e7c696640447000 gcc-toolset-14-annobin-docs-12.70-2.el9.noarch.rpm 23d3588d75639f77eff14c4a329dd57dc748e4c120c1a4a621f237f9308cff8e gcc-toolset-14-annobin-plugin-gcc-12.70-2.el9.x86_64.rpm a75d319bbd2e9067686fccacefd96202d7eb9e095d3660c15841cad4b0f0c974 RLBA-2024:9143 valgrind bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms valgrind-3.23.0-4.el9.i686.rpm f6dc6e2238b09dce250f7dea03bc9f797521fb9a162af583b2af46b41f7b20e7 valgrind-3.23.0-4.el9.x86_64.rpm 56dcf322f638cf994884316a13dbaca1108e8663bacc4b74d94145cd76401b7a valgrind-devel-3.23.0-4.el9.i686.rpm 04861c89ca0e7be1756f0850435a0109c2b2ba6ce3662b20e0b67d6fb293e1bf valgrind-devel-3.23.0-4.el9.x86_64.rpm ed1b02d83fef6f7d1c74bb932a2bc0cf065df1096a83bfa4555314c6d9ca0a14 RLSA-2024:9150 Moderate: python-jinja2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-6.el9.noarch.rpm 9e34d88c9835f11c7dfcd46b16021461f2b659808f1ff36fcbf893e5128f7c64 RLBA-2024:9148 hyperv-daemons bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyperv-daemons-0-0.43.20190303git.el9.x86_64.rpm bf8d9715d408c89e0c93193a9b8f0ea0c8ca87aa54e426e6e9f9d455579ca486 hyperv-daemons-license-0-0.43.20190303git.el9.noarch.rpm 8f98697c621703bd49d669aaf5ce4b88776eccad80624fc2889ff7cb8c78e87d hypervfcopyd-0-0.43.20190303git.el9.x86_64.rpm eb32d3bd0e2e87910cc428361f729f37fb121b682a5c42693ada9e79573b0d5d hypervkvpd-0-0.43.20190303git.el9.x86_64.rpm 9fb3d2ac310e43756323c3bcf9e39f94bdf225996143ded6efa048a92b3a3918 hyperv-tools-0-0.43.20190303git.el9.noarch.rpm f6c79f8536d22d0b80b1ff3c7915e98737308d503c384391b8e6922edf73e919 hypervvssd-0-0.43.20190303git.el9.x86_64.rpm b5baaf241bb1e401249902acbc6e424b991a2ff32d9473486b9f1f11e6a50863 RLBA-2024:9149 slirp4netns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slirp4netns-1.3.1-1.el9.x86_64.rpm 8bec68ec0bf3354410e0320f93948a188e77562eea9fb810af22cf44a84be405 RLBA-2024:9154 systemtap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemtap-5.1-4.el9_5.x86_64.rpm 3f002362833e84b06a9fbaedf98b6aec7a62bc24848742cc4e3091a76d081f6c systemtap-client-5.1-4.el9_5.x86_64.rpm bbf31a59d68154f864601dee5a8fddec14c68f68bcff34ef4e851acde274bf7b systemtap-devel-5.1-4.el9_5.i686.rpm 4b66db72ed0148ad9d3eb48bb53886a549237c9ebe8da48df33100254ade4c4e systemtap-devel-5.1-4.el9_5.x86_64.rpm f9fbb8f3812af1ebb073fd73e61f2fba3a1c4a8d590d6ee86c251bfb80738710 systemtap-exporter-5.1-4.el9_5.x86_64.rpm f193e1dbbe5a7de467856d2ddac42d11717dacc178d5fee1fcbb65dcaba37363 systemtap-initscript-5.1-4.el9_5.x86_64.rpm 18c66a364cf7d07abab645b201250b8adf3135a38d75469746f63433444133a4 systemtap-runtime-5.1-4.el9_5.x86_64.rpm 7a113e6f500881d43f8d03b12fca710819679ed9a0a06dc4b7d815c66505b92b systemtap-runtime-java-5.1-4.el9_5.x86_64.rpm 0c5628837cd645f635254f94d2e9ed349edb55000a0d11a53e209e8722f68afb systemtap-runtime-python3-5.1-4.el9_5.x86_64.rpm fb6708f24dc36e6fef85008041806cfd73c3a3c35a46af926a020eb126d5240d systemtap-runtime-virtguest-5.1-4.el9_5.x86_64.rpm 0dc1f6657b586f915c064d54ce5eae46b355d62d525a549b330b1071d23148d1 systemtap-runtime-virthost-5.1-4.el9_5.x86_64.rpm 5bd3fb7d3090391ed74862c582d67eb42414516f300e2f16444e2e960bf6a4a8 systemtap-sdt-devel-5.1-4.el9_5.i686.rpm c55b3e43a7fe5cf05021ac525a0869eaa54e1c8b97c6d2f9defc37a88118dd4e systemtap-sdt-devel-5.1-4.el9_5.x86_64.rpm 386fc1ad0c54f0735dce2d0fa9691181088d2d154812c0f15f17aae428e621ec systemtap-server-5.1-4.el9_5.x86_64.rpm 9c68c4301b865a7dfd3b43e44381ede633c356ac9fc11a580bf36fb707faed17 RLBA-2024:9152 python-colorama bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-colorama. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-colorama-0.4.6-3.el9.noarch.rpm 32cd450d40807606c2a77ff55056cde5ab78e829efeca03ac7b96e71d1831271 RLBA-2024:9153 realtime-tests bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-tests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms realtime-tests-2.7-2.el9.x86_64.rpm 6b9d051a627bbadc29edde6986a5f6825a9292bd09653a727348d3e1db60ed20 RLBA-2024:9156 awscli2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for awscli2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms awscli2-2.15.31-3.el9.noarch.rpm 826823d87808f360dddabb7bad990ccac844bb6a42d81d1da0d6b0848aab2a6d RLSA-2024:9158 Moderate: lldpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lldpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices. Security Fix(es): * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827) * lldpd: out-of-bounds read when decoding SONMP packets (CVE-2021-43612) * lldpd: CDP PDU Packet cdp.c out-of-bounds read (CVE-2023-41910) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lldpd-1.0.18-4.el9.i686.rpm db41286c4c121a0a0c7a1ca8980be57b8ebc8995ecd9e8f2f687a5bacdf24090 lldpd-1.0.18-4.el9.x86_64.rpm fe16f4cc9e0f243bb80c0ad556ee9bf6a4c9290fdb401daac4147f0392d3275f lldpd-devel-1.0.18-4.el9.i686.rpm 75ce7b75f56328095c7f874f5a45d390a0c0574a8cd4e97725563263b43e997c lldpd-devel-1.0.18-4.el9.x86_64.rpm e84740ddd7068671edea44cb679a01999456e76c4d29622f80d2ef12ce4a039c RLBA-2024:9162 squid bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-14.el9_5.3.x86_64.rpm 336441636ff36a801486627f8f871a61ed2dfbb2ab5d6ffd0ba04f4da471283c RLBA-2024:9161 python-drgn bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-drgn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms drgn-0.0.24-4.el9.x86_64.rpm 9d6b29de8641ae710983ac98a83442502c859667fcf295fa0a9789c649acf7f0 RLBA-2024:9163 fapolicyd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fapolicyd-1.3.3-100.el9.x86_64.rpm 5b806b795533507cc15fe5ab4cd0c39105af7f240dee59a1015cde07800f22ba fapolicyd-selinux-1.3.3-100.el9.noarch.rpm 5cedbae04c403bc62bf01e16bd9cc277c6b24cc2b8abaaa6dc346e1a123ccc02 RLBA-2024:9160 gnome-control-center bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-control-center-40.0-31.el9.x86_64.rpm 70da1d97b6417c7e05aa65ff82cb3ec5de1a9295c5b5594ec28d622bf2b9dca1 gnome-control-center-filesystem-40.0-31.el9.noarch.rpm 01917ebf7ab4e08fefbd174574cd14bce91704fde1db1d5ff66d44192bf68516 RLBA-2024:9168 aide bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms aide-0.16-102.el9.x86_64.rpm 2ec5193a89507cebe05f502bae1377da3278336753c2cab12a46bb78370063ce RLBA-2024:9172 python-blivet bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blivet-data-3.6.0-17.el9.noarch.rpm aea9cff1f9498d2ddfa55e6e8f14e447e9434d6e62a92b1e863cda32d07be76e python3-blivet-3.6.0-17.el9.noarch.rpm 5f6e1375d14694ccdebf1a93b7e91e7f58b7d08108fb0528b206c65f7e83bc11 RLBA-2024:9169 clevis bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-20-200.el9.x86_64.rpm 1736d8d36f62c07eef6d2866ee7aafa016d85d7461d7f1a46b282cf79a6c95f4 clevis-dracut-20-200.el9.x86_64.rpm 0f33f53d48dbb55fc04143658d3870d125e79a3c9ad843282cc4b8209b28fe39 clevis-luks-20-200.el9.x86_64.rpm 4599a20dc3efd85204f2da5d11a4b6b94d348f4a01c33e0cfa59a0180369815f clevis-systemd-20-200.el9.x86_64.rpm 51dd39ecd922b324f270af6b2a9fb18e785c08aa587f9e68c629fe3932f067e7 clevis-udisks2-20-200.el9.x86_64.rpm f9fade07fae4f4ae6914eac133b80a2e9f3405b714d24acd57642851e195c53e RLBA-2024:9171 ansible-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-core-2.14.17-1.el9.x86_64.rpm 941b4674260cdedeab5bd193cb0b778c5d17318d219667ccc70c42693e798253 ansible-test-2.14.17-1.el9.x86_64.rpm c201eea040f7ff5e28e8e10290d653a9bd7e436267c3e4f22c0c3e9428ec3322 RLBA-2024:9170 rust-bootupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.19-1.el9.x86_64.rpm 621cc59f4e4d35ce054597cb843708e6337aed473c2571e5afb36ce48abb5dec RLBA-2024:9173 socat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms socat-1.7.4.1-6.el9.x86_64.rpm 9cbe23691b70c6e3352f7428df4ac743e926cd27b7203737f5e130ca0dc4d62f RLBA-2024:9174 boom-boot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.6.1-2.el9.noarch.rpm 1d4d369b8686b76607d292faa0a1cc99aa0cf3404c6d63a294881554d0118410 boom-boot-conf-1.6.1-2.el9.noarch.rpm 15a439be3b6a5620837cfebb64819c64b5afb8675879d19a62dc3940f3833403 python3-boom-1.6.1-2.el9.noarch.rpm 537e99d5d5da0f1e59644592fd27e41010688c1ad54766dd6266d41c376bd803 RLBA-2024:9176 xorg-x11-proto-devel bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-proto-devel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-proto-devel-2024.1-1.el9.noarch.rpm 9590f529800b5324c3bffd648a62db61e8760130ba61c702d301011ea1cde630 RLBA-2024:9175 libvma bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvma-9.8.51-1.el9.x86_64.rpm 537a8954346e1d80fd1cf15bee2f13c6e7354615dfe370545ee41798a3bf4d4d libvma-utils-9.8.51-1.el9.x86_64.rpm 03761320f01916456a7c82f39275e66cfc500079cad573f8b4cf86472b5a10a4 RLBA-2024:9177 stress-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stress-ng-0.17.08-2.el9.x86_64.rpm 8f6d07e17fb434476142a9286a466724cc51c51d4286290cf7cda18f558249e6 RLBA-2024:9178 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-17.el9.x86_64.rpm e50a9c6ddde6d0f9ee7d36ffec8f4ff3aadf189c540e531962d59244e68a1c3f net-snmp-agent-libs-5.9.1-17.el9.i686.rpm ffbcba9ddca0404395d8acfef14b87ae9df1211775c702f254678272338421df net-snmp-agent-libs-5.9.1-17.el9.x86_64.rpm a200576a41612f8526353a46f74bdd895fb6557b566b49cbeea38d16ca1c8d53 net-snmp-devel-5.9.1-17.el9.i686.rpm c2c8e58340f0a15443c21247098cdf85a893b2db76bb54e4c45a714f4c2e1ab4 net-snmp-devel-5.9.1-17.el9.x86_64.rpm d974c222e33d31fb75c28c92526856f03e26451b96aa575e7d93350f967d4098 net-snmp-libs-5.9.1-17.el9.i686.rpm 0effbb3b31d052aadf311847b288f8496bd453a09006a3281da64cea61e596b3 net-snmp-libs-5.9.1-17.el9.x86_64.rpm 09867173e83d2bb5a7165baf1758bedea61f65d7b642d9d709e9a9299916141b net-snmp-perl-5.9.1-17.el9.x86_64.rpm 00efb6dfa3c815871c8d7259e6da44125c131a1cc80fa81f7cf9ddb944a450e1 net-snmp-utils-5.9.1-17.el9.x86_64.rpm b479718085d02ae6bd652034d99d89f0aefbf0ccb169ded3e88de1d58cdc7ac3 python3-net-snmp-5.9.1-17.el9.x86_64.rpm 40fac5f7ef0c9afbfe7f55351595e7f0b045893f7a04a9d8a1e956d04fb63e38 RLSA-2024:9180 Moderate: mod_auth_openidc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies (CVE-2024-24814) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_openidc-2.4.10-1.el9.x86_64.rpm d7a0783d76a8f689283f2e5be00ae668156a663e0048fcd3986f6c8a0def590b RLBA-2024:9182 libdrm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdrm-2.4.121-1.el9.i686.rpm 3a593b96f0abcc023baff88aad48e486786d55dba70e3c8ea8d48269625a0591 libdrm-2.4.121-1.el9.x86_64.rpm ec1a97284d190c7efe4fbbc23480fe68d06f8d9c84a2ed30ad1c840e83f4f979 libdrm-devel-2.4.121-1.el9.i686.rpm e20850dc8a9d6aa992fce1aafbfd1cfa53d8522a73fc468d6c9a2f41deb80d8a libdrm-devel-2.4.121-1.el9.x86_64.rpm 1aed8cbfad9a0b8e7792a7fdb4bb8e87dda234d7a1fa043637b8a60e51f66296 RLBA-2024:9183 netavark bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms netavark-1.12.2-1.el9.x86_64.rpm 7718230c7bd867887bd35f048109ee9091f258a603d75be37a5d6dafd0893dd2 RLSA-2024:9185 Moderate: iperf3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: possible denial of service (CVE-2023-7250,ESNET-SECADV-2023-0002) * iperf3: vulnerable to marvin attack if the authentication option is used (CVE-2024-26306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-13.el9_5.1.i686.rpm a87e81f2ffbf3bc1dd8a4f56d4330d16e03c2e31d7de92526907c6ab7135358c iperf3-3.9-13.el9_5.1.x86_64.rpm 1b622b64bfe74b11ae8e2eea032fe02e3935811aa6eac7569332f00b59c90153 RLSA-2024:9188 Low: bpftrace security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap Security Fix(es): * bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bpftrace-0.21.1-1.el9.x86_64.rpm 48699b70edc61e55465bff69eaa62721ca2158bddf0f5967fce1cda7b6401864 RLSA-2024:9193 Moderate: python3.12-PyMySQL security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12-PyMySQL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains a pure-Python MySQL client library. The goal of PyMySQL is to be a drop-in replacement for MySQLdb and work on CPython, PyPy, IronPython and Jython. Security Fix(es): * python-pymysql: SQL injection if used with untrusted JSON input (CVE-2024-36039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-PyMySQL-1.1.0-3.el9.noarch.rpm 6cf52f81d42ad260142cc69f2bf7374b5d86de0e862bd8daaf52389b1c2c1a03 python3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpm b4f7cc3f91c351d8915123889b1606c75f8fdffb1bef9c77bea0d9e05adb208d RLEA-2024:9191 butane bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for butane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms butane-0.21.0-1.el9.x86_64.rpm 003c266168b8d95a05e880a16e863dcfc0fb02e4b9ea4e4be5dc0349fae970f7 RLSA-2024:9195 Moderate: cyrus-imapd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support. Security Fix(es): * cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.8-1.el9.x86_64.rpm 7bbd025530a822c1f01c9cac198e1e11ca5c96190b8985bf7350468ecfdc6c6a cyrus-imapd-libs-3.4.8-1.el9.i686.rpm a7ceff4e3e525445386188cae9c411838c78a7ea71ec126e45e975762c24dc61 cyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm 8b5815420dcd052e1ffb9f73350af12f31efea2b850808ee4934f96c69bbbeda cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm e399ae41e7cb48368cae9d9dda208361c39977a16f0271f73485617486d0790b perl-Cyrus-3.4.8-1.el9.x86_64.rpm 3cc9133cfe5c09bc3503fb06c4824a2ca0da824e932fdd0286449c415addf651 RLSA-2024:9194 Moderate: python3.11-PyMySQL security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11-PyMySQL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains a pure-Python MySQL client library. The goal of PyMySQL is to be a drop-in replacement for MySQLdb and work on CPython, PyPy, IronPython and Jython. Security Fix(es): * python-pymysql: SQL injection if used with untrusted JSON input (CVE-2024-36039) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-PyMySQL-1.0.2-2.el9.noarch.rpm eed7b6f8876d14eaa32a53fafef8c377bc4e89bc34b7cb35226d454a08fed337 python3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpm 7c76b774ccd9e83c1090ffd907f7c176bf3cb9191b9ac17b14ed580d36bd48c8 RLSA-2024:9200 Moderate: runc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms runc-1.1.13-4.el9.x86_64.rpm 54327ec4197f58638f293d876927cc3a8d7add804f8bff9ff5c04890121dad7a RLEA-2024:9201 gdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdb-14.2-3.el9.x86_64.rpm efc3a39b1747ba62852827facc06821c5288795c0c64ade4cf75cf9292034495 gdb-doc-14.2-3.el9.noarch.rpm b3182d00ec1bcc4a3beef5d98e502ba539ce7dc4c793904d45e17d3e6a48aab5 gdb-gdbserver-14.2-3.el9.x86_64.rpm ff840f6ca80512e9644a1e1468f892382cb23466982b68cd1c268fdda7466832 gdb-headless-14.2-3.el9.x86_64.rpm 72f9104b7f3102ff2f4be7839158f75127d0d907ebb94045baeabaf864a31a57 gdb-minimal-14.2-3.el9.x86_64.rpm fa7ecd713b0cb7d42ea3715db88635837e438550f90a832d36535dca14b3e19e RLBA-2024:9206 intel-lpmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for intel-lpmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms intel-lpmd-0.0.6-1.el9.x86_64.rpm eda660955fb0038fc2cb4635a2d0b97a79269366e30014364a695b1b99cb55b6 RLBA-2024:9204 perl-IO-Socket-SSL and perl-Net-SSLeay bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Socket-SSL, perl-Net-SSLeay. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Socket-SSL-2.073-2.el9.noarch.rpm d6aaf5d0d4aa4bd716956767bdbe75996c1c9f99c2e5b41440a8b92e92ba678e perl-Net-SSLeay-1.94-1.el9.x86_64.rpm 1b4ae97697c44b196a13909cd8c284c4b3013b2032a72c5505945c2fe11118ab RLBA-2024:9207 certmonger bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms certmonger-0.79.20-1.el9.x86_64.rpm 0c27fc4994f280c1cc31266d2afcdcdca88c223c46447ca5dd406388efaa1cae RLBA-2024:9203 xalan-j2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xalan-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xalan-j2-2.7.2-11.el9.noarch.rpm 5b432a1c50e11aeb4f8b863e64a5afafbb76b87b68a9fb3bc97f1d2b91c8dc0f RLBA-2024:9205 libvirt-python bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-10.5.0-1.el9.x86_64.rpm e185b00895708101ac4da58896f66f551981cca59a845dc16fe617cf931acb9e RLBA-2024:9209 dwarves bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dwarves. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dwarves-1.27-2.el9.x86_64.rpm 9977713209a2d351c0aeba8f7919dee55c9131074908ccf6faa0b6fced8be313 libdwarves1-1.27-2.el9.i686.rpm 6af1bfdd285deb6ea273e499668a404e4f90c4e8a48bca35565eb773da8cb9fe libdwarves1-1.27-2.el9.x86_64.rpm 9a1b68a71247e3bdbb36c72cf1f99feccaa6811301f315b7bd126d974bfc7a0d RLEA-2024:9212 rust-afterburn bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.6.0-1.el9.x86_64.rpm 6b5c4b0fecbae6d79ab8dea29bcb3da1ea9670b7c4001bd1b35a294a1e4d58c5 afterburn-dracut-5.6.0-1.el9.x86_64.rpm 0ca50af1b28f2a2a808ce12bba9ca5e68445afc415cea4497098a597f876f35b RLBA-2024:9213 gnome-online-accounts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-online-accounts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-online-accounts-3.40.0-7.el9.i686.rpm d10e8d0110f858e8f5979568a666aa9000a61d2e6f3891e7a4440bbe714364f3 gnome-online-accounts-3.40.0-7.el9.x86_64.rpm 171415c7c37720a2c2f02bc63febf205dec7e745b61be14477f3adeac88e8300 gnome-online-accounts-devel-3.40.0-7.el9.i686.rpm fc737da48e465d792d17a0b96e3aa344a7d5ac7f49210474bf5addc9b4efbe61 gnome-online-accounts-devel-3.40.0-7.el9.x86_64.rpm 528fe031c40114c0d24e85aff95b61fdb4703962e6f9210fae1b9ffc1ec07a2f RLBA-2024:9214 python-rpm-macros bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rpm-macros-3.9-54.el9.noarch.rpm 75dc73fe54ee7cecfa99f951f34d38c9eef556dbc101738a66a8af589a57b1c6 python-rpm-macros-3.9-54.el9.noarch.rpm 747a00910d3ef1df58a33393925e13d42f2cf555ec6054c48750ed952d98360c python-srpm-macros-3.9-54.el9.noarch.rpm bc317132bec082f5614b531617f69e552133257dc261dd1e4cc2b3bb2f3f457f RLBA-2024:9215 clang, compiler-rt, libomp, lld, lldb, llvm, and python-lit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for compiler-rt, clang, lldb, lld, python-lit, libomp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clang-resource-filesystem-18.1.8-3.el9.noarch.rpm 28092ba376edd238cc79830d499f6c40fd97ff41958900ccd42b366bfe2750bf RLBA-2024:9218 alsa-lib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-lib-1.2.12-1.el9.i686.rpm d2e9961069c999fea3e45a171120e6c84684ce4b72e657e887a72faa4c506992 alsa-lib-1.2.12-1.el9.x86_64.rpm 12e71303e6c59d10f1ff9f4490d92ec50b5653a6d86cab0d6642f80c3466ead0 alsa-lib-devel-1.2.12-1.el9.i686.rpm 36a50bd294e6d35b11bcff177d0649df53e9e080fa40ba467a1880e5ee6e3347 alsa-lib-devel-1.2.12-1.el9.x86_64.rpm 4c1934ce998cad36e4539da9a74e399b17f672ce19fac200e6c2a272a5913f84 alsa-ucm-1.2.12-1.el9.noarch.rpm 6b906970bbe4e45d4c0e661e76cb5958bd1e699f4ba3bbf74e7252eec8dbaf08 RLBA-2024:9216 ansible-freeipa bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-freeipa-1.13.2-1.el9.noarch.rpm 73a3a573e19d436b782269e2d995a75488de1ff60c1e8b24713aa1d41d19e88a ansible-freeipa-collection-1.13.2-1.el9.noarch.rpm 1bfcbb0dbc7dac5d53bcbfc22aa4c8991808832149630044c4dab5bcccd0411a ansible-freeipa-tests-1.13.2-1.el9.noarch.rpm c31aadb7a0f923114ba68e7aec8651736f4054c56128209bcfffc2642352ba33 RLBA-2024:9219 pki-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.5.1-1.el9.noarch.rpm 8602ae265875c43ac837b6f249ba227d8eeb1aa8b5e5afbd4599943ba78dbb61 idm-pki-base-11.5.1-1.el9.noarch.rpm f0807009ec76c37c84caffdb8d8963a100f494c27e699d61f03e54ed057f0209 idm-pki-ca-11.5.1-1.el9.noarch.rpm 2d1e179b96697613e4147e5968a0c86cdf8b8410973000eeac9294784a22df34 idm-pki-est-11.5.1-1.el9.noarch.rpm 036dafcd640cf1ccc8a554281d379d33e053283f05b4519f9726078942a23775 idm-pki-java-11.5.1-1.el9.noarch.rpm 2106627a855e3519945a5109a5edd104689790155356c863f018ac407007c280 idm-pki-kra-11.5.1-1.el9.noarch.rpm 4b5e1cad6cff6b725ef046a808199f7995619829ad9b46831fdf61b048d4d123 idm-pki-server-11.5.1-1.el9.noarch.rpm fc0358cf26d488bc403c33964a667265cebe02e4370b62bf7182b0d8dc60a704 idm-pki-tools-11.5.1-1.el9.x86_64.rpm 631069217d2d1ad089d7f07090098cb0371aaf0bf5c5e586dd4adfa3e92adc94 python3-idm-pki-11.5.1-1.el9.noarch.rpm 37c3d6831e995c8bf0b1c70e6e76f6ddd3eac0239b6b0cd11effd809cb52463c RLBA-2024:9224 fuse-overlayfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.14-1.el9.x86_64.rpm 9fbfa6f3992d42b9c509cb9247e9a12a2c1fe1a7906b8635151227a32b9afb47 RLBA-2024:9223 nmap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nmap-7.92-3.el9.x86_64.rpm ba310088a3e9644f85136020dd4419e9a0537842e6e4724c99b9d7fad34a1205 nmap-ncat-7.92-3.el9.x86_64.rpm b2bb390936d0e65379201d21b0a56707665f2b588367343e8238405acf7907db RLBA-2024:9226 mstflint bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mstflint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mstflint-4.26.0-2.el9.x86_64.rpm 567a6880f5c753f49e791c28a434f9f5f8885a5729c3a7d546f569878cfca98a RLBA-2024:9228 python-virt-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-virt-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-virt-firmware-24.7-1.el9.noarch.rpm 4f36a38a5aedc7a8fa6147bd6660ca71589d5f3e74e8f0ef6885634fd07a0a55 uki-direct-24.7-1.el9.noarch.rpm afd47dbc675187b73cd5686629c6b876a7060d4ca9f878d24f2d12b3018dfa04 RLBA-2024:9225 crash-gcore-command bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-gcore-command-1.6.4-1.el9.x86_64.rpm 2b9f3ca301287f36f0d1951be60d9c75516f0575d49b3f3b14faaeefb565bfd9 RLBA-2024:9229 cockpit-files bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-files. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-files-6-1.el9.noarch.rpm 67fb67b09d32a4cf5088b05949d173a0e8ed2970318b8a5d3b5504f4956ec450 RLBA-2024:9231 power-profiles-daemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for power-profiles-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms power-profiles-daemon-0.21-1.el9.x86_64.rpm bee83b24a74d72f0b946a9892c909752ce618a09eec7cd55c413d45567ee63ab RLBA-2024:9237 make-latest bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for make-latest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms make441-4.4.1-3.el9.x86_64.rpm f98630462367ca43c34dae19fee7822cc8119a35f3bd873bbf6e1876d707da71 make-latest-4.4.1-3.el9.x86_64.rpm 3333771bffc4f99905da6fa4c9504e25443c456339d998d8d121241735cfde40 RLBA-2024:9234 virtiofsd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.11.1-1.el9.x86_64.rpm 38b9908a0400a17179a13ad3fff0a8968e3d3249ea150e1d719919682c114f1a RLBA-2024:9235 spamassassin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spamassassin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms spamassassin-3.4.6-6.el9.x86_64.rpm eabaa3d2106867721e90f75c8c8d723ab440ae996b6a237b7ee03c89f4f43a9f RLBA-2024:9238 autoconf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for autoconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autoconf-2.69-39.el9.noarch.rpm f4425dde5a8dedd34194bd0dc3380234b9ceba33ed766516f4a1d4ce079657d6 RLBA-2024:9240 stalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stalld-1.19.6-1.el9.x86_64.rpm 068c59fc7eb1971b677aa446103ff018ed0bda3b6f5e47d0db53040a482f5470 RLBA-2024:9241 virt-who bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-who. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-who-1.31.28-1.el9.noarch.rpm c8706cbabaa3f60262e8b950de2f6c231c66b1cc330bdfaf2976dd9a6c3bbe06 RLBA-2024:9245 gcc-toolset-14-dwz bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-14-dwz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-dwz-0.14-0.el9.x86_64.rpm 86b651f4afecf2450d361ba097493e7b80bf9bc34f674eb94b0ccb6a4adb4592 RLBA-2024:9244 ipa-healthcheck bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-healthcheck-0.16-4.el9.noarch.rpm a59ced0a4ff4c104d1b2a868ae944eff335c56644603c03b0edcfa3ab3f4b8bb ipa-healthcheck-core-0.16-4.el9.noarch.rpm 0326b71de4c443301cb11e4068e6144dfe74e74f93f9ffb5a36c72f30a9007ed RLBA-2024:9246 redhat-rpm-config bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-rpm-config-208-1.el9.noarch.rpm 2eb40f56065ca479c4e9404c9e27fe3b9a9823f19bf0d1ec791260ca5830c96b RLSA-2024:9243 Moderate: postfix security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postfix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The postfix packages provide a Mail Transport Agent (MTA), which supports protocols like LDAP, SMTP AUTH (SASL), and TLS. Security Fix(es): * postfix: SMTP smuggling vulnerability (CVE-2023-51764) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postfix-3.5.25-1.el9.x86_64.rpm 6e1ca7de16e602542afceacd86bbcbec73bce81af7dbb11c4054199bf98a7e61 postfix-cdb-3.5.25-1.el9.x86_64.rpm 25379079c54c8b80242aa0af735da951b0a643536fecd57c2959e7eeae0f4120 postfix-ldap-3.5.25-1.el9.x86_64.rpm 88f374b92291a9cf76a615d6380f0509e885158156ce0a954acbf37fb2daf7aa postfix-lmdb-3.5.25-1.el9.x86_64.rpm f22c7771e6f7fe2af04f298509bc0ffccea31f00e8d1973c24fae223d91a8233 postfix-mysql-3.5.25-1.el9.x86_64.rpm 6f80259b3044a22211b0900691406012d875f6d9e1814c008ff22ab67756c2dc postfix-pcre-3.5.25-1.el9.x86_64.rpm d701590ab360dd969a0f3ccd764265511d0d3232de5c7253b182736435144e2c postfix-perl-scripts-3.5.25-1.el9.x86_64.rpm 51afd0d4be992ff26297c40928ded66cfc0a2c4cccbe405112cc8ea599c5b2ea postfix-pgsql-3.5.25-1.el9.x86_64.rpm 93b437636020c8ccac9984e0818b1ddec770c3c46d17af166eb18756635e135e postfix-sqlite-3.5.25-1.el9.x86_64.rpm ab3ec680517daebab13c6285161e0785746f12501d9aab765c33aed6ca67020c RLEA-2024:9250 annobin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms annobin-12.65-1.el9.x86_64.rpm 753e376946474deb51a5c7cdf490b14048cd4400b88d9b4f7b7ab98ce9bedaaf annobin-annocheck-12.65-1.el9.i686.rpm 391fc07da7f5349eadfe44138878d469e4c48320d92017280fdc7bf392eeea97 annobin-annocheck-12.65-1.el9.x86_64.rpm a0e657bc615ccc540dc92daba5feace1af6328ab5d422601bcb42bebc02adb52 RLBA-2024:9249 python3.11-setuptools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.11-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-setuptools-65.5.1-3.el9.noarch.rpm 608091390d09f11256750ef7c52a51f2b6160bdf32cd72c3b0c8a73b1d3378ca python3.11-setuptools-wheel-65.5.1-3.el9.noarch.rpm 4460fbe215d22842d53a78712d2f0fdb5013ebb441ee003b4103cd06a56f6e1f RLBA-2024:9251 gcc-toolset-13-annobin bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-annobin-annocheck-12.69-1.el9.x86_64.rpm 9b99947e4fac85b00f9d8e9a796cec21feb5d936cbb5da97b81f2ba8aada9b9c gcc-toolset-13-annobin-docs-12.69-1.el9.noarch.rpm 6b626e255444ca214a452c2dc08d2b80fdd705367c8028d7ab7690ca07d24bc9 gcc-toolset-13-annobin-plugin-gcc-12.69-1.el9.x86_64.rpm 1d81a1293a8976dabe541867d24d347380a8199b3cd3234bc713557059893a8e RLBA-2024:9255 lorax bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-34.9.26-1.el9.x86_64.rpm f9096f76ec092e238a1fbf76cada592f60e5cd563a3fc8bf93d79d7ee639e8d2 lorax-docs-34.9.26-1.el9.x86_64.rpm 08201c2ec0e199446e1f670fabdedbb31b19869fcd6d261e8145ce41e0aaff2b lorax-lmc-novirt-34.9.26-1.el9.x86_64.rpm 8df0535d8ec03744c9bd0bfc99f9819a0804fd0a3322713cf074ef38542e10b5 lorax-lmc-virt-34.9.26-1.el9.x86_64.rpm 7eeace72d267cb279f9473c4415f3eaccb06ed843da428831bbfe4ec60706412 lorax-templates-generic-34.9.26-1.el9.x86_64.rpm 1e8ffcc82058803d0f899e996bca96dd5d842a8900fa6aabad427041fa47e358 RLEA-2024:9259 rust-coreos-installer bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms coreos-installer-0.22.1-1.el9.x86_64.rpm 85770f887c09f61acf1ff2039639e203c84226660435f96ba377a9b7ffad9472 coreos-installer-bootinfra-0.22.1-1.el9.x86_64.rpm a47b07324400d8e26e2a38964a5d0337487bca111050ac64af67870d66d2d3ff coreos-installer-dracut-0.22.1-1.el9.x86_64.rpm 1c4a0141163c11b8674dc6a942f58dfa9123225360cc10f496e823e206ec5e49 RLBA-2024:9258 orc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms orc-0.4.31-8.el9.i686.rpm c92f75f5b6eb2fc3ecb802686bc8b8c83c0af416e742d862bbeb77989f1bb37d orc-0.4.31-8.el9.x86_64.rpm e4c568d24d992714f5f6703f03d6460d81b1800c628423932108ae9315813b75 orc-compiler-0.4.31-8.el9.x86_64.rpm bb70ec13385618a521b66ec3d50d4d2a3c4b760149c004aedb0e46fe69200da0 orc-devel-0.4.31-8.el9.i686.rpm ac20d270ab0d1a8a23df0a5d55afc3aea9ecf26467a10f481ea77fd9caab8355 orc-devel-0.4.31-8.el9.x86_64.rpm cf6819cbd8bd6b0d374ba95cbcd152ba9d12e89624eb88678866056a538f5701 RLBA-2024:9257 perl-Crypt-OpenSSL-RSA bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Crypt-OpenSSL-RSA. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Crypt-OpenSSL-RSA-0.33-1.el9.x86_64.rpm dcebd0b0e84ba768004822ecf23ea8686f297c3208004a55383e44dde2863537 RLBA-2024:9260 libreswan bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.15-3.el9.x86_64.rpm 2c46920a48dc0b236f33854375275656ab2949b0eb52700f01a01e11d081fe80 RLBA-2024:9263 gcc-toolset-14-binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-14-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-binutils-2.41-3.el9.x86_64.rpm f257d40df7edd4ef039367e3bc649d827dac0406b1746de78afe0d6a6bc8c89c gcc-toolset-14-binutils-devel-2.41-3.el9.i686.rpm ad73b64cd782bd8cf69486f96420f5d1163ca168100d62fade70a59b539a6c0a gcc-toolset-14-binutils-devel-2.41-3.el9.x86_64.rpm 20ba427407a5da6995c0b8b988c15f95853462b574cff702237c26035cea379f gcc-toolset-14-binutils-gold-2.41-3.el9.x86_64.rpm 54b96517c2a66436b52074037111243038e64477ce34b21270d978943282b9de gcc-toolset-14-binutils-gprofng-2.41-3.el9.x86_64.rpm d90e6ebb412b558424d120746be6365e60b14ab9329477a0721b31d0398251e8 RLBA-2024:9261 go-rpm-macros bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.6.0-3.el9.x86_64.rpm 20c51fdc0f44014214d9e2a0bb660e7cf0ef47049e4377b26e451f9444d0fe94 go-rpm-macros-3.6.0-3.el9.x86_64.rpm bb18e03db9690b1c394ad9ba057d024113183a08e8b3735cc626323e97fc4dfb go-rpm-templates-3.6.0-3.el9.noarch.rpm e65a440ff0fdd2547ca730b1357953a7cb64937c307371db2166a1eb97a93aca go-srpm-macros-3.6.0-3.el9.noarch.rpm 4e1b0d8ab6cb3e74aab9202d07adb27cc5a93b8c27599b7407f733c612af4fc2 RLBA-2024:9262 rear bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-25.el9.x86_64.rpm e4b2183b0d9d878c951fcc07b6b0c5e3295a626bf049139396197e7ecf7e362b RLBA-2024:9264 gvisor-tap-vsock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.7.5-1.el9.x86_64.rpm abc4c668dc8b5a935cbe7c634cfab5e552aea2a46dde8266665cb50a2491cdfb RLBA-2024:9268 osinfo-db bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-20240701-2.el9.noarch.rpm 3335d41f2b595bc9e5775b1836062dbaddda5cbdcfd08e9ec31db987e1f86b5e RLBA-2024:9269 linuxptp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms linuxptp-4.2-3.el9_5.1.x86_64.rpm 82b5dccbd82868fc3a2f1ca90834c5fd7b6a4c9ea37c4f0f6cbc1317cdeaecb1 RLBA-2024:9273 alsa-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-utils-1.2.12-1.el9.x86_64.rpm 97bbb7e44341d3c29fbc95bfcf8c76f5225bb9b73f375db1d9ce62545d69f28b RLBA-2024:9275 dlm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dlm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dlm-lib-4.3.0-1.el9.i686.rpm 116b77230e9afd01bd5c9d4966a814df14bc08c34101b1ddea0c13e5a5999f62 dlm-lib-4.3.0-1.el9.x86_64.rpm 9e6193d329cc279c42459579de1984c010b5d774c4f5219145a4c5c383794324 RLBA-2024:9276 mod_md bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_md. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_md-2.4.26-1.el9.x86_64.rpm 9045fa79e594b1c3562e168ac854a23b6d4a596e2bc2dd7ae5ac60f005dcd0d3 RLSA-2025:20943 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libssh-devel-0.10.4-15.el9_6.i686.rpm a96fd41045298736b05f64283a13519ae5e99653ca31944b20ba73159b583791 libssh-devel-0.10.4-15.el9_6.x86_64.rpm 61e448230e57ceb63bbf5682809c8cde43f0598dc8d7fd81081eb854befe4256 RLSA-2024:9277 Moderate: oci-seccomp-bpf-hook security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OCI Hook to generate seccomp json files based on EBF syscalls used by container oci-seccomp-bpf-hook provides a library for applications looking to use the Container Pod concept popularized by Kubernetes. Security Fix(es): * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm 3b8f6f2231e8db059486d3a3574ac80307d3271380e7821109226a3bee51e9ec RLBA-2024:9278 mod_security_crs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_security_crs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_security_crs-3.3.5-1.el9.noarch.rpm 87b545115a9d870a49567de9b26c32e1d7e9ea7b2c1421d6bd5a1a1f9d7fa5b1 RLSA-2024:9281 Moderate: python-jwcrypto security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards. Security Fix(es): * JWCrypto: denail of service Via specifically crafted JWE (CVE-2023-6681) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jwcrypto-1.5.6-2.el9.noarch.rpm 684dc4c2011bbfc15af685d037fdd6a694de190aabaf45303e34589dc0728c97 RLBA-2024:9290 vsftpd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vsftpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms vsftpd-3.0.5-6.el9.x86_64.rpm f48a83905b7405af866425f8b60b7f9ccc57cd01f57581f7eed45b6384917979 RLBA-2024:9288 blktrace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for blktrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blktrace-1.2.0-20.el9.x86_64.rpm b13a651683d24f6859298f751ef564e96ffd7c842c2140ddec281a1c144054e7 iowatcher-1.2.0-20.el9.x86_64.rpm 9e3afda1bb263ffe56f08b75a23e85429c7cc69f6fc914afb3641f02418875b6 RLBA-2024:9293 sysstat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sysstat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sysstat-12.5.4-9.el9.x86_64.rpm 2161ef34d63de754b206819614ca72850a1d4885f4dc6a0a99e69d0233cc7bb0 RLBA-2024:9292 ecj bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ecj. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ecj-4.20-17.el9.noarch.rpm 30ee19ac399798491a1355e07ff98f44c2e7dfa3dd8957b9a3b47c6ca9917876 RLBA-2024:9295 composefs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for composefs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms composefs-1.0.5-1.el9.x86_64.rpm 4b76180274303a9efe85a162cf13b7c3f3d46fca52f7549b5d31c6c00912b8da composefs-libs-1.0.5-1.el9.i686.rpm a3395e2aab54f42d0cb4a6a7398c0ea0ee91a866ef903652a6421c44e9b856bf composefs-libs-1.0.5-1.el9.x86_64.rpm 0f27a0911d943492a9ea957bbde6a6f9c94782b652d6daf3c9a096d31aac62c0 RLBA-2024:9298 tomcat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-2.el9.noarch.rpm fe9333e1c43aba7846f0ce478eb5f555dd684ce81e3f39c7c17e535895fd4d3a tomcat-admin-webapps-9.0.87-2.el9.noarch.rpm b175cbcaee57d48b9396b80e39c976f5ccd9be254300779e9786cf3f86e1f8ee tomcat-docs-webapp-9.0.87-2.el9.noarch.rpm 9e5cc3a8e03b233f33f6ca91fe283280e074501e70b45a16f2fb326a3abb37d9 tomcat-el-3.0-api-9.0.87-2.el9.noarch.rpm 7cb2d6c38304a52641989eb1b6648e27d9213b9279002c40d6de2898c3d1e0ec tomcat-jsp-2.3-api-9.0.87-2.el9.noarch.rpm 9fba32b19e10d444445e646d824f8566daa84fbae2cd0cf97e02983e22362df4 tomcat-lib-9.0.87-2.el9.noarch.rpm eadaa69f8091ae5b983e405c50da2b9e9e82e2871b24a5d29153669c84da024b tomcat-servlet-4.0-api-9.0.87-2.el9.noarch.rpm 0ebcaccb1094e089bedd1bce070cef3f1838cb623d0dc4d74c51d2bd4125ac3f tomcat-webapps-9.0.87-2.el9.noarch.rpm aa9967616be9c7ef7e6a6f578b16664d0fec5f529aec06ba72f35c9e9e7c0795 RLBA-2024:9297 guestfs-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for guestfs-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guestfs-tools-1.51.6-5.el9.x86_64.rpm 2d5690fcbcc3b0e2de9302d36652e9a8663d39c9e9f990550a59fca5fcb3d1eb virt-win-reg-1.51.6-5.el9.noarch.rpm 3820d261273d377065fad9a40fd250954ea6004b5bd3e7c929a8874474a68bd4 RLBA-2024:9303 rtkit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rtkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rtkit-0.11-29.el9.x86_64.rpm 1f0f36027082bfd168e15cca53ca7e72e13c154c722c81b9562b52109748bf29 RLBA-2024:9304 rasdaemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rasdaemon-0.6.7-15.el9.x86_64.rpm f8cfcacc12b00a84e66ccce45406e71110a80d6abae0ad20e140093f79f22a8b RLSA-2024:9306 Moderate: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP response splitting (CVE-2023-38709) * httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.62-1.el9.x86_64.rpm e41b3aa9f1a465710e67929e7cfbbd51dea641b8e1c0fd2fe5b8558c8cad0569 httpd-core-2.4.62-1.el9.x86_64.rpm 153367ba0db800b2ee61ad674b3d170f0d2bba426e9e3d3e091a2018d54a87de httpd-devel-2.4.62-1.el9.x86_64.rpm 025ed9fb5f3f7a1c30360e1be47f924bcfe0bd05f51af9bdbe90c58150d5828d httpd-filesystem-2.4.62-1.el9.noarch.rpm 6588c09fd00a8657551b9e944fefe00e69611eb42cf8455e6367cf1331c2b43e httpd-manual-2.4.62-1.el9.noarch.rpm 5e18b1e6b69cb9c61943ffdf71e9ee546d0e0dbb04618b8198d112467f1a919c httpd-tools-2.4.62-1.el9.x86_64.rpm 9805a08f14ddd02831c89707ec82c82de6ba52eb7feee5568628404ce92d46c4 mod_ldap-2.4.62-1.el9.x86_64.rpm 46a12528649e72619b3fcc551fd1ee986cc5a34f63485483d257921f1ffcf244 mod_lua-2.4.62-1.el9.x86_64.rpm 53186365853438f2059a58e74a3bfc2adc445afef608294ee187ea12ac62ae92 mod_proxy_html-2.4.62-1.el9.x86_64.rpm beb57999a626002a2aabaa5d944fd8bb2d9efcb9cc1ae1184f39da64d183740d mod_session-2.4.62-1.el9.x86_64.rpm 001473eb8226a1c52e23ea92967e84903f4ff5206c394e3f41b8252b86cc00f8 mod_ssl-2.4.62-1.el9.x86_64.rpm 3813ce9aa737852df5ce04559173767bddd6f67da94b0395db7d3a40feec42f9 RLBA-2024:9307 appstream-data bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms appstream-data-9-20240827.el9.noarch.rpm 6f8a9bc00967e08671112efbfbadd909c05c54db210e1bbcc8af10bc46d1f53d RLBA-2024:9455 fence-agents bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es): * fence_scsi agents results in failures with less number of registration keys over multipath devices [rhel-9.5.z] (JIRA:Rocky Linux-59882) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm 13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb fence-agents-compute-4.10.0-76.el9_5.1.x86_64.rpm 1cebfa38f6802d639582bc993e76663aa6d2d3d96b4a0bdf573932156df6a392 fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm 979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704 fence-agents-kubevirt-4.10.0-76.el9_5.1.x86_64.rpm 8e7a84e36d56b29c115ef6ff1ce914bc9feba4c2fea9f60a73869c82fade5b1b fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm 90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073 fence-virt-4.10.0-76.el9_5.1.x86_64.rpm 408112bfa50d8d99a3a1081008428254532c7964c4bac5aa220f0f8455c4ff43 fence-virtd-4.10.0-76.el9_5.1.x86_64.rpm b42a2c3b074f0f14241c9e798f32469351f236f93049f3d984bae92db82923ba fence-virtd-cpg-4.10.0-76.el9_5.1.x86_64.rpm 24d4dfb0ea048c3ddc63b9fad0265ef8dc5d69740dbc47dffd73ed9ae8d092b6 fence-virtd-libvirt-4.10.0-76.el9_5.1.x86_64.rpm 3d16376833af531b2e8c6ca168370b539486e5199c3ec3ccb848d612288ec4f9 fence-virtd-multicast-4.10.0-76.el9_5.1.x86_64.rpm 3a42cbf09e1a2e1cf984a0df6412c8a5a0d2fcabd8697b8dafcc2605b82672dd fence-virtd-serial-4.10.0-76.el9_5.1.x86_64.rpm 1b6d159a4422a8015a506059e74865c51ff848e0936a8af5bd6c6fc22e2242f4 fence-virtd-tcp-4.10.0-76.el9_5.1.x86_64.rpm fe5accd323eadead37a910fb95b5b0572500cb76231d54cd5459fd27dcc35c03 RLSA-2024:9452 Moderate: pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) * pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcp-6.2.2-7.el9_5.x86_64.rpm c518cda520d769515b154bc7ba0da017c8fc45aa9e31ed354dd70c24cbc05ea6 pcp-conf-6.2.2-7.el9_5.x86_64.rpm 9ff8328f8dd8c482be84deccc0f69c3633de744bc1d2f53ca7c192ab8a74276e pcp-devel-6.2.2-7.el9_5.i686.rpm 2950ec76bdd0922be66d1ebc95da6cd9c55b7d991692d9e787716adc09858c56 pcp-devel-6.2.2-7.el9_5.x86_64.rpm 3216e1e4fe77f38e60e6950fc06229e7899415100b3162c91e97acb8d18ec40f pcp-doc-6.2.2-7.el9_5.noarch.rpm c8763d215d2777ac860f3c2694bb346687fb0378e84111be2c61cc4b0198e6f3 pcp-export-pcp2elasticsearch-6.2.2-7.el9_5.x86_64.rpm a5f92aafcc4232366049f136f18dd52ec09d6d007229d6424a08d56ca3dc165c pcp-export-pcp2graphite-6.2.2-7.el9_5.x86_64.rpm bbf0840d7fdcfff2190f48e1017d6fabeccaa259827a4c8dfe00e7ce3ccb3b10 pcp-export-pcp2influxdb-6.2.2-7.el9_5.x86_64.rpm 52ff587401399cd95c194d49a0380c1c9cfb22c06da20830d294216134734333 pcp-export-pcp2json-6.2.2-7.el9_5.x86_64.rpm c6d03d5d20fe4e769fee6a314c55a2b587510784306d457fb0d2f2ea93e9df05 pcp-export-pcp2openmetrics-6.2.2-7.el9_5.x86_64.rpm 00e58ced8729c243a770a30fdfbd4952eba785b6577363523c69c91f3c97df17 pcp-export-pcp2spark-6.2.2-7.el9_5.x86_64.rpm 61879f4d89c2f1d47eb8a26e895732985602ad80b6c9828724ce9e8989707ccc pcp-export-pcp2xml-6.2.2-7.el9_5.x86_64.rpm 4206efe6202f92b8f21800a182eccf796b6ac0fbe4d49416958835ae70f85457 pcp-export-pcp2zabbix-6.2.2-7.el9_5.x86_64.rpm fbe6bb40a1fe518b35edd073b1404802694ddfd80f1753d89c5498b81b954153 pcp-export-zabbix-agent-6.2.2-7.el9_5.x86_64.rpm a366308a2e94e39bd7d4a9876540301b46a14cc852b0528e43b90af9d86fbe1c pcp-geolocate-6.2.2-7.el9_5.x86_64.rpm 88dc85f14f88dc2eb098d89daa5ad863234d9063274aa248f62baeddd48fb295 pcp-gui-6.2.2-7.el9_5.x86_64.rpm 6ab187fb6503ec6c0ff9cf66e2739925ba7ac24718c2c549604639bce667361b pcp-import-collectl2pcp-6.2.2-7.el9_5.x86_64.rpm 57fac75c87bb0a268c4676f5ab3ab6108640a83a1bcbb1d152a0848d1a40b9fe pcp-import-ganglia2pcp-6.2.2-7.el9_5.x86_64.rpm f72a8f0012dbb048dc4f073c80e979277b578c183102935ff52518f89ac6fcb6 pcp-import-iostat2pcp-6.2.2-7.el9_5.x86_64.rpm b4411306d7d8d81264db000889ceb838838dd651144b6b5806bf851d4cc65fed pcp-import-mrtg2pcp-6.2.2-7.el9_5.x86_64.rpm 7b429ca42650ba9f08eb7aa2e08bb6374a359124ecd30594c16dfa36adb15d36 pcp-import-sar2pcp-6.2.2-7.el9_5.x86_64.rpm 77b4766ea5d94927799569af3e415bc0d792eb1efbe1d0a8afb7c13ce604d295 pcp-libs-6.2.2-7.el9_5.i686.rpm 9ea127b5a1b8a9c4cf4ae2781d3d420923f6fcaf3dbb544cddd1dcf5417df09d pcp-libs-6.2.2-7.el9_5.x86_64.rpm f5d608a45fe19057bb7bcf36150d31a2af945df0c1ade5ca1e852c15a9c373d0 pcp-libs-devel-6.2.2-7.el9_5.i686.rpm 952af36728e41b5c8809f9c8c70fce3718139477e1b8a2de84d8504071e16dab pcp-libs-devel-6.2.2-7.el9_5.x86_64.rpm 8294b10dbae8886bff628dc3a707ed732fa0d3573551cbcbd6a8b6947b433b1a pcp-pmda-activemq-6.2.2-7.el9_5.x86_64.rpm 0ea621256d10027880fe6603f4fda131169d2a4ba07e1a6a7a5d3075c68ca6e2 pcp-pmda-apache-6.2.2-7.el9_5.x86_64.rpm 84f6add58a6d3ea32e791e6b1ab30c410a0ea7ec6cca690be55ffbcce3fa5561 pcp-pmda-bash-6.2.2-7.el9_5.x86_64.rpm 1921c2f22cfce662e9a36a28ad991ca8baa06842e50386a37dd2029a4f38f7c9 pcp-pmda-bcc-6.2.2-7.el9_5.x86_64.rpm 9a9787944e48d2f5cc7965089b63b7211536352403c32edd7e6bd1cdc6a55938 pcp-pmda-bind2-6.2.2-7.el9_5.x86_64.rpm 9b296e30f5d69b57a40b30de2e154c58550c29f312922d726008fa5b2406ad37 pcp-pmda-bonding-6.2.2-7.el9_5.x86_64.rpm c81ce938a05e713c1d2ea08b3d7affb0eb23ebaa72f612a1e8e0f5d3cfda18a8 pcp-pmda-bpf-6.2.2-7.el9_5.x86_64.rpm 9c00fdfd050995039045d6cf3dd6a3b5231e645ea20ee712d42f1e054cab88c9 pcp-pmda-bpftrace-6.2.2-7.el9_5.x86_64.rpm fcc36e30b3402550d4b19c59a6727272919fca27a3efc70b6e129454aa1b81c5 pcp-pmda-cifs-6.2.2-7.el9_5.x86_64.rpm 4b3150eac97a24843e00f25b71f3f7d89e26a6cab7999306f6c24d646f20e90f pcp-pmda-cisco-6.2.2-7.el9_5.x86_64.rpm b94a46d63e46450e12b6cbb8fcdd356fbf379e6ed6d61aca811cd3993725e04a pcp-pmda-dbping-6.2.2-7.el9_5.x86_64.rpm 34dbf5da6024ce245081408bf994531f329c79e7ff783b8a6f77571ba0467850 pcp-pmda-denki-6.2.2-7.el9_5.x86_64.rpm 56d305f4aa861c63ddf0d7a420c76c776d161b42a4550169d650ec359c2b5ec4 pcp-pmda-dm-6.2.2-7.el9_5.x86_64.rpm e70a130d182b42cd2e6858499f0681814ab261c39eee2b98f94f5a4e46b35edd pcp-pmda-docker-6.2.2-7.el9_5.x86_64.rpm 41f96f7f9c6b0a01dff002dd738e91173b68f7234f584cc35e80409a3a0dcf5e pcp-pmda-ds389-6.2.2-7.el9_5.x86_64.rpm 30ce8751ad4b0608502610fe347365af067cf4c95879bf2b06f3dd63f977464e pcp-pmda-ds389log-6.2.2-7.el9_5.x86_64.rpm ce4db354ff15b60989917f1b54ba96fd52c7fbfab1c605535362bbc82ca0cd2b pcp-pmda-elasticsearch-6.2.2-7.el9_5.x86_64.rpm 461c0cd64cde189a4999fae2a318d08d715ce42458f476fa5c698662f4d63f2a pcp-pmda-farm-6.2.2-7.el9_5.x86_64.rpm b0be29b76fc7d794ce15ade8bb112bd58cf1ecd5d5993e1ac27d5126c443d41e pcp-pmda-gfs2-6.2.2-7.el9_5.x86_64.rpm b5ffa0f25839b288ed11c85c7faef3063104da2dc517f8aa30b0551b567380fa pcp-pmda-gluster-6.2.2-7.el9_5.x86_64.rpm 4afb931bc9656c20cce7860bd713aee9fc0179574e32e647cde1f5e5306078f0 pcp-pmda-gpfs-6.2.2-7.el9_5.x86_64.rpm e335130a3b3ca65f0992c35e86ea9d330827103783d95521b029256b25ae7f0d pcp-pmda-gpsd-6.2.2-7.el9_5.x86_64.rpm e5a6409f5c1b45b86094bbf5e6ce738d024b443255300cdf00c4cbc905c6f70d pcp-pmda-hacluster-6.2.2-7.el9_5.x86_64.rpm 99762005f2ba50deb066b4a9ef1e255f7479170477cefea4b234f5af6e0514a1 pcp-pmda-haproxy-6.2.2-7.el9_5.x86_64.rpm 104b0262e28796c55778eab02ce2690ebc282ee3e31565a067c9bdda36153184 pcp-pmda-infiniband-6.2.2-7.el9_5.x86_64.rpm 14faa4924cabc3027565982cc7ee32a34f87064f6a3faa0b82dc800a5a79848f pcp-pmda-json-6.2.2-7.el9_5.x86_64.rpm 68100b1d6fe5f445f79a2d661dac30668405087ad69d2e5e178dc81191781d89 pcp-pmda-libvirt-6.2.2-7.el9_5.x86_64.rpm 1c435292ee52e544f6d8594da3a093000c22eb29faccb5685533e5a2f2eeaaca pcp-pmda-lio-6.2.2-7.el9_5.x86_64.rpm eb0b74064c69b6eec7ce305a5f2f70cb97df2e99634f9bb7b0be7c4e9434e948 pcp-pmda-lmsensors-6.2.2-7.el9_5.x86_64.rpm 6f8168e8d62139b2ea7aa26bc120f56ae6ecd4484e0764d622bbe79dc8db799c pcp-pmda-logger-6.2.2-7.el9_5.x86_64.rpm 24d705e5f7ec79db333cd9f6daa9648f0a624282e1c038faccd650419fdb4287 pcp-pmda-lustre-6.2.2-7.el9_5.x86_64.rpm 2ab54989657ebf60d7786de60eb2fc7e52c3cec159ae12c6dc37907cc13f1c76 pcp-pmda-lustrecomm-6.2.2-7.el9_5.x86_64.rpm 4eb2e1a5c0affe46a7fec5b0ebedb589e29a8b7c5939531530ba8610b59ed3e4 pcp-pmda-mailq-6.2.2-7.el9_5.x86_64.rpm 390b7e7d380c776aacd03a1263d40bcd1ceba6e059dceffda900a0defb54e14a pcp-pmda-memcache-6.2.2-7.el9_5.x86_64.rpm 97e8ca2dfbb1af246d2014e3c9f23e9691ac2c7568b0c3b74deb2d1db34c52b4 pcp-pmda-mic-6.2.2-7.el9_5.x86_64.rpm 8a444b656b36e04976337715cd095a0b181ea4cfe8404879ed56aa9832930bbf pcp-pmda-mongodb-6.2.2-7.el9_5.x86_64.rpm aec38b4122d9826dd5bd57bff88e62d0e6cc83088776192966234314a59ccc87 pcp-pmda-mounts-6.2.2-7.el9_5.x86_64.rpm 529daa1201ef0751ad8e148a2e9183d3f5243e659cd71f1633000d67b8f924be pcp-pmda-mssql-6.2.2-7.el9_5.x86_64.rpm 9ca30c3cc9d554b0f83498d07f536dfe130f02e98a3ee32f9ee78150098447ad pcp-pmda-mysql-6.2.2-7.el9_5.x86_64.rpm b227da142819eee934c170b7a75e5aa93d202c72229261413803d18c68929a91 pcp-pmda-named-6.2.2-7.el9_5.x86_64.rpm 5c6aabfbef9c9e008c32501d322e72a5df5dbcebedb1c324370c9f9d232524ea pcp-pmda-netcheck-6.2.2-7.el9_5.x86_64.rpm 3316513ca98f554bb7d40cceb07a7a4436a2bf88724b3c36ddb55d081e786015 pcp-pmda-netfilter-6.2.2-7.el9_5.x86_64.rpm 7970d28a5ff622977f7a090ee8d1ff92d963e602d8998211617735efda8bef69 pcp-pmda-news-6.2.2-7.el9_5.x86_64.rpm ef1add1352d3d374601a97e869bc50d922d39b30da5978342c666fbf629e9c08 pcp-pmda-nfsclient-6.2.2-7.el9_5.x86_64.rpm ef5d576427665a25794d8ff03ef1b16947257167625983131bcf31fc1f2b1fc2 pcp-pmda-nginx-6.2.2-7.el9_5.x86_64.rpm 8c20ef97403740c2985263a8f4865a1ea1c9f42aadc1cf15289c62ad6d89d4bb pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.x86_64.rpm 71093c657cfe20b7be22ec19a4d1dc66664ea7297eaf46adbfc51332a4fc22c3 pcp-pmda-openmetrics-6.2.2-7.el9_5.x86_64.rpm 1d38e46df4390e79e456235acb7fb6b3ad7c91e83b43f54a1c7475143a2c28ee pcp-pmda-openvswitch-6.2.2-7.el9_5.x86_64.rpm 1bd507ef8a1b40ac7b56d98f727edf2062e80efb5668226f22d55539161bcafb pcp-pmda-oracle-6.2.2-7.el9_5.x86_64.rpm 0ba66ec881cb58f350dbeb8afad56255d5dc7786569a26abfe0d78d0028898b6 pcp-pmda-pdns-6.2.2-7.el9_5.x86_64.rpm 12d3be683f68ebe8a58c68310dd18ed2131d83c7ce936396e569079fcfb2d2e6 pcp-pmda-perfevent-6.2.2-7.el9_5.x86_64.rpm 168666ae1f996830d23fbbf8d19a6a19fde74ba92f7973e14118d405ca374039 pcp-pmda-podman-6.2.2-7.el9_5.x86_64.rpm 7657f9178ffac703b409f959696fa5590e040218385df09cd2ed9ccaf292b577 pcp-pmda-postfix-6.2.2-7.el9_5.x86_64.rpm 2d726616b2c6da7b4ac9662ed5ce1bc89fdb6ac31148969a7139d72369a95a2f pcp-pmda-postgresql-6.2.2-7.el9_5.x86_64.rpm 6cac42842a63b74f0dbaf15ad1b399957bbcebc3e13027f755d729bc0e75f946 pcp-pmda-rabbitmq-6.2.2-7.el9_5.x86_64.rpm 70157f64d7f392b7dc75a2e45956c3aa66e833d3cdfa9a6d44f339917f9b22d3 pcp-pmda-redis-6.2.2-7.el9_5.x86_64.rpm 24d655260fce7d480262b46ee888ec818168d52c5911a9f9d97bd6d034c29171 pcp-pmda-resctrl-6.2.2-7.el9_5.x86_64.rpm 06a6e8b91df96fcb680ab70723316c9ebafd83db9e47e0faf7c79b3d963645d9 pcp-pmda-roomtemp-6.2.2-7.el9_5.x86_64.rpm a0fceda99ea0cc922e4fa8e94830ef61ba9ba6f01058d39b4348a47d5d3d8443 pcp-pmda-rsyslog-6.2.2-7.el9_5.x86_64.rpm d9552db4730b6865d86e063ae3b351f3c95458ec8db947916e43c7c79919d17c pcp-pmda-samba-6.2.2-7.el9_5.x86_64.rpm df98e6ddbacfca98a0a59f64e446927d6e61f48dd97afb00121584ab7bcf1fd7 pcp-pmda-sendmail-6.2.2-7.el9_5.x86_64.rpm 742f7cce64fc00848b1684ab58655382c66e97ce8b294f32a4e1953f583f6ac9 pcp-pmda-shping-6.2.2-7.el9_5.x86_64.rpm 64f3923c50aa815393402d1217bc3afd0f475f8fd518708cff7b3449b4979377 pcp-pmda-slurm-6.2.2-7.el9_5.x86_64.rpm 70113192a6fb7cd3aeb9aa8bc148ec406fa68021a248bebf5ab7fd57a89f86da pcp-pmda-smart-6.2.2-7.el9_5.x86_64.rpm 8b782d2c553a8801064b4540ea4cb81780444d93fc42e32679e0bd89c351a834 pcp-pmda-snmp-6.2.2-7.el9_5.x86_64.rpm 3f00b0d9cd873a8529eed62f9635fc67537a92feee49b93fef461ba829f39683 pcp-pmda-sockets-6.2.2-7.el9_5.x86_64.rpm 153881b73762c397312f325d3e96c0356d29bf610f5d10abcae496b0a4c2e619 pcp-pmda-statsd-6.2.2-7.el9_5.x86_64.rpm fa0b154fe9b39fe65958be40767be110dcbc908587606c029ca4deff99b25365 pcp-pmda-summary-6.2.2-7.el9_5.x86_64.rpm b16e30aea3f571eb473d8deac2402fb6f16b36f112817fcfa1e27f6256a3a265 pcp-pmda-systemd-6.2.2-7.el9_5.x86_64.rpm bc1a4ff07f61eebc8d44efc08e879e491190eb5faee030350efb2e1f1ab22789 pcp-pmda-trace-6.2.2-7.el9_5.x86_64.rpm 6093c19383da516007227de22c89371f8d892fc391450e4561e316e116b0828b pcp-pmda-unbound-6.2.2-7.el9_5.x86_64.rpm 32dc8e8aa465f985dbbd72c46d30e2724c4d45bec98ab1a844372ac1484f567e pcp-pmda-uwsgi-6.2.2-7.el9_5.x86_64.rpm bba95782a6813d700e25816d46049f6f6572e44e7865063004c87e449474e295 pcp-pmda-weblog-6.2.2-7.el9_5.x86_64.rpm 6e9b30e9a643aef6c7f3e6c342e9086270f95ca4bbaf4a9b5cf64df178b148e1 pcp-pmda-zimbra-6.2.2-7.el9_5.x86_64.rpm f462ec9c2e70ffe33b91f2f19253255f3c4c6bbc9f135fabd3d423b170b2c826 pcp-pmda-zswap-6.2.2-7.el9_5.x86_64.rpm ca343bb812df656b37b88c313a65f5c16b0d6f8fb32e164bae0da47625d379c8 pcp-selinux-6.2.2-7.el9_5.x86_64.rpm 1e163d8cf83ac63708b768b6d5b34eaf0efa679af7fc451882f1bc9cb5d10647 pcp-system-tools-6.2.2-7.el9_5.x86_64.rpm 32af3feb8710befdc23c34a5c143eb2638c1986d1810affbe2592cd4322ec9f6 pcp-testsuite-6.2.2-7.el9_5.i686.rpm e8265c6e4d4ed4519cf20e852271b8152a7c07b97ac3ae680389b575eb0a70f1 pcp-testsuite-6.2.2-7.el9_5.x86_64.rpm b03f1d6d7cb0572c31431784b0e087efa61c6d3634b6bd883477af3fc214fc8c pcp-zeroconf-6.2.2-7.el9_5.x86_64.rpm 74ea1c8cf2b1781b86b6d45e0137df006645f0edea525575d92dbf3c9b59e9f6 perl-PCP-LogImport-6.2.2-7.el9_5.x86_64.rpm df2f578c3c8c08d3fe84a9babeb9ae245efaa3a96d62c2ed5b57cfc8c8e3e9d7 perl-PCP-LogSummary-6.2.2-7.el9_5.x86_64.rpm d01c1c07d642d6efdf3b7d71040e4d62de8b1d7d4c02f1faedcb59fcf7f6bdc5 perl-PCP-MMV-6.2.2-7.el9_5.x86_64.rpm 5b4ba540f9b07a337944dd3aac3fe170ea04fdf463e267f1a5f846a7641eeab5 perl-PCP-PMDA-6.2.2-7.el9_5.x86_64.rpm d939bb9a5c45cbbd17ee4e6882e4cf65c9758beb8c939f7b403f1e6c09b10b03 python3-pcp-6.2.2-7.el9_5.x86_64.rpm 35f295fc14a77bcfff785ca60797950d73514819f19dac6a30abad9b508575c5 RLSA-2024:9456 Important: osbuild-composer security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms osbuild-composer-118-2.el9_5.rocky.0.6.x86_64.rpm 733843260d4af7a56acea0aecdd04335e2378270533d9a927f0c8efa9b837e44 osbuild-composer-core-118-2.el9_5.rocky.0.6.x86_64.rpm f3c5786603ea677d55bd9feaf46061fa57aaa6242cbb815ab5dce56bd7f1a67d osbuild-composer-worker-118-2.el9_5.rocky.0.6.x86_64.rpm 3e06ddffc4394a03c993b531cc88745fea9d92581074c29bf3f4126e3765d6a0 RLSA-2024:9457 Moderate: python3.12-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list urllib3 is a powerful, user-friendly HTTP client for Python. urllib3 brings many critical features that are missing from the Python standard libraries: • Thread safety. • Connection pooling. • Client-side SSL/TLS verification. • File uploads with multipart encoding. • Helpers for retrying requests and dealing with HTTP redirects. • Support for gzip, deflate, brotli, and zstd encoding. • Proxy support for HTTP and SOCKS. • 100% test coverage. Security Fix(es): * urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm 07f7d96157dce5accd2e7622d9b8a1c4b13aa55706617e5d625462f5a3f631a6 RLSA-2024:9472 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-9.el9_5.x86_64.rpm d218c299d14cdc353b8160f3bca75b9e8341edbe962d431fc9caeb0d8412e9e4 RLSA-2024:9473 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-7.el9_5.x86_64.rpm 72dcc00c7006eebcd0f06d1014414102c848d307774a52f0f513d379a8d0db6d grafana-selinux-10.2.6-7.el9_5.x86_64.rpm 5d76498f096b5578713f6aff79525331b35f3e4a835b5d176a193c9dc63bb08c RLSA-2024:9555 Important: NetworkManager-libreswan security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop Security Fix(es): * NetworkManager-libreswan: Local privilege escalation via leftupdown (CVE-2024-9050) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm 74604f0c5cb6b6a7c66fd5bc157c9cb68d582b6f20f871a6992a6dd5a29be12d NetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm 0e45b62b929a85e06392b3783acfb67af60b204a1424b5c0d41afad05fee31ec RLSA-2024:9559 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: infinite loop while reading websocket data (CVE-2024-52532) * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-8.el9_5.2.i686.rpm 89e25765a4e858530aacae9ebbc1b82c7e1112f9101738a8dd3d18eab9b570d5 libsoup-2.72.0-8.el9_5.2.x86_64.rpm 16174a05d4e064ede29d450dc992d4166bc70fb081abf270b128ea1095f3fc36 libsoup-devel-2.72.0-8.el9_5.2.i686.rpm e0ff272a25cffdf7ecae1cdac57bc17c7afdafeed380821876b26a3b6fae7336 libsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm fc75fa4320dc4bc69ec1801ba81ff2335a0271fbcf473aeb7edcb2e2710f5b30 RLSA-2024:9625 Important: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: Denial of Service processing ESI response content (CVE-2024-45802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-14.el9_5.3.x86_64.rpm 336441636ff36a801486627f8f871a61ed2dfbb2ab5d6ffd0ba04f4da471283c RLSA-2024:10090 Important: tigervnc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.14.1-1.el9_5.1.x86_64.rpm 1bbaf3519214e912ff87e50723e36afb3b14cc8a57acd867e92a0efac0911ae2 tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm 846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097 tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm 9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm 1e9f54db73c3f55c02a22025ef0af74b4eed8be253c84a02151d9ca1b863099b tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm 2f7ddb7d43e0afa3c33111e9d2ff410c7d11afa03c7320e1ad587a07264299a6 tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm afa7cca671a7c6141d6d2ab9a659209a6113e2c86136eb4f2b08a438355a1c1b RLSA-2024:10218 Moderate: perl-App-cpanminus security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl-App-cpanminus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Why? It's dependency free, requires zero configuration, and stands alone but it's maintainable and extensible with plug-ins and friendly to shell scripting. When running, it requires only 10 MB of RAM. Security Fix(es): * perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability (CVE-2024-45321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm e82b68086e728c08ccb0029c5f85d75e9af6c48a62be384d923078077b4f89f0 RLSA-2024:10590 Important: python-tornado security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tornado is a Python web framework and asynchronous networking library that provides an open source version of scalable, non-blocking web server and tools. Security Fix(es): * python-tornado: Tornado has HTTP cookie parsing DoS vulnerability (CVE-2024-52804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-tornado-6.4.2-1.el9_5.x86_64.rpm e5f190ce47d798727b4e02ce80d6c950a8f80ae682487eb9021c3ea57fde267c RLSA-2024:11122 Important: gstreamer1-plugins-good security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer (CVE-2024-47540) * gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c (CVE-2024-47537) * gstreamer1-plugins-good: OOB-write in convert_to_s334_1a (CVE-2024-47539) * gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush (CVE-2024-47613) * gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (CVE-2024-47606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm d72d61ea8f817942c429889a37011481aa699f0d9cefd37198dd5c2f37ffa53a gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm 457cfb4a37c45680777637430358e1536a8ca8219a0fe20938464c7ef01f2769 gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm 32054f59884418940e925c55c58ef6ba2005dd4a995acff4e95952185894b612 gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpm a6eb580ced10181be47bbc0f9c94c1d4211a9440e3fc166fb952798ff445d531 RLSA-2024:11123 Important: gstreamer1-plugins-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet (CVE-2024-47538) * gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer (CVE-2024-47615) * gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header (CVE-2024-47607) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm 22180a2be432c555de9be3bc81936291a1b340c20c70aa8b0a2b9f1ea5f6ba3a gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm a85e8834265aa097cb43ef064cf529243c6c5fc9d3ad99c2df637a51845bf458 gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm f536b896e2fb20cf04bc43dad85fa9b3cf749e0f8c62a5783fa597a8dc4cb002 gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm d9da27b6c78c9733a5cc404bd77c6c5b470819cb0bce0764abafe3db60f33af8 gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm 485286de13d35d2fa5cebfcdd2f2d10b4612e94ca03c23be28c6e60554ea702e RLBA-2024:11214 aardvark-dns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`. Bug Fix(es) and Enhancement(s): * aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service [rhel-9.5] (JIRA:Rocky Linux-57072) * Issue with podman and netavark / aardvark-dns (JIRA:Rocky Linux-58233) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.12.2-1.el9_5.x86_64.rpm 10950cd232bb2395c8de2d33b2c57cbcd1d26997606a7eb8e3cda037041d619a RLBA-2024:11215 libtpms bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtpms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines. Bug Fix(es) and Enhancement(s): * swtpm: Win10 guest reports TPM error on Rocky Linux 9 hosts [rhel-9.5.z] (JIRA:Rocky Linux-58056) rocky-linux-9-x86-64-appstream-rpms libtpms-0.9.1-4.20211126git1ff6fe1f43.el9.i686.rpm da05b93ec04ba3cfa6fc693f91021d54857534882ad5d84adce568603efcb92c libtpms-0.9.1-4.20211126git1ff6fe1f43.el9.x86_64.rpm 5ee56b4dbdf9c3b667cca15eef11661ac1a598b2dc8553faad5fa3ae5bfd321a RLSA-2024:11216 Moderate: containernetworking-plugins security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.5.1-3.el9_5.x86_64.rpm 667a92330e2cfde69a5c5a7fd0f8a9be23feef90c68a4cec9cb003a25c5fc0e9 RLBA-2024:11221 ksh bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KornShell (ksh) is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell (sh) and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard (IEEE Std 1003.2-1992). Bug Fix(es): * Regression in behavior of exit with no args in trap handler. [rhel-9.5.z] (JIRA:Rocky Linux-62228) rocky-linux-9-x86-64-appstream-rpms ksh-1.0.6-4.el9_5.x86_64.rpm 049a3456a6b904835c4987d6d6584d49d8c9713b1e303ec54aeb1578e11c3b5b RLSA-2024:11217 Important: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.16.1-2.el9_5.x86_64.rpm c06ad66a9530fe815168b6b8a1edf21327e3c6d544aeef9aa55cbf8f34aca77b skopeo-tests-1.16.1-2.el9_5.x86_64.rpm 7479441716771bb66d4939fcadabbdb2863d8924aa9ba50ea93cf2f7fa645b42 RLBA-2024:11227 cloud-init bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es): * Configuring metric for default gateway is not working [rhel-9.5.z] (JIRA:Rocky Linux-65018) * NoCloud - network_config bridges incorrectly configured [rhel-9.5.z] (JIRA:Rocky Linux-65021) * [Rocky Linux-9] Prevent NM from handling DNS when network interfaces have DNS config [rhel-9.5.z] (JIRA:Rocky Linux-65778) * cloud-init fails to configure DNS and search domain [rhel-9.5.z] (JIRA:Rocky Linux-68409) rocky-linux-9-x86-64-appstream-rpms cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm 8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe RLBA-2024:11230 greenboot bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Generic Health Check Framework for systemd. Bug Fix(es): * Greenboot v0.15.7 to rhel-9.5.z (JIRA:Rocky Linux-67299) rocky-linux-9-x86-64-appstream-rpms greenboot-0.15.7-1.el9_5.x86_64.rpm 9faf55f6bb9833f7c19e535d935cc815a166c2ad427d55fce93f82e710965530 greenboot-default-health-checks-0.15.7-1.el9_5.x86_64.rpm 2fdf48e4e994b873c8d429c190cea1d41ee0cc8a9c45c1ce3f488bc977a1cc2b RLBA-2024:11231 containers-common bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. It is required because the most of configuration files and docs come from projects which are vendored into Podman, Buildah, Skopeo, etc. but they are not packaged separately. Bug Fix(es): * storage.conf enables zstd:chunked partial pull support in Rocky Linux 9.5 (JIRA:Rocky Linux-65057) rocky-linux-9-x86-64-appstream-rpms containers-common-1-96.el9_5.x86_64.rpm 35f35df491a5a01ad271f196156eb0b8c24a4f577295456bce5eace905deb725 RLBA-2024:11233 golang bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Bug Fix(es): * Update to Go 1.22.9 [rhel-9] (JIRA:Rocky Linux-67672) rocky-linux-9-x86-64-appstream-rpms golang-1.22.9-2.el9_5.x86_64.rpm cb632e2b03e55db7bbb8938bab7248914c7a60782173fd571c25a3a2ac2bf031 golang-bin-1.22.9-2.el9_5.x86_64.rpm 777487b110a00d25009ff6594ec7edc7296ade01b967dedb10d82ae0a3cabb44 golang-docs-1.22.9-2.el9_5.noarch.rpm fcbb4dd59a76cf67cbb12dd44de1335ab95acbe991db90b3a2720d20e75344bc golang-misc-1.22.9-2.el9_5.noarch.rpm bfe8aa3ca26ebef5236911ed7f53a0d1196161a2aaf946f7f3569deb2bcb7368 golang-race-1.22.9-2.el9_5.x86_64.rpm 1cf47dd9739e68d31f000abf5037d90db01774c6c26f9934f135be692824407e golang-src-1.22.9-2.el9_5.noarch.rpm 08edfa141f14fbe34d38f82066a219caea02d30c01d712a1a9158a280bb77fd9 golang-tests-1.22.9-2.el9_5.noarch.rpm f10f619b46ce422f8878df524530c7b7b2dbb704d5c7ab7fb4c61882523f7281 go-toolset-1.22.9-2.el9_5.x86_64.rpm b15b22a15b21929044a21f3ac0c28a5c1c0ecbcabd34655a31752cb65fccf2ee RLBA-2024:11234 virtio-win bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * [virtio-win][viomem] guest BSOD or stuck if try to resize the mem to a smaller value than the original setting value [rhel-9.5.z] (JIRA:Rocky Linux-66540) * [viomem] Implement VIRTIO_MEM_F_UNPLUGGED_INACCESSIBLE feature [rhel-9.5.z] (JIRA:Rocky Linux-66563) * [virtio-win][vioinput] Update INF to support DMA Remapping [rhel-9.5.z] (JIRA:Rocky Linux-66564) * [virtio-win][fwcfg] Update INF to disable DMA remapping [rhel-9.5.z] (JIRA:Rocky Linux-66565) * [virtio-win][balloon] Update INF to support DMA remapping [rhel-9.5.z] (JIRA:Rocky Linux-66566) * [virtio-win][virtio-fs] virtiofs driver should use DMA API [rhel-9.5.z] (JIRA:Rocky Linux-66567) * [viomem] Improved waiting for the command submission (1 second wait can fail) [rhel-9.5.z] (JIRA:Rocky Linux-67482) * [virtio-win][vioserial] Update INF to support DMA Remapping [rhel-9.5.z] (JIRA:Rocky Linux-67483) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.44-0.el9_5.noarch.rpm 9540279743cb188ac6582bf70db0ca30bff37d59aeb37be4f006ec3140af067b RLBA-2024:11236 bootc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Bug Fix(es): * Rebase to 1.1.2 [rhel-9.5.z] (JIRA:Rocky Linux-66610) rocky-linux-9-x86-64-appstream-rpms bootc-1.1.2-1.el9_5.x86_64.rpm 40d9e16dcff514ef9884fcda99ebf8c6b2c122a99a9fc1f4585cc74a43b599c9 RLSA-2024:11238 Moderate: python3.11-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm edf26997373df5bca4c704084b8dcf063461333145b0b8f102372a69cccf6374 RLBA-2024:11239 rpm-ostree bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * [rhel-9.5.z] Rebase rpm-ostree to 2024.9 (JIRA:Rocky Linux-68144) rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2024.9-1.el9_5.x86_64.rpm 16b54fd7ebe89a8fa3a079d6631839cf4600ce9501aed44e598e343b008505c5 rpm-ostree-libs-2024.9-1.el9_5.i686.rpm 1bd64feb364230c9fe542500d6610b23cf19b91d29235d7911a97bb7d9742c4d rpm-ostree-libs-2024.9-1.el9_5.x86_64.rpm c5ffa0eb8f712aa94f7078c84c73b1d22f674d318fbef27a6d351a70633ea376 RLBA-2024:11240 git bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Bug Fix(es): * git 2.43 extremely slow shallow clones [rhel-9] (JIRA:Rocky Linux-67118) rocky-linux-9-x86-64-appstream-rpms git-2.43.5-2.el9_5.x86_64.rpm 5632adce592d411d0790b3fbf356baa694931d95f6c3eb235f406d09fd9b2646 git-all-2.43.5-2.el9_5.noarch.rpm b1b8197f277c57a9d6809c03ed620d3987bfecf653199b56d40b989d62407fc0 git-core-2.43.5-2.el9_5.x86_64.rpm 16a095da6cdd948bf5bad6393c4ab2cb8d65cc84873f9517b23156598665eff8 git-core-doc-2.43.5-2.el9_5.noarch.rpm d3e6cba781ab5ade8398480206a8ea4ac987e508ae94734e798da8ab984f8fb4 git-credential-libsecret-2.43.5-2.el9_5.x86_64.rpm 7e4c5330282a56897430fa76384638abc7f016dcb607a706b9aab4ee9bc5ce9b git-daemon-2.43.5-2.el9_5.x86_64.rpm 2ff73834477f08d09e4432c7cb45487518034fc25cabbfcec88107ba2579be65 git-email-2.43.5-2.el9_5.noarch.rpm c5e0b58255c2a296eed0dc78aa4aeb8000220f658cd0a0360c9afcbb8ff619e1 git-gui-2.43.5-2.el9_5.noarch.rpm 5dd5c6e7d62e64ed1acf37dc38f339d524348e14a1bd1a961075370a90c8edec git-instaweb-2.43.5-2.el9_5.noarch.rpm aaf008e3288d83d91bcea12adb8be452b6b2102bc10598fa004680ce988ba9f7 gitk-2.43.5-2.el9_5.noarch.rpm bb9a48d05b71cf5d53e71ba5282f7121f561cb1eac4dfc6f6948939084fe443d git-subtree-2.43.5-2.el9_5.x86_64.rpm 85380d92ded2b3e02b6ccd5e5d6a8b55874d377723d507a7f3c92c90a1a35316 git-svn-2.43.5-2.el9_5.noarch.rpm 552c06ee88945a3325256bbc6812269e96b557cc6f637233d1f34ff36f869150 gitweb-2.43.5-2.el9_5.noarch.rpm dddf44f7e3cdfc8c4146d75146bb1976eb7f8ea2ad86bd6b065149c40d99f035 perl-Git-2.43.5-2.el9_5.noarch.rpm 7e7aef261de567f58f527de6f278d4982fee0c4af2cdb9d2de024bbf8c61c1cd perl-Git-SVN-2.43.5-2.el9_5.noarch.rpm c68a7a898c04869fce31dabd391cc9cddd2d2d5861d4c9d786260725d3dae1f9 RLBA-2024:11397 nss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * shlibsign is broken in FIPS mode (JIRA:Rocky Linux-61294) * shlibsign is broken in FIPS mode [rhel-9.4.z] (JIRA:Rocky Linux-61295) * shlibsign is broken in FIPS mode [rhel-9.5.z] (JIRA:Rocky Linux-61296) * nss-softokn pkg-config file still lists libdbm3 (JIRA:Rocky Linux-61300) * nss-softokn pkg-config file still lists libdbm3 [rhel-9.4.z] (JIRA:Rocky Linux-61301) * nss-softokn pkg-config file still lists libdbm3 [rhel-9.5.z] (JIRA:Rocky Linux-61302) * Incorrect indicators for ECDH (JIRA:Rocky Linux-59580) * Incorrect indicators for ECDH [rhel-9.4.z] (JIRA:Rocky Linux-59581) * Incorrect indicators for ECDH [rhel-9.5.z] (JIRA:Rocky Linux-59582) * NSS FIPS service indicators mark RSA-OAEP as unapproved (JIRA:Rocky Linux-61272) * NSS FIPS service indicators mark RSA-OAEP as unapproved [rhel-9.4.z] (JIRA:Rocky Linux-61273) * NSS FIPS service indicators mark RSA-OAEP as unapproved [rhel-9.5.z] (JIRA:Rocky Linux-61274) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-17.el9_5.i686.rpm b93d1619f8cb369c8365f1af2bc5c5468540e84b4df48ace651b0ae02ffaea39 nspr-4.35.0-17.el9_5.x86_64.rpm 38888592dfea730a0fece05f129aa081c3e7a33ed8edf29edfd095ea39f413cc nspr-devel-4.35.0-17.el9_5.i686.rpm 9fffda941a75886b4d5f1299df3d5c930be1aa520ee048f1224dc5e4a9adbf67 nspr-devel-4.35.0-17.el9_5.x86_64.rpm 71cdb0d347128354d797f4d420ae56d59984a5d9de029e47f99aa26d4c60806b nss-3.101.0-10.el9_5.i686.rpm a0d8203609a6db08d6f1d7dcfa672d7cf48934a64013724b50d5e4af1c9edc30 nss-3.101.0-10.el9_5.x86_64.rpm de547e8f8833bc94b9a0a10d103730829da0140bf0e91fae4edf7e9d4b8560e9 nss-devel-3.101.0-10.el9_5.i686.rpm 3b71e8da9f1770cb2ac701183498f7cc7cc046ca31e411ed1f6676a921cc7ce0 nss-devel-3.101.0-10.el9_5.x86_64.rpm ecc0686ad85141aff38f825624657f3cf1894d4bd10a11716fe8661f100fd7ef nss-softokn-3.101.0-10.el9_5.i686.rpm 0512bf2a82cf230f3ae0c98437b08d97d30e8422707cc7e14e7e8f15618a990b nss-softokn-3.101.0-10.el9_5.x86_64.rpm dd9e60e8c1a61c558454a657fb3c4e2a9e92c5c54319ebc5e8ec7b16f1bccce6 nss-softokn-devel-3.101.0-10.el9_5.i686.rpm 01836b26746520095cd8241f68c338776815ca7e7c5f374cbef138a456a601d0 nss-softokn-devel-3.101.0-10.el9_5.x86_64.rpm 11074d88b2fc98110e6cd8fd2daee95a758b8980f244a66568d639d8e3d4e6fb nss-softokn-freebl-3.101.0-10.el9_5.i686.rpm 7ed9195f92f820ea75a77d4bf4b40be37259653e1029fba97c9098a61cad048e nss-softokn-freebl-3.101.0-10.el9_5.x86_64.rpm a6f07b7d8036e51f177d02a7534c98388ae4ef891c2f2b0c8437e1b4a5175df7 nss-softokn-freebl-devel-3.101.0-10.el9_5.i686.rpm 5a82965c8c8ffcb8c0f1b81cfed89cb7a2b8cdffc3da89c17b19674b492a5983 nss-softokn-freebl-devel-3.101.0-10.el9_5.x86_64.rpm 2ba29d16a099cde71ba526fd119163cf24d6c2c4a7cadcf427fa6963207e8de2 nss-sysinit-3.101.0-10.el9_5.x86_64.rpm 92e8225ba84e0021bff0fcd3d016290fcb7187140709d3c4cc054e16d8ff279b nss-tools-3.101.0-10.el9_5.x86_64.rpm 921e41f90d85dcd4fcc8050626156c226a7c40dfb77143b88dcb8b4ccb0de2ff nss-util-3.101.0-10.el9_5.i686.rpm 47e93025f93674777ec65dc3b7c991d3caeca58d1e61e74985057c6d89eb08ed nss-util-3.101.0-10.el9_5.x86_64.rpm e56eb4eee80b1e8d57a1b4a2720d116424091d5d940ab80561835d6426726288 nss-util-devel-3.101.0-10.el9_5.i686.rpm 1fef9f711494646c890b655e4e7f9cc24ea1b5cf6ae71f0dc361a1c3f1981f17 nss-util-devel-3.101.0-10.el9_5.x86_64.rpm 04de29ce01403cd5fee4841fb168b7547af029924881007c0e7b6a391d44f38f RLSA-2025:0161 Important: iperf3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf: Denial of Service in iperf Due to Improper JSON Handling (CVE-2024-53580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-13.el9_5.1.i686.rpm a87e81f2ffbf3bc1dd8a4f56d4330d16e03c2e31d7de92526907c6ab7135358c iperf3-3.9-13.el9_5.1.x86_64.rpm 1b622b64bfe74b11ae8e2eea032fe02e3935811aa6eac7569332f00b59c90153 RLSA-2025:0308 Important: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * fence-agents: Jinja has a sandbox breakout through indirect reference to format method [rhel-9.5.z] (CVE-2024-56326) * fence-agents: Jinja has a sandbox breakout through malicious filenames [rhel-9.5.z] (CVE-2024-56201) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.4.noarch.rpm 4149d445c1ca679ae96d838b3135f3afa8006ac7b79147d30087ce5963658468 fence-agents-compute-4.10.0-76.el9_5.4.x86_64.rpm b2217fa53cdb8bf96ad1a17d6e3eaca12a0aaf4d07e62dc7774d093c2c16bb44 fence-agents-ibm-powervs-4.10.0-76.el9_5.4.noarch.rpm 48be5f9fe074ee82bc19e1e353fce0266b19d5373bb94383b37c6018dd432998 fence-agents-ibm-vpc-4.10.0-76.el9_5.4.noarch.rpm 48fffe328c7e0ae34b0e0f81b4dcd50cebc9a0f55796a9b3361cb37c3e948690 fence-agents-kubevirt-4.10.0-76.el9_5.4.x86_64.rpm 3c7d426fde71af2b9781a74c74f020fe784a69e1e7a95cf76dc6fe42eee54560 fence-agents-virsh-4.10.0-76.el9_5.4.noarch.rpm 629803c10b5eb880588420b22d77794979f2cbb5f775ebc1055161334b9c43fb fence-virt-4.10.0-76.el9_5.4.x86_64.rpm 0a423b1d227231e3a32335afb44bf802a31929944bfeb193f235de9fae90de7b fence-virtd-4.10.0-76.el9_5.4.x86_64.rpm 1bd88c587059a7196d00f6d2fed763e37ff65cfa142a6f36f3df0bfe8653b00e fence-virtd-cpg-4.10.0-76.el9_5.4.x86_64.rpm 43f3f785171a0b24dbfe235161413caeeb630ff65e4ffca4758c3f9b6fdf9eb7 fence-virtd-libvirt-4.10.0-76.el9_5.4.x86_64.rpm 59410ab04185b7495e99313544d0a16e4485a3a682db132456916c7f0b6597a3 fence-virtd-multicast-4.10.0-76.el9_5.4.x86_64.rpm 61158e4fa8fea6ed5c835309d00f4514780f95e3367a3e57a1777ed6465d2f5c fence-virtd-serial-4.10.0-76.el9_5.4.x86_64.rpm 32859b173c4fac8119608103708f2d8733603ceb3a9cf3939bf411cb608f7981 fence-virtd-tcp-4.10.0-76.el9_5.4.x86_64.rpm 630c8dbf469048c5ccbe1bc7a219081615386bdbb91b3b4d41e252c65a0d7b2e RLBA-2025:0541 httpd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * openssl 3.2 ENGINE regression [rhel-9.5.z] (JIRA:Rocky Linux-69456) * RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 [rhel-9.5.z] (JIRA:Rocky Linux-73580) rocky-linux-9-x86-64-appstream-rpms httpd-filesystem-2.4.62-1.el9_5.2.noarch.rpm 747dc60adeb0325fae0bc0f7cb43cdd8cd7bc01980f453e8dc4d3ab7bb2ee03b httpd-2.4.62-1.el9_5.2.x86_64.rpm ff8e5b5738c73dec2f5146c82a08d43d3c39ee61874b70d520307737aae2640d httpd-core-2.4.62-1.el9_5.2.x86_64.rpm 2bbd4f7110a5670beadaf3d3ebd4678e84cfa3309a42782a5c39e27c99db965d httpd-devel-2.4.62-1.el9_5.2.x86_64.rpm d6182d0d474d9fae99e277468660759b1394d01c73172cf2a45349cb7fc964d1 httpd-manual-2.4.62-1.el9_5.2.noarch.rpm a696e00084a121399c0cf2e164f168e15c6adf8e2e5efed7e3bf2fd6df888058 httpd-tools-2.4.62-1.el9_5.2.x86_64.rpm 2e4e7e22f067a4ee192dfe57c97e0f183412b20d3d4c5041680c81dcfc51eb68 mod_ldap-2.4.62-1.el9_5.2.x86_64.rpm 776af70a85e2a615bcdfc5a5207ab479fc8ba9ef807bcbf87a93b06cc638f8e5 mod_lua-2.4.62-1.el9_5.2.x86_64.rpm f9046d4e50afe19d75c0c0a8faa0e4de2560ebb7d342350aeb406959d5819015 mod_proxy_html-2.4.62-1.el9_5.2.x86_64.rpm 9d3bfd9c92babab273b94d599fea4ebdf18eb53cfec0722f221a6d0b1b4abcd2 mod_session-2.4.62-1.el9_5.2.x86_64.rpm 1f63e1901e1f92e252fa5ce1ca2ef4d9f2d04c913b41afe22967ace37190d1aa mod_ssl-2.4.62-1.el9_5.2.x86_64.rpm fe46aa3dcddbe9ac33e2b705d73c71a2247548ecb0d04d94f7b59eadacdf417b RLSA-2025:0667 Important: python-jinja2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja has a sandbox breakout through indirect reference to format method (CVE-2024-56326) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-7.el9_5.noarch.rpm 826b5329d897a044c321be59b1c90b1dc8d2226e647b960634e572b6cdb722b1 RLSA-2025:0692 Important: redis:7 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.redis, redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981) * redis: Redis allows denial-of-service due to malformed ACL selectors (CVE-2024-51741) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__redis redis-7.2.7-1.module+el9.5.0+30204+5d6debe1.x86_64.rpm 8f7e695ffbf939a42738ccc293f91816cc7ee686047d7d5879d94cb81898c807 redis-devel-7.2.7-1.module+el9.5.0+30204+5d6debe1.x86_64.rpm 631ddfb099f911a2e44e156c928c7e893b3facc9605698950d38f19cb0ef9f3a redis-doc-7.2.7-1.module+el9.5.0+30204+5d6debe1.noarch.rpm 020c8ce2443a525d948d5f6c4936ba60ae3e36f4e40c26ba384734dc7fbfd5e2 RLSA-2025:0693 Important: redis security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834) * redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145) * redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449) * redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228) * redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.17-1.el9_5.x86_64.rpm 017d920a25942e243a2b5d97360b51304e855b01f1fc2dc33366cb47473479f7 redis-devel-6.2.17-1.el9_5.i686.rpm b0671cd8217ba814074eaa4a792c145c5216af1f1719fa1093615534169d3f89 redis-devel-6.2.17-1.el9_5.x86_64.rpm 9eb56cda03556f7852d873aad8f5abb0922fed5608baac25314aa966d7f70516 redis-doc-6.2.17-1.el9_5.noarch.rpm df89ffd6492d1746fe62b039c6c436347eeb7aeb5fa5ab7bef7799579f1c93dd RLSA-2025:0791 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-8.el9_5.3.i686.rpm d172816face90e802801177eb9a3c0c572ef823dc71108ab1e5c2df9df8cb5e4 libsoup-2.72.0-8.el9_5.3.x86_64.rpm 2130c3c7f5f9087a637eee21a1d05e9046cd59b23820fcf5227163ec5d113957 libsoup-devel-2.72.0-8.el9_5.3.i686.rpm e3d9cc79d3cf4b47b3ee07ca2579d40ee9d342f0b84223f4ddca006facca061e libsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm 765d0855d6c88c0abef5af690893bf1953bc7e425cf285c2a5fe8ccb84a3b50b RLBA-2025:0909 alsa-sof-firmware bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains the firmware binaries for the Sound Open Firmware project. Bug Fix(es): * Update Intel/AMD SOF firmware in Rocky Linux 9.6 [rhel-9.5.z] (JIRA:Rocky Linux-62358) rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2024.09-1.el9_5.noarch.rpm ce54af2d3e1b04adb688defb98d49f85bb7be72d754c4a86a548b78768f597c5 RLBA-2025:0911 conntrack-tools bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conntrack-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use. Bug Fix(es): * conntrack-tools-1.4.7-2.el9: Rocky Linux SAST Automation: address (selected) true positives [rhel-9.5.z] (JIRA:Rocky Linux-67564) rocky-linux-9-x86-64-appstream-rpms conntrack-tools-1.4.7-4.el9_5.x86_64.rpm b8f96cf6d52e56c788e3ad4e06fb27f95e985f899096aa1b8a9e8da24aeaae0e RLBA-2025:0913 mysql-selinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mysql-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SELinux policy modules for MySQL and MariaDB packages. Bug Fix(es) and Enhancement(s): * Rebase mysql-selinux to 1.0.13 (JIRA:Rocky Linux-69603) rocky-linux-9-x86-64-appstream-rpms mysql-selinux-1.0.13-1.el9_5.noarch.rpm d62f6850b694e29424638dc01823471d72e5d2b9c680f3a9120c8a4c2ab0c249 RLBA-2025:0916 rust bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. This package includes the Rust compiler and documentation generator. Bug Fix(es) and Enhancement(s): * regression in rust-toolset 1.79: %cargo_install macro no longer accepts arguments [rhel-9.5.z] (JIRA:Rocky Linux-70036) rocky-linux-9-x86-64-appstream-rpms cargo-1.79.0-3.el9_5.x86_64.rpm 3c5824116c511d01bc14caa05d1d2333807197ea82dadda7672eae5e71e46c67 clippy-1.79.0-3.el9_5.x86_64.rpm eae5a298505cf929c2f562d30ec8f5342c1e4ff5e7f6c6f409d6d62054ccaff3 rust-1.79.0-3.el9_5.x86_64.rpm 38f5504cb0a3665e0d983583da9d3b4f4b87a698e34d62e1c3c14c142c708276 rust-analyzer-1.79.0-3.el9_5.x86_64.rpm bd4eaf2f0d255682ef4c30dda14b99d2ff078717133cb4dc5c9d406491d0f843 rust-debugger-common-1.79.0-3.el9_5.noarch.rpm 029df4467e19c7be274bd5a3547152d02d9965c8d8621117440567249d6879ce rust-doc-1.79.0-3.el9_5.x86_64.rpm 2ad3819ead5a01b5b885ff300ebf3ebaa853205052c351f6475f2064758c1a33 rustfmt-1.79.0-3.el9_5.x86_64.rpm 9d4d9f8900ef9adba917db64c04ecde21cca6ea039442313780d0d7940b52d53 rust-gdb-1.79.0-3.el9_5.noarch.rpm 511e1815f8b8940c0b9e09129e4a3537cc522765cbd59e18bcc5a5973dd4aa3f rust-lldb-1.79.0-3.el9_5.noarch.rpm 6a70057becb0702b48f10d926b47aa64614dd33260346c12926854d11869d91a rust-src-1.79.0-3.el9_5.noarch.rpm 4f4f282d73f69e3dcc778c06ef64e76d5b56329c50516d7c7c87ad405559d1aa rust-std-static-1.79.0-3.el9_5.i686.rpm 8c0f7d5a19b8573fc8f573915481168d6de2929cd1643bfefbc861e3336affb9 rust-std-static-1.79.0-3.el9_5.x86_64.rpm a534344d32586a783ede22bfa8e4af24ac5cb8d8e39858c6c86b77da16706206 rust-std-static-wasm32-unknown-unknown-1.79.0-3.el9_5.noarch.rpm a1cede993e1594128861b2c80b50207e719d46e6b0afba5d6446dfce3ad46021 rust-std-static-wasm32-wasi-1.79.0-3.el9_5.noarch.rpm 8d0b974f42a6653e6ef2eca89e32d2d6651bed7b663183346f256b4c22e30751 rust-std-static-wasm32-wasip1-1.79.0-3.el9_5.noarch.rpm fdc16b3c0291449e32ff8708c23ce428b33844766d7e03201a7cc9517d0ed8dd rust-toolset-1.79.0-3.el9_5.noarch.rpm 1ecd99b1b7ba672adc81957000ce34e55c2aaf16086096f062620332744cceb0 RLSA-2025:0917 Moderate: keepalived security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for keepalived. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The keepalived utility provides simple and robust facilities for load balancing and high availability. The load balancing framework relies on the well-known and widely used IP Virtual Server (IPVS) kernel module providing layer-4 (transport layer) load balancing. Keepalived implements a set of checkers to dynamically and adaptively maintain and manage a load balanced server pool according to the health of the servers. Keepalived also implements the Virtual Router Redundancy Protocol (VRRPv2) to achieve high availability with director failover. Security Fix(es): * keepalived: Integer overflow vulnerability in vrrp_ipsets_handler (CVE-2024-41184) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keepalived-2.2.8-4.el9_5.x86_64.rpm d45ee31af4a22b47618394e86c6188b85f4b2ba3217b29cc313387583b7bba70 RLSA-2025:0922 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-docker-5.2.2-13.el9_5.noarch.rpm 53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4 podman-5.2.2-13.el9_5.x86_64.rpm 776a1adad50d599bbb42e73a7238f4dba5625ea1a8eeabc9bdd0467ab83c8ac2 podman-plugins-5.2.2-13.el9_5.x86_64.rpm 6475de32f2e34ea1cb53d6f5bf38d3cb841cd218577bd2e275e30247e3458d91 podman-remote-5.2.2-13.el9_5.x86_64.rpm dfb5d2ac5934ec5f86f766c9f13016e8562ca7379de9e78d3f6d73794c7369cf podman-tests-5.2.2-13.el9_5.x86_64.rpm 0a01a3fa387d5267fe206918dfeee547fa4905c18c0b95aa6f65be29c2cee344 RLBA-2025:0919 haproxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Bug Fix(es) and Enhancement(s): * Newer openssl library (3.2.2) breaks executing haproxy [rhel-9.5.z] (JIRA:Rocky Linux-72952) * HAProxy fix CPU usage spikes [rhel-9.5.z] (JIRA:Rocky Linux-72955) rocky-linux-9-x86-64-appstream-rpms haproxy-2.4.22-3.el9_5.1.x86_64.rpm f1f88ce0cd2ffcf6afda68ffb4b3e54de1a3d8230ad56f03c8d125df517b69ea RLBA-2025:0920 passt bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges. Bug Fix(es): * [Pasta] TCP keepalive causes connection reset [rhel-9.5.z] (JIRA:Rocky Linux-68948) * Poor Performance with Pasta for rootless container when compared with slirp4netns [rhel-9.5.z] (JIRA:Rocky Linux-73251) * pasta fails to associate container packets to existing flow, connection data is discarded [rhel-9.5.z] (JIRA:Rocky Linux-74301) * Issues with Camel-Quarkus Integration in Podman Container Post-Upgrade (Podman 4.9 → 5.2) based on Pasta networking [rhel-9.5.z] (JIRA:Rocky Linux-75645) rocky-linux-9-x86-64-appstream-rpms passt-0^20240806.gee36266-6.el9_5.x86_64.rpm 72f66ce603df8e6df3336f6c9ef70223aa346fdee0a91e27d1474046b14f0760 passt-selinux-0^20240806.gee36266-6.el9_5.noarch.rpm 90b6783920a286f357131a95d0fd925313bbf50de9254c0014d5576e5cfa36f8 RLBA-2025:0921 linuxptp bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Bug Fix(es): * [RFE] Option for assumed NMEA delay in ts2phc (JIRA:Rocky Linux-70168) * [RFE] Allow phc2sys to get offset from ptp4l without -a and -w options [rhel-9.5.z] (JIRA:Rocky Linux-70678) rocky-linux-9-x86-64-appstream-rpms linuxptp-4.2-3.el9_5.1.x86_64.rpm 82b5dccbd82868fc3a2f1ca90834c5fd7b6a4c9ea37c4f0f6cbc1317cdeaecb1 RLSA-2025:1210 Moderate: tbb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for tbb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Threading Building Blocks (TBB) is a C++ runtime library that abstracts the low-level threading details necessary for optimal multi-core performance. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-tbb-2020.3-8.el9_5.1.x86_64.rpm dcdd99f87fbd23b5fc54dc4332f0c28522dbfd98f3e1b956af99d163ed274844 tbb-2020.3-8.el9_5.1.i686.rpm b6500ee2e56caa7287d387ce3828e3ff0bbbd9fd5ee78f76a58dbddaa45e418c tbb-2020.3-8.el9_5.1.x86_64.rpm a8b678297e29ccf6907400119d0e0e749507b49f5bac9959d39aeeef327a80c6 tbb-devel-2020.3-8.el9_5.1.i686.rpm 10f509b875e8e5e8b4520b50d830ba7e58e96d05c162fa0a1c82f2e4951539cc tbb-devel-2020.3-8.el9_5.1.x86_64.rpm b8674bab7d1a90a44fc4956f7193486c0dd7490b39e4dc390154e43ed611fb59 tbb-doc-2020.3-8.el9_5.1.x86_64.rpm bd90dde2e34775b7b2cf927d84f2e66f3f36e154b8fa16a83bd128410ccdd12c RLSA-2025:1300 Moderate: gcc-toolset-14-gcc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-14-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm 876a22394894a9d39c907bd40143d8cce61c87cb841393d11e8d9231d00cc1df gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm 1c0eb9ee545cc0952f7e89775ad5154c057f0faeec4d01a8d88b614360e3679c gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm f0b5beb0439263344aba9534af0110a7c1a3477fd4097841ebe1f500b0e0eb9e gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm a3682d4b06232f361481c5d6582bfcae8a0d8d5e373b45e818d39663015a9e95 gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm 10e6c7e0eb322deb6d5cd1956012858fa873f947c8b3c542291374f3553c9383 gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm 77a2cbce8147769fb47be0b4f2d2f8df7be6e6f3d5ca4710e0fbe707bd77fd7e gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm 0cee025c62a34090388d08784e10d57764d1063a0cf3c8eded46a740c9827cef gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm 7162bf0287aec97a1faeea41a938a003b994d7b35ed03eb295e46e67e311e034 gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm 4949e4da015b6ad75f2b92da071306da7def068d88c6c7070981219bf64fbd16 gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpm 71d1642c759f26578d5ae2035d3ecc04942e3ae3a67e50ecd1bd1877ba11ea7f gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm ebba9f23155cd712d6180c12364bba6d71ef87c2ba7a25fd2cbe60408d256387 gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm a28b67152086a93b73c006769b17b49a16a3f3066895cd553fea1cd5f8ee2381 gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm 9ebd338fcb93d7b02415ddb42e51c9c6abfc0d54107ba31373747e2a7807496e gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpm 3a797e49fe4884a2b4760a3df444538da2e69dd09ab5e0503fc4c1c273a8a90d gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm 88a4d8d55339176e922a30689656105bd9b770497a30834a15ee6bda657e21f6 gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm e4c7090aa4ef335af7baafc834c687c71cbf19e9aa172c6c4f0e3ef24c01869e gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm 648fcdf105b1fb40c21434c8180d2990f9d742358882ac65aa8fc9f4b20a70be gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm 946412d2ccecfea823eb02910c1c5038193aa88583bcd1eb41a6e59b585675ee gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm 89e721914855a78ee67486d9d83d49132d5986f77d52bd48a05fe935b0f14506 gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpm 878abc14cb7af14968833e01ea14533344089698034aae5008477d837a62870f gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm b4113560467c2d37fae2ea34cbe65a6e69f1e6e4d7747f4a346ab865e32dd277 gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm f37b475497cf46d9604a7c8e3d168c1caa6aa0805092cce8f59cf95ed64f927f gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm e376e993b663ecd695faf16fdc0b1f37e52da1f3cc8830c70d1eca2104e8e81c gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm 7123846f4f7291b4065bde58a3096ae656ee4b2bf7d897119f0ffecd6a5d7a54 gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm ceaec2312da3428660838b9999f94f8138077805276e6f4994332d786496e8db gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm 38b1e47e3c97eaa7a6d099a4da3bbdec07a6617a7ead48609aa1bf19886e4a38 libasan8-14.2.1-1.3.el9_5.i686.rpm 29c00c38aff4eb8bf212a589b8b03d737336473b107e7b4f4787bec304d5328c libasan8-14.2.1-1.3.el9_5.x86_64.rpm dd6f52b3c505847b5546f3c8ebe270d6953aeb22da44d873970c360c7569fb52 libtsan2-14.2.1-1.3.el9_5.x86_64.rpm 34e8b5ba48aff6d257d44f90170968966afae333ec02c8c875e23d6a8a6d4ba6 RLSA-2025:1738 Important: libpq security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libpq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation (CVE-2025-1094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libpq-13.20-1.el9_5.i686.rpm 05732ad4970087938ad9054b10bff63d556ecb5942d1954480c55be520335772 libpq-13.20-1.el9_5.x86_64.rpm e201fb92fd5c1eac7418b2ddd8647d5ccd15aebcc1f6db37e78b610aa1cf3db1 libpq-devel-13.20-1.el9_5.i686.rpm 35262b6ce777cf323ec275102fd62353aa6c2634bfef80c9fd8ee4539ecebc22 libpq-devel-13.20-1.el9_5.x86_64.rpm 4d17be86c0325ac8b6111c869dc572217cf403cfe64ceb315812b941f37ee0b4 RLSA-2025:1309 Moderate: gcc-toolset-13-gcc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-13-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-13-gcc13 package contains the GNU Compiler Collection version 13. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm bc5c3b646535eda7b65e323dfceffb5eee1024ca19bd091c190fb0a68b4fd606 gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm b5ee6b7f650e26a9697dd37891cc481ad2e285fdda8ee6c2e1e0db6ebea48fde gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm e5d5242efdc85adee1c48e70f63094916f7fd497535f9b99fe7549d9acddaf0b gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm ee6f2c86a2355a4ca4bbcf4f56041794d30a42704a80512e19113d5b78fff0a0 gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpm 4fb1ec79e1d1606506eca85b996ffbccdfe86dd21ee61df2dcd9af8bfe8b7f06 gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm 21c30595772dd4a6dadbc5f0ed83dbb8e262152a46d8d598269495adbc6f04ce gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm 0fc6ac71ec82e533617a0f7f25ca53720a665d48d8ab02a8a1c00e45bde6deed gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm 233c2421cead89007a87a2486eec45834680f1aec861e78b063c49e4aff8fff5 gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm b4b2b7b4ebdd7257e44dcb9e8a18b49dcc7f85f9de3cfbe14ce094a0e9f2593e gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm 4acac9699ee47273868bd09d0feab2dc75744a39f1c66c5db74fee38990fb4aa gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm a4b7309e4da3ee04c3452aba4c2aa1d41ca9ccfbcf529d06c8e914f73a5729b1 gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm 8bf2c6fb5f42acecab918cc27063f4782e8e84e1e7f2bd209ac5c51a74118251 gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm a9476d46d303a863b71e35659dd0b0679eee75ab140f5ce282bd7759011bf057 gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm 603552d85511075283224ef8ee81c74f1aee1291f9df45f23042fa29e4cc4cfe gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpm c8ad171a67a83fc261a8e5899c1b9467bbde8eda7f14498768bd584ad99e5a3b gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm 561a9988ba615e28e4bc0acd5a116258e80d6d9756f61cc4e420216229b01446 gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm f41dc3f00e61d1813034c0829b57d770a28e8727604315aa3c08067586c8faba gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm 7f3b75713e759719c81f81eb29bf71557e2a13c710f56242833b53283cf0a173 gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm ab2ee740f7ee97666b5e982e3400e1f478295db74a128ff5ad5689a624055633 gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm 391e6bbf1b1393dce07c37d21a137a3a9ac8e25b7481205accf8a0d5a3e1adb9 gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm ccb3a7d10948e12d58a65fb9f947f7ab0f84af81ac1c9965a9ff1a515791fd4b gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm 2132db3c0323180bbc9c1cec2b5d5e78badfa2dbfd58542785a48d48deae8ef5 gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm 676c5084d5ac78bb2ab9ecf72c211c0f8670cb8199236e73249784a5ccb929eb gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm 4cd9ad88617f8c04d9b87e72fb986d562638bf3e965fec1e91ecf2259c9684ba gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm 5876e697c0625db3c6772799862e19f85ca236d52384d7e6d618f9f02b953cea gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm 3854537a72fde399f98853e12a4a6bcbf2920fd65bb28d725419f7f5e6d19d6f RLBA-2024:9256 opentelemetry-collector bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.107.0-10.el9_5.x86_64.rpm a8bd9ad015c01c8c32ccf5870343f8f6c57ad49b283d8a5c62065fb564e976a5 RLSA-2024:0465 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sqlite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sqlite-3.34.1-7.el9_3.i686.rpm ebb4946387ff332243511f31856d8529259475e81083f49bc4ab9f5949f883f4 sqlite-3.34.1-7.el9_3.x86_64.rpm 3db7e0a7937231a5b23a8537bec0ee58ab03e16dad01564ccfc7d0b844fcfc39 sqlite-devel-3.34.1-7.el9_3.i686.rpm c7ee3573baa23603c95a631b38938f121af306f1a1ae4f823a0cfa64eef86384 sqlite-devel-3.34.1-7.el9_3.x86_64.rpm 350885c689cab113d7e24eaa95191c84fcc01d2ed34d6817e57269387620a793 RLSA-2024:2410 Moderate: harfbuzz security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for harfbuzz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HarfBuzz is an implementation of the OpenType Layout engine. Security Fix(es): * harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks (CVE-2023-25193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms harfbuzz-devel-2.7.4-10.el9.i686.rpm b2860af84e2115576de6d4badd1de5000ac718c53b9d5cddeb95d9f4b2d1b611 harfbuzz-devel-2.7.4-10.el9.x86_64.rpm 8126d9e44867d237fbeba20ce0e692399c9acefa9aa8148e35acdee4acbc969a harfbuzz-icu-2.7.4-10.el9.i686.rpm b3f096c16ab1f767a4b7339530720c4cf8233124e2ec9588dec52148934d3ecb harfbuzz-icu-2.7.4-10.el9.x86_64.rpm 4439cad4cd72355100bc6724220df6f90ba43aac254c7811e739c48095c4531f RLBA-2024:2430 libfido2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfido2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fido2-tools-1.13.0-2.el9.x86_64.rpm 1afb7d89af0b2f46071aef984d8716a1cf8f037a3c81d3d1bd846a2396898460 RLBA-2024:2442 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for policycoreutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms policycoreutils-dbus-3.6-2.1.el9.noarch.rpm 82c99ff741149e770750767380e94b023c8e8d0598aa3b7c796f4d158d0d131d policycoreutils-devel-3.6-2.1.el9.i686.rpm 68552a5868edd7df9eb74d91a308193a42dd88fdea0af70e7b15d24689309cb2 policycoreutils-devel-3.6-2.1.el9.x86_64.rpm 664aae3e74491a4871246ac9995eb47e8ca924c97f1e38aff754e3dac4807700 policycoreutils-gui-3.6-2.1.el9.noarch.rpm 30772604a3b6ad3b61acfcde8484c34bc698d58460dcc3ecfaccc34b492c2969 policycoreutils-python-utils-3.6-2.1.el9.noarch.rpm 78c3d948436dee8718d5994bbfbb991a54c1de33591dca381726d63e4aa14579 policycoreutils-sandbox-3.6-2.1.el9.x86_64.rpm c611ef185e1cc2fbf358b3d60af7d01fa951e448858fe4c66a41300454dc7d0c python3-policycoreutils-3.6-2.1.el9.noarch.rpm 2d1c23b07f4b428b3b46230c61fb1073064e09d81760cf516c08ae4787f85ae4 RLBA-2024:2443 libselinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.6-1.el9.i686.rpm e3d2ca801ba991e588d495eedef08a028cb029dfbac42d435a9d2b7a1ddf059d libselinux-devel-3.6-1.el9.x86_64.rpm 53f451c22a43535c5542c1c41fcb3acd44b013be171367ba54436cd235a5edc1 libselinux-ruby-3.6-1.el9.x86_64.rpm 5e97adc57d3603b708ef01385f8169a168c5228b545e9e2f2347c722e0e5374f python3-libselinux-3.6-1.el9.x86_64.rpm 3744ff0bdd26d9666c0025a2a58fb33a482a13a1c92bd6fc9b7347984ccd6db9 RLBA-2024:2454 nettle bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nettle. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nettle-devel-3.9.1-1.el9.i686.rpm cd77fb736b0d481cd3f5e3d93ec45d16574bdb750185be7d10b56ba3268e20b8 nettle-devel-3.9.1-1.el9.x86_64.rpm 30333749ec75e76ce5bcc54ddf6877461c388802bfd7b026d31e7797a14e0e64 RLBA-2024:2457 libnl3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnl3-devel-3.9.0-1.el9.i686.rpm 3771b1a994d477d43aeea4f1858caef1b4929572b211df47146e3a7296845d6a libnl3-devel-3.9.0-1.el9.x86_64.rpm 537cd61150b79ace602af6e30e07374a73c8f396e0e49f2ffd9d3e01cf6d247e RLBA-2024:2460 openldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openldap-devel-2.6.6-3.el9.i686.rpm 9f2eb26ae79c2dddd8cd8f3930ce11bdc0eb73b068f843adeebdc8bd03fc2fd3 openldap-devel-2.6.6-3.el9.x86_64.rpm 724740cc641a431cc169dbbef1b37496ac18bf41331916f6c7ff1ff376ab96c9 RLBA-2024:2466 iscsi-initiator-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-iscsi-initiator-utils-6.2.1.9-1.gita65a472.el9.x86_64.rpm 81314e1b3a72ddb476d7a6e12b20c6f0d37804a3276d4c8a16b7c59eeb48b16f RLBA-2024:2465 setools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setools-4.4.4-1.el9.x86_64.rpm e167e2db93e6f1a25ad2b8d47676a118ba9a6b256cefb36aab1c31039237f940 setools-console-analyses-4.4.4-1.el9.x86_64.rpm 32d2c79172533519d3195a98b11713d31af08690880d114485485f8493bb2335 setools-gui-4.4.4-1.el9.x86_64.rpm 10983b40d85ed9a00bcea3aab5221cb26c712c93d9eda3a455b88b21813ce12e RLBA-2024:2487 python-requests bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests+security-2.25.1-8.el9.noarch.rpm 676b05532e43a8b7ea183fcd2b858549aa191d0d65e4b6a722d77bd72bfa8de5 python3-requests+socks-2.25.1-8.el9.noarch.rpm 80220380ba92bd3a66c65bc44a0dc996c568417c2c807c703dc2712c939124f5 RLBA-2024:2500 fwupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fwupd-plugin-flashrom-1.9.13-2.el9.x86_64.rpm 69d830eaccc260de22c35d5f219b2ab0e36366121636adbbc08c5fbdcd88cf14 RLSA-2024:2504 Low: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for libssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004) * libssh: Missing checks for return values for digests (CVE-2023-6918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libssh-devel-0.10.4-13.el9.i686.rpm 09aac19ba4c4179b45c9579b9bf99f9b202c98438786eb68c779a0de87c81745 libssh-devel-0.10.4-13.el9.x86_64.rpm 43fad4c6dc131266197b575e8f21ecad048849ebc3269a36e38e42abf5577e78 RLBA-2024:2516 lksctp-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lksctp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lksctp-tools-devel-1.0.19-3.el9_4.i686.rpm 11835bfda38e68771b910854ba8d06a6de57408eefb0f32c6412582122126698 lksctp-tools-devel-1.0.19-3.el9_4.x86_64.rpm 654f72525e3ce339d0f404a863d993f08aaaf422b87ba15334009cc8ce9ef56e lksctp-tools-doc-1.0.19-3.el9_4.x86_64.rpm bd67935a8b2efe541e8d7c2bebb6f55ad682cf8e3cb72e95a75b900b5ca4b1fb RLSA-2024:3842 Low: c-ares security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms c-ares-devel-1.19.1-2.el9_4.i686.rpm 4c8a007bf821eabca00319aa0958ea6340e0a71ad10e79e62f87273c83528718 c-ares-devel-1.19.1-2.el9_4.x86_64.rpm 829d24bd8cdd5e181190723b032e02a50d8b3c01ecf12202d39038ba5e195105 RLBA-2024:4778 mtr bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mtr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MTR combines the functionality of the 'traceroute' and 'ping' programs in a single network diagnostic tool. When MTR is started, it investigates the network connection between the host MTR runs on and the user-specified destination host. Afterwards it determines the address of each network hop between the machines and sends a sequence of ICMP echo requests to each one to determine the quality of the link to each machine. While doing this, it prints running statistics about each machine. MTR provides two user interfaces: an ncurses interface, useful for the command line, e.g. for SSH sessions; and a GTK interface for X (provided in the mtr-gtk package). Bug Fix(es): * Regression: mtr --address doesn't work with policy-based routing (JIRA:Rocky Linux-29176) rocky-linux-9-x86-64-appstream-rpms mtr-gtk-0.94-6.el9_4.x86_64.rpm 6c3e0ad235366ad099b55bf8ee5d936b0d3aa291bd37949cb190d4b0e5985be1 RLBA-2024:6161 libevent bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libevent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libevent packages provide an abstract asynchronous event notification library. Bug Fix(es): * Socket is closed twice when retrieving an HTTP request fails [Rocky Linux-9] (JIRA:Rocky Linux-26128) rocky-linux-9-x86-64-appstream-rpms libevent-devel-2.1.12-8.el9_4.i686.rpm ede34e0bed5b9b46cc137a4896b6febab923c16a8f302c320dc06ace5da23be0 libevent-devel-2.1.12-8.el9_4.x86_64.rpm 684b3c7f129aaeb16929026d433191aed032129a1114f4da805a10310ca83c37 libevent-doc-2.1.12-8.el9_4.noarch.rpm db519c0939cd740a789939e3c7ae32686aa22bbcec7b0eafc2872348e54e5e34 RLBA-2024:11252 sssd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-9.5.z] (JIRA:Rocky Linux-66268) * Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-9.5.z] (JIRA:Rocky Linux-67673) * sssd backend process segfaults when krb5.conf is invalid [rhel-9.5.z] (JIRA:Rocky Linux-68508) rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.9.5-4.el9_5.4.x86_64.rpm ca72fdb1bc964e29a6b73e71bf825b93026f007d7256f783634b16a9b4d73e20 RLBA-2024:11253 libsemanage bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es): * semanage fails to get lock if / is on NFS (or /var/lib/selinux/) [rhel-9.5.z] (JIRA:Rocky Linux-69531) rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.6-2.1.el9_5.x86_64.rpm 6240cebf3aa8e7e62c17ad7535080d53b6c02187b853c6c978e6be5071fb9eee RLBA-2024:2120 xxhash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xxhash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xxhash-0.8.2-1.el9.x86_64.rpm 8541fa3e3e794b5702c684d8de3171e26aea778a47e6c8e728083d932a64ef46 xxhash-libs-0.8.2-1.el9.i686.rpm 9c04499c3f4888bf93baf55efff91b70b36998560310bee5eb212ad3a5c2c4db xxhash-libs-0.8.2-1.el9.x86_64.rpm 7e80a3bb4811c9e9843b50cc5c2af0d88a0add48a952516b4e539d26237458d7 RLEA-2024:2127 nispor bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nispor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nispor-1.2.14-1.el9.i686.rpm e1f230e3ea99ac0a47f0a71374eb35538739c42540a2a4082d0e4fe2dd495dfd nispor-1.2.14-1.el9.x86_64.rpm 5de747b4800a825da69b8b26d91fda9ce637b46f9de60f8de9c423c358f754f5 python3-nispor-1.2.14-1.el9.noarch.rpm e1ff4f8da91fda815864d7181d02570e2b8c384f081c766c945397f9df123944 RLSA-2024:2137 Low: LibRaw security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for LibRaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others). Security Fix(es): * LibRaw: a heap-buffer-overflow in raw2image_ex() (CVE-2023-1729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms LibRaw-0.21.1-1.el9.i686.rpm ef9f7ce01213439fc8426ecf11752c0678643b8452adbb2e0430e4a3a3903113 LibRaw-0.21.1-1.el9.x86_64.rpm 56b7b9a54d7b0752707914b30b86ba4ca3cc4bf911280ff37f68f5b84722b640 RLBA-2024:2136 gegl04 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gegl04. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gegl04-0.4.34-3.el9.i686.rpm 360f1cc2fd135ca784ab70af06aecd57323246e089df0842d4e5dacb3d7ae14b gegl04-0.4.34-3.el9.x86_64.rpm 49d98aae79b428b62cbfa78a1861469e39c6ad843e5e8f2b8c1a85a5a7df2a0c gegl04-devel-docs-0.4.34-3.el9.x86_64.rpm 945322bf200a604877e9404b07f868f402e8cb33da460a3b0ec0db9943c25671 gegl04-tools-0.4.34-3.el9.x86_64.rpm c3f4f2506ded6bd6ecb59d67d874f7ef324b8b64455ba2446d7b6bf4f48fce94 RLBA-2024:2175 tpm2-abrmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tpm2-abrmd-2.4.0-4.el9.i686.rpm 07362c19135b04d1d3e478331f5587dcaea00243d6824720d6a05415a7781c7c tpm2-abrmd-2.4.0-4.el9.x86_64.rpm 2f2b973edc7178fd4d29945f1ce8f665d19352b716393af892e804a667a4e05b RLBA-2024:2178 nautilus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nautilus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nautilus-40.2-15.el9.x86_64.rpm d541a87e8814c212a9d5902ab8968cd8233cf615590f9b9bd13dca49b374d3ae nautilus-extensions-40.2-15.el9.i686.rpm a0a869ad09c894f954f89c90aef7bc2ad08769438b215cfb8a90b1260e1c25ab nautilus-extensions-40.2-15.el9.x86_64.rpm abd06a0dda484eaadc04f96beb87fb488f055028628ffcc63a445e19cf030aa6 RLSA-2024:2199 Important: pmix security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pmix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Process Management Interface (PMI) provides process management functions for MPI implementations. PMI Exascale (PMIx) provides an extended version of the PMI standard specifically designed to support clusters up to and including exascale sizes. Security Fix(es): * pmix: race condition allows attackers to obtain ownership of arbitrary files (CVE-2023-41915) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pmix-3.2.3-5.el9.i686.rpm d3ea74f4ade7e7d87559cc2a021f0c31449de377704d9861f683ad874cefe6f8 pmix-3.2.3-5.el9.x86_64.rpm 32485c9b6a3f8c09002e9a784521aa2f59dba23347edf6758944626d6bd32186 pmix-devel-3.2.3-5.el9.i686.rpm f6fc885eacf6480d3a7d4503651c030041e90934fa1d6e6d071789b5f88da34e pmix-devel-3.2.3-5.el9.x86_64.rpm 1f7d525d3ef19aeea7f58443fb0ee361f55655694daee636873f8957118375cd pmix-pmi-3.2.3-5.el9.i686.rpm 492cc7fdbbf635fe5951a3e79b8548032ffbfd95e9887e33f9697e2fbb7a82ef pmix-pmi-3.2.3-5.el9.x86_64.rpm e4de9928b42edadbc4724be5faa825926809265bc7aff7793a210cfb029deeec pmix-tools-3.2.3-5.el9.x86_64.rpm ba14508ed426b05e9b7775ae438670d185e929e04e812023cb681f7e0c02ca18 RLBA-2024:2209 google-noto-cjk-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-cjk-fonts-common-20230817-2.el9.noarch.rpm 302b518493d06e6b2d266104db33e226d5a01170cd47f3d96c8b0dee1e5c9c78 google-noto-sans-cjk-ttc-fonts-20230817-2.el9.noarch.rpm f224dc9d08a734f992c1ab5726d7b7f3ddff8aabf2861189bc0b7050bd8b3e2b google-noto-serif-cjk-ttc-fonts-20230817-2.el9.noarch.rpm d953bebf157753796138782c8225d71a77ec9172583f4dcef2e41e2fe9299c99 RLBA-2024:2232 papi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for papi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms papi-6.0.0-16.el9.i686.rpm cfd0331dac5ce40c3002c346cf402adbb935fb51bb9a440c6b2450e4e92b98f1 papi-6.0.0-16.el9.x86_64.rpm 0cd405721c3a73055c517345cad78d05581c86767ba56e72c558b6836c163b4d papi-devel-6.0.0-16.el9.i686.rpm 12e518f56678509bd738216ec20602100eb570568cab2210bff88bc421802f61 papi-devel-6.0.0-16.el9.x86_64.rpm f638f82758b900442f473d7809877e5c871b9656b6471699d9871094932cb4f0 papi-libs-6.0.0-16.el9.i686.rpm 460bcf9d422286d5e939af7e4cd67abd45e9ced8915c6750320fa604c0863476 papi-libs-6.0.0-16.el9.x86_64.rpm d70b2a936f24a41917bc20095901785b5bc02b85b49596e8aa3b3d23c3880746 RLBA-2024:2273 libadwaita bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libadwaita. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libadwaita-1.4.2-2.el9.i686.rpm 8101398dd8fdf98c13b15153d8315841f95d3c743e3388a76a4c1750210e96a5 libadwaita-1.4.2-2.el9.x86_64.rpm 9a49b7f63b8f17962fc3245b2903fc350b8c4f9f553dc54642888ecd71898ad9 RLBA-2024:2296 libtimezonemap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtimezonemap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtimezonemap-0.4.5.1-13.el9.i686.rpm 0caabf2c1ccbb9e2530aa40779e1f4a30ca0c65f42b2156a9fb05062e26afb73 libtimezonemap-0.4.5.1-13.el9.x86_64.rpm de78d0c334d102b7507d92996e6c4cf9bee00df960bc0d197191e405d43f701d RLBA-2024:2300 libzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libzip-1.7.3-8.el9.i686.rpm c460312a55aa535dc6660f1ae447834c40f51e3bbb48eb1bbc6df85c998ab2fd libzip-1.7.3-8.el9.x86_64.rpm 4aeac47b95260b13bded303cca2e895bc5936b556703d7feb542881e525b1a19 libzip-tools-1.7.3-8.el9.x86_64.rpm 81a11cadc7daa60818fb90a5b189907474915738d1b3f2cc061a80d4cf09af85 RLBA-2024:2321 python3.12-scipy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-scipy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-scipy-1.11.1-2.el9.x86_64.rpm 0088b44014127c5043fca277f5798afea20da72f98731919949b54f7abb77a7b RLBA-2024:2317 python3.12-wheel bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-wheel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-wheel-0.41.2-3.el9.noarch.rpm 28940dc20566f474aeedaab81f1006a56ffd02184ea7db2aa96f36f5299ca99d RLBA-2024:2319 python3.12-psycopg2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-psycopg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-psycopg2-2.9.6-2.el9.x86_64.rpm 921770bb8003c560180cec2e58d0bac3024b4febf50ebaba3b9b1826fc6113c6 RLBA-2024:2330 gtk-vnc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk-vnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk-vnc2-1.3.0-2.el9.i686.rpm 91bb098c2e357e8d91c29a2b9418dd4d1f6a587694a52c80b93de544a206b16a gtk-vnc2-1.3.0-2.el9.x86_64.rpm b201478fa1fab9c364e4feed3595788a8d324975318484d65f3f5105760c0208 gvnc-1.3.0-2.el9.i686.rpm 9bfc47c771fbd39079ab22e3a54bd0d8e23ff4cc4b40aae7bb8ce1e7e3a2a925 gvnc-1.3.0-2.el9.x86_64.rpm 548410605bc23963b83ac7116f212d41b4c3eb352931a1aa9c0ba653a071ce1c RLBA-2024:2334 liburing bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liburing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liburing-2.5-1.el9.i686.rpm c7f4f428f980fc3a8892b6cce4a03ec72a77b372c9ed1b27321cd05f9d3645fd liburing-2.5-1.el9.x86_64.rpm 4156100a58ba1de50cf31d26e2efc398aea332a4c3bceb98c0b9a16452fea9f3 RLBA-2024:2339 python-ruamel-yaml-clib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ruamel-yaml-clib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-ruamel-yaml-clib-0.2.7-3.el9.x86_64.rpm a9a0971c8a7471ed9fdd4ff8ae994c773ed64a94188fa98ab276a71e7ed5ca1d RLBA-2024:2350 pyproject-rpm-macros bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyproject-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pyproject-srpm-macros-1.12.0-1.el9.noarch.rpm 1a5c9ea7910fc23befec1ed332c3729aa795f41849a3ad7673ebfb282cc9a7d3 RLSA-2024:2353 Moderate: mingw components security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mingw-w64-tools, mingw-headers, mingw-zlib, mingw-binutils, mingw-winpthreads, mingw-libffi, mingw-gcc, mingw-crt, mingw-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MinGW (Minimalist GNU for Windows) is a free and open source software development environment to create Microsoft Windows applications. Security Fix(es): * binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 (CVE-2023-1579) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-crt-11.0.1-3.el9.noarch.rpm c51230f416183e0c57de307d407e2ffba39f5c4090da825baba386b61741f5fe mingw32-filesystem-148-3.el9.noarch.rpm ec3132796ec36ed721b243022b478be4a6daf1d12aee2c81ead248ed61269fcb mingw-binutils-generic-2.41-3.el9.x86_64.rpm 9f427f572607cb57bb40d5d6613be6b04d1666085b88f82f6c7be6a310ef8f88 mingw-filesystem-base-148-3.el9.noarch.rpm 7b01e206f79e561a50b62f94540ad910b9f52435ca135bb0872511c0685f788c RLBA-2024:2355 expect bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expect-5.45.4-16.el9.x86_64.rpm bcef638f64ddec217f154ba7b1d6a88ece428fe21c186c7b74dc3a0796cae1e6 RLSA-2024:2377 Moderate: zziplib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for zziplib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: invalid memory access at zzip_disk_entry_to_file_header in mmapped.c (CVE-2020-18770) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zziplib-0.13.71-11.el9_4.i686.rpm 467c09448b6739d457820606a767f94935885a61a4b402bad4963143aabc8478 zziplib-0.13.71-11.el9_4.x86_64.rpm 49d0e9ba7852f512cee2bee842fa0c54922083b428691c6934c804213ce4fc20 zziplib-utils-0.13.71-11.el9_4.x86_64.rpm c91663ea12bd085ea3e523e04524167690fc58a95adb6a11ba2d397c6ef0a5d1 RLSA-2024:4756 Moderate: libuv security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libuv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libuv is a multi-platform support library with a focus on asynchronous I/O. Security Fix(es): * libuv: Improper Domain Lookup that potentially leads to SSRF attacks (CVE-2024-24806) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libuv-1.42.0-2.el9_4.i686.rpm 5c31bcf9e0c60d2557c04ab16e5537ae91d51357cc0230e4a76818dac9756a49 libuv-1.42.0-2.el9_4.x86_64.rpm 9c633e2eec1ec0c2e9f859b30d21ee11a8722f7a356a6b7eaa42528303206581 RLBA-2024:4760 qatzip bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list QATzip is a user space library which builds on top of the Intel QuickAssist Technology user space library, to provide extended accelerated compression and decompression services by offloading the actual compression and decompression request(s) to the Intel Chipset Series. QATzip produces data using the standard gzip* format (RFC1952) with extended headers. The data can be decompressed with a compliant gzip* implementation. QATzip is designed to take full advantage of the performance provided by Intel QuickAssist Technology. Bug Fix(es): * qatzip: 1.2.0 update [rhel-9.4.z] (JIRA:Rocky Linux-41077) rocky-linux-9-x86-64-appstream-rpms qatzip-1.2.0-1.el9_4.x86_64.rpm 3b75e21e0078875871f95ff22bcc11f969b861ef836f4c4cf5b0a9c2e50b0f64 qatzip-libs-1.2.0-1.el9_4.x86_64.rpm c940c373763e0494eeb99b96bdc0a37bdb600baf71a8de0292113fb95eac95d9 RLBA-2024:4759 qatlib bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Intel QuickAssist Technology (Intel QAT) provides hardware acceleration for offloading security, authentication and compression services from the CPU, thus significantly increasing the performance and efficiency of standard platform solutions. Its services include symmetric encryption and authentication, asymmetric encryption, digital signatures, RSA, DH and ECC, and lossless data compression. This package provides user space libraries that allow access to Intel QuickAssist devices and expose the Intel QuickAssist APIs. Bug Fix(es): * qatlib: 24.02 update [rhel-9.4.z] (JIRA:Rocky Linux-40921) rocky-linux-9-x86-64-appstream-rpms qatlib-24.02.0-1.el9_4.x86_64.rpm e03575d24572e10d5919879963e1f3df5fcb995b5a996501fe4158f436cb5b06 qatlib-service-24.02.0-1.el9_4.x86_64.rpm 20273dfe3465437abe002819320da9a7771c46006976334bb3a719c9ca41b9e4 RLBA-2024:6180 libwacom bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwacom packages contain a library that provides access to a tablet model database. The libwacom packages expose the contents of this database to applications, allowing for tablet-specific user interfaces. The libwacom packages allow the GNOME tools to automatically configure screen mappings and calibrations, and provide device-specific configurations. Bug Fix(es): * Backport libwacom updates for Cintiq and Intuos Pro devices to Rocky Linux9 [rhel-9.4.z] (JIRA:Rocky Linux-53014) rocky-linux-9-x86-64-appstream-rpms libwacom-1.12.1-3.el9_4.i686.rpm 3cddbe09b6a16f4f11af41dc7c230c65e8b204a85b5bbd54dc545e70c90c1f29 libwacom-1.12.1-3.el9_4.x86_64.rpm 923c7d8ab3dd96a7287419acb91631f417b4fe8cb80e862aab19c0b52735bca7 libwacom-data-1.12.1-3.el9_4.noarch.rpm 88a411167bee34df4c11d3f9396a36b2c73b3a348b2e77276e28a2cdc9d26569 RLBA-2024:6182 libblkio bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblkio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libblkio is a library for high-performance block device I/O with support for multi-queue devices. A C API is provided so that applications can use the library from most programming languages. Bug Fix(es): * I/O error on a vhost-vdpa blk device using directsync cache mode [rhel-9.4.z] (JIRA:Rocky Linux-53566) rocky-linux-9-x86-64-appstream-rpms libblkio-1.5.0-1.el9_4.i686.rpm db6ad045393ea741385a432227f1d01f76fe6849b0994bd6187b4040fa2213c9 libblkio-1.5.0-1.el9_4.x86_64.rpm cf8e04ee37c96440b80c87739cc3d66127ab6345985e13abe33d9b49ab9d1093 RLSA-2024:6197 Moderate: ghostscript security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510) * ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869) * ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-17.el9_4.x86_64.rpm 15489effe2f0301e148ee63e3223d43ecc3e4da06b26627001ee298e062cdc57 ghostscript-doc-9.54.0-17.el9_4.noarch.rpm 8fc380d55d4895e82633bd5003f45094ce9ad8dbf862ca0d810bdcbcdef062ff ghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm ab2dcde21226cab3180a4386fd6f2d47a715570e2e717d2e303d2d3336ec034c ghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm 3ddad590bf383ea2e95149b572afb328612494d6c3a16684930aac1a143da836 ghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm ba1ec6a5268f06e1b64287f65849647f6d82bc1eaf53ded828aee82169c376dc ghostscript-x11-9.54.0-17.el9_4.x86_64.rpm edf9284756cb04c4afa3864133be4b6c68cb2faf25440a7080247732838988bd libgs-9.54.0-17.el9_4.i686.rpm b260e17cc12e158a0c1825415d68fb62646c750b0c270e7167526f130cffb6ad libgs-9.54.0-17.el9_4.x86_64.rpm 863d2e89d8404a002c559d5a87e8cfa617539103507e5db923d73a844fcb254f RLSA-2024:6356 Important: bubblewrap and flatpak security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.9-3.el9_5.x86_64.rpm 80eacd4468c3f7f76b7750d862f89d23b46e475d3d7c337eafac8dca204fc36a flatpak-libs-1.12.9-3.el9_5.i686.rpm 2aaaf694f61da1d2942f876500edd4e652eafca864a1618e363f37b37fbbcd2b flatpak-libs-1.12.9-3.el9_5.x86_64.rpm 74b4b7d4cb8a41a1ff43b5694e3f19b5d2343bb77d5405f89d9a9e650bd63ca2 flatpak-selinux-1.12.9-3.el9_5.noarch.rpm 9a7a53e33d124e6838a778da95590442fdd3b984734b618807ef14ffff2e2194 flatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm b50f940198df8ce8868e962728202d50fd8711058a41c3e64ee4653bec2866ba RLBA-2024:11220 ant bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byte-buddy, jzlib, xerces-j2, xz-java, xml-commons-apis, jdepend, regexp, jakarta-mail, junit5, assertj-core, univocity-parsers, jakarta-oro, objectweb-asm, hamcrest, opentest4j, ant, antlr, apache-commons-logging, junit, xml-commons-resolver, jsch, bcel, jakarta-activation, bsf, apache-commons-net. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Ant is a Java library and command-line tool, which drives processes described in build files as targets dependent upon each other. Ant provides a number of built-in tasks allowing to compile, assemble, test, and run Java applications. Ant can also be used effectively to build non-Java applications, for instance, C or C++ applications. Generally, Ant can be used to pilot any type of process which can be described in terms of targets and tasks. Bug Fix(es): * ant: Add OpenJDK bindings [rhel-9.5.z] (JIRA:Rocky Linux-62405) rocky-linux-9-x86-64-appstream-rpms ant-1.10.9-11.el9_5.noarch.rpm 1c4aec9df75cab4de1294af4857af0bf672528f1092044e2c38fe7a00a363cd1 ant-antlr-1.10.9-11.el9_5.noarch.rpm fd0895435fed9892fe409db9e3cdccb6d1496630afd651a53060ddfd17656d1f ant-apache-bcel-1.10.9-11.el9_5.noarch.rpm a7e1449ca05cc60924b0f873a8abea8f5d6d3e646a7aca9600f08c73539b1acc ant-apache-bsf-1.10.9-11.el9_5.noarch.rpm a0c5e55694e0e37e34965f7043de9479ffb6140c74439d2557d56cd4bc9ad199 ant-apache-oro-1.10.9-11.el9_5.noarch.rpm 8566017758aefdd542ce6a62041e6a9b2b988dd03388ba38027e345f1cf04875 ant-apache-regexp-1.10.9-11.el9_5.noarch.rpm 11cba04f4e37ce2e7d30df42da5d5f96dbf7fa60ce8f2bbb316415d4f94faf36 ant-apache-resolver-1.10.9-11.el9_5.noarch.rpm 79fd9596a8c0fabe630789988b9dab3f4a4ef680c2cc3d0c90ca8e0dac8a9bcd ant-apache-xalan2-1.10.9-11.el9_5.noarch.rpm c3bf010e5d5f1905da74b5d71b00262e5c35c1b5e834d0a7e52d59fe650639de ant-commons-logging-1.10.9-11.el9_5.noarch.rpm 04dc67de448d8ccf06e32df1367c261b262ff0a988cbe175e5fcb4e4b9cc8285 ant-commons-net-1.10.9-11.el9_5.noarch.rpm 992b63b67a5acb6ed48f8e3bf9839434fa060286ffd325bc3ff314b39375690e ant-javamail-1.10.9-11.el9_5.noarch.rpm acdea8988cb8ad841f69c8f0d82d58299a1f1205ee87c4ed7daa314e77c4a1c0 ant-jdepend-1.10.9-11.el9_5.noarch.rpm a8fb999950207209ef4c34383116ae9c04450519ef1ab7f74ded8e8da9f98853 ant-jmf-1.10.9-11.el9_5.noarch.rpm ef28afc8865422dadc6bb86ba330f0b67c9ddca6fa72cdcda09568ebc5ad8342 ant-jsch-1.10.9-11.el9_5.noarch.rpm 6496ed6fdee2705ef1c1560aaddd82a828df453d4c348432545936e08f9a51af ant-junit-1.10.9-11.el9_5.noarch.rpm 4445b849b6262d1e436af9c80a07cda70b3a4325910e20a67a8058780c488d1e ant-junit5-1.10.9-11.el9_5.noarch.rpm 4423797ac4487eb43fde4fc1c7974548c3b6ee29077a6b3011063d91ba9602ab ant-lib-1.10.9-11.el9_5.noarch.rpm f9519570cb3bfadf8674b0d94f3daff63bfd4757b6efb789e64ebcc8d52fc762 antlr-tool-2.7.7-70.el9_5.noarch.rpm f88990fec7ddf6acfc00756aa843f9b6d1e72bf38cd47d713146c3be8921e249 ant-openjdk11-1.10.9-11.el9_5.noarch.rpm d4ca711c2c1be3203f4a7538fe203bf6b4c15939c09ab36e0bdd05dda79e192b ant-openjdk17-1.10.9-11.el9_5.noarch.rpm 726a562b2251c710c7841a57b7733bf67bb026a40c62992059f3fdd6702a0699 ant-openjdk21-1.10.9-11.el9_5.noarch.rpm 751586f497071e427a77b2ee39acd10bfea31756ec0917e4e6e7132ca0289b24 ant-openjdk8-1.10.9-11.el9_5.noarch.rpm 8e24e1c573386fec69a9a08c78b9b136de56933ecbf84ff1cbe54b24e9ae85d4 ant-swing-1.10.9-11.el9_5.noarch.rpm 02b8d80681a15db831af32a9e8088cd0398318ce00bd33d523e89742f8ae84f0 ant-testutil-1.10.9-11.el9_5.noarch.rpm c6d005d7aa725d9ae2a0970e65acde476f13041cd825edbcf99c36a91724242b ant-xz-1.10.9-11.el9_5.noarch.rpm 698e387118a0629fab8c10853894d5483f0abac29ebd19e78271128f97c13d1b apache-commons-logging-1.2-31.el9_5.noarch.rpm 076fab2c3b13fde2586fd82249c221f73bde11eab292e4505deb1b24084facc3 apache-commons-net-3.6-15.el9_5.noarch.rpm 66bf86679254ccfc645f40aa5753d2519727ce34afa85aeccb90b9227568ca57 assertj-core-3.19.0-6.el9_5.noarch.rpm 41c3093573d2c707bd0b6cfc9101bb9cf5891374970cb1f65eaaa9963cbd5870 bcel-6.4.1-11.el9_5.noarch.rpm 9cf2f0c13b6eab7a1000bafa2ce6ae999e1adbc1e894fcd55b78ddb871aa69f6 bsf-2.4.0-45.el9_5.noarch.rpm d77224d70e968e3a391a33dd5cc6fbf7a9036d2e5a64d61ea7d47ffcd7c02913 byte-buddy-1.10.20-7.el9_5.noarch.rpm 9c1cea78988441136bff9f04326b7a1a3e302cfefe716190ea855ce2424148eb hamcrest-2.2-9.el9_5.noarch.rpm 106ca09fc8a2883044fb05d04bac90bd8426fad1e1b2f7c67e3d291bf16f7654 jakarta-activation-1.2.2-6.el9_5.noarch.rpm 95bd815ec51166ce25ccca83a52d23cb36942e4713d34bc0c24fc9bde1b87966 jakarta-mail-1.6.5-6.el9_5.noarch.rpm e792e337a6a3c5c02555a36179b7abdf12bacc6015a68e7618e6bc0ebbd9e67f jakarta-oro-2.0.8-36.el9_5.noarch.rpm ec9cb2cfc39d6038d4a9eac891276cd082d77b60b90af405aaa03bdde3e29c86 jdepend-2.9.1-29.el9_5.noarch.rpm 8f32f06bc130f7000cc62a739fb59e849b05c25aa7a3ae20c3bb23e0a7d8aeab jsch-0.1.55-6.el9_5.noarch.rpm c6aa4517b05bb15d44a31f08523f267c4bfe1fe435d95e939eb8497cd2770a92 junit-4.13.1-7.el9_5.noarch.rpm 2687ac5a0b2fcad707eaf307ccdbbbac76fd01e4ab788fec7f98b3c3240aee37 junit5-5.7.1-6.el9_5.noarch.rpm 410120c1f750c87af60e9e3f2884cb3cd9b2d4ce343f862552bf4c37d97f9c5a jzlib-1.1.3-21.el9_5.noarch.rpm 819b86ff0674102366f16bf647966be7815bef7706ed7f775bceff6bbecd231c objectweb-asm-9.1-6.el9_5.noarch.rpm 4364992df6971959294b679dd537c6ae3138efa444cf5bd5064ab8268332d8ea opentest4j-1.2.0-10.el9_5.noarch.rpm 1f26cc5b507705f16e8c2aa9ff0689957c67b2adbc9d127659913931f24579f1 regexp-1.5-39.el9_5.noarch.rpm 78ea3c07047dd4116565f7f956b32e56b20f23af8ad334622437e7d40a16bea0 univocity-parsers-2.9.1-6.el9_5.noarch.rpm 40443d59904066181bca1363d29a8b0aef5787e27884a263ddbc8ece8d66ea31 xerces-j2-2.12.1-8.el9_5.noarch.rpm 8295da0ac0c1e1f1fd2969f1ea79583944873aca707ad48d7dbc4f2069a9ff09 xml-commons-apis-1.4.01-37.el9_5.noarch.rpm ea0b78bea7bae81ba063bb65a7cc56de729fb929fee9de7a1b06a302075b35e6 xml-commons-resolver-1.2-39.el9_5.noarch.rpm 994f345c1d9800affa35087c86e51a44051a1c3fb04241015347923f1ab0544b xz-java-1.8-15.el9_5.noarch.rpm e6d96628b59b81e9a33f75fb34ddf4a03f0ec0328d5ce40659da5ff550650175 RLBA-2024:11222 maven bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jansi, cdi-api, google-guice, maven-wagon, plexus-cipher, guava, maven, httpcomponents-core, jakarta-annotations, apache-commons-io, maven-shared-utils, apache-commons-lang3, apache-commons-codec, plexus-interpolation, plexus-classworlds, sisu, plexus-sec-dispatcher, jsr-305, maven-resolver, httpcomponents-client, apache-commons-cli, plexus-containers, plexus-utils, slf4j, atinject, jsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Bug Fix(es): * maven: Suggest maven-openjdk17 [rhel-9.5.z] (JIRA:Rocky Linux-62398) * maven: Add maven-openjdk21 [rhel-9.5.z] (JIRA:Rocky Linux-62407) rocky-linux-9-x86-64-appstream-rpms apache-commons-cli-1.4-18.el9_5.noarch.rpm 04da72630479a92a25157004a1f09bf525f091769f6c4fa13e7ef5aaffb08fbc apache-commons-codec-1.15-8.el9_5.noarch.rpm 894241cf0e45528ff00118c2b6ad79550b63f89c0f8b77b79e58254c2115f06e apache-commons-io-2.8.0-10.el9_5.noarch.rpm 46413f0bf2810291d66d0dbd0992471c684580eac73cf295e99e066dbe98e174 apache-commons-lang3-3.12.0-8.el9_5.noarch.rpm 41eeb78b8c9bbcf4b6efcc7623b7c5ae7e988a707be02824cfa9eaf68afba8b6 atinject-1.0.3-7.el9_5.noarch.rpm 19c4267998818ee76f2a9d8d9edbd24c4135a73928f9d5e7cbf65066b7aaf1e6 cdi-api-2.0.2-7.el9_5.noarch.rpm 30883769f6b0d175e2bfaba213bd7a29aebb3c84ee084b8ae4cd4b858182e208 google-guice-4.2.3-10.el9_5.noarch.rpm 334c479a28c490f9576db65fea67ecfcaef04c53bd87ea850867d91b3477144d guava-30.1-8.el9_5.noarch.rpm 4edf35bc681794407fa0be5e0fe5a3207bf911c7b44f4e792b7e1bfb0ddf90e6 httpcomponents-client-4.5.13-5.el9_5.noarch.rpm ad92ab286f6db164dca0abb39750fef669036ad35fe24cfcac6362425dd7441c httpcomponents-core-4.4.13-9.el9_5.noarch.rpm 0400ad0c9a620f5981ab8b59405b6c7a3b89e1c5515716f184734cad896b97e8 jakarta-annotations-1.3.5-14.el9_5.noarch.rpm b3eccaf167c17ba118e753d1f55ef44ded9a4012df2506478e8e84eb0fc86b8b jansi-2.3.3-7.el9_5.x86_64.rpm 7339bd473e9b3b0b37a0515a259a9151761e7bd22242c07a0e82599bbbae1ec8 jcl-over-slf4j-1.7.30-14.el9_5.noarch.rpm 9459a36182b0dc723c6bbdb0218e4b84d93647b3f13c401306344c7ac38cec05 jsoup-1.13.1-11.el9_5.noarch.rpm fd55edecef7f15eaf622d160d39136b057331e042b336e8072ea86291e63fc9b jsr-305-3.0.2-7.el9_5.noarch.rpm d8879d3aa5d1f5044eaee485261ec351180b953366a948ed7c07ed0132b6c400 maven-3.6.3-19.el9_5.noarch.rpm af1c37b6d579fd7ffc59f0c906e8a0c5c2785d594a20ebf1776f8b7c20b1f31b maven-lib-3.6.3-19.el9_5.noarch.rpm d22cb618f580cf1704810511dbce01855a5228b414f00078a17f905a93a8d234 maven-openjdk11-3.6.3-19.el9_5.noarch.rpm b95fe7b253b702421288c2be6db001ac5d5141151a50b5bc6b1facd460bd6afe maven-openjdk17-3.6.3-19.el9_5.noarch.rpm 0e34cd602afc5fa28200378674fd1d74d29a2ff27f07682e76a51e5e01be5b46 maven-openjdk21-3.6.3-19.el9_5.noarch.rpm 4db0384edd684b1c06e3ee1b10e11b10464f322f664e724e5a818dd0b0734669 maven-openjdk8-3.6.3-19.el9_5.noarch.rpm 88f390b45a57ad969f0dff4b8b0a9f0b34fbc23220c0dfa4921bb547515d3259 maven-resolver-1.6.1-12.el9_5.noarch.rpm a6cf8c57f9e4230917791e3fcc27c5c750b19424cdc1406537285281099f3e63 maven-shared-utils-3.3.4-5.el9_5.noarch.rpm 0417d35e3c4bcfc9a5e0aa52febb6bca767e6c0c46dd06373b5a30314ac32fd5 maven-wagon-3.4.2-8.el9_5.noarch.rpm 32059059feb662305e159ace4fe3b40477411b836727c6190accc52caf1148f2 plexus-cipher-1.7-28.el9_5.noarch.rpm 3dacbcb72e638900a781f086fb1475876834496c6ab2a0a31b6674672cae9477 plexus-classworlds-2.6.0-12.el9_5.noarch.rpm 9fb6fb8af81afaa50c0e4f6c5cbb8238fdd65209e59c71305309d20df5dbb703 plexus-containers-component-annotations-2.1.0-11.el9_5.noarch.rpm eac8aafa8d7cefb2cbb37a0138d2995219898cef6f9914f2298bd523b8845554 plexus-interpolation-1.26-13.el9_5.noarch.rpm ba9a92ade4c70fcffbd28e0ffdefaf60b994a138b674f80c9bfb80ab9c7de598 plexus-sec-dispatcher-1.4-39.el9_5.noarch.rpm efeda0b1ee009ede8b11517d9ec0abb181677edb9e96337cdc097cc1d2e76b29 plexus-utils-3.3.0-11.el9_5.noarch.rpm 24fd272c4742e8d18371c7ea998e8f0e8f367f9c701fd4cf26cede84ffaead16 sisu-0.3.4-12.el9_5.noarch.rpm 7015eb49550303d7ea5657968d35f583fb3de41329e122f7c9fa39fc60215ac0 slf4j-1.7.30-14.el9_5.noarch.rpm 795803c0ee2023607c2e6dd3922930ccd4aa5b8a20ec3d55d196fd7074dac508 slf4j-jdk14-1.7.30-14.el9_5.noarch.rpm a44926d065682a8a1ab13d15b5b6d8198ce580bb475442f4df1612df99743df3 RLBA-2024:2134 xcb-util-cursor bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-cursor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-cursor-0.1.4-3.el9.x86_64.rpm c48d4f5cff29ade91a6478b44e8b06ac9309e9455ee18ab99fb708f94e966e18 xcb-util-cursor-0.1.4-3.el9.i686.rpm 536e3858f16112548dda5f644591346e77880d02b82bddea09369a26c6a0abbc xcb-util-cursor-devel-0.1.4-3.el9.i686.rpm 640d133df67aba41efd47b7d52150b283271ab9be15bce59f841f13899b2a386 xcb-util-cursor-devel-0.1.4-3.el9.x86_64.rpm 301317f7caa899d8fbe852f616982db57f331b470ea914af7547f948b7c10058 RLSA-2025:18321 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: firefox: Memory safety bugs (CVE-2025-11714) * thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709) * thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710) * thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708) * thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715) * thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.4.0-2.el9_6.x86_64.rpm 5da614a3eb66576a30bb2f58780d5430df2b41e40a91e4fb04d420b2940964e7 RLBA-2024:2139 pixman bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pixman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pixman-0.40.0-6.el9_3.i686.rpm da487fd3e58203be67933398e63c88a0cf584b78e29870f178a0419e1903d30b pixman-0.40.0-6.el9_3.x86_64.rpm f90f7b61c355aae65c1c94ab19a6538212ba4f64236457fee42793710331321c pixman-devel-0.40.0-6.el9_3.i686.rpm 033ada248bb6ae729bef27027af04e91c8f9ce6f4ca5d229125dcc17301dd41b pixman-devel-0.40.0-6.el9_3.x86_64.rpm c156955e73d9edf4b78c13a26a44dcc1970a15f82c070d20b704f266fce9f9c8 RLBA-2024:2138 hexchat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hexchat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hexchat-2.16.1-1.el9.x86_64.rpm 71749a0d3f91b0ca0ae9caa6b233970309a6a54e76de687c7ce6a82d5fd02b1c RLBA-2024:2143 container-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-tools-1-14.el9.noarch.rpm 6aefbe6ecc2b86b10fcc5940e8323e6cf3095dd046ab030446e2328243934e2d RLBA-2024:2148 evolution-data-server bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-data-server-3.40.4-9.el9.i686.rpm 8b6f9a14de82145ea069ca8a467b1f7fe74c89a292b054dae536e13b5ca0420d evolution-data-server-3.40.4-9.el9.x86_64.rpm 8ec8132e4fc15b05c0a84399626f0373edff9a86f02444202640861ecc1d5f54 evolution-data-server-devel-3.40.4-9.el9.i686.rpm 0e98e15dec04ce6ca33510feab368e134a8cbb084ab198d597a9ea1dc95689c9 evolution-data-server-devel-3.40.4-9.el9.x86_64.rpm 8c28a38536cc9a2419269a6e546a3f518fcb109ee84153ae12418918c0343729 evolution-data-server-doc-3.40.4-9.el9.noarch.rpm 16c5a08f942847ec4b817e4191dddfb0a571a1c1aa5e12110c600acb277880e3 evolution-data-server-langpacks-3.40.4-9.el9.noarch.rpm 0cec2d5e0b6f21e16417c45df72c91c18b3f889926c98f42b8f6cc3d0ccd6bae evolution-data-server-perl-3.40.4-9.el9.x86_64.rpm 081305cab753a2fccf196fee639851fdc8700ffa26331a5a4eff16b2e7bd4800 evolution-data-server-tests-3.40.4-9.el9.i686.rpm 545197cd2a908dcb2e6dc86fb38577d1f15040b5aa862aa3cc69bab3de53e92a evolution-data-server-tests-3.40.4-9.el9.x86_64.rpm 9e87d78681e21e551507686dd1ec1a538e13c221102685261e3cfc3088875ac9 evolution-data-server-ui-3.40.4-9.el9.i686.rpm 94b597cdca328ae3c025a63c70e6e45e1542577c33da7eacb880c443291bd672 evolution-data-server-ui-3.40.4-9.el9.x86_64.rpm c3768a81fa81b138e462e7d0249dfe287ab039a4d00f9497926c83f0fd3d553f evolution-data-server-ui-devel-3.40.4-9.el9.i686.rpm 198fdd59ae48c2e2688de95b69072ae18c7032026cfb150f0ecf4ac9024f0044 evolution-data-server-ui-devel-3.40.4-9.el9.x86_64.rpm 6164be553136a47121c821e17cf94a90a2bda6d3d31a99a07863136e7ea23a7d RLSA-2024:2146 Moderate: libXpm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libXpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788) * libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libXpm-3.5.13-10.el9.i686.rpm 75e073b0e5ed1bdba7aa1812a28c882d632c8e6cbe3c944b5ecb293c832ca08d libXpm-3.5.13-10.el9.x86_64.rpm 067d8be7d78ec2a42ea86d23592c6ab083ea36c361bc612ed4ea2560087d80b4 libXpm-devel-3.5.13-10.el9.i686.rpm 2f2affd48eb946a5006989b7114da9d4a756ba6becc3db03f25d72497e36c44c libXpm-devel-3.5.13-10.el9.x86_64.rpm 405b5e018ef816a859c40521f243c7156184c02eb78a940248bec3ce02929bfe RLBA-2024:2144 libkdumpfile bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libkdumpfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libkdumpfile-0.5.2-2.el9.i686.rpm b4a0a3ac89b97ff762927e257a2b02210d96b5264b68348bb6de5c96dfd5cc89 libkdumpfile-0.5.2-2.el9.x86_64.rpm 070236a9b2d05979b5e3b67ee33ffbf8c4acf266eef5eaf66d28587b577ac495 RLSA-2024:2145 Moderate: libX11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libX11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: out-of-bounds memory access in _XkbReadKeySyms() (CVE-2023-43785) * libX11: stack exhaustion from infinite recursion in PutSubImage() (CVE-2023-43786) * libX11: integer overflow in XCreateImage() leading to a heap overflow (CVE-2023-43787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libX11-1.7.0-9.el9.i686.rpm 34b2f17a30de2ed6c1cdf43ee2d524ce9c616f9d236c5c018b6bf76f04ec02ca libX11-1.7.0-9.el9.x86_64.rpm bd4fb0a4223fb3d842cf476a895869abb455e69e456535bab81fd0341c3ef8cc libX11-common-1.7.0-9.el9.noarch.rpm bc6997ba2e9741f99446ecd29ecdd2730adcba45aeaf7ab286a953a1fb936083 libX11-devel-1.7.0-9.el9.i686.rpm b054456e38df83ce62b6952403e97cf93407b6c5ac66dc9275ec6016fd13b746 libX11-devel-1.7.0-9.el9.x86_64.rpm 3c7e327d39e21d365a71e7f00ad8b15eac95109361de60397ecb915dae1ff726 libX11-xcb-1.7.0-9.el9.i686.rpm 0e69f769a446745b18e74414e3e1dc9d713b1c063f456f892fadce1692c2159e libX11-xcb-1.7.0-9.el9.x86_64.rpm c92a3188c44a3f0e760bd1c6e580f814d814aa538957a0bfc6d0f5e04df7c976 RLBA-2024:2151 gcc-toolset-13-binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-binutils-2.40-21.el9.x86_64.rpm 9f1adf1f31a928cc654c5ae11cc0c4feca8d52e224fd2ce2c72f3ebdfa838e7f gcc-toolset-13-binutils-devel-2.40-21.el9.i686.rpm da9a433631e27e493924bcf792da4551dfec158d37e65d8ffe0a1bf30063792f gcc-toolset-13-binutils-devel-2.40-21.el9.x86_64.rpm eb927a00b3ff5a13032e6df44f3ed3e4c61a6d2627a3583879d6386cceed50b4 gcc-toolset-13-binutils-gold-2.40-21.el9.x86_64.rpm ef17f2b1eb1ecff56970010d56fc9470fc3573cf07305789f5621928f4731cc9 RLBA-2024:2173 libblockdev bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblockdev-2.28-10.el9.i686.rpm a5ed25900523410cfd88e7f908b547fb16d24c308797acd56889032516f22aac libblockdev-2.28-10.el9.x86_64.rpm e44ff53b9c974d1646a8a622e0af3f27621196721920956eb213291b9d74c33b libblockdev-crypto-2.28-10.el9.i686.rpm d287e44eef3443efad013987ee90da5a9410af7ead940186e0b2538dfd64cefd libblockdev-crypto-2.28-10.el9.x86_64.rpm 148aefffb89821910e2fb80786afb8237fe0a2430fc492ac4edfb3c6c3d4320d libblockdev-dm-2.28-10.el9.i686.rpm c39ac1054bc620eb646b7810eee021dd3e59cba00b166e7e6526cd3d9c2c6378 libblockdev-dm-2.28-10.el9.x86_64.rpm ecdfd7a25b082c2eedfc8c8acab924b2324586ea152ca8db4d0261ffd3fb2723 libblockdev-fs-2.28-10.el9.i686.rpm 4fb8ebf7df2c1b12110391277962dcb24cb2d7e591c3e50347aaf27f460a2e62 libblockdev-fs-2.28-10.el9.x86_64.rpm 6ba19b8ea755760d9a8c76ea9183c080e98ac8bff6ac896d11c88cdd49078e9d libblockdev-kbd-2.28-10.el9.i686.rpm ef682c7662af6afdf3e1bf1ba562da2b20af62eb7c76d9bae406716489d1b24c libblockdev-kbd-2.28-10.el9.x86_64.rpm 8734ec14285b9af361289cc7ec5a27cd4b4fa6b18aec237fdf1079f1bc616860 libblockdev-loop-2.28-10.el9.i686.rpm d9f3e25adf08fc64332a53e7b3d6d3c04c692d325bf48cf35269e749510e215b libblockdev-loop-2.28-10.el9.x86_64.rpm eeda2f3f6769c80c6163cd66f0a2cb3771ffe6e32bd7cb1a2d0d02a7484ca3d8 libblockdev-lvm-2.28-10.el9.i686.rpm 4e184e1373a55a27f6db3d275b943edca5c6c4274aed5cbf379356a5bbe62f96 libblockdev-lvm-2.28-10.el9.x86_64.rpm dc60d66d0ea6fa938801200f1ba5aecd907706dd52fdbb457702a3ae5da299d2 libblockdev-lvm-dbus-2.28-10.el9.i686.rpm fdd339a4c0768e35e7cc8fb7aa376e428125ba5b38fdeca48722f3b78d5570b3 libblockdev-lvm-dbus-2.28-10.el9.x86_64.rpm 02d0e680a064ef80d0141c8994e2a1cc47b09b27d9baca711ec64015e314396c libblockdev-mdraid-2.28-10.el9.i686.rpm 91f7fbf0815659c4aff068046f3aa68da8605067515da1005aae02f41b9f8d95 libblockdev-mdraid-2.28-10.el9.x86_64.rpm 88fde156d7154c26a843c16fa8b15b08516540179d11f9c51d642a143ef68542 libblockdev-mpath-2.28-10.el9.i686.rpm d4cebbb57ee3c783bdf23252d5cdeac6ce573f0e4721201aec57f243738ccf42 libblockdev-mpath-2.28-10.el9.x86_64.rpm 8a2618010cbc9ecb0fc63bbe40f3b9d62f8c2a5deb7c5939b699108cb4cd79e7 libblockdev-nvdimm-2.28-10.el9.i686.rpm 7ae29a1d32e1a87aeb891086e0e92298646e924cfe43675c60ea017d19805cd7 libblockdev-nvdimm-2.28-10.el9.x86_64.rpm 8c9a6d65ce5b2b469ffb60382faa421c624988b1ccb41d25a9fafb185c065ac0 libblockdev-nvme-2.28-10.el9.i686.rpm eadf4dca61f4ff0f2a63fdb44cc69c322366e35d5870941081c4dc203917d2e8 libblockdev-nvme-2.28-10.el9.x86_64.rpm a5ef56ab0c579839f1a19c0839a91d1286e5ab15ea0a23035e632c799bd823c6 libblockdev-part-2.28-10.el9.i686.rpm fc71fad445a8a8f7c9169e371933ef4dd590a0d6768e4d79f924381f236b17e3 libblockdev-part-2.28-10.el9.x86_64.rpm f6b2f3306aafef32843e30983273c87e5649a1fb3eb0c05e7c57e070e8ab6956 libblockdev-plugins-all-2.28-10.el9.x86_64.rpm dd55369f9c733fcc9fded079f43e7d9b50fa34eef11d120f5f418b3f235a16a9 libblockdev-swap-2.28-10.el9.i686.rpm f3165c018b9b2db5df52bb89b7a465114cec597c2096ea3ad4cdc24b237ad24c libblockdev-swap-2.28-10.el9.x86_64.rpm 66ce03a02b8b6a2babce38224d33ace584cc16a07b7018584d9aa93f8baa4861 libblockdev-tools-2.28-10.el9.x86_64.rpm d9ec549fe5c08439b02f0abc4a0a991672adb80682527404f74ea15d789f43ce libblockdev-utils-2.28-10.el9.i686.rpm 59db799c9fdf16c19f8cfe03ec41aae4e644e100dd1b1f2e9832f830c9335098 libblockdev-utils-2.28-10.el9.x86_64.rpm 835f6fe3d28d80837a8273ec9aa57ab60cadb1029570f786c2d6a07e4949b886 python3-blockdev-2.28-10.el9.x86_64.rpm 3ff3b458323b3413b7f410f200fa192b06292be3fe42c7eef414e1ac5e6248a2 RLBA-2024:2154 liberation-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liberation-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liberation-fonts-2.1.3-5.el9.noarch.rpm ac2caee9c12142279d3702ac9ecb20dccda9e24863d4ff958b8e70d5221a9763 liberation-fonts-common-2.1.3-5.el9.noarch.rpm 705782e7cac23d8e15e81fddce10d3e0e8a61e0b6ae319d6ac357450eaa76b11 liberation-mono-fonts-2.1.3-5.el9.noarch.rpm 4ed9f623b22ebc5c076832b0b14ab1eade6dc77d2e3bbe89eb051d69cf50023a liberation-sans-fonts-2.1.3-5.el9.noarch.rpm bcb1a77deb5672b9246be90f4b025cb9387d0f6875f7a7be7cef65c303cfc0c3 liberation-serif-fonts-2.1.3-5.el9.noarch.rpm ada0d431df4a0b2ae1cb50ff48244266e811ae1328aad9d795c0ecb8a260dfab RLBA-2024:2161 gcc-toolset-13-gdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-gdb-12.1-5.el9.x86_64.rpm 31eb6071466b79b1142e80d25b010ea8a6ca40035818582b35fda22fd0193c47 RLBA-2024:2164 virt-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-install-4.1.0-5.el9.noarch.rpm b6f49e815a392e8e03792c296d1d6f4b119efc53e3a28777cf6ef7f6cb767a55 virt-manager-4.1.0-5.el9.noarch.rpm 5ad7fe3702c776ff7361f4e2f3576aac8fc441667487adcc957fa363588f83ad virt-manager-common-4.1.0-5.el9.noarch.rpm 449cf3f7e66ce03b1b1ab92cf77e2f4bf66a3b630f5144c74b2282e180ad8d9c RLBA-2024:2177 targetcli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for targetcli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms targetcli-2.1.57-2.el9.noarch.rpm 5f068b951129f3be275380a07d2dec468c3eddb10fbb9bc9e544bdd244b7f77b RLEA-2024:2176 python-rtslib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rtslib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rtslib-2.1.76-1.el9.noarch.rpm 11c281f21d6ab5c35204b79c843c5a2795f01783e0b96a16959c97bc3991b06a target-restore-2.1.76-1.el9.noarch.rpm 20e46d5fab92e99ad70e6a06f67ba7d896e46ec5c7e57aeda46be92d9811261f RLBA-2024:2187 stratis-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratis-cli-3.6.0-1.el9.noarch.rpm 8acb19639a598849e7af0bbfbcf653e25c6f79075de1bfd14ee87d82eee5635e RLBA-2024:2191 ucx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ucx-1.15.0-2.el9.x86_64.rpm 7cdd77e58a11c24f261641e561b034d1c575a5a78c40a77a843e59a525098f73 ucx-cma-1.15.0-2.el9.x86_64.rpm 7fe2092839942f9a4fc5d23e265594b642bad6d6e9bf2f8265fd9b23e2bf7acd ucx-devel-1.15.0-2.el9.x86_64.rpm 4ff215f2f5c18a4bc0da7a3b3850ad337aa06ba548b828cd3c4e5001999f0c2f ucx-ib-1.15.0-2.el9.x86_64.rpm 3479c055e3ec64cc8a67873a9ed45a94d38bc32def7840754ca4a15d9107eb82 ucx-rdmacm-1.15.0-2.el9.x86_64.rpm 540e62c30e18279ed998cf5b01cdf34f1a63885044b1e4d4e71983ca7eba565b RLBA-2024:2198 libqb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libqb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libqb-2.0.8-1.el9.i686.rpm a95551066971ce69edc6dbe5bc3caf852d046e8a273cf77f40ff548b566d4c03 libqb-2.0.8-1.el9.x86_64.rpm bb34853f0145e19695030ffd55db3c0d5793b14460eacd8634ae62b38e332dac RLBA-2024:2197 cepces bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cepces. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cepces-0.3.8-4.el9.noarch.rpm c8007f37dab9e0a1cef257829813b5b41a1b3421cbad4e90262138a065799b90 cepces-certmonger-0.3.8-4.el9.noarch.rpm 7c4c887754d5c4120b9ac7dfc8fb1a3b1f5dcfb148fd42c28522b3dd6b6e42c1 cepces-selinux-0.3.8-4.el9.noarch.rpm f857b627bf0c8de3026f80c3346cc79607561900a647eeb63357053d2c21580e python3-cepces-0.3.8-4.el9.noarch.rpm f5de0810a89dc436b7fe7c62253e802e814c991fcb97ef01cd047fd3024fd5b0 RLBA-2024:2206 rsyslog bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsyslog-8.2310.0-4.el9.x86_64.rpm 81e5de9ba7d4da6cad7fc1eac379467a0ae0b03a3934fc07ee57057f880db74f rsyslog-crypto-8.2310.0-4.el9.x86_64.rpm aacde10f787eec52e76c6f8f68ad5c2322eb44ed98175bee7f99ead57f71293c rsyslog-doc-8.2310.0-4.el9.noarch.rpm d4f4d52740d8e2f0df3909a562db23b90c74babc75a5b072a211276ea2e2cc02 rsyslog-elasticsearch-8.2310.0-4.el9.x86_64.rpm 577b370ac9b473eb709ebd15d36cc7f8624f6c7b06ff7a84967a9c1b1576561a rsyslog-gnutls-8.2310.0-4.el9.x86_64.rpm 26b17e10018ff678a804ed0232925bf4126680083a027c7120c693bfdf1c23cf rsyslog-gssapi-8.2310.0-4.el9.x86_64.rpm 8cfcd41e00b38f0f3a0af16bd6d47cc62f2a8a3dd72240482d749e4079029e8d rsyslog-kafka-8.2310.0-4.el9.x86_64.rpm a9c92723ebce0cb629e5f914d659e3211bf5a57addb6649403d0472f7145567e rsyslog-logrotate-8.2310.0-4.el9.x86_64.rpm 4fe33205368b2f62009fab34c857a5c0c92c6bae9de82d2a5f3a28baffd8de49 rsyslog-mmaudit-8.2310.0-4.el9.x86_64.rpm 54c61b391d13cd713522805ead3dadd4c45ed59ddbfa79640f3cad990c40ede7 rsyslog-mmfields-8.2310.0-4.el9.x86_64.rpm 02734df65b3cb3c6acb5cf3167d22f1a8188abd8fce668f1a561268709383f9c rsyslog-mmjsonparse-8.2310.0-4.el9.x86_64.rpm 8fc8af6d6a55c5bd420da8d9d7ed550a02443ea7f4761c9fc9d8cf1c7a14eb33 rsyslog-mmkubernetes-8.2310.0-4.el9.x86_64.rpm 53de1d0978b4b3141f8980270a03dbdd18a18ce512732ff5f9e1368fdb159419 rsyslog-mmnormalize-8.2310.0-4.el9.x86_64.rpm 884be71a64c784fbdf592999604c87ef1d9ebefdfbcf5e680649f7a293b8ab29 rsyslog-mmsnmptrapd-8.2310.0-4.el9.x86_64.rpm 6b5412343f62f2c1c31336ba828aa253bb75dfcef53e5db47da50bdabde92cd6 rsyslog-mysql-8.2310.0-4.el9.x86_64.rpm c34ccf187848f11749ef784554ae8dfbd951dd513e729633858c8b379930bd82 rsyslog-omamqp1-8.2310.0-4.el9.x86_64.rpm 057912a13cd12f4fbc22b535c6642aedf9851000f746dfaba5f024f26af09010 rsyslog-openssl-8.2310.0-4.el9.x86_64.rpm 0876ffeaafd3090c7cf435811c4131b95c2974147e64fdd23e4210a2c3288099 rsyslog-pgsql-8.2310.0-4.el9.x86_64.rpm a370d71201c76deffdf25afd39687b252f484a619e579748f9b0cbc9b592224c rsyslog-relp-8.2310.0-4.el9.x86_64.rpm 0e1efcf43d3a4373a86d738ba0323b2966b9024808f7b27397e4506ce4e86900 rsyslog-snmp-8.2310.0-4.el9.x86_64.rpm a76ebd9a6f59dd55989b4d9091609e329709f1c1ba6bfb7aec6796b3afc211ed rsyslog-udpspoof-8.2310.0-4.el9.x86_64.rpm 42ce40994951a0201cd00b5581fe6f356efb2d05bfa90136fd3b581f1216e27b RLSA-2024:2211 Moderate: tcpdump security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for tcpdump. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. Security Fix(es): * tcpslice: use-after-free in extract_slice() (CVE-2021-41043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tcpdump-4.99.0-9.el9.x86_64.rpm 522f68468a356808a837f3545594cd859188b64ccd272de932010bb9bd53e1a4 RLBA-2024:2212 flatpak-builder bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak-builder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-builder-1.2.3-1.el9.x86_64.rpm fa3f9742bb8c9f478c1a1bf42102a48e6246dae2a9ab68e06bc6eda120990a04 RLBA-2024:2210 crash-trace-command bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-trace-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-trace-command-3.0-7.el9.x86_64.rpm c4f1c74c10543c005338560371e384c798e63b87e7cee84e91170642921ad12b RLBA-2024:2216 xdg-desktop-portal bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-1.12.6-1.el9.x86_64.rpm 06181557017a6c03dc21f241b8afa401403f104e5b54985a6754706edf097f8c RLBA-2024:2215 python-rpm-generators bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rpm-generators-12-9.el9.noarch.rpm 0cf0319af9943c795c093656b17753bbb3c0bebccb8d08dba522b7506aa9c67e RLBA-2024:2218 ansible-pcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-pcp-2.3.0-1.el9.noarch.rpm c4bfbaa80d508a442780b44e5976e00daaaddfb85cf5630f5f183ef487fb1b5d RLSA-2024:2217 Moderate: motif security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The motif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager. Security Fix(es): * libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788) * libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms motif-2.3.4-28.el9.i686.rpm 6849484501028d8994c15bccd5cebdea754b65eadfe0c725e22a566af05b1726 motif-2.3.4-28.el9.x86_64.rpm 7f1b72f8325ea284a5842360b12c4ecdf5a0d24bef43cea2a1412a93faf7a6b2 motif-devel-2.3.4-28.el9.i686.rpm 5d39183a120fe5ac3eed22dd0d1796851ef710c4a295522a26344b4c94893869 motif-devel-2.3.4-28.el9.x86_64.rpm 5b0d9a2a72255be3f53bbdc07a53db7175c437806c67ab1af1d4bce8076d8402 RLSA-2024:2228 Moderate: perl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Write past buffer end via illegal user-defined Unicode property (CVE-2023-47038) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-5.32.1-481.el9.x86_64.rpm 3a7d8f3ebd108219af4c00f386c437af45e2ebfcc405b93fc0eefd19630f11e1 perl-Attribute-Handlers-1.01-481.el9.noarch.rpm 3d3e54bb2087fbfdc78d41c396b5d455de2ec07cf715f89544b21205744517f4 perl-AutoLoader-5.74-481.el9.noarch.rpm 9aa9dda77aafb5a988f87fbb1c2a9e4e67d2ce3cc651926411c7379d5bf873bd perl-AutoSplit-5.74-481.el9.noarch.rpm 49837c08c5e91b416a0e7feebf84f848b39636af519aa7130e6ea7d315afeee2 perl-autouse-1.11-481.el9.noarch.rpm e53f7911cab14e80ede5e0cce01da475b11c4094f3b04f41382b2490842ecc4d perl-B-1.80-481.el9.x86_64.rpm c7af412760829e3c2134c74e50bd30d921b01d79ef937942746dc0bd350063e4 perl-base-2.27-481.el9.noarch.rpm 5bbfb8583d08ef5c347e5d05b770ca79b1d99dd636c6fca549160648c47e35a1 perl-Benchmark-1.23-481.el9.noarch.rpm 2acc95b33acc1c9d9af09df0a1fcc800c13295eb12bc0acc90840c066c622370 perl-blib-1.07-481.el9.noarch.rpm 5ca71eeaa195c9ed1827a66a315cfcde8771cbac430a275df89c9c1229672b74 perl-Class-Struct-0.66-481.el9.noarch.rpm d1ea95f70bcfdab8a2f294c80fb362f2711e38c370d4306af02dc02deef6ad87 perl-Config-Extensions-0.03-481.el9.noarch.rpm 8a8c97053e1e74f66491c2f2aff1b81a03b34f817314f1e72b0d49a139ef29f6 perl-DBM_Filter-0.06-481.el9.noarch.rpm b5d3c439cfaad235c073db43901e0b862daf4e640b0d2f3c6f2da831017b9806 perl-debugger-1.56-481.el9.noarch.rpm 0454da3af00d749b87f0894ea867d8051e0141b510916f3a6b0bbb9fb280e7e5 perl-deprecate-0.04-481.el9.noarch.rpm ec6af196db8842c1c8036ed6b36c3fb4cd632989bdf87a1f5080f029ba15f6a6 perl-devel-5.32.1-481.el9.i686.rpm a7f5ceb2db775a56b0458a3ed16d6b85b92c9ceb44c89768969869cc638b5916 perl-devel-5.32.1-481.el9.x86_64.rpm 40ab18dc76a1a4435b2cf4fae13ea66df3112e381a32531a824c2e3e335d0c25 perl-Devel-Peek-1.28-481.el9.x86_64.rpm dff3abc3c68c6934152122e7cdb4ad548581e1b6c6b86a6cd1f5610b846369c5 perl-Devel-SelfStubber-1.06-481.el9.noarch.rpm dedcc32baff6099adc1b6a4d67fee40364fe8efba08b97b018eb77a5795502c9 perl-diagnostics-1.37-481.el9.noarch.rpm 3279b2187a7c6c208406e934972d97cd5f049bb375b7aef067fa8a0c3bd3ba24 perl-DirHandle-1.05-481.el9.noarch.rpm df85fb7dd4f9f63a4663f29b43c5a624cb5db7d9a28338e653b08e50f418b5a2 perl-doc-5.32.1-481.el9.noarch.rpm 6f50f795d59fc2c93a1947128f3635321413529b9695b4ff63258f7f3076a71c perl-Dumpvalue-2.27-481.el9.noarch.rpm 86674740dbb6e2cd25ed116a07a5e14f1d9c1acf006ac62775572bbcec2a7bb9 perl-DynaLoader-1.47-481.el9.x86_64.rpm d7fd48f9213ca72b55b9ed075bc1b32dde91b68f3a20c5204ecc61aacc2502d6 perl-encoding-warnings-0.13-481.el9.noarch.rpm 7b936471fde47c3490b5132835e9ab2e8546b511f817e4c9ee9f298623bcfe20 perl-English-1.11-481.el9.noarch.rpm bdc4cafe69e9ca8f23bec24d72088f03930db1e4e4d60a0cd8abff0a61c871d8 perl-Errno-1.30-481.el9.x86_64.rpm b343d310f4eebb86afc5db4b9b384b4114085f7c314ff462dd5a4a9990a44ff1 perl-ExtUtils-Constant-0.25-481.el9.noarch.rpm c4de2141dd9829e696480ca335cef458c15ae5a2eeafb26c9ca7beb6a0eb2c2e perl-ExtUtils-Embed-1.35-481.el9.noarch.rpm 08c61ec791f90eb4263d4014b93df2f9e25e14a78d53d3399c75dfad7001dbfa perl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpm 6f29468c40628a78dda0776886bff4933dd0e2afa67dccc521c51e9eee885464 perl-Fcntl-1.13-481.el9.x86_64.rpm 79f202015983eae7635818a0e6971bd11ddbb5ac3cb13a07ea3b15ec3a46b6e8 perl-fields-2.27-481.el9.noarch.rpm 6bccb8ee91e199caf199b25065b5602b6a759cfb545fd4d6e465247645f08dce perl-File-Basename-2.85-481.el9.noarch.rpm f4cc7d3a83df21da9dd068bf2a158e63795813861f2a49bf2dcc2785f8fa2d39 perl-FileCache-1.10-481.el9.noarch.rpm 6d100a7d39abf13a741bf39fa7c139b2ab75315e4cac0168eb7918c6df787263 perl-File-Compare-1.100.600-481.el9.noarch.rpm 75d9633f9944159ef64592b7fb5e8c77347682c9274b1073d5a33ee9cdc32301 perl-File-Copy-2.34-481.el9.noarch.rpm a4cb837e8ac076dbedd0d2d760f2aa3de2e9c33895225be237940339d06c2a41 perl-File-DosGlob-1.12-481.el9.x86_64.rpm 76cda39c0032c670d7b4777897df25ca2e592afc7f89c54afba6520d06f16a40 perl-File-Find-1.37-481.el9.noarch.rpm 9a3a9683e143d3052c5b1a19d11d51e2b4ee9ba5e2bd9b4d7739225e1d4c1b0d perl-FileHandle-2.03-481.el9.noarch.rpm e29a352a522aef70a70fc6a4bb5e6dc1009728c1b4b4123d56a9d930b312dbbf perl-File-stat-1.09-481.el9.noarch.rpm 3c46828f175ca774f576202eb7fdaa2d01a8216645139d500a1dab4b18f8b27e perl-filetest-1.03-481.el9.noarch.rpm 31b50be58c601dbea3854ddc64e0e7df06e9eca8e3e40322eaf8bc3c5c19239f perl-FindBin-1.51-481.el9.noarch.rpm 2288edda19ea5af1b284991a9ef28f58d6f8e55b90c5f80896c48b4aead361e4 perl-GDBM_File-1.18-481.el9.x86_64.rpm e1881e45f03ff16c6448f1916becb62c997b24b06a38c6ecb66e02bb581e15d4 perl-Getopt-Std-1.12-481.el9.noarch.rpm 1cd94181b35adf2e335d597d7107bd995ada5bce4b4738616762d7cb8b951bc5 perl-Hash-Util-0.23-481.el9.x86_64.rpm 842eb5ba42727a261c0d7eb179ba71e9e5b2e1802c9c78e94fa0d4b81b95fcdc perl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm aca71a2d6eceba7b1228066f7962d1e504402e813b088e3f680c5f37e10c85c5 perl-I18N-Collate-1.02-481.el9.noarch.rpm 3b3e91a10f597c16de83ce5cc6c1c554d0140bcaa735467de81dd97f1f150ed2 perl-I18N-Langinfo-0.19-481.el9.x86_64.rpm ed03bdb90cb98c378b7a21eb5dc3215408b531d619d3e6dbdf93887e421256d7 perl-I18N-LangTags-0.44-481.el9.noarch.rpm 65565049fbeba5a820b8cd6848c509ee6d06eacf6109a79bf6143b52dbcae519 perl-if-0.60.800-481.el9.noarch.rpm 2acfafe1d6ca93bfd457429b08c75c184dcdc00b4b7f1c8135217219313b9a64 perl-interpreter-5.32.1-481.el9.x86_64.rpm 13564c85615718b53e829b40eae0b23b583837ee4f7a41faeb7e46beabd2337c perl-IO-1.43-481.el9.x86_64.rpm ed931da5eb7897a6684344694fb0e167b33dd5937eda02884207b92e3b8fd445 perl-IPC-Open3-1.21-481.el9.noarch.rpm 73d8b8f517ea83da7908e576d3b7550b816cd1c1d41fc093226157f0c1da692f perl-less-0.03-481.el9.noarch.rpm 7b43ebb416f2b780173f859b372fb9b1414e79debe8894ca3951b94843faea28 perl-lib-0.65-481.el9.x86_64.rpm 6eb3092cd0e21ce4a3072d40a57e57bdd4e05023edb9192960c080631ea69fa6 perl-libnetcfg-5.32.1-481.el9.noarch.rpm 61d77858761c24cda6ddc3e90d9ebb33a114ed640b195622f829ed988c699973 perl-libs-5.32.1-481.el9.i686.rpm 5dae5171cfc40b5458fbabf7eb231487ea3d6d1aa594f63e6b0a66b946ad7a14 perl-libs-5.32.1-481.el9.x86_64.rpm 3c145fbcae80f3eada47484a3e55bdd4258ea8a2e4d26950ea254624728b26bd perl-locale-1.09-481.el9.noarch.rpm 0687bb64a6a8796e5b3972fc57443671ecbead99ca71621d76180412b8bb5b93 perl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm 8ffa1dec060a265e8148343679bd49ba61b7143a1503776a2af9dbabf5060413 perl-macros-5.32.1-481.el9.noarch.rpm 6700fac9968aa45f9a39caa494370198f610c44bc01f3baa0c8185dea9750c7d perl-Math-Complex-1.59-481.el9.noarch.rpm 6c7ad827ed76176eb327a3c6354dcf37a1978db09da9ac5f38fc0dcfebc7fd3b perl-Memoize-1.03-481.el9.noarch.rpm b266d0452bea935fb25f87b96478b33102de563d6fb7813b894354424a5a1c98 perl-meta-notation-5.32.1-481.el9.noarch.rpm d8bf9c7c73e6038232658231efbeaa87437c62339f307b233637db5eec63d7f6 perl-Module-Loaded-0.08-481.el9.noarch.rpm 72312877ea3fda7f11f924c0a74c3c5b543d677f18222ffaa13ddd12e435dee9 perl-mro-1.23-481.el9.x86_64.rpm e3c72165b3a5c973e3f17b8b5b3fb7ee2f99d89a8cd0138908802b9dcb084535 perl-NDBM_File-1.15-481.el9.x86_64.rpm 76367c62439e3e29f23064210edf7a18cd18ae35eeeccf1f72cab235d8a33573 perl-Net-1.02-481.el9.noarch.rpm 213201f7adf1d3f106f57050fe6dd7c3b9703f01acbce60a723cbc5f85a92b7f perl-NEXT-0.67-481.el9.noarch.rpm d86d91b66e0b55b613a170bb0b490e2d09dbd1ec481250a86eb094165be704d3 perl-ODBM_File-1.16-481.el9.x86_64.rpm c69e4bd118aec2684363fa6cef34871eea74f6251145c7aa0c38890ed0a3060c perl-Opcode-1.48-481.el9.x86_64.rpm c00b299c6281ef7a2922728d47b4a08684f9c9acbd3828e30614d52f77487cbe perl-open-1.12-481.el9.noarch.rpm 4f83ef59c50fa9c2268acfb6e62856cbd0cdbab6050ef27355effff97c7bed32 perl-overload-1.31-481.el9.noarch.rpm 2bf1e504cd02b80fc4cacdc7d147f27d8882a5b954cf10260727238f97a9d6fe perl-overloading-0.02-481.el9.noarch.rpm 341b8e5b82f88db98bac72f844ec22733b4a64c7ba0eab1ee8da280cd468a99b perl-ph-5.32.1-481.el9.x86_64.rpm a72a96264e6f22b6f44d0d5ad1c158c7585441457c8efb95cd8e4631c1f15102 perl-Pod-Functions-1.13-481.el9.noarch.rpm a439a129e599068b70661f261e60577cf55bb246b4e05ad0a2211660ec08e047 perl-Pod-Html-1.25-481.el9.noarch.rpm 250ec814fc09be44820972558c61ad42c473cd565516a99c6f7db20c32f56906 perl-POSIX-1.94-481.el9.x86_64.rpm 650af076023979d32018abc16420b3e4fc76fb1a45506b00f218a0c61ec0f5b4 perl-Safe-2.41-481.el9.noarch.rpm 30069ae04cc2101bd77a445d93d281d20b3fc75105a6948da6146dbb7d4658a3 perl-Search-Dict-1.07-481.el9.noarch.rpm 4ee3c2795d995fb653901ac70057490204062f2eda6793dd7f7b5e5d58e14d21 perl-SelectSaver-1.02-481.el9.noarch.rpm 82588662b0010b539850457c71b36573efef63e197fbdf176597b1894e41e70f perl-SelfLoader-1.26-481.el9.noarch.rpm f1dba331f92301798a0a926b61a9377514f8f20a0cd3c3c4b7684b01e3d351ec perl-sigtrap-1.09-481.el9.noarch.rpm ac3abc2a0dcc3af768279d2b43e579b0b78bdd291284bb9034187888fb6f16fe perl-sort-2.04-481.el9.noarch.rpm 9ce6f8a79c21b242ad3f3dc99dc347c18b6e363dd077c24cd6d65c3f8bb36f21 perl-subs-1.03-481.el9.noarch.rpm b57c63d0112190f26bb5e9dc39cf0840fe4a449ae76245dac68be97da3511663 perl-Symbol-1.08-481.el9.noarch.rpm 1a706b5a16eeebf1879b099a90ebcb2cad20f9ba7b92e331cba2450d0208abb9 perl-Sys-Hostname-1.23-481.el9.x86_64.rpm 7479e9aca716a16ea4604e0912faf4fe5d9c6b7a846907c2679b5ab232ee69f3 perl-Term-Complete-1.403-481.el9.noarch.rpm 3e59aa000d57d2df6eaa68ee4da6703be82b38252c07c08e78550118f3364082 perl-Term-ReadLine-1.17-481.el9.noarch.rpm 2935a1fa5d52d30ce609f3801035addce6207adcfdfa21d30d29790d24d2545d perl-Test-1.31-481.el9.noarch.rpm a8ba23539287ba435b824c0661cb1f3e1a847cd766ba763d8040090f7415e68e perl-Text-Abbrev-1.02-481.el9.noarch.rpm e993d1504981ea67b92ed515ae1db68b90104865b504429b5c5ff4d17bcfb821 perl-Thread-3.05-481.el9.noarch.rpm 0591bccaac2d65c4ba80da82cf2286ed53789f4f3c897ac94af2bdf35363d174 perl-Thread-Semaphore-2.13-481.el9.noarch.rpm 4580e540f4d177f7918e6c2501d554546967101bda28279e0e0c52fd72cb6c87 perl-Tie-4.6-481.el9.noarch.rpm 9239d59e98d0ed7b32ebd6ff8fe67b26747534e6f9b60518f33bc72f520f847a perl-Tie-File-1.06-481.el9.noarch.rpm ff1e1737f93356af3d903505675a3855d878170bf8f49aea0d50894462b44df1 perl-Tie-Memoize-1.1-481.el9.noarch.rpm b83bcb5cb7faf8df85e49fecfc68406c7b9f4d6af95794ca932134aa3be571d4 perl-Time-1.03-481.el9.noarch.rpm 3bb66e38e60acd30c54ae86670a7b46d05fe8f83e1cd7d595844118567f5e7a5 perl-Time-Piece-1.3401-481.el9.x86_64.rpm 60c2f6de94c46fc719aa48e60fb639b05c20a5ff4ba5b95de1503dcc826302c4 perl-Unicode-UCD-0.75-481.el9.noarch.rpm 8914613dff27960accb7152dff1f8cc4fa738375a49c76d0070a60a8f0653034 perl-User-pwent-1.03-481.el9.noarch.rpm 7b0a3d897727d7af3fd3714f8bd32453bcb037e883ea0dc1a9c84dd410f3959b perl-utils-5.32.1-481.el9.noarch.rpm c656c02890987b946f8cdb8f63f4fd11210a8c9fa0fb0653cb51e100a25e32de perl-vars-1.05-481.el9.noarch.rpm abc13d52018cd5bf66b9270646f69f108a40e10a4ab75802b7e528b257288945 perl-vmsish-1.04-481.el9.noarch.rpm 5d710baa610a6ddc292bb836a26888c6bfd0ec4a471c7f0c8fc857f24b51e0f2 RLBA-2024:2226 php-pear bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pear-1.10.14-1.el9.noarch.rpm 3af34ad41229c87e1335712b8cde2f850cace3ee19edf7ab3396af7922e1c54b RLBA-2024:2233 tracer bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tracer-1.1-2.el9.noarch.rpm 1cca4592f68de12c09398d39adbd524fdf85286f6af43a1f4a65809d041c10b2 tracer-common-1.1-2.el9.noarch.rpm 992e62c9563d9a92ebb4dac6e08b9248f2dac77b797ab15fdf8f68457ebc36de RLBA-2024:2253 jss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-jss-5.5.0-1.el9.x86_64.rpm 766eab20481c0fe5a0524278f0e29a67cccdc22cd099fd99b205240b516b6c39 idm-jss-tomcat-5.5.0-1.el9.x86_64.rpm e3f456c472ed273e6a2525a97640a6938b84eb42b7b5e39ce7275d0352111679 RLBA-2024:2252 ldapjdk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-ldapjdk-5.5.0-1.el9.noarch.rpm 43a3a04e32377a1c730cecf35f7d6e5951b39d31629df4fe2a3f9b9c8cfac8ae RLBA-2024:2254 driverctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for driverctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms driverctl-0.115-1.el9.noarch.rpm efa88d9ad57799f0230b78e9f7cb9d9fc60f922d7f385186bda8e78c3eddf90c RLBA-2024:2255 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-tools-1.8.3-1.el9.i686.rpm 943f2a4a641a40ee061c562ca9104f1c6608f2ef48210b37a4c704c44a5e37c2 smc-tools-1.8.3-1.el9.x86_64.rpm ac7e0e53646cf669576e8c5eac5c08a7f79e7f9e944a72886ce600a76d159dc0 RLBA-2024:2261 libserf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libserf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libserf-1.3.9-27.el9.i686.rpm f80361879343915fcd6f6c7436b65a7c104a5d5706cb0ecf5a7d4a4ddd3d73a8 libserf-1.3.9-27.el9.x86_64.rpm 4cbbf24cd552bdbdd1bacad7b5de6735196e246d38afccfa07aaccc3eca762dc RLBA-2024:2275 evolution-ews bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-ews. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-ews-3.40.4-3.el9.x86_64.rpm 88aba7228c31443263f14735d251b895a28891aa6838d7aaa70d71723a007191 evolution-ews-langpacks-3.40.4-3.el9.noarch.rpm bf33dbd5c36564132b02f0bc6f51b742cf0ca331ca9968e3ee480f81dd544d06 RLBA-2024:2277 gnome-session bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-session-40.1.1-9.el9.x86_64.rpm 3f623c6ff861c6d4b1c37bd7a43918680377ac7f791bb9d19f3538ed5168bc22 gnome-session-wayland-session-40.1.1-9.el9.x86_64.rpm 434442eaf69b5d7f67a03ce046c4c478f7d284e1e0ba8ff031f0cdd989f0fae4 gnome-session-xsession-40.1.1-9.el9.x86_64.rpm af657c73d331b3789f015401d7b298a89ec416f35ab3bdd6e593c12e6bc09de3 RLBA-2024:2280 ansible-collection-microsoft-sql bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-microsoft-sql-2.2.3-2.el9.noarch.rpm e7c4b3880665142de4822ff74645bd38849775d27453982c6d0b7646e16dc91f RLBA-2024:2285 livrsvg2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librsvg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librsvg2-2.50.7-3.el9.i686.rpm 976d649f6057a0ae2b2c875f371e9fcfe973b00f8b4aa37221102d7b1f940be2 librsvg2-2.50.7-3.el9.x86_64.rpm fef79d59b1ba3986a4e6739153c3504e991d1ccf280087e7ba81c1ee6438569f librsvg2-devel-2.50.7-3.el9.i686.rpm e519c822cdf0f6f4900fffb8a09017e448dacb3aba582a94a0cfcd60bd4038ce librsvg2-devel-2.50.7-3.el9.x86_64.rpm 735b2e699aec426d2254164bfadf9007a4880cdece00080405b38bc37c12666e librsvg2-tools-2.50.7-3.el9.x86_64.rpm 7a4b2ff2c0b2b3e7e4e419ec97a85713079ed69c60801efb357a070992b9e178 RLSA-2024:2290 Moderate: mutt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mutt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: null pointer dereference (CVE-2023-4874) * mutt: null pointer dereference (CVE-2023-4875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mutt-2.2.6-2.el9.x86_64.rpm b1a022e2cc1b616ffb16f197c6e81c9a806228647566eff22c670f7637de813b RLBA-2024:2294 pykickstart bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pykickstart-3.32.11-1.el9.noarch.rpm b0b97b86915eb56e99c9a4bf5d7e1d46145c32bac9ed62115fc9f19dacf7d3a4 python3-kickstart-3.32.11-1.el9.noarch.rpm bb820f53d2104aa7a58fa5d74660059aa3697bbb65f51e881cff376a11d978fa RLBA-2024:2304 lynx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lynx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lynx-2.8.9-20.el9.x86_64.rpm 61fe2cde587d449f96a04871ce03a8053b0bf0e37c20ac045254e0860d3ab513 RLBA-2024:2299 perl-HTTP-Tiny bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Tiny-0.076-462.el9.noarch.rpm 4d7badc2339ef6f35c53fe221d5d6830588ad144957d0f93e6c9bf8b7519821a RLBA-2024:2310 python3.12-pyyaml bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-pyyaml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-pyyaml-6.0.1-2.el9.x86_64.rpm 6f51237a3f1d235f2bf3345602267383f6f9504850e99e7fc6fccd6b78eb3d0b RLBA-2024:2309 python3.12-cryptography bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-cryptography-41.0.7-1.el9.x86_64.rpm 35d2d816387a3e82e2ecce857a554f4f0094b10aa62ecab630985b37cfcf855b RLBA-2024:2307 python3.12-ply bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-ply. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-ply-3.11-2.el9.noarch.rpm 9415f542437606f037d2b5e41918afb36c0d7b1d1483f6dc2651294dedafbe63 RLBA-2024:2316 python3.12-pip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-pip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-pip-23.2.1-4.el9.noarch.rpm d0b183a9e68396e55c3caef387d844e1b7ee475b7d8583e6ecadbb2a674c4271 python3.12-pip-wheel-23.2.1-4.el9.noarch.rpm 25af0679546e7c7af172c98c2ee56408a90021d957f86384de146276091e8103 RLBA-2024:2313 python3.12-charset-normalizer bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-charset-normalizer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-charset-normalizer-3.3.0-2.el9.noarch.rpm a6403777d6dd01a7a3e36b4e366d32e1c9dda62cee6891b21c290851017e5a6b RLBA-2024:2318 python3.12-numpy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-numpy-1.24.4-3.el9.x86_64.rpm 58ca56130a2e76695e81da54d116d1e7b97d910e7ab5fa7a523b73f2aec28deb python3.12-numpy-f2py-1.24.4-3.el9.x86_64.rpm eaba2a5065d053112a3d0a3cf0b3ae79318a99cd9c99aef9b13ba5cfe634d125 RLBA-2024:2322 python3.12-requests bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-requests-2.28.2-2.el9.noarch.rpm baeb88405d3763fa807383a0ac0125a59ddf27d3bf5c87b7b13bf53f1d9d95e6 RLBA-2024:2324 python3.12-idna bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-idna. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-idna-3.4-2.el9.noarch.rpm 8b653aabe82ee825d0b440e557c3c34232976125f12293e884c5bb31197ac09f RLBA-2024:2336 python3.11-lxml bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.11-lxml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-lxml-4.9.2-4.el9.x86_64.rpm d08c3073e95b168f94f446cc5be921f5b9149275918394b8a8ee778e51512f58 RLBA-2024:2340 python-prompt-toolkit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-prompt-toolkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-prompt-toolkit-3.0.38-4.el9.noarch.rpm 4b18bb150db520151f7c0a364f592a7b9348a7bad7087cef8755dd0f1e472ed5 RLBA-2024:2341 python-websockets bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-websockets. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-websockets-11.0.3-6.el9.x86_64.rpm a37a24d334dbccbbf2e07464d6d1ce916482477b33e6620c16de2b20a82146d6 RLBA-2024:2346 xdg-desktop-portal-gnome update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal-gnome. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-gnome-41.2-3.el9.x86_64.rpm 631cdd622734c24d025dd82cdd91ddf6431448244c125bf664bc09386cdb1b09 RLBA-2024:2356 mrtg bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mrtg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mrtg-2.17.7-11.el9.x86_64.rpm cdd07735bfef16a9c9bb85e93f1c15885fd9c8bb0d65a424db18caaad5ad77b5 RLEA-2024:2357 maven bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for module.apache-commons-cli, module.cdi-api, slf4j, plexus-utils, module.plexus-containers, module.apache-commons-lang3, module.apache-commons-codec, plexus-interpolation, cdi-api, module.httpcomponents-core, module.maven-wagon, module.guava, module.plexus-cipher, module.sisu, module.maven-resolver, jsr-305, apache-commons-lang3, module.plexus-interpolation, module.plexus-utils, module.jakarta-annotations, module.jsr-305, plexus-containers, module.maven, apache-commons-io, jansi, httpcomponents-core, jakarta-annotations, maven-shared-utils, plexus-cipher, guava, httpcomponents-client, module.maven-shared-utils, module.slf4j, maven, module.apache-commons-io, apache-commons-codec, maven-wagon, apache-commons-cli, module.google-guice, plexus-classworlds, module.httpcomponents-client, module.plexus-sec-dispatcher, module.atinject, sisu, atinject, google-guice, maven-resolver, module.plexus-classworlds, module.jansi, plexus-sec-dispatcher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__maven apache-commons-cli-1.5.0-5.module+el9.5.0+29736+f35c064b.noarch.rpm f8b217b6c365f3cf374802f70ef8edbd0c50918f03e608ba567d97af088ccb38 apache-commons-codec-1.15-8.module+el9.5.0+29736+f35c064b.noarch.rpm 7e2a8e505d912f008d5c8ce35dfdd27c7856d4488e04d920a1039a9a2e089e24 apache-commons-io-2.11.0-3.module+el9.5.0+29736+f35c064b.noarch.rpm f75aa218df2852beb7c95bd177b325b34cd6f18cec7409959a95327e0dddee17 apache-commons-lang3-3.12.0-8.module+el9.5.0+29736+f35c064b.noarch.rpm e16802ed0ae01ea5816e99c384f8758b68e66c606597d04b72fe0760533b91a1 atinject-1.0.5-5.module+el9.5.0+29736+f35c064b.noarch.rpm f8ba93e6f7554f6d11628c322d5913e0b52639ea64d4871ae6b0e787b8ea4551 cdi-api-2.0.2-7.module+el9.5.0+29736+f35c064b.noarch.rpm ed72e0659a38a36b06b0a169692112503c3f333d6abe09a7e1eebf849e5c616b google-guice-4.2.3-10.module+el9.5.0+29736+f35c064b.noarch.rpm 0a64b94ba8679a42b9b9c2cacc914c511e4906e5868afda2538842b12dc6d489 guava-31.0.1-5.module+el9.5.0+29736+f35c064b.noarch.rpm 4541062a0ac2c847bac2a572f64a632582c3384e42ac2b8bf5cda13b7cdd271b httpcomponents-client-4.5.13-6.module+el9.5.0+29736+f35c064b.noarch.rpm 765d051377376c09888212e564f4d017c2fc572c9c7b26c5283834eb5274c7ab httpcomponents-core-4.4.13-8.module+el9.5.0+29736+f35c064b.noarch.rpm f0db807d527c038c29847741bd6d1ef45ee7995326c88b29612a959a8506ee9e jakarta-annotations-1.3.5-15.module+el9.5.0+29736+f35c064b.noarch.rpm 93c89a8f7fdee0a4f7e3d4541054218495ab9c7e094dfc9b2f1d05caafdd8bf1 jansi-2.4.0-7.module+el9.5.0+29736+f35c064b.x86_64.rpm 3a5b7789fd3c29e65b81180c01a74312bb6e3dbaa0e64dcfbbfc09a4fde4de1c jcl-over-slf4j-1.7.32-5.module+el9.5.0+29736+f35c064b.noarch.rpm 74fda405b5b27e18895ea4ed6abf8c02fa62d05eb7514fef02b52ce7940b3568 jsr-305-3.0.2-7.module+el9.5.0+29736+f35c064b.noarch.rpm 17b7eb8ed6104a79ef8d570b36961b6fbf61f493b1a760efebb2c09987e759a8 maven-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm 3fc333ef4e689609784dd13feca1908b6bd4073627f2f68a36e691bacb476085 maven-lib-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm 09269e810f3ef67c25ad58a7a1faf5e399266ca2343c222b715f5d46dd88ac6a maven-openjdk11-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm ea5e2849d30e901c2e7ff3218467a5527c8a05e70813df7a63d42387b74cce9f maven-openjdk17-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm 45990601d77f6ae35127836879bb16b4a81ad364dd4fbf714f011409b9deb699 maven-openjdk21-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm db01fdaa9ea2875ef20f8b8a11c2f65f86894a4c3b3ed47e4c2c8a266abc1ca8 maven-openjdk8-3.8.5-6.module+el9.5.0+29736+f35c064b.noarch.rpm ec64543679ea39dbce15b4e47ed5eafcd22583ae2f438886396143c8eaebf8d0 maven-resolver-1.7.3-6.module+el9.5.0+29736+f35c064b.noarch.rpm 136edb5eb9ef2bcb45a62e0500b9b46cedec2c9ae35964f7b9d5c897a9391164 maven-shared-utils-3.3.4-6.module+el9.5.0+29736+f35c064b.noarch.rpm 8c29fc97a009805da3ace75cf469cab88c256dd5f0fb22f47a56abddffdd8349 maven-wagon-3.5.1-3.module+el9.5.0+29736+f35c064b.noarch.rpm 1bbf7d29ccd7a1b3193684eab7b18c4027924236e35c10b149382c308a19467c plexus-cipher-2.0-3.module+el9.5.0+29736+f35c064b.noarch.rpm 0924ed85094b21273e11ad23a4e92b23d734943fb0b3cf9eae8d22f9a46809b5 plexus-classworlds-2.6.0-13.module+el9.5.0+29736+f35c064b.noarch.rpm 11bb3e9e3ff0b9a182ed1b12853fbb9fa94120cb8701af02c77bb9df9a751c25 plexus-containers-component-annotations-2.1.1-3.module+el9.5.0+29736+f35c064b.noarch.rpm b5b257e1c62ad38d495a9983cc563bfbe37609ba18593f1dc231fb6c5555b49c plexus-interpolation-1.26-13.module+el9.5.0+29736+f35c064b.noarch.rpm 9d4fb5cf583b4fc000b00049a5fde3a4e0164bd3a58156b1f16b841da43e43cb plexus-sec-dispatcher-2.0-5.module+el9.5.0+29736+f35c064b.noarch.rpm a1b50b62d95219d8f433750b53748f823c5ce59b32cd2bf96d72166a110cb849 plexus-utils-3.3.0-11.module+el9.5.0+29736+f35c064b.noarch.rpm e090a6b5dcd71ae2cb1a330e8498d6b038d3e4be4254104da262f1e556dce328 sisu-0.3.5-3.module+el9.5.0+29736+f35c064b.noarch.rpm cd1ce7ccb317d8b32e96a75e35ef55bdbf021cdd238cbde81e1b6f2edab485c3 slf4j-1.7.32-5.module+el9.5.0+29736+f35c064b.noarch.rpm 9d8b8e7feaffad8c26a0f9f1a3c6c8e047847dc196d7e52a038b634979449794 RLBA-2024:2363 python3.11-pip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.11-pip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-pip-22.3.1-5.el9.noarch.rpm cd33c2c1c4b6f66dc96ae72a16a768f3691f54247dda5d225781da019be8b63f python3.11-pip-wheel-22.3.1-5.el9.noarch.rpm c426da0a808b015d8a5cd9ca18c2603dfb0bb6cfba4ea6f362523df5a2b7e066 RLBA-2024:2358 tlog bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tlog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tlog-14-1.el9.i686.rpm 400be167bc4e6630412a7f58cab80933b64ef39aa1fdc6f3649ee97899a1405b tlog-14-1.el9.x86_64.rpm e8a5cb8df9356b8600343e16770b55acb138b32d2108d862a181964dc08e1831 RLBA-2024:2380 dnsmasq bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnsmasq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dnsmasq-2.85-16.el9_4.x86_64.rpm 0355c990e46b7d40f84b6f853035e7bf014cb4e181f36177936d55ed2a8b98e7 dnsmasq-utils-2.85-16.el9_4.x86_64.rpm 8c759fafff6be07b2ac673ba839d4d9ea8939509b82c7795cd56437897d77f39 RLBA-2024:2385 weldr-client bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for weldr-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms weldr-client-35.12-2.el9.x86_64.rpm e15d02dd57b7fcfb92fbe123302bb8c43668d9b53f3333491cccf79102165477 RLBA-2024:2389 fido-device-onboard bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fdo-admin-cli-0.5.0-2.el9.x86_64.rpm e134f179df91a99cf7b894e64e0dc2d55ede7fff4dde155fc45e0b98ca8d48d8 fdo-client-0.5.0-2.el9.x86_64.rpm 052e19a734c97b14c81ea013644c78ede717f85e7f60f034391bf0f42637248a fdo-init-0.5.0-2.el9.x86_64.rpm a2c74dc017a113139f65d82f24a4876b8c22f6202c5c27ae5d56b5b03164ee63 fdo-manufacturing-server-0.5.0-2.el9.x86_64.rpm d2c6914a489228104fefc30e4c3e573ab9e81cdd91b04b7f72ea1ab49688b324 fdo-owner-cli-0.5.0-2.el9.x86_64.rpm c1217cf2c8403fcf305e19ff5962812fe2b229e3ce3dd36e9087ded8bac6a63e fdo-owner-onboarding-server-0.5.0-2.el9.x86_64.rpm b7dfc348c0674c5b8c00b35ebde834e343e39911a33af1780647870bb546fe4e fdo-rendezvous-server-0.5.0-2.el9.x86_64.rpm 3c0f3eab39c469cf275ac6f21ad0300608af9689dac74e18b59b5fe5daee26c5 RLSA-2024:3834 Moderate: gdk-pixbuf2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gdk-pixbuf2-2.42.6-4.el9_4.i686.rpm 85ac80964283b7e88f0e442f5c89e0009a5376f55d4b186f88a6409a059c16c8 gdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpm 9f23d0f41ae83f45da6048ce309783355091cac0b4c76851cefe805c445ac549 gdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm e2c0502b6787cf57836a66990eff3a6497c39cb734a296aeeb7fc65c3b0f117f gdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm 83678201e6c93c1eb6d5682568e0b11dbb5a02955d6ff37d5c05e3a3e8009745 gdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpm 6b40e0101e2cec7ef3a6a69ad552332d430e44c42d4019589af272b749bd95c8 gdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm d24bd8a516d13628e1d58b3cb6c79c8ee7e93afefa09c4a9a040209c5dfc0a3c RLBA-2024:4758 qatengine bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides the Intel QuickAssist Technology OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms. Bug Fix(es): * qatengine: 1.6.0 update [rhel-9.4.z] (JIRA:Rocky Linux-41076) rocky-linux-9-x86-64-appstream-rpms qatengine-1.6.0-1.el9_4.x86_64.rpm a882fefc905d5f18e055a8fe6d3c89689229486d25e39772fe94b08de35ad378 RLBA-2024:4771 swtpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for swtpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SWTPM is a TPM emulator built on libtpms providing TPM functionality for QEMU VMs. Bug Fix(es) and Enhancement(s): * swtpm: Windows reports TPM error due to missing SHA1 on Rocky Linux 9 hosts [rhel-9.4.z] (JIRA:Rocky Linux-46788) rocky-linux-9-x86-64-appstream-rpms swtpm-0.8.0-2.el9_4.x86_64.rpm 179a40feb1b9626d914edd9ac5bf287a7996d83e112fb501c72c6a44a8ad53da swtpm-libs-0.8.0-2.el9_4.x86_64.rpm 897f92f5f91c6d361cce194c0c6927494e23a93efd1f39df5fc59088bb7ee056 swtpm-tools-0.8.0-2.el9_4.x86_64.rpm 1cf41ba5420147c16077a170f8b4c3db2ca104fa35ae8503f6d1f9c98bf21d66 RLBA-2024:6181 synce4l bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for synce4l. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list synce4l is a software implementation of Synchronous Ethernet (SyncE) according to ITU-T Recommendation G.8264. The design goal is to provide logic to supported hardware by processing Ethernet Synchronization Messaging Channel (ESMC) and control Ethernet Equipment Clock (EEC) on Network Card Interface (NIC). Bug Fix(es) and Enhancement(s): * synce4l broken on aarch64 (JIRA:Rocky Linux-54121) * Rebase synce4l to 1.1.0 [rhel-9.4.z] (JIRA:Rocky Linux-52089) * [synce4l]synce4l select a non-existing external source as best source [rhel-9.4.z] (JIRA:Rocky Linux-52090) * [synce4l]synce4l reselect best source twice after a port down [rhel-9.4.z] (JIRA:Rocky Linux-52091) * [ice synce]DPLL still locked after stopping follower synce4l app [rhel-9.4.z] (JIRA:Rocky Linux-52197) rocky-linux-9-x86-64-appstream-rpms synce4l-1.1.0-2.el9_4.x86_64.rpm 1ec2e9b53a2e5f2f058fd18b46dc45c8ca3d1142d5687dad11257b089f88f5c7 RLBA-2024:6191 gnome-keyring bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-keyring. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-keyring packages contain a daemon which manages passwords and other types of secrets for the user, storing them encrypted with a main password. Applications can use the gnome-keyring library to integrate with the keyring. Bug Fix(es): * gnome-keyring-daemon hangs and pins one CPU core if SSH agent fails to start (JIRA:Rocky Linux-25560) rocky-linux-9-x86-64-appstream-rpms gnome-keyring-40.0-4.el9_4.x86_64.rpm cfacf3868790f8183808726032a0203529b9d1749cdd2f8ca35db1a93d475d51 gnome-keyring-pam-40.0-4.el9_4.x86_64.rpm 863ceeebfb63db81458adb71b780b83554587c0cfb68c4cfca1100b09fa632a8 RLSA-2024:6192 Moderate: wget security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for wget. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. Security Fix(es): * wget: Misinterpretation of input may lead to improper behavior (CVE-2024-38428) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms wget-1.21.1-8.el9_4.x86_64.rpm 85fe22b9e444213e7ce7ed26734fca6015f59c0119a44b759dc442db77fe8371 RLBA-2024:6198 gcc-toolset-12-gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10. Bug Fix(es) and Enhancement(s): * [Rocky Linux9] GCC 12 vectorization exposes wrong code on P9 LE starting from r12-4496 [rhel-9.4.z] (JIRA:Rocky Linux-47819) rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-gcc-12.2.1-7.7.el9_4.x86_64.rpm 15a335bea21de498791850886edd605f1e9f44cb9435ddf5df3b001664e002cb gcc-toolset-12-gcc-c++-12.2.1-7.7.el9_4.x86_64.rpm a2737fe3c09d7bab1d135e1bb87848a3817953a6423e7e8474839f7b96b7c67e gcc-toolset-12-gcc-gfortran-12.2.1-7.7.el9_4.x86_64.rpm 7b6669d7c6e89713dd3dac2e4452ff6c44ba08ba4c8de6e7cc0e2b59199a8b16 gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.7.el9_4.x86_64.rpm 109c23f2de564d925d43b52932b00c6a8a9712485f7d8b12e3cd7bb0390604ee gcc-toolset-12-gcc-plugin-devel-12.2.1-7.7.el9_4.i686.rpm 1b92baa6c1e7a2ef948365836b8a42db59d2135807960bbef4738143d9a6ed88 gcc-toolset-12-gcc-plugin-devel-12.2.1-7.7.el9_4.x86_64.rpm 7923d961bdc603c18ae235a8f6df661dceac6af045f831e390df9402e687a43c gcc-toolset-12-libasan-devel-12.2.1-7.7.el9_4.i686.rpm a822b6d4f2b411d173f224fa0d16eb6f67eddc902bb39d97787deb3f29cc56b4 gcc-toolset-12-libasan-devel-12.2.1-7.7.el9_4.x86_64.rpm ac6f3ad64cffef652f68821a4a868894f5d6f95241d5e570783ca2aa5a2152ed gcc-toolset-12-libatomic-devel-12.2.1-7.7.el9_4.i686.rpm d3b0d78fdf5e5acfc40a95d4d9c07932534de513cf3129de41d192f570af3226 gcc-toolset-12-libatomic-devel-12.2.1-7.7.el9_4.x86_64.rpm 0b0af259ab76660ebfcdddb10bea450809873a54bb89c39b7af01b1790188b7a gcc-toolset-12-libgccjit-12.2.1-7.7.el9_4.i686.rpm bb09b24ee2d74df4970fbf2276db2966c2e1981fdcf42003859ecebdf20c5bc6 gcc-toolset-12-libgccjit-12.2.1-7.7.el9_4.x86_64.rpm 6b2763b6c77c1901eaaa678a0d24bdeba464d85166350efe890b527763fcc16d gcc-toolset-12-libgccjit-devel-12.2.1-7.7.el9_4.i686.rpm 53a7327c89177f16940a0184278eefa83b22ae99f8d975c46264305677b411b8 gcc-toolset-12-libgccjit-devel-12.2.1-7.7.el9_4.x86_64.rpm a2bb948261bee86607e1c2c41810f702c58c627dabae06a12b397fcf98e91b4d gcc-toolset-12-libgccjit-docs-12.2.1-7.7.el9_4.x86_64.rpm aa980ceb14a020ec183a43c8830b45942c63a9a2d842d38d67fad4895d2a451e gcc-toolset-12-libitm-devel-12.2.1-7.7.el9_4.i686.rpm 9cf2c75845325f3dfc0f6b0947cabf05a0e995d855bd3ef3ae4ff297e70908f7 gcc-toolset-12-libitm-devel-12.2.1-7.7.el9_4.x86_64.rpm 15251855cbfb9924b2bc1b30e4a1b2d3da64d5a11726d1faefa6941f23785031 gcc-toolset-12-liblsan-devel-12.2.1-7.7.el9_4.x86_64.rpm a1a5fba0a5a970c65a65ac0cd1d001f0b71a789a2cdf2d6f12d50812223dd193 gcc-toolset-12-libquadmath-devel-12.2.1-7.7.el9_4.i686.rpm bfe08db0f67a38b2778745a9bc9e749c40cb2f76dea196b3345c7bbae515e62a gcc-toolset-12-libquadmath-devel-12.2.1-7.7.el9_4.x86_64.rpm 4fd77e91f6ff8579dd8df6a513cb3690caf3e9650b7489d4fa56aeb3e7c829a4 gcc-toolset-12-libstdc++-devel-12.2.1-7.7.el9_4.i686.rpm 6556519f4cd1314038eb9059b66431448b39d9ad41bdfdc25702968d8ec155ef gcc-toolset-12-libstdc++-devel-12.2.1-7.7.el9_4.x86_64.rpm 00f76e962928cae503ced625ab6a028615bb0e6fce6f6ea00c9a08056a5f5747 gcc-toolset-12-libstdc++-docs-12.2.1-7.7.el9_4.x86_64.rpm 6ef10e87f0eff610d09e0beea1dc1e964f4f802ebbe37dd5dd5899787ced2bc3 gcc-toolset-12-libtsan-devel-12.2.1-7.7.el9_4.x86_64.rpm 3a9d7daf753f7a65a14c04126ce2ebb7a80d0e46a2789a241370f3a492036650 gcc-toolset-12-libubsan-devel-12.2.1-7.7.el9_4.i686.rpm d5aa088abcdb729aedcf1cf89cd8fba56f575f92b275e8717e0e57ed719f0744 gcc-toolset-12-libubsan-devel-12.2.1-7.7.el9_4.x86_64.rpm 0d632cb53ad896b2a5d64c90a31736a79d55bca2c71e7e6ca9e3b82aaaf494f7 gcc-toolset-12-offload-nvptx-12.2.1-7.7.el9_4.x86_64.rpm e2fe7ef70e83c076e26e2adc9c02361f1ce0d81983931fea9f38200b5db6fd98 RLSA-2024:7457 Moderate: mod_jk bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_jk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_jk module is an Apache HTTP Server plug-in that enables the Apache HTTP Server to connect with the Apache Tomcat servlet engine. Bug Fix(es): * Rebase to upstream 1.2.50 release (JIRA:Rocky Linux-58855) Security fix(es): * mod_jk: information Disclosure / DoS (CVE-2024-46544) (JIRA:Rocky Linux-59800) rocky-linux-9-x86-64-appstream-rpms mod_jk-1.2.50-1.el9_4.1.x86_64.rpm d274aa394a9288d4c606928d3c49eccc6344b799214bc24620ba244f81865991 RLSA-2025:0923 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.37.6-1.el9_5.x86_64.rpm 6e47a3030889bdda3210272259681a3c31ade87cdb0d4e6ffe681617800e51bd buildah-tests-1.37.6-1.el9_5.x86_64.rpm ca00f7623e0c2f43bdbb0882ac9ed5b137436d0716753a6cbbf91c506d774d65 RLSA-2025:1915 Important: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-11.el9_5.1.x86_64.rpm 76bf72fcea0f033345a5b310aeaadd40507f369bfcbd45bd5288032769535009 emacs-common-27.2-11.el9_5.1.x86_64.rpm 50b20e43e63aa3beb7bb3c4c47180e5c9aa62b04b4973ef1d56ddfed8a1d030a emacs-filesystem-27.2-11.el9_5.1.noarch.rpm 17b9274a53b1287a9da36982096248b91bd26da6307f6abb9da62e2dc0b1dee3 emacs-lucid-27.2-11.el9_5.1.x86_64.rpm ffc61278fa3a10ec21ec7744c25f308ed3ce2614638d6b6a6c9371c24669bcf0 emacs-nox-27.2-11.el9_5.1.x86_64.rpm 696c77b2eb5731a259950e6e2589771fcd4dbf9da7ed50e6dfb56d55987ccdcf RLSA-2025:2500 Important: tigervnc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.14.1-1.el9_5.1.x86_64.rpm 1bbaf3519214e912ff87e50723e36afb3b14cc8a57acd867e92a0efac0911ae2 tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm 846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097 tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm 9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm 1e9f54db73c3f55c02a22025ef0af74b4eed8be253c84a02151d9ca1b863099b tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm 2f7ddb7d43e0afa3c33111e9d2ff410c7d11afa03c7320e1ad587a07264299a6 tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm afa7cca671a7c6141d6d2ab9a659209a6113e2c86136eb4f2b08a438355a1c1b RLSA-2025:2679 Important: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use-After-Free in libxml2 (CVE-2024-56171) * libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-6.el9_5.2.i686.rpm d53a8493d41ba11495d3f3bbe33b841b02a44ea9412d921efe49a2355292eb20 libxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm 678d28675f03ae6e5e204f272d8160970b1d1783a5e3d8710e89e342a79317c9 RLSA-2025:3531 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-3.el9_5.3.x86_64.rpm e28a99fe6a867be1d1795a9bf012a7a88a8f37624f3ccfcadf561e262230ef03 expat-devel-2.5.0-3.el9_5.3.i686.rpm 1daae7c7d79bd008f4a3f6775e45d804bf546fa56581c372cd049c5fd36fae4b RLSA-2025:3407 Important: freetype security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freetype. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files (CVE-2025-27363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freetype-devel-2.10.4-10.el9_5.i686.rpm dbe638a0cd8a2bd8eef818140193c83c7b84d90d92afb65a9987d7b1e6af1be9 freetype-devel-2.10.4-10.el9_5.x86_64.rpm e5a1fc23861e922b2e3abd370377d89cbdcd833eafadc2ac266182c8fe19842c RLSA-2025:4244 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-125.el9_5.8.i686.rpm 73fbf8beab0fea69803e6c706d7828eaa07ba4b99d4ff1f82cae594c55c5b882 glibc-devel-2.34-125.el9_5.8.x86_64.rpm 71b669dae2d01ab784068454f2a7f196fc6a39c038f92aab025ce70909080a79 glibc-doc-2.34-125.el9_5.8.noarch.rpm cfd172ced118dd02594b94f016a17fd905cb8b6ba3ddf7125946dacbf1278dc6 glibc-headers-2.34-125.el9_5.8.x86_64.rpm 1581f170a3e272715013f4e3d93aec13f97a79c3f720731e02369f8c59c4b169 glibc-locale-source-2.34-125.el9_5.8.x86_64.rpm 139778d5adf58b07b240c760675df2bf54f381a5228b83b47a2924d8398321b0 glibc-utils-2.34-125.el9_5.8.x86_64.rpm 5486c48233c4a1efff382998c7e0421b29ba00b0459584c25adc7351fcfb99a3 RLSA-2025:4341 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-503.40.1.el9_5.x86_64.rpm ff07e8f615f3ff6466bc3163a2bd4434f2c00342227aa5bcc142d9f6c330a28e kernel-debug-devel-matched-5.14.0-503.40.1.el9_5.x86_64.rpm cfc6361f5e70c33abb43e0d6c55f45624205e9320ae8fb62bd57cdc8fe034b0a kernel-devel-5.14.0-503.40.1.el9_5.x86_64.rpm 92cd4631a44fdefb112feca5d4528089738fd89f726ef5edb936eb31331da3c7 kernel-devel-matched-5.14.0-503.40.1.el9_5.x86_64.rpm d6771e0da9212990c4821ae81dd720d78c4ca751e7b60112b94244bf254e2440 kernel-doc-5.14.0-503.40.1.el9_5.noarch.rpm 86da0adcdfa82a75da3c8ce34385332582a22b2ba222de9def5d3ee89bf3648e kernel-headers-5.14.0-503.40.1.el9_5.x86_64.rpm c1ce3fba00143e7f225b2200b18356da5e6361ea956c9d962d12eb20d25ea301 perf-5.14.0-503.40.1.el9_5.x86_64.rpm 747a2bc8eade099c4dba81b7551463a57a789124a1c9fc1c2c61f806650dd80a rtla-5.14.0-503.40.1.el9_5.x86_64.rpm d496693fba16ca3d830a8cc022d4c105ffbad5dbacb494140b81cd4047972e20 rv-5.14.0-503.40.1.el9_5.x86_64.rpm 8283d0ee23e8d2781c680cd045270998a573b6650bc7f1f1eafe71aded011509 RLSA-2025:3408 Important: libreoffice security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2025-1080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-15.el9_5.noarch.rpm 5391ef05b5a1c9b5469531db42657fc697ae647c5cf7fd39bef34936b484a04a autocorr-bg-7.1.8.1-15.el9_5.noarch.rpm 528eb94ef117a95c77880e29c23854ecc1fff8c70b8d246f4ec7961f36130a78 autocorr-ca-7.1.8.1-15.el9_5.noarch.rpm 996544f8adb37eaf08c384929ee0b208c7069712a0cfe30455ceda54625eb20a autocorr-cs-7.1.8.1-15.el9_5.noarch.rpm 30238f5f27531b8256f83a6a8943e36422587f672e4b5f0f67a748ffc23a09ef autocorr-da-7.1.8.1-15.el9_5.noarch.rpm 3560f7e1b416aa60b50ef1b7074ead4d6668d345c646391a8822cb7fe7481785 autocorr-de-7.1.8.1-15.el9_5.noarch.rpm c396d949f8eeac69664e858299c3a68339310a1a01c9ad1de685e5bddced39ce autocorr-dsb-7.1.8.1-15.el9_5.noarch.rpm f08eaf337f930f5a29222aadda60f655a16aebfaa0db8b4c1fe634065d651359 autocorr-el-7.1.8.1-15.el9_5.noarch.rpm ebc58dfbd5fe21d830329fdc26c195f7493bcfbda92dcb9a80ec79a7c5ffd8f6 autocorr-en-7.1.8.1-15.el9_5.noarch.rpm a8071eb6e29921d8efcab7856e206facef70c4ab69323276cd83518d46f50f8c autocorr-es-7.1.8.1-15.el9_5.noarch.rpm 090536f15bdbd885554d0210ed9da36b0408297359a4715f6a93207378563285 autocorr-fa-7.1.8.1-15.el9_5.noarch.rpm df043331b5445d3edcf4c1f5bf09b99941ed4b4ed5dd896dee2fa3c1d50f6a4f autocorr-fi-7.1.8.1-15.el9_5.noarch.rpm 9677ece7ecee8fb3e418ad04e25917edff683b27c2bdc890808820d7366185de autocorr-fr-7.1.8.1-15.el9_5.noarch.rpm 74eaca3b9135910584da28d4f1979277b2f6850d74fa291997010c297b474e81 autocorr-ga-7.1.8.1-15.el9_5.noarch.rpm 40331c304b9e1ea6052a3ac9d32e7b5b6e6144efb756b283a56ed3d05773cc99 autocorr-hr-7.1.8.1-15.el9_5.noarch.rpm 45cb0cc3cfcfaef845ca4fba6393cde5d11343064c6adc618027918d2262138c autocorr-hsb-7.1.8.1-15.el9_5.noarch.rpm 273f0f0b2e4e5274c05c4dd935abb86a99eab241a8e6adcbeedbdff15c50abc9 autocorr-hu-7.1.8.1-15.el9_5.noarch.rpm e725028f15029f1582f554babf8996ee4b81eea97fee94a80c9e80f689f99731 autocorr-is-7.1.8.1-15.el9_5.noarch.rpm 215bbefc0fe56e35d9c86a5c2c8d2af1cc32c8bf7b1c8418bc61632ab0035043 autocorr-it-7.1.8.1-15.el9_5.noarch.rpm 29afc24255b411f9b63921ba07538a8fb1b52283e3bb668ac6683818000f5369 autocorr-ja-7.1.8.1-15.el9_5.noarch.rpm 27eea344d1518ecdd750a7bf7651fdf2b16caa8a0b07aedef94978b36fb33b1c autocorr-ko-7.1.8.1-15.el9_5.noarch.rpm 46ed1ba881347a03e6b7bd696a187f3cd68759dba1c062d1ada64d95133ff388 autocorr-lb-7.1.8.1-15.el9_5.noarch.rpm 9a2fd230c6c8118a65f2d50b8fd2e560fd9589be8c6e7c3ae611effb548fdc64 autocorr-lt-7.1.8.1-15.el9_5.noarch.rpm 13380bc186a097410a8c8180f38dc648d1938a0fbd9a08e6a2b64c1ed7785e09 autocorr-mn-7.1.8.1-15.el9_5.noarch.rpm 23ef2baa220ca4d012f725b61e9cf72e4c24358755f23223f499d4c949a21309 autocorr-nl-7.1.8.1-15.el9_5.noarch.rpm e483e1a89b25927b34be05272ff753045ac1206dc638541d1578634d8df06314 autocorr-pl-7.1.8.1-15.el9_5.noarch.rpm 55d0640f10c3c9f8ed23cf77d81edf81f0f85a774db7b04e9d9b6ae00d97d8b7 autocorr-pt-7.1.8.1-15.el9_5.noarch.rpm 4ea99dcca7b964e26749576ffebab87bd7053339bf608f5ca0134e71867a21aa autocorr-ro-7.1.8.1-15.el9_5.noarch.rpm a152100cecc561ab1236da5751035af17c27a191acae0b6195be519145eeeb77 autocorr-ru-7.1.8.1-15.el9_5.noarch.rpm 5fabb6c0293b4e14d64df995a5f9b6d07e4849360386b0b3c724f626015dd6f7 autocorr-sk-7.1.8.1-15.el9_5.noarch.rpm 7685df9e5bc4c94241804de736fc43a58134820e0434c4e7af3bead35736cdab autocorr-sl-7.1.8.1-15.el9_5.noarch.rpm ce151455df7ab263115a59ef91a231a9c18add46cde5430310a98ee99011c13f autocorr-sr-7.1.8.1-15.el9_5.noarch.rpm 0d49767ce49d0959df0aeee5b37248fc27ef840caa70a548cc42ab061bb4004e autocorr-sv-7.1.8.1-15.el9_5.noarch.rpm 4b06940763716abdbd1f2c7f350bfb1905d51edb949023aed8ce05b1560dabe6 autocorr-tr-7.1.8.1-15.el9_5.noarch.rpm 2e87c4acfa1ae95fec70cf323c5cf4719ccb444a344babc1c6a6ee968dc5d56e autocorr-vi-7.1.8.1-15.el9_5.noarch.rpm a5f2aefdff05189d0de5fd29dc05cf73d3bc7c4fa4dc775c4a36005e266ff8c3 autocorr-vro-7.1.8.1-15.el9_5.noarch.rpm 1b34733caa43b1d6f4794bfe8a9083648f8e51cbd14ba3783e8d9c1b2cfb0a0b autocorr-zh-7.1.8.1-15.el9_5.noarch.rpm 933c85b9283dfff89aeac6dbf2dbd0681b9a229afb769ffbed927e6c723991dd libreoffice-7.1.8.1-15.el9_5.x86_64.rpm 539d54abdb981590ff22884d3a4c4a353bbe09aeb5625e8fad6e8b7731444af6 libreoffice-base-7.1.8.1-15.el9_5.x86_64.rpm 456ca285c0ec0cb56c0c8f6d7bd287219d8ecbfd689d17c74db060225b6a605e libreoffice-calc-7.1.8.1-15.el9_5.x86_64.rpm 671c603133c443b8cdfc14fadffd8eaa279f32d1a1acff2b6252c7bbf3e7996e libreoffice-core-7.1.8.1-15.el9_5.x86_64.rpm da4cc21f1af8992d5f5cfdf5c6aa78b4fa1620c3dc5b028f25990db177c5c420 libreoffice-data-7.1.8.1-15.el9_5.noarch.rpm c80a44a5be5c0ba776e8c2ae3015c46d2be40053d1c66f2efab17d98b77c905a libreoffice-draw-7.1.8.1-15.el9_5.x86_64.rpm d1f256c9e8ddb17466af728a062e35592e2390bd44d2fef7ddd737cfe558b342 libreoffice-emailmerge-7.1.8.1-15.el9_5.x86_64.rpm ae7ef259875fd8831cf8650c9034845ccc969b18012c6e5e0fffc00255092515 libreoffice-filters-7.1.8.1-15.el9_5.x86_64.rpm c07ee9323329895bbba3f9cb8cbe7a221c89139aef9c8c8af9914e67f02b6f2e libreoffice-gdb-debug-support-7.1.8.1-15.el9_5.x86_64.rpm f9c1a4982b5edc602a912248d93c38d34382fafcb4d369aac90db5a63c6fa8b3 libreoffice-graphicfilter-7.1.8.1-15.el9_5.x86_64.rpm 2bd1f7c32dcd2592c216f907cfe727f94402941a42c9f6acd653325279059bdb libreoffice-gtk3-7.1.8.1-15.el9_5.x86_64.rpm 91ca675c8ec46c1db6b5592d263fe2650ac02ab0cdf259a4f20008faa67eafdb libreoffice-help-ar-7.1.8.1-15.el9_5.x86_64.rpm 9b77b9accecf7efd8f805ab7d2af2736fbfb88771e11ee241753a05caf6016bb libreoffice-help-bg-7.1.8.1-15.el9_5.x86_64.rpm 549db3fdfd0e4b67525f35bf60ada8916dc079a27eca82d7dc1669f38a2b55e7 libreoffice-help-bn-7.1.8.1-15.el9_5.x86_64.rpm 35ec99e0c5de3d4f45500b590859e2a184d9671d315bd06dce9e4cb99ccabaae libreoffice-help-ca-7.1.8.1-15.el9_5.x86_64.rpm 44f55795604b42e96b1fc61048597556daab8e92c4129df83e31bfdd38bc9112 libreoffice-help-cs-7.1.8.1-15.el9_5.x86_64.rpm 5658958e828e5baa4d0ffd577aa8b37408c3a082251869c7c31692a6e706e5dd libreoffice-help-da-7.1.8.1-15.el9_5.x86_64.rpm b694f44a7e836af8759ef128f9b3228f52a87b32780a614e89c1fc6e4d8b01d5 libreoffice-help-de-7.1.8.1-15.el9_5.x86_64.rpm 8f23b3b0c015c0802a7d0c619a4749c1d44e9f2be40031dacad2fe3468ce2a3f libreoffice-help-dz-7.1.8.1-15.el9_5.x86_64.rpm 50c1ef449c729132f739aa212ef1f81ff3e1567d3117a994cb16c48614429947 libreoffice-help-el-7.1.8.1-15.el9_5.x86_64.rpm b72fd8787f7ab5410f0aa2156afb8c4df13de71b297f1065110c54dc61278ff0 libreoffice-help-en-7.1.8.1-15.el9_5.x86_64.rpm 6541470e9e62b844e7c4a5ed890fe32cccbf1df20c1ab29085a4d72e894294a7 libreoffice-help-eo-7.1.8.1-15.el9_5.x86_64.rpm 1382e47d40e3d4f754d90b8ad41ccb4451d5155de3c92dbe24cd980f8bef5c7b libreoffice-help-es-7.1.8.1-15.el9_5.x86_64.rpm 2650fed93bae6731280bd0906117fdbe2250c128c8de04949b0be654f6118297 libreoffice-help-et-7.1.8.1-15.el9_5.x86_64.rpm 538f009e3b5cd31b4175fca949bcbf01dc80a204e85d826c083755e71a5155e0 libreoffice-help-eu-7.1.8.1-15.el9_5.x86_64.rpm 2a7e04f98af0303d4fb50354822a3436534d7011c2db026626e8fbd14b4ddbda libreoffice-help-fi-7.1.8.1-15.el9_5.x86_64.rpm e0c9b13ecb3633ab5e94c59de36ee04df148ab12fea0e66688cbdf0db31f76f9 libreoffice-help-fr-7.1.8.1-15.el9_5.x86_64.rpm 55d8df43c00a4f25aa950054ca97c32cfb99de4a04af5f71fb0885872e8fbf4d libreoffice-help-gl-7.1.8.1-15.el9_5.x86_64.rpm 9abd94ad29a159da666d2f72edf99faa8d46218cee438ac310b5929bc32077ee libreoffice-help-gu-7.1.8.1-15.el9_5.x86_64.rpm d649b18435425fb13056384bed439a05359bed89cd764a04c0484bb911316c62 libreoffice-help-he-7.1.8.1-15.el9_5.x86_64.rpm 85acc4036c0aee8f68bcfef8468ab26f8e899a8136f677ca6609b5d13badd7e4 libreoffice-help-hi-7.1.8.1-15.el9_5.x86_64.rpm 506bfa3abffe6b9b74f00505b256e27c72d65b33d882eabd4f343c45a0d76a5e libreoffice-help-hr-7.1.8.1-15.el9_5.x86_64.rpm 14c4443cb5630ddafcf5aaea3ef741933904aad2fbbb2b7f5b5b0aeb79b5e89f libreoffice-help-hu-7.1.8.1-15.el9_5.x86_64.rpm cbc66d0f3b03906211b635898dee5c03e87247196c6cc640489b3422eeaa14e3 libreoffice-help-id-7.1.8.1-15.el9_5.x86_64.rpm 3ab54468c13c647d1690e89c866c7b9e4f1eee7607e28c76c2ad39608cfd53b0 libreoffice-help-it-7.1.8.1-15.el9_5.x86_64.rpm 0dc2829f57bc2da438204fc06b1edaa92778f059714cfa49ec40ce102fa8689a libreoffice-help-ja-7.1.8.1-15.el9_5.x86_64.rpm 32b5b7af8ace29ba915acace228a4d9a5ca855fbbbb1afd2a728748db1086d7e libreoffice-help-ko-7.1.8.1-15.el9_5.x86_64.rpm 7497a80f6efc0e3a13cf0a74a414e6ff41c9620bd9386022ed28357f11060a18 libreoffice-help-lt-7.1.8.1-15.el9_5.x86_64.rpm fc7f3a2e2b73341fa7b7b57b1bc68af3df8c6619235a5b970d71d993426d4b02 libreoffice-help-lv-7.1.8.1-15.el9_5.x86_64.rpm 653b59d7eb4b708dea0ff96693f54ee45f521ce658c45be06e24dd3a6acc4b0c libreoffice-help-nb-7.1.8.1-15.el9_5.x86_64.rpm b8ff4138b5b50d1b81c1f0663f216a0affe8f04252730924cbdeee3080b6d9f9 libreoffice-help-nl-7.1.8.1-15.el9_5.x86_64.rpm ae6058ed97702d0b2daa36ae65b98044779bec561ebf1635bd15ca364e6396a3 libreoffice-help-nn-7.1.8.1-15.el9_5.x86_64.rpm 857a57f51f2f4bdaa124ae3bdcb5c3fcbe5557aae1b24bbbd1d39ae5321bdb23 libreoffice-help-pl-7.1.8.1-15.el9_5.x86_64.rpm 3e7f0f562d03b1b13354baeb0adbb2266b08c4dd472f9d4901eb4c86f9165e15 libreoffice-help-pt-BR-7.1.8.1-15.el9_5.x86_64.rpm b765fa3e99e12abe239548c89366315686600e8e250f16506fbbecca353a98b6 libreoffice-help-pt-PT-7.1.8.1-15.el9_5.x86_64.rpm 013a10cca2ca26e256159f140dcb719c8e7ea52929be9536241ff092fbbeb375 libreoffice-help-ro-7.1.8.1-15.el9_5.x86_64.rpm 32e82be0e85fb2ce7faf13c4bbf9bc0c7b535362747d3a4ffc4eec8bc0d11c96 libreoffice-help-ru-7.1.8.1-15.el9_5.x86_64.rpm b531799160c83c2fe3c6d13830bfd3ffe23dbd808c4c8521a00870809d95e43d libreoffice-help-si-7.1.8.1-15.el9_5.x86_64.rpm f531f6cd2aa8937f93f48dbbee3fcb93857051ea40dc2cc758f352155dceec8b libreoffice-help-sk-7.1.8.1-15.el9_5.x86_64.rpm 7726dcc76a86f2b89f9172c8f14429fae991ba44cd8fb33ea6d92d3c3b677437 libreoffice-help-sl-7.1.8.1-15.el9_5.x86_64.rpm 75e9f316a0d3d62d30b8c7c64a02711ec90990dee4938f00ef20a2ca7e7f20a2 libreoffice-help-sv-7.1.8.1-15.el9_5.x86_64.rpm b38d0f0e5b55f60668b039192f5c74f6c8c565ac144b3b25e3d0f547576ac998 libreoffice-help-ta-7.1.8.1-15.el9_5.x86_64.rpm e85379273aa371abdbdc693a0b588fd7f6f7274fc4189ab8e2a6db21656a0bec libreoffice-help-tr-7.1.8.1-15.el9_5.x86_64.rpm 2b858a6ebf2c9892e57e0cbff1a66c133a7d9dbf8085fd00d08734c6133ecdef libreoffice-help-uk-7.1.8.1-15.el9_5.x86_64.rpm e5e2547dca6a47e98607683ae09ec98fd1a56d6683b918f532606d6db7a8a0ab libreoffice-help-zh-Hans-7.1.8.1-15.el9_5.x86_64.rpm 576aae3feefa4b79dbb5a67b6133cc8a5d75dc66058c597f755da5488891c372 libreoffice-help-zh-Hant-7.1.8.1-15.el9_5.x86_64.rpm 3f64624272fedb256c122ab3d9873231f2fb71ed10e8311bb572fe3c2fc9c5d5 libreoffice-impress-7.1.8.1-15.el9_5.x86_64.rpm 0edba290fb818bac84bf1bec0b0ce4448fa8da52f1e79d6e267f38156798ce0f libreofficekit-7.1.8.1-15.el9_5.x86_64.rpm e9632bca05a0e10daec5dd5205473df3ee1d52603a1b6e9ad6efefc629798634 libreoffice-langpack-af-7.1.8.1-15.el9_5.x86_64.rpm 84220bf2e8915114b508b2da778bc6dd37e5f37047efe61bde045cb70e7b5346 libreoffice-langpack-ar-7.1.8.1-15.el9_5.x86_64.rpm fb2c866f420e52b50fc58365bc60e75128787d1ef384ee7837adf81705024783 libreoffice-langpack-as-7.1.8.1-15.el9_5.x86_64.rpm 2dcea149d0ec26dd807babaf3576ada4dc155d97cd0cace451328cc7f8598a5c libreoffice-langpack-bg-7.1.8.1-15.el9_5.x86_64.rpm 1ec3d2f7a8cd0be8c24fa577426640b7e4fa618e8e9e18b3d028df4387e8f112 libreoffice-langpack-bn-7.1.8.1-15.el9_5.x86_64.rpm 17b1ec2d8538e349777d41834f35f37552da22ab658d5fefe66f5656c1cd42a2 libreoffice-langpack-br-7.1.8.1-15.el9_5.x86_64.rpm bd9ecee69c34229381949c6816a93e01bf734e792acf219988094eed1e78cfd5 libreoffice-langpack-ca-7.1.8.1-15.el9_5.x86_64.rpm 121d5ddfd6626642bcd94064e9b4761d73f16ca4b59f9f79985f974554050efb libreoffice-langpack-cs-7.1.8.1-15.el9_5.x86_64.rpm c3a381c07dd9f120b3f091f60badd3101516016f1610c212730b49efdef44d14 libreoffice-langpack-cy-7.1.8.1-15.el9_5.x86_64.rpm f3e90ddd9d16bc25a8d63cf1b3fb0e461a9e76261695e5dd3bf019a19d9e35ee libreoffice-langpack-da-7.1.8.1-15.el9_5.x86_64.rpm 6bb122fc000822f0fc39bb258f8e660d18c66c32872dd168921265f7db3b8e90 libreoffice-langpack-de-7.1.8.1-15.el9_5.x86_64.rpm 12716db4c4573bd1dc405ca480cf5c8594600223c7fae5fd08d92c04b2f3bb7a libreoffice-langpack-dz-7.1.8.1-15.el9_5.x86_64.rpm 2b7aa4e1ab0a35f25c24028ab31b800632824ed98ef2e752a9586c2709acdcc2 libreoffice-langpack-el-7.1.8.1-15.el9_5.x86_64.rpm b9641255a5993456835598ee406daa37df87378caec84ff80c62f379046eff21 libreoffice-langpack-en-7.1.8.1-15.el9_5.x86_64.rpm 2f7a30aba60c9697f20cf8b685e6db70b4f0de591dfb2453f946f45a48cf25ef libreoffice-langpack-eo-7.1.8.1-15.el9_5.x86_64.rpm da8f41cac4b019883a26e202022aace7cd7693de35029002bab246fd35ec0e08 libreoffice-langpack-es-7.1.8.1-15.el9_5.x86_64.rpm a7fce4f7f796d3811364537907332971fc3acb42e25df649f7881c1c4ddefdab libreoffice-langpack-et-7.1.8.1-15.el9_5.x86_64.rpm 31bf68ea06aad6e72ab51a3da3e2a50c2fdda47d819d122c692005f2ef0bc4a9 libreoffice-langpack-eu-7.1.8.1-15.el9_5.x86_64.rpm 3be3421746d6b88bd421e041c232028bb3f120ddd8275cc129dfd3cbcf80974b libreoffice-langpack-fa-7.1.8.1-15.el9_5.x86_64.rpm 54cf436947b07341ca1497fc726e47f674289c7dd55283351aa4e1e5d763a3ac libreoffice-langpack-fi-7.1.8.1-15.el9_5.x86_64.rpm cbe2d9f50bfdc0915b96f076280906dacbdf3ead7dc55fdc7737d6c350e5c5b6 libreoffice-langpack-fr-7.1.8.1-15.el9_5.x86_64.rpm aa36bb4a5a145f53253498ce80ee051da1bf403a72b87ca4af14c66a21222fcb libreoffice-langpack-fy-7.1.8.1-15.el9_5.x86_64.rpm 5b5428923dc7472a4340d68cd4415ce9a3309eff897e4aec87494edc686d605c libreoffice-langpack-ga-7.1.8.1-15.el9_5.x86_64.rpm ec0238c4828491d972ba10971fe9d46bbb06301be22fc82b600724c56e8cdf0f libreoffice-langpack-gl-7.1.8.1-15.el9_5.x86_64.rpm 25b09afaf7cfe836a203301827a83df2c3331684e040b452c5bbc1f4f14cc554 libreoffice-langpack-gu-7.1.8.1-15.el9_5.x86_64.rpm 74f00e151437305df955812d04042fe54004e090cc9691dcc1127ad967e7db0d libreoffice-langpack-he-7.1.8.1-15.el9_5.x86_64.rpm 5980f3a67b207cb6a0a8bfe324180ca3fdcaaab0d189f6fde1f2fdbdc2bef280 libreoffice-langpack-hi-7.1.8.1-15.el9_5.x86_64.rpm d189c50c9629a38505f4278fa890dd190aa872be2159a05e1ac895811e8785e2 libreoffice-langpack-hr-7.1.8.1-15.el9_5.x86_64.rpm 803b4219b9a137ff818fdaf07b2ed87231e3cb96ece04cc267c987f2d2afe806 libreoffice-langpack-hu-7.1.8.1-15.el9_5.x86_64.rpm a1b76a3d277eefc35431bcb75314fa15bc54e5c3a0b89fe6f6264d546d506955 libreoffice-langpack-id-7.1.8.1-15.el9_5.x86_64.rpm 20077f814f3e4481d38e9beaf9cce866be3139a32b366ef6153845d9b6cd933b libreoffice-langpack-it-7.1.8.1-15.el9_5.x86_64.rpm ac4b2e98c93597d13829bf25d7fbeb4191b5d771c2516b5e1cf576861bbb1e47 libreoffice-langpack-ja-7.1.8.1-15.el9_5.x86_64.rpm 95385f721ed3faefb030bc99944a3856b0bf281ca92afffc85727830a9e60210 libreoffice-langpack-kk-7.1.8.1-15.el9_5.x86_64.rpm 361aabee1a088fa1f8335c58346969f5ec98750d63e41dfa2cad7a7ac7fbcc5b libreoffice-langpack-kn-7.1.8.1-15.el9_5.x86_64.rpm 80b593fd11397e5f03a3ca33808cd7fbc4268369275a8fd4a8d97e098dbaa7cc libreoffice-langpack-ko-7.1.8.1-15.el9_5.x86_64.rpm fc2e704f66049c527cb6d05ff1ef825801a396f0ac6ee7755a7152b6adfd6fb5 libreoffice-langpack-lt-7.1.8.1-15.el9_5.x86_64.rpm 5ce3827e0b0e816d20b3e793ca9190ed96084d23ec26557700a788288e493411 libreoffice-langpack-lv-7.1.8.1-15.el9_5.x86_64.rpm 870f1e9a7714e4438a6bdebf9561dc97521a1fa9baf74949a6c262c32518ddcd libreoffice-langpack-mai-7.1.8.1-15.el9_5.x86_64.rpm 0a51018376396079a344d1894c3e6124513143a770e533e412be17ebbdacb5f1 libreoffice-langpack-ml-7.1.8.1-15.el9_5.x86_64.rpm cc88c3e7170ec11252ba9bd5fe72d2496c86aeb3ae55c995e0dc61525391cf67 libreoffice-langpack-mr-7.1.8.1-15.el9_5.x86_64.rpm 5e6d44b280a088fe130f9f37c17c1efe69b2b69cbf97d70e369f0ddba784abf4 libreoffice-langpack-nb-7.1.8.1-15.el9_5.x86_64.rpm d097f1039c672ec6e675f94abb8b7e87eaa8c7793e88829e7227a87b4965416f libreoffice-langpack-nl-7.1.8.1-15.el9_5.x86_64.rpm bc51fcfa8b26dabb4b6a064880ee5cce187e985092342301df20da6468e16201 libreoffice-langpack-nn-7.1.8.1-15.el9_5.x86_64.rpm 26c771a0d336fb44235a42a91b60f23eda5be164e60f7cf3ca7471fd7d2140ed libreoffice-langpack-nr-7.1.8.1-15.el9_5.x86_64.rpm 892996d09248a9d398fed41215a197541dfa53aafa4529e18ef1e59992e1b4c0 libreoffice-langpack-nso-7.1.8.1-15.el9_5.x86_64.rpm 74488fb0a0b5588ce63cc099ddbd389879ee3e8b491207c461463b926b67f0b7 libreoffice-langpack-or-7.1.8.1-15.el9_5.x86_64.rpm a51db510894abf9ee3f8d3541c4f503d5e132de17f085aba4b9f3429d433b30a libreoffice-langpack-pa-7.1.8.1-15.el9_5.x86_64.rpm c482c8a62ebebcc23495512799efbc8f95c445b6e966e99641690ff1fb03ed38 libreoffice-langpack-pl-7.1.8.1-15.el9_5.x86_64.rpm f5335b0fd9505d3bae455c0422067055dafc7a0f7bb60ff0ebd1fa7e6a569d84 libreoffice-langpack-pt-BR-7.1.8.1-15.el9_5.x86_64.rpm b49c7a254518e840d5a82e09f114a219b8c358bb175a1aeb0dd39050811ca7b7 libreoffice-langpack-pt-PT-7.1.8.1-15.el9_5.x86_64.rpm 54c7e1be019f98a96ea7f9f2b928e234b42b5d078ebbc9532e3f1a8c79bb0dfe libreoffice-langpack-ro-7.1.8.1-15.el9_5.x86_64.rpm be9b284a43a059b2b92681f7fbbae8584e133fb650d36366166ee73b7ee763d8 libreoffice-langpack-ru-7.1.8.1-15.el9_5.x86_64.rpm 92726662876d9afb3cbe1f77c8061ed9fe346e37bdb6d0367b02eae34b2e0ef7 libreoffice-langpack-si-7.1.8.1-15.el9_5.x86_64.rpm e0e4d0abfc43b87eaddf4aefa485f9907da37db1c6167a04a084d88199d021af libreoffice-langpack-sk-7.1.8.1-15.el9_5.x86_64.rpm 12835c811094de23147c6603f7936b1fde7de7b78a2baeb9684eb5eb421cfbc8 libreoffice-langpack-sl-7.1.8.1-15.el9_5.x86_64.rpm 841b9f9c384abebfa163be0348cdafd2cc8f48d58923ed955e5d2867d7d1c06b libreoffice-langpack-sr-7.1.8.1-15.el9_5.x86_64.rpm 2fcfdfeb3f19b5136e84505ef6dff527613a1cc40dd431284dd31eb3fabaa7b8 libreoffice-langpack-ss-7.1.8.1-15.el9_5.x86_64.rpm 87bce221867bc4d4ff3b76fcad731a174feed70c29de58b13eeb4b52342a5bce libreoffice-langpack-st-7.1.8.1-15.el9_5.x86_64.rpm 28b9bff583c49fc68c29841d6bde58ebb16a2c4ce31eac44e787646a3806dc1b libreoffice-langpack-sv-7.1.8.1-15.el9_5.x86_64.rpm 2c3eb4b341cf29e22fdd43bbe2024dba6cc0dc998aac41ca1c14e0e4662d91fc libreoffice-langpack-ta-7.1.8.1-15.el9_5.x86_64.rpm 8fc5e2c2867fc4241c88734275a18c8400055c73f95827e15059fb89844ac0bb libreoffice-langpack-te-7.1.8.1-15.el9_5.x86_64.rpm 5216eff6d612b0fa89ff183f56fe1338d686c1d9ee25938c8f488a51c777d209 libreoffice-langpack-th-7.1.8.1-15.el9_5.x86_64.rpm a84d81252738722f922ab127897be2e64d55ee36366a89c905897cae55f25f09 libreoffice-langpack-tn-7.1.8.1-15.el9_5.x86_64.rpm 854e117b5a08b56e1acb24694609a384e2c380f35b6d7ec9f7f39b83c477a98a libreoffice-langpack-tr-7.1.8.1-15.el9_5.x86_64.rpm 8f119c3f68d0ce6bfecc31eff88fabffd8423e9e1d21d620e78489f175e5c209 libreoffice-langpack-ts-7.1.8.1-15.el9_5.x86_64.rpm 8763bb30a816650eef8b75f59cfac18aa008c2eee0d50b83bd815bf7a6baf3cf libreoffice-langpack-uk-7.1.8.1-15.el9_5.x86_64.rpm 019a83c4319b308f04eed31f56e8338c6b05c0e291acc79bfc9060fcb409d633 libreoffice-langpack-ve-7.1.8.1-15.el9_5.x86_64.rpm 339c57472a46e80466ee2d6b5e553417e8df1cdf47a132a055de519e8802ec88 libreoffice-langpack-xh-7.1.8.1-15.el9_5.x86_64.rpm 69a6b6b3e8a430d88fd5cefbc4f40dd79ce0e3d404bad901005de9da5fcbf9f0 libreoffice-langpack-zh-Hans-7.1.8.1-15.el9_5.x86_64.rpm cc9cec42042fee6756e0d3e5ffd303ee408d585d51cb52c10927dec238f5682e libreoffice-langpack-zh-Hant-7.1.8.1-15.el9_5.x86_64.rpm c604f705429d3728a979d821b391388adc79cc23d941602c1342b4bfca7e7c52 libreoffice-langpack-zu-7.1.8.1-15.el9_5.x86_64.rpm c5937b6fe8b2d44bbfd258a94226c9d2e56142c578b1669783e4295d28c2457e libreoffice-math-7.1.8.1-15.el9_5.x86_64.rpm 605e952e77ad6d7cd2e08c4027df9c05ce0919f5db7d585646bb94ca510e29c1 libreoffice-ogltrans-7.1.8.1-15.el9_5.x86_64.rpm d683103dcc6b7b9e0b8d8910c0b4cca790e210dfeead5bce85665b9dc7c45487 libreoffice-opensymbol-fonts-7.1.8.1-15.el9_5.noarch.rpm 5c697c4cd75af171ba3bf8a25e3d345bd8740e839406d324feb562812db8f735 libreoffice-pdfimport-7.1.8.1-15.el9_5.x86_64.rpm dbd3b7224a7a51c20a0d3be94b14bb9c053fefa58ddf29532539576bb96e231a libreoffice-pyuno-7.1.8.1-15.el9_5.x86_64.rpm bedefeb133eb04a9068a96ec1efbc6455334a70132be96db601f2f67aafac843 libreoffice-ure-7.1.8.1-15.el9_5.x86_64.rpm 63874f086b533411000d1908ef4f049e823ca793fecd0809fe43cfed0725548d libreoffice-ure-common-7.1.8.1-15.el9_5.noarch.rpm 919b8359cc2079a97274ec50c0ee1c1984cc18299906df769eaa00e7431b6f78 libreoffice-wiki-publisher-7.1.8.1-15.el9_5.x86_64.rpm f71c0b4c0d79d61291ed1de978b5fa81b7308eed4af77dfc89a9a27e20dec0ef libreoffice-writer-7.1.8.1-15.el9_5.x86_64.rpm efe44a7a15c9856edb47bc66b0c60af77e6102c16e8cd1b8460e382bf12302ab libreoffice-x11-7.1.8.1-15.el9_5.x86_64.rpm cbf5f5aa6ed1e3531eebdb171344ea93d8954c026338a4a9f626d853d540b0b9 libreoffice-xsltfilter-7.1.8.1-15.el9_5.x86_64.rpm af4f3cbc0948dcb6f3bbb29f53ed286febb795735f5ae2bec1d257d8d77ec64a RLSA-2025:3631 Low: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.5-2.el9_5.3.x86_64.rpm 9c9d12b1c28e51b866c7970a68ef7eac3e636d775c4a8f51ce3d8e033f9dd8ec python3.12-devel-3.12.5-2.el9_5.3.i686.rpm 561825806417d650da739b460159cd20279aaa10f54c0313b89053d86a16230e python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm f658b5839b9b15edad5f333812f2cdc1a08a5c9d7c607671c608e1a578251201 python3.12-libs-3.12.5-2.el9_5.3.i686.rpm 256237758a161f72f1beb9964f5a43bdded8d5e74963d1f60f0a29e59af576e5 python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm 71efc1a9abeb08ea7a32a1899af4d9f31896361554cb09abf4f49974a50c274a python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm ff5d067fe54864d3d86f96c651fff6d665ed087ce328e87ab936fee00db14aad RLSA-2025:3634 Low: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.9-7.el9_5.3.x86_64.rpm 23db3a5a3d124ba9768d9afeced2d6818332a582be85cfd2156fe87e09650614 python3.11-devel-3.11.9-7.el9_5.3.i686.rpm ad41b83a4fbd5e093f7dda6b180d8022f09bd39820e2d0572ab1aa4a5b7fde5c python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm 7b6956d7a0d77045b6494d74c34b02528492b559e557642e8cbd269c0a4ca9d3 python3.11-libs-3.11.9-7.el9_5.3.i686.rpm 743d1e202b391dbecb9bc4133ce84fdb9c057085ba498d35254f8b0051d874c3 python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm 4a2020a0c6d29cfdc48af361b7fe14af058f27bfad7d4ec42171899a34ccfed5 python3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm ee13a821996e5cabb1296365a4dc90166dd442a86ceb846494e8b8b50b06d9df RLSA-2025:4491 Moderate: 389-ds-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.5.2-9.el9_5.x86_64.rpm 502f331b400efb9c3160463ef959cc59e410bddc47e2f23c0935a55f43cece11 389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpm 5d972b05b3a82942dc7d32c95b0389b99f9a051ae2e203f62a17ed2520560216 389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm 9ad472b9ea9f5f3a401f069a219a0729cc25d4c0e470275d4a09abce3722dc86 python3-lib389-2.5.2-9.el9_5.noarch.rpm 36768b6576ca2bca5d30864d479f774eab8ee837b7e93d23302793330e2e1184 RLSA-2025:4487 Moderate: ruby security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220) * CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ruby-3.0.7-165.el9_5.i686.rpm 26e59bd281d897bdd3266cff009a4179f81183c6c14dfcc5562d912387c0d4dd ruby-3.0.7-165.el9_5.x86_64.rpm 3b4038dc1fa27b6a3391f1e4ce8e870d05aabc87b946d2b53dc7e436fa54b67b ruby-default-gems-3.0.7-165.el9_5.noarch.rpm a66c0571c61bd5f0bf4141791047523054c7f6c6b115f539789ae9d173d0b1b0 ruby-devel-3.0.7-165.el9_5.i686.rpm 226428611370dfe47725db7829ec2d3792431260da7854f6418d6480f46b10aa ruby-devel-3.0.7-165.el9_5.x86_64.rpm f1b1fb02527fef327628f49f6d860f6e483fa9ad1a50f3f6f0ed7e491e73cf04 rubygem-bigdecimal-3.0.0-165.el9_5.x86_64.rpm 906e410e6bf821fd5bd88e6f52f8f7501b778be561281c2a5a0bec422755cd2c rubygem-bundler-2.2.33-165.el9_5.noarch.rpm 15c379e53d948ef7045c56023a796718e24cd1fa0af653d196910da29132e1ff rubygem-io-console-0.5.7-165.el9_5.x86_64.rpm a6e011968f2085f72ea1995bd19f05441cb949735f4c746727fe7ad5126753a5 rubygem-irb-1.3.5-165.el9_5.noarch.rpm 6ce90dee15c92c4b468461d1a5dae8ccc29a428c3190876a405efe26804635f1 rubygem-json-2.5.1-165.el9_5.x86_64.rpm 04b27cdc8bc8af6dfc65b96d7a8fa9e267b7032f54a658653c6ce018e919d79d rubygem-minitest-5.14.2-165.el9_5.noarch.rpm 140df9f2417311d580a1bd957030f971c57c915d28a76431363989e4a4ebeb54 rubygem-power_assert-1.2.1-165.el9_5.noarch.rpm 518a3f8ca7db35f5e01da9399869adeb02b00c2b62d6c6d4340466141cd89dc0 rubygem-psych-3.3.2-165.el9_5.x86_64.rpm c073c51a3ca710f5c03d9d9a0f5125a8955dea0d2e7317c90b3fbbd6cef10b14 rubygem-rake-13.0.3-165.el9_5.noarch.rpm d3b1a70aa4fa04b8113029b6a2ae709271ca5c45c0b0146aaed31020279b930c rubygem-rbs-1.4.0-165.el9_5.noarch.rpm 7908ef57ad09034756f13b2a2acb11a319e5500b996400ee865dcbf7570491d8 rubygem-rdoc-6.3.4.1-165.el9_5.noarch.rpm 50475bcf87161a9744fae86ba786a06621aa2bdb0c76aea46922c66a454b77a8 rubygem-rexml-3.2.5-165.el9_5.noarch.rpm b354ce87b586cb6909321a9f3903ef313acf3da52c87230c98edabfaa921c64c rubygem-rss-0.2.9-165.el9_5.noarch.rpm 4eb2721317ebadd8c0b4e03b11145a1a1172703ca21224f41ba034ddd2eed92c rubygems-3.2.33-165.el9_5.noarch.rpm 77110de2a9f7e83e2df42f6ee7977aeed29e137b375f90fb2b32844dc44ac0b0 rubygems-devel-3.2.33-165.el9_5.noarch.rpm 492c895645d08e793f771d9ecf50690689783bc5926da04e738a9c6fcdec8b57 rubygem-test-unit-3.3.7-165.el9_5.noarch.rpm dbec1a510ce6ed840988fe9c00ff3e7ed291f8deb91af80757d93d7701a183e4 rubygem-typeprof-0.15.2-165.el9_5.noarch.rpm d16ae2dbb615c62251b74546577b22489c9d837430ad721b53d0c2fd68fa0b97 ruby-libs-3.0.7-165.el9_5.i686.rpm c11a9cbe41165f689d2ece82bd9005f029392c2689a110b72db1df114ee51e53 ruby-libs-3.0.7-165.el9_5.x86_64.rpm cc605e9f31d6ab62dc023bf65dd8d1286c60f9a122fdc42639ac01b064df96ba RLBA-2025:2973 Moderate:mod_proxy_cluster bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality. Bug Fix(es): * Rebuild mod_proxy_cluster against httpd 2.4.62 (JIRA:Rocky Linux-70140) * Rebase mod_proxy_cluster to upstream 1.3.22.Final release (JIRA:Rocky Linux-80435) * Update deprecated misspeled EnableMCPMReceive directive (JIRA:Rocky Linux-82135) rocky-linux-9-x86-64-appstream-rpms mod_proxy_cluster-1.3.22-1.el9_5.2.x86_64.rpm c6bd6e1ad674b8ceb49efee4c06ed72125b1303c0372590e4f8892aa3c1b5715 RLSA-2025:3113 Important: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.6.noarch.rpm 5919ab248b8025e88bcc9554062e04c9406e1b17849c66ff033def74c173d8dc fence-agents-compute-4.10.0-76.el9_5.6.x86_64.rpm 921195169138cc32e55077fa604c15d02e079cd19a637e0e128da585eec893a4 fence-agents-ibm-powervs-4.10.0-76.el9_5.6.noarch.rpm 62c8ead516da824e97c05ab8f70290beddf665bb9e9485f8ee0c4efbcfa275a4 fence-agents-ibm-vpc-4.10.0-76.el9_5.6.noarch.rpm 25cfb3e83f562ae117c0f5dad201a89955851ed61c12805f47411c586d430adf fence-agents-kubevirt-4.10.0-76.el9_5.6.x86_64.rpm 5d2a8508aa33a6479d600d6efb537e1a8a7c9fd8834943a42b601f64062cc4d6 fence-agents-virsh-4.10.0-76.el9_5.6.noarch.rpm 0ca3334e5bf88e6daf310dd09b89cdbb8ec4ef5d37f85eb77608f8474de8aecc fence-virt-4.10.0-76.el9_5.6.x86_64.rpm bf7dd02bfd5d8a81527289b8212af9418fc6e9dc8974626cc061309c530b115c fence-virtd-4.10.0-76.el9_5.6.x86_64.rpm e3aa48ec3645983a36dbf59d3862affc068b965e492f8cc9293c48e4c7aef21c fence-virtd-cpg-4.10.0-76.el9_5.6.x86_64.rpm 491c394e597e8c7ec123751e0546d35a9b67914977dd32b9006bca18f8866cd3 fence-virtd-libvirt-4.10.0-76.el9_5.6.x86_64.rpm b85b18d666b957f3b09fe4fc99ea17366a57b76a90828f92b90ee265330bc256 fence-virtd-multicast-4.10.0-76.el9_5.6.x86_64.rpm ef283bd2322d87d0236adb9f6bf9910db073d63de7a6d29a05d91287b864c75f fence-virtd-serial-4.10.0-76.el9_5.6.x86_64.rpm ec1cf2bd753800030cab1e8c79adade5c47ad6501b0cfa189d2e0500529d6e0e fence-virtd-tcp-4.10.0-76.el9_5.6.x86_64.rpm 1752742181b84ffa4f086afbacac5a069b226817dddd548a3190e4bf826be56e RLSA-2025:3344 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-9.el9_5.x86_64.rpm b49bd0c2a45b4b5ce54544d9276d248b1911e2e9043180c223bb6af9a46bb0ae grafana-selinux-10.2.6-9.el9_5.x86_64.rpm dd13d3d6e9ed0c34d1434fbcd34bc17ada464c926ce0f9e7e409adb73b6a53b1 RLSA-2025:3406 Important: python-jinja2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-8.el9_5.noarch.rpm 614c6a8c726785841abd211d19efc1ec08e2cda1852c7b159f366e32718dcda0 RLSA-2025:3411 Important: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.107.0-10.el9_5.x86_64.rpm a8bd9ad015c01c8c32ccf5870343f8f6c57ad49b283d8a5c62065fb564e976a5 RLSA-2025:3645 Moderate: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: RCE due to TOCTOU issue in JSP compilation (CVE-2024-50379) * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-2.el9_5.1.noarch.rpm 1defc3380205f799ac63578da48431802e5c2a3a89b633fdc53523f1f0dff5b2 tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm a856d442f9e8d1c3b96d24a848c5647c4d583c22955ee971c9fd4787f4d9ee30 tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpm b95a4cb12558d1304b8a042972f8c79f4e32ee02fff7d831d064ba31dda5b624 tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpm 5bfca0316b3637db78c757c04ebedf9e0590147e290f29d2e968350bee8f2f2e tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm dd6afb2ce63b79a2532e2524a4558b89c7d5624c73d4db19440e25a84e96a4d1 tomcat-lib-9.0.87-2.el9_5.1.noarch.rpm 1279618f17bfa3edb48d7f5c3948c120fb9946e8b22db1df96c9db43485271a4 tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm 175b3a7926c6005ad2786bbdef7573441c936af1c6264cb0e3f674de073566ea tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm 28d6fd30622e5a5d46c742086b506adf89bcee85c60bb941c719a3bc8c5ff886 RLSA-2025:3713 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551) * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.48.1-1.el9_5.i686.rpm 09ad8896315f233ba0f9bfbc07951ddab5abb7f08ef74aaaa1fa70a997b0ada1 webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm 177734562a0ffa5f3f09dde52e7ad228d5690caaff1a6b2542c4c83e09b645c2 webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm f609ec8203ef898e313f1e2ed8af35c686d903f2898b7ae9399c12f8b199b8b0 webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm ca01e96c67e5fea3ef494f375d3947c37e8345de6f215a1398a1c8535f2a3ee9 webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm 47c6bdfa9204b037c6eb4276115b416d1f63c1d666677f892b7ee1190fd2398f webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm baf3b7ecfda5a32fe41ad401f284c2458e9edcfa1205800811197602f17d9415 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm 08778da4290e9ef2fd89e3cdbf23cbbe2b9c33d032790738aa24182afd81f398 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm d73519f4ea3a5b303c861d1c7389e140ff28e656923d9f38b8127cbe14d59385 RLSA-2025:19105 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718) * kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730) * kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751) * kernel: fs/smb: Fix inconsistent refcnt update (CVE-2025-39819) * kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.58.1.el9_6.x86_64.rpm d8d2141081d54509d85819cf1858e9ee59a9d5e5a49ac28fd2ef0553d8fe410f kernel-debug-devel-matched-5.14.0-570.58.1.el9_6.x86_64.rpm 01975b4717512421c0e8123b66b82d3ddb69ca0192c96910cb4364e7902aeba3 kernel-devel-5.14.0-570.58.1.el9_6.x86_64.rpm bdd8e6e2f8c10557f786f1587d701583dcf0e0b5aaa88097fef7e7b426bb3adb kernel-devel-matched-5.14.0-570.58.1.el9_6.x86_64.rpm dec78697bdf5188f687b5325f94caac1c7bbc3f463c677acccef08d032e2634b kernel-doc-5.14.0-570.58.1.el9_6.noarch.rpm 80ac780357661d7bb092a4d0f6d180c6281c4e78823014467dfd9fcaff94bc72 perf-5.14.0-570.58.1.el9_6.x86_64.rpm 033d18f3bf8002c24628fdfca3f0b128f42a1bf48fa50ac4878f2ec12a642d72 python3-perf-5.14.0-570.58.1.el9_6.x86_64.rpm 2156f3f7f2b80e4c2dfc64ef5dcb9e0b1cda05004da71549e45b515d12da487b rtla-5.14.0-570.58.1.el9_6.x86_64.rpm 1e808be408345bc6d195de9ef65be6ab6fc2f4adc2085c444e00a6f23691f6af rv-5.14.0-570.58.1.el9_6.x86_64.rpm fcddb2a0028061a21f573d784a5a6fb56beca6cf839fa5c5b91c30bd828eee29 RLSA-2025:19113 Important: libtiff security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: LibTIFF Use-After-Free Vulnerability (CVE-2025-8176) * libtiff: Libtiff Write-What-Where (CVE-2025-9900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-13.el9_6.2.i686.rpm 37b2a23537fbcc583d9c5999d23438e5ed202283ba31c40590426c830d1a9613 libtiff-4.4.0-13.el9_6.2.x86_64.rpm fd32fd77a542446c5de58e22632765ab9b502d094c60458957a703ec4a9b465f libtiff-devel-4.4.0-13.el9_6.2.i686.rpm 496d62b6a5e308b4f646f94d95dab9d85abac23993f11a583af11c721861528e libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpm 9f2ecb08e91230d6871ac3d2108d36caf6f33100c24ab390b482d38423c0f423 RLSA-2025:19237 Important: redis security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.20-1.el9_6.x86_64.rpm 8e07cc54df96ce47e64b2fc96a3af51239f6c7d88d3012dca7b4c533769cfb07 redis-devel-6.2.20-1.el9_6.i686.rpm c8808cbc62240864af64c21ae7a93f37ce3304333f46b0a964e14134b07d16aa redis-devel-6.2.20-1.el9_6.x86_64.rpm fc52dbea571a75ae7967aa076606daf96982fd5074de1bdc87c7e826d94c6014 redis-doc-6.2.20-1.el9_6.noarch.rpm 53398a62a39a90635338c5a41777561275e68ebf2a497332205ef8b51a3f3183 RLSA-2025:21916 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for valkey. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms valkey-8.0.6-2.el9_7.x86_64.rpm 6a1c14616c77048ed9918d1e47aadc0b1bc61d30f53bb66d5fc7837331871b7d valkey-devel-8.0.6-2.el9_7.x86_64.rpm b96f79d7a173dcaff82ed3a3cea556e46c4f7eaf7ca9691e7a1da492fc417662 RLSA-2025:21968 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10922) * gimp: GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability (CVE-2025-10920) * gimp: GIMP WBMP File Parsing Integer Overflow Remote Code Execution Vulnerability (CVE-2025-10923) * gimp: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10921) * gimp: GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10925) * gimp: GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability (CVE-2025-10924) * gimp: GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-10934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-3.0.4-1.el9_7.1.x86_64.rpm 1646255db35fc81f6f378bb33c8b4e597609ab059a11bf91f73de72d46291f32 gimp-libs-3.0.4-1.el9_7.1.i686.rpm 67e44a804f657ced6d1a790177bcc764875a4299691582defff9002ad8cc7c62 gimp-libs-3.0.4-1.el9_7.1.x86_64.rpm 899bc4e52a7a228571c3427b3e8854422c8492aa9f50f25a7504513c752cc816 RLSA-2025:19584 Moderate: galera and mariadb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for galera. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Galera is a fast synchronous multimaster wsrep provider (replication engine) for transactional databases and similar applications. For more information about wsrep API see https://github.com/codership/wsrep-API repository. For a description of Galera replication engine see https://www.galeracluster.com web. Security Fix(es): * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490) * mariadb: MariaDB Server Crash Due to Empty Backtrace Log (CVE-2023-52969) * mariadb: MariaDB Server Crash via Item_direct_view_ref (CVE-2023-52970) * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms galera-26.4.22-1.el9_6.x86_64.rpm ff0cceaccd03c9d92f22c0f88d89e707305528d2ce750f4e09e7d4da265031af RLSA-2025:4443 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.10.0-1.el9_5.x86_64.rpm ea07422540a0301c39afe8fe4d6af23036edc4d000bef5351c548bf5063e5606 firefox-x11-128.10.0-1.el9_5.x86_64.rpm 92115e9f925ddf5610004578442fb5dd47a1bcb139a35df15a6db53ad42fe57c RLSA-2025:4460 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.10.0-1.el9_5.x86_64.rpm 3c345da09047edaf7e2c5611514829eea3374e7fd4a34db1429bd9dd87c555d8 RLSA-2025:4492 Moderate: qemu-kvm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693) * qemu-kvm: net: assertion failure in update_sctp_checksum() (CVE-2024-3567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-9.0.0-10.el9_5.3.x86_64.rpm a2366ab92599dc8294aff24fc24a3fadbad218f0596a215fda67dd640900dbf7 qemu-img-9.0.0-10.el9_5.3.x86_64.rpm c8484256286b782786b8605d79da69d3ffdad8b0b098c92bd5cca4853bbf7b9d qemu-kvm-9.0.0-10.el9_5.3.x86_64.rpm 1681c3d80c70b50aa45b25ee0d899fc54c2fddcfb4f50fc434eaffe67ff088a1 qemu-kvm-audio-pa-9.0.0-10.el9_5.3.x86_64.rpm d8b5190833cb501851c521816d61cb80f2c8b141a954ad4772ab5d45dc314561 qemu-kvm-block-blkio-9.0.0-10.el9_5.3.x86_64.rpm 136b1d85015b955a58c3c30e41c9565869a2ae27ccb4e8843d1a91c5418eaa48 qemu-kvm-block-curl-9.0.0-10.el9_5.3.x86_64.rpm 5b8cd58f70c3b58d92aeb8da64cd9014cdfce6ccbe60d0f06ebc5b14ef2d42a4 qemu-kvm-block-rbd-9.0.0-10.el9_5.3.x86_64.rpm 3236788bc018fc69dfa7e766b544e8be3a8ddef4fb6933ed0141d115afa9869d qemu-kvm-common-9.0.0-10.el9_5.3.x86_64.rpm 3dba6cdd66b3b5ddaf1419f7a36cf3df8536d79cd5da7a7ad02467f1d08e3006 qemu-kvm-core-9.0.0-10.el9_5.3.x86_64.rpm 648ab321aa2eba1063d5594d2e9975dca19008f227d754df72596779dd8416ab qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3.x86_64.rpm 5ebe3c6e98d9723bd553bca09a29bd79fbde84ca2a3558c654d137483cc93397 qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.3.x86_64.rpm 10b41cc1c2c689c69b1a975ccc8e2f7b9996baeeb503393342d7055f69b1961d qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.3.x86_64.rpm 465f4c2e11afb8a209a7033c41a8c696e42afff38f59407e291a9a6449b243cc qemu-kvm-device-usb-host-9.0.0-10.el9_5.3.x86_64.rpm db7fb377de4757758ca6dbfed0e2ab8ea8fa8cbb00078b635c624b5ad8a2d942 qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.3.x86_64.rpm 77dbf2b5842e4b584390ce262418234cedf1bc60df00f9c37eb7553d66fbe85e qemu-kvm-docs-9.0.0-10.el9_5.3.x86_64.rpm 1d67febbec318222714360b87e1f22a0eb9f3622e08f9c5c60180dc00ee1d9a8 qemu-kvm-tools-9.0.0-10.el9_5.3.x86_64.rpm 75f021791217edbb475910bbf0a7c2452d2ac5b841b04b06e8e048fc82a91518 qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.3.x86_64.rpm 968f32ce88710f49b61a23fa6978ebabb52abdfa9583db8c3542f3a568a1d49a qemu-kvm-ui-opengl-9.0.0-10.el9_5.3.x86_64.rpm bd568d822ff312679ceb23700ee6f10cb826adf3ab31e9c15df448cf68d72f5b qemu-pr-helper-9.0.0-10.el9_5.3.x86_64.rpm 25c698ab3a4ad95bd41b8c9b1c3816fb9d73f82ced02978671a86d618ad4474a RLSA-2025:19713 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-10.el9_6.3.i686.rpm 650f4a08e4e239e5302983fa4f575e16d127148c17b62e4af3b730d607c8f47b libsoup-2.72.0-10.el9_6.3.x86_64.rpm 9e81b532cdc663dd56ed1b4fa985f4f18ee3d7685e3942650b97e2fbfab3ccff libsoup-devel-2.72.0-10.el9_6.3.i686.rpm 052def4d3964d0735f218e9b2c2651a8c17f3958bf1df4aee42b022543a57f8a libsoup-devel-2.72.0-10.el9_6.3.x86_64.rpm 58884142314219bc12a63d651279e19713ba407cbbacbf2467fd4f84a6bbfd75 RLSA-2025:4787 Moderate: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-11.el9_5.2.x86_64.rpm 4db2921e83c2392cba48692f55ea579407926fcdbc3b58e019e533a654492314 emacs-common-27.2-11.el9_5.2.x86_64.rpm 0c56a6da81490bfd798cafebf5617c55e991730ef04d76aa466f42a537723491 emacs-filesystem-27.2-11.el9_5.2.noarch.rpm ab4236bc25f78caf03c02b010d5473b72994b44f4c2914d95033491c8ef7e2a4 emacs-lucid-27.2-11.el9_5.2.x86_64.rpm 0dd479077927d780f907390d3c3f1611c993cae6a942d6954f63efcd0a05c277 emacs-nox-27.2-11.el9_5.2.x86_64.rpm 146d9cac21322b3ea9acc316587fc261511a4e5b520189d9d33a26c24bbe8388 RLSA-2025:7387 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551) * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.48.1-1.el9_5.i686.rpm 09ad8896315f233ba0f9bfbc07951ddab5abb7f08ef74aaaa1fa70a997b0ada1 webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm 177734562a0ffa5f3f09dde52e7ad228d5690caaff1a6b2542c4c83e09b645c2 webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm f609ec8203ef898e313f1e2ed8af35c686d903f2898b7ae9399c12f8b199b8b0 webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm ca01e96c67e5fea3ef494f375d3947c37e8345de6f215a1398a1c8535f2a3ee9 webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm 47c6bdfa9204b037c6eb4276115b416d1f63c1d666677f892b7ee1190fd2398f webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm baf3b7ecfda5a32fe41ad401f284c2458e9edcfa1205800811197602f17d9415 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm 08778da4290e9ef2fd89e3cdbf23cbbe2b9c33d032790738aa24182afd81f398 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm d73519f4ea3a5b303c861d1c7389e140ff28e656923d9f38b8127cbe14d59385 RLSA-2025:7138 Moderate: protobuf security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for protobuf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: message parsing vulnerability in ProtocolBuffers (CVE-2022-1941) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-3.14.0-16.el9.i686.rpm c3eb56f882a74970aa215fa43d17a460e9d3f1e33816d084efa2d7bdb9ec021b protobuf-3.14.0-16.el9.x86_64.rpm a82026191a8f49c916d838de0e5da8c7d4ef8a67459d0030fda03502b3064aed protobuf-lite-3.14.0-16.el9.i686.rpm 449f3b74dce8decd7aa4ed050d8409cbd652bc0de86de2c23a13381476ae4ffa protobuf-lite-3.14.0-16.el9.x86_64.rpm 5bac32e143e0d1f0e4ef705d004c72dcd7962047a58935478fcffd1994ba7118 python3-protobuf-3.14.0-16.el9.noarch.rpm c53884a58180b86ff7a2c426e9d55bde4328964fc65a6cec1a672a1524b47008 RLSA-2025:7178 Moderate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gstreamer1 packages contain a streaming media framework, based on graphs of filters which operate on media data. Security Fix(es): * gstreamer: EXIF Metadata Parsing Integer Overflow (CVE-2024-4453) * gstreamer: AV1 Video Parsing Stack-based Buffer Overflow (CVE-2024-0444) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-1.22.12-3.el9.i686.rpm 75a4a92b6f8e87c0dc679e68fb66b97aaa070a0e047a06ad416410eb5502cc0b gstreamer1-1.22.12-3.el9.x86_64.rpm 33bde0ad67e6c448220e9b328d6fb9a2ad51bef4df8801043376c48d98fe5570 gstreamer1-devel-1.22.12-3.el9.i686.rpm baacf25a970f3c57147c2a100aed5a1d28d5e169469560734e4d9fbdae4d52a3 gstreamer1-devel-1.22.12-3.el9.x86_64.rpm 5d177096122c3b38e3df9f9d9fae8057b67e5137f12767de56182c157379d935 RLSA-2025:7243 Moderate: gstreamer1-plugins-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer1-plugins-base: ID3v2 parser out-of-bounds read and NULL-pointer dereference (CVE-2024-47542) * gstreamer1-plugins-base: GStreamer has an out-of-bounds write in SSA subtitle parser (CVE-2024-47541) * gstreamer1-plugins-base: GStreamer has an OOB-read in format_channel_mask (CVE-2024-47600) * gstreamer1-plugins-base: NULL-pointer dereference in LRC subtitle parser (CVE-2024-47835) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm e45d98a09ecfb3c75bbc98961efe85f1d9f2eaefefbf309c64a96189874ae969 gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm a6bd8ad2a8a99a12009abab85ca393b53f4de1984f98cfc54799506356a1ba83 gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm 1fd775eac6f168f58dc3e9f669a548a662c4db013b749be94555b4d566aa0321 gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpm 9beda2c9e09d2c283d7138182aab1f50e61dc15b130649d6aa2766ccb5265f64 gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm e1823bb1110fa1ed9e874b39e6b62a424972d74137cec2c0f0019e8b9e61ff64 RLSA-2025:7242 Moderate: gstreamer1-plugins-good security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer1-plugins-good: OOB-read in qtdemux_parse_container (CVE-2024-47543) * gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk (CVE-2024-47774) * gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk (CVE-2024-47777) * gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk (CVE-2024-47778) * gstreamer1-plugins-good: OOB-read in parse_ds64 (CVE-2024-47775) * gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing (CVE-2024-47596) * gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (CVE-2024-47599) * gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate (CVE-2024-47834) * gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk (CVE-2024-47776) * gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling (CVE-2024-47544) * gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47601) * gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples (CVE-2024-47597) * gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read (CVE-2024-47546) * gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (CVE-2024-47602) * gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table (CVE-2024-47598) * gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47603) * gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (CVE-2024-47545) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-good-1.22.12-4.el9.i686.rpm 988d01ad916c58b26783d8d33afa2c609ad192bf196e975bf731a76eb803d42e gstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpm cb86e4840ddcb69ef66c29e643a7ec6fc5131b5c71e90f01985a01af102991da gstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpm dbb41e66549f580879c91d092b626bb019cd2639361c00995ee52ab68108ec08 gstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpm 34fa23217fd5cb1223f76602129f732612790d610a3f46cafca61a5c963a17cc RLSA-2025:7201 Moderate: corosync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for corosync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software. Security Fix(es): * corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms corosynclib-3.1.9-2.el9_6.i686.rpm 8823e5580c3d1c9167946ab86fa55837940683aeb0f0b3204814a8abe87ab451 corosynclib-3.1.9-2.el9_6.x86_64.rpm 86e737632242193fb9f0241cf098a4a9da871b164f5be5698d15fca67bca8029 RLSA-2025:7309 Moderate: openjpeg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openjpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: heap buffer overflow in bin/common/color.c (CVE-2024-56826) * openjpeg: heap buffer overflow in lib/openjp2/j2k.c (CVE-2024-56827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openjpeg2-2.4.0-8.el9.i686.rpm 00985eadaeccc5212a6bd2ff3d732297363fd80693e59ac1fba3a73143ab019c openjpeg2-2.4.0-8.el9.x86_64.rpm a7ab9643943926f99d24dce2a3b523593c19a11c5afa130c4c71364e0e118008 RLSA-2025:7410 Important: libxslt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libxslt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxslt-1.1.34-13.el9_6.i686.rpm 7406e396df62d04c205e3c5d04a66ad0fd5dd8d58227823d4fd6f738062ef7ad libxslt-1.1.34-13.el9_6.x86_64.rpm fac9a4758013437961bc90a3ad59cf09e5dfd90c42a846e2d0f1b711a53982ec libxslt-devel-1.1.34-13.el9_6.i686.rpm 67c259eaaf9e383b492d2375f7c3325bd3a317de94c8e62054ee37e81fe58f24 libxslt-devel-1.1.34-13.el9_6.x86_64.rpm f818b9b6d575e618db858784885e4fbd8f796bad739c491d56b51ebd0838467b RLSA-2025:7586 Moderate: ghostscript security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-19.el9_6.x86_64.rpm 29658fbde53511b9368698c154d33b8e4a7041b5bf71e4c3a6982f5a947d9964 ghostscript-doc-9.54.0-19.el9_6.noarch.rpm 9501701f96e64b9c109083e7f8fade953cd92d8b58eb4ba8f358b6b842a0df5d ghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm 11498c8a3ede9045d27ae645e352faad7bcac3fec2118ddea57e7352e9a59ce5 ghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm 3474c367f0e9c4dd748760dd593dc5692afca9f8da007c98696ef656c77199f2 ghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm 4dbe5f09fd59e1fe72d29be01073a0339a85b348a60446c4c927109314b08ef3 ghostscript-x11-9.54.0-19.el9_6.x86_64.rpm 11459c4865ed30e8eb5c5e52b1ed47062999c382c20a21925adf705d76a7b153 libgs-9.54.0-19.el9_6.i686.rpm 6327f190cba5539a86d2fd19dfa88e0eaa26fcca4465fd62ea467a6981fe62ab libgs-9.54.0-19.el9_6.x86_64.rpm ee8079fc47bc470aaf92d7880170539fedbb5a3e7c1d027128836c1599c441fb RLSA-2025:7937 Important: compat-openssl11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for compat-openssl11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSSL toolkit provides support for secure communications between machines. This version of OpenSSL package contains only the libraries from the 1.1.1 version and is provided for compatibility with previous releases. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm 3392695869abf2bea47b8239c00697a11bbf9d00fc0a852e88ac4a928c0f6f91 compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm 2305692961df47a4a61a3b76c3af8ac980fe005ff7a80b3a72c4ce95aa835b82 RLSA-2025:8136 Important: python-tornado security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-tornado-6.4.2-2.el9_6.2.x86_64.rpm 33c96a6cec2bee69cf1ea7e8cf9d89ed88096de573cf1374d6f4c37a2c731674 RLSA-2025:8183 Important: gstreamer1-plugins-bad-free security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm e8e6bbc3538f5dfa1a9d5329f400fde552ef408422fa488dba87e70d6d5571ec gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm 16556eb3ee74fa01173d74c60b2a00918d1f387ca38afd3762e4fff2e79b7fca gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpm 75ae2e8341bf60c49e70dce636a8d3d585fef98938ad753b171f93ea95d45e80 gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpm f417d761bee31270b39be6952a96a92da02a979dbedda06d7f449334ea7e4189 RLSA-2025:9118 Important: libvpx security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libvpx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double-free in libvpx encoder (CVE-2025-5283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libvpx-1.9.0-9.el9_6.i686.rpm 03018357da366c09d97dd32b0b38b5f87e1a982cf17f7ba7b5b6ecba62b11fa3 libvpx-1.9.0-9.el9_6.x86_64.rpm 39b33df758653f9161c702d7aa5917b3ea20ba5349639033fbeadc0d669f97f0 RLSA-2025:9327 Important: libblockdev security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID. Security Fix(es): * libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libblockdev-2.28-14.el9_6.i686.rpm 009de7846aee550fc1537daf45717a2e99ddb456d5b9b053d2b1f249766ddf2d libblockdev-2.28-14.el9_6.x86_64.rpm d3de1a92652b2512958b9c5420e9b07bc190e8d1305d3e4584291ef045d7eb87 libblockdev-crypto-2.28-14.el9_6.i686.rpm 5191e2575a94b2c7e1f6e47da5a7818eb22a9aa7d8e45e4dd0d0c39e6a72ef64 libblockdev-crypto-2.28-14.el9_6.x86_64.rpm 1ac8a8ac8dfce7a709f7c8147461700c73370dc0681aa904bce6f765096bfd58 libblockdev-dm-2.28-14.el9_6.i686.rpm 0e1fd8581a8ebb616c3d1438e5e8b1b24ab8b9e82213230308432f1fe1a8754f libblockdev-dm-2.28-14.el9_6.x86_64.rpm 97b3c2a56da4651309b1e10fc66674e187690df18f4259a7a6be5c16b2373b14 libblockdev-fs-2.28-14.el9_6.i686.rpm fefc41337d46cde3e84ce5591888bf0a1f78a7ee1120f64ce478f374ae54b320 libblockdev-fs-2.28-14.el9_6.x86_64.rpm 0cb5962dcc3dfc5b5ec6fa4ed9d432a6110110ee23c6e8a33e3d690bb57ed961 libblockdev-kbd-2.28-14.el9_6.i686.rpm 49b8aef93c15b520eee92a8d3334b5650533889e7f7421c0cc1d1abb8d3383d7 libblockdev-kbd-2.28-14.el9_6.x86_64.rpm 7d86c3ed397e70baa7ce1c14df9819a4c9c2a295cb8eaeb46a98786177ad5582 libblockdev-loop-2.28-14.el9_6.i686.rpm c696614fd2c188141adaf0a192445ce5660a3fc6284a98c02fecec7c36e9e4b6 libblockdev-loop-2.28-14.el9_6.x86_64.rpm bc91317b817601a520ab558163a983e537b7b5cc0186eba246deaa8dd344c7ba libblockdev-lvm-2.28-14.el9_6.i686.rpm 8f3f22e461d92efd519c305a3a56f7204d97e120f1c2812cf9f5bc8a087ed0e4 libblockdev-lvm-2.28-14.el9_6.x86_64.rpm 2e66b996df5d66bfafc6b1f5e5183f439ad706242e9bd1fa7165286dc471feef libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm f1786f9a278a973704e42d3486c703c5d4829250fed3d94bb5eeef76ef343c72 libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpm 3aaf095ad4f660658054074d7cde7600b2da686c7e94d734cf3b4295953f05eb libblockdev-mdraid-2.28-14.el9_6.i686.rpm f16639c802e1ba3d56aba1caae1b9c0cd9062c9948a8323f8190ce582ecb5655 libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm ec2c21fae9ac16d3abd622be149fd42cc13da2d77e61a6ef71c8e2e124a4a9dc libblockdev-mpath-2.28-14.el9_6.i686.rpm 753f7e845fcd1683750699e467efd0441e021f39a73830c5782e8fbd9773d32b libblockdev-mpath-2.28-14.el9_6.x86_64.rpm 64809864a3ab1b2c2f861137979d9b9c18cc0c5fe0535eb5fb59a1e7c49eec8c libblockdev-nvdimm-2.28-14.el9_6.i686.rpm 7fbcfbb60e612bda112a3428b5fd622630000ab79486e4af852c7dfdd7e06c57 libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm 73a216d11de7fce7badffd87ee7243ddb419510054620686011ca74ab16b98f0 libblockdev-nvme-2.28-14.el9_6.i686.rpm 6823e269785007d0d3df42a92ddd20b193583819a22d93892f00aeb5674185c3 libblockdev-nvme-2.28-14.el9_6.x86_64.rpm 9ae47ba2a3a268e058a7a6341906e37950c8ccbe4c81cd1ab4cad99aace600a3 libblockdev-part-2.28-14.el9_6.i686.rpm 8d26d1fd427a5e3090dc214c017f2f47af741e7d0e657bcf5951208dcaf0ffc7 libblockdev-part-2.28-14.el9_6.x86_64.rpm acbf9eb663bd90dbeb06b62aa2e01b434b80defa1732b891bb415e9c8155964f libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm bbb5278eec47221b5cecfb9017d27c2f365483d81eabb130f476474dd6d2c87b libblockdev-swap-2.28-14.el9_6.i686.rpm 5714bc5ae0a0481f243a494abf022569ba846095b65f3c12ae311d8adf18b1ab libblockdev-swap-2.28-14.el9_6.x86_64.rpm dacd203e283ee62577189f95233ce0517a1a929b4f6c84c77366a562ef6dd134 libblockdev-tools-2.28-14.el9_6.x86_64.rpm 13c85104a44349ebeb91039b0eb2ba749f638aca4369c593cf03edf12268b519 libblockdev-utils-2.28-14.el9_6.i686.rpm 645add8d698f969da4503a60c84978d470acbf343ffa14ad713086b8faa29a16 libblockdev-utils-2.28-14.el9_6.x86_64.rpm def83bfde9972f284bce04ca6b3e06f92444ee2191ecd8fd0e92bcf207646358 python3-blockdev-2.28-14.el9_6.x86_64.rpm e5e35052daefdebe60c3cc696392dd09582aadb9c9f6b10196213f0728326cad RLSA-2025:7428 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.10.0-1.el9_5.x86_64.rpm ea07422540a0301c39afe8fe4d6af23036edc4d000bef5351c548bf5063e5606 firefox-x11-128.10.0-1.el9_5.x86_64.rpm 92115e9f925ddf5610004578442fb5dd47a1bcb139a35df15a6db53ad42fe57c RLSA-2025:9462 Moderate: qt5-qtbase security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Security Fix(es): * qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtbase-5.15.9-11.el9_6.i686.rpm b5ef4a6d5577208e33abd248910818a0f4b95dce8041110e128272a5097ab427 qt5-qtbase-5.15.9-11.el9_6.x86_64.rpm b88498f0b37fa8d6ede110e781abca32306d9316f9cd0c889fab6fded88a52b9 qt5-qtbase-common-5.15.9-11.el9_6.noarch.rpm 20e7ce9e6bf4335c1ac3bb2d28f85643a18c6392cea5670c4fdf7c739e77d78c qt5-qtbase-devel-5.15.9-11.el9_6.i686.rpm 93b8498ea18fc261f1fddce20432b377320b4ed87b5841cc77881971b8788422 qt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpm 44f736a733f8f0bd607c9b694e7923041cedec55c60b4758155d4aecb5a3efe0 qt5-qtbase-examples-5.15.9-11.el9_6.i686.rpm 64d7b4a67aa0f0be14a148bbcecd0cbe4cf79959c94fcfa75c391d959743a464 qt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpm 6e87268e4edb70867e8de2e199bfe3334507950660c525936da97c9b20dbb636 qt5-qtbase-gui-5.15.9-11.el9_6.i686.rpm 556cd476866b5a84a8ce86c6a1817dec94758540c8046a1248df174f58f96029 qt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpm 8869d9e1c48449b9bd89f915d27af13989134124b651b002edca35d6604bc830 qt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpm c889bebd0e0b3c1a793e2eb0fd9026d9918ea01ab07bae5e45b9d0b9bc31cdf4 qt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpm 346105f68f78c3284a381c4102a712ad70f8d8800093c7d272523d7fc6b3f467 qt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpm 9aca7f26e7f9dd51f8e71fa7653a6155c856ab98cca44e0b9c544444e0744c58 qt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpm b3812af421ea49c97c152f5d0c10e2c1561ac420cb92cea0075a88617affe285 qt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpm b60aa44a3c268f32b2c1315b7cd3ae59e7d4da4d97a597500b9335b74cc6ea03 qt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpm 5e59459a3262cce083dc2e90e0a9ec201dcaf9c5747a3a9c2812d74c5ada9ef8 qt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpm a82088897e8f96db4c215e5f2e70901926536a1817ee4a22744edc7dc324d84d qt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpm f652f3e83d77166df729cb5da4b016cd1421de68147cc43d893fd9cbe1843ec2 RLSA-2025:11804 Moderate: perl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms perl-AutoLoader-5.74-481.1.el9_6.noarch.rpm 5fb4cf43908ab35d97b5a2323ca4710668ede5313302ee3fe5cce2b4b9c3b5f5 perl-5.32.1-481.1.el9_6.x86_64.rpm dbe5c42d3d60472ca9e6d658cf22b7783b21b789f3e33092edbfd48bf4a9e204 perl-Attribute-Handlers-1.01-481.1.el9_6.noarch.rpm b7fde8984ae43f5d340aa86750157e22308d619d9f556dbe1deadace6470c9f1 perl-AutoSplit-5.74-481.1.el9_6.noarch.rpm 953af599f6d042f1a2f529801cae15f0ac48e65fde620f413a873d09658fda54 perl-autouse-1.11-481.1.el9_6.noarch.rpm 35ea81f7805f9ce850f5114c64a61e05a67c49b39cb46db50f6d71b34809d1c3 perl-B-1.80-481.1.el9_6.x86_64.rpm 3bdb1db099cd202d219129d30ce9dc2adbeb23ede667cf0a0fd22f6349540f9e perl-base-2.27-481.1.el9_6.noarch.rpm 3d77858021530864b6e353f78a4aea3dd21c9ddf14ca32296a0dc165a9b9eb7c perl-Benchmark-1.23-481.1.el9_6.noarch.rpm 2f1bcfeddb2101af957644119d98d499b965b5a7f9cbe4627350ee06bcdbf5b2 perl-blib-1.07-481.1.el9_6.noarch.rpm e83ece24493b302bbebeb6167ec7cbaa732c601076ae286687ad1e4dc6531f71 perl-Class-Struct-0.66-481.1.el9_6.noarch.rpm d77c297f4c93074936a0a50fd932d7b43eb623401e5b73590db76c7f0ba469dd perl-Config-Extensions-0.03-481.1.el9_6.noarch.rpm c00e88ef4bcb1819c3267e0b48889568b4248a568f0a4f00fba13e35ee238e43 perl-DBM_Filter-0.06-481.1.el9_6.noarch.rpm 0f30d6cd9f7a63966961b324c9b02b13a5fe9725599c46ae7e6b8acdfb476518 perl-debugger-1.56-481.1.el9_6.noarch.rpm 55f6270b30436d1c2787c43f091cb9934d7c1be599c9916d6e0b2f1f57bdc445 perl-deprecate-0.04-481.1.el9_6.noarch.rpm ed5caaff377140bd8ca66b8a0ee2ab4e9e195a27a6b2ecc8fc7814e75fbba423 perl-devel-5.32.1-481.1.el9_6.i686.rpm ac5bfc81615d2c73ef559c65d51325223b58b6131a53e2bdbe77d2dd36f664c1 perl-devel-5.32.1-481.1.el9_6.x86_64.rpm 488a74c6b0869b80a29511467279f13cb9116ed26958844f8ef95f56c54f05bf perl-Devel-Peek-1.28-481.1.el9_6.x86_64.rpm 38245f369e90c7249e45bb0d00ca8e28fc362b075f4c02edc6591b3bbd561efd perl-Devel-SelfStubber-1.06-481.1.el9_6.noarch.rpm 66fbc9c049745a5cc9fa6ddbc70d4499fc7f424ae0dcdd0e2b01ef722facfcf8 perl-diagnostics-1.37-481.1.el9_6.noarch.rpm 909e293a65e028218ce54aecfbed86efeaec5d008b41fc906a4d0d3f89366613 perl-DirHandle-1.05-481.1.el9_6.noarch.rpm 3869f6612174c71856f32e1c7acad19184aa75b359f0c6c57ca1ab6b184b10b4 perl-doc-5.32.1-481.1.el9_6.noarch.rpm 93ae38dacdaf747ed61d1ea81d8d3e2c5bb01cef0a94219e9b3c1006d9cf8e97 perl-Dumpvalue-2.27-481.1.el9_6.noarch.rpm 3d1a975bb128bfe3ea089c80ff831554f13cbf2c898cfab4a4095409d7c15a6a perl-DynaLoader-1.47-481.1.el9_6.x86_64.rpm 118df30163cf818f27370cdfb8d80da8426421e60bbf6f69ab5163d03eefff9f perl-encoding-warnings-0.13-481.1.el9_6.noarch.rpm 0555675ea47f4283ec4ce861012ba73f549c27b8ce222c6501e2f56ae0817405 perl-English-1.11-481.1.el9_6.noarch.rpm bd3cd54237fc263d97bb722f2efd8101bd08ff12e8c1ece1cc06fd0e170082f1 perl-Errno-1.30-481.1.el9_6.x86_64.rpm ae4bef99c5797aa4286b39986ce30b05bcb07652b0f8b37d6c417e54ef8e37d7 perl-ExtUtils-Constant-0.25-481.1.el9_6.noarch.rpm cbfd263eaa66249015845d4cf18617bacb536369e0bcc2276aaf90ab08c703aa perl-ExtUtils-Embed-1.35-481.1.el9_6.noarch.rpm 37703f0b94bd27f8fa7fecf918ea5ac7166d7907ed2f622b2fee0e6d5045318e perl-ExtUtils-Miniperl-1.09-481.1.el9_6.noarch.rpm b39c73e2d061b964eae9db58c9f068f816848172fcf6c7986581ca7dcf2fd71e perl-Fcntl-1.13-481.1.el9_6.x86_64.rpm 600072000bbb8dada561923e0bf1a005d5c12608d08c2aefa95446781c0fe98f perl-fields-2.27-481.1.el9_6.noarch.rpm fbf59d38f50cda7c68b7a28e49aba551cc7ea9ddf9c4582da60bae5555b3c057 perl-File-Basename-2.85-481.1.el9_6.noarch.rpm 5245601ae54986863aff6291badddfa294e4272e14f763a070048e75930b0e81 perl-FileCache-1.10-481.1.el9_6.noarch.rpm 790e8737e928f3351222102cf9e55fa7b970cf1686ee9a7f3589f444c8df5987 perl-File-Compare-1.100.600-481.1.el9_6.noarch.rpm f182bfe4999e301a255154acbea11eb6da3b61935160373f7ccf7247c63ed6f6 perl-File-Copy-2.34-481.1.el9_6.noarch.rpm 17b5bc5daacc51aa48b8a5f925e7cbc087b13052766ce04372a5f8309182fc04 perl-File-DosGlob-1.12-481.1.el9_6.x86_64.rpm 45828558cf9ed81cade36f3de5ae1b2f47be788d261ee4c147a8e84e4a0dd8d4 perl-File-Find-1.37-481.1.el9_6.noarch.rpm 90c4d7147a3f43ffd5dd6d66cfbefde2e9577d59aaa8c6e7978f90e8ecbaef6a perl-FileHandle-2.03-481.1.el9_6.noarch.rpm 85cf4db1d292557e1829c170c35063253a970ff6d338f1546b7d4d5032231287 perl-File-stat-1.09-481.1.el9_6.noarch.rpm 937ec664f943b994dcd175feec2bc74e64969fc3481f64981a6c09b146e4b511 perl-filetest-1.03-481.1.el9_6.noarch.rpm 75cabd873c80a40fe6cee606d787c5ce7d4f26d489a9084ce625a247332b4a9a perl-FindBin-1.51-481.1.el9_6.noarch.rpm d8109df03aa1e956b44ab90f9bc2e9f83bfd7eecc8f897c58630dc3964e1e2e8 perl-GDBM_File-1.18-481.1.el9_6.x86_64.rpm 593653cb21b557d9ca08de88ceabd32c3e827ad96f2af1e7eaf80f41e92266bd perl-Getopt-Std-1.12-481.1.el9_6.noarch.rpm 42354346e696ea3de8178288d62d0ccab37d83d27558b6b5c820c57449d253e2 perl-Hash-Util-0.23-481.1.el9_6.x86_64.rpm b47158323da02ba86214f43c64bc4571a0efb0443ad43b0da3cfa00f417591ca perl-Hash-Util-FieldHash-1.20-481.1.el9_6.x86_64.rpm 20a6b3babeec3ab68233376f83693912a062610c5c854668a817254425313264 perl-I18N-Collate-1.02-481.1.el9_6.noarch.rpm 1e4dda25421f70b2ff63f199cf81b017b99587b0074c246717ee4922ec6e363a perl-I18N-Langinfo-0.19-481.1.el9_6.x86_64.rpm 13179abe1903adbae4ea786f59e64af869b2bbd014b58d6aba4090e7446ba866 perl-I18N-LangTags-0.44-481.1.el9_6.noarch.rpm 5ff0af572b0c259b1032adf375350559bb604c2bda4ad7fed50764ff5a61fac6 perl-if-0.60.800-481.1.el9_6.noarch.rpm 75a4bd8f511c758b3c7e664a6a17181240e9d9cf127fb58710108b881676dd37 perl-interpreter-5.32.1-481.1.el9_6.x86_64.rpm fda8d0616ed874871d9cd7a6083b08036837046c4abce155d911271b92d39f72 perl-IO-1.43-481.1.el9_6.x86_64.rpm 68682ce4f860ac680ee5c905aa9c1910b44c2530c4b88dfa3cb909ce05ca1b5d perl-IPC-Open3-1.21-481.1.el9_6.noarch.rpm db1136339fffd9825622420185994573788a88e1ffe25de3bc8fccc157e72c60 perl-less-0.03-481.1.el9_6.noarch.rpm fafea2cbec4d596b00c38521e504867d9a0fef30de6c99ea0728c0b3eb5a0990 perl-lib-0.65-481.1.el9_6.x86_64.rpm 4b5035f73c3cb31beab8c3dbe816009c8661cf98285d34e22a064232db766917 perl-libnetcfg-5.32.1-481.1.el9_6.noarch.rpm 5895c230b771067b3e81ed0d1ff0b11800a6fcc6e948947b554909069b2fedec perl-libs-5.32.1-481.1.el9_6.i686.rpm 8ad26d5b900611ff66a421e4a1f709cf3689a38846a4b11d1547bbabc70ce41a perl-libs-5.32.1-481.1.el9_6.x86_64.rpm e729814bf78fc5c3d6e8412a246a749884a9808288b980dc321cf5146cc24316 perl-locale-1.09-481.1.el9_6.noarch.rpm 2f4b6ece3eceeacea40cc9c61b365eea8778364454a88cefccff135a324d8b4f perl-Locale-Maketext-Simple-0.21-481.1.el9_6.noarch.rpm e3dd1c4c2f914cb3738956efff012440f644254c485ef0446c1176d00ac32142 perl-macros-5.32.1-481.1.el9_6.noarch.rpm 4a65ded6a8415ab2e50e78e0fe2ca3435d4eec1a22dfb4f4248b649f852a35f1 perl-Math-Complex-1.59-481.1.el9_6.noarch.rpm a3289302aaf28f07fde001315f00b4764e39e2b444ff35c8224ec43b7e8e7110 perl-Memoize-1.03-481.1.el9_6.noarch.rpm 0a8f795579863b0faa6b4a003e202c4273b38f469697a0f1a48027c5d3c07599 perl-meta-notation-5.32.1-481.1.el9_6.noarch.rpm 123a7a0feb72c97e6b135dcf6ca9f2bbcbc6d1abc643be6dc19cca8ddf431c25 perl-Module-Loaded-0.08-481.1.el9_6.noarch.rpm 2f8b9e76d5a4c5e9bdaff93c82766cd010106bad95f3ae6a3edb19be8ded9c8e perl-mro-1.23-481.1.el9_6.x86_64.rpm f4b0857ba6580e9c3d7a774a3ef08ba203994b4334de1c39d86467c4e298f44f perl-NDBM_File-1.15-481.1.el9_6.x86_64.rpm 0cb700df3a67a53fdca6feea4c60f097999d5231588f7701cdf9826383761429 perl-Net-1.02-481.1.el9_6.noarch.rpm 5e10b41626b2311cccc8c8923822fc7d7d5cf019f255ec1d0a03557ac1834b07 perl-NEXT-0.67-481.1.el9_6.noarch.rpm 994eb630a6440f4646775864a683bd7b8cca3806952566bcda5bd33fdab6ec7b perl-ODBM_File-1.16-481.1.el9_6.x86_64.rpm 925a8bd8837270659a7b5836318933ac026b01c8c10f1771d4d98f34bef01645 perl-Opcode-1.48-481.1.el9_6.x86_64.rpm bbacfbb4b41a0954d78b9ad36da4cb1213b8d381d6781f7ed13b698dd3cd9986 perl-open-1.12-481.1.el9_6.noarch.rpm 58079f3e4cb32e2fb12fef41da5df1600fd1af2c83ce0c3d9178313d81f86475 perl-overload-1.31-481.1.el9_6.noarch.rpm 6a88ad1df43e183e9b6abbc108a62915b02b397abd92dc43002f9798c6b46258 perl-overloading-0.02-481.1.el9_6.noarch.rpm e884589964f5d37c8562ea4093225a9b1c9b827337f22bba3c19ba4378b61a37 perl-ph-5.32.1-481.1.el9_6.x86_64.rpm 26a15775eaece62708faa6125c0d5c645f71cf44c2f76c74e7ef15db88a8abd4 perl-Pod-Functions-1.13-481.1.el9_6.noarch.rpm 370e93a292b159be74b63097f952ce7d7b8ffd85c5066ed00d384a0ae820e704 perl-Pod-Html-1.25-481.1.el9_6.noarch.rpm 3fc47766cc0bf4decb53be466a0a6785ad86732b956c434cafa1bd6e903f75ae perl-POSIX-1.94-481.1.el9_6.x86_64.rpm 78c011b363d5ffb5fece0737100c6e62c61121c4b8a2dbbbe933713043ce4158 perl-Safe-2.41-481.1.el9_6.noarch.rpm 8c600ab3f5bd460ee6fad5ea371e92efe5e68c8db46b22e0f3be88b0313d2622 perl-Search-Dict-1.07-481.1.el9_6.noarch.rpm 46ae56203051ddb047ef912678212d28ba15539aa693fecf49b155e2410570dc perl-SelectSaver-1.02-481.1.el9_6.noarch.rpm 681ca4222fb9e6000312e51d65413e246cc592f34f8c2349d1658955a70a0024 perl-SelfLoader-1.26-481.1.el9_6.noarch.rpm ba0809f70fa192cb3687c28af71f6987c79eabdc8fbe10883429b55169718e42 perl-sigtrap-1.09-481.1.el9_6.noarch.rpm ddbfb602a200f500b3beb4314831406b25c8134853f128708f09f7799f437079 perl-sort-2.04-481.1.el9_6.noarch.rpm 7cc8e33b4bcfa93c2b6126699d557177c6911e07ae8ac37238f3f04ed9f2030f perl-subs-1.03-481.1.el9_6.noarch.rpm 57065e051f3727449c7c72cfc34ef902235344261b72f5766e4852b4df2b00b1 perl-Symbol-1.08-481.1.el9_6.noarch.rpm 9dd7c6e3487dabc2868c7772313c96ecf8c5848d3bbbe031620cee3d4b5d4f1f perl-Sys-Hostname-1.23-481.1.el9_6.x86_64.rpm 927719e74294944613cb139f35c5df66458cd4089ba801341a5d43b1b89d4f1f perl-Term-Complete-1.403-481.1.el9_6.noarch.rpm b5e72141a07adc14449b365ee2389fdaf903eb8e28f136e47ff8a655d91d08ba perl-Term-ReadLine-1.17-481.1.el9_6.noarch.rpm 75053214c42026fe2ad3d37638ab1da651f1034de91c03c839a5bdcb279bb463 perl-Test-1.31-481.1.el9_6.noarch.rpm d42a398b2860e78a1dde19caf7d416de3a0118b42e445bdba41efa0df6736344 perl-Text-Abbrev-1.02-481.1.el9_6.noarch.rpm d325cf9ac0168298bf45e4e3c9fe0febae3da3541cb34896c8cfdfac86aa69d8 perl-Thread-3.05-481.1.el9_6.noarch.rpm eb4e772e67ed2b2664ed63c6e264d65e339a154580f9a8c88ce8e8e53a6b88e7 perl-Thread-Semaphore-2.13-481.1.el9_6.noarch.rpm 7849541cf0bebb4e167f508433d2775c8f9ab8301e6c469f64e1c3d84684f3ab perl-Tie-4.6-481.1.el9_6.noarch.rpm 6e53d2d9fed06c6387257c811767ff0b2ba815ae734158e77f78fcb6c7b9eb00 perl-Tie-File-1.06-481.1.el9_6.noarch.rpm 2a856e50c258e14fb6d95a20e3e60b60c4d2a38b5ee5f7bc2fea61f3855e0105 perl-Tie-Memoize-1.1-481.1.el9_6.noarch.rpm 6dc9bbcb3b9fa8bcae10a5533666ba71f629b7517ed4a64830dc3a6b94bea877 perl-Time-1.03-481.1.el9_6.noarch.rpm 08622730df9bba6a17ad403a71c6f58b9037fd028e354ed00b50486dba092638 perl-Time-Piece-1.3401-481.1.el9_6.x86_64.rpm 92bd06b709db6d57f5ca4ad53491910d86c1f3c293e88f9405547da7b9765a76 perl-Unicode-UCD-0.75-481.1.el9_6.noarch.rpm 2594bd55ebc2c570d50d7b9b5fe4a1465c9a5092bfc20b63d85bdfa7bb1ec11b perl-User-pwent-1.03-481.1.el9_6.noarch.rpm 28a65a35bc868fba022bc05883fbda22b711c76e77954b522aaf217715780a7c perl-utils-5.32.1-481.1.el9_6.noarch.rpm ed7a215c1aa2df0853fc4b0ee2e5b88d583dc60b0ab6d18a67b8224e16023541 perl-vars-1.05-481.1.el9_6.noarch.rpm 1745cc552a7a9cc9165e5d5cc3a4e551ba24d1345afba25af71486e0d611531c perl-vmsish-1.04-481.1.el9_6.noarch.rpm b2d782c3b5f388e2027e714c7a4f8fb349db1a3999e184117aecb0dddce92bc7 RLSA-2025:12083 Moderate: icu security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for icu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms icu-67.1-10.el9_6.x86_64.rpm bfd84f221c8db580aad975795c6b2459c807cc9ed3cdb6e5ef38d406a03c20ad libicu-devel-67.1-10.el9_6.i686.rpm 7184ea0e7c721b50137809b6096df6a1c00deb3ad334789dc99fea7257c024af libicu-devel-67.1-10.el9_6.x86_64.rpm 947757202db604346daaed541de7c63ce42a1e2035ab6741f65a837a8c20a791 RLSA-2025:12841 Moderate: gdk-pixbuf2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gdk-pixbuf2-2.42.6-6.el9_6.i686.rpm 69c13a62661f25cc6cd1abd9420f41a2acecf9fe1688669f8a939728e728d8ec gdk-pixbuf2-2.42.6-6.el9_6.x86_64.rpm 45a809fb972eab8cec05fa036649ce53d1f68b48b0107b7ac9595facf387e8ee gdk-pixbuf2-devel-2.42.6-6.el9_6.i686.rpm bac98eff4998c620ba1960d77bcb88417691ac3e9ecbb8ccc7539cd5ce444168 gdk-pixbuf2-devel-2.42.6-6.el9_6.x86_64.rpm d0de65f49b276d24517e38122474e5d646906e497c800cbd1b8210086889f7dc gdk-pixbuf2-modules-2.42.6-6.el9_6.i686.rpm 2d354aff28a900919e92a33c941666073c4400af13d368ee74cfae619a95280a gdk-pixbuf2-modules-2.42.6-6.el9_6.x86_64.rpm d2e4f4c553ac47fd16cd245eb764397086f0763db580b6f50b52ff75eb5b5940 RLSA-2025:19433 Moderate: xorg-x11-server update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Please update rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm 032b6fcd9be72b1863d2cbe41c6b823c4e23e36fb151044b0a303082cbf286d2 xorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm 6d75104dc2c5df65e216f822918a15b4f81aa08c4c7686d59b35cc9d3fb8662d xorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm c5ed61747dbc0f8706f57c57090160f09a403d66be48ebef43c5b0b10af08792 xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm 5b1d663e9d707d539cf8405c95562d69fbebba9daca4c5aa9ab7fd2e116a61a5 xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm 4c7d67a2fe2927ba1f2ae4ec5b0b06752726838d2199e298f95db37ac58284da xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm 283ebe5c8fe2246776e83fb0b54ea4483ba44a511d325bac0f554e4b6951e357 RLSA-2025:7435 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: User Interface (UI) Misrepresentation of attachment URL (CVE-2025-3523) * thunderbird: Information Disclosure of /tmp directory listing (CVE-2025-2830) * thunderbird: Leak of hashed Window credentials via crafted attachment URL (CVE-2025-3522) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.10.0-1.el9_5.x86_64.rpm 3c345da09047edaf7e2c5611514829eea3374e7fd4a34db1429bd9dd87c555d8 RLSA-2025:19623 Moderate: xorg-x11-server-Xwayland update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Please update rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm dfbfc44c6e706b581fd881556eb63f10795d250c7515b6a1f2c378ba98b71a75 RLSA-2025:19911 Moderate: qt5-qt3d security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt 3D provides functionality for near-realtime simulation systems with support for 2D and 3D rendering in both Qt C++ and Qt Quick applications). Security Fix(es): * assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-5.15.9-2.el9_7.1.i686.rpm 240a5ab0de8252e90c888ed70eab240b8d49222dd725ad376e4fdd30960c9f48 qt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm a13ddf6f33d82129a0bb2c935db5295fc72b3f0c099f94f2fe3501e534fc14bf qt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm 195e8222a120d08952db77655129005fc0d8090a7e4bf7427a8232e99b5de44d qt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm 41d6eff74766201a535c168ae3e98c1156d33faef0f7dbe64744df8940d7ca7e qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm 8ab62dfb231a94678438846f7c9e54affbcfa46ea8efe3d2a474435c386c5442 RLSA-2025:20838 Moderate: zziplib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for zziplib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zziplib-0.13.71-12.el9.i686.rpm b4cf54712c113b5a1f29d2d0e4b8b75193844ca7fe2fca66b9cc4d2fc7135024 zziplib-0.13.71-12.el9.x86_64.rpm 42742c43c45cad4d1f94521153d57f3af9e59ceca9bb2d556dce761f287d32be zziplib-utils-0.13.71-12.el9.x86_64.rpm 8c51022bc245ac593772b35200a747276e7ddd7540c541bb759d98edcc77d52a RLSA-2025:20922 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43272) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43342) * webkitgtk: A website may be able to access sensor information without user consent (CVE-2025-43356) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43368) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43343) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.50.1-1.el9_7.i686.rpm 36a6b11e0a9ec5c30e5a2b81b2f10c156591374586487054753f74abd9946b94 webkit2gtk3-2.50.1-1.el9_7.x86_64.rpm f9de574ef1d490355dd4f72b6814bbd6631c10dec61c06e1e22e70a0e704b2d8 webkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm fab75570ebe6b342618143a7cc4decffde602bb43319d7d09e772d835fce209c webkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm d9f20d37974dda06e4fc0734ee4f488eadc3ac1ca7f574f63fcab6a455359493 webkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm 29fb2bc8b713bb0b6733af2fe1e4797afbb5c9adba969338926d317d0fb7682f webkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm ba73bb0efc5112031f91f3dccf8aca507730b558c3abe5ed15deec98e718ce04 webkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm 83b055353f5f6d65c2b8087ad052fb7591f30a34c8caf88902ccd3c930630af0 webkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm ebbe190cece07ffc0db7d5bf4bdec434a6789ccc63dccf7204ccfd0e6a886a7d RLSA-2025:20926 Important: redis security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.20-2.el9_7.x86_64.rpm b6af6f27648781354a312ddb70936360851e405df17d609acb5f57e10960fce9 redis-devel-6.2.20-2.el9_7.i686.rpm 43b3ff74db78d8371d778f39601c1775ba6feeb4a65665d4e051e22bc6dd9eb0 redis-devel-6.2.20-2.el9_7.x86_64.rpm 6c0a5c6e99329c8dd6eb91e3abf971251cc1e074e2adee807ceda7b81fdcfa60 redis-doc-6.2.20-2.el9_7.noarch.rpm 694b0aa1e28a8e3ec5eb3c52b274a44bf29874d15309f2bb37cef0a7ef37452e RLSA-2025:20935 Important: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-22.el9_7.1.x86_64.rpm ad76a332096983ed9dd856cf3224ab0b536fedffcc0b1ef76531b0cb98b39522 RLSA-2025:20928 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-22.el9_7.1.x86_64.rpm 1db32f836daffaa1b95a5d253eec8970b2c8a655b5d3b992d2a776490fd9bb51 ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm 2a2e85256480c36a73e96d2f392e2c6f05a1ce1b0ddd07d3b15984afe54b7bd2 ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm 6e3725205332c6cc25700d3d4ae19c713121fb633beda3ccf46c26e265b115a5 ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm feabd1789490b9fdc39ceff63533fed60a6c3f02b067806cf9c559433a04ae18 ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpm 5656f152d3799e787720f22eeaee925d1259b5b856667c5c8dd039cf21cad90e ipa-common-4.12.2-22.el9_7.1.noarch.rpm ddafab49ba5ce4ee02962d6786aa3be19ee61d31a23d1c4c53d8b381d56b56b7 ipa-selinux-4.12.2-22.el9_7.1.noarch.rpm 2aa5fd136cddd78d253a4a7eee2d18cd01e3c95a343a5e3d6f1fc54506704562 ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm b3f7adb60c52dce91de0db6f8da2f25cd64ffd7e382b02bfc90959117db6ab27 ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm 069fda08df229ea44e28b205a11deb5db6a610c9e2cebdd4ddda565fde1ce46c ipa-server-4.12.2-22.el9_7.1.x86_64.rpm 4ba4ee79337e23804e7b9930fdf22e5a5025553e932982737ba80facdfdc9803 ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm d9cea55896eb3e7d67d4ff6a0cd3d07e4b8b497e03bae9ab53ffbe9a85722eb2 ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm ba89a99e04e56669dabe50ca5189a867d78df7d51f7c1fa366190185215cab34 ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm 1e48b7b7d5b09dedb90506b3a76b9e6fa5b8e58d321f60b92203fce4463fec1d ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm 02684646ff0f8fc3d6bba4e480124f2903367f00b9378549d627131c04a8b42b python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm cba5e54e856d1105a64413e52d3acc30901e0b016be703e9ce9d95d2a22fb307 python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm e184ca07ccd37590cbc9a091acfcd96aa4e946a429fd5fd7faaf06553aab577b python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm 611a8606169acefe2cf641d899d7c6a2708ea0fed618a7ca9411711d0fe0b8c4 RLEA-2022:8164 ruby:3.1 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm 3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6 rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm 31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm 7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm 8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656 RLEA-2022:8224 php:8.1 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm 685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71 php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5 php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396 php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1 RLSA-2025:3617 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: dds buffer overflow RCE (CVE-2023-44441) * gimp: PSD buffer overflow RCE (CVE-2023-44442) * gimp: psp integer overflow RCE (CVE-2023-44443) * gimp: psp off-by-one RCE (CVE-2023-44444) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-libs-2.99.8-4.el9_6.x86_64.rpm 0048ba8e7864961c3a88a296acafc9844854e9ce8d1b79700f99423dd0813964 gimp-libs-2.99.8-4.el9_6.i686.rpm ba8b56877f3843a76746a5c75beb59b44d759331f9aa79a654323a05a091b81a gimp-2.99.8-4.el9_6.x86_64.rpm e60d5a3d2bf267eeac8e126983400d89c70c6682d292ac764ddae73ee133582f RLSA-2025:20963 Moderate: qt5-qt3d security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt 3D provides functionality for near-realtime simulation systems with support for 2D and 3D rendering in both Qt C++ and Qt Quick applications). Security Fix(es): * assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-5.15.9-2.el9_7.1.i686.rpm 240a5ab0de8252e90c888ed70eab240b8d49222dd725ad376e4fdd30960c9f48 qt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm a13ddf6f33d82129a0bb2c935db5295fc72b3f0c099f94f2fe3501e534fc14bf qt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm 195e8222a120d08952db77655129005fc0d8090a7e4bf7427a8232e99b5de44d qt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpm 41d6eff74766201a535c168ae3e98c1156d33faef0f7dbe64744df8940d7ca7e qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm 8ab62dfb231a94678438846f7c9e54affbcfa46ea8efe3d2a474435c386c5442 RLSA-2025:20959 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-12.el9_7.1.i686.rpm 79da9ee547a04cf327716b082cc2f5175739b20435d787b61f706702bafe9964 libsoup-2.72.0-12.el9_7.1.x86_64.rpm 9683fbd7fca1c432090f17ce546e25fc9c219f4dd3363f6bba0dccff3f0fd125 libsoup-devel-2.72.0-12.el9_7.1.i686.rpm b05468d0cca7b0df9975af92f4691f05a59cc66b85fb6034af6439cc23c70398 libsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm 1f69dd1023f773111319b8585b9db955ac36470185bed0be4019820959f0d95f RLSA-2025:20957 Important: runc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * runc: container escape via 'masked path' abuse due to mount race conditions (CVE-2025-31133) * runc: container escape with malicious config due to /dev/console mount and related races (CVE-2025-52565) * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms runc-1.3.0-4.el9_7.x86_64.rpm 0dae21eadd2ffe4ddec3f1a36138c496656954786eab22b99bbab4e537f3b88b RLSA-2025:20958 Important: tigervnc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229) * xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230) * xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.15.0-6.el9_7.x86_64.rpm 6bcda1b445c5283610368a9319cf6944a6e6f196400881a0265fcd41b3a00baf tigervnc-icons-1.15.0-6.el9_7.noarch.rpm c5e8a131841af3b7dc3e2207fb06b67c5390881dbfae09b6d8c9a3864d90cde0 tigervnc-license-1.15.0-6.el9_7.noarch.rpm 817b211165e97f4fa07e4dd7347b429b1d6f369408c26fff04437a6673c3a129 tigervnc-selinux-1.15.0-6.el9_7.noarch.rpm 99d93f152eb19b73fcf0d530d1b33e018de778d30f5850f724df46e058783bf0 tigervnc-server-1.15.0-6.el9_7.x86_64.rpm 2094caf4cde76674578e6bfd0accdb9cbbc539b652ca3a704cf8f8b16fda3eb0 tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpm f2d160035b17a5a9a71cead3c2268107c0c9d147ad2142174898d62f726d168c tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm 295bf4f3c5889b1ca8abc549cd270106a9a05b2eacab4adc651da8194b38e5af RLSA-2025:20960 Moderate: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229) * xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230) * xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm dfbfc44c6e706b581fd881556eb63f10795d250c7515b6a1f2c378ba98b71a75 RLSA-2025:20961 Moderate: xorg-x11-server security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229) * xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230) * xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm 032b6fcd9be72b1863d2cbe41c6b823c4e23e36fb151044b0a303082cbf286d2 xorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm 6d75104dc2c5df65e216f822918a15b4f81aa08c4c7686d59b35cc9d3fb8662d xorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm c5ed61747dbc0f8706f57c57090160f09a403d66be48ebef43c5b0b10af08792 xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm 5b1d663e9d707d539cf8405c95562d69fbebba9daca4c5aa9ab7fd2e116a61a5 xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm 4c7d67a2fe2927ba1f2ae4ec5b0b06752726838d2199e298f95db37ac58284da xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm 283ebe5c8fe2246776e83fb0b54ea4483ba44a511d325bac0f554e4b6951e357 RLSA-2024:0387 Moderate: php:8.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: 1-byte array overrun in common path resolve code (CVE-2023-0568) * php: DoS vulnerability when parsing multipart request body (CVE-2023-0662) * php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (CVE-2023-3247) * php: XML loading external entity without being enabled (CVE-2023-3823) * php: phar Buffer mismanagement (CVE-2023-3824) * php: Password_verify() always return true with some hash (CVE-2023-0567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm 685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71 php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5 php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396 php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1 RLSA-2024:0675 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: dds buffer overflow RCE (CVE-2023-44441) * gimp: PSD buffer overflow RCE (CVE-2023-44442) * gimp: psp integer overflow RCE (CVE-2023-44443) * gimp: psp off-by-one RCE (CVE-2023-44444) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-2.99.8-4.el9_6.x86_64.rpm e60d5a3d2bf267eeac8e126983400d89c70c6682d292ac764ddae73ee133582f gimp-libs-2.99.8-4.el9_6.i686.rpm ba8b56877f3843a76746a5c75beb59b44d759331f9aa79a654323a05a091b81a gimp-libs-2.99.8-4.el9_6.x86_64.rpm 0048ba8e7864961c3a88a296acafc9844854e9ce8d1b79700f99423dd0813964 RLSA-2025:21111 Important: bind9.18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind9.18-9.18.29-5.el9_7.2.x86_64.rpm df0e6e1a29e5e4021640b28d66ad2454bcafb711681f11a7a3cb02252dcf521a bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpm f01a4566ccc6bda8a771fa03abad15b21d07b217e5ef617368af1b3d60a7d611 bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpm e7acc53688529f32c67562865b10e5614710e261869376ed4dd5db4523fa48bc bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm ea8d180a074fb4460729278f7d2ce472ac7daecabae574584826118bce7150aa bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpm 93ee0d5dca5ba0f638fb12309202410f9a7dd50e816bd498088d04bfe90ac86f RLSA-2025:21110 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-34.el9_7.1.x86_64.rpm d26b9560a3f7c7265ccc3846c3d01ebb609b4c3937449f3eb6a1c79ada5b485a bind-chroot-9.16.23-34.el9_7.1.x86_64.rpm a40bda7e49266813126a8e7cf2fbf15470cd628d82fcdf58957771edb6f695d6 bind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm 3e8b80afbada5181e2872a0618b1561eb48d933507bdcdf358e8f02bd9a6a5d4 bind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm 4ecbc7068727e9d7ceb601590ee379481a7fc4cf03f92b8428934a4539548cfc bind-libs-9.16.23-34.el9_7.1.x86_64.rpm 3db01de3a089deae4596560cb01b58d4bf2886f53ec3f21a9030e1fc3c62a11c bind-license-9.16.23-34.el9_7.1.noarch.rpm 3ae6c9f247d7469d329638368fbab16ff8cb81c5393b8802d2ddaecdd36066b9 bind-utils-9.16.23-34.el9_7.1.x86_64.rpm 31afb33a303ffad1bd52d78f36641e3df1056d75c69c4854d888264f0faf8aec python3-bind-9.16.23-34.el9_7.1.noarch.rpm 3831dac464c7624f665f259652b3469d81056ab8fc5415ea039147963bb98b50 RLSA-2025:21139 Important: python-kdcproxy security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-kdcproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088) * python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-kdcproxy-1.0.0-9.el9_7.noarch.rpm ac33ca75c542ab1c6d4416011757a0ca4e98a423799c9860dc6d08ce1e0fcf52 RLSA-2025:21280 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.5.0-1.el9_7.x86_64.rpm 65235237a788b6472e62c2227a9b64ed9e9c83a04384df4e40ebc120a00d6143 firefox-x11-140.5.0-1.el9_7.x86_64.rpm d27deb19f6e8cc100abf0d19f2c54b8917361d2a0e197e7c8bc18994e81eede9 RLSA-2025:21462 Critical: lasso security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for lasso. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lasso packages provide the Lasso library that implements the Liberty Alliance Single Sign-On standards, including the SAML and SAML2 specifications. It allows handling of the whole life-cycle of SAML-based federations and provides bindings for multiple languages. Security Fix(es): * lasso: Type confusion in Entr'ouvert Lasso (CVE-2025-47151) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms lasso-2.7.0-11.el9_7.3.i686.rpm d76ae2c0540b9fc9f68c17d409316c83ec09642f3ea4161bfb8697e18ba08188 lasso-2.7.0-11.el9_7.3.x86_64.rpm 4e62e80a7601caa723cdd4e579b9c94c5d599685d978abf1126e9c8daf4c10bc python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm d2edacfdc49babd84ff5487660a4896230351b86eb6526e2d24cc8a50c02c1ee RLSA-2024:1576 Moderate: ruby:3.1 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.1). (Rocky Linux-29052) Security Fix(es): * ruby/cgi-gem: HTTP response splitting in CGI (CVE-2021-33621) * ruby: ReDoS vulnerability in URI (CVE-2023-28755) * ruby: ReDoS vulnerability - upstream's incomplete fix for CVE-2023-28755 (CVE-2023-36617) * ruby: ReDoS vulnerability in Time (CVE-2023-28756) Bug Fix(es): * ruby/rubygem-irb: IRB has hard dependency on rubygem-rdoc (Rocky Linux-29048) * ruby: Ruby cannot read private key in FIPS mode on Rocky Linux 9 (Rocky Linux-12437) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm 3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6 rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm 31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm 7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm 8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656 RLSA-2025:21693 Important: haproxy security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Security Fix(es): * haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms haproxy-2.8.14-1.el9_7.1.x86_64.rpm e94db3e49502e00f5d5664fdc06539ffdab72b381bfb5716c2b71d3b0371e75f RLSA-2025:21702 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.6.0-7.el9_7.x86_64.rpm d62bca2f3e3d39c26a90d837e64b319014a62183884c1d4a41ed4467729d21d9 podman-docker-5.6.0-7.el9_7.noarch.rpm 36045178688a10b69f05a6203b1e0e41849182bbd46adca0140a1ec29ac2f530 podman-plugins-5.6.0-7.el9_7.x86_64.rpm 63259144ff5b613232a815615fcddbf786ee548e6ceb1b3f5a5f02f7f574de9e podman-remote-5.6.0-7.el9_7.x86_64.rpm fae418dffc70ae49a6dea85436e5f9d16780235723c51606fa224bb7177fb75e podman-tests-5.6.0-7.el9_7.x86_64.rpm c1c7bfcb4f7db16d16a8f2eac2889b986f285fa79f3b4c06da62f5d3afa41f8e RLSA-2025:21815 Moderate: delve and golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang, delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Go Programming Language. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.25.2-1.el9_7.x86_64.rpm 4c5b1c0821fac8319934d81d50eb9d5af849fb0d6098454debe5582575f3e145 golang-1.25.3-1.el9_7.x86_64.rpm cbd73d0f59f59f7f4a0d3c9e6ce178bbdeda20d6b5d3f08b13ac514c233fcf61 golang-bin-1.25.3-1.el9_7.x86_64.rpm a6512b2679b308db1b411e077b533393c6ed908a4e2c502531ffe8d83e52d921 golang-docs-1.25.3-1.el9_7.noarch.rpm ee2670b960aa4110099084e07e47daeee27942db9c8aa98687e566190f6c84f5 golang-misc-1.25.3-1.el9_7.noarch.rpm fffb71e9fa898a10b37c4035e9302e828939319e5fb3002ae71eeda0c751338e golang-race-1.25.3-1.el9_7.x86_64.rpm 1d4ff79b6aa8587f22dc619b32b77b339179c0c7fc695214db2f4c72c518839b golang-src-1.25.3-1.el9_7.noarch.rpm 1ff839bb6ac59e690a1659e0e5da16417b92c7d7afd8ff38e8aa58aad42fc829 golang-tests-1.25.3-1.el9_7.noarch.rpm 61f11419d913aaf9c5e01b197511529d95ecc899464ddb936b960e5b20c1c5d0 go-toolset-1.25.3-1.el9_7.x86_64.rpm de9d9f3de31302b3854a218337ad0d8b1074ff55b82ac110a7459236791b998b RLSA-2025:3773 Important: delve and golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Go Programming Language. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.24.1-2.el9_6.x86_64.rpm 0546dcd174478d65d0e8534b1c557e6ff85395a0d3049684f1fe487be4efd4bb RLEA-2024:2244 new module: php:8.2 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm 323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm 48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1 php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4 php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5 php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.2.2-2.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8efbd8cea37b667dcafbfdfb0de2bf8d1150dabd06bf52e31719ef7af1ee6071 php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22 RLEA-2024:2343 ruby:3.3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm 67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0 rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0 rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b RLSA-2024:3668 Moderate: ruby:3.1 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.1). (Rocky Linux-35449) Security Fix(es): * ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280) * ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281) * ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm 3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6 rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm 31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm 7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm 8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656 RLSA-2024:3671 Moderate: ruby:3.3 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.3). (Rocky Linux-37697) Security Fix(es): * ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280) * ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281) * ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm 67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0 rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0 rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b RLSA-2024:6785 Moderate: ruby:3.3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rexml: DoS vulnerability in REXML (CVE-2024-39908) * rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> (CVE-2024-41123) * rexml: DoS vulnerability in REXML (CVE-2024-41946) * rexml: DoS vulnerability in REXML (CVE-2024-43398) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm 67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0 rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0 rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b RLBA-2024:9280 nginx:1.24 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx, module.nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm e3c6944ba95608d0adf4c12369be5128909b1dc25e47ca57443882edea471fe3 nginx-all-modules-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm 7e770d61827c913560677583f650d68f42c7565d07dbe30e5d5b4b778239021f nginx-core-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 1f18fa1a8b2b6e7dd61c51162b0e6c1737b5ccee6cd3d8e09369d9a7a24c5845 nginx-filesystem-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm 2ef9100409099e11fa653239e39e09cd0f0b639bc981662937778bd3199f0aa8 nginx-mod-devel-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm f669fb809be1b27eb36c670129b59a71a976d403846e7c9261182146b1b6d529 nginx-mod-http-image-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 8b6c17bf2a3652cca077ac44e7bcaaa4a2305a3ed48c3b3c624334ace9afa536 nginx-mod-http-perl-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 829288e8ab13002261b43dcc443d7883cf28c28576e62219c7a35a7349852b65 nginx-mod-http-xslt-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm b3aad91c5b362e6f3ba21b8ce263d7142814800f25f14b8a56194a6bd414067f nginx-mod-mail-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 5760a6eda92f589b61319d0e9c1aaad0da99c9294fd06bc863a6738ae4d1f012 nginx-mod-stream-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm f4b8f06d1b55914ea8574f53a2f5d196b1db0b776bd505ab5b96515f28bbaebb RLBA-2024:9285 nginx:1.22 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx, module.nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 85b6cc6d05a2247a6602aecc2e624eefbfe958d9ba385cd80a2544bd17fa6329 nginx-all-modules-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm ce606d0f6a9420cd99082bf1b7b400e3f18ecd04b5f97fdd263aae4e1a9facfb nginx-core-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm c4484257458ecfc811dd7477b0c909f61623e2ad7d146597d42ffe6644f9cd73 nginx-filesystem-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm c6076d70f359d6879ea882f4613e945d80cf9227f1a74f50eb95e9e8a4b3d587 nginx-mod-devel-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 8ef0b240ff854892f21d8e29e435191a33cbb2880ad9e439b0933f45b8d51f1f nginx-mod-http-image-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 59cf9ed416db98f7e601b83e9d4fae11df1bc7a7f55de06155f64ceece3252ee nginx-mod-http-perl-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 2395878ef9c4b6a0b0fd132216eb859512a7b57db294f6e33286575ff363ffc3 nginx-mod-http-xslt-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm ea838ea4f9911689b67b8f28a8239fe88d6657268887b55438662a97cd06eccf nginx-mod-mail-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm c8f2ce25ef92ebc00270a70954a3c3da58de1f44fe4936f88ee7f343d27db8f6 nginx-mod-stream-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm c5acdd66ad2e969ea49a378baeec87025f19fa748db31d2084b06b6162ebd7ab RLSA-2025:23919 Important: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082) * httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200) * httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_ldap-2.4.62-7.el9_7.3.x86_64.rpm 25a38309d8fc16024e9259a3b0b570bb31e9aac289aa6e1740c7bb536184ae16 mod_lua-2.4.62-7.el9_7.3.x86_64.rpm c203b72ea9e57006bc79b6e384f6584db931c9b60b8749146ddc054f91e3d7a4 mod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpm baded07b71378b0d5362c81c7cfaaf606e991bde9eb7082f5bf84e6ae1b5f818 httpd-2.4.62-7.el9_7.3.x86_64.rpm 343f3269a37e2aacfd7123b55e9c1f29945538e9b40972890152fbcf854d3c34 httpd-core-2.4.62-7.el9_7.3.x86_64.rpm 2759133ae53c193d2c8fd42fb27b61c507bfe4f86df0dc06a4374db2f317eb1b httpd-devel-2.4.62-7.el9_7.3.x86_64.rpm b33615b1465fa174fda5ecacfb1699334b98fafe8d363684dbadc67832982adc httpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm 66d6a53480913acc22959f85a8e91e722bc3bb3a17a3c0dab076db12f18ed10e httpd-manual-2.4.62-7.el9_7.3.noarch.rpm 2b3979c227cf7b5d9caafc262a9900b3e829ede0a71a8719d9a1caccb681ba26 httpd-tools-2.4.62-7.el9_7.3.x86_64.rpm 7e7e24fa7d231d009ab8960c71ee068658485818feb292796c272d59896c1205 mod_session-2.4.62-7.el9_7.3.x86_64.rpm a3974277da003fe10536d4d3847de52f59869cb297252fbd69d406e7c706a90f mod_ssl-2.4.62-7.el9_7.3.x86_64.rpm 0dd495755bf80f5d9a09fb404b68ba54ef0b91027d605bf6571d34d65dce3d45 RLSA-2024:10860 Important: ruby:3.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rubygem-pg, module.rubygem-mysql2, rubygem-mysql2, module.rubygem-pg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rexml: REXML ReDoS vulnerability (CVE-2024-49761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm 3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6 rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm 31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm 7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm 8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656 RLSA-2024:10949 Moderate: php:8.2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: host/secure cookie bypass due to partial CVE-2022-31629 fix (CVE-2024-2756) * php: password_verify can erroneously return true, opening ATO risk (CVE-2024-3096) * php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458) * php: Erroneous parsing of multipart form data (CVE-2024-8925) * php: cgi.force_redirect configuration is bypassable due to the environment variable collision (CVE-2024-8927) * php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm 323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm 48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1 php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4 php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5 php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.2.2-2.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8efbd8cea37b667dcafbfdfb0de2bf8d1150dabd06bf52e31719ef7af1ee6071 php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22 RLSA-2024:10950 Moderate: php:8.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3, php-pecl-rrd, module.php-pecl-rrd, module.php-pecl-zip, php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: host/secure cookie bypass due to partial CVE-2022-31629 fix (CVE-2024-2756) * php: password_verify can erroneously return true, opening ATO risk (CVE-2024-3096) * php: Filter bypass in filter_var (FILTER_VALIDATE_URL) (CVE-2024-5458) * php: Erroneous parsing of multipart form data (CVE-2024-8925) * php: cgi.force_redirect configuration is bypassable due to the environment variable collision (CVE-2024-8927) * php: PHP-FPM Log Manipulation Vulnerability (CVE-2024-9026) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm 685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71 php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5 php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396 php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1 RLSA-2025:0912 Moderate: mariadb:10.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.galera, galera, module.mariadb, mariadb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Security Fix(es): * mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024) (CVE-2024-21096) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__mariadb galera-26.4.20-1.module+el9.6.0+31841+9417776a.x86_64.rpm 7da292844fc5b67bfcfb52b392711168f4dd148500e8abe0232db0d1864ba8db mariadb-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm f61e7dffc815b9b1d50bf55e5c0ee7180641821a9cbbae4ac89862a1cb0bfef8 mariadb-backup-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm a626a1db0fa9504cd8f39c92be5c88c4ab6ce4d13e4455f2fe1aa0f1573d9563 mariadb-common-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm 87ae1526e3d151edc7b6b47c4f0d8d0b619ff60142172d0f42db4f8ffd3dbe6d mariadb-devel-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm 08e629193e3880a3526894585d18ec278702283ea8ac0b0849cd7272411c09f7 mariadb-embedded-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm 9be20c1f3c2dd52e8672b3e9a3dd3cb1dedfd4d356fd024072371662105012c9 mariadb-embedded-devel-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm e342372830a99b3e70c6980c881008caf158f3369339d65e5fbd7c837b57bd2f mariadb-errmsg-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm dfd41f8ec3057bbab94861a6305555aa7d9602016ea2aff66fc0f8d70faf2830 mariadb-gssapi-server-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm a24c7683163f6de6b1cf520cbafa2bafeb1359307200c0e019a494a313b8bced mariadb-oqgraph-engine-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm fade345133e0fe6be86b40daa3ecf61fbaa1260e2d349309b2e657a592763a78 mariadb-pam-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm c2d32d263621183db3d2294eaf9f690eb080960ac7d59e827834d7869e41fd34 mariadb-server-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm 6ca1eaf64439fb4dc168be2a78657fa68414e0744af476c0f13184d16d2ad782 mariadb-server-galera-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm 161099ff98df6130938b5e432a3c0fd53a96fc497d03e88564b1ad434255f055 mariadb-server-utils-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm c25d450f37911c85bce6076883a43ba8aa32fa12bd02529e471a9ef7d4ac2e8f mariadb-test-10.11.10-1.module+el9.6.0+31841+9417776a.x86_64.rpm f6f69f5068d880014fa384edd08a5860e90c6f646738e3f1c8c899ace29446a4 RLSA-2025:23034 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333) * firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329) * firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331) * firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.6.0-1.el9_7.x86_64.rpm aa5c23af40fea7b4545e451b50114020f04903b01da1d389f82b755f8149a441 firefox-x11-140.6.0-1.el9_7.x86_64.rpm 6ab719eaeafde2d143a560d8fadbcef53e4b27771d386a222fc27a6faa9fdc15 RLSA-2025:7444 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-5.el9_6.i686.rpm 46c03f42bb017257a45b8be91faf3d154b71b099235e73540a7b41c853745edf expat-devel-2.5.0-5.el9_6.x86_64.rpm be4c3fadf8cddee4bdb08507279a82d852e0095125a1058660a8736a695ad055 RLSA-2025:13428 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): The libxml2 library is a development toolbox providing the implementation of various XML standards. The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-12.el9_6.i686.rpm 7d448438b5e2e2324b5ccb5bbc2504b36a175e1ef2445206ad01ac9ee09f59d1 libxml2-devel-2.9.13-12.el9_6.x86_64.rpm 9d066fabb9c198f22271073bd7b53563e5c42f7717317170fd85c0fd6197f9da RLSA-2025:3261 Moderate: nginx:1.22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nginx, module.nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 85b6cc6d05a2247a6602aecc2e624eefbfe958d9ba385cd80a2544bd17fa6329 nginx-all-modules-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm ce606d0f6a9420cd99082bf1b7b400e3f18ecd04b5f97fdd263aae4e1a9facfb nginx-core-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm c4484257458ecfc811dd7477b0c909f61623e2ad7d146597d42ffe6644f9cd73 nginx-filesystem-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.noarch.rpm c6076d70f359d6879ea882f4613e945d80cf9227f1a74f50eb95e9e8a4b3d587 nginx-mod-devel-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 8ef0b240ff854892f21d8e29e435191a33cbb2880ad9e439b0933f45b8d51f1f nginx-mod-http-image-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 59cf9ed416db98f7e601b83e9d4fae11df1bc7a7f55de06155f64ceece3252ee nginx-mod-http-perl-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm 2395878ef9c4b6a0b0fd132216eb859512a7b57db294f6e33286575ff363ffc3 nginx-mod-http-xslt-filter-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm ea838ea4f9911689b67b8f28a8239fe88d6657268887b55438662a97cd06eccf nginx-mod-mail-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm c8f2ce25ef92ebc00270a70954a3c3da58de1f44fe4936f88ee7f343d27db8f6 nginx-mod-stream-1.22.1-8.module+el9.6.0+32001+2660e3dc.1.x86_64.rpm c5acdd66ad2e969ea49a378baeec87025f19fa748db31d2084b06b6162ebd7ab RLSA-2025:3262 Moderate: nginx:1.24 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nginx, module.nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm e3c6944ba95608d0adf4c12369be5128909b1dc25e47ca57443882edea471fe3 nginx-all-modules-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm 7e770d61827c913560677583f650d68f42c7565d07dbe30e5d5b4b778239021f nginx-core-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 1f18fa1a8b2b6e7dd61c51162b0e6c1737b5ccee6cd3d8e09369d9a7a24c5845 nginx-filesystem-1.24.0-4.module+el9.6.0+31999+10edc144.1.noarch.rpm 2ef9100409099e11fa653239e39e09cd0f0b639bc981662937778bd3199f0aa8 nginx-mod-devel-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm f669fb809be1b27eb36c670129b59a71a976d403846e7c9261182146b1b6d529 nginx-mod-http-image-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 8b6c17bf2a3652cca077ac44e7bcaaa4a2305a3ed48c3b3c624334ace9afa536 nginx-mod-http-perl-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 829288e8ab13002261b43dcc443d7883cf28c28576e62219c7a35a7349852b65 nginx-mod-http-xslt-filter-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm b3aad91c5b362e6f3ba21b8ce263d7142814800f25f14b8a56194a6bd414067f nginx-mod-mail-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm 5760a6eda92f589b61319d0e9c1aaad0da99c9294fd06bc863a6738ae4d1f012 nginx-mod-stream-1.24.0-4.module+el9.6.0+31999+10edc144.1.x86_64.rpm f4b8f06d1b55914ea8574f53a2f5d196b1db0b776bd505ab5b96515f28bbaebb RLSA-2025:3833 Important: gvisor-tap-vsock security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.8.5-1.el9_6.x86_64.rpm b9dee5d9cf2be3289905256a1074d29277538e429f3d1886e20e9f8423146d26 RLSA-2025:4263 Moderate: php:8.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php, module.php-pecl-xdebug3, php-pecl-rrd, php, module.php-pecl-zip, php-pecl-apcu, module.php-pecl-rrd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Leak partial content of the heap through heap buffer over-read in mysqlnd (CVE-2024-8929) * php: Single byte overread with convert.quoted-printable-decode filter (CVE-2024-11233) * php: Configuring a proxy in a stream context might allow for CRLF injection in URIs (CVE-2024-11234) * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.noarch.rpm 685ec0d8eb03ce96b71260ee315be96476abbb22b1e6fc067ff49febdb074b71 php-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 6f953bf8a95949c5185a23905e837b7d87205ceaccea624a2e2d448803278ab0 php-bcmath-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm b95b4eb6afef3d5eee6fbae9ac81c9fe62ecb5735ea2508d328580f540826971 php-cli-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 42bce85c3c7f28108d42a51a024c1158c039de6e8ba1953861c6713e33c237df php-common-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 4a1550617cabc9b0c286aeb81e854bcbb90f87af2ba87d6e68b33b2c39a74833 php-dba-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 94ff4e555fd7238dd217dcc0b1a92d18c82b1fd103ade2355ffc01bd68b0dfd3 php-dbg-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm e16b82276eba47f10ba66381db0196d19945a7f6cbea6ecbd1a3de091ce33443 php-devel-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 82688ffa7b10d5680df6511561dbc655354357931ce08455f6e0575aebf45c8c php-embedded-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 00d78fa414a52ab3cd0be2bbdeff4fca8977fe8898640833fb9eb13326e2410f php-enchant-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 0be2c414dcf4c70bc3f1bc81b63f7cb77d230c55680005556c8b6b938b9f7a64 php-ffi-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm fda6ff4b55f9eb96575d5e80463e66b89f474cedf34e6f6bc824e4981c0f71b1 php-fpm-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 28df12efaff1b963f8c7a4cf910d913e628d66a1d5e4a1d13436628c0be5c9be php-gd-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm ee83566e04a31dfa513b8310a657f024275e75ee2926c442cc2844dc167b67cd php-gmp-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 762ded2c635e008df2c217fb5750c9a2603ee6d452caa8946234035223686546 php-intl-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm a6e98b4bc7993c619a24d1637381bf4f84c0e6ada451e62e14564ccc337bb5c8 php-ldap-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 0cec6e001d2c41e0c6a4671fa80d6f39d86cd98b8d21d9a2ed0958d80d2277b3 php-mbstring-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm ba230bde7256bf2d49922060c711d008d5f2214747777d5e93fcb03082521de5 php-mysqlnd-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 536bfdf6a2a8f809351518b46fd9a707c50f1b2b763c3916ad441be5c8113896 php-odbc-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9b38274b0e8a7e1cc4be1ff63421dd678607d718600a1cedfe23670a4159e816 php-opcache-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 3afa2bd00b74bfdb75b8e495eb5ce7e7936a2c412d3223a509f1b81ca3993a08 php-pdo-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm bae7b09d2fc6fadd5caff86c3c7d2b70dbc3a312fea9b0f4e6a2faf477f885ab php-pecl-apcu-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 92ee0eb48e135df9cc32dde4f09dd5f928d6a80990a2c9c0404c59e5a837dbd5 php-pecl-apcu-devel-5.1.21-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9674d0c7440c82af7e4c660622848b04775e53b3cc9e8d629670052d70f7cb4b php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.1.4-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 508163651f1b46b5379609df5617cd35a3c010b219eff38be558f7fe774d8396 php-pecl-zip-1.20.1-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 9bc32ba3778955b2bee3d08b20302aac7f527b76f7518df60e84d82a128c53f1 php-pgsql-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm bbf05f9b7ed03b83c0d661bfb3d627e8e707ee28e11a5c68ef77802c46d246e2 php-process-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 18a064a6dee4ba480c906671c4d0e3c3e9f933af71ca3aa3a47b036e29ec3349 php-snmp-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 92f84f62cd0aa35490fed3713f76822f04eac367bd22e184f3b533d1a825db62 php-soap-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 3b53ee05390906632d6557bdd83a5862db5bd9176e6c2cb750ad7e3dd014ec33 php-xml-8.1.32-1.module+el9.6.0+32040+1f1dedb8.x86_64.rpm 501c5c78256e1076b07f282e6fb6fb106c53639afd9b60fbc1e41ed4f84c20cc RLSA-2025:7109 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: URL parser allowed square brackets in domain names (CVE-2025-0938) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.11-2.el9.x86_64.rpm 6917a8243e308d4cf7ee03d13f2ed4edcfb4efe2ec58f3e306a53d16a598d297 python3.11-devel-3.11.11-2.el9.i686.rpm ea0446ff22ffa8271c49f96949474032cb50ffbc25935ced38a49dbc5a502f24 python3.11-devel-3.11.11-2.el9.x86_64.rpm ae12c19b0e99f6ab48d694b4f6ff78cb64aae0e5214cfaf775ad9bb413e8ee8e python3.11-libs-3.11.11-2.el9.i686.rpm 684c2dd72dc3717eab92a648507b7833279244ae3f365b60994f19526afce3ab python3.11-libs-3.11.11-2.el9.x86_64.rpm ae957346a9735f28f40cb1eae20521c101c48b4c5fc0274ad44507780f7e26ee python3.11-tkinter-3.11.11-2.el9.x86_64.rpm 45d8b889758b9fda833d16bc50b77a811be69a617a54b9b19c47ca72ba166b48 RLSA-2025:4488 Moderate: ruby:3.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.ruby, rubygem-pg, ruby, module.rubygem-pg, module.rubygem-mysql2, rubygem-mysql2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rexml: DoS vulnerability in REXML (CVE-2024-39908) * rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> (CVE-2024-41123) * rexml: DoS vulnerability in REXML (CVE-2024-41946) * rexml: DoS vulnerability in REXML (CVE-2024-43398) * CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220) * CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219) * uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby ruby-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm b805b6929ed7017d4d14c8e341e99ee1e2c4508ced03d9a742e9d0b5a83bb519 ruby-bundled-gems-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm 4497a8da496f16ff62d99e82184f9d1699181af3a160c6134a64cf70cdc191f1 ruby-default-gems-3.1.7-146.module+el9.6.0+31865+0893c253.noarch.rpm 71e4197a1b8208e496325db8c0fdbd6f5cdb3850e2f6766acd54b0287a09045f ruby-devel-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm 35c111c42b607cea6b3301589680c4b6f5c7b76c3d9b6ed71c31a74cf78c9969 ruby-doc-3.1.7-146.module+el9.6.0+31865+0893c253.noarch.rpm cb66ee7d9feb6dab1c2bf1c4dc35925f1141529bc9b602aca51448c4dd71bf1d rubygem-bigdecimal-3.1.1-146.module+el9.6.0+31865+0893c253.x86_64.rpm c1bd15b9d8b3235a524caa166f90ea024baeb7537a72b7a99920332bc810ab94 rubygem-bundler-2.3.27-146.module+el9.6.0+31865+0893c253.noarch.rpm 96cd44ea857359e725e8bdc2b399ff94de9539bd8be1c3071267afbc22c1a7d6 rubygem-io-console-0.5.11-146.module+el9.6.0+31865+0893c253.x86_64.rpm 678f2dfcb1916a2ef9a6abd1d1877265b9fbaaa0a56121dc22319add74dc3d85 rubygem-irb-1.4.1-146.module+el9.6.0+31865+0893c253.noarch.rpm 876c9e1be2eb80d34775c1862a51ee4fb408ba47bee53df5381631458da30140 rubygem-json-2.6.1-146.module+el9.6.0+31865+0893c253.x86_64.rpm 3c3b029590e1491be4deacf93076613c36ada9539f1c00a3aea004ed63a77f6a rubygem-minitest-5.15.0-146.module+el9.6.0+31865+0893c253.noarch.rpm 99eb8313f31ec5b5e32d79ec0866a017cf431336b3a147b9411d6b28ef929c37 rubygem-mysql2-0.5.4-1.module+el9.6.0+31865+0893c253.x86_64.rpm 3c1b1fd248784c23f27ead33df19f490f9c8217349f4954438672801dc9c8ae6 rubygem-mysql2-doc-0.5.4-1.module+el9.6.0+31865+0893c253.noarch.rpm 31ba4609e07c0b790ad055ceaad3a424fa55b7dbb46608aa284dca78de5b104c rubygem-pg-1.3.5-1.module+el9.6.0+31865+0893c253.x86_64.rpm 7196f0616e5cff0128f3fbe79121f4778fb1d1d939050d6cfdb15f6ffbdc115c rubygem-pg-doc-1.3.5-1.module+el9.6.0+31865+0893c253.noarch.rpm 8af8b52532bf42f6490096b9613b35f3dfbedcf28dc1c16dbe4fee028cc1a656 rubygem-power_assert-2.0.1-146.module+el9.6.0+31865+0893c253.noarch.rpm 8e64f6e1cdeb0b1c728ae200ecab5533a40e32b98bab153dcbe28f359c033d27 rubygem-psych-4.0.4-146.module+el9.6.0+31865+0893c253.x86_64.rpm ddc9402e1ae0be4aff639e22bb57860ee6b40f988a4b7e4e6cec1903517ca64b rubygem-rake-13.0.6-146.module+el9.6.0+31865+0893c253.noarch.rpm d442dd0b20b83e0214073445f49511d7143b67abd7416977f56466ff127c9d01 rubygem-rbs-2.7.0-146.module+el9.6.0+31865+0893c253.x86_64.rpm 37aa46959277e6c375a4597449bf99cc00d72e99354eba3e1f6fd0ea27f55b3c rubygem-rdoc-6.4.1.1-146.module+el9.6.0+31865+0893c253.noarch.rpm 29470e4f2bfde0eaa8f6c4d54e808280e12850b6d4709d0146c207fc575563a9 rubygem-rexml-3.3.9-146.module+el9.6.0+31865+0893c253.noarch.rpm 159b18a0d3e73723f9f150f6cb42cf51e64de610cfcfcba9e92e6cd47c9f3fb7 rubygem-rss-0.3.1-146.module+el9.6.0+31865+0893c253.noarch.rpm 33561ccb46b6d6beeef879c55275bdf4351f55f581ce66eeca899d4c3e18354f rubygems-3.3.27-146.module+el9.6.0+31865+0893c253.noarch.rpm fda7d8f388a0667e0836c7ef2f46d9c2b983d95a6db0ded25dc54a5ed01089c5 rubygems-devel-3.3.27-146.module+el9.6.0+31865+0893c253.noarch.rpm 7a52b1bd01a6902047f9f2d86d93bf0e6ed0923fc574018f6e33a498ee3cea64 rubygem-test-unit-3.5.3-146.module+el9.6.0+31865+0893c253.noarch.rpm 8a8de7378b6c3617a37d60b69c17c0842841ec243b197503565bd001c5e9ac83 rubygem-typeprof-0.21.3-146.module+el9.6.0+31865+0893c253.noarch.rpm 924c4230ba41917d704665483aec53db10770ffa6103bd25cfd593d82aef6588 ruby-libs-3.1.7-146.module+el9.6.0+31865+0893c253.x86_64.rpm 265abd88ad9b6a068120c5fe977b9a6a0d23e4866fb2c62ff4d4412dbe58bbbb RLSA-2025:4493 Moderate: ruby:3.3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.ruby, rubygem-pg, ruby, module.rubygem-pg, module.rubygem-mysql2, rubygem-mysql2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186) * CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219) * uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby ruby-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm 414f085f44d6967ccb721577b6f6359b024362e01ad703d2872f5274e7792e8a ruby-bundled-gems-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm 78b51a016b21b110656e3440dc0007db3b6d12ea16004b458ded0d8b289d011f ruby-default-gems-3.3.8-4.module+el9.6.0+31867+3a5bf654.noarch.rpm c628fb95780719833760fa0031537198f8da0b229dbf4621b23718e99968aa73 ruby-devel-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm 6b9840c7333231581512f8cc7fae6bccf9d7348ab4aae5723205dbf35fbaf82f ruby-doc-3.3.8-4.module+el9.6.0+31867+3a5bf654.noarch.rpm d093247793b0506e7204056ac9b88e82fcb8d4414b0f60922bccc99b6846affb rubygem-bigdecimal-3.1.5-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm 71356537b67cc9c20e321231147a86b68faffce9bc953a8392345378f0f6d9c9 rubygem-bundler-2.5.22-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 49384b57c0e4229850a381719f8b02483395dc79acc603f59cf21b22b2a54851 rubygem-io-console-0.7.1-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm a5411942b17011033320413aa6d843b1247a23b8969c75417c8442b36982f435 rubygem-irb-1.13.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm d4788f0efd260d551f1726630ff2be4f52d1c09e2d6d6ad9cd53fbc25b33859a rubygem-json-2.7.2-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm deff5756036cfaf991a70c57c476caa6fd9e44c8e5663d744d7a96fa9388adf6 rubygem-minitest-5.20.0-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 0665662c133b3c58487f25a3f1a3a24036f5eeb6aaec3a45a971069762a18ca6 rubygem-mysql2-0.5.5-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm 67780d57c575a684e7fe8890cdac60c35e133d2ca1088c8e9f0271b0fa8b0ee0 rubygem-mysql2-doc-0.5.5-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 3b623419f1eb9f3b7d2ec1a8ddcd71a1bca80975b9390e0c9469051dd182deab rubygem-pg-1.5.4-1.module+el9.6.0+31867+3a5bf654.x86_64.rpm df26e24961a5b4182558cb2e045d9c19f9fbc377232adb7e28d596c6f4c278c0 rubygem-pg-doc-1.5.4-1.module+el9.6.0+31867+3a5bf654.noarch.rpm 227be6b295db88f435424684ce1af5156daa6d4a3f45c3cfa7976f401e76f47b rubygem-power_assert-2.0.3-4.module+el9.6.0+31867+3a5bf654.noarch.rpm d2559d172fe2cdbfa0b207992dcb7a6c085edc05fe5b56899394ceee0067e70c rubygem-psych-5.1.2-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm 5c67b8ec8fbdb9a4334ff97417d6cb6668043885261e7934df34c69c767b382f rubygem-racc-1.7.3-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm d3638655bca019e1b59c6039a2f3a082d9a22476c7d2eaad560c1aadbb0e794b rubygem-rake-13.1.0-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 12ea038f0db64e8747fe007a6426c5a2fa24550b1377a7ec1167ee0977adfb5b rubygem-rbs-3.4.0-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm 1e97877341ebe1d69a95d2d016f980150cf1018734fb3d1f4ff74b3e5ac56bf0 rubygem-rdoc-6.6.3.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm c43397f99cbe4a0a371c7ebefb234b0a66d4bfab74ed95a7f17e079d3f023316 rubygem-rexml-3.3.9-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 8a79d9aeacd8ae90e43ddd6dc3cf102b9bcc0b007f97347ccb2f1d0fae143782 rubygem-rss-0.3.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 82f0b515276eb526780f096cbe520df86abfd588bebfca37a167222180b14c1b rubygems-3.5.22-4.module+el9.6.0+31867+3a5bf654.noarch.rpm db6e408960595c84f61919caf55241081f34aa8aa1dbc4ab7e42e3d7c0a64081 rubygems-devel-3.5.22-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 213b5eb92629cde83d677180f4d1fb32dd98b71e53a3fd2ee7007589bb965335 rubygem-test-unit-3.6.1-4.module+el9.6.0+31867+3a5bf654.noarch.rpm ea62f9d5779a678a0e0a3355de60891e7662ee8a7b4858aca59ad72e732fda17 rubygem-typeprof-0.21.9-4.module+el9.6.0+31867+3a5bf654.noarch.rpm 8789d1f24a3c047b3b97a05f639d857ac6a27796ed7c458f9e32761e8d64953a ruby-libs-3.3.8-4.module+el9.6.0+31867+3a5bf654.x86_64.rpm d66588a092989974ede0ccd563c6aca336776737a8e508af2dc13d5a829b36d9 RLSA-2025:7077 Moderate: libtasn1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS (CVE-2024-12133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtasn1-devel-4.16.0-9.el9.i686.rpm 71bb5295efbcb73d5170d6ebfcef2dc0154cbc25474f78b005b258b554222329 libtasn1-devel-4.16.0-9.el9.x86_64.rpm 6d7a60ababb38363adf4865da38018163216f4d532a261a094c4dcab99bb4b3b libtasn1-tools-4.16.0-9.el9.x86_64.rpm fde51297a49223b944285171b4beaf9f65bc329b04ee5448d3078e63dbfb7900 RLSA-2025:7076 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS (CVE-2024-12243) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.8.3-6.el9.i686.rpm 79d85d35efdbe5fc7321ccf94f311999ec3fce577b1ee7648676007f2de18838 gnutls-c++-3.8.3-6.el9.x86_64.rpm 74de7ae6c6167e56d0188609d9606de89c30466d7d88ff310e0175b076c1de10 gnutls-dane-3.8.3-6.el9.i686.rpm dab415dc6ea14b15806280f19417975db309b32a9f158056d3ddc113965231a6 gnutls-dane-3.8.3-6.el9.x86_64.rpm 7c1ec57872b3376e1be139b9fee7e0f20e907ffbc1dd3f519501dbbdc3e06683 gnutls-devel-3.8.3-6.el9.i686.rpm 3bb2fb6a69feeb4a1d16f06653d54a77c109856a7b18c6262ffac846664800f5 gnutls-devel-3.8.3-6.el9.x86_64.rpm 9bc7c30c34863283f5a5a587ad0e7f29c849022dc2cf572b2a4fe2bd42e820ae gnutls-utils-3.8.3-6.el9.x86_64.rpm c9794ae476f753ea44bf4fa81ac75ee9a355f40f59303576fbb0ae13322b1d36 RLSA-2025:7163 Moderate: xorg-x11-server security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpm 5b97f86deab993c40b5a4924dbbb5d5139c2936fed9f995a889b9d9860b4cb61 xorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpm 397981748bfd773634557a5642500c946f98966b0b64d10f16a5a5edf8a83bcd xorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpm 26a3d014df4460f655eaa443285cce2c27af1daf462bb6a59d4224b2053c3f8f xorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpm 648e4718ca32face9c3b4b01b84e0c060c98ef1ddbd168d10985e9fe05d0dfb7 xorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpm c0204962bd9f553b33028b914e45d38ba6f36bd9a11f58d13de2ff00f669b234 xorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpm bc04f88b5c63e04e976171593cdf4bd2117be58e771a8e70bf6e713820799ea7 RLSA-2025:7067 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: overflow when calculating ulog block size (CVE-2025-24528) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.21.1-6.el9.i686.rpm b355e41e4eae37577669371a8fad5a2b63fb92eacf8c617a21f165c4c6374b79 krb5-devel-1.21.1-6.el9.x86_64.rpm 0058720d254abb5c868d488cde201f5215399250c1d19a47987646b1a1d7a030 RLSA-2025:7165 Moderate: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpm 24e0157d86220f9e783ed5c724615b37f0968d17a2bf42a299a64e2ec3536919 RLSA-2025:6977 Moderate: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: URL parser allowed square brackets in domain names (CVE-2025-0938) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.21-2.el9.i686.rpm e678a716ae60cb489ba7a64dd8e9a42aa8b82b82a9a16e2d073e4a4507488044 python3-devel-3.9.21-2.el9.x86_64.rpm d85a2d35693e97b4741e65d5cb971d5f88c05bbbd7d10bb20d5c78b22af225a8 python3-tkinter-3.9.21-2.el9.x86_64.rpm 677bd6cc2cc9b941824b1ee77762eb2594dc409785679ce3631acc489278ffba python-unversioned-command-3.9.21-2.el9.noarch.rpm f53ddbcf3b02464750b46878a0e5787807515b1726febaface13243dac8cfb8c RLSA-2025:7107 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: URL parser allowed square brackets in domain names (CVE-2025-0938) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.9-1.el9.x86_64.rpm 46567eee64b69d1f5228f9aa0240b21fb2b8541d226d14b2139920e3f8c4596b python3.12-devel-3.12.9-1.el9.i686.rpm ce9327b9153149cb43257ffe9a3cadd52a5bd0bd39a9c3fb0f56d9f3488f1f0b python3.12-devel-3.12.9-1.el9.x86_64.rpm fb43153ec85425475304c6a8791d168e478b29121b8285b757a3e49a72c605da python3.12-libs-3.12.9-1.el9.i686.rpm 6f440096aa5ffbc82c0a4b1cc5be7c4419eb6922c7af9dbe4d4d17b3a2f328b1 python3.12-libs-3.12.9-1.el9.x86_64.rpm 70d7b3ac34753523cab0fa2bd897f4690b9fb42ca897e69db60d8135db809d58 python3.12-tkinter-3.12.9-1.el9.x86_64.rpm 0db348ccfcc1972eade0f73b4f594491a3d9d12b677290b539744468b066d048 RLSA-2025:7241 Moderate: rust-bootupd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootloader updater Security Fix(es): * rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.27-3.el9.x86_64.rpm 2812fa3a3aa43237353354f7202a07606c111ea0915ab3163b622f4bcfc0a9d2 RLSA-2025:7160 Moderate: bootc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Security Fix(es): * rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootc-1.1.6-3.el9_6.x86_64.rpm 2004789cd8876b291d35a29633bb2c2acb442f494fe84482a53be324993cda56 system-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpm 680ab520331d87a96b6533886782ff1f27180075b43acde9554b2c6a9616ad5b RLSA-2025:6993 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-45.el9.x86_64.rpm 6940d5d9dc815cb14b79815e60723a5e9aaaee7cfb9663297c31021f2495f659 pam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm 2e837222f2e6bb09785e1cd7e72ea240403eed0bf4006d59cda146ab03c32bdc RLSA-2025:7094 Moderate: aardvark-dns security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`. Security Fix(es): * containers/aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service (CVE-2024-8418) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.14.0-1.el9.x86_64.rpm a49baaa7862d078170ef08583b46a9244b9f987359075f78dec7c781fba65725 RLSA-2025:7317 Moderate: python3.12-cryptography security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-cryptography-41.0.7-2.el9.x86_64.rpm df0b50f851ec8acaab5138d2d101b911eb221a50a260c9431895a2b8bde06a59 RLSA-2025:7256 Moderate: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321) * golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322) * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) * golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.6.1-1.el9.x86_64.rpm 8c976775f343f6627dc0b9e0896369363542868edb83f29e9d6d7a08796f216f RLSA-2025:7313 Moderate: keylime-agent-rust security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for keylime-agent-rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust agent for Keylime Security Fix(es): * rust-openssl: rust openssl ssl::select_next_proto use after free (CVE-2025-24898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keylime-agent-rust-0.2.2-2.el9.x86_64.rpm 4d15a8c588e5dbadbf272760ad2d7ee8e1e3f9d31297d1389c446b0206b02da0 RLSA-2025:7050 Moderate: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: Path traversal vulnerability in rsync (CVE-2024-12087) * rsync: --safe-links option bypass leads to path traversal (CVE-2024-12088) * rsync: Race Condition in rsync Handling Symbolic Links (CVE-2024-12747) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.5-3.el9.noarch.rpm d187bec77343c6f42d5e8ca9a531ada5257af93568f5ef566422fbfe320a6042 rsync-rrsync-3.2.5-3.el9.noarch.rpm 4288612d9592f29a6107c0ad7d286a2f5a8630528354117b166dbeb8c8d6a3db RLSA-2025:7049 Moderate: python-requests security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests+security-2.25.1-9.el9.noarch.rpm 839054184519b72e8b58ec993450ea64067d5e097224a718da25991b228afcd2 python3-requests+socks-2.25.1-9.el9.noarch.rpm 54766683c0d9da34bda92655471634ecc02aa1e9d0e8f01089598e1b8399ca59 RLSA-2025:7389 Moderate: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.39.4-1.el9_6.x86_64.rpm 53ed8d67b30a35c6c1d70b6e1d4813cd153c76e92b173c810b4ff2626a5f12dc buildah-tests-1.39.4-1.el9_6.x86_64.rpm e3cdacc8c0422f9b1201aba5a9fe40979f766b1bf2fc0193d8454a9dfb23c629 RLSA-2025:7391 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.4.0-9.el9_6.x86_64.rpm bf2053180fa5de5755b346127ad1496f1045c38b5b0e78adc9d6a6a677a6eef6 podman-docker-5.4.0-9.el9_6.noarch.rpm 2b7093b6dcfeeb06ddbe2b484d84c35cb67a9f6b48f12c5745f4d39151c74ea6 podman-plugins-5.4.0-9.el9_6.x86_64.rpm 2ec4740b6573fffa970b7335456d15bdefc8b8245a21fb301c7c8bc83d870abb podman-remote-5.4.0-9.el9_6.x86_64.rpm d7166be291e63e75828df6a16f1bd6ab896cc04fe1286cb734630133a7390364 podman-tests-5.4.0-9.el9_6.x86_64.rpm 11d45ceb2bdfb320fb3ea3a3b194dd49566f51689445d793d6b4a2ee57f77890 RLSA-2025:7397 Moderate: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.18.1-1.el9_6.x86_64.rpm 90981d481fc16948f172f870d604cac5c6271222b1b911ae3390b34bfea88b15 skopeo-tests-1.18.1-1.el9_6.x86_64.rpm 682147078e10ad68e6b2cc5015b0ffe7a649f0e2933313a73035d9396f84f0a4 RLSA-2025:7395 Moderate: 389-ds-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.6.1-8.el9_6.x86_64.rpm d5a6bad7819d852d6cf1d1d4105e650a97cf0281e99b90e84ce38f328e53fc4f 389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpm dbbe44e334a20d10cb5fddf2454a0cdc97d52e3b09050a53a62e8e9c26b6e8d7 389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm 150d842db41487796830b76969c68338fb8829cf39d308b495ddeded02522fd7 python3-lib389-2.6.1-8.el9_6.noarch.rpm 4c60ff7f12ddf5a79b6794123f735791073c793a3ace57d605e268a565d96883 RLSA-2025:7409 Moderate: git security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-2.47.1-2.el9_6.x86_64.rpm 810cbc1763b89adeeb8fde8c1d2d142e89414aac5691e9f8c25dda34b22e995e git-all-2.47.1-2.el9_6.noarch.rpm 6c324ea3223ae18108ab5944f562abe180e1dad7a060b96e6bab98f974fe9de6 git-core-2.47.1-2.el9_6.x86_64.rpm b558f272f374af74d9616e3dafd50dd996fc67160f6e104a3cfe3a943f14516f git-core-doc-2.47.1-2.el9_6.noarch.rpm 88f8059b8ccdd2afef5b54e3c963e8e65168e6169d8ec773e8cf65c7ac85d531 git-credential-libsecret-2.47.1-2.el9_6.x86_64.rpm ad6ebd1593cecfece5116dd435419bae71de7acc5ec79fcb7b546d90903d6a63 git-daemon-2.47.1-2.el9_6.x86_64.rpm 9aaaa87fb9aaed5d6eaea61038c3fc896e161d8dfe595e4603aaff259035d591 git-email-2.47.1-2.el9_6.noarch.rpm b5c36b560183cfe5fbdd7e9e6b77eaa4f9de31951a69555f17e3833a6f174fa5 git-gui-2.47.1-2.el9_6.noarch.rpm 1070fbcce6fe26d13db6073c65b2c7910501964abda2b6ad6ed91d3d82d2da1c git-instaweb-2.47.1-2.el9_6.noarch.rpm 5565e46719957806d44ed7c42fbb64edc773316443561b818e8383b8a0ceba51 gitk-2.47.1-2.el9_6.noarch.rpm c2c3a93bff206ce28174d270147ab11ffc3b659084520ec23a009f9a9bb2a05a git-subtree-2.47.1-2.el9_6.x86_64.rpm fbf6f103b36e4ad47b0c495c138af72160623bb0e0c1fa1cdc13b537ee83340a git-svn-2.47.1-2.el9_6.noarch.rpm 5b0cc4473feb3004041da93dfe75a9b380a627c032b2e150c4c684f626b595cb gitweb-2.47.1-2.el9_6.noarch.rpm 2c5e94e76afca7c19ecab749a1628427e4f69b24ca83bb38117c5d5852d228fa perl-Git-2.47.1-2.el9_6.noarch.rpm 7e1c645311df4597c1d40dd416d718954e6861844fc1cbfb531782f331929480 perl-Git-SVN-2.47.1-2.el9_6.noarch.rpm 82c293d1849db01f97b88953a5c5a6d83f7061ed168c9cb5852c805f91b604a2 RLSA-2025:7417 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: dds buffer overflow RCE (CVE-2023-44441) * gimp: PSD buffer overflow RCE (CVE-2023-44442) * gimp: psp integer overflow RCE (CVE-2023-44443) * gimp: psp off-by-one RCE (CVE-2023-44444) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-2.99.8-4.el9_6.x86_64.rpm e60d5a3d2bf267eeac8e126983400d89c70c6682d292ac764ddae73ee133582f gimp-libs-2.99.8-4.el9_6.i686.rpm ba8b56877f3843a76746a5c75beb59b44d759331f9aa79a654323a05a091b81a gimp-libs-2.99.8-4.el9_6.x86_64.rpm 0048ba8e7864961c3a88a296acafc9844854e9ce8d1b79700f99423dd0813964 RLSA-2025:7427 Low: xterm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for xterm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: code execution via OSC 50 input sequences (CVE-2022-45063) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xterm-366-10.el9_6.x86_64.rpm 700461d7688b89f864eee5b2f7cbc36bc87d1c76245fe3ab210d2610411d72da xterm-resize-366-10.el9_6.x86_64.rpm 98ddfcf012d0083c1d934b25a881581f6f9a9ef3825716bd62afb52f1a82fc72 RLSA-2025:7416 Important: gvisor-tap-vsock security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.8.5-1.el9_6.x86_64.rpm b9dee5d9cf2be3289905256a1074d29277538e429f3d1886e20e9f8423146d26 gvisor-tap-vsock-gvforwarder-0.8.5-1.el9_6.x86_64.rpm 74f8c65431575a68ecef18193d79c8012ee6ee5d6b5a2767bde443cc202608f9 RLSA-2025:7418 Important: php:8.3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php, php-pecl-redis6, module.php-pecl-xdebug3, php-pecl-rrd, php, module.php-pecl-zip, php-pecl-apcu, module.php-pecl-redis6, module.php-pecl-rrd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) * php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm 323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm 48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1 php-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm eee2b4e7a7bb1535029ec737787f0c1f3b043a0f5c1da9e1ec91ae672a42c2db php-bcmath-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm a166dd965a3d599acefcab141c86178c348a2220a73f2560557297b5c0db5c7c php-cli-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm c69cd41dd94aaf2112aa138fe17f7c4763b72146ff7466da7161359ad14ead31 php-common-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm fe3fc719f7c6e941f0ee343de09aff44b231805b4de63ec5aa8525adc5af3a5b php-dba-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 05b1a701d13d094823037da19a8577b3d3a6f04f25c9c56e405d89047b6f2da0 php-dbg-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 5eeac6d0e3689f456f37acbdd40f65c1b780f4f4fddff95a452bbf12b16b8882 php-devel-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 4b94955eeadb9ff73677c3e2aa9c4e1ca9991ceaf5a40e60cbfdc5cc92b8038b php-embedded-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm bdb6699411b13b0818042fcff466a7dacd6b35d11612596206eaf97e89d3cf65 php-enchant-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 30d2308b4317cb20d409a6a7e10d4fdc3bb571b9586347e5088615f2be6d249f php-ffi-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 1206e272b83384d3477b946ce6752b88d8b2fdde1178bc0e2392b70daca2382c php-fpm-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 4adfd246de88da96ce016366d39306b106e696d6cb2d38f2c63da3b4948f4562 php-gd-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 5d97e3a04839d7c349b58e71ea18b12157d7423e3b193c0342df65e30db92354 php-gmp-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 2294ce80aaae4e44597d96e8e7acf2d339601ac6ec8ff8cedd28ba904b593724 php-intl-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 15410ba37ad44cd4c58ad3513926586d1e11a34d6e4ef5c93f3c66ad460ba1c5 php-ldap-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 6ce1f41725d968cc78b972eac79c4700af1dada02bf2a538d02b128832e20350 php-mbstring-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 7606bc6257f28dad608a84c1ac23923fcb73702ac97849a4febc7689dfb4c744 php-mysqlnd-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 880bdb569fca3102e417102ddd12322a20deb406acf24e6cb535e5525c38ae06 php-odbc-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 029d4e29b5f8689fce5c8b300ed9a03aa6d08ad9362897faa239722153bee577 php-opcache-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 59207da1386337dcd0f9f335ce278a5be75ecc9ebaee87428e5e4d3e4c936db5 php-pdo-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 7bd9159572e3e688872bc50c3bc32c7eb15c0df2a083cd3458b6a2c0dac3983c php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4 php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5 php-pecl-redis6-6.1.0-2.module+el9.6.0+32042+808943ae.x86_64.rpm 641f7573c9981d315ace5db110678d9ff1fd71527c55e349d24c150a6e366713 php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.3.1-1.module+el9.6.0+32042+808943ae.x86_64.rpm 39e9e6d7d1376cd4e0094385fb062df08a0d689ccb85f09af50617ad6001f6c1 php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22 php-soap-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 2d7d32cf6b4353f0c2472f571f4829dd3a2b60b21ffce966d82a77c802bd2b67 php-pgsql-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 8330d7a5da6aaf09fae972e95ba33feaffb8d0541a116205ca41c988f81b31d2 php-process-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm b6d1401a28237a020167462247e2b67a5cb99168d5868dd5c6666cd0e5dc19aa php-snmp-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm 61ef5c1414b1380bff1b4d3cfa23371b940cde70cbcd7988b81b21caac997bb3 php-xml-8.3.19-1.module+el9.6.0+32042+808943ae.x86_64.rpm dc1742dc7cb8f1a04f342d8265ceaa98a85d6e71ec88520f062d4f7c06ccc7f7 RLSA-2025:7431 Moderate: php security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.30-3.el9_6.x86_64.rpm 9e127cf5ee5ab7f9dccac567e9a952ae822b0b641657667d9bf2875c2529db8d php-bcmath-8.0.30-3.el9_6.x86_64.rpm 795014cb930c175fa04303ef68ff8db0664224514480d3bcf0a5e37dad394a01 php-cli-8.0.30-3.el9_6.x86_64.rpm 417d461598b08a064b83714e2b53c7c23bd053162002c2db6e6af4b599d43511 php-common-8.0.30-3.el9_6.x86_64.rpm 5f471cde766113cfcef2eaef3b2af016f62091fefe4852657a50266734a5bac0 php-dba-8.0.30-3.el9_6.x86_64.rpm 354739d8fa1f3ed3484deab5993365e856a0d7b5793a1302a00b1e443da34fbb php-dbg-8.0.30-3.el9_6.x86_64.rpm ece2ad43c8deb96e5dfbe2febb93adea127b3c2fa2448f477c874bcae732f16e php-devel-8.0.30-3.el9_6.x86_64.rpm abf6dee421160bafb15f9bad9ac5346550c07156fbffb23ba77687179692ac3d php-embedded-8.0.30-3.el9_6.x86_64.rpm 00217e2aedad36517dd2874aebe57fc44540421548d8dee5f53b6a758b7137ea php-enchant-8.0.30-3.el9_6.x86_64.rpm 30d0b0c509060f73cd0902fd89d8d0f1c6f222319ceb9d6211d1b8cb0cc2752f php-ffi-8.0.30-3.el9_6.x86_64.rpm 664187aa7a76f92f2cd04102d5910de2766b25dcabb5ae86eecc17f6e456ac5b php-fpm-8.0.30-3.el9_6.x86_64.rpm 1f4d5628264a1373e75032bdd9a852dcb663ae0b305b1e9d07f3ed7c51d3c402 php-gd-8.0.30-3.el9_6.x86_64.rpm ed5849b98006ac37bb9034da50e554d0a9c3b1f89460d2ee3167e0bf615beed1 php-gmp-8.0.30-3.el9_6.x86_64.rpm 89492578c23d2bccc01dcf9033dede0f1f5f004f091570a4a2878975720ad8b4 php-intl-8.0.30-3.el9_6.x86_64.rpm 5bb642011ad3a6e47c42fe13a56b3851ee1bd005111fddb0a2075c3404957b8c php-ldap-8.0.30-3.el9_6.x86_64.rpm b9b21e89574155ab9135075327797bacc3d6b1caae129b8c0025974fb008f390 php-mbstring-8.0.30-3.el9_6.x86_64.rpm e0f3480021fc1c995a6d4db0c72091f92fcb400a0a42b126e90377d0c55c5f29 php-mysqlnd-8.0.30-3.el9_6.x86_64.rpm f353413c4276ad3ac999ea475f9466478bcf2af4f5b8e138345008a2a7ea3d12 php-odbc-8.0.30-3.el9_6.x86_64.rpm 7e5fd4ec8f8518b4a8e05d67ff351edd67c53de953b9621d69b9505142e477f1 php-opcache-8.0.30-3.el9_6.x86_64.rpm 01f22d17566442881db4573a475de7ae314404ec278f8f45eacc4975c6443436 php-pdo-8.0.30-3.el9_6.x86_64.rpm be4e08a4438841a2936e2e355c14a75bf2ec41dd79e7a2bfd43d1b0fbef0ef3e php-pgsql-8.0.30-3.el9_6.x86_64.rpm 37b243c151685dcc2802cf5b5b168ede8c77f90a5afe6e9f2fb74e8c6ad4d604 php-process-8.0.30-3.el9_6.x86_64.rpm bab23db76dfd63ee47e1a414931731c267ea6908bd26f5dee0fcb9fd56add22f php-snmp-8.0.30-3.el9_6.x86_64.rpm b4f5751efa5edf3eeb445a22a171c85e5fcd905cd8343b4c728bc57448ee123e php-soap-8.0.30-3.el9_6.x86_64.rpm 8e428cf96947275d73022ccb713d9e72dc299876a85de4dd20300c44a27fbac4 php-xml-8.0.30-3.el9_6.x86_64.rpm 0de63e55df5e362d21bfe8e20257bfbe170bd48aeb443b2b83f6ba92e76fedf2 RLSA-2025:7419 Important: mod_auth_openidc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm 1f6d8205742bc89726991c82420a0bde1c4528844cc22b38268ed06612432df3 RLSA-2025:7432 Moderate: php:8.2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php-pecl-zip, module.php-pecl-apcu, php-pecl-xdebug3, module.php, module.php-pecl-xdebug3, php-pecl-rrd, php, module.php-pecl-zip, php-pecl-apcu, module.php-pecl-rrd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Leak partial content of the heap through heap buffer over-read in mysqlnd (CVE-2024-8929) * php: Single byte overread with convert.quoted-printable-decode filter (CVE-2024-11233) * php: Configuring a proxy in a stream context might allow for CRLF injection in URIs (CVE-2024-11234) * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.6.0+32041+66e66fb7.noarch.rpm 323a09137c6f12c9ac7c4d0ab8278d6a9024302b918c830eda95e44e8ae51f5b apcu-panel-5.1.23-1.module+el9.6.0+32042+808943ae.noarch.rpm 48c47f2b797a73126e5fc6ca4c41c00558a18ed42dfca98d8c354b3d18ef08a1 php-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm ff9fe09b930d7f3e67e849ef3c29eb0b1906d21ef319e4dca957335e6b6ef1d0 php-bcmath-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm cd11c86536b950c3d72a7a5c61bbd2d31d7d7b69c67608587505fb9ceca6b4d4 php-cli-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 0b848050e680941c0b404cf3d9e14c9ef2f76d7bc2630ce0a8b8c445f19688a1 php-common-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 652d3a8d062adb6ff1c4f43f708cd9f729ef9842275642d80df6dd913d7c7aea php-dba-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 0102e474d50268c234d96b8abf2f11583f1f997c653c41bdc41ea91dee20246f php-dbg-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 4699e3e9f890d3f5ee00f3c7ab87b471e605771e85a1790bab70d170b3c16076 php-devel-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 58e39877564b9c6a8162f7bfc233da789bb5acf55106ee96deecf2c204277b65 php-embedded-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 001c57dad7dbc6b6a3dd034db70e6515a2cb1be83b228b4ebe6651016fdcd073 php-enchant-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 5d92d1782be607a3573e4457f7c6d0539ff41bce7ef8595a264c8df75d3d8d5c php-ffi-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8e5c1e95dc0a7e0c04d60dd45eee3b0dbab3b76d9dc307d9e64b48c2567f6a97 php-fpm-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 07f37a604751e288e46272dc602d0e7c2f94ff798a3618bb706446b8656c304f php-gd-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 7af38fcf4060b821ce25ac7fe18c105b0865e8e0cf994b310678635e8c54e7af php-gmp-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 086e6fc0763e91a53a8c00f99c5cc29b093145c62975b107598c7de50d9196de php-intl-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm ffb36426c7e0028c3348382cceacaac1a47edb2fbd71ebfce9fbc6e05f25f50b php-ldap-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm ffd89b240be9f303615ea41f81632de8791436ea092e6e19c7f9de33b8434473 php-mbstring-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm a1b73bb6d5d1d367db77387ac751ff437b06de3ba536a05725173405cb5e9288 php-mysqlnd-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 4a9608026a30600a73095cba316693b4785171177c6853bb4fb77eb028edafd3 php-odbc-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 860b0e5d2d7ad45483ea41fff04cd580bb2e841aa13bf54ffbda5a6a047daadd php-opcache-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 18a05571049d910a3d98a1f7bc531e8d9347920dd219bc413b603008462fa4d3 php-pdo-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 0ed3f795c3798bfc5082757aa399ed38bccadafc0d2a9879e538a0cfa4e7421e php-pecl-apcu-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm a93318e7622328ff1eee4daa943cc3d5288bad274978577b54575d961b1e19e4 php-pecl-apcu-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 95bc56cc13d784fdd0e2f3defd5de9e023434985ce3392768bead44810439618 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8f49c461c46c25d0cfa0851d7d59567ac957fb78f0e71e324ac20d74101c3a21 php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+32042+808943ae.x86_64.rpm 6a99172e51b7482fb0bf7bb0a11a31ba39ac8de1e0cfd85125eafa2279b6a6b5 php-pecl-rrd-2.0.3-4.module+el9.6.0+32040+1f1dedb8.x86_64.rpm eefb20899c2b0a4ad75c67c0703adc03e30a112a6c498a0f12f095f5eca2bfc0 php-pecl-rrd-2.0.3-4.module+el9.6.0+32041+66e66fb7.x86_64.rpm 6040b83006f8658c3b514538da91cc12ade31a333f3655abd0a6eccef8d32de2 php-pecl-rrd-2.0.3-4.module+el9.6.0+32042+808943ae.x86_64.rpm bd41f5f7099235dd6d1920a3acd685f4cb127c6761395a8086f8911ec4dc086f php-pecl-xdebug3-3.2.2-2.module+el9.6.0+32041+66e66fb7.x86_64.rpm 8efbd8cea37b667dcafbfdfb0de2bf8d1150dabd06bf52e31719ef7af1ee6071 php-pecl-zip-1.22.3-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 93d446f4ec4513c0d051f735e8ccabfefb6eafbd586cfdac181bfb9c365e5b6d php-pecl-zip-1.22.3-1.module+el9.6.0+32042+808943ae.x86_64.rpm cebbe5eec4ff58b54822d39bde96c34cc63bd2a626d23e2f9e042ea356f6ac22 php-pgsql-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 98e04c9e4de5f1c8532e6049c54a5b8f50c1b60f326a1a175eb6b0b603fcf927 php-process-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 03b811af1fb6db298965081945fceaad9bfc1e1d7427b7dcac28d562b059ba91 php-snmp-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 521c62bfae1460db4553d8bdb3e7c61146d20245ababde0b0dfc6f8023ce74ca php-soap-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 4731e15b59d9379a852b3c317a649111acb0eb8053ba92a369fef48dd3743fe1 php-xml-8.2.28-1.module+el9.6.0+32041+66e66fb7.x86_64.rpm 94383561c564f65f6f0cc990023a056c9a2d6b190a089641acbd5b9c4f86d250 RLSA-2025:7402 Moderate: nginx security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: Memory corruption in the ngx_http_mp4_module (CVE-2022-41741) * nginx: Memory disclosure in the ngx_http_mp4_module (CVE-2022-41742) * nginx: specially crafted MP4 file may cause denial of service (CVE-2024-7347) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nginx-1.20.1-22.el9_6.2.x86_64.rpm 3bccbb21e1471801c4c6f76521f15847e7e9df3c7c5316f9fa1cc32bb72392d9 nginx-all-modules-1.20.1-22.el9_6.2.noarch.rpm fe20fc3e0e757b6c6de79c00b2ea04a210c03ceea31d6bd5d250bcbc1871d5ce nginx-core-1.20.1-22.el9_6.2.x86_64.rpm b72c725d0857da6bfd74352057a535f4874752a06b649590d7a7b8f9218e1743 nginx-filesystem-1.20.1-22.el9_6.2.noarch.rpm f3d4c1b78f18db23f01c9af761032a7f66f209b22f6e38e9e35d8cb68094b8e9 nginx-mod-http-image-filter-1.20.1-22.el9_6.2.x86_64.rpm 63d0faccbdc18528b0f380adfd90dfdf1a4c428d0a47cdc3e8d1a4c03804edc3 nginx-mod-http-perl-1.20.1-22.el9_6.2.x86_64.rpm cb627f638afedb3a53de3ba0af052a0379c69575ada60b7a4d468b0f646db9c1 nginx-mod-http-xslt-filter-1.20.1-22.el9_6.2.x86_64.rpm 17a4769f7129de707b24a7c60d780c372d377429b0e05f2baeb60c6341474e11 nginx-mod-mail-1.20.1-22.el9_6.2.x86_64.rpm 57798de365a38c0b77612105b1099c10b168143a05848daea3b920ac055c8ec2 nginx-mod-stream-1.20.1-22.el9_6.2.x86_64.rpm ee45a24dd03b6980316d3566cf6cd23be74a01700307deef5661418bcd52c363 RLSA-2025:7429 Important: redis:7 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.redis, redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-7.2.8-1.module+el9.6.0+32036+eb8f79e6.x86_64.rpm eaa069258afc48e743f1123e2b8c63ff9b3129458b3b73de0721d35801acdfeb redis-devel-7.2.8-1.module+el9.6.0+32036+eb8f79e6.x86_64.rpm dadbcd6e757135038a5389b1e039dec8cc72744b754c1a7cb48ea6d96cc88536 redis-doc-7.2.8-1.module+el9.6.0+32036+eb8f79e6.noarch.rpm 21cea4f84cdf4afa437c615224fd2e6686c545b3382e6dbe86271152be40b4f5 RLSA-2025:7438 Important: redis security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.18-1.el9_6.x86_64.rpm ffd6da2532960fde762bbf2cb102bdb396187d4709f0a264ae23907ee818e99b redis-devel-6.2.18-1.el9_6.i686.rpm b84336226326db111a74e545103132a09edfa5f784b1f499a0e3fb003bb5c521 redis-devel-6.2.18-1.el9_6.x86_64.rpm c62a7045d0a68873f39d55e68f936d2f8d3cfefd3c57015384629e1fc6ff48a4 redis-doc-6.2.18-1.el9_6.noarch.rpm 714b9d7f8701e5a51e5cbda1a4fa89707ff55c0c1a6ce496f09e846461e24d83 RLSA-2025:7430 Important: yelp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for yelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yelp is the help browser for the GNOME desktop. It is designed to help you browse all the documentation on your system in one central tool, including traditional man pages, info pages and documentation written in DocBook. Security Fix(es): * yelp: Arbitrary file read (CVE-2025-3155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms yelp-40.3-2.el9_6.1.x86_64.rpm 0ed1a073efbf09f530273153be5423a4a178177f6bc30c239c918251b2757804 yelp-libs-40.3-2.el9_6.1.i686.rpm ae1c557b8eb6e0cfe40dacce9c826ac678dbeabaaf4a879612a54678cdc0ce42 yelp-libs-40.3-2.el9_6.1.x86_64.rpm 8659466234f34abb304f4c2aa043c00fc14e16efc75d3f255dfffbdc6220d952 RLSA-2025:7437 Moderate: avahi security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Predictable Transaction IDs (CVE-2024-52616) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms avahi-autoipd-0.8-22.el9_6.x86_64.rpm 381b457634b545b06627f9fc4ba949e14681965cfaf6d0c3636742e5e662f565 avahi-glib-0.8-22.el9_6.i686.rpm d0fc2a256204d1035809d2fbe2cb1ba2671e9dab1fa7b5f2260e5b0959c87470 avahi-glib-0.8-22.el9_6.x86_64.rpm 1220add6fe0d21f399f3138a2eec892ef73757109f85a5c1217d7283d6b2a895 avahi-tools-0.8-22.el9_6.x86_64.rpm 3a98f2f168f501518365daf2e3ea5e405c9f94423e996564dc7e00f428629ec8 RLSA-2025:7440 Low: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: use-after-free in function ins_compl_get_exp in vim/vim (CVE-2023-4752) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-22.el9_6.x86_64.rpm 7e65d7d519720417b9bc9cdc40975a6153d146723ece172ec4fcf785d29bdb94 vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm 98ce55936a1b5bf13f386e0c0f90eb6f3c77f503c2df9fa71acaaff72e043d27 vim-X11-8.2.2637-22.el9_6.x86_64.rpm 62fb1737dad1fcc6e83a2de8e00072d457e5ecc5606a7dad5db172af0ec1d100 RLSA-2025:7598 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm 540655508a0a8fedb047d85feb1373c6c7f76461f5c12a099777d97889aacee3 aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm 5523bf135851276625be8ae2b9b0f53b958063a05fc679babb2ca17429b75736 aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm 7ae92ded32286cb77bec330a89f3904db9015e47f4d3321cb680695126622797 dotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpm a79e8e00c660fda0476b829604c1907ecd0d32b044c28f42134e9220823961cd dotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm 0a4c5567bd4779dc023298e5a7abdafff2a8f4a74dd6cdaaf8fd488f888a15f2 dotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm 61291d6f52c7d9c4b3874071aac2474141abd3c0ca2fcf3c3d7505da1a4aebd1 dotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm a3f246f8115726df1f084cc1ea5acfb99835907bc2dd44b8fd0ca84aef3766c1 dotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpm 52076cd2610dde3f1be04106b52f5da5bf3d4c0a75361c79d72a3a3f9b6a438d dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm a59f1be4be9e5099307c3c46a82410be9ea2b2df9460ad16c21903b46ebd3c3f dotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm 88b61e2d1d4eb97b84009899dbcb03f366daa78a73b77716e2e108edb0f0144a dotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm 7233a4d9998ff5ded7ff662192569b294b3d3ce6d0d009f534e5b7b28159c674 RLSA-2025:7600 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm 197207d56a6cb6781b5c4f9bb763452a6caa27439cbf235ea13b9d00fa4e5c82 aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm 912760800b82c7e592d13c2be6e11f7fad5e7ba29f914e8dab0037b822a20318 aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm 975d4a13214a74ef2903ac28cb7fea6aa7f3e0dad9532eb8b537689904e3dafa dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm b227672bd916759b2fd2ed2b3cee9755e996e6b6c8729a9a5b2981def614cc98 dotnet-host-9.0.5-1.el9_6.x86_64.rpm 00fb0470ffef68a6eeadb04f49971bfe7680dc82410de57ce866b865ecb5d0b6 dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm cb67c23b8244e130c06c39169ed15d8e10fd5726aaf97f0e3b031b70b0ae2ff6 dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm 8e601689fd15ab45eb0f6d7e3e7c351faa3ff687ad8cd13d5d17a4aed0d3eda8 dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm fa300cf2be9cbebcd1e5efdf8a550de0f602e8a98355ae9391819ade8a7fa871 dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm 942e8fae562e966deceb5c327f54f867255bdb6446cf234424d6f6b4846e3458 dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm 8f58ace8c89e5bd5eb1a5dad5113f502c72695da15fcfbf158b04a24ff660c20 dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm 2b1d85e87ea4b667c84924ffb1989eb12b34bcd663ba8f1b7ee231cfbf58de10 dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm a5d3d89318e0141870ccb645316a9605c7567c90347acd3a9fe54f983b758ff8 dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm 3e61d4faf1b0801c567f0d7435b31d8ae9f9514bd24f43448fdce4d70e082b3e netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm 69374861feb2890004a684a4cd3d7a8ba11ef99bc83ccbb902ca9ebef0125e56 RLSA-2025:7672 Moderate: xdg-utils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xdg-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xdg-utils package is a set of simple scripts that provide basic desktop integration functions for any Free Desktop. Security Fix(es): * xdg-utils: improper parse of mailto URIs allows bypass of Thunderbird security mechanism for attachments (CVE-2022-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xdg-utils-1.1.3-13.el9_6.noarch.rpm 88fd1dd093667c22fd345fed86c4d0062aa85d5531a737e6c666be712aba1b3e RLSA-2025:7893 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123) * grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect [rhel-9.6.z] (CVE-2025-4123) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-13.el9_6.x86_64.rpm bb83f67a0a096111964fd205282aa9dfd73c013a31b761f6f3e3c025afaa4272 grafana-selinux-10.2.6-13.el9_6.x86_64.rpm 67519aa35b21d9312d32bcedb95567f21bb9d9765cc20a4a4e38dcd73a4855e6 RLSA-2025:7995 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.48.2-1.el9_6.i686.rpm 665c0e5f4dbf10174eaef453a0180bab185d3feb656ca795b3f9e8a5359689e2 webkit2gtk3-2.48.2-1.el9_6.x86_64.rpm b70f2a4b9e00ead20a9deac3ed201ef50ab8c2a8cc51c64c04d372bd3fde9eae webkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm 97cb8a0faa885ac2dddf2b718b9db14383aa63f2b5ea1032da6b57c4cebd3948 webkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm cbc26603b1d132937cacc9c25f6c486513d1fd91a76616430e5e45ea43137ab0 webkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm 83d34faec9f1cde0f0dd446e70003cafcb387a0f221985bbc4303170144bbd15 webkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm e8b580d9922ce82523d4f1daa1179e60a275a783c0e3272068cacdd74e93f88e webkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm c75294655bbca8c246d70d067b3538f2e7826b182dfea501fc734d7e8a3b8da1 webkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm 9f6f3fb577ff29424f9782c77597642752ae4e786d242afe8daba90e5f93ded5 RLSA-2025:8126 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content (CVE-2025-2784) * libsoup: Denial of Service attack to websocket server (CVE-2025-32049) * libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914) * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-10.el9_6.2.i686.rpm c49556dc9c67ece4fe4142815068ddcbfabe175cb0e015a5482a49199e0b2f57 libsoup-2.72.0-10.el9_6.2.x86_64.rpm 5a18681d01127ba2c0e251fbc4dcf4eb62685601a8aae20e3930d7137510af10 libsoup-devel-2.72.0-10.el9_6.2.i686.rpm 64014d16011ce7c82638f5608b84f12d16e87407c9fd03c789b4a65435c76c54 libsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm 091196e1ff77740ae9b46a9fac0e8825b26c76f9f2d9ea96948fd64a895edb66 RLSA-2025:8142 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm d791fc23ff6b0563f1f7975ef6780d31f144b4305d49d54fc7cf02971215f4c6 kernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm 6340a3a145eb29df334f629125893f29645d94cb2fe57231a89d302fe0941b7d kernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm f97ac2c71c37de1f3d09f55a5ea08097bd175b8967bb22ed3225e971583d0682 kernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm 03947cb9ac1d49fc96bbc336f89709216dd53460640449562ea6df731b4a5e31 kernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm a27b7dd196e7e2a84fcb36732c26eaebfae4f5fa290a619804e2715e2ee8eaa5 kernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm 4bed3fe55c11631e84c7660fd6cf760e182cb10028118b054818efe940c40ba9 perf-5.14.0-570.18.1.el9_6.x86_64.rpm b1714b49913989f59478c87a0935b52a1f5e36e7b4358b74a1f2c4c0484c9566 python3-perf-5.14.0-570.18.1.el9_6.x86_64.rpm 32210800500c100056a16e3e50804807921240c92edbd57ac2198249a245c71b rtla-5.14.0-570.18.1.el9_6.x86_64.rpm ddb21f79237b43039baac13b734814b24e0d17bed858905cdb6b44e1e2b6fcf5 rv-5.14.0-570.18.1.el9_6.x86_64.rpm 9a79a86d5aeba51f8dcc31b40b0584cb42327e0879bacc0ff7bb51aa1f112a9d RLSA-2025:8197 Moderate: unbound security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-18.el9_6.x86_64.rpm 453c6891d7a1a5bcf0644c159459d37e3c1de12851b803455902289bd5e93ff6 unbound-1.16.2-18.el9_6.x86_64.rpm ad810e43d0e43800d62311401e5029e21f4059ee7400b36f5b52d7b8045464e4 unbound-dracut-1.16.2-18.el9_6.x86_64.rpm eb3ba8e7e9705f5462344f51f8b025c36a3d8328c7d91e041276cf57729f9be9 unbound-libs-1.16.2-18.el9_6.i686.rpm 6e34135c62cef1783b8cd21e9e778722cdb69cbfb67d246e59352f200e715c1a unbound-libs-1.16.2-18.el9_6.x86_64.rpm b635ee035f1a16fc0649e12f048f1bc551d151b4fb6db45675d6e3bae37aeec3 RLSA-2025:8203 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909) * thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875) * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877) * thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.10.1-1.el9_6.x86_64.rpm eaa54b2fc5994461ff4d671149c02a75309d58e6db5b104ec04d9f66a9f79f17 RLSA-2025:8293 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.11.0-1.el9_6.x86_64.rpm dae04996a94b23cc0c7821429bd57e1bfccac9a7adfcb19c9b6413905220b521 firefox-x11-128.11.0-1.el9_6.x86_64.rpm 2e8ba5157a80d57ef8d870016d00dbb934b6fb7003942cd58746597cf384c9a1 RLSA-2025:8333 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Use after Free in gru_set_context_option leading to kernel panic (CVE-2022-3424) * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm fb21d16b48db469aa0efbb4b30302e5340138185b331c19dd3a225b317535f0b kernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm d0e1570a448dbc55b9ce13c7e7d5fc3ff8300a73e20b26e3f351cda1ff0e2811 kernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm 46231b7f84b51524c46a66f829f92d548301a012981d0c4ca27bc1c4d8504bc2 kernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm 14c6042ec8a15e9569058c66f9a46bdf2e3bdbd560a872fd2db86dc2c023892b kernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm 3927df22a7befacdbef60f98cf4879a6c067d3b83dd0eb40098082cb1b21669c kernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm 0a0f9aa7d7f21f3d690234ae4f2032e3e1af5ed766898c2d2762e33851c737f3 perf-5.14.0-570.19.1.el9_6.x86_64.rpm 250472896cbefb92188cdfc13f7258ad348fb371d3da29a3e27d0e98ab66d3d6 python3-perf-5.14.0-570.19.1.el9_6.x86_64.rpm b6408416ba9f5ba5ecac4825863ebd1be6f6ca86937bc0b5f4e5811d3b3aca0d rtla-5.14.0-570.19.1.el9_6.x86_64.rpm e718712f3b151de12d90b9f4da924c7b0b330ed83ef50a15e6aa99a13bfb2039 rv-5.14.0-570.19.1.el9_6.x86_64.rpm 48db394864c3576a0c3bf6f362478e25350d97b1e42ba080afd6073ce4c94ae1 RLSA-2025:8337 Important: varnish security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: request smuggling attacks (CVE-2025-47905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-6.el9_6.1.i686.rpm 7a89e9c020f78ebe8c5429536a0c4b2c64200a98b509537dfec36cf9140265dd varnish-6.6.2-6.el9_6.1.x86_64.rpm dfc000680acc8df338c7554404396e91d8bf2c805843032b470b45585fed03c4 varnish-docs-6.6.2-6.el9_6.1.x86_64.rpm 4065bfb44471b09d80ec90665cefadb70eabd409a03f03f0031d8f29df05e7e0 RLSA-2025:23109 Moderate: mysql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045) * mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040) * mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069) * mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mysql-8.0.44-1.el9_7.x86_64.rpm 8d723cc2197436de4bcdac227b85b45f79157d81d2b91758605b40c0e03d1472 mysql-common-8.0.44-1.el9_7.x86_64.rpm 50a21ac7134c69b038b1e185d0ea968b2514805fc5f6f19f030df3de43841e86 mysql-errmsg-8.0.44-1.el9_7.x86_64.rpm fa638b25cb676282f28cbeeb87b6733178273de8259a9f48d6a526cc64150256 mysql-libs-8.0.44-1.el9_7.x86_64.rpm 87cea8ec195e5041f8e028e4c75e61b1b20a65ff8b3300e04d580f971345063d mysql-server-8.0.44-1.el9_7.x86_64.rpm 196e7b74d9e1685f595b5c52f8c629e0433d115151983619ffc83ec398aa8941 RLSA-2025:8476 Moderate: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.23.9-1.el9_6.x86_64.rpm 79a2060f47b08bcb871a8c43c9f181ff3c4f299517adfda12199822795a0ea71 golang-bin-1.23.9-1.el9_6.x86_64.rpm 12d0b4303e6dc34cf9b0ef897460e8f262f4d2ed3333f9e1b0a94cfc0e629c83 golang-docs-1.23.9-1.el9_6.noarch.rpm 86dee1ab0a20590e3580133b5d64e3c92bf1e32d63caa5e4493a41ccfc0ce241 golang-misc-1.23.9-1.el9_6.noarch.rpm f61f26fbbf2bd1700b40ce5bdb9ac3fd012a87b091a1ba88c70b94d44ce807fa golang-race-1.23.9-1.el9_6.x86_64.rpm 997a8eb13c5b3e861ee8068199477a78ee52ec85f65ddcec6112312bea6cf009 golang-src-1.23.9-1.el9_6.noarch.rpm 255d3d8626907554ab88a0e67023003d23f0d255cc473760bcbc838e94027bf2 golang-tests-1.23.9-1.el9_6.noarch.rpm 53381ab1a1152bfe7e1cd16a13303bb9c4fb3ad167a30657ad66b11c3305345c go-toolset-1.23.9-1.el9_6.x86_64.rpm 147627a726152cd9a743188a509ee0f75d39612e450a1decc2e31b22186b82f2 RLSA-2025:8607 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.11.0-1.el9_6.x86_64.rpm c137a404de3fe4203d9b679e22f1b8e1bc86b896c21606b9c519317cd0f140de RLSA-2025:8635 Important: perl-FCGI security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for perl-FCGI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FastCGI Perl bindings. Security Fix(es): * perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms perl-FCGI-0.79-8.1.el9_6.x86_64.rpm 96d7a71f7eee69620474b05dd1ce15163f7cf0bd588c847b6ce5e7d89bd0a14b RLSA-2025:8643 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: vlan: enforce underlying device type (CVE-2025-21920) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm b769d3e409775561a2f8c5d4681556237759572d73905f44dcb53793b9acd165 kernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm b4c424efe7efc677ca9a1764bf13019188941960ef974c18801633f9c74e1395 kernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm d6d044124f44b87cb287e30c04e973ce0dac42abd8e1a18d3c9a282034caf353 kernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm 33aedfb435b0dd47805c410667aaa182dcf7cdb440dd2b9d3b4a3029e235baf2 kernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm 69a36765d96b628852e8a5c68e6ec54271c3cf7fdd455e868a7fb3629a3863d3 kernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm 28034cc5908ef5cd30e8ccf0a9dff111d62b79a0d9728174ec936cf98147bcb4 perf-5.14.0-570.21.1.el9_6.x86_64.rpm b8810dbb99d0b2cf37be42625d957043148179741442a4a316b4e0d537373398 python3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm 55b6cbb63690ac1615fee0762c8e00a8004c4db078503779c043e2cdbb9d762a rtla-5.14.0-570.21.1.el9_6.x86_64.rpm 9dbbb93b2f9aa848f625ddf9a41c8078827ecf0d782d284d125c2292ff4b37a9 rv-5.14.0-570.21.1.el9_6.x86_64.rpm 6db77740ca3c829a33ee7c3ffcfa133e7bd64ad18d9aa0629e828c9e10685585 RLSA-2025:8655 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH (CVE-2025-4802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-168.el9_6.19.i686.rpm f396e2e1ec13fe70714486a95bac6d459cb35c29f8cae19d39cd6d4f1a074056 glibc-devel-2.34-168.el9_6.19.x86_64.rpm f61941a35a6f31960205f49ad7d68f0b9f0c912266412d55c419d99daeb4eb59 glibc-doc-2.34-168.el9_6.19.noarch.rpm 6819981fb1382dbe3f89143084641d3efc7f8694a161fed13d13f80858b701d3 glibc-headers-2.34-168.el9_6.19.x86_64.rpm cf7cfa0b639909058eaac80e7aadf9680f928ebc6b341189d5abbcd3b2d73652 glibc-locale-source-2.34-168.el9_6.19.x86_64.rpm 218e734092291e8129ae42ba30d97173b73a0c9a598408410be40cea4dcf692f glibc-utils-2.34-168.el9_6.19.x86_64.rpm 70fa71278caf6c501c7a903f3a7ec92f913ecf704f5bf2dd7d6e665eb7e0e257 RLSA-2025:8682 Moderate: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-14.el9_6.x86_64.rpm dac96c0d4b337344ea3178e9558ab5784c828503df685abef6d864011501fd58 grafana-selinux-10.2.6-14.el9_6.x86_64.rpm f2125fd611945f608ca16c242e084bd70a4b27e594791a3b3d3c7c9d052af8d7 RLSA-2025:8813 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm 77e034a1c5c5eda5f6d71c8b80508230283aba19d7c1847a8fbbb72689cb5457 aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm f567bc4ff922129ef20dd95084f99bc35d78bd62a254e7009cffe618411d6997 aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm 18f8b2f50a58ed7e65bb792684049e88aa4521ce5a637378d86b62b136866b0b dotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm ca5dfe7643f0ead9ca56c87d00e425dc8b10d12f741e23a11a9145b3c5e306e9 dotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpm 93d3de549a2a50d3c0248913bca06a49a18be09ff7559c1d2bf08751ef98ede9 dotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm 457d8c94f1d19a3fa13b288e1018a95700f6f4d1df24c9cadf9c68ec85f72056 dotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm ae61ac401383b20c86378bb3af9bbbee7b5bae220c656382abdbfc5be25840b6 dotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm cfa2e17b69335a327a39370cb6c87e1276fe2bc6a33196bc5e41aacc29afca38 dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpm db8b7079ce002144ade3c64dc77f9edbdbaaae8cd4dba9a039e9fe0d82f4bf58 dotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm 14615323b469e392998e718d42a9d39949681dede1b872dcc22f97913e73cbd9 dotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm 95c2cdb574afcf55f7d5403c493db56388ebdb616729cba128120be6904c29bd RLSA-2025:8817 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm a67c36b9bf049a8deeb74f24d634105df5efb22094da4f31b0f50b93c7b2fbcb aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm aff7b340e820570c9435daf2382363679fdf9606114a1b17baf3cf072bf42c29 aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm cb9d2c4053e6e3dce24b25f08edc4d736b3effb34bab580dba46dbffb3e48fb8 dotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm 710dbb0b16e1b6f770aac7c1f6d686c1ec80e070f8aaf2fff95f8cb922a40c54 dotnet-host-9.0.6-1.el9_6.x86_64.rpm abaf4a0fc840ba627f8015a3f35c35a903bc8707b115d056d4790cf2bc2cf507 dotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm 6a627751f5ec0b16bb1b198ba3a701503e502cd92a776f1e7b20dac24ca68ff4 dotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm f80b1dd8af6d44895cfbd45746cec26274d4444e629c1d097bb4a7274c2e538d dotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm a6ab5f0d9b7b4c51c2066696ea2b2ada20ba86545127b9cd5b34c7fa36c581cf dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm d602983480f3d307236305f1acbdeac77081ecf50af2f55cf8f3450d107b126a dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpm fe57d9af3eb1ce6e921d6688fc0e7d77da3ac867acfe402a84edd3bd02a18063 dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm 41410fcf56b0722494f17b201772a5e14df51c592165edeef044ef01d27afa72 dotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm 19e623e122ae426edc4988eaddd3e6766b91958eb7274f9974b11d34a84aae48 dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm 9e3ed1356288ba862d543eb5447716af0c1a8f8d037b6961db7a1932cb030271 netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm 5b365b860ce0631c93429b5e4d32498c98158b42ef2fbfaaf9b191f09681da39 RLSA-2025:8837 Important: mod_security security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for mod_security. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list ModSecurity is an open source intrusion detection and prevention engine for web applications. Security Fix(es): * modsecurity: ModSecurity Has Possible DoS Vulnerability (CVE-2025-47947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_security-2.9.6-2.el9_6.x86_64.rpm 899d04b91281d125d5629d7fa1816ccfc4069c95883b9de46b07d5898656c38c mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpm d7a7eb175cb0f44c2377b3985e7b451cc54f3a64aa0440938f2ecfbf35301216 RLSA-2025:8916 Moderate: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-11.el9_6.x86_64.rpm 24b75d049a044e2c7594ace021e39eea6f9d80ceaa0e3fe03c10c756a735b64b RLSA-2025:9080 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: eth: bnxt: fix truesize for mb-xdp-pass case (CVE-2025-21961) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm 4e6e58a7fdcab4a30da4415a1d045b766ba5cb247a110018568b8ad5da12a2a9 kernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm e7d660b7454eb370f7d1051de50d9262072ca8cc03b15c17f2760ed29b5fdb87 kernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm 4b387eb7c01b6fb7aa0e1aeb0caf2c73aabd056dc900359310f2786c776a0f7a kernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm a47ac8c5d31bea68cce803c135b8f292130582c2e4a39eb413b949ea1a561033 kernel-doc-5.14.0-570.22.1.el9_6.noarch.rpm 8adfed581b361206feda0e3c645f75e7862d2693a9ef78aaccdb480652653368 kernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm ee09614cf00133cf2e1d7304026984f28015dda7c8dea35680432e8f23b09f6a perf-5.14.0-570.22.1.el9_6.x86_64.rpm f59ff349d45cb32eb89c5dca5c2b34c1b9f9925c04506a4521245e5e4af530f1 python3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm 3615d1e019ca18fe38cb5369942421471e70c791d3636a29d9698cc21e6c8f42 rtla-5.14.0-570.22.1.el9_6.x86_64.rpm 8f81454c56f792df6c6dddbdab30fa9bcc41db420d85a189acca2533e5dfc241 rv-5.14.0-570.22.1.el9_6.x86_64.rpm 37c54f9b2afad73bc1f9f7ff28627f1577b5bb8a139cb699db97d3f1ffb04218 RLSA-2025:9106 Moderate: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.6.1-2.el9_6.x86_64.rpm 3a3d1de1d6fbb121cd2f64f8cc84795cda9a39c30183ed9e88a22df3522339f7 RLSA-2025:9143 Moderate: containernetworking-plugins security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.6.2-2.el9_6.x86_64.rpm de6ae579b12f3425dd89aaa04d7a4dc2a3e64d8ec7f7cde9b2ebf2e67e51981a RLSA-2025:9145 Moderate: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.18.1-2.el9_6.x86_64.rpm 691a5b08379567654a6223a609f25c0ee76fbeab01199f30fd5313ae5b1a6528 skopeo-tests-1.18.1-2.el9_6.x86_64.rpm b074e2a215b4854726bb67f778ecb46fb6b461909f05b8fc71cb4081657c8e34 RLSA-2025:9150 Moderate: gvisor-tap-vsock security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpm c35b3f5f224142c1939653e450f43fcb916c00819ba39674fc1b9ab17e0dc4c6 gvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpm 79e5ede43b27522d778d2568518ad1feb260fc5120b74520f13d0f45a5633842 RLSA-2025:9147 Moderate: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.39.4-2.el9_6.x86_64.rpm 5a07ff0e380a3845ee1015e50b46dcd0b6a8d129f4bebefc9040e8772fccde2d buildah-tests-1.39.4-2.el9_6.x86_64.rpm a66e63e88f83a56e15e25c08b76493c7bbe89aae1d554b01ae0e09894e030482 RLSA-2025:9144 Moderate: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.4.0-10.el9_6.x86_64.rpm 570e0e9a0635b37989f1afdb9119bd93a9b97e335a0f122b5894a05147ae74e0 podman-docker-5.4.0-10.el9_6.noarch.rpm 7003ebbc1e72a96cf3f163e19dbc3ae5a200795ec0531d26938e9a5c90c11088 podman-plugins-5.4.0-10.el9_6.x86_64.rpm 3fc2a6694b5f0e57794a8c90fa6a0dc6a1f0c66ac49eff8a2e72db9215f2b902 podman-remote-5.4.0-10.el9_6.x86_64.rpm f09b5663efc8d7c5cd717ed1513076c55bcfc7ac16b47af8e62a6cf67892e2c7 podman-tests-5.4.0-10.el9_6.x86_64.rpm 9e6af7a86f5ad6bd3af98fab98084eaa49e007bbc169c6892bd40be41c270acc RLSA-2025:9162 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: Multiple use after free in XCF parser (CVE-2025-48798) * gimp: Multiple heap buffer overflows in TGA parser (CVE-2025-48797) * gimp: GIMP ICO File Parsing Integer Overflow (CVE-2025-5473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-2.99.8-4.el9_6.2.x86_64.rpm 6db2a015dc2236f3dec2d23d97e0cb0f5d0b2a72d9db569a8b08dd60733461f5 gimp-libs-2.99.8-4.el9_6.2.i686.rpm eb35e98219cb3c95e417624824190b8f2fb15b3762e0a5f4b22e165bbe91760d gimp-libs-2.99.8-4.el9_6.2.x86_64.rpm df1676bb7610e86372de2f18ca06a0424c703bf211e91406160eff5c987e916f RLSA-2025:9184 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-14.el9_6.1.x86_64.rpm 85ebc7e09825e38c9f7283b8cff4ddfcf238bcb2d43f24eb044c011e315680eb ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm d8b3c05421c948e6dd2df02dad879f0eee666bd9397bb677bcc2d7c7e647f16d ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm b98c356d550bcda49b305da4a3194cc040701362e67ac155c77673e583e750a7 ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm 6ceb5894b89e7b2cce00a51f13824cfacecf04789f5b202d83a03379bd8488dc ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm d3f4514f1ea0670b252b79eb7408ea1a3151d536bd0ad44e333fd0d7cd019b99 ipa-common-4.12.2-14.el9_6.1.noarch.rpm c2b95a3cb55269394d2f4bae1a72e0f8348c3ce9702a572ee3ddaaccabbd853d ipa-selinux-4.12.2-14.el9_6.1.noarch.rpm 72b7eca48c7d2574ba8e280121bf101d6129b13646c19f4aee4127fb47465acb ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm 40b5bc109a50126a660ca78a0d52593c1979b308935c2c1d562328cb607fe56d ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpm 73bc607a6a1e97d7365bd2e58e5317ff1983f5e7ba996b625049c347cc4f0076 ipa-server-4.12.2-14.el9_6.1.x86_64.rpm 3e8899ed0903aca698900c3853cf207d9e09eb95c7a10ae66ca6657e8aa9b305 ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm 4f11e2913095f8bd89fcd0fd894058e4295ba109fc4f3ff49f964028a6d9ee61 ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm 155e50ce06dd343bfab509f8cba78bc028cebbe2b8ff0eaaf372e44f3d4b51f3 ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm 6e62900adcfc331f26fdfcabc86d258b48d22bca69dbc23f8c39c8ae79bd99b9 ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm b7a4be3bee200302de21b6324f29aa43b268469a9d49dad073d3f63c7db44946 python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm 21a66b7cb44d18012a6b387354d9cb77f4e84ed3b31d7d7b22fd50dfe3ade0aa python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm 91bc41ba9cb9820207ed92f7b024bf6154b962037fb660dc92756c489decce51 python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm 25da636a39d13af8eaf32e557adc0ef00510b67fddef8c3471f9867e503951de RLSA-2025:9302 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ice: Fix deinitializing VF in error path (CVE-2025-21883) * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: ibmvnic: Use kernel helpers for hex dumps (CVE-2025-22104) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm c4ef76894d67ec5dafdaaa55aa22625f93d5a189a0057007d2e78855525a86c5 kernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm ad1f4c9a79c1b94640a579547c80f072eb9ed24888022c0d757cfed9d504bc4c kernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpm dd3594be96a9e13254a8d0b265f73bf8afdc44176b1d85ced53e6c55fffcd5fa kernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm f67dba3b08339ac3c24940261935b83d01963b3b63fe2b540cad81bf687a93e7 kernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm 1233197b005cc8361a24551c55f28f236547542702a84b48433dd9ca6e3ff8fe kernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm 4856966c890f7cd762d3b801466c405cdff43ffb889adb4c63e70eed4f2ea4ea perf-5.14.0-570.23.1.el9_6.x86_64.rpm 371196c3d2ae046a13f20c430e1182fddaeab25fea0a7f9f641025487ea6f789 python3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm 1ff13b8167269dc5ee03c83f9f40a3da2d141eaf2c7071642dde97a3d8582cd7 rtla-5.14.0-570.23.1.el9_6.x86_64.rpm 3f6985e9f98ab66a027ce0623952f78e168206af1988319a8f7ec8e3d474941a rv-5.14.0-570.23.1.el9_6.x86_64.rpm afe3d9d93f9b97488891f0582d4f2fefbc23fa79bf2ea05e92124669254dbe80 RLSA-2025:9306 Important: tigervnc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.14.1-8.el9_6.x86_64.rpm f82f23cbd024888908a004d8b1638afab7132626bda112fb112e7885ece23bc8 tigervnc-icons-1.14.1-8.el9_6.noarch.rpm 326a61fbcd98cc3ca3d4476798aa4b5624f3f8a0e90ee4688bdc6a44b559e0ea tigervnc-license-1.14.1-8.el9_6.noarch.rpm 4d543b9315e054219e733ad00ae462afa4412364821eca9533f22a3033297091 tigervnc-selinux-1.14.1-8.el9_6.noarch.rpm 029df67ca1dac3b2ae587ada561edffc9baaf724ad146b35e169f98811a9da6c tigervnc-server-1.14.1-8.el9_6.x86_64.rpm 3b05b11fde044843992e620176c66663a9bb7c9158ae275d87e2e8c7fb22813b tigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpm fbdcbf3986a72a468038af72d7c2407d21cacce9b31f2d9bb3a3d553a80c7f7d tigervnc-server-module-1.14.1-8.el9_6.x86_64.rpm 7d1385a1b66bf614a157662f49e522e9f29fb9e3d0573caadb9e1a5526a2caac RLSA-2025:9303 Important: xorg-x11-server and xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for xorg-x11-server-Xwayland, xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpm 2769194fa83c423524305cfd5dd89bee68624f98728055fa7e63da3b8c7f849c xorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpm d0db41470d9225f522ec2b1544c1418c0ea069ade04d121178104848093545c3 xorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm eacb5ace4fc7f70cc9a8f84dd2bdd77274d582d8e70483759e6666ae4b1d0a11 xorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpm 0d59f3545cb3c36ff062169c5c5a8dc578e72e35c063c1ca57981def2eba42aa xorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpm 810d836c318e882056a249bc848392b7d50445ccb7cc328fb01ff4ac1a97f064 xorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpm f7d22c20fabbaf3991e364d795fe795838ac03145ff6f0272e6eca2a9ba030b2 xorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpm 7e3c9730f8c16bc6543b27dc4257498bbca4a7ef907e1c2e18975a0b484bb321 RLSA-2025:9396 Important: mod_auth_openidc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: DoS via Empty POST in mod_auth_openidc with OIDCPreservePost Enabled (CVE-2025-3891) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpm 68a2dd347069d3c7c55d58187b645d553ec3689da0dba6ac78644d836b0c5805 RLSA-2025:9434 Moderate: mod_proxy_cluster security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality. Security Fix(es): * mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpm cf832a33feb0b94fdb561a4115c2d61573bc37a68265c52437e0615979d09e87 RLSA-2025:9432 Moderate: iputils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Security Fix(es): * iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-11.el9_6.1.x86_64.rpm 91490360bc89fe0a0d9312122659ad354e324b2e062403694fcf00bc20967d70 RLSA-2025:9448 Moderate: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-14.el9_6.2.x86_64.rpm c04a146364338e290b0b8e9724b5d266d292a988927e2501abb4efb56deb664d emacs-common-27.2-14.el9_6.2.x86_64.rpm afd7622f0a6bbe1f51f1e9c05db6b4cbb6e958f0da476db415343972bc84ecf3 emacs-filesystem-27.2-14.el9_6.2.noarch.rpm 704dedbea837414169bc007e7713f1897e9438804b1bf2b04a4263a39f489ae4 emacs-lucid-27.2-14.el9_6.2.x86_64.rpm 9018fa3cf82f73380770932fbfb5b6722912f17e49b0f8956376d24fd813f5fd emacs-nox-27.2-14.el9_6.2.x86_64.rpm 04e2be717eae1c7f4dc8d83be4a7f6802c95f5a1163f3b224e6ec04ff40b9f3d RLSA-2025:9431 Moderate: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libarchive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bsdtar-3.5.3-5.el9_6.x86_64.rpm 51d5083a3317cf84d52ad57d58c3ef51201766d3516d884925f771de9115d2d9 libarchive-devel-3.5.3-5.el9_6.i686.rpm 1a62a1d5d9b6f02af3d33c6e9df258e8cae4779d529d5f7ccfe9b24cb1608df1 libarchive-devel-3.5.3-5.el9_6.x86_64.rpm 0d5ff338951fea18d6dab939929b37465f5ca94ce9644289870900ac5e058d18 RLSA-2025:9430 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.21.1-8.el9_6.i686.rpm 686404a7f75f5c32dc2ef2ab7cb48321079679ce3faa23f61441c52374e568b9 krb5-devel-1.21.1-8.el9_6.x86_64.rpm 683a9d5c341d47461bef09f406bb049b802bde8aa67cf5ed819e3d7516e8d917 RLSA-2025:9526 Important: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * linux-pam: Linux-pam directory Traversal (CVE-2025-6020) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-25.el9_6.i686.rpm 749a7442c52e6c1d8970e0987d9be442b6462279ef371a3406b3e9d036965331 pam-devel-1.5.1-25.el9_6.x86_64.rpm 099de5dbe670543d8d379e5764d711dc70da567b67818b2367985089c20e8a5d pam-docs-1.5.1-25.el9_6.x86_64.rpm 49d11290ba29fcb4404d4431cbb27d8e951d4b84bade49e4ac5694990b0d4317 RLSA-2025:9635 Moderate: weldr-client security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for weldr-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Command line utility to control osbuild-composer Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms weldr-client-35.12-4.el9_6.x86_64.rpm d42dd793c63173975f64fb605aa0592be261b16d25aa314e4107e87e596d9900 RLSA-2025:9877 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Vector register overwrite bug in glibc (CVE-2025-5702) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-168.el9_6.20.i686.rpm 9b6450448f80c6c24103b4e9b0b06bb49191c94dae565769195efb233001bb75 glibc-devel-2.34-168.el9_6.20.x86_64.rpm b9970da6a798e5b4694c4c6fa3424193a7c1c8c02eb5b0065d0c4fe9f61d50c8 glibc-doc-2.34-168.el9_6.20.noarch.rpm a8525ffd20bdee41772f4248ba8c29d5062af1d22f43baed85846b2a28dff682 glibc-headers-2.34-168.el9_6.20.x86_64.rpm ce0c5c4c56b9c6a2aed10f02cb3ae3ef7c3e5cd6e7993c54297d746433e4bf8c glibc-locale-source-2.34-168.el9_6.20.x86_64.rpm 41e565099ed189f9769c58880f7631da7d2e1f89d1780a976fef77c7abd6771b glibc-utils-2.34-168.el9_6.20.x86_64.rpm bf89e2a67d7153aefd62ef0324a1d1e2986ab5705d590b7e755c5cda77ba1fdd RLSA-2025:9978 Important: sudo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpm 61007814a8d11099684a061f5be354aa5ed6cd6d52d4084031d3ce3e294535bf RLSA-2025:10136 Important: python3.9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.21-2.el9_6.1.i686.rpm 54aacec5fafda54b23c118d0460d2d79d6e3e7c6052447f5942e87cf653ad911 python3-devel-3.9.21-2.el9_6.1.x86_64.rpm bf34cfed24cc76b150d82ecfc505d3de49701e15f329f6f3a651de7124966320 python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpm 60e3f13ae064a681a71ac9e619e80845382bc1eecfcf732dfb0cbe505560e58d python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpm 29eaeaf808f3d57bf296c7e4a27368a7d7d45e64835e867c96a998df798878f1 RLSA-2025:10148 Important: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.11-2.el9_6.1.x86_64.rpm 5f2de52518cb95a56338192de9ac0f080fce7b133299c1eb6a71d2a7de3d9da6 python3.11-devel-3.11.11-2.el9_6.1.i686.rpm 7ac37ca49000681dedaca2d1a525ef451cee57014b2723855313c1dd74512551 python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm 70ffb3182e64de41beccd5202b83be4e9611a0b9ab1a2845dc4978cc2fe9ca54 python3.11-libs-3.11.11-2.el9_6.1.i686.rpm d453834638df39158e86ece60a90088c618c07b29f6da5105d997eab8016ec17 python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpm a2615d82073368fc1e3527bed13f488a7886a9fd6c9274bf56a6a4d1e188d41f python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpm 1985e3be3db3c8c9e45dfcda23e2b09754c1313c56db8fc2c810987d2d1dc6b5 RLSA-2025:10072 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430) * firefox: Use-after-free in FontFaceSet (CVE-2025-6424) * firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429) * firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.12.0-1.el9_6.x86_64.rpm 082d976e8bca931d5b3c6cbe44d6690c9775d673303f3519cab1fe797a9dd921 firefox-x11-128.12.0-1.el9_6.x86_64.rpm dba43357f957263cbbe9408c057d9f0718b98f437c3f0adc9e6911d78956f870 RLSA-2025:10189 Important: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435) * cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718) * cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330) * python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517) * cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.9-1.el9_6.1.x86_64.rpm 6a9ea6e0eba6337493f426b0e20c490aebe7e6e0973a29c6c83cc6091f373488 python3.12-devel-3.12.9-1.el9_6.1.i686.rpm 654e35496d59dabaf303c89c08e3e08b5a987093f64ec70a0179ebe900499d02 python3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm 611e230df43470830061ab4ef26a36aa1f36cdfc379e07691c70f0f2afcea8c5 python3.12-libs-3.12.9-1.el9_6.1.i686.rpm f36ff708bf7539bb5704c0321bedfe93e7ec43495f791fb7ff3d1e9fde310fe0 python3.12-libs-3.12.9-1.el9_6.1.x86_64.rpm 019086a11177930e5017053ae0406c971aff40c390436e341a83eb38e5476e8a python3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpm a2ce46f29412befc3a430ef0735fdd6861e233d6e3c89625c049cde2dffdc838 RLSA-2025:10196 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.12.0-1.el9_6.x86_64.rpm d656db9dbbd39316e7af15b9f9a9d2c0cdc7cb548ad5d6f9c49ab26d38cb49a2 RLSA-2025:10353 Moderate: socat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets. Security Fix(es): * socat: arbitrary file overwrite via predictable /tmp directory (CVE-2024-54661) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms socat-1.7.4.1-6.el9_6.1.x86_64.rpm 323cf41b9f1abcc46d17b4d76b53d8285b1537b99026ade9354bb40dd27d81b0 RLSA-2025:10379 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004) * kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CVE-2022-49846) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm 72cda8c947ee1973ed8f8e0fc60308cdde4d824c198a67051626887e744364c7 kernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm e9e3aebd0ebb91dc74de80adb474c68a7d1f424e0e8a2ce4b5799ef2b944e62a kernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm 4e562e797f12a312a41cf32be84b338cc6d62141e5ebdb86174bd703949d3002 kernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm ac1952c1d4295d7755731c4d16f5a6828da7b563cdd7179a4d15bca52862875e kernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm 6b805bf162237a12c8f4bf696d8194ba26e9be0d0d13ee234a3fbf04f52f9b4c kernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm 68179e9a95cb315d1a63ef55a692f398687fd834f594e2128d700bc1e75d10ef perf-5.14.0-570.25.1.el9_6.x86_64.rpm 306eee4399b26abda977521f1dbec65bd90817efa80e1fc49df6ed2795a605ba python3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm edf66bf5483b56bc444a734447454c72f6b652af21fce55de332e2dbbd8e6f6c rtla-5.14.0-570.25.1.el9_6.x86_64.rpm 1ccf0e6cd2c783899cc17ee5ffad20bda25c994b2ec21ea60893624b52515750 rv-5.14.0-570.25.1.el9_6.x86_64.rpm b25e6c565e2a4c36a0659207b75eaf5928bd57213a8f0392e6407171cd22784e RLSA-2025:10550 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: podman missing TLS verification (CVE-2025-6032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.4.0-12.el9_6.x86_64.rpm 17e796f03d6e933ac02eadb03937360a1cd00efb5229d9219ca005bc367ead32 podman-docker-5.4.0-12.el9_6.noarch.rpm 8fcf88b01200451c4486cbcae10c03b4204cd5564ce7ef1e234d357be9c1cb88 podman-plugins-5.4.0-12.el9_6.x86_64.rpm 77a911dd09ad3b0ea2c599e81126c60fd75df7114b2c8edbcc122270ab264554 podman-remote-5.4.0-12.el9_6.x86_64.rpm ee34454869bb4ce52c009386426cb42e35a4ebdfd1bd4ed44c798e3494e581ff podman-tests-5.4.0-12.el9_6.x86_64.rpm 02d069fc5d0848e7f6ac08a24eede5da987eb3a3c94244a8d48818c58f764d37 RLSA-2025:10631 Moderate: gnome-remote-desktop security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnome-remote-desktop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment. Security Fix(es): * gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gnome-remote-desktop-40.0-11.el9_6.x86_64.rpm cd8d8dd63a20104315cd59d8179a8456137a8cfa3ac1263709c2c3210667d40a RLSA-2025:10676 Moderate: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.24.4-1.el9_6.x86_64.rpm 4136a1e6c91834106e3605bc482a32ece64624b2a0fe484c4ca64b51e7853363 golang-bin-1.24.4-1.el9_6.x86_64.rpm aefc3c2b49d2326062a631a2ef2f08557e277f7806b88f4b9972e89a5b7cb572 golang-docs-1.24.4-1.el9_6.noarch.rpm c916eabbda8a4ec8210627d97a1e336804cf1c8c138e183bd18102b564034bcc golang-misc-1.24.4-1.el9_6.noarch.rpm e3b2266a3d46532fdd95c24985f6da6bcb4d6db20166fcb5709ed4103c39b481 golang-race-1.24.4-1.el9_6.x86_64.rpm 28b3043e77660e9ea7bbd2b8081aaeab125c2fdf20580db7f60c66f2a30a8aad golang-src-1.24.4-1.el9_6.noarch.rpm fd2ee187abab1b104104649405affa5f4a869589d791035320fbe7fc1c3e00f4 golang-tests-1.24.4-1.el9_6.noarch.rpm f9d701f27902201950a37d5db89342e2718c6c5a0ae7737ccef4aa9a8d2b2c12 go-toolset-1.24.4-1.el9_6.x86_64.rpm 820b8f2ba73052aa82f5ba9f409f04921febb3076dbe6b0db91abbb6ed36a112 RLSA-2025:10699 Important: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-10.el9_6.i686.rpm c6637acd632a24a32f94cc4561ab3383c91ca3d3c681f86186d9fbb820ab0b2e libxml2-devel-2.9.13-10.el9_6.x86_64.rpm ca29633a1a0cf52f7599766a8734552791b858c7101ddae0cbfdf61ab4ccdc16 RLSA-2025:10837 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm 5b696072df243b888ef6f08952158397c254067d1b81e4f0aeb008899e897d18 kernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm 1d0b4b3758302bd07710a80cb0e330a2bf612006e94c68d9e29311c10abe4bbc kernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm 80160a2a453f7958cb3d3091469d0395eb03857d5ad0c544866f471374ad4aae kernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm 9ead6d2ea516d33da8c69326fee6ebaec0051610ea2a45a67b2dc34cdc07a044 kernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm 1b5869338bab22afd318e4526e9ccaf7632fd02a8d54e04c6ad8cf8cc99a4f7d kernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm 7561d6980e3c5cfbde7f615365e40b6a99f87e6226ed06128b36116a3ffc33ee perf-5.14.0-570.26.1.el9_6.x86_64.rpm 770464332c6e4eaee8adc40a705347b82affcb38bb42f7221dc0ef4514dac3ba python3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm e7ca30396634dc8b2275014949d3e9492ae07acbb3c9237dd3d0b32dc3e91517 rtla-5.14.0-570.26.1.el9_6.x86_64.rpm d264ecb332f88880db23a7f3cea85dc4b17ea776babb41ef7c171678f42358f4 rv-5.14.0-570.26.1.el9_6.x86_64.rpm 589533a9c58cd3351b588899796c93ecf6bade610cf9dcb89ba5fcb49853b85d RLSA-2025:11140 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-16.el9_6.2.i686.rpm df3352e9782cc871ef40dc35848aa9afeb2fd858a5c10ab057e35d652f4c5c49 glib2-devel-2.68.4-16.el9_6.2.x86_64.rpm e37bb02388a71e43ac7b14f0c638f136ea45a8cf15dc2a00a849be4fbbfcc42e glib2-doc-2.68.4-16.el9_6.2.noarch.rpm e4869797cc182ee0d95e30065f3c23bf4b4fe2a4dda2afa069978c428fe87149 glib2-tests-2.68.4-16.el9_6.2.x86_64.rpm 525fb273cda5d39fd1d2aed8992514d221c60a6aabbf8c0c5b2533bdcc756ff9 RLSA-2025:11335 Important: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337) * tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-3.el9_6.1.noarch.rpm 94de1841473269daaa3e15f4249f6a8c294ebc84c2afd58d085749baca3e196a tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm 7fb2a559086bca4b2203b74b5b306dd52f941f6b2be91cf1b8eb733c48e8d134 tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm 0d777f2100f9146c8beb4849fb5a44d78eadc6ad19ff86552eab3fde200ab3b4 tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm 3569323f4cd7d33ec6e5badf7fb37e9a16feceefbd594a89f658080705f5ecd9 tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm a19ab3f668dade931d7e7a47dae4e75e7eb1454009405e742ac191c91b433530 tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm 351679c4405bc7e04bc5976b4c9aefc993964e226ae18d16dd14b516a2f90094 tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm 283af920ec35aa38537737a022934cfb49afb0c44d8fef5776a85fe2e7e05c88 tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm 8a676b24296bce2a5a2bd2a5fa9f50847d1637a2d231fcc16511a7cee1c2b318 RLSA-2025:11402 Moderate: avahi security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms avahi-autoipd-0.8-22.el9_6.1.x86_64.rpm d1913daa435327ec344181da2ba4111aa7105fe21f8564e07ab9a89ee7499a80 avahi-glib-0.8-22.el9_6.1.i686.rpm 1aff371530dccb438ad0b8c33344c9d4724c84a3ff49c3018c8369696597d5e6 avahi-glib-0.8-22.el9_6.1.x86_64.rpm c98afa4dc365e9eaa3d771176cd5639edf1f148e3b67d00c95bfbf7bec02b750 avahi-tools-0.8-22.el9_6.1.x86_64.rpm ae6707245ea669fcd275c90683cbd0c1e6f289bead4d6dcec288078ffb1c9475 RLSA-2025:11411 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm 178266860ffa46e3ffcc33d07fa3363301abfab2a45773c8cbbdd75d3bf3a254 kernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm 1cc05bd0360848a411aac065bf79e2b37f83bd6265e5efaa97346d9cd3ba072f kernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpm 22284663bd205cbf8cd3b902fefdf507d2156b0a7fcba7e4c9431a42632ac0cb kernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm 6161d6ae8a074dfa2a6633f71ba75afbf93ddf9436ae4a7df993be6436dc0dab kernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm 3d7fbca77d14d28d79a139afa79a521ac42dca5a504f0bef5591e9ddbffe302d kernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm 4e441edf4b481e9169052874f9fc3c4cac8fc1f31ff9b546ec5f86c7b5da53bf perf-5.14.0-570.28.1.el9_6.x86_64.rpm f9f838690ea7058c17714febdf6b77e9c0d6242b6bcf94320a99ae4e75b7cc19 python3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm f17b3964fe73f4e5497d5314bdaf1191596eb30cd2e6ead88b271af8f392654a rtla-5.14.0-570.28.1.el9_6.x86_64.rpm 12acf46f1e1dec22866a7796dc5c9c8ec5cc8dc4b9af38a9ea438098ddafae20 rv-5.14.0-570.28.1.el9_6.x86_64.rpm 22ec0de8c6aa4e6fde0498a553716bb67415e401620d6ebeb4b52bdb8d1c0a4c RLSA-2025:11453 Important: redis security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Redis Unauthenticated Denial of Service (CVE-2025-48367) * redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.19-1.el9_6.x86_64.rpm cef2761a456ac665c816b4941ed3166c5be32dec5ba42daa68ad6f8ae9a3bfa1 redis-devel-6.2.19-1.el9_6.i686.rpm e2f01f6011db857142be236f1ab507c591795172f1022bd622366bcf3e9328fa redis-devel-6.2.19-1.el9_6.x86_64.rpm b9f857b55fe171760d1ccac7af201867efca7135e7e7f903736263ffae2039f2 redis-doc-6.2.19-1.el9_6.noarch.rpm 0ba6da97daf84f9d0dbd3ebd7b7a990b7d1c3114d4a4c0ff1323e1b37df74844 RLSA-2025:11462 Important: git security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: Git does not sanitize URLs when asking for credentials interactively (CVE-2024-50349) * git: Newline confusion in credential helpers can lead to credential exfiltration in git (CVE-2024-52006) * git: Git arbitrary code execution (CVE-2025-48384) * git: Git arbitrary file writes (CVE-2025-48385) * gitk: Git file creation flaw (CVE-2025-27613) * gitk: git script execution flaw (CVE-2025-27614) * git: Git GUI can create and overwrite files for which the user has write permission (CVE-2025-46835) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-2.47.3-1.el9_6.x86_64.rpm 7a05bec2fa13c56bd63ec2ded8bf370d9042373dc7143bc67ef65c9a78e10dc3 git-all-2.47.3-1.el9_6.noarch.rpm 8a548f927ef80c124804cbd8b034a48c3f87e59ee98f31020a37fbfcf420b706 git-core-2.47.3-1.el9_6.x86_64.rpm c6b707fbd78b1a22a59bb9822171b29f150272ef82d0a508c85047246828ce32 git-core-doc-2.47.3-1.el9_6.noarch.rpm 6a1e66bd009e013b396a8d7ae7e040f1729e31d4325ba8bc7925ab6e3f9e77c6 git-credential-libsecret-2.47.3-1.el9_6.x86_64.rpm 5b28edf325f7dd24018e4b6a0aa9d04c96b73a10d012a20400161e5c14109d08 git-daemon-2.47.3-1.el9_6.x86_64.rpm e6f3bb102756c5d25e9ef08ee41b9b3a7ad8176f6025c237d2213bd18e4f2683 git-email-2.47.3-1.el9_6.noarch.rpm cec5c49d2b36bb1fd532d50ecacbe4c9abf4f80dd867a369466cbffda0b62141 git-gui-2.47.3-1.el9_6.noarch.rpm b943351a56d0d7bd356cc75b6a002d5a0ab83a9a9568e3cbd48c9b81fb89fc45 git-instaweb-2.47.3-1.el9_6.noarch.rpm cc08120a65ee9a7f94793498511ed766335cb60ee1674e7aeaa22ae05dad4cb0 gitk-2.47.3-1.el9_6.noarch.rpm 65b2dd02708ea13fef1e1bb9b41e7292d0f695b473216da57f8a8c9ba9d5a977 git-subtree-2.47.3-1.el9_6.x86_64.rpm 4860c9fc8b50660756d42f9958ffbc97b5985aaaad2d0abc8380852005df9afd git-svn-2.47.3-1.el9_6.noarch.rpm 992c4af350d88ce3274192142d9538485c0591ec76e87c39ee604469e81bac5c gitweb-2.47.3-1.el9_6.noarch.rpm 52734f6cf2c6be05896be49897322bb82f45d2bc1722bd0b1ac3caff514db4f6 perl-Git-2.47.3-1.el9_6.noarch.rpm f11164530c410e28c1e60d725ee3390e4962f9ceeea77f409b1428626b6fb0a7 perl-Git-SVN-2.47.3-1.el9_6.noarch.rpm 3bd83b3d5ee41d48e414ec7e458f31e6b4349e630fd0955572d93f0cf3de0671 RLSA-2025:11463 Moderate: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpm 682662cf25655f43c52051b05f6441e283d6167eb992703ce89c05b7d97d92d5 fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm 4fb158444daa3ff93118b484382efe7e4d1dfc3e8ec268db6a9f938d014baaa7 fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpm 25331aa18388b56570fa1ac820ef5301c5332686165ab9eab0233a57f1e6a9a4 fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpm 6f66f773d437fe07d819b445c17fb646a9e9f53a47cdf640abd011f4042ebc79 fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpm 2ff63fbcc8bf684da6502351d9b7bae885b56d90b1b4fddc0b78ae0d43e544eb fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm 78d54979617114b70481fd391b532f2aa68aa41b7110c9a1de891be64e7499b3 fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpm 476fb76ebca56a67aee55ec962adf4c6338de4195da1d505e1dfbaef423e57cc fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpm 9d600d0ee46cb3d59716546c19666c524234853ad334ef2c803fbfba91098a3c fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpm 23a5923ecd9f78bccda9c49e62b8b23ff51abc726377d11f2b2b1be3c8a6429f fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpm 57f720dd4fc924f75b3381bb7c979ef6e440df3db27fc025833d749663761760 fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpm 7cb5736477cf9a59ebe517b0edae3b7fdb562c58114f7942cb64d0c1652a807f fence-agents-common-4.10.0-86.el9_6.7.noarch.rpm d55c1b8fa745c50060cbb397cf8cd440fe5b5d19ff7f49ed956ba8a43c69a661 fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpm c43e5b2e2a5e72be2033b94e0db893574959468cd9036574b97768382a8862ae fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpm c49c1b649a0b61086c376398ae66a4d8aa024b68c250fab7149c821518ea8a6e fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm af87ae51f7872ed463fb1d94cc7e4384a29c3440325796bac3eb5b02bcf34abd fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm 10188a3dab99af65c4bb69d2ae3ecc8973caca987d20442e90e2c110ca813cef fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm cf6adf674ff8be4c890f068eae63600b0a4d9c79711a2cc60eb38e9340ebfc83 fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpm eeb1a9bd6e7093b3e3ddea5f48287beedb6ddc41081b0a8900ea253e9bae5efd fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm e1ea4693fdb872282132a6d93c7611c6ee07c34c29550544ab04c8046950c1a1 fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpm 9ffd2944fca70dd18ab3485154b59d14ce9091cd460977d5a6d6263304bfd859 fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpm cee62c3a67d22f1816bf4f189704c3640f8c041a0442c90084b545d2b378b8b2 fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpm 56b51f45a137baa28aaa571f7643c91c7b8c3cad5b691fee96c8242e242205f4 fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm 280a3771efa18f278b88cbff4a1a3e2d460ef0be4a288e29269c67d550f58b56 fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm 8cd787bc5d7113bccb48cc88b861814d2d935c0f922906c2f4ae78b8a6085cb2 fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm 2eccc5d9afca8d3b0f418a567395c71fc5ff0b421dd9deb2a6cb0a2d36de1e32 fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpm 1eb1396ce781523b28e695cf9bdd90e2f418a636fa1a34a15131c7955e6a1898 fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpm aa1540668af39d0a8bbf965a9f6fcba7ea48402362c96058c0d040933b031536 fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpm bfe56111ba561a63b90af07d5e7e4da9733e96448eebbef2c06785910b7f41c1 fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm 6a401a1c950110ba43681a8d562defffc459027f0cf915121a1397dd38a776f6 fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm 30c0933d35fecaca885c12b972102d3c4dddebffa3181134a1451a7924d01590 fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm d7aa5fc77ccf09bc75f5de4708c81c33f8df2294c46675c646a7cb8af6e07d9e fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpm f11fb4b05247441ef8aaf03720797289b949591906dfde85a19d10b2de5ba34e fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm 7a587ad8ee0c4bc6289d0a5446e6ee70aeac5e99c72a7ef331628c40bb234d3f fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpm 632522632082fd75bfdf82c589512faf56a1e46cc22e8e118b08e64bd43f7b7a fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm 08166307003207aa39ec830a02f7c21804a1e8612b3f21a1eb4976b79687aaed fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpm c9d362f075d5eb39b5d6d89a58968c4abd43aeff9b2e64411cb211e1f9a267d1 fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm ffaf78221bc1bcc68e395362aaa0cf0fe20b45fcb591d2a49068205190ffdce5 fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpm 145e20c95618d13c0cb9f04df268dfa1d9a71be4adb2c191d0e2b30d279e2d53 fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpm c880935bd2bd030f461fa77a6907360b3fa7008655f6ef356ee0e9b1b923e38d fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpm ff2abd9baf2d43c4d1a00d60a5ff469aa9196353c62d2fcbb3583c738993a33a fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm 0895ad1def945cc932bd0087bf3993239b9e5b508b4b78cc3cf9593a02d8e465 fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm 6f60b107f590be0410b5abe171439788ffdd853a47d89f783dc04119261606b6 fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm 16e588e8332ac4a226fcd40a1a3ed9f966911b61d7609ea53bfce6fa5469da28 fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm f749878ea856056877ef5b757d7b60597425cb84b5a37d9c2fe3a71f2825c9ab fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpm 33ac0808e243a0d8750e939dc0196a9e6a68dd6cbd6e8dad5ca93e005887601a fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpm 5acd01c918c9b94c4f1acba04591732aa0d4a0cfb80a36a4395f890ec0a77e3b fence-virt-4.10.0-86.el9_6.7.x86_64.rpm 3939e4e7c6162cfedad214b174b7887b7e7c5e3fb3706560da8b9dfb0d614b5d fence-virtd-4.10.0-86.el9_6.7.x86_64.rpm bfbaf6ca332720a910b6471802d9db9e1dfe0bf050a19f127f2d43e980d88c68 fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpm c8a483fef393b8ed8427367a602ed76f80a80173176463fa769183f5e20925b5 fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpm f0db55186e2f9117ea0cfa349c66bbafdb38e31b2710f9d7956c7f8749020fe4 fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpm f8368b2d6e3beae35bc376421728a02b19f91861ac3fe627e79a215a33a36155 fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpm 1c6d4589f3514f072f76124b329c28efa03685a9045354161bcbf0dec4d56f46 fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm 60a0107114a1a82742684fc3f3722c6444f4fbc15be8bb83b4cba2748efb76ab ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm cf09b12657246692e43b4d1b581d0bf3f8652d9cf1f4564bf3d1ae03fde26b61 RLSA-2025:11748 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.13.0-1.el9_6.x86_64.rpm a1fc7cd608895cd2e8930a5766d4364beb87e128d91dfa3ebc104fa1d7635a45 firefox-x11-128.13.0-1.el9_6.x86_64.rpm ddf256493805451ad80fc1d7ecd0120b35f246a811397ff586bfdda1ff4f0297 RLSA-2025:11849 Important: unbound security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbound Cache poisoning (CVE-2025-5994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-19.el9_6.1.x86_64.rpm e6fc3a26be26397224df482cac3588a09d1d3017eefb6bf2833cbb75538d1945 unbound-1.16.2-19.el9_6.1.x86_64.rpm 95314d02bdcf675992d0e4b059ed7b374f0eeba6683ac631c851845359e2d8e0 unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpm 7336b73a354d308523231b3b0204d7000880be3ef086055872e47ebba5d9550a unbound-libs-1.16.2-19.el9_6.1.i686.rpm 6571e7dc32cc792450ce88fefcd1ad55d15b315f5a714657aca0bd079664e009 unbound-libs-1.16.2-19.el9_6.1.x86_64.rpm 908c2c3fa087a20949fe3ebb18d981871ffd57de2a8f1e6adc9d753ee7f22ef1 RLSA-2025:11861 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpm a7bc53b0cdf04f6703b4b2a715dcdc689761eabf7b963295184f7e5244d1bd9c kernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm cc62ffe1bafb53319905ed5ebffd45caacbe11b1a2657cc0ecefb70219e708df kernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm 0ba9f27ce2ba51ce02e48794b503cd7ccec372fc76cc7e2c92686c42db310151 kernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm cff8f57bcbe4578568dd454d0a68c565e1065d551fd2c492f66dff82d3cad4ae kernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm 7c8965292f743b859fecd8737357ca3b235eb54fdfb89ec398a0f840b7aae2b3 kernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm 53e49b315557769b94f83d680eb57bc04b1fbb81597493113dd7d385c2f9c74d perf-5.14.0-570.30.1.el9_6.x86_64.rpm 390694b6eea1a2e34f4a67171a8d9c97183450ff9d3d94d11b0c3270622e1e00 python3-perf-5.14.0-570.30.1.el9_6.x86_64.rpm 07a421a5ede48cfa3868e75a312cc79f3c8f4bd35c62856de4584a00a4af7f4f rtla-5.14.0-570.30.1.el9_6.x86_64.rpm e355afc46525109109c405a994dad2f0619c3e51a616dde3f248cb5e6eb456b1 rv-5.14.0-570.30.1.el9_6.x86_64.rpm 52df07c0a6b4a70fc041aae61e50ad5cee63e3a3738064645d3cb8419b2dcaf7 RLSA-2025:11992 Important: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for sqlite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sqlite-3.34.1-8.el9_6.i686.rpm 8999f0785fa134734114c15ed0fecea4e4841530b7f1f7bd81a9212a2896d24c sqlite-3.34.1-8.el9_6.x86_64.rpm d34118d36ccb0b1c046648ac7b3267063bd48fb153cb0fab86ccf009c1abd95c sqlite-devel-3.34.1-8.el9_6.i686.rpm 2aa6065ad68afd56a2225d8d9b12e6f4fd50c4fa5ba051844970faaf4ba48436 sqlite-devel-3.34.1-8.el9_6.x86_64.rpm 30251661c577109fa75112d87456b7982457897e0286bba4d04200e795f830ff RLSA-2025:12008 Important: redis:7 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.redis, redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Redis Stack Buffer Overflow (CVE-2025-27151) * redis: Redis Unauthenticated Denial of Service (CVE-2025-48367) * redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__redis redis-7.2.10-1.module+el9.6.0+32323+e27e860a.x86_64.rpm 511929d3c98635d03c1e2de186a85130badb376885c2f39d211d4191769fd1f1 redis-devel-7.2.10-1.module+el9.6.0+32323+e27e860a.x86_64.rpm 7788c34998c626212eb0a62ab48c071e2463fbb8ab8c6440f7401457aaddef70 redis-doc-7.2.10-1.module+el9.6.0+32323+e27e860a.noarch.rpm 2718000402d335cacb7da56837e469cf0f288d144e7f196cbb9f863e8a641068 RLSA-2025:12100 Moderate: libtpms security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtpms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines. Security Fix(es): * libtpms: Libtpms Out-of-Bounds Read Vulnerability (CVE-2025-49133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm 267ef5d09887f2198b43def80b90b5b275c997d4ec47109823d59f7cdef81c51 libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm 3c55f43d5fee8b28881aed928e9f89bdfb237bd59ebd80d3e0b12826642af950 RLSA-2025:12187 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.13.0-3.el9_6.x86_64.rpm 3c031376d802617b6779501c6a6f23a22c1bc5f4712d31f169a6cb321b36ee99 RLSA-2025:12447 Important: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr (CVE-2025-7425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-11.el9_6.i686.rpm 613e35294246cca37892f62ca55375768545181b09d8e94b212c46a65acc7c94 libxml2-devel-2.9.13-11.el9_6.x86_64.rpm 0d240dd56b30f180bc89c7c92b4629b24882d633ba37bcf050b6aa80dcff18d2 RLSA-2025:12519 Moderate: python-requests security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests+security-2.25.1-10.el9_6.noarch.rpm 510f88286997a56a52ee96ffc8a01745ab8572fd52482d4239628269abfb6c8b python3-requests+socks-2.25.1-10.el9_6.noarch.rpm e39c48a7d41bb8939c3999673ce0bf3983d50b9f55111cbe37bdfa9c2c45f9e5 RLSA-2025:12746 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpm d344640e039a06160ef0aec3aa483f15aaa83e6742e9fc6fae0911b87044a6f0 kernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm 6ac7ea3177bceba3d265d79bf6c8d0a595f18675b358c640c181e2a4babc4b90 kernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm bf532030a3aedd4c2a094ae3943baff08bc3e57831a810dfdeb965c4116684fb kernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm ddc3f812870c4981c056996ee0e07a5f5121a847a41eda1bc1a06c1b02e10c88 kernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm 3daf6cc4889a26cb024081a6c1517eec367d14ea2e207539b661b24815c881ec kernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm 8e3243e764e21094da46d3fbf8a8069543595e6ffce06fca51577bc4efa45151 perf-5.14.0-570.32.1.el9_6.x86_64.rpm 94262a90ce41fb9cbe328cf7af4a0c3d00c7f41332555c5a360ae81bd8dde71a python3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm 23b90cdd94057bb6a2e91aa4f2f27fd90ec7fab09289b8f1359b7d8826b7b503 rtla-5.14.0-570.32.1.el9_6.x86_64.rpm 33874c14e13a7926942bb915dd3b620fa56e2b7c8e2419cf35aa3d09f9f75ce0 rv-5.14.0-570.32.1.el9_6.x86_64.rpm d73b26faf4d82b32b2859871791d2ce3dc9949438cf534dd627d07c317e9932d RLSA-2025:12748 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-168.el9_6.23.i686.rpm ac614e4bb853a33e0195ddab3bd186d14cebeff83f91d281da6c6ca6f068a12f glibc-devel-2.34-168.el9_6.23.x86_64.rpm 3983e85ea3cc6a0f06fa7f4381206a6c03a16948d97b1acb4dcbb6aa62995e28 glibc-doc-2.34-168.el9_6.23.noarch.rpm 8c9d30c11fc44c3c4cb1dedbfe889ec91fc4197620f873a8444c2f64bdc5582b glibc-headers-2.34-168.el9_6.23.x86_64.rpm d2c4a0af7508b705e9b35e15676a950e906064cf57ea83204e4f10cf634a7978 glibc-locale-source-2.34-168.el9_6.23.x86_64.rpm de90f8f34a3186ef5dee29d09d0cccfeac4e1da91b651bb93398a19fa4f34475 glibc-utils-2.34-168.el9_6.23.x86_64.rpm 21aa011a2c72c18801ea8f6686a7e3bfc7a5cc897f4a4b83e1a6ba047dbae28a RLSA-2025:12831 Moderate: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.127.0-1.el9_6.x86_64.rpm 03e37c05945cbd3fcfe58ec2e8523ee38d81cc01f8d0451c00fe803c65b23a86 RLSA-2025:12834 Moderate: python3.12-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-setuptools-68.2.2-5.el9_6.noarch.rpm f908cf10d4c76eca8e9a720a7a7533f9ba097a49d5bd47b096dfd98087109348 RLSA-2025:12842 Moderate: qt5-qt3d security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt 3D provides functionality for near-realtime simulation systems with support for 2D and 3D rendering in both Qt C++ and Qt Quick applications). Security Fix(es): * assimp: Open Asset Import Library Assimp LWO File LWOAnimation.cpp UpdateAnimRangeSetup heap-based overflow (CVE-2025-3158) * assimp: Open Asset Import Library Assimp ASE File ASEParser.cpp ParseLV4MeshBonesVertices heap-based overflow (CVE-2025-3159) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-5.15.9-2.el9_6.i686.rpm b9bd6c3d2ff4faddb31b8926da16f2153fb15c98ded00f5906210dc6785f333f qt5-qt3d-5.15.9-2.el9_6.x86_64.rpm a90a835f8cde587b32fa90be5239602c1d2494a505062aa2d4bb80389b144ebe qt5-qt3d-devel-5.15.9-2.el9_6.i686.rpm 94478ffbc93ca6d4009453a69c82b0f8ba853fcd8a906dfbae496d9144854d7c qt5-qt3d-devel-5.15.9-2.el9_6.x86_64.rpm 79bf258f5b07ae8830a4be66be33f60f84816eca252d8380b0b857acb2b3e085 qt5-qt3d-examples-5.15.9-2.el9_6.x86_64.rpm 9319df1369e8e12bd70d3a71981667386b6157fadc3e890094369a11707a7dc1 RLSA-2025:12838 Moderate: mod_security security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_security. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list ModSecurity is an open source intrusion detection and prevention engine for web applications. Security Fix(es): * mod_security: ModSecurity Denial of Service Vulnerability (CVE-2025-48866) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_security-2.9.6-2.el9_6.1.x86_64.rpm 12c6f3219abe349657d62593feb4cb6d0c6c27f7eb1afb421f94eb61e2b77148 mod_security-mlogc-2.9.6-2.el9_6.1.x86_64.rpm 90a2b35b16118853bfa793f294dba5cdeece715d4bf9f904af987cac64071762 RLSA-2025:12876 Low: ncurses security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for ncurses. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: segfaulting OOB read (CVE-2022-29458) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ncurses-c++-libs-6.2-10.20210508.el9_6.2.i686.rpm 6a01d50c96d864c143748b923ba13566a49290ea404814da53c712d51614d68d ncurses-c++-libs-6.2-10.20210508.el9_6.2.x86_64.rpm fa5a49da273abfb282b89af90d5ef351abc7836b95ac420032eaac137105b785 ncurses-devel-6.2-10.20210508.el9_6.2.i686.rpm 902c1239be46162f9b64d0baf3ab2f9063645997aed74b66071676922297b0f9 ncurses-devel-6.2-10.20210508.el9_6.2.x86_64.rpm a905e634c2e34c88c179f0476d2a93bb7eeb22738cb3288b2607bf85657bb235 ncurses-term-6.2-10.20210508.el9_6.2.noarch.rpm 6255fb9c123d0445dd0a868a8592418dfb000a4225ac6f9ecdfeb0d07078ffbe RLSA-2025:13578 Moderate: python3.11-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-setuptools-65.5.1-4.el9_6.noarch.rpm d10d97c303e3dbda5c2203958f57ce5fea59496f294be48d684ee28228927d59 python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm 64253f855af60fdfe2bd3e206ff27796a6eb6512c28ac795d7f4b161b8a15d44 RLSA-2025:13602 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm c62187dac1d80c13b7ae0f0bebf2cee2959f771dbb35f04d5aea78d3a31a6dc8 kernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm 490d28273cb22cc4cebac1fce4f6b797659b31c1ab684364837743b4f43166f5 kernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm 3448e54d964e49cf80be63f337bb7a0da59b2ea4f22b6668249525686b0c2ddf kernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm 55d864689239671632ae1d874027363ccf74f31f308865ddb5de446c7c6e2bf8 kernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm 995470815ae7ec2f6b953bbfdb051bc604156d0fadb36be9a16a24e450d7a914 kernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm 1a59e39e099ef6530774eeff78dcff3d43de0632ff070496311d9337c72328b0 perf-5.14.0-570.33.2.el9_6.x86_64.rpm 82d0bbc952b19a3d71bedc7f56fe918a89aab02575b1d10a1e2c5334f5bbea94 python3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm e9e411124fd69df6b7f2413092035d6f04de9c25472c38a9fbccd98ef7a1791a rtla-5.14.0-570.33.2.el9_6.x86_64.rpm de162832b464dfe89bdb0daedd1f66ccc5ec32afbfd4fb5213a6b61c80bf7de9 rv-5.14.0-570.33.2.el9_6.x86_64.rpm c6e8e148261a62307c643dcffe2ab20c0f786efb5a9220fc9217b0a1cc5112b0 RLSA-2025:13782 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * angle: insufficient input validation can cause undefined behavior (CVE-2025-6558) * webkitgtk: A download?s origin may be incorrectly associated (CVE-2025-43240) * webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31273) * webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31278) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-43211) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43212) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43216) * webkitgtk: Processing maliciously crafted web content may disclose sensitive user information (CVE-2025-43227) * webkitgtk: Processing maliciously crafted web content may disclose internal states of the app (CVE-2025-43265) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.48.5-1.el9_6.i686.rpm 624d40d97a4c89396c57cacc98766098f5a8efd4e1ee3af0423a1a8975f49fe3 webkit2gtk3-2.48.5-1.el9_6.x86_64.rpm f355f1106719c3fb541f3cad33719aa8aa171824052ca4dec01cde06efbaff63 webkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm c38b63da482bc095b50e03cf7cba45587942563eb662c8a379703df68fc330b6 webkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm 5baf99ffec9e6c7b902b5f3febd1ac92e3c9c8ae9bc2ee26b0921dbc6c8c74f4 webkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm a778731086ed5f2e7a062ec60026add14f4b91ea1ce196e6fa560f2d3a060616 webkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm 1dfd7485757777fa11d4b723be5a8c1138f641236dd136dbf74804b913fdbb50 webkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm 88d99d3170236e6c4330379e1dd0dd00af06ba8585be7ee63d61aa4cdfc5934b webkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm 9dff981d8a8a9936930ef5f3a1d67f7e64dc4e0cbde8925a7f6d97af9319d1ee RLSA-2025:13935 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.24.6-1.el9_6.x86_64.rpm 5a2da676c744cd56a453f0bfbfb1cff55099ac492b70a2022fb1ec3ffd800f96 golang-bin-1.24.6-1.el9_6.x86_64.rpm 304a671fc8a1edc357efba5eb057b174e25637d62c73cd3a1e69937d5dbdfcbe golang-docs-1.24.6-1.el9_6.noarch.rpm 46da51d2cc933e55ddf1e8facec2bc1b2b159b55198cf566b3a057b183a50da1 golang-misc-1.24.6-1.el9_6.noarch.rpm 4b6f1ff239bbc10b64e060334b1448eb7fa0c97ba224395be9a86ab761d96f0c golang-race-1.24.6-1.el9_6.x86_64.rpm 9ca04779acaad7695f146f0b3f32a9488fee065c64adf848f4ab2b81570e97e7 golang-src-1.24.6-1.el9_6.noarch.rpm 0cc228cd37c7926aec40ab92b320b386dc6a4156e9d7d1dab94ef58de753f576 golang-tests-1.24.6-1.el9_6.noarch.rpm 414570068bd2184d7644d9835a1b903d1a25c86e2648af0daa2cfd0a05659394 go-toolset-1.24.6-1.el9_6.x86_64.rpm f0a9c52a4f0a133004a9f928c8468cb08000d27c647e679ddf78bd1faf7f24ae RLSA-2025:14075 Moderate: xterm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xterm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly. Security Fix(es): * xterm: Buffer overflow in set_sixel in graphics_sixel.c (CVE-2022-24130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xterm-366-12.el9_6.x86_64.rpm 4f041ee09626eaf9440437f206995606a2c176ff10e46c0bac6a83a09d3db309 xterm-resize-366-12.el9_6.x86_64.rpm cc0df8a1862cbf3275353059014e8121b17a878a5c95bd06e1b720225ebd0c41 RLSA-2025:14130 Important: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libarchive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bsdtar-3.5.3-6.el9_6.x86_64.rpm d0bd4211bf763367e0ff66df8d3299b634c7698efdb20219d7be5a1643a9ae99 libarchive-devel-3.5.3-6.el9_6.i686.rpm 93073cf957a4891be40a5a30bd3e47f8c047a35c42659d96f9ac4ce0f6ad495f libarchive-devel-3.5.3-6.el9_6.x86_64.rpm 148aecb52f5af876b455604d87c7e392370dd396f81066b0c0086b5ea229d75e RLSA-2025:14181 Important: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-52434) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-3.el9_6.3.noarch.rpm d670ef1257233d72c2a12c432aa9e1ed4871f8bb0f5a6ea0fb2b070482531b87 tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm f771414760153ca0063b92be29707dceebe621b450216f02e099b7b490d782bb tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm 86e15c3f0077c9f7c2fce9fef153a09c841b8fdc1abb7481276743ac1928f5f7 tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpm 964415d163315b2e2d096cbf8eba18a58fa807603e0308d9f6a49aa13ed9720f tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm 6ddf4243a04a5e7a043d4431f161ae024fa38e7765c1f0be1e6c46a90a90a330 tomcat-lib-9.0.87-3.el9_6.3.noarch.rpm 77caf8e71abd59cc6a3ee57fa1322b7bb826d6dbd47956b3000868fe2f6a33e4 tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpm bddca6d4f03f32d9c5c068d24dd30ac4603c9485ebf1a9791134e82ebdc016c1 tomcat-webapps-9.0.87-3.el9_6.3.noarch.rpm 1dfa042a8006fdcb1eb1035203b94fb339c986b5ef3f8edbb309e1511b7645ab RLSA-2025:14420 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm 75b4ef3f758af2c5a3a6937d72040c297e35931ea5feadb70eaca0f083110b39 kernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm bc40026aadd3a3ee2dd211db57447c3e79a7e266d572ef9de9e910c3656f21c4 kernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm 425ad56c91736ab2a520bed9f71faf36d2cbf5bd2c2e4e896557c539e07e3498 kernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm 768466fa48a0cdf04ad8f56056503c088705215a045fa6953b9b5a104633ca4e kernel-doc-5.14.0-570.37.1.el9_6.noarch.rpm 509dfc1a26fde59da9cb11b8f5fdc20d4dfd1a35e2b4672256cb409053e0a4df kernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm 50576d583c07f5c4ebcc4a26a7dd01ef0fc96ffe34003d49d0b06d70316d031c perf-5.14.0-570.37.1.el9_6.x86_64.rpm 1f0ece2c38417c6be5a0806833363457576a12c7336a27cbcaec913b5f68d494 python3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm 79440605bae82da31bf4e2147887ee20231f01bff0191f1ac976973850e6311f rtla-5.14.0-570.37.1.el9_6.x86_64.rpm f77a2df50a908ab7d608242be7fc26482ba32b7a3ec00c9d96a4f73b672c2184 rv-5.14.0-570.37.1.el9_6.x86_64.rpm 6414810e6727ccd15d8b5cb0dc3f0e1cc044e2c79a60890c551a6189c07e1422 RLSA-2025:14493 Important: aide security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: improper output neutralization enables bypassing (CVE-2025-54389) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aide-0.16-103.el9_6.2.x86_64.rpm a0a33d50ea9328174713d996ed39325c0ce01fa2e6aef8d932fd41e020ae0f92 RLSA-2025:14640 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.14.0-3.el9_6.x86_64.rpm 6cb96786ebb0bba554783b5157eaa3b83e770605c864fa49ef4c1f6c362f6aaf RLSA-2025:22005 Moderate: go-rpm-macros security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides build-stage rpm automation to simplify the creation of Go language (golang) packages. It does not need to be included in the default build root: go-srpm-macros will pull it in for Go packages only. Security Fix(es): * os/exec: Unexpected paths returned from LookPath in os/exec (CVE-2025-47906) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.6.0-12.el9_7.x86_64.rpm 65a99ba8da3428b4670ad9736bde9ffcd607f39d5152bf8c5bf3b308d7b585a6 go-rpm-macros-3.6.0-12.el9_7.x86_64.rpm abf898c6c1649395578a6f3e9e9ea902de0a4b92eac34cd8058260be6f508df9 go-rpm-templates-3.6.0-12.el9_7.noarch.rpm b0b3460dae4be0b22ea453a0b8ad78b6616e7fa04b6c2e24f15c62b0097364b5 go-srpm-macros-3.6.0-12.el9_7.noarch.rpm deeb0d7e59b0512d9113a18826512d33050a63a81cb8ff33cee64333e39d2c9e RLSA-2025:22011 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.41.6-1.el9_7.x86_64.rpm 0220d4c0f34bc8d78f3f1bcb829a36b9962bf822197e3c61cec9c3b9a1d9bd16 buildah-tests-1.41.6-1.el9_7.x86_64.rpm f96009dbec4b9df59b2571dbad9b522433d4179fb8786d01849497e99171ed5c RLSA-2025:22790 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS (CVE-2025-13502) * webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2023-43000) * webkitgtk: A website may exfiltrate image data cross-origin (CVE-2025-43392) * webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43419) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43425) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43427) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43429) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43430) * webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43431) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43432) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43434) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43440) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43443) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-43480) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43421) * webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop (CVE-2025-13947) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43458) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-66287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.50.3-1.el9_7.x86_64.rpm bd7e6ea9cb64ea7a2311d79a14f55d9b1b09fbeb99c5f98d1a18ac5f27b55cbf webkit2gtk3-2.50.3-1.el9_7.i686.rpm 517d35db1dca00d18834653dee4b9698cf39be182c1daea42a630683b3806f16 webkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm 22f91ceae53b0e1e0be8a0996bc7a605b8dcf0d9077f2a6896b6dd38ca24e2c3 webkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm 6681936bf2ad92cc85651f2f947a0259c0557e1003e823e2bc7fe3526a2bd0f2 webkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm 3544318966cba0b98b644f0736b342b81f957cad2c29d2d2a8d662c4a055e440 webkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm d0b5e7bd1785c2be7e26f453e96ebd100fddc0325c41c600e417d326dfb176c9 webkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm d16b0baafdace162ff95cccec45dfbf7d916aea01e19a595cef2dd46e8f2957b webkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm 83ffde1430bb39e7d6ec11c6d50dec396b79035ed822c96a76fdab716eab409c RLSA-2025:19345 Important: redis:7 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.redis, redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__redis redis-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm a8140f5aee16aefdfe9f9171b480710e8d242b5e9513634dffcdd29ffdf66de1 redis-devel-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm 0d3671460a711e0e07066da1e051f5f2e1a3d61f9ed95bde711edd89e2b961a6 redis-doc-7.2.11-1.module+el9.7.0+40013+17379f63.noarch.rpm edfb30c3ab26ceb7c9f4460ddd8bbeb5021b9ba468e7b5947e915fe9b1a954ce RLSA-2025:20955 Important: redis:7 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.redis, redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__redis redis-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm a8140f5aee16aefdfe9f9171b480710e8d242b5e9513634dffcdd29ffdf66de1 redis-devel-7.2.11-1.module+el9.7.0+40013+17379f63.x86_64.rpm 0d3671460a711e0e07066da1e051f5f2e1a3d61f9ed95bde711edd89e2b961a6 redis-doc-7.2.11-1.module+el9.7.0+40013+17379f63.noarch.rpm edfb30c3ab26ceb7c9f4460ddd8bbeb5021b9ba468e7b5947e915fe9b1a954ce RLSA-2025:23210 Important: keylime security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Keylime: Registrar allows identity takeover via duplicate UUID registration (CVE-2025-13609) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keylime-7.12.1-11.el9_7.3.x86_64.rpm 9e0be30dcc4952003bd2f8ed76a41a6fec9a974708ae5b9d6c99dabf285e464b keylime-base-7.12.1-11.el9_7.3.x86_64.rpm 77dc6aae65fcea47789b3a40a55553b9d5c6998eaa63cf629f61d136c19bdfe1 keylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm d46d05bd8ab48b4bb6be9ecce23c1a3a2841ada6750a101b8422f53b87b2fc7a keylime-selinux-7.12.1-11.el9_7.3.noarch.rpm 171548e63967ca90a9ca511c31fd827de11cc5288bd9030d00f19dd0b01d5e2c keylime-tenant-7.12.1-11.el9_7.3.x86_64.rpm d6de5d1a7fbef6783bcc46950ed4e263d663a63cb8585523d40cadff19604dea keylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm f1406989aea9670d3cefd5a4d69755e755634412ceee30e79b0de476a42b92f3 python3-keylime-7.12.1-11.el9_7.3.x86_64.rpm 9b5461b92e3a04fa9c1b66b8b23a7bcef6984c7ee224bf92250ddc9012c73cff RLSA-2023:5363 Important: nodejs:18 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs-packaging, module.nodejs-nodemon, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18). (BZ#2223313, BZ#2234404) Security Fix(es): * nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002) * nodejs-semver: Regular expression denial of service (CVE-2022-25883) * nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006) * nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm 0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51 nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm 40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a nodejs-packaging-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm 5626e9cdfd52cb85c80c45769f9fa7b5eb16feb5435d2749cb086502a6c50e07 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm 59a2214e1f16626ac268cb5d580550f3d2a44f26c23c2785e67d7cf0f33a572f nodejs-packaging-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm ea42bb2f12765d4f8f354dbaf9d20d4062d9c1a72c27bd9ff962b4351627899d nodejs-packaging-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm a447ffa0379481e069fb443c82c02fbb64f0645b0e323bf354782e61b90672e1 nodejs-packaging-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm f91999deba64a358c90f9339915613787dec19d739d82a9faa813225d0d40529 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm db6615e33bfe6f5b78bd377d6bec39e7cbc880a431ab3773ba86a902d12ab378 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm 299690af05d31bf16750d1df4e97458b1a6a2fbf8b47d9c1e2a81fac32f89d16 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm fcdd43a53c6fe19580ed1ed9516359cc3c2147297aebd066e34f56ad07d6a3f0 RLSA-2023:2258 Moderate: python-mako security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-mako. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mako is a template library written in Python. It provides a familiar, non-XML syntax which compiles into Python modules for maximum performance. Security Fix(es): * python-mako: REDoS in Lexer class (CVE-2022-40023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-mako-1.1.4-6.el9.noarch.rpm 2e6b0ef2eb5be41f982be6010d44cfd7d313763c4ef79041a2fc72122bd69683 RLSA-2023:2654 Moderate: nodejs:18 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs-packaging, module.nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (18.14.2). Security Fix(es): * glob-parent: Regular Expression Denial of Service (CVE-2021-35065) * c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904) * http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881) * Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918) * Node.js: OpenSSL error handling issues in nodejs crypto library (CVE-2023-23919) * Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936) * Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920) * Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-packaging-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm a447ffa0379481e069fb443c82c02fbb64f0645b0e323bf354782e61b90672e1 nodejs-packaging-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm ea42bb2f12765d4f8f354dbaf9d20d4062d9c1a72c27bd9ff962b4351627899d nodejs-packaging-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm 5626e9cdfd52cb85c80c45769f9fa7b5eb16feb5435d2749cb086502a6c50e07 nodejs-packaging-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm f91999deba64a358c90f9339915613787dec19d739d82a9faa813225d0d40529 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm 59a2214e1f16626ac268cb5d580550f3d2a44f26c23c2785e67d7cf0f33a572f nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm fcdd43a53c6fe19580ed1ed9516359cc3c2147297aebd066e34f56ad07d6a3f0 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm 299690af05d31bf16750d1df4e97458b1a6a2fbf8b47d9c1e2a81fac32f89d16 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm db6615e33bfe6f5b78bd377d6bec39e7cbc880a431ab3773ba86a902d12ab378 RLSA-2023:5849 Important: nodejs:18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs-packaging, module.nodejs-nodemon, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) * nodejs: integrity checks according to policies can be circumvented (CVE-2023-38552) * nodejs: code injection via WebAssembly export names (CVE-2023-39333) * node-undici: cookie leakage (CVE-2023-45143) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm 40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm 0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51 nodejs-packaging-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm f91999deba64a358c90f9339915613787dec19d739d82a9faa813225d0d40529 nodejs-packaging-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm a447ffa0379481e069fb443c82c02fbb64f0645b0e323bf354782e61b90672e1 nodejs-packaging-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm 5626e9cdfd52cb85c80c45769f9fa7b5eb16feb5435d2749cb086502a6c50e07 nodejs-packaging-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm ea42bb2f12765d4f8f354dbaf9d20d4062d9c1a72c27bd9ff962b4351627899d nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40017+f0db1785.noarch.rpm db6615e33bfe6f5b78bd377d6bec39e7cbc880a431ab3773ba86a902d12ab378 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40018+a011993d.noarch.rpm fcdd43a53c6fe19580ed1ed9516359cc3c2147297aebd066e34f56ad07d6a3f0 nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40022+9ecc286c.noarch.rpm 59a2214e1f16626ac268cb5d580550f3d2a44f26c23c2785e67d7cf0f33a572f nodejs-packaging-bundler-2021.06-4.module+el9.7.0+40025+0e0cf6b2.noarch.rpm 299690af05d31bf16750d1df4e97458b1a6a2fbf8b47d9c1e2a81fac32f89d16 RLSA-2025:23049 Important: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651) * tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-6.el9_7.1.noarch.rpm 2e1c372e9e3f58fd7b54aa4b1d96eb6141a2235bd4358ad80177e61991b22a27 tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpm 1b6a93a698ddc18d27a2f73466c3b385b24d79eab4d2a993c316c483a2ba8b47 tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm afdd45d89b71f159e26f9d197cc11b020857b4e7bb3015d2a57b781f23a72562 tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm fddf41cd32bab216681d497e3f66d1c9df5defe14a50f44e7dabfd6610fb3918 tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpm 3d6c323d1bb69b12cd165701c801633b8bea22d620dbeb756b3850790866fc5c tomcat-lib-9.0.87-6.el9_7.1.noarch.rpm 9177770ab9b0d9ba0f47a3fa0d929c380266a9fcd64f0189577e3404cdcd5d1c tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpm 33e1821ed771524308e21bb81d6a3185b1fd65e2c9966a004d392810a023127b tomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm 0cd0b8e9c548904ae9936ed1b71fc86d804bfa5eebc8eb4aace9cfea30a237ca RLSA-2025:23087 Moderate: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-17.el9_7.x86_64.rpm 26995445f31c4cbd1c555f17c73c0fab6342afb92d141e4b6b75f3857f3fd8b9 grafana-selinux-10.2.6-17.el9_7.x86_64.rpm c49b6a922f18d230702ff22afdabc33fa5c9e4d63714685036737d653cefeea6 RLSA-2025:23111 Moderate: mysql:8.4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mecab-ipadic, module.rapidjson, mecab, module.mecab, module.mysql, mysql, rapidjson, module.mecab-ipadic. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045) * mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040) * mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069) * mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__mysql mecab-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm 355af28fc740c2f9bd77e40daf39253b621b83defb0e47516246e5e2222ca44b mecab-devel-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm 97981caf9383f3546c68e18c5465ddc1b65a194bdf0bcf2d725e276a058b71e5 mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 7366b9dd824100c2130f78e43d9ef9b799f61934961736e3e1456abef4a3bf09 mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 3f2d04c54ece7fe5e19ac3bb076b4614722e37c476b38c80b3a6f1924325d9f9 mysql-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm 6faff4076091816ba68fc1bca98b46ee3fc234903bc6a2a00879f4ead04a8fb5 mysql-common-8.4.7-1.module+el9.7.0+40041+63d6250e.noarch.rpm 06b3f5a3ebcf6720f7448996ec95367fe1ab980c66d6d87ff6e2b3e2e32e81e5 mysql-devel-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm 09ffa96373d47c20280f7fd8d3fb7c99c638f7e4ddf0753ce602c8ce55e7eff3 mysql-errmsg-8.4.7-1.module+el9.7.0+40041+63d6250e.noarch.rpm 0f369aeacdb7198d858ba095e1e7bc1b25b1fdbe80777b333cd5b0adf17fa605 mysql-libs-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm c27bb017249ee5214db45e3c992b62b749afca2e41a37c4dc03d512215227e79 mysql-server-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm d946f69c0df75cd34c0d648c4819139c1b345327301f888a9adc9fe4621bec32 mysql-test-8.4.7-1.module+el9.7.0+40041+63d6250e.x86_64.rpm e03ea1e49e06a617830c65214b7e1a4b72f9255c572098f416a45fa19fcc3444 mysql-test-data-8.4.7-1.module+el9.7.0+40041+63d6250e.noarch.rpm a0217bd26e45b189628929a7571ce491cc3ba84a9a6af673d825b4b524df5eae rapidjson-devel-1.1.0-19.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 6401561c10fdd4e51de5661b88bac12d5a9e20e2f738f90c429c73eb3c4fdf32 rapidjson-doc-1.1.0-19.module+el9.7.0+40027+0df0d4e0.noarch.rpm 558fcd49446a50ffea6aa4b19088b8320790c540f80e469ff9a170af7e1f2a34 RLSA-2025:23142 Important: wireshark security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for wireshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * wireshark: Access of Uninitialized Pointer in Wireshark (CVE-2025-13499) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms wireshark-3.4.10-8.el9_7.1.x86_64.rpm 4237d8be67b7b83ca2bb4a360db98e5af624ed82ae39b87d4aa9eb68625a1874 wireshark-cli-3.4.10-8.el9_7.1.i686.rpm 89600eb3af0b682db091daa14f1c49f6f930dc279f64f451b68e2e69f7d9be39 wireshark-cli-3.4.10-8.el9_7.1.x86_64.rpm 31f831d8bf18c654d63e0167d3d768ba4a14fb04e7336e1a9199678ea83de6ac RLSA-2025:23326 Moderate: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.20.0-2.el9_7.x86_64.rpm 81a14f8fb44af4aa8b78a3cdb67e5a1b514aeb90fb6d79f7f6b52825dd88881b skopeo-tests-1.20.0-2.el9_7.x86_64.rpm 5f46770365a8088ff60ec31979577608a036b46192fe500792d86f8d027db4cc RLSA-2025:23323 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked (CVE-2025-8291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.12-1.el9_7.x86_64.rpm 2f1258a877e1bc4f1606b35479e1e736a5e98a2e6c61ce70bf2b5c3b3c8932e5 python3.12-devel-3.12.12-1.el9_7.i686.rpm 3143950b2d7a94a075fe6f16ec10cc08cfc7755f46f3120c45dc4f100be20065 python3.12-devel-3.12.12-1.el9_7.x86_64.rpm 7ba0ef6180c604f3a7e4fc19999877abd59e1aa9c46547871cac95e87424e172 python3.12-libs-3.12.12-1.el9_7.i686.rpm c3c6be8cab40058904d84e33471226c8f4be885d82401c3e6d362392ce884163 python3.12-libs-3.12.12-1.el9_7.x86_64.rpm c1626894a82a6f33a1ac082541ade1a6ddf10cc68edceb79e4eaa910b0700e48 python3.12-tkinter-3.12.12-1.el9_7.x86_64.rpm ba285256d52e48998ad61ce5618de18336b74111982d6b13b5cb4e148fe1845c RLSA-2025:23336 Moderate: gcc-toolset-13-binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-13-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line). Security Fix(es): * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpm 6fcae1fa9fd414e040379b30f81556e97a9bfd78d8cfa7e4f6690a5e2d9d4f86 gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpm b2ece3fbcc4bc1d3975bce3787694ccaeef5e0ead06e42956fb92dfc86b0c91f gcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpm f5009d61246d83e82773b0d99a0c7e8d0b1ba70c6de148d4eb99ba1aac9beecc gcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpm 11a8f1b8cae839516dce437646188eef75f4bab215efab68915055692f7bf089 RLSA-2025:23309 Moderate: php:8.3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.php-pecl-redis6, module.php, php-pecl-redis6, module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, php, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: pgsql extension does not check for errors during escaping (CVE-2025-1735) * php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix (CVE-2025-6491) * php: PHP Hostname Null Character Vulnerability (CVE-2025-1220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.7.0+40004+bf50a568.noarch.rpm 23fbb9f304bbf6e02897a8e614ed3cac76c8f8e18250a388284d9235ab90d674 apcu-panel-5.1.23-1.module+el9.7.0+40005+715283ec.noarch.rpm 7dd1ac343924f8c124aad5ea866231a2ff6b85bfd557fbd5468607e6de705b78 php-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 9c65d2cfc54b72c4c48fde09ae78c51a648e2955c7ea3dd37992f8670c183cc0 php-bcmath-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm efe73e62d7397c8baa1a283bb1febc515af00e942ce53ece21759234dec0353c php-cli-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm ebc881801efe86b2be589bc95e6ffce08bf45d702389b6174054e2d9dc83e365 php-common-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 50705dc0b7c765f19ca677f32d00e9ad946975ee3b8b0e4d19c5817b6658fec5 php-dba-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm bfc5e433a49e8841330c55c4176982cf1a708700442df8c3ed7f2be2d53860de php-dbg-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 82b9f55ab865b32512d694976bd9e2bd006cd7ea1d40813bac25dfefb8ce0382 php-devel-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 018e47070f497311bc1fbc5ef3a3d0b2398e7179f578771e88b1644e015f7fc8 php-embedded-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm aca6835cbbfad4b04bf08d73f0f994840d7ec266cbccda70d6b6c7f08760612f php-enchant-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 128b3933570d8d7bb0c99eeac042dbc67c0406cdbb11a136e68d61f55d703130 php-ffi-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 4e264e2cac7c360fb8b2e40f3380549d6df5f11b456b4db384c059ff6c645137 php-fpm-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm baa1fc78268a4ad353b93755bb7be99e8b4dcdcb848955f6895ef7d0a448c65a php-gd-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm b09093d8c74fa84360d35bc6cf118ef87f397988486fd163e65f69526121f7d1 php-gmp-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 748b271e1501b92f94c554f465bdb4a1fa677ec8f647b69c9b24fedfcc83e641 php-intl-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm c67234ddb299520eb19b65ecbfcb66e23ca7a8641649d1770a53bf9eaf84570f php-ldap-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 5e688eb0c66a2913e46124d3d31350d7bbfd0784dd1224a3e2ec1de041e5d246 php-mbstring-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 3638a91c97e9b4fcc767b87da6e4b65f83975e496fb30098bf2d284a34407b64 php-mysqlnd-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm b2611c30d6f083dc317a888a68a16f12dff9c7450a1972ef21720d9af358ab69 php-odbc-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm f5f7792dbddc8768932c7dddb239fd1bda2f41a84802f0aeca9c18f4c7cca985 php-opcache-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm fab409a1b901d335d02833208d87bc19d094c9cec84eb471a688dc99105c2611 php-pdo-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm b22d081d9f017682fc7bddf93c7b4555e0c948f6e201e7120c2b18ae9c10b346 php-pecl-apcu-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm dcfdd569de5e6ddad19e451d0bdeead0f30f500aafa4dd4d9e164b4170deeb88 php-pecl-apcu-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm c677509dddb11e0bd88160e9d3bc0e5c3a5c95eef153f2efae02fe2a74fbc173 php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm 18128edfe8947247823712735e2bf08347870ad4686fe37fe574a54060883e86 php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm ce6d8eb9d636d1a7d25f77eebab9bc34b0803050a8dca008f336718adeb35000 php-pecl-redis6-6.1.0-2.module+el9.7.0+40005+715283ec.x86_64.rpm 565e9e2ffbb1116355432195069ac83ebabeb146bb7609a5bb8cec4c1f999bcb php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm 969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm 547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm 0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f php-pecl-xdebug3-3.3.1-1.module+el9.7.0+40005+715283ec.x86_64.rpm 9284eb822657efa12e6fd0d10ee620810bcee59eb84954ecd598093bcb6276f3 php-pecl-zip-1.22.3-1.module+el9.7.0+40005+715283ec.x86_64.rpm 69d6cf54bbae7dfe848217065300e013f3d68f4a675214f32ade0362ecee5164 php-pecl-zip-1.22.3-1.module+el9.7.0+40004+bf50a568.x86_64.rpm 3d22b91542f7cf9f28440dc6c850ddbd39f76fdbe4c7a8ba3736e0f384c85ee8 php-pgsql-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 89e907403fdc52ee873c441a6c769f37e88a9856f8d4c658e3ca607122fc68a4 php-process-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 70e76a107d24bffbf3cd0c11dd1f63b401eb6b21303034b809253f168c2ac8e8 php-snmp-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 05559f469dc0e3c453e89996c8ff5a1aa4853491e7da913365858345d111855b php-soap-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm d83f877510d48551779a24baa7a43de3ddb83da438d2005ddb112629889c4dae php-xml-8.3.26-1.module+el9.7.0+40049+21bbec6b.x86_64.rpm 06b223358fdc813f1072501d27b567215b03b5439cd745ef3b807af4859596f2 RLSA-2025:23325 Moderate: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.6.0-9.el9_7.x86_64.rpm b283d59875591ad11c45e8b66023ab80c024f15de2dfead559186accff721ad5 podman-docker-5.6.0-9.el9_7.noarch.rpm f6e960d20d072677301ae8c6ba6b80f8ef6e52852ab68865fe3abece40dbbcc5 podman-plugins-5.6.0-9.el9_7.x86_64.rpm dc65be949012a481ae131526dfccb2e67d60d838eedd8b5ef7f7965d9866f86a podman-remote-5.6.0-9.el9_7.x86_64.rpm 8ea56c4c609bbf3878758461882d22dfe0da89530413cd6acfe485ca9b61798f podman-tests-5.6.0-9.el9_7.x86_64.rpm 2eac3b3e910335244f73ec463bac7f546fb6635504028ad0a3d409aa938f0d7d RLSA-2025:23700 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: webkitgtk: Use-after-free due to improper memory management (CVE-2025-43529) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43501) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43531) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43535) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43536) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.50.4-1.el9_7.i686.rpm aab0522cc03db92c2fa1995d5a1f4a1db01f4be611baec37d7f2bb7aea462896 webkit2gtk3-2.50.4-1.el9_7.x86_64.rpm fb69cfcd7f9e4429d7eff887d8e108789eeffa8e9546ac721133058118fa85de webkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm 6ae871ddc2b886f1e16584cf77f1c45f0b42b587063f5d87756a14613267cb8f webkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm 03554a96a8bca14bbbb220d06d453c63a49fe00308b96780f0a6e34c10af0c9b webkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm 72f7762c8238e8385ea81728d10783e5fe8054d9b83157dedae2092ca68b1419 webkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm 8eb5ad0d6dca21a198e09d50b198dc378970d1030925308b8d61cf1da7261b24 webkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm a56f3a8ecaf76fe217b02dc64117891376f624f1f2e5a4472abab410fbb3b0e4 webkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm 3a3b96272ca39f82ec5dd9a0bd2264ea43af39f71716ddcf50ac0f7ef7eeaf1f RLSA-2025:23729 Important: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation (CVE-2025-68156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.135.0-2.el9_7.x86_64.rpm f5d190b6e2853dbcf70ca3083f6f4a9badbf30f2dcd1c962e207052b2cbb19f6 RLSA-2025:23739 Important: mod_md security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for mod_md. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal. Security Fix(es): * mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_md-2.4.26-1.el9_7.1.x86_64.rpm 5d15fde88f25f14bdb80be64d31d9298ab3626c096119f63004267a9e88c6b69 RLSA-2025:23744 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * git-lfs: Git LFS may write to arbitrary files via crafted symlinks (CVE-2025-26625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.6.1-4.el9_7.x86_64.rpm d427a953ceb943302d824138d55e043138d03a426523a2e1ca944d0dc93b6298 RLSA-2025:23856 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333) * firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329) * firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331) * firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.6.0-1.el9_7.x86_64.rpm 913e02e42e0e668b09cb4213811ffa9a3b2c9866268e6fd4db9aada77ae382f6 RLSA-2026:0126 Moderate: poppler security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: Out-of-Bounds Read in Poppler (CVE-2025-32365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-23.el9_7.i686.rpm 0401d4d46c722824d87eb868e948bd8cca870290b7efb64bc25ea86000b05f5d poppler-21.01.0-23.el9_7.x86_64.rpm 95f8683f0fa3b6310840970e7e69eba25e8199b6dbefa07c8065400b50dfd570 poppler-cpp-21.01.0-23.el9_7.i686.rpm c7778eb62133c778b16164a7822cd3b196621678289bdc5176ae1aae98fb8964 poppler-cpp-21.01.0-23.el9_7.x86_64.rpm 4f8d10c78980bea2db7dfbfd3917c267ad20d882d9f5c65b495e5350bbdc665f poppler-glib-21.01.0-23.el9_7.i686.rpm 23d9b2efac4f94a62f14757c7cab5cd8bf5995ecd57db546e875dea9ab37ffb2 poppler-glib-21.01.0-23.el9_7.x86_64.rpm 5533c31b939ddb30a6b2e06560a4184433b981e5b0fad1cf7bb0b321c0c552b4 poppler-qt5-21.01.0-23.el9_7.i686.rpm cb5144b6f562f43563672aed9d16e8f813fa67c95887d420af25b7a2992f8c85 poppler-qt5-21.01.0-23.el9_7.x86_64.rpm b6ac5124fb80fe5c35dc7f983aee81008e019167493f257d4fc8fa5a921e5b99 poppler-utils-21.01.0-23.el9_7.x86_64.rpm 33eb74c32bf84c503dcef3068a71548a16fc6d9a041e1e19328dedc33edb16f2 RLSA-2026:0914 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: GIMP: Remote Code Execution via PNM file parsing integer overflow (CVE-2025-14422) * gimp: GIMP: Remote Code Execution via JP2 file parsing heap-based buffer overflow (CVE-2025-14425) * gimp: GIMP: Remote Code Execution via XCF File Parsing Use-After-Free (CVE-2025-14424) * gimp: GIMP: Remote Code Execution via stack-based buffer overflow in LBM file parsing (CVE-2025-14423) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-libs-3.0.4-1.el9_7.2.i686.rpm f20d74b8b473bd5ce2c1a7a5924440f1f05a6978dde56a7da0b715b673f38031 gimp-3.0.4-1.el9_7.2.x86_64.rpm 3e18579b40c8e08db126d7846b49f91e82ff88f845220069aafa16c20a6d0103 gimp-libs-3.0.4-1.el9_7.2.x86_64.rpm 048df70f5df3a0eb1c0d0fe2227a8914f6f847401c9cd3fccc984d9b201177fa RLSA-2026:0137 Important: mariadb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for mariadb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Security Fix(es): * mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mariadb-10.5.29-3.el9_7.x86_64.rpm 0d0fe87b514f27658e3c31eb08144a52a0d3cc5b7d836acb5296114face1d1a0 mariadb-backup-10.5.29-3.el9_7.x86_64.rpm da6f5b12a6f47b395595f748fa7ba7ac6eda0d6ac27176a0ac94be04f8a773dc mariadb-common-10.5.29-3.el9_7.x86_64.rpm 4cb95a5cacae7780a81499988c5026009b133ac497e05b9349eca7881dda749b mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm 0d3049bac4c83495e73f2fb69606fbaae03fd10764f858ce02bd7bfbf5872d7d mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm d5fd5ccb1e6cabb86083de52201ec7f1e54355dd052248e7194980c1a7e17801 mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm 4ba5c9f6b1850ec89990d5e667c52909103721302c20ef331145119415c8e009 mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm fc97005f22eeea8cb22cd5885e5620ba8608e072852b7fa7b055b97d3c06a119 mariadb-pam-10.5.29-3.el9_7.x86_64.rpm b0bdd7c79a6d78c21f3304142a0df57b4311e73737546d1a9feb02812c27abaa mariadb-server-10.5.29-3.el9_7.x86_64.rpm 6268685c1bc569794c076d6ab9b9d5ebc0895b956ab73c50dee17b47bae5822f mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm 775e23e9f288db751316971a6d4a26cb87161b6a395c126443d6085d3710ef12 mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm 7cd3d291e7ce8a0b4ccdef53f66145b82b5d17a815eac2c37bbf22baa9b84b43 RLSA-2023:2417 Moderate: php:8.1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.1.14). Security Fix(es): * XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454) * php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications (CVE-2022-31629) * php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630) * php: PDO::quote() may return unquoted string due to an integer overflow (CVE-2022-31631) * php: phar: infinite loop when decompressing quine gzip file (CVE-2022-31628) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.21-1.module+el9.7.0+40003+454ed3c4.noarch.rpm 7c802657f1b3292682e1d46e6d450d4922d17e7d76ef6ce9aba262ca6dfc4fd0 php-pecl-apcu-5.1.21-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm 64fbae80ffd07556f8b53b0a3a03e122eb34f0387eef2ba25f3cc7bae8ff2ce7 php-pecl-apcu-devel-5.1.21-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm d1dd9b8a344eba72b234331beed4b30c8385609cbd4ee22162f73350f3c89b2f php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm 969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm 547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm 0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f php-pecl-xdebug3-3.1.4-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm 10bc41548d43575a5f6e4fb9c78582e39d0d86b5ce785a71c1a7e2e595347c21 php-pecl-zip-1.20.1-1.module+el9.7.0+40003+454ed3c4.x86_64.rpm ae888f9f20b7dd17983e81c3afbeb2a851be93674f4020afd7d67aab1ef5d4dd RLSA-2025:23063 Moderate: ruby:3.3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ruby, rubygem-mysql2, rubygem-pg, module.ruby, module.rubygem-pg, module.rubygem-mysql2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * resolv: Denial of Service in resolv gem (CVE-2025-24294) * rexml: REXML denial of service (CVE-2025-58767) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__ruby ruby-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm 725991658a3e5545842cd58960ddb77571a3b85c014b2c779c089bf73c91afe2 ruby-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 54ea7839963519f9a8649bdc1445cef61cc86407addb279a51fb9bb82bd1cedb ruby-bundled-gems-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm c04cdce582e6b61090c8c09c69dd478dbf27af3f8ceb05fbeb5ffc36d0db88be ruby-bundled-gems-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 184ec7db88968aaddea8e48462ed3e165bf73bd42f15114c589d74406fe2b1a4 ruby-default-gems-3.3.10-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 7df76c08c224b7347c48c2b916bc0039ba7398fbc31ba19bf3284293cbe13614 ruby-devel-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm 18ce670faab7aa5fa5bb234c53fe71f398e74dd5f3b8a3d346f17458755a281d ruby-devel-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 6da1957d1f033e4a3c0ed17a25415619faa830c8a1cfa3ca6da63af055a33812 ruby-doc-3.3.10-5.module+el9.7.0+40039+300ba1ed.noarch.rpm e0d57fbf2f78f0c5813efb593b37feb71eeed02924090d943bcdba9e4c826d10 rubygem-bigdecimal-3.1.5-5.module+el9.7.0+40039+300ba1ed.i686.rpm fea8b4ca63fbf54e9bbd99a39628aa020edae02d76a564ee4967b68aa2134af1 rubygem-bigdecimal-3.1.5-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 66c8b15f2d0e3059deebfd9f66b627635d5bfb051da4535cbfcb1e658eb514b5 rubygem-bundler-2.5.22-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 0fcc2ff3c331a73bcd32398efde6adae340b2d6230fa98c4cea4ce6a81d90f1c rubygem-io-console-0.7.1-5.module+el9.7.0+40039+300ba1ed.i686.rpm c7dfc5bc4cfaf5297d21743f38eb58638484915da450689ee95c8453761d4726 rubygem-io-console-0.7.1-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 2403dd51f43a136d774e658fc3352239e17acd805a2d3275b703b78e9b8e0021 rubygem-irb-1.13.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 182be9c2b74e19f2df8cfedb2f38cffae6aca5cca95bb89e96d25a676f4d5315 rubygem-json-2.7.2-5.module+el9.7.0+40039+300ba1ed.i686.rpm 3b4180137d9788cf0ea86f06bb4e07bbe19e8598ac0134a2a3d6163d1ccc4b4b rubygem-json-2.7.2-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 16ac55e8f2f537d827bc0ff4c29a41a98cc48fc70338e457987f467cfee394a5 rubygem-minitest-5.20.0-5.module+el9.7.0+40039+300ba1ed.noarch.rpm cde14a425aa8eab123ca7d761bee612e4e445ffbb95c75425c2da15ba38c849d rubygem-mysql2-0.5.5-3.module+el9.7.0+40032+36e56d0d.x86_64.rpm 12386cd4087a36ccae44d254d83be0174df90108fb328fcda17aefc2da4dda1e rubygem-mysql2-doc-0.5.5-3.module+el9.7.0+40032+36e56d0d.noarch.rpm 27dee8ffe3e20f1f7dfeecb399e59d76f682202ed4ffdc6741098ba31eae8607 rubygem-pg-1.5.4-1.module+el9.7.0+40032+36e56d0d.0.1.x86_64.rpm e3fc4c8e40def16c01ef2052af6586bfe4fd31d73db3bc2656ef5d60817d1854 rubygem-pg-doc-1.5.4-1.module+el9.7.0+40032+36e56d0d.0.1.noarch.rpm 2a7b022ee1658df67fecb3a796730677aaceb1842bf2ebe5201669492eace93e rubygem-power_assert-2.0.3-5.module+el9.7.0+40039+300ba1ed.noarch.rpm a466103aa14797b8da97c36ff5b5efc0c35e526282f72391cff508f6caabff80 rubygem-psych-5.1.2-5.module+el9.7.0+40039+300ba1ed.i686.rpm bb0342748e688fcbb9880da5aef6ce794a2ffedbc9374dda9889b760abf1b4be rubygem-psych-5.1.2-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm 4b7faccb739f679fd2c4c6b745e624c539689a72a05f70e6359408974ef1c7af rubygem-racc-1.7.3-5.module+el9.7.0+40039+300ba1ed.i686.rpm debaa2531cf2916d377d62560709461611dd172d5ed631c3edc857ae83951cee rubygem-racc-1.7.3-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm df9c0af4f601a7840e393d105f17be92b6cdc36a983a6a9babedeb6d5c8f53e6 rubygem-rake-13.1.0-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 72dd9b5227f5b84e524be0100897530b0dc5e7313eed2414d7f470cd43109e77 rubygem-rbs-3.4.0-5.module+el9.7.0+40039+300ba1ed.i686.rpm 983461c616de81af559751fe5312a5a0d8bc48404495ffca9abff30b1a289e76 rubygem-rbs-3.4.0-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm cd0274b31e6533dbd559133d75d7d94d48228bb71e5a895ca8172ea125c54cf5 rubygem-rdoc-6.6.3.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm b82c762c45b07aa110e025ff42eb3949e4fc9edca71629059655cc5c16d63554 rubygem-rexml-3.4.4-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 505d232176f1e30efe7134c20443962a4536c4cbd9c13b91774554de77b7e469 rubygem-rss-0.3.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm aea8a6a4fd886d348804f5c98a1109b6be29e09acd49c9ae79ee89d683eec0ae rubygems-3.5.22-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 271cc2bc55f170a98d1135ccdf5cfa873ac913e84fd78eae35c7ca4a4be2e886 rubygems-devel-3.5.22-5.module+el9.7.0+40039+300ba1ed.noarch.rpm ab871e63da4d1acbcf2e543e38a0cb7a2420c7391d26da0a882e7b31b17b38e0 rubygem-test-unit-3.6.1-5.module+el9.7.0+40039+300ba1ed.noarch.rpm 28338e000f466ffbbf3c4d9f6ca1f2c043c8fe79f517c65cadb4814463970c8d rubygem-typeprof-0.21.9-5.module+el9.7.0+40039+300ba1ed.noarch.rpm dd6b8a9cc8bf4415532868b26aed244c1962662a696f29482ad11f41b05f5f97 ruby-libs-3.3.10-5.module+el9.7.0+40039+300ba1ed.i686.rpm ee6204e6b75a8eb1c0c56a3f9b8e4ca6892924dd642a9f87908bc80c815ab8e1 ruby-libs-3.3.10-5.module+el9.7.0+40039+300ba1ed.x86_64.rpm ebfa6a99e73f92920465f0e154891abe27512d81af857d08b44663a42c2d1be1 RLSA-2026:0493 Moderate: postgresql:16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pg_repack, module.postgresql, module.pgaudit, postgresql, postgres-decoderbufs, module.pg_repack, module.postgis, module.postgres-decoderbufs, module.pgvector, pgaudit, postgis, pgvector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: CREATE STATISTICS does not check for schema CREATE privilege (CVE-2025-12817) * postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.7.0+40060+39463e08.x86_64.rpm 822c0217f4859f176536174381a77f70256fa03addb007e2f7f8b1a06449aa44 pg_repack-1.5.1-1.module+el9.7.0+40060+39463e08.x86_64.rpm b257288f674866e98d3a51f36b1c2c7641078c321d05515de1a74e8e8c64c66a pgvector-0.6.2-2.module+el9.7.0+40060+39463e08.x86_64.rpm 617caa27b190da601e71ebd674d9403e3e112b1379b37a795f8e8e31d3cde5a8 postgis-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm 7d37d2a8e9e856f000017bb0a1b9fa6feed9a411fb24e6affa4ae5e8dc920353 postgis-client-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm 710413b03fa76c0bb57d5ed8185917ccc11852f62219a86397a42859f6aee6be postgis-docs-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm e7db05b35b8295ea9d81b9c733707e74d0538f3fcc4ce7a80a0d3bd12d7bee5a postgis-upgrade-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm 6d698de214d3c65c0c91e5b5c69dcd90ecc08e70c39c4553f5fce339b1dafa60 postgis-utils-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm d882dc5c12703b89e2335d3c9f423fb964a029feedf583da2b92b0d34ac83e56 postgresql-docs-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 1ab34fafe2f199b91bc6ee1111692c0323094b5875bcd7f12200461f6a987b7e postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40060+39463e08.x86_64.rpm 0b5ee7debecd0595b42fd91c745ba4f5b4ffbf63040e76681352abfb033fc6e0 postgresql-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm b76751d58a7a9549e9bf86e5fbd28f0149eb319a6254ec7c941948728bc3fb3a postgresql-contrib-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 31c02b9686df4383b1eb03605194f7e0ee4c0e210b2b940ce893ce0c34157398 postgresql-plperl-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 6fbebfabc134c868b789cd7ac8d2a6ae2f8fc63cf28f36c6a308aa708097a880 postgresql-plpython3-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm cfa0acc04fdcff4e6dc75edb79ba56cd4e52cddd1ac4054386c7a627e760458e postgresql-pltcl-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 866a6f1274fabf5281f7ec4a2a9da1663d9e7c018ec4ea0d50c4ad69553a116b postgresql-private-devel-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 9016e05798c3184095cff1bb8c008374acf0e5fa0d7fd9867ff10209f3f305a6 postgresql-private-libs-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 731821a8c5569ba6a9f3b0e44646e4a9ab958680b048fe6dfb005d191592fd98 postgresql-server-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 3e59e36fd1653281433c4db514d59b506656544622cbc3267d8731d9a6f39cdd postgresql-server-devel-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 0451f3f062d6cd0a28a2be635f46fcfeed20b943fee6085a4d8f5c7601646b9d postgresql-static-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm c65f5bf7bbb1f0c5a8c482e5c292a4b0852cd169d1b541e9c96b842f1a34d8eb postgresql-test-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm be96de7348c05324263c3f0a03fa94b5a56a55a8500bef75f08c59c46256e9fa postgresql-test-rpm-macros-16.11-1.module+el9.7.0+40060+39463e08.noarch.rpm 13b96d4f943f1c7a7be39f9fd7875f52173e2f9e2b6d579e5803df1d455afc7d postgresql-upgrade-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm a370abfa243294996aeaa2540a7c6325bf263149fb3d9bd5764c033ac8d4c52e postgresql-upgrade-devel-16.11-1.module+el9.7.0+40060+39463e08.x86_64.rpm 54a0d9fff984124d255477fcdd7e322d57078acd40f5d2eeca86f0114839be50 pgaudit-16.0-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm f8d8902f9a66ca3e78f9609bad96fdf9cf11fcd3684e647c7a6db64e24c0213c pg_repack-1.5.1-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm 2fd23517b22a8b850c899be9f0f50ecdde832d436a7702d111901ad9c59bee1c pgvector-0.6.2-2.module+el9.7.0+40012+a654bbaa.x86_64.rpm 3ba39c238c4bf8e75e202f2a8b70b4e6b37715caa82a964354dbce25ceadffff postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40012+a654bbaa.x86_64.rpm d10bb7f8708c09b3807d91aa3e96db887acbced1fed2264fceca9841587ed0b7 RLSA-2026:0052 Moderate: gcc-toolset-14-binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-14-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line). Security Fix(es): * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpm 2226f2bf8753b55a571027d606a91a21b95cb0cf3e5a06e37bd30ad07d94168c gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm 7b9142fd5e835789c47cedd45473ec76f0f2054edb8c9526309f63a02a86d51f gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm 47af15ab433a2b15859bf20fd9f103d97dc5b60f033896dc47b9b25a4334be32 gcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm 0db14aba30122e17fda5e745d0044b9130d50961256a9688bebda4e0f9968cc2 gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpm aee09fbcf5d8d78b1312a379e3305e50831d8000ed77ad470fdb42a3ac229062 RLSA-2026:0247 Important: mariadb:10.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for galera, mariadb, module.mariadb, module.galera. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Security Fix(es): * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490) * mariadb: MariaDB Server Crash Due to Empty Backtrace Log (CVE-2023-52969) * mariadb: MariaDB Server Crash (CVE-2023-52971) * mariadb: MariaDB Server Crash via Item_direct_view_ref (CVE-2023-52970) * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__mariadb galera-26.4.20-1.module+el9.7.0+40024+12a6f3b4.x86_64.rpm 7ac8b612b2ea912fb156950f821328cfcd02691db72681ce0fe2fdfb39ff9276 mariadb-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm b777256d355fce3028035099817285f4cf2be6d5f4a46bb4819071b05b740d40 mariadb-backup-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 50d01493e3e33f387ec0a3a4b4d190387a71fa3278e47cbfeb81b5ac40b0dc13 mariadb-common-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 374fe0c18eee7c4236dba5304744b15e3e1d23831c45c5d525267261dc13567c mariadb-devel-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 2941d780a5897d466fbb87561a0e7121e89884dbcbf6d1a80895a1970a93f404 mariadb-embedded-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm e43b03967b49a764bfb220e830c280345778b41f5b9e1c251807e2f5d9e5773e mariadb-embedded-devel-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 3102d31fc7cd0c98e1828f9cf95a81e07dbab4074f7747cdbabe8000b97b1c42 mariadb-errmsg-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 845eee4d2fea3695598cc8c086c64689620d3b8fc2ab07fc595ab4301cb6be97 mariadb-gssapi-server-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 2716017edcde2142f828ffb02f66457ad7688650e50cfa860d1840b0123d02ff mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 61838a65419eb4b0f6d1034d1950b60fa08c9b38524e02ec4ec4275aaf42fea6 mariadb-pam-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 89cf0ee14ed41cefe39e989d2e5c433060e22ad39e01f308fecf8e59d279ec22 mariadb-server-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 40ee1dc6600db7ebeecbb2d6c5cf47922629503f1a5b51e202a6779681ef6aff mariadb-server-galera-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm 0aed8fdda11df4b68a5e117f6634adbf744d061b6324ddf375ca7a222a88eece mariadb-server-utils-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm d470b3a9484276b14659b03ba05681b05f4c640a3e19e31c8ff896fd43a372c3 mariadb-test-10.11.15-1.module+el9.7.0+40065+b33d0971.x86_64.rpm eb35f598f97f09efd992d9c0e6f55b90d54d6a3ad24c1b8622d34a8c516422d3 RLSA-2026:1408 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Excessive read buffering DoS in http.client (CVE-2025-13836) * cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service (CVE-2025-12084) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.12-4.el9_7.x86_64.rpm 7af307052e8ad69a86faf3d6e514a43697ec87ad709b9fc940e36950f27affa0 python3.12-devel-3.12.12-4.el9_7.i686.rpm 3e2a541de80ef11a0a4b9371ede66c692fce82e5adde1eb7aced6694f1d748ac python3.12-devel-3.12.12-4.el9_7.x86_64.rpm d767aacce88fe81febf3e96425d59311cf66d378532491de3496cf59687377e0 python3.12-libs-3.12.12-4.el9_7.i686.rpm 4c51948cab3c5519be9e2e18f7afd564cfb993d8e544757169fbc991cf104c0c python3.12-libs-3.12.12-4.el9_7.x86_64.rpm d23037cc9f83afb96dcdfa38aab8821db56bf5c2f1839a649c531e8a357bba33 python3.12-tkinter-3.12.12-4.el9_7.x86_64.rpm 33d17990b26a897645467f585b56eb6ee84ed9440be625766cc592aa35c2508a RLSA-2026:0458 Moderate: libpq security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libpq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpq package provides the PostgreSQL client library, which allows client programs to connect to PostgreSQL servers. Security Fix(es): * postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libpq-13.23-1.el9_7.i686.rpm f8a2cbcb4874c37864ce2e85357662c5b55a35268c133d8c6da157446b5590fc libpq-13.23-1.el9_7.x86_64.rpm bf7276f8bfac30163a0c98e859e5bcb865210a18f36db6fef19226c59edc2cd9 libpq-devel-13.23-1.el9_7.i686.rpm 584062f6d6d25fccf34c599feb636c13aeeb947a75fd42e0c25d429b2774831b libpq-devel-13.23-1.el9_7.x86_64.rpm dada86ad5065d5061be148c9dcf96a239ec6e0543c0ce8f8fbc0f04f35188f39 RLSA-2026:0491 Moderate: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: CREATE STATISTICS does not check for schema CREATE privilege (CVE-2025-12817) * postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.23-1.el9_7.x86_64.rpm abd36076103c90282a51135e5f64aaa2af53a5b80df0f75f963517e9e387892c postgresql-contrib-13.23-1.el9_7.x86_64.rpm 8dd26be023f645fad5f05d087c1879433983074538312d6e1d1a50bec2accb21 postgresql-plperl-13.23-1.el9_7.x86_64.rpm 0468de1ea77d56da00c04ce8432ca30a95e766b1beb2c86cccfb1a5b0102c200 postgresql-plpython3-13.23-1.el9_7.x86_64.rpm dd8bf7704158133a7cd172bb8a8761adbd627c41bf0fdbf8c5164fb704a5bab5 postgresql-pltcl-13.23-1.el9_7.x86_64.rpm 47c916b92f19dd1501b4d8c26de3ede3863bf46c6eec666898254ae7623bfd0a postgresql-private-libs-13.23-1.el9_7.x86_64.rpm b43178b3ed0ac521fae8bb1833a281bb125bca7791baf85879d7a2c0932cad22 postgresql-server-13.23-1.el9_7.x86_64.rpm 8e089bd24801f1f42854ecf6698784f54310c961ec95f3c308ca284da7f4c434 postgresql-upgrade-13.23-1.el9_7.x86_64.rpm 221c2ccdd11ea374518251210771bc7b86831bed8cf41013110b1381cf9d9e15 RLSA-2026:0492 Moderate: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pg_repack, module.postgresql, module.pgaudit, postgresql, postgres-decoderbufs, module.pg_repack, module.postgres-decoderbufs, pgaudit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: CREATE STATISTICS does not check for schema CREATE privilege (CVE-2025-12817) * postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.7.0+40011+28af63c9.x86_64.rpm 5088cc0af53acfb7d832ab49b383c3516d5527c426be7868dadeba97a2e938a1 pg_repack-1.4.8-2.module+el9.7.0+40011+28af63c9.x86_64.rpm 402ca1980510592c3053e6e17a21fa52fa2ac89a2e7e467e240575d853ec611e postgres-decoderbufs-1.9.7-1.Final.module+el9.7.0+40011+28af63c9.x86_64.rpm 6cc1441002d2afeda2f6fb121bdb894076e43d024171f41407d0eaf1dc0b0950 postgresql-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 806f6fbad4558b73738b175bfbd366c5b98116b69225812f5224bfce33f22c02 postgresql-contrib-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 816af419e74c280fd1a6886722e2748e12a77f2d7b038b11f99f41e9f15face1 postgresql-docs-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm e6e94a9160a81e9ab4179686894f52172c62e3c6a529c623053ed166d265db79 postgresql-plperl-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 0f6f8367096e3019d191fc90138e547fea7076e57a8668ce3b3e5cf393751fa4 postgresql-plpython3-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 993df50b8697e9301869cad27cfc20e3d52b977c3c97779c0ca237d939c65d94 postgresql-pltcl-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 1ad6011ef97b9a07c7cca392ab1e444fe9219a337742bf1b112fd06bb9de469b postgresql-private-devel-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm b8e38cfecdcfbccad25c60bf7b0dc989ae2935d73d4a21be4f030d92e6f9be02 postgresql-private-libs-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 9a7a3d6407c1f4b64bb6f9bbf383297cc33cafec8579b2ac64d662129692b9dc postgresql-server-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 28c5854e085cfa00a0b6848e34834a54d0a65597257d372ad8f82d4b72999ad4 postgresql-server-devel-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 587dc9c17fd3e685c01aeb52b8df83de57df6dc4634e46574689e045d32467ba postgresql-static-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 0727f1f199ec2270e1a84413c16e74ccf19f581fbb73004e780653e1fdcdc06e postgresql-test-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm feb8b4382226451532b6802436d23fbed88680195602fe1164394a6486dcecfa postgresql-test-rpm-macros-15.15-2.module+el9.7.0+40058+d9f04599.noarch.rpm c91f0c132f1d1d80dbf9866ed0fb7c0c30cea17a01c1e021eb75eab9d9d69a4e postgresql-upgrade-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm ee247980cf65c46c8b07aacfafbaeec29aafe026d7c95d6351cd0559d164ad4e postgresql-upgrade-devel-15.15-2.module+el9.7.0+40058+d9f04599.x86_64.rpm 636f74e81611648b4dd12e1fe3cffa04351f3b9629d9110c2ebb975d8a90090c RLSA-2026:0422 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins) (CVE-2025-14523) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-12.el9_7.3.i686.rpm 405f29bb3235a186f500d9bf4d85dfadea7476df451fe341347cfca0475729aa libsoup-2.72.0-12.el9_7.3.x86_64.rpm e28a4b6e2dfcc0ac0f0633adf14f7211271429bcf72aade68efce5e4aca4113a libsoup-devel-2.72.0-12.el9_7.3.i686.rpm 744404027f88611cffe6aa80478be1afd77964a2b3853dd24f24bc6a50f057be libsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm 1f9be395d9cae5183fb86d57674ff5431aba6733ce1504787d30cc57b01a935b RLSA-2026:0437 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.41.8-1.el9_7.x86_64.rpm 27c1889babf8132433f95ff15d75ee3bd1d9bd54717b37a79b839943c9c1fc65 buildah-tests-1.41.8-1.el9_7.x86_64.rpm bedb91170e3aa7e8431a1229e1d4a9e7b9ccd53c14f1da1754798b9977f62311 RLSA-2026:1410 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: Excessive read buffering DoS in http.client (CVE-2025-13836) * cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service (CVE-2025-12084) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.13-5.el9_7.x86_64.rpm 29f7746b9db0be04e0a0e95b86d7aa10615e413e264048c0bc2dbb8e83993eaf python3.11-devel-3.11.13-5.el9_7.i686.rpm 08dc8454e80d4ab331df7e43e89e1eb1af42d5e6554157e9385f2d2a8357b868 python3.11-devel-3.11.13-5.el9_7.x86_64.rpm effe65293cd6edf8786a86988496b264ffdbc551c3814c2a98925ae57c8fac94 python3.11-libs-3.11.13-5.el9_7.i686.rpm 111967afc5d692f2703f166b263ba632da9f3f395a192a1c9a14f0e9e924f978 python3.11-libs-3.11.13-5.el9_7.x86_64.rpm 839718aaa9464ac960402f83915ffcef29139af889b3013f5150e54d5a59dfd7 python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm 82e1b8fe5dc5e973c6b8c733748dade0bfa39e352a8f3dd94ed01466a8b9d16f RLSA-2026:0694 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Spoofing issue in the Downloads Panel component (CVE-2025-14327) * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-0885) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 (CVE-2026-0891) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2026-0878) * firefox: Use-after-free in the IPC component (CVE-2026-0882) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-0884) * firefox: Information disclosure in the Networking component (CVE-2026-0883) * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-0877) * firefox: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component (CVE-2026-0890) * firefox: Clickjacking issue, information disclosure in the PDF Viewer component (CVE-2026-0887) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics component (CVE-2026-0879) * firefox: Sandbox escape due to integer overflow in the Graphics component (CVE-2026-0880) * firefox: Incorrect boundary conditions in the Graphics component (CVE-2026-0886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.7.0-1.el9_7.x86_64.rpm 6af171b0d6ff2a02ebb821186d94a4eab49f4f4b1a6319f51816c91883a39d40 firefox-x11-140.7.0-1.el9_7.x86_64.rpm 2c37f18ecd178d77294167e53e0db196d9b4cb482c48c31423b41c9b83a5ec48 RLSA-2026:1409 Important: php:8.2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.php, module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, php, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: pgsql extension does not check for errors during escaping (CVE-2025-1735) * php: NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix (CVE-2025-6491) * php: PHP Hostname Null Character Vulnerability (CVE-2025-1220) * php: heap-based buffer overflow in array_merge() (CVE-2025-14178) * php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177) * php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.7.0+40005+715283ec.noarch.rpm 7dd1ac343924f8c124aad5ea866231a2ff6b85bfd557fbd5468607e6de705b78 apcu-panel-5.1.23-1.module+el9.7.0+40004+bf50a568.noarch.rpm 23fbb9f304bbf6e02897a8e614ed3cac76c8f8e18250a388284d9235ab90d674 php-pecl-apcu-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm dcfdd569de5e6ddad19e451d0bdeead0f30f500aafa4dd4d9e164b4170deeb88 php-pecl-apcu-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm c677509dddb11e0bd88160e9d3bc0e5c3a5c95eef153f2efae02fe2a74fbc173 php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm ce6d8eb9d636d1a7d25f77eebab9bc34b0803050a8dca008f336718adeb35000 php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm 18128edfe8947247823712735e2bf08347870ad4686fe37fe574a54060883e86 php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm 547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm 0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm 969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee php-pecl-xdebug3-3.2.2-2.module+el9.7.0+40004+bf50a568.x86_64.rpm e4557b9c462239b1f5b436e15e1c50f94c482c98af43153f03216624541886ef php-pecl-zip-1.22.3-1.module+el9.7.0+40004+bf50a568.x86_64.rpm 3d22b91542f7cf9f28440dc6c850ddbd39f76fdbe4c7a8ba3736e0f384c85ee8 php-pecl-zip-1.22.3-1.module+el9.7.0+40005+715283ec.x86_64.rpm 69d6cf54bbae7dfe848217065300e013f3d68f4a675214f32ade0362ecee5164 php-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 0f06cccc181c2fa278e6087c422747daa1cea0b536f96bc9354155b154bd732a php-bcmath-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm c619f90b778fe6ecbb50a2b731ba40bf865a67e79c06d74218561d40e1fd44f8 php-cli-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 3f721b196bebfea7792079937ed909fe3b16aebc1973a9591c6e65cf636b9807 php-common-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 69f076c48492252f957b556a411993439c1593cf5f5c0b6ac11a2db2d9556dc6 php-dba-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm ae666bb392e66e6c55e0b1f6e6a775cbd2bfb1bc4aa1895155051b65ceb7e29a php-dbg-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 35ba5ae55781df72d0169d43fe3ab4241f6c516839c075a2294fbd51215a8d64 php-devel-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 10c1139fe0195e7505fa08d7c708b411fd2ee5abf004dd349af552bda14f12c7 php-embedded-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 0ce46539ee1edebc734d2bd47e39cfe55c68c1169e367a5143debfdd1019cbd0 php-enchant-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 4136d27fd0b46246b4d64817f2aa9f5f8a6c72f21b3d60e3c1d0b4067c18ce43 php-ffi-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 98bacbd6be30840e664502bbfc44eb7dd49673914e4643fc6004ab1b2ed975a2 php-fpm-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 739211fa75cb83cf334b48fdf497259a06ca09853f91ceb59b445253ba331184 php-gd-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm ac4344b76a325ff71cf70ce3fdeb9c103941883ca3a7f55912cd37f66bdcaf25 php-gmp-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm afcd04103f4a73ad71c6b5036fdbc9f2e3fce3309833976510f8fefb795fe8b3 php-intl-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm fe7235d935c3da4883076214789a6d600b89617136ec5b88b29b02e1ba2cba1c php-ldap-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 30e45703b060ef4d4f69d3506bd4ab8f0555565b335355905fe368f3a1be8b33 php-mbstring-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 275e9711857c18bb6ba853c769cffc6c961b82e9e11b350624a75879a0f46d8a php-mysqlnd-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 4bc4ad5642cf68ea9bd022ec888d7e2a4333e3ba4bf64c013aaf4dcc69a243c6 php-odbc-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 30ea8852ff02983ab4b2288f9287dc842ce41b7222715af5a92e1ec571eff6bc php-opcache-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm bada7ae47cc21e44432dd302661d72cd614bbf54d5409f641f46bfed2f1da3d5 php-pdo-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm e4af8b8f17889b8770ae9a4ef331cc6801690d3bfc10b082a71fb7a1e244ed0c php-pgsql-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm b5284202051fcedb21f10f857a04a9c38dc544f2d64fcd7b01142986af104f74 php-process-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 5bfdec068a41fa16a98c473f421c4dc6785c2a5e36e552faa34a9a329b162fac php-snmp-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 79517e259569ea1dcc9045ebc7cd6a1deacb4eb566f891155b5f7254efa48c99 php-soap-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm df8e6f376e798b8588ab81ea8bfd81c09c83331b0882c833ab2c67e726208508 php-xml-8.2.30-1.module+el9.7.0+40073+569087df.x86_64.rpm 217931c363bd792ff998ac7b466d7ab0967a394a46d25225d149573a8036c5f5 RLSA-2026:0470 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.6.0-11.el9_7.x86_64.rpm 58d1da0a7882e6155f28bbabbc1013beb3ee0062d464d0754bff03316e46406d podman-docker-5.6.0-11.el9_7.noarch.rpm bf563f980800c77313d2201aefefbdc59452c926edda286b252ab16d6690ba72 podman-plugins-5.6.0-11.el9_7.x86_64.rpm aa6916840929ed2cbc6055331ca730d53559c900252d1e30cafc8908171be82c podman-remote-5.6.0-11.el9_7.x86_64.rpm ee43ba8d1a4e5e2696c37e7b70afaac093a70cc5607ecd27166e369cc58f18a0 podman-tests-5.6.0-11.el9_7.x86_64.rpm c04e30d13ecaa53a24789cf7e64f4046b77b719a542eec0e44a92be85a0b844a RLSA-2026:0605 Moderate: vsftpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vsftpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The vsftpd packages include a Very Secure File Transfer Protocol (FTP) daemon, which is used to serve files over a network. Security Fix(es): * vsftpd: vsftpd: Denial of service via integer overflow in ls command parameter parsing (CVE-2025-14242) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vsftpd-3.0.5-6.el9_7.2.x86_64.rpm f47a9fc19052432dabc49e603001da7359b306f81d28815124c16ebd6af03bb3 RLSA-2026:0696 Important: net-snmp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Security Fix(es): * net-snmp: buffer overflow via a specially crafted packet can cause a crash in snmptrapd (CVE-2025-68615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-17.el9_7.1.x86_64.rpm da5c896b83640dd58026eb3c4a6e90721b701ee6bec542b82445a2d1a32c2246 net-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpm f34fecaf46cf8274562f8004bc6e9d664d500553f26b71f38659a02a315f7902 net-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpm cfd14eaddaf8c32efa971cf4145908fa5f26227c219c1235ca92f24f7d0da1f4 net-snmp-devel-5.9.1-17.el9_7.1.i686.rpm 489dafe847202d6636b0df9486ae74ce1d09ecec1212215ba5c5f34c26314075 net-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm 27988c921179b9b9cfb8996fb56056a2b83535377a64c8e86146ed28b0bdbdd6 net-snmp-libs-5.9.1-17.el9_7.1.i686.rpm f0096739dcbdd0d78745a500226233e0a648a27df7e947de3692fe4536d534c7 net-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpm ac8322e8fbb93c3613b1a6252f024bb8efd371841ea3ab22fc25889d2006c0e7 net-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpm 3ec0fe9a59b47de7911668dbc2ee44eae5624dc01c15d7fa7e43ab6fc6046ea6 net-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpm 009daeb6cced01d3184b0a7e8a2f3aabd839b6d4f960a99b5c17a33c963f8e71 python3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpm 2e14fd6c19deb2aabe30a3ba9dca66699571a0025ac114918d3bf93b2b82c0fe RLSA-2026:1429 Important: php:8.3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.php-pecl-redis6, module.php, php-pecl-redis6, module.php-pecl-apcu, php-pecl-rrd, php-pecl-zip, php, module.php-pecl-zip, module.php-pecl-rrd, php-pecl-apcu, php-pecl-xdebug3, module.php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: heap-based buffer overflow in array_merge() (CVE-2025-14178) * php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177) * php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__php apcu-panel-5.1.23-1.module+el9.7.0+40005+715283ec.noarch.rpm 7dd1ac343924f8c124aad5ea866231a2ff6b85bfd557fbd5468607e6de705b78 apcu-panel-5.1.23-1.module+el9.7.0+40004+bf50a568.noarch.rpm 23fbb9f304bbf6e02897a8e614ed3cac76c8f8e18250a388284d9235ab90d674 php-pecl-apcu-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm dcfdd569de5e6ddad19e451d0bdeead0f30f500aafa4dd4d9e164b4170deeb88 php-pecl-apcu-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm c677509dddb11e0bd88160e9d3bc0e5c3a5c95eef153f2efae02fe2a74fbc173 php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40004+bf50a568.x86_64.rpm ce6d8eb9d636d1a7d25f77eebab9bc34b0803050a8dca008f336718adeb35000 php-pecl-apcu-devel-5.1.23-1.module+el9.7.0+40005+715283ec.x86_64.rpm 18128edfe8947247823712735e2bf08347870ad4686fe37fe574a54060883e86 php-pecl-redis6-6.1.0-2.module+el9.7.0+40005+715283ec.x86_64.rpm 565e9e2ffbb1116355432195069ac83ebabeb146bb7609a5bb8cec4c1f999bcb php-pecl-rrd-2.0.3-4.module+el9.7.0+40003+454ed3c4.x86_64.rpm 547db87f9696bb8399739c2eb5d1e0e314fda9ba77b7f1176480e3c590e7372e php-pecl-rrd-2.0.3-4.module+el9.7.0+40005+715283ec.x86_64.rpm 0a582e380659f5136a84594f7c3ec5ddf1d30f38b8690d8b56588b66a4d6ba5f php-pecl-rrd-2.0.3-4.module+el9.7.0+40004+bf50a568.x86_64.rpm 969dccbdbe6c8a4b15092110585042ee276a8e8528c2478661691c5d0338e0ee php-pecl-xdebug3-3.3.1-1.module+el9.7.0+40005+715283ec.x86_64.rpm 9284eb822657efa12e6fd0d10ee620810bcee59eb84954ecd598093bcb6276f3 php-pecl-zip-1.22.3-1.module+el9.7.0+40004+bf50a568.x86_64.rpm 3d22b91542f7cf9f28440dc6c850ddbd39f76fdbe4c7a8ba3736e0f384c85ee8 php-pecl-zip-1.22.3-1.module+el9.7.0+40005+715283ec.x86_64.rpm 69d6cf54bbae7dfe848217065300e013f3d68f4a675214f32ade0362ecee5164 php-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm ce3a7a79118112b7b7a03054fb3985c755cc55578cdc94ae3a0618e7bc3985b3 php-bcmath-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 5d5e84f01466c7714ff2212cfee62baac39e65cd7b618b85732e1e03dd99191d php-cli-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 8c2b5947476e7ff99bde3a015d489e4389f2a35f518e01b2ddb280247a249136 php-common-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 7a6b4326f0730ef9e5637b3f19b74f0aacca9c045974ef2a63c5c83871e43c82 php-dba-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 416c33f19821b940a952d6f0595e1113dac7330a7866dd9d46a7e06721fa7a6a php-dbg-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 35d40015059f4d444375c4872281665b42ed63a7c4c7e0afbdc95b0ae937ad94 php-devel-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 5487acaaf440b723b7556ab2adba5d2bcc5c4fed1ff55cb18cdcd08e28312d21 php-embedded-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm a5de5d5e0da58617f3c3ef1ef88fc727166f41ec75b3db1cbccdedf07a7b5801 php-enchant-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 5d7becf6cd85d7a44d5c542b7872926d9fe8e5e4f6e83d42fa2420bdb2d95c5e php-ffi-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 903b0cada73f72787d1586f30ad70c73e23e4aa3776a27098edb47255d7aae47 php-fpm-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 9638b2cf43659b945e69db7446fbd95216fdeee8d6ac97b5a8d36a6dc87a0e3d php-gd-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 6e6976912bf39057bf23cc5deed615c6912f967830fc96049ea74ed8ca95b9f9 php-gmp-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 07f7dd0c3285a124c973fbc47bcc0f786678b1c160255a6eda882739b405075e php-intl-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 82d861126e44ea959e33508ddc3a4fbe594b28f88fe289820805c0b081ad5680 php-ldap-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 996f04f605f0c4f20ef28b896c1f07c44f0fddfa84c581b4d411321b75eed449 php-mbstring-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 4d4bce8029b20cc0373af3cc74c19664a37851e27df623bd58aab7cd1a74a944 php-mysqlnd-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm dc740c0d9b791a7a28f9546bcf1c3d05a42fd303577ce62ef71599ca4b9162c4 php-odbc-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 391a0a71591dcd8605224add780b251a5ab32abbc16ea0417c865bec992ca615 php-opcache-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm e125eb461dcdbc5060537aa168598d161e17749e8e6ec6ecaf763f31f07b6987 php-pdo-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm ec4459a808997fb06e3ac5a492ca4471ab2a3dd311879e785d8e99ab4774db57 php-pgsql-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 596c1b8f97b9f1ac3620a22dd0e2013ecde96e57269aa26eae87f450f669b898 php-process-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm ab559a1aca0043da4779a4108e1c4308e2d807f0013f9f627e037cb1839386a4 php-snmp-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm d213c4486b6d83d1986d59d4e48b22ef8d8cd07692d0ca49284131cf8e7e0e36 php-soap-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm 1e6aa7c53caf050965be3f62d4c6c0f18d8fb83a0112bf49f8b3f240dbdbf360 php-xml-8.3.29-1.module+el9.7.0+40074+b1038bdd.x86_64.rpm e8cc76374f72cc84bca4f5100395c2c69641694da74bc77c4f684226383af2c4 RLSA-2026:0771 Important: gpsd-minimal security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gpsd-minimal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. The Rocky Enterprise Software Foundation support for this package is limited. See https://access.redhat.com/support/policy/gpsd-support for more details. Security Fix(es): * gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing (CVE-2025-67269) * gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling (CVE-2025-67268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpm 9e666857b0663c152c9dff8209f7e91459370ad561131c5cdbbb39fb7882e040 gpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm 750ffc9ce431d234c3e2a081e0be80a1c57f0e247a70eb9150bda96a4baafba4 RLSA-2026:0924 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Spoofing issue in the Downloads Panel component (CVE-2025-14327) * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-0885) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 (CVE-2026-0891) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2026-0878) * firefox: Use-after-free in the IPC component (CVE-2026-0882) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-0884) * firefox: Information disclosure in the Networking component (CVE-2026-0883) * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-0877) * firefox: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component (CVE-2026-0890) * firefox: Clickjacking issue, information disclosure in the PDF Viewer component (CVE-2026-0887) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics component (CVE-2026-0879) * firefox: Sandbox escape due to integer overflow in the Graphics component (CVE-2026-0880) * firefox: Incorrect boundary conditions in the Graphics component (CVE-2026-0886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.7.0-1.el9_7.x86_64.rpm a6a93fbeae1e4c2d67663b0473eb85c4d68395becff9f99f729892761971990e RLSA-2026:0923 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.25.5-2.el9_7.x86_64.rpm beb6328cf10ba6159fd42aff1ff168f38bc3038c791722214e762bf6dad663cd golang-bin-1.25.5-2.el9_7.x86_64.rpm 56bcda5227ca341f1b22f2df4571eaf4df28c47045e41429acd105a6e00098eb golang-docs-1.25.5-2.el9_7.noarch.rpm 461f8f29ab2902556657f237bb2e6ff84cece0d9ac0bfcfcb105f751571af21a golang-misc-1.25.5-2.el9_7.noarch.rpm 1b95eb3ed57dd9ccf9b51ffcc780399d75b708bd97ae0dc6a37ad131c55206bf golang-race-1.25.5-2.el9_7.x86_64.rpm 4a03ef23d29c4da495ac3d11fdc5200cbedcfdd6f8e83933c40a461c96f1a3d1 golang-src-1.25.5-2.el9_7.noarch.rpm 692b0411259cb272d46e2dee6007c54bbbe72ff627351aa486ca1704370aa87f golang-tests-1.25.5-2.el9_7.noarch.rpm e0eee6749bad98c6b10a10bf785c1751c219d7729972eb457d93825692fe4026 go-toolset-1.25.5-2.el9_7.x86_64.rpm 37853441dda7f2d8889c888c9aa0af09df30cff93128f75e1832fc67dfe850eb RLBA-2025:20841 Moderate:open-vm-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm c28999ad465424f51cc07b8a0b0657228a3a11604623303e138770ec26dc368f open-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpm d5c8a6a55922d6a7dd2b2caccf329599133071a591a400a33173d6398f1df6d2 open-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm 35f0bdf34da212b320ecd8b15320e4779144b290624606b7bda102224ae053ae open-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm 2cf9319f0d15fd583ed3e734c8784cb7cf92690d6db6bc0e3bd7dc41693fb4eb open-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm a6b679a54f8b9312db75e9cd97e52976e5a3b7bfb39ece539710816fb21e06fd RLSA-2026:2707 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: heap-based buffer overflow via specially crafted PSP file (CVE-2025-15059) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-3.0.4-1.el9_7.3.x86_64.rpm ecd54fd1809bce922a245b06c3de8530c3e536086f1703e713a32c093a1eade8 gimp-libs-3.0.4-1.el9_7.3.i686.rpm c73afcb346b8652e85535ff99271b5ea1361f230e48d34c516c073cb52820aed gimp-libs-3.0.4-1.el9_7.3.x86_64.rpm f3bd79325550463e58dfccd03b452f514e3093188dafdf5886c4cb8798106da3 RLSA-2026:2783 Important: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs, nodejs-nodemon, module.nodejs-packaging, nodejs-packaging, module.nodejs, module.nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132) * nodejs: Nodejs denial of service (CVE-2026-21637) * nodejs: Nodejs denial of service (CVE-2025-59466) * nodejs: Nodejs denial of service (CVE-2025-59465) * nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131) * nodejs: Nodejs file permissions bypass (CVE-2025-55130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm 40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm 0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51 nodejs-packaging-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm 255a5c340e26e8b83b187f5e9d668ab4cba7b3d7598ba7e0a4ff45cedf91b935 nodejs-packaging-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm 80650f49e762c304da81c274cecc66a56e02896ac1616490231088900821f4fd nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm 343373af76dee4288e6f64388a4c80efe40c6001b68ee4ae9360c354fee8e948 nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm ac36ad2443091780af81a7233a23d632b9b28ddad8c7170960d2aa44a0d8a8eb nodejs-20.20.0-1.module+el9.7.0+40082+4e93191d.x86_64.rpm 6e9221c52f6ae3cf409915599797de85e9b8ed9b139e2ff9bd1b1cca55596790 nodejs-devel-20.20.0-1.module+el9.7.0+40082+4e93191d.x86_64.rpm cd653c068b7bafb451d63f8670a23d091ab15cee229c26b89ef9fb2d7acf49aa nodejs-docs-20.20.0-1.module+el9.7.0+40082+4e93191d.noarch.rpm e68a70cb77c5a629ed13451b29456570e2224743a31d1b0cbb99fc3470e67882 nodejs-full-i18n-20.20.0-1.module+el9.7.0+40082+4e93191d.x86_64.rpm 0770bfb1c0882ede4ff949b85660703b78e05b2754af54aec026e01a79ca2d73 npm-10.8.2-1.20.20.0.1.module+el9.7.0+40082+4e93191d.x86_64.rpm d920b0bd3c1a3b2cd5fbb58232d6e99ecb7030ab37c683a56c18305ce136f6a8 RLSA-2026:3359 Important: python-pyasn1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-pyasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyasn1-0.4.8-7.el9_7.noarch.rpm f3c67a571ed2da4ee8277db5bb1177107b80c3fc0f34abc14f1bcd708a8cad5e python3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpm a425ffcef8f8f3d596c5723654e187e92291082a5dfad0c2a68d5a4373cce34d RLSA-2026:0933 Important: java-25-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-25-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit. Security Fix(es): * JDK: Improve JMX connections (CVE-2026-21925) * JDK: Improve HttpServer Request handling (CVE-2026-21933) * JDK: Enhance Certificate Checking (CVE-2026-21945) * libpng: LIBPNG buffer overflow (CVE-2025-64720) * libpng: LIBPNG heap buffer overflow (CVE-2025-65018) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-25-openjdk-25.0.2.0.10-1.el9.x86_64.rpm 21201d6a9ec6960d0e0228e793dc581e37a1047a4af89e54fa8ef85ffe20db9a java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.x86_64.rpm cba6feb49eec1c31a4e9a4bf02e0ae1b20186d5b198dd778cbaf3db0d05d7d3c java-25-openjdk-demo-25.0.2.0.10-1.el9.x86_64.rpm 039e60e5f7bd8491b76a418e49f8003d6f7b22b022c5799892320f6a24d29c3c java-25-openjdk-devel-25.0.2.0.10-1.el9.x86_64.rpm 09698e31bf8ff62b4cdfee7b2b09c01e5e29f071a363c0ded6804a1a7e0437c4 java-25-openjdk-headless-25.0.2.0.10-1.el9.x86_64.rpm 1b6e3a0057d1cdfe08210a191906255be399f864ab987620e202606132c0bd11 java-25-openjdk-javadoc-25.0.2.0.10-1.el9.x86_64.rpm 222f3ecbda21beb14feaa3a4c6447a9125008248dd030b66f71d283157ace358 java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.x86_64.rpm df56a0fc121e95b67934f10482f2da7f86dc7b89bf1a695438efa9770ef166b0 java-25-openjdk-jmods-25.0.2.0.10-1.el9.x86_64.rpm 00d7cc24e55c092ffb3c8d7af5227e18976fd91ed8bf9df19bd53534e3d69633 java-25-openjdk-src-25.0.2.0.10-1.el9.x86_64.rpm 2fba126cc7cf936fed28e6df45a7cc665be9303607e1b9a26dd9c16230e03b78 java-25-openjdk-static-libs-25.0.2.0.10-1.el9.x86_64.rpm 068de8b4949a1d1d6ba460b79bdcc3ece086cfb7ac4046309b9d8a23a4892f85 RLSA-2026:1359 Moderate: gcc-toolset-15-binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-15-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line). Security Fix(es): * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm e7f58796434c30f4eb41b293b358fd839da234fff91bb1ffe512f78ec504b6a3 gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm 0a83cd8149984e3baa285be872d0da4f949246ca3ebfdff4d9497f93eff72c83 gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm be1b22938335d62c52b86c22f16ccc0d0e844f4c12c210d316e76f005d13552f gcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpm 625619d289c73f0dd6e5ac1a406464d6687ea418b84c328832a40768ad420ce7 gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpm face2442e125ebaf342743d04f2b0ee7e6969ba707eb8734ffa95220fdbaa859 RLSA-2026:2224 Critical: keylime security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keylime-base-7.12.1-11.el9_7.4.x86_64.rpm 8d13ca46d72a747c4575f88dbd6277257e402d0db82572d164262d710118bc7a keylime-7.12.1-11.el9_7.4.x86_64.rpm b463e6eb77d5dede4a6a73b362dc187f8313a0158466fb86e992a102e96a00eb keylime-registrar-7.12.1-11.el9_7.4.x86_64.rpm 1d786edea903e6ad8c5d54cc435738d2c9f9873fa14f2c6f9748642de399f1f6 keylime-selinux-7.12.1-11.el9_7.4.noarch.rpm 75ad166dcc796295752f25bb16e9e901357ee2d8e79d7907e33ab3d481592084 keylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm 449eb629031a8a8d2e9ebd329b0b19c6647fe55a106485712bff9a4c17e1414f keylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm 29971817ba6c3d00d5953fa54dd6138c4cad7161fb673742eb36dfa28c660cbe python3-keylime-7.12.1-11.el9_7.4.x86_64.rpm 3081241968015cdd31fad415cabf6d0cd2cb05d5756a8ad7c2b9a95d4218bf25 RLSA-2023:7785 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgres-decoderbufs, module.pgaudit, module.postgres-decoderbufs, pgaudit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869) * postgresql: Memory disclosure in aggregate function calls (CVE-2023-5868) * postgresql: extension script @substitutions@ within quoting allow SQL injection (CVE-2023-39417) * postgresql: Role pg_signal_backend can signal certain superuser processes. (CVE-2023-5870) * postgresql: MERGE fails to enforce UPDATE or SELECT row security policies (CVE-2023-39418) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.7.0+40011+28af63c9.x86_64.rpm 5088cc0af53acfb7d832ab49b383c3516d5527c426be7868dadeba97a2e938a1 postgres-decoderbufs-1.9.7-1.Final.module+el9.7.0+40011+28af63c9.x86_64.rpm 6cc1441002d2afeda2f6fb121bdb894076e43d024171f41407d0eaf1dc0b0950 RLSA-2026:1595 Moderate: iperf3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: iperf Heap Buffer Overflow (CVE-2025-54349) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-14.el9_7.1.i686.rpm b0e2bd149bf666c20d6ee4d9f8047aa365a3a488e653282d05bdc61f192e36c4 iperf3-3.9-14.el9_7.1.x86_64.rpm b06eb31f9ab54aaf22d93f77c9fe81771d701661bf3583b60c6de7bd28233103 RLSA-2026:1908 Important: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.135.0-3.el9.x86_64.rpm 8da1372e69ec67cc8b1ae2f5eb03c2c1b0fe45a3308f641b227ea8ba92d29952 RLSA-2026:1903 Important: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpm d218238ebe7d9ffef9b9d5814bc2aa168a0acb2fe5421fddcaea9219f43d5d2e fence-agents-all-4.10.0-98.el9_7.5.x86_64.rpm ae616bc4c3dd34d10294fa1d9ff77ab8c59e1c88d33b23656f92249f185e8122 fence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpm 9eb777ee4473755de438831bf2b19e1d295be66d4bc59d1e905216addff5c5d2 fence-agents-apc-4.10.0-98.el9_7.5.noarch.rpm cdfae68ad618d008f3dd50f3b0b4f310405653f4ae87a29ef573cb8b50c09e1f fence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpm 715b0d832981bd30145d9191e82d4dd6cca2d28116574f6d3af553583f6c8e21 fence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm 1c5110d822f0fc45470972f9aa591d125d6b6b2df60c42c6e97e1e23ad5b5818 fence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpm f45c0496cc8f62b38a607bc1eb905aaee8059ada05ce25f2edd97767da108feb fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpm 9554ae3db67375e8a8fba69e98c7618184a797eeffdb368096770f802e54764c fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpm 8cc1d95468c6695e09a24bb44a722d7967bf68684374369298f3d69f25b8519b fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpm 4b5e760e49a5b4b5938b360a33a567bccc5174725e31305dea94379115cb39d3 fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm e3588d13c40ca0a5f02aec0f4bd6cd11d603780319e2f6e0124dad250694296f fence-agents-common-4.10.0-98.el9_7.5.noarch.rpm 8a1438852f44871dad2cd10e37b792b000b8da88a9610a20935f203b76ba88d3 fence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpm 9210d74ce43cba899feab5f150c8796bfa1a21c36f8c4ad682f55026acdb5834 fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpm b1cc25a319a76b7a5532dcd89e51d3ffb29b5773e8d00e87c164915681ea5954 fence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm a603ce21cc4d583a7d2cf3514bfa86b87df276245286a45357a44fb0645ac40b fence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpm 1cb2f60753c0921f6b4d583447ebbabd2f060ae432c0c05e94047289b0cc36f3 fence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm c6d4b5827307bd294be5d3b5db514c8339b7a5019518002ea5a9e2731f2180c2 fence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpm adf029fc8261dd4e80bb7613ffb39bfdd6d97675867c2cb66f2df1bd420c956b fence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm b29c62b9a86bddf93d8007335899e527c2245196f6a5525ff9d1329920ce056d fence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpm 50b9a3e0dcaab3382fd60e3c9946d001f5bddb2e4922ea4c47b1c8f36313cfc4 fence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpm 839782b875bafb9851f5380265467fd8cb59d04337d0afb7e719bf398aae1753 fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm 595824e5824541b93db068c307618721117e83d79fa0955eff00b9a83e2e5810 fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpm 98823c1ea2340328ea1126ba5e07a4fa6c41f0ab0106a338c7a9111a3a0aff3c fence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpm beadc5eda302d3d4d3cfc77b4e606f157f0dfd8b227682ec657403280c0306b7 fence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpm 2c8c7516ae7a1e6dc7f75c84cae211ae8175dff636609367bb3e505608b7e7a2 fence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpm 6f6da1a9a57f3e8d173b3a707066ce1a464240a22ec8d7412840bef80ea147c6 fence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpm cbfc3a61596bc3cb727fb3637a7fad462399cf9a99ed8d2c3cbbc2bb55a705b9 fence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm 81942605fe379e5fb693f4a0a3fc901b7da475ae7e80efb2c69902d5c4ac9b17 fence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpm a4c1a40efc54723dd3a8d9864f225342fafccbc2adce1297671de62a1ddd2ee3 fence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpm d9131eb9a85446a0300d293063ffd560d5842574a38ab5fa5a086a015e335c8c fence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpm a2ce4f896abf0c1ba0c8d8a91250d2d93e4fe6c329a440a28845ad8a47e5584f fence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm e04840d57fb53b52116e5def506dc15b259738bf9c6a5e217cab7a9734ed3417 fence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm bad04313debdfd0fba572af71ffcaf0b44bce6cdc5b27abd336bb04b21e4cc03 fence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpm fb3c263b403bf48f085abc974eeada8577ee3627a77772777e5400fb4c1a1a7a fence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpm 64ca962c637ec094297c24179ef70b3439727b58d61da96ff3d3aa3a5eb1b4b4 fence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm e5446cb9eba94b7a18d8f34c36191e2ad2a9ee2454ac1b97b402069638693ba4 fence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm fea3b006e38f4755fd9ad51bedfe24e066f2039578a716d1966503a7918caa9d fence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpm 6cd5358c5eb9b91d6405655fdc1f5f50407c2aecc670bab43c1343efb1764013 fence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpm 1beff4da321ce3c6ef49bd72965360bdffa4999a4484082512f8f76c5215c255 fence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpm cc5fb5b61a1137042d81467b9d84297888e0f8db41196e92ee1565b92b6e7b97 fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpm ae9a55b99ff7c03ab7475361b4f091d59ff3f0371c99720ea2e1f17a1cdf1fea fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm 13a30870a30c9a155796feb07ab16603dc12ba2f35120b5a20d73c17d894be62 fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm 2913f2b8e391db7ca3719a116ac18856fb3831f9c57a5e9ff410386d882feed0 fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpm 363e48e2d3508b7871d480a2879e36ed770d87c15ebd5656ba60761156c73a3d fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpm 5a9d811070edfc6000cf30a45840c255a1838037cf7aea2315d3bff4db1ea575 fence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpm 8cd42adfccebf7e32ba3da108b9c7123f5a85a82526877f28f7ba67e0368368f fence-agents-wti-4.10.0-98.el9_7.5.noarch.rpm 6f2b223b32c50ae3fda6d1827d1e33ab274f8fe2a2580938080fcb1248f89758 fence-virt-4.10.0-98.el9_7.5.x86_64.rpm 8e1577b2a9e7ffb43d7958ee6b5a36aeb8314cb524fe1138c0dccb44f5cf8d34 fence-virtd-4.10.0-98.el9_7.5.x86_64.rpm 373d8f2d8ab4b7097960a617698176892e1524a954ab7469a71fbd6a9e1e5cba fence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpm e1910b67cae9b6c129e52e400b00ead560f30b85b6d8949993d1dd3e5f37434a fence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm 6e783fbbafe8401939f7502b5e4c1639ed7a2253e1148666b6065b5090f67e28 fence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpm c0f9204d052dd95917204fbbc7508d502d25bcfdee053bff6cf6572c2e319ab7 fence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpm dd2c2a4a90635ee3a4f328be60f78c7fcbb517eaacce9b7954c60d71a76da226 fence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpm 9bdac3f09b92c245846a3960d92a239aa369a6366d1d0372ebf1497be1b10e4b ha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpm 54b3fb738e231edfeaa7fe8e1b85796ea2593931e70fdeae82dd49a249657abe RLSA-2026:1939 Important: python3.12-wheel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12-wheel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking (CVE-2026-24049) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-wheel-0.41.2-3.el9_7.1.noarch.rpm cd591ef9b5412bbeb7d12f2efc69214d5b9e465f9953e1f70048981584ce5087 RLSA-2026:2048 Important: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. (CVE-2026-23530) * freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability (CVE-2026-23884) * freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server (CVE-2026-23883) * freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution (CVE-2026-23533) * freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. (CVE-2026-23531) * freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow (CVE-2026-23534) * freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow (CVE-2026-23532) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.11.7-1.el9_7.1.x86_64.rpm f06c06654cd4ca21aeb77e97e399dd1509782e9610a6ebcc1f14d78c2fe47fff freerdp-libs-2.11.7-1.el9_7.1.i686.rpm 5d54045e173c873222f5e5b62573a17321fca1a835031fd79c719b9f5df68a10 freerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm de51a2013e330909eac59480df5fdd5fe900a40689b5d77c838031102f22f3e9 libwinpr-2.11.7-1.el9_7.1.i686.rpm 097f4696902aac5238d854672e1e5372f12e0b595604492e89a833068451db48 libwinpr-2.11.7-1.el9_7.1.x86_64.rpm 64c5fdcec137a3217b3f377f2e4cfd178e81e967d95453a650268b605e31eef5 RLSA-2026:1089 Important: python3.11-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418) * urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471) * urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm 2a3ad1265cc45045ed81590f35ea039c05eff892ab7328a5d67e6fbdc8decc36 RLSA-2026:1088 Important: python3.12-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418) * urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471) * urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm 65184dbc29697269e3774d97ccf3202cb20b991b4561eacf620a5019fb4f9dfc RLSA-2026:1239 Important: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418) * urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471) * urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm ab9922e7d341b989357fdedd8f1ffde276877c36e9e2004346e5313f64fd1b5c fence-agents-all-4.10.0-98.el9_7.4.x86_64.rpm 84c183062490396e98df2ed6f0d96efee1375c1980cef79ff248be29ebdbe345 fence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpm 5e565902ed078f61f9a32577fc346548bef755f73b58bb0526ecfdbea66d1b22 fence-agents-apc-4.10.0-98.el9_7.4.noarch.rpm 6b371e624bbc6da963b17fd393a74bfe2625c5c6213b85e647b549f621098457 fence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpm 52c510f27e278feb07f73c3801effe63b69e33534dcd77ee49d84162bae4a48d fence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm aa595b9ba94f3d83df291f994b5ecb44913ac6061cdeebb869959662758f180b fence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpm 5b7c490680e6079a8d83aaa380bf24e2ebfaa217cc93125197bc08146620c741 fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpm d40660a9554f0fd81f1989398026ab08ee8bb3c60313ab3f01ab59f2573e0c87 fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpm dddf9d3612a3c4043d263f4f72999ca829e5a332353bf6f25185917dc1f4689a fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm a0a32c875c248d178be3c2d0449784d9b0784071d08c75f04f0250138f3473ec fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpm 1936bd6758468bfb0a3a14c10592cd6795cc8384f882872aa56a894518c32b6c fence-agents-common-4.10.0-98.el9_7.4.noarch.rpm 548de028f6b49572f405823815540cec6c781fdacec06000fd83b00341aaa1ee fence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpm 7c9528adc575a3b2c18c0ea8473751d875d6bcdc7d9baf62b642542668b9424c fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpm e25a5cb9bc7a9afb3083d84c13c007a5f9aeccc6bd7cd744046ffc0445a7e4d6 fence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpm 8a07e71bb2d383dfa698edf80659d8c20732039290fa6d8fd3176411580d0cec fence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpm b372a60153d9ef486f007e3cdf8c7963946fa85ced6830e2a1cccca63e1abda7 fence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm 086c7ff86c7b4d94d36ed5b68e1a9420be5d76477c349a76f18da30c5f9fca5c fence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpm 69545c3e79987bdb7f08d048ce90d4816e99b82591e94c6f9b07a086feba42be fence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpm 90e9390d2027183922c24332e442528be8ece638296c3627d70f8afcf11e4d93 fence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpm 1aa542d407acdab2d98f0adb70c6fdf7be6f5ab74b386dbb85ba29a4617e90b8 fence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpm fbb951dfe47196fd2d95be695df063d3dd9767d0a3ee4e564eb761a9246a3880 fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpm 5c6bc3c3e4125f78ae73705417d80e5b580c60948b129e41ce517a431f5dd4b2 fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpm c8c1628a6373568b0fc444d88b0bdc12f81e18c0416639ff0199d189ed37f0f0 fence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm 9bb562d6046667f3e077029a1fa0cd145e3b07300e931a89cd4c99e65851207a fence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpm 292e16f00ce349af27bf77263a760afdac0134a3a73ace6cef298cc6fb882874 fence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm 1bc0c77f3c147f08b8c597939b6178f12621e490952d8e42b896fa09be2151b8 fence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpm f65a84be93649ca03fd77a6f348531b65a7282fd102baf8dd245028903408b4b fence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm c69bdf1a378530674bb1eb6cdce034b09aafeb6b59b2fcae1eb829589f35e31a fence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpm 0faa3293c3ceee279ce5cf5cfa3d05f9f621d669e37c375d31d4fa4d1eb39499 fence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpm 1cfbb7cbfc5073827fbabb0909a032094a07279ff3683e898e48110311cbf385 fence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpm 7a02e67847c828fbc43ec707e13ebece96fef4f22ea7aa8072837db03686dbc0 fence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpm 61daf0e82ade2c6dc0bd1c888d553a35bd27f9371dabe8f4e423224b6249e53f fence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpm b3f320d7a1d7e949065bb69345ae81312511d0ff0a699e9e2921b9357b72a081 fence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpm 772bc0bbd283e58cdf390a29c69283548e928e41000a845ecec0b0a874b9aa3a fence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpm 271a1751a94e265a23415e6884133e54338058b0255eb0d153c17c49f041a2e3 fence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm a0b8e7e5cdc6a1d4c304648e7ced0369f17cd9ed472f19d27cace1504a263157 fence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpm 68f09b9b19797ffae806ea5acf1c5811db0409af39097c3bfe4b63293ebb0526 fence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpm e6f2e85cbb41fb6b04b76fe2afd6caa2cb059fc8600c6f50a4bfeaee3b657171 fence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm b7941dc05b94201f9079e56da27fbcb565ae2916dbb77dcc35969352fcab0eba fence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpm 22753141f4f93fa77515765106bd81a7f4bb53669018c23051369b5dccb2508f fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpm 62eece770ac7fc570db7ea1603389415df3221a9a852ebbb0aa839817353fe48 fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpm 55609cbf6845f08f9bdaad3fbc2015045e9bd2ed2de70bdabcc2f673a37be64d fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpm 6386a3bf0d2ba71fe0e8f4bf0cea50225343fb248b381b701bb51a5e1f279beb fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpm 34f89127f617d461081f24afe8d5e72603372736e6b391ca07d1628f32c71d77 fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpm dfb87266104c817a14e641c7123bf8a6bc79d26b4d09f9aacf5b454d4c8004fe fence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm bfa6dbec28f9695dc8ffdf3c355f096154c3abd4156b621b9931d7651498c490 fence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm 6c1f6484ea13ed229faf331971f56c4a7c472b17f985038b99d5cddc1cdb54aa fence-virt-4.10.0-98.el9_7.4.x86_64.rpm 625f9e46dab14d7407a9272111dc472f80b4031db8f738730a530ac165d05539 fence-virtd-4.10.0-98.el9_7.4.x86_64.rpm f6910350c4660f158511b5c9f5ab3101fdd6191cef3b8e5dc3c1d5a25020d29f fence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpm 56c0678f7eb28f2523bf2cec416413c4086a3ead4e7880f50d77984f44c949a3 fence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpm 802badbd1dda867aba64b661eb67a9f647eb9ec360fedb39f824dc19430e5d1a fence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm 9d10ccbe4bec286f70266ed55c840396699cff8497e43f8ec35da1f330b80e06 fence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpm b36f92d463bdb61c0517d99373d69a5bfbf153973727b4133166c8e892142426 fence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpm d61fd7b0709c8db6cc64bcd496a482a15adcdb88437db2b303b3431a4d5e9dd5 ha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpm 7d1b6c55c66d2317ca3091fa153631f78f72dc85b9932712539c7ad34f5fbb5d RLSA-2026:2216 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (CVE-2026-0719) * libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-12.el9_7.5.i686.rpm c7ba857ee2c88453bca5f2756ff8563611f612a57190e4335ac274e5373018f2 libsoup-2.72.0-12.el9_7.5.x86_64.rpm 15b00ca2c84c416373bbeb47c2d8f8203bd266ad7120605fcd4d871448e88eac libsoup-devel-2.72.0-12.el9_7.5.i686.rpm e40ab9b690388a71e55bc5a63d9f63ec764edd497025f91de5afc11ae4c7c795 libsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm de1b00ca70e4b419e48f3a624dd49a473dde91482144c305d742d5f1e7fb9e71 RLSA-2026:2781 Important: nodejs:24 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs, nodejs-nodemon, module.nodejs-packaging, nodejs-packaging, module.nodejs, module.nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132) * nodejs: Nodejs denial of service (CVE-2026-21637) * nodejs: Nodejs denial of service (CVE-2025-59466) * nodejs: Nodejs denial of service (CVE-2025-59465) * nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131) * nodejs: Nodejs file permissions bypass (CVE-2025-55130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.3-3.module+el9.7.0+40025+0e0cf6b2.noarch.rpm 6312725fb2193283d8b2d99e7a2ce84778cfa3a4388bf460f0dbf4bffba5225d nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670 nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm 36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e nodejs-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm 760e58c29fb30f648896b393044d687876461ce5ff7ad7a3e5cfdfde1f023889 nodejs-devel-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm bc4d9ef0e3fa80b4c8aa1c794a270e5a26c7bfa7c107abd9567c2abdb219a0c4 nodejs-docs-24.13.0-1.module+el9.7.0+40084+5fab4181.noarch.rpm 262fb41a8a2e03b262228efcf2efeeb77e8f3552b112464305fe196ef0ccc97f nodejs-full-i18n-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm ff2c2ee13e5037e6431bfb788df7e2c4db0d07463bebc3c4811d152db98eab03 nodejs-libs-24.13.0-1.module+el9.7.0+40084+5fab4181.x86_64.rpm d675287b49336223ce825d90b91ad57e915d9b1efa63372adea82b124de8473b npm-11.6.2-1.24.13.0.1.module+el9.7.0+40084+5fab4181.noarch.rpm 85071c2cdfde7616bf448b61d895ee90753366293896b7b28373fd278a5c7282 v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+40084+5fab4181.x86_64.rpm e5a05f26a79bb25eb65750b99b67fb00f101ed17e577786c557dae8a2d77c287 RLSA-2026:2782 Important: nodejs:22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs, nodejs-nodemon, module.nodejs-packaging, nodejs-packaging, module.nodejs, module.nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132) * nodejs: Nodejs denial of service (CVE-2026-21637) * nodejs: Nodejs denial of service (CVE-2025-59466) * nodejs: Nodejs denial of service (CVE-2025-59465) * nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131) * nodejs: Nodejs file permissions bypass (CVE-2025-55130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm 40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm 0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51 nodejs-packaging-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm 255a5c340e26e8b83b187f5e9d668ab4cba7b3d7598ba7e0a4ff45cedf91b935 nodejs-packaging-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm 80650f49e762c304da81c274cecc66a56e02896ac1616490231088900821f4fd nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40051+f2ef3f49.noarch.rpm 343373af76dee4288e6f64388a4c80efe40c6001b68ee4ae9360c354fee8e948 nodejs-packaging-bundler-2021.06-5.module+el9.7.0+40050+22a42328.noarch.rpm ac36ad2443091780af81a7233a23d632b9b28ddad8c7170960d2aa44a0d8a8eb nodejs-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm 4bb62decd08c0fe50e6478ac4cb86e27577c804720d794f78f43fe512399505b nodejs-devel-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm 3c6e3c41695922e57ab87f034e6e238490c3015b8d1e2d5930f925c376d7a365 nodejs-docs-22.22.0-1.module+el9.7.0+40083+285810cf.noarch.rpm fd1b5646826cbfd02d524d1e0ff306db1b49ea2d204e038d82ea5c0739429020 nodejs-full-i18n-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm c8b726ee22dadc1059a7c71b41bb7b483b329112b72e77f2ccfcb4ddbabfe43c nodejs-libs-22.22.0-1.module+el9.7.0+40083+285810cf.x86_64.rpm fc71e77ebcf8153ac6b964ad5cb71e8bcb7fd6ff30ce332789f4337ff5f1b6fb npm-10.9.4-1.22.22.0.1.module+el9.7.0+40083+285810cf.x86_64.rpm ac3d94a89e9d8e03eb61d86cd9822257a1ef0a2d46fce8ac1d6e49b5f9e88956 v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+40083+285810cf.x86_64.rpm aed18ac62bf045edc0e6632b0c0a14429e81001a17b078be23709c7d0df23a29 RLSA-2026:3516 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * libvpx: Heap buffer overflow in libvpx (CVE-2026-2447) * firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785) * firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793) * firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771) * firefox: Integer overflow in the Audio/Video component (CVE-2026-2774) * firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776) * firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781) * firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766) * firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769) * firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787) * firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768) * firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783) * firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788) * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784) * firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759) * firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762) * firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761) * firefox: Privilege escalation in the Messaging System component (CVE-2026-2777) * firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790) * firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763) * firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792) * firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786) * firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789) * firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760) * firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772) * firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779) * firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767) * firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764) * firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765) * firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780) * firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778) * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758) * firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791) * firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.8.0-1.el9_7.x86_64.rpm 799cd72a37efc6816a344e6217aa4ba515a45c4d7a28f46ee0be1e0c21cedb39 RLSA-2026:3507 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for valkey. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * Valkey: Valkey: Data tampering and denial of service via improper null character handling in Lua scripts (CVE-2025-67733) * valkey: Valkey: Denial of Service via invalid clusterbus packet (CVE-2026-21863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms valkey-8.0.7-1.el9_7.x86_64.rpm 945663d68e4393712583d3bb5851a02bc3781a734d7274ea13f8fbeeceb412a2 valkey-devel-8.0.7-1.el9_7.x86_64.rpm efda3938458b415353a9ab7862827b9a293d87f12af88d6bc8c91e2929c92e74 RLSA-2026:3638 Moderate: nginx:1.24 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nginx, nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied connections (CVE-2026-1642) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 2ead91879a97e7313476e065e332f55b4f568948be8668495b711f12d802e7d3 nginx-all-modules-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm 4bfbd54a55ccfd6122590d6622f17a4b20d755fe672451bd07fdbbaa1eb141d8 nginx-core-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 35c6aefd449cbc497e82203ecf4340eced4acb8e0311c3a51789a946cac93af6 nginx-filesystem-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.noarch.rpm 91e78a263a9a39bb2cdb77cf05eb463ada7a1704c875f1abf39f3d46f2c54770 nginx-mod-devel-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 90782c83e70099d51f328b436b2697b1d7c15d454f1032dbf7676908e288c594 nginx-mod-http-image-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 347756de538c5c34ccb8d4a5b2650b86c680c11060174ff8c8897c02da0ced6f nginx-mod-http-perl-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 3d3528c490fa82a1840d8c05603972715550f6e9349ab5bf4d329b7e56d7b89b nginx-mod-http-xslt-filter-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 39ed4fc5eef4c94fcf030fbc910783c06c9c1c99f5f3275b41e88aa0d4411dca nginx-mod-mail-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 5c42710e27529ea5533f1e367ab04f325499f6e8b4268d2c5f18c491347f9cc5 nginx-mod-stream-1.24.0-5.module+el9.7.0+40088+99dbd8cd.1.rocky.0.1.x86_64.rpm 6fac18b9f06d8855aad7371c3b47b86f0205149462b67dc3d8cb8170ea7167b3 RLSA-2026:3668 Important: go-rpm-macros security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides build-stage rpm automation to simplify the creation of Go language (golang) packages. It does not need to be included in the default build root: go-srpm-macros will pull it in for Go packages only. Security Fix(es): * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.6.0-13.el9_7.x86_64.rpm 8c3730cee4a141eda3955a4c99ee52bfcb9ddd6d1b4ee5968927be6a2b385356 go-rpm-macros-3.6.0-13.el9_7.x86_64.rpm 40db52421de7795136dd18aea239085c6aeb0c7becc6a42e59c56cf5ff2fa405 go-rpm-templates-3.6.0-13.el9_7.noarch.rpm 4c65ae7e4a0ae8c517256ed279983832ff683bd98ee0849a74d73a025b87cb92 go-srpm-macros-3.6.0-13.el9_7.noarch.rpm 25cb1a88500e8b092244047b6272c1c9a4ea252443794926e8d52e1553aeaf66 RLSA-2026:3730 Important: postgresql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006) * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004) * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.23-2.el9_7.x86_64.rpm 2061fca87cb5070d743fe42ad2f6a7342f2571803d392ff8b0858530abda5013 postgresql-contrib-13.23-2.el9_7.x86_64.rpm fa6fea01ead0ec59d8e3364fadd80e9614625283d5fe917d40b3c727a6662833 postgresql-plperl-13.23-2.el9_7.x86_64.rpm 6d18c99d5936d9ec787e5a959fb6a3e8b321282e2960679d274594dce178a299 postgresql-plpython3-13.23-2.el9_7.x86_64.rpm 998bf1e2d997af8e230f91dd8c30dc99acddd36e1052a22bb04d6b302daf9731 postgresql-pltcl-13.23-2.el9_7.x86_64.rpm f8ccd3a767f4d8626a0005569081cecd0dcc41c99532a5c4a3f6b0f3c6479f2c postgresql-private-libs-13.23-2.el9_7.x86_64.rpm efb98a2bd46d9b10e7ee546bb1ac08e07c84c7c51b88092cbfc3745eb7fc0757 postgresql-server-13.23-2.el9_7.x86_64.rpm fde4be53a8e3cdc9cefb4304f6e9a8376fb5f1e5ac70785c8cf5185d44319894 postgresql-upgrade-13.23-2.el9_7.x86_64.rpm 5a306c0b0a50f944d2a80dfba2615eda014c2af5a02481484ff21bbbd819000d RLSA-2026:2709 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-src-1.25.7-1.el9_7.noarch.rpm 06ff7fc9c1fadcb3eb19d879c7ffd776fbd6b5978fe30de6d1324fb79d9acd09 golang-1.25.7-1.el9_7.x86_64.rpm 5b9a10f137881f64aea92eed46fd1a5fd45ef46fcd583824c290f8b65dd4ed1f golang-bin-1.25.7-1.el9_7.x86_64.rpm bfcd35c72cdca1091979065bae72314f5a2dbcf7b7eda06f85c6ef4809de9bf8 golang-docs-1.25.7-1.el9_7.noarch.rpm 1779eb695fb202791468ecf02defd75f912cb552dbd95e701c8d6d8bff9e57f2 golang-misc-1.25.7-1.el9_7.noarch.rpm 8da00c2ca11732ae0aef6d86d8a98179aa166dee9e5b2a1864295735478be037 golang-race-1.25.7-1.el9_7.x86_64.rpm e32bbc409139ad2b596b0df2b438433c2265ef3b92a7d4e50a556b3d7b44348c golang-tests-1.25.7-1.el9_7.noarch.rpm 3b4242ecbb0611261f5b7ca2bd1709d493240244344012e48fd196ba40b7ea92 go-toolset-1.25.7-1.el9_7.x86_64.rpm 57dc9b357be58f99b59b3849cf63f0e12f263cbc2a4fd8efda41aea65318e100 RLSA-2026:3896 Important: postgresql:15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pg_repack, pgaudit, module.postgres-decoderbufs, module.pgaudit, postgresql, module.pg_repack, postgres-decoderbufs, module.postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006) * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004) * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-1.7.0-1.module+el9.7.0+40011+28af63c9.x86_64.rpm 5088cc0af53acfb7d832ab49b383c3516d5527c426be7868dadeba97a2e938a1 pg_repack-1.4.8-2.module+el9.7.0+40011+28af63c9.x86_64.rpm 402ca1980510592c3053e6e17a21fa52fa2ac89a2e7e467e240575d853ec611e postgres-decoderbufs-1.9.7-1.Final.module+el9.7.0+40011+28af63c9.x86_64.rpm 6cc1441002d2afeda2f6fb121bdb894076e43d024171f41407d0eaf1dc0b0950 postgresql-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm f1edb1f23045ddb5f42e59b03c799d253542cb96fbc9cbc9242026231709f11a postgresql-contrib-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm 8bcb20aaead86efb35bd4ee2e78ca6c7f546ecf93625173414300f93677f0610 postgresql-docs-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm f6cb451b8ab9c771f3016aecd351ef322c2e10adbff6deb61b580dea9bcffb9d postgresql-plperl-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm 5ac373aeb61d782fee070440ac8e0aa3ede6b20edc7267610b85b7d12f9986d2 postgresql-plpython3-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm 4a5f8b685d22a56bec4a2028650c2d2cc149d186ee335bc8ea1ecd3f1490365a postgresql-pltcl-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm c933bc473a13e1fa6afc4da116c3db2e6f923c9b2c989a5d4dd06370cc7617ca postgresql-private-devel-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm f8d0a8a04395b11b9a5c3fa2cf0b383f09170323e5bd63453faa289b86583ebc postgresql-private-libs-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm 013db3c5b41705a08064dcf057529b5034c3e9c8d1ef3a4fbc3ee107b153fe5b postgresql-server-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm c6d875e9631a9bcc5220a9d258eb61a05f517930896af065a2d697bfd30c2e51 postgresql-server-devel-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm ab9af0f5be083615001c8ecbdc0848dc17b3bd492a56b236665faf0aec5ec04a postgresql-static-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm 817dd4a1d3a348f52a2a1841c6781abbfb4b6384d6d38f2bc8f3b7f01063ed08 postgresql-test-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm 78b0ac3375baf6deab3cb378880179f31dc1f4968f5cb8b5bca4d95067fd6359 postgresql-test-rpm-macros-15.17-1.module+el9.7.0+40097+c6c51561.noarch.rpm 1e93069c3eccde2f7333ad6f530ff68e1198933bcd5a64fdbdc8215ed6b9f052 postgresql-upgrade-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm bfd5985c7983e7e5220951d51ff757d1a148e90267096ef69f9acbc1c2de2c74 postgresql-upgrade-devel-15.17-1.module+el9.7.0+40097+c6c51561.x86_64.rpm c13d428bf2529405cfbed285996fbaa27460f5ce167476d45b10483e58516d91 RLSA-2026:2776 Moderate: edk2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms edk2-aarch64-20241117-4.el9_7.3.noarch.rpm 7598c3b0dc0c66f987205371d48cc54584e58364f86e14702b59b841581cf6ba edk2-ovmf-20241117-4.el9_7.3.noarch.rpm f317610a87f37e44bb0609184a7b0aa765ff9477f1f8d9172c7f353d998ab4fe RLSA-2026:2799 Moderate: php security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: heap-based buffer overflow in array_merge() (CVE-2025-14178) * php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.30-5.el9_7.x86_64.rpm bebeeadb2660a30c2a725f1b9fe55214d109fa1bb9cf086dda2281c1807cd49a php-bcmath-8.0.30-5.el9_7.x86_64.rpm 44b58d93cc01574a211473f81b477d6213dde9f227d81df608ee7d4897f19335 php-cli-8.0.30-5.el9_7.x86_64.rpm 6f1b44044ae977c3c741ccc57a69b3df94c79b4ff58fda955c109e1ff76b19fc php-common-8.0.30-5.el9_7.x86_64.rpm 6e8a47aeefaa6f079f302e0eb561351e9a35379fa43fd29e8cc9caa10ada9fc0 php-dba-8.0.30-5.el9_7.x86_64.rpm ad12359077d47c2077bdc51a5f5f8d8b7d56b2ee64f64f4e439c391fcfc59ab2 php-dbg-8.0.30-5.el9_7.x86_64.rpm ca5f8bda1a32f5afcca721ba5e7cccec1215c6531041bab2f85354a552c0ac94 php-devel-8.0.30-5.el9_7.x86_64.rpm 42e54ee181dc78197dccc7512fd30daafb8818014b08eb70af83002ec7e08bfd php-embedded-8.0.30-5.el9_7.x86_64.rpm 6069e3a4098137d11210398d81d3525476fd43381ebbc6fd01b13f1385f230bd php-enchant-8.0.30-5.el9_7.x86_64.rpm 159b47fb0c9ae9bec92aac7e447a4e037d5b3287e806398e24aba3d0b04e9262 php-ffi-8.0.30-5.el9_7.x86_64.rpm 4626415df9ee573b4787e3148530d4cc4688a23fd224d2bfabc6b991a89d9a02 php-fpm-8.0.30-5.el9_7.x86_64.rpm ef7e325da11faf77512dcdbca4ccc33417e77b8e5ec69b4531b033bdcd20a598 php-gd-8.0.30-5.el9_7.x86_64.rpm 19c7339f568635bce5ea97c2cb837ad171d3e33b1845140d2e1f47e3cfd75e56 php-gmp-8.0.30-5.el9_7.x86_64.rpm 3a71bc66e0359d28571b3d0c782682e29f5f6b7d2d1f0dce76cb8b5dcfc4e9fa php-intl-8.0.30-5.el9_7.x86_64.rpm 0172ca035d7913348024ebcaa070d3aa80c3ea313354587c72b1198683b7d420 php-ldap-8.0.30-5.el9_7.x86_64.rpm f65d4ef0291b077c9ab9491446fb86bb1ec152c24bc0b279acf5ddfbfd6d01bc php-mbstring-8.0.30-5.el9_7.x86_64.rpm c106f1248bd838d6ba9ecc629654820999f04a28e6d50e05ff53a37024771d39 php-mysqlnd-8.0.30-5.el9_7.x86_64.rpm 1e64b4122a9c89fa1f5ef9d133cdf5c933f341a2871ebe42ecc24db8427dd397 php-odbc-8.0.30-5.el9_7.x86_64.rpm 9f34c46ee18e554163c23d8f7fa9f4a786569913c25208488956b5d952029ebe php-opcache-8.0.30-5.el9_7.x86_64.rpm f09ace68c1bc6537119210ab0f6d5d03b234c76facd9ee2581a6e18153694d10 php-pdo-8.0.30-5.el9_7.x86_64.rpm 55caab0afb198eccdb3455623525cf8a25adf59d34bbb7e53e65f711a29cca45 php-pgsql-8.0.30-5.el9_7.x86_64.rpm 87afb99a59d0dd1a723193c5f126a84432b845ae46c55c2b30687b4d462a335f php-process-8.0.30-5.el9_7.x86_64.rpm 00a67acf302ec93f5c14e204c4748855d066dbaa0628a2a191d36c1eaf715702 php-snmp-8.0.30-5.el9_7.x86_64.rpm 707562cf317d97efcd7bc5d1dae93c4a3089e877913eefb5784b5f27062ed1a8 php-soap-8.0.30-5.el9_7.x86_64.rpm 62c1e92029f2aaee59d00873d9b7a612de771c54271f0a9e6de9d1d075985f71 php-xml-8.0.30-5.el9_7.x86_64.rpm 354ac92a315770e01fa2271195c8d32bcfd6092b48d0e7f0aa3b640d8b247437 RLSA-2026:2920 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721) * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-18.el9_7.x86_64.rpm de0d719513721cb091fa824070c1f06eba87e98d48b784f542afa1643b867d52 grafana-selinux-10.2.6-18.el9_7.x86_64.rpm b3b767fa64ebbbf72e39c8740e8846b0d0691e146dc09a50b36e1f39288ee345 RLSA-2026:3031 Important: libpng15 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libpng15. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpng15 package provides libpng 1.5, an older version of the libpng. library for manipulating PNG (Portable Network Graphics) image format files. This version should be used only if you are unable to use the current version of libpng. Security Fix(es): * libpng: LIBPNG has a heap buffer overflow in png_set_quantize (CVE-2026-25646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libpng15-1.5.30-14.el9_7.1.i686.rpm 8ee8d6df67a501fe60a55804060886be26a4d6567556595c9716a6f102353a88 libpng15-1.5.30-14.el9_7.1.x86_64.rpm 9260c7546d05538e6acd75378d86b2df6be91207ef5aa4c0693aebdead423b3b RLSA-2026:3040 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-12.el9_7.x86_64.rpm a1f3f7985a4672a80cee798002964421e72d303dcdd734ddacace54555cc41ae RLSA-2026:3034 Important: munge security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for munge. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods. Security Fix(es): * MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms munge-0.5.13-14.el9_7.x86_64.rpm 7015cfb275ac6dce1847fc96c8f824d56ab6d81d145bcc33f2903a0544da9ef9 munge-libs-0.5.13-14.el9_7.i686.rpm 25e40f5c3e4c4733655a36f0d2b1eb6514add9a1942c65aa0b10f44d93a62d8f munge-libs-0.5.13-14.el9_7.x86_64.rpm aca9c8a5dd6714cace763ce2f80b8f919fb3f4a34e2cf038a8692abaa118ea0d RLSA-2026:3067 Important: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22855) * freerdp: FreeRDP global-buffer-overflow (CVE-2026-22858) * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22859) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.11.7-1.el9_7.2.x86_64.rpm b0555de57c4b4b1f488ab28e19b6cc426feb8127e58fa6861ea1c969ae8d563e freerdp-libs-2.11.7-1.el9_7.2.i686.rpm c2c1e64bc66ea945469eed78124de14c05efcd3df12bd525a3a62c63d6120ebc freerdp-libs-2.11.7-1.el9_7.2.x86_64.rpm 005527f100fd1cee9a379d9cae1534f90b50465e09904b74a2cad6d99c75bb76 libwinpr-2.11.7-1.el9_7.2.i686.rpm 3aba08d3c68ad8040bf436001cfa08dc3e98a3a52ec4fedc7fb4448b474bc447 libwinpr-2.11.7-1.el9_7.2.x86_64.rpm c867689f278fd267cb0196a29292c9cd1931d3ae66901e4f165f01915e34a69a RLSA-2026:3095 Important: protobuf security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for protobuf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * python: protobuf: Protobuf: Denial of Service due to recursion depth bypass (CVE-2026-0994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-3.14.0-17.el9_7.i686.rpm 39a29e4b6c35101db574127a3b44c47b5c1dd9fbf5051e896439a217ef4e55c4 protobuf-3.14.0-17.el9_7.x86_64.rpm fa56a95f91886936b60bbf3264f2374ffe991efa16963c63eb6be949ee5c552f protobuf-lite-3.14.0-17.el9_7.i686.rpm 20f3e09fc0245959cf7fc182fc5177d27cd6421a79bf1c23c82d8566c338a827 protobuf-lite-3.14.0-17.el9_7.x86_64.rpm 24a5afb7f79d66d8b18fbbcfa9152ed717ca13b31a58d2141c7fc48c11a5008b python3-protobuf-3.14.0-17.el9_7.noarch.rpm 6390cb4e53898aa27737bd0bb6a100cd8d3526bc77b074a8faa9f31b9bff2477 RLSA-2026:8075 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-bind-9.16.23-34.el9_7.2.noarch.rpm d67ce0025d0f5f48cd9a23433f07d274494e770850edb9b7e312c6ec80804ad5 bind-9.16.23-34.el9_7.2.x86_64.rpm 52458bd214f2a70075611c59b9d99ee8ffde1deb52f07f5b3f7563701d57eb48 bind-chroot-9.16.23-34.el9_7.2.x86_64.rpm 1dff3308c92a82179a8fd055d4c196b7d57032915ff1c441d4d75ae5e5f2cfa9 bind-dnssec-doc-9.16.23-34.el9_7.2.noarch.rpm 715b41a7a1b831e76960778cc72f0de2d063fd2e3c3fe19de36d4ad1fd64d286 bind-dnssec-utils-9.16.23-34.el9_7.2.x86_64.rpm 37c4abfff5723d22b662cd5920e92ae19023fdb069c7474bd1e2cd0f99909373 bind-libs-9.16.23-34.el9_7.2.x86_64.rpm 622e8fd2477ce8b63d67b2209254e3242276effabfceecb6602e96b4848bab60 bind-license-9.16.23-34.el9_7.2.noarch.rpm c4fd090abb54f2b0076777e75dcd4d80d6c35b6b58de4ada914882e0f1dfe0a9 bind-utils-9.16.23-34.el9_7.2.x86_64.rpm 0a14fa9abcc9614dfea379f3dda6feee72defc6d9aa59f60c3a5a3d52571a659 RLSA-2026:3189 Moderate: 389-ds-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.7.0-10.el9_7.x86_64.rpm 5c643865cedb47feca303aa4c11b05cc8aa3a91d8df77e1a54e9199f23b97332 389-ds-base-libs-2.7.0-10.el9_7.x86_64.rpm d4e7fe55f0f97b6da746b1918f5563b28d25c06866e62676306dd6427895080c 389-ds-base-snmp-2.7.0-10.el9_7.x86_64.rpm 966dd4eb329829841172729e1873dd16d51046f737b5b949826e7cdc063ec794 python3-lib389-2.7.0-10.el9_7.noarch.rpm 2e4c7567887474b9bab1c38712037c56128d991adc562ae9e27e92bf5367e67e RLSA-2026:3291 Important: runc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms runc-1.4.0-2.el9_7.x86_64.rpm 7d573a74cd04a450c27d850d2c9955f06c105b4272e4d7cbb36800e0085626fa RLSA-2026:3298 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.41.8-2.el9_7.x86_64.rpm 07a23cab0c4d9706786fcbb74a63f4775b565bea4cdeffa879f7b7ad716bfa36 buildah-tests-1.41.8-2.el9_7.x86_64.rpm 447b066463113299f85afac87fbe52418441053ff6913897720639c4e8e11de8 RLSA-2026:3337 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.6.0-14.el9_7.x86_64.rpm ee01974251eadc0dfa0c6c80ec935677d4af3e6f8a828d1fcca14efd4e1c6b99 podman-docker-5.6.0-14.el9_7.noarch.rpm 30f99a762aef333e1818f88b93de7fb87446b9d2d90b85d4d6fd0ff442d1235e podman-plugins-5.6.0-14.el9_7.x86_64.rpm 9079894aba7c83204be6a49c751656a8877363f4e64a77f2124c9928d44971ff podman-remote-5.6.0-14.el9_7.x86_64.rpm b82ba25771440ca7bae3eba1d3582864dd675084488eb1ed405efeb4d5519abd podman-tests-5.6.0-14.el9_7.x86_64.rpm 2c0920a4aa311d605bedf312cb740aeb7886637c1eef8c11a8347831570f8648 RLSA-2026:3339 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * libvpx: Heap buffer overflow in libvpx (CVE-2026-2447) * firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785) * firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793) * firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771) * firefox: Integer overflow in the Audio/Video component (CVE-2026-2774) * firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776) * firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781) * firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766) * firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769) * firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787) * firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768) * firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783) * firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788) * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784) * firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759) * firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762) * firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761) * firefox: Privilege escalation in the Messaging System component (CVE-2026-2777) * firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790) * firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763) * firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792) * firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786) * firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789) * firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760) * firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772) * firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779) * firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767) * firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764) * firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765) * firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780) * firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778) * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758) * firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791) * firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.8.0-2.el9_7.x86_64.rpm 548efd2c777b9055ba52370f6ef04b6d755b67c01d8b709083f4fa64eed31049 firefox-x11-140.8.0-2.el9_7.x86_64.rpm d929124a2a10925d529d07460834e25ca615cc921fc8277219954fc1cf84876d RLSA-2026:3341 Important: containernetworking-plugins security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.7.1-3.el9_7.x86_64.rpm c2b2ba502c8162141bf8086b1ce8fef0b187db94dc81567fa71393139a13c44d RLSA-2026:3340 Important: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.20.0-3.el9_7.x86_64.rpm 28d876fb9d666f766bedef4afddf13ad145e954391e64fe446320bdd357ae16b skopeo-tests-1.20.0-3.el9_7.x86_64.rpm 2069dfc0fb3f5965b29496875084bb9bfd0a062fc3c026e037acba949a3e08ff RLSA-2026:7896 Important: nodejs:20 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs, module.nodejs-packaging, nodejs-packaging, module.nodejs, nodejs-nodemon, module.nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996) * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904) * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135) * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm 40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm 0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51 nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670 nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm 36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e nodejs-20.20.2-1.module+el9.7.0+40153+4d595597.x86_64.rpm 3076698797d0b6e29edd0818759588fd3b85842c4ac4504c5a90d23084afd782 nodejs-devel-20.20.2-1.module+el9.7.0+40153+4d595597.x86_64.rpm 34790350ceea244d20538777c681c2848125639f09e1b69ad1ce77939356c3e0 nodejs-docs-20.20.2-1.module+el9.7.0+40153+4d595597.noarch.rpm c29f6670692e97844abe4340c855b1a64ecf75f83da4cc4854bbdd60b5006b0a nodejs-full-i18n-20.20.2-1.module+el9.7.0+40153+4d595597.x86_64.rpm 426700954e7985a5305dadfd8663c739cba1e0b1ea98277224e611764cf11b29 nodejs-nodemon-3.0.1-1.module+el9.7.0+40153+4d595597.noarch.rpm 60089165d5593049f992eaa6af8f75d538c9c13734cc8dd7b8f7b57554397865 nodejs-packaging-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm b633e5ce4d8240ae950189fff640804ffd62eb882aa7bd24eddb152a9f460d6d nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm 712c40786611b05cb031ef7a0d7464a3cc2cc78a26e19886e5631caa7aeacc68 npm-10.8.2-1.20.20.2.1.module+el9.7.0+40153+4d595597.x86_64.rpm 008a2ab33deb8b388f7de14ce6601f32dcf6cf9bc2f2d9f22f80dd38390d79a9 nodejs-nodemon-3.0.1-1.module+el9.7.0+40165+d075e3f2.noarch.rpm 170b1ba1b9cc18f2f714e0014963f8ac742aa4495c6031949a5567f6f6497eb6 nodejs-packaging-2021.06-6.module+el9.7.0+40165+d075e3f2.noarch.rpm e2c6fef43f1c606b5c1314138077954ab7d8bc935b66d7f0ed8d2aab5f7e37be nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40165+d075e3f2.noarch.rpm 31d2c7e734bed698052fa8c43d3736faf12902d85a8f85c0a378242bf7b645dc RLSA-2026:4110 Important: postgresql:16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pg_repack, module.pgvector, pgaudit, module.postgis, postgis, pgvector, module.postgres-decoderbufs, module.pgaudit, postgresql, module.pg_repack, postgres-decoderbufs, module.postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006) * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004) * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__postgresql pgaudit-16.0-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm f8d8902f9a66ca3e78f9609bad96fdf9cf11fcd3684e647c7a6db64e24c0213c pgaudit-16.0-1.module+el9.7.0+40060+39463e08.x86_64.rpm 822c0217f4859f176536174381a77f70256fa03addb007e2f7f8b1a06449aa44 pg_repack-1.5.1-1.module+el9.7.0+40060+39463e08.x86_64.rpm b257288f674866e98d3a51f36b1c2c7641078c321d05515de1a74e8e8c64c66a pg_repack-1.5.1-1.module+el9.7.0+40012+a654bbaa.x86_64.rpm 2fd23517b22a8b850c899be9f0f50ecdde832d436a7702d111901ad9c59bee1c pgvector-0.6.2-2.module+el9.7.0+40012+a654bbaa.x86_64.rpm 3ba39c238c4bf8e75e202f2a8b70b4e6b37715caa82a964354dbce25ceadffff pgvector-0.6.2-2.module+el9.7.0+40060+39463e08.x86_64.rpm 617caa27b190da601e71ebd674d9403e3e112b1379b37a795f8e8e31d3cde5a8 postgis-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm 7d37d2a8e9e856f000017bb0a1b9fa6feed9a411fb24e6affa4ae5e8dc920353 postgis-client-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm 710413b03fa76c0bb57d5ed8185917ccc11852f62219a86397a42859f6aee6be postgis-docs-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm e7db05b35b8295ea9d81b9c733707e74d0538f3fcc4ce7a80a0d3bd12d7bee5a postgis-upgrade-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm 6d698de214d3c65c0c91e5b5c69dcd90ecc08e70c39c4553f5fce339b1dafa60 postgis-utils-3.5.3-3.module+el9.7.0+40012+a654bbaa.x86_64.rpm d882dc5c12703b89e2335d3c9f423fb964a029feedf583da2b92b0d34ac83e56 postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40012+a654bbaa.x86_64.rpm d10bb7f8708c09b3807d91aa3e96db887acbced1fed2264fceca9841587ed0b7 postgres-decoderbufs-2.4.0-1.Final.module+el9.7.0+40060+39463e08.x86_64.rpm 0b5ee7debecd0595b42fd91c745ba4f5b4ffbf63040e76681352abfb033fc6e0 postgresql-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 9ab2f8f52379685bc94967df14f4f18636a7038b1f6c15c18f3f0318e18ac9cc postgresql-contrib-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 4e1dcbdba3b5b6d518017a574eded4ed93d6c06c39eca872f3971f33a8f12e1a postgresql-docs-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 162a38aabaeb269e91e0b08dc5c4fa29b152cff5f2e560b27a17d8cceede73f3 postgresql-plperl-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm c5eed429adda0a1f3a9ab863a31023f69bad772b1053803f4cf6dc7f3f7862d9 postgresql-plpython3-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 83812a62f6e9fd3dd39965ee7533252b91048d525203c8cfc3579542ba14c3f4 postgresql-pltcl-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 1daa07cec68b0e3f2b9206fb7caae473e3b4482985be10e2292b89f8d9274c04 postgresql-private-devel-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 7fa6022204e48ffdccd07b04fdfbb4e8a4c7d51f1a13a4bafd72fd1852fb0082 postgresql-private-libs-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 033605f276176b547774ce7d178e69e2f9cc4b5ab2dcbef760acab1a6d234747 postgresql-server-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm ddb0fda0519db7981ee6bf35e6bbdfd34fae33ff1395cd615c9a81abef8dff83 postgresql-server-devel-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 6f2d1b8d7630ccd6628459fed427aad87251393ef087523640bbc429466678d0 postgresql-static-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 82db01d96c798180a6dd10bdeb82e0fee67bca2d77e1b3eb94fea93eb83c6590 postgresql-test-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm a9d6c8457f082e1cc9fbd364c70c8f0786dae12a4eff6a4ea65f66f40a950552 postgresql-test-rpm-macros-16.13-1.module+el9.7.0+40102+9b5cec96.noarch.rpm c42662f38031051da5e50811dda2d5c9be6af131075e4c167fec6d56d3a31480 postgresql-upgrade-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm ddf6e4f284efef2711eac8cefd74865db5b8e26cb5a7a53760414e6b0949fed8 postgresql-upgrade-devel-16.13-1.module+el9.7.0+40102+9b5cec96.x86_64.rpm 5d2a23306f6cc3016051b93c7a70a4eac3b38929b08c18011d71745a3f011cc0 RLSA-2026:3842 Moderate: delve security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.25.2-2.el9_7.x86_64.rpm 84718d7c620e3173883b74f1a3d6aa690e02dc0079614ddc55dcbd9f45b9489a RLSA-2026:3928 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.6.1-7.el9_7.x86_64.rpm 61494272819381b3d566e29dd885dffdde9114af78f781a039e99332ac26a43a RLSA-2026:4165 Moderate: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: IMAP command injection in user-controlled commands (CVE-2025-15366) * cpython: POP3 command injection in user-controlled commands (CVE-2025-15367) * cpython: email header injection due to unquoted newlines (CVE-2026-1299) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.12-4.el9_7.1.x86_64.rpm b32e4ec9b1b42cd85f52888055771caf67594641c2eb29cb6902f8bccfa7723b python3.12-devel-3.12.12-4.el9_7.1.i686.rpm 1d87a0d43b3c99df19b93d39da683c4be83720fc07f25ed817f20c01e3c10db9 python3.12-devel-3.12.12-4.el9_7.1.x86_64.rpm 40c1cf6dfc29f1150761fa48267b3f11ef5080a5829818d6c2f68231b28c9dc4 python3.12-libs-3.12.12-4.el9_7.1.i686.rpm 1a802674c22bca2715215f7e185010210fbe336ed59ba547c9ce14415236381e python3.12-libs-3.12.12-4.el9_7.1.x86_64.rpm 64a413b08aa06237c62eb55aeb5e24b40ca20c270009b2a5e65e4a7f21f64d4a python3.12-tkinter-3.12.12-4.el9_7.1.x86_64.rpm 32cd3e6fd1a3ac3e968d691658b17b79ec05dd7c2cb885ebf7de9324df5a2007 RLSA-2026:4173 Important: gimp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: GIMP: Remote code execution via heap-based buffer overflow in ICNS file parsing (CVE-2026-2047) * gimp: GIMP: Remote Code Execution via uninitialized memory in PGM file parsing (CVE-2026-2044) * gimp: GIMP: Remote Code Execution via out-of-bounds write in XWD file parsing (CVE-2026-2045) * gimp: GIMP: Remote Code Execution via ICO File Parsing Vulnerability (CVE-2026-0797) * gimp: GIMP: Remote Code Execution via XWD file parsing vulnerability (CVE-2026-2048) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gimp-3.0.4-1.el9_7.4.x86_64.rpm 6df40fe93a3b7ad7628b6ac4a4d4efe64d24470d55dd2c70eaf4c0bd774e366f gimp-libs-3.0.4-1.el9_7.4.i686.rpm 95bab8dba35ae37f0a4d543e2d2656829c7ada0e00e2b68845a62223501a025a gimp-libs-3.0.4-1.el9_7.4.x86_64.rpm 0ad8ed57473d7bcefa175bc70bac2868b2d934d089ca083ced545401405582a0 RLSA-2026:4177 Important: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.144.0-1.el9.x86_64.rpm f3eb4f53b8b2a2343ab314cc6ef3e988789031e97aad0420774f320a3647094b RLSA-2026:4216 Moderate: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: IMAP command injection in user-controlled commands (CVE-2025-15366) * cpython: POP3 command injection in user-controlled commands (CVE-2025-15367) * cpython: email header injection due to unquoted newlines (CVE-2026-1299) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.13-5.1.el9_7.x86_64.rpm a2f1a11334508312a7aeb4be4bb4a52637a2ee3a7a44392696256e44c50ec9eb python3.11-devel-3.11.13-5.1.el9_7.i686.rpm 7848e3323f864491b2d6ff614eaad5a4923edef2b87fb55b85a7d62ff4f4fcbc python3.11-devel-3.11.13-5.1.el9_7.x86_64.rpm 14f65be547a3dffef600381010ec5ccff2357cb261fbdcaf2e726b6de2127340 python3.11-libs-3.11.13-5.1.el9_7.i686.rpm 0960a9975324dbb396402f88e3a42ac1c80e09f37e832d82474751df869f0b8f python3.11-libs-3.11.13-5.1.el9_7.x86_64.rpm 6cbaeec0373fe8720cb56b84b4a278be603c672f9b734137ad4480f446faccef python3.11-tkinter-3.11.13-5.1.el9_7.x86_64.rpm c8ee488db230953fe164db0cf52be3a4dbc8173ca06f661c5ed10d183406e2e0 RLSA-2026:4898 Important: capstone security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for capstone. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community. Security Fix(es): * capstone: Capstone: Memory corruption via unchecked vsnprintf return (CVE-2025-68114) * capstone: Capstone: Heap buffer overflow via skipdata callback allows denial of service or arbitrary code execution. (CVE-2025-67873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms capstone-4.0.2-11.el9_7.i686.rpm e2d9d78dfae378306f4e895f8d6723ad484ab5ed31481b870ae8c8bd8996ab74 capstone-4.0.2-11.el9_7.x86_64.rpm c5da1894eba1669e4f04e154ed38a4bce18a3528d59359407fb7f4623117b1aa RLSA-2026:4235 Moderate: nginx:1.26 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for module.nginx, nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied connections (CVE-2026-1642) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm cf37218cad07b24969db2dc31636854c596a158d900c519d101cb3b2ac726d5d nginx-all-modules-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm 847f42c0b2c16c17cc1f1256ea848eb7f547164ba05012794998d1b2c255b0c4 nginx-core-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 55da29e93e75239f969f4f375e74f3bf89a2bc660930594df54302a632beba05 nginx-filesystem-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm bf738af891694faa7da0a8922d7ad38443048b0d8eae316aa5af99466ab68507 nginx-mod-devel-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm b1965bae0989798cb595a1f50ea84bb817cbc806ec3eb318f3e8d9d234f1b9cb nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 018e2c04fec3e81540955e96d387d56556772439094f09cf2695e7deab010e0b nginx-mod-http-perl-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm b14673b032b343472dc9594e7775a33973a82ea81bac005af13d50f6f0ddad3c nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 83b558dc165d43a90b5e1fd66077cc6ddc36eff431dcb5b1738faed148f740ab nginx-mod-mail-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 0cfb8031baffb999a97731c70095ee8c8b698dc2c3da75bb2da4b232425f11ca nginx-mod-stream-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 75b684c6da0521a37ce133660bc5e7ebdb1c7be0bf6ef588773b16a983876090 RLSA-2026:4472 Moderate: compat-openssl11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for compat-openssl11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSSL toolkit provides support for secure communications between machines. This version of OpenSSL package contains only the libraries from the 1.1.1 version and is provided for compatibility with previous releases. Security Fix(es): * openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing (CVE-2025-69419) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm 3392695869abf2bea47b8239c00697a11bbf9d00fc0a852e88ac4a928c0f6f91 compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm 2305692961df47a4a61a3b76c3af8ac980fe005ff7a80b3a72c4ce95aa835b82 RLSA-2026:4447 Important: libvpx security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libvpx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Heap buffer overflow in libvpx (CVE-2026-2447) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libvpx-1.9.0-10.el9_7.i686.rpm 4ac0c7d7dd7a8efe7ab15038aac0c2bc414fd2d140e4fca530f9f9ebba9168d8 libvpx-1.9.0-10.el9_7.x86_64.rpm 861eee36f9ff99ec5bb8e4ba013804cb20f661e8bb3e31ad4e8955e633510e40 RLSA-2026:4454 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.125 and .NET Runtime 8.0.25.Security Fix(es): * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm 5d8c025829b8bb7eb0c32de9b08d391ea4d21b957a0fddd51b440c36527eb40a aspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm ff1c34bc3b0a7eba48d52d746f46982de2af1fd68c4ad466e8e18a6c72f33fb3 aspnetcore-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm a50e7b4909018a97248c578f7e1de9d95a47f5e5b420ecce64e97d9319145fa0 dotnet-apphost-pack-8.0-8.0.25-1.el9_7.x86_64.rpm 401371057de18762863d6f47647c7b2ec63449ad9be92c91d9901f8511bd58aa dotnet-hostfxr-8.0-8.0.25-1.el9_7.x86_64.rpm 1767b8e0445877960f8bbd58d2782753f0271699dbd4140eeebfea7e3eef3b65 dotnet-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm 79fe0d08ad03186e44a02ca0fc43420d6dbb8bc6d9681f831429972c6fde7ab8 dotnet-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpm b5908e525555cb9429a6afc7e2544b289055238e75db189e8e9c8d5e5040226e dotnet-sdk-8.0-8.0.125-1.el9_7.x86_64.rpm 1cf9ef88d678082135a7a7a649185d867683e27e88428290449ded832af18c64 dotnet-sdk-dbg-8.0-8.0.125-1.el9_7.x86_64.rpm 11a5cce1d3a562ba5266cfcc28d7b56713247c56cda41969d9020b8489a610f2 dotnet-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpm e6500b85bdb2c0eaed8be0bbde0ad9c3ebf0d1c6d8953a606b5d76a38ca8bf0d dotnet-templates-8.0-8.0.125-1.el9_7.x86_64.rpm 31f5f8b1044c43274e7355259e7f2db81580c24dd5bfd725ab03ca70a6741836 RLSA-2026:4445 Important: .NET 10.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet10.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 10.0.104 and .NET Runtime 10.0.4.Security Fix(es): * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127) * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm 661028cd2c6cf6276eb2df6d8680c05f7bec9b139222e714b7f0db19eca1e48e aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm 33da80182871b085c5223cf758ec54e8ec95997e37d6c8aa5086c4cc4fc60966 aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm 0fb3109cc085a80340f738ec7d33ff9c46dd03d3e28fcec11d59a1ae54db3298 dotnet-apphost-pack-10.0-10.0.4-1.el9_7.x86_64.rpm 6fde6448d31e905770ac6c263226fab3b8c7e70f6fac7cbff84f295efcdd95a4 dotnet-host-10.0.4-1.el9_7.x86_64.rpm 70648b0611a3f5f33e5f6527155d7fb52abeafd35f3111b2913794d671c01d4c dotnet-hostfxr-10.0-10.0.4-1.el9_7.x86_64.rpm dfabdc59449822aea4318cc31ff22a8fd7cd6a84d65e8ad113e02563d61f4cc6 dotnet-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm 4387e79cca5785dee1083a9275140f3e24db58f5eb310d229d74f8c93cd5ac0e dotnet-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm 54621e7f75a5796d7cdec2f5034fc331eee82bfc48e7e2694762379371df78d0 dotnet-sdk-10.0-10.0.104-1.el9_7.x86_64.rpm cb4b6057a1c22c385b5c3e1b29a03396b6215ae598ca2bbc4c4c0cd4fb8889c7 dotnet-sdk-aot-10.0-10.0.104-1.el9_7.x86_64.rpm 54dddc39827d2560566758ef59f01c96a7b9dacfc1cfd34642d50b2a25f265a2 dotnet-sdk-dbg-10.0-10.0.104-1.el9_7.x86_64.rpm 3c1a64180f83bca425a90fa1a2b4bb8ee9de5e3f28a2a4abdd255a1a2c85c821 dotnet-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm a87b3a430b965539d4cd065a0f591cd2d63e2a28c45ada4b0821207eac9d63de dotnet-templates-10.0-10.0.104-1.el9_7.x86_64.rpm b932eb050946aeb15ed97c78206ed3853c7381c21fc2a88ddc34cc5763ee5169 RLSA-2026:4456 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.115 and .NET Runtime 9.0.14.Security Fix(es): * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127) * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm d8823ccc05139aba2986999b6576c2c6f5dde8dcc9f83b03fe56ef983746ce28 aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm cb093bbe7c1c1dfb9100f26dc4568f857582cffa53d0ce929a79a493b53c01be aspnetcore-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm 5f57117bf04c2eb0e3faee0409dfb2e070924b6cb970a73aaf40af110dac5ca1 dotnet-apphost-pack-9.0-9.0.14-1.el9_7.x86_64.rpm 65ed1d8273a61fa45846fbe9b49668fc8b3fc47908c096e2774f78fd04cb09fe dotnet-hostfxr-9.0-9.0.14-1.el9_7.x86_64.rpm a6b5a8d39139e330f6cc8877e17642928d04cf9357b7ba5a664fac5680476037 dotnet-runtime-9.0-9.0.14-1.el9_7.x86_64.rpm 59b0561950f6d8991a0cad84b3e0a1f5d9b66c386d913cc405e9e2e8214d4d57 dotnet-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpm 3872b63d5e20ab9d283747b3842660b7294bf55ffe2719e0c046374740acfaf0 dotnet-sdk-9.0-9.0.115-1.el9_7.x86_64.rpm 12e55425fc65cea56f7331ec30ea52884a92c4e15be11cb24cf47e884f741fe2 dotnet-sdk-aot-9.0-9.0.115-1.el9_7.x86_64.rpm 9b41eebec8b4bc4e1804bcb06dd0a67ecdab0ed8a02f9ec608a66b8df5da8db1 dotnet-sdk-dbg-9.0-9.0.115-1.el9_7.x86_64.rpm 4b9de38d9535c7825f87ede800f2522dff7bb6d6768605e2ddbdd11091b3a697 dotnet-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm 387a7bda5f588a24bb33f2070da0e5fbb43576ff4802d19c05dc8133f41c0b2c dotnet-templates-9.0-9.0.115-1.el9_7.x86_64.rpm cfb43619a4ada9002e384f9ab4d1e1f221fabd5d7ccc57ad879ef7f41a1a781e netstandard-targeting-pack-2.1-9.0.115-1.el9_7.x86_64.rpm b8ca51eb458b9b56c1a310900cca6efac9e5a8f6608b87ded44dacf6105ec57a RLSA-2023:7754 Moderate: pixman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pixman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pixman is a pixel manipulation library for the X Window System and Cairo. Security Fix(es): * pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (CVE-2022-44638) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pixman-0.40.0-6.el9_3.i686.rpm da487fd3e58203be67933398e63c88a0cf584b78e29870f178a0419e1903d30b pixman-0.40.0-6.el9_3.x86_64.rpm f90f7b61c355aae65c1c94ab19a6538212ba4f64236457fee42793710331321c pixman-devel-0.40.0-6.el9_3.i686.rpm 033ada248bb6ae729bef27027af04e91c8f9ce6f4ca5d229125dcc17301dd41b pixman-devel-0.40.0-6.el9_3.x86_64.rpm c156955e73d9edf4b78c13a26a44dcc1970a15f82c070d20b704f266fce9f9c8 RLSA-2026:6621 Moderate: crun security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list crun is a OCI runtime Security Fix(es): * crun: crun: Privilege escalation due to incorrect parsing of the `--user` option (CVE-2026-30892) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.27-1.el9_7.x86_64.rpm cd6f649d64489e9424eb65e2b6104a5af47e18e283cb86c8404b9e4e645c0a9d RLSA-2026:7259 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.6.1-8.el9_7.x86_64.rpm 9148ce9046010148679bb1d0a9059ef8dc89c48a4a680e8dfa2566a51dbce096 RLSA-2026:5930 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721) * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717) * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689) * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698) * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716) * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684) * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705) * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710) * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697) * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690) * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686) * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708) * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691) * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699) * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693) * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718) * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719) * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694) * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720) * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707) * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.9.0-1.el9_7.x86_64.rpm 2fdd178898a8771b5ae1472c4d22ca058d49c141bb254582b545ff1520450b4c firefox-x11-140.9.0-1.el9_7.x86_64.rpm 4aeaba135afa189d42bbc9467fa1f65b900ae5a1e458e2abc865679f710057b9 RLSA-2026:5942 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731) * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.25.8-1.el9_7.x86_64.rpm ad3275ca3d6003da5239b775d91d0923c0eb698be58409c770f3fa9786d623cf golang-bin-1.25.8-1.el9_7.x86_64.rpm 1595d35beb583df2b5e0b3f2fa023cc4a8aa5609ff2f16971165c6a4f0fb92a6 golang-docs-1.25.8-1.el9_7.noarch.rpm 5cbedfe3de06872b04868a912aa94e76c4ae69adf5a90d378327467b005f5432 golang-misc-1.25.8-1.el9_7.noarch.rpm 6e23247c2b919e0578e01807b69b8d5577d5c5bdc28d720e508eba8d967d2fb4 golang-race-1.25.8-1.el9_7.x86_64.rpm dc727e2da1ea8cb984f20967ffabd04fae4600ca75a9685b11429c666f6f7584 golang-src-1.25.8-1.el9_7.noarch.rpm dfbc268ece632fcaed1da74be97b34e4e691d83861ee4a3a360a2da14b0aeab8 golang-tests-1.25.8-1.el9_7.noarch.rpm 33a45eea88b0ee22cbd2e578089bfbf8e892ca04cf6f2d815b2aa85f16206b84 go-toolset-1.25.8-1.el9_7.x86_64.rpm facaef8f3f433859fc4b1e68dc0e3d6ca4d2f03a42a04ca8522043b4ef9329f8 RLSA-2026:6188 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721) * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717) * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689) * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698) * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716) * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684) * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705) * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710) * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697) * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690) * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686) * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708) * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691) * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699) * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693) * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718) * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719) * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694) * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720) * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707) * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687) * thunderbird: Out of bounds read in IMAP parsing (CVE-2026-4371) * thunderbird: Spoofing issue in Thunderbird (CVE-2026-3889) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.9.0-1.el9_7.x86_64.rpm 381c039c75325bddcc883423d2041507a03aec3c8178e66aef7c92b42cb9a4b5 RLSA-2026:6266 Moderate: libxslt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxslt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Processing web content may disclose sensitive information (CVE-2023-40403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxslt-1.1.34-14.el9_7.1.i686.rpm 47cfd3e89c1c3dd4eaa70a403d8a4518a0c8ec61864d998d29d2a82c389d27cf libxslt-1.1.34-14.el9_7.1.x86_64.rpm c9dce3b7ada520a554cd54d436971fda680fea7f9ee1b33f958dbcf3b33a112c libxslt-devel-1.1.34-14.el9_7.1.i686.rpm efd975c433461fc081ff7f567fe5a6deb22195d6a1ed6b8e31cad746dc7a5061 libxslt-devel-1.1.34-14.el9_7.1.x86_64.rpm ad77afc0fb88d761484951c331f4802f8d4469a33d8a684d0a75b43227e55b21 RLSA-2026:4828 Moderate: mysql security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21941) * mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21948) * mysql: InnoDB unspecified vulnerability (CPU Jan 2026) (CVE-2026-21936) * mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21968) * mysql: DDL unspecified vulnerability (CPU Jan 2026) (CVE-2026-21937) * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2026) (CVE-2026-21964) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mysql-8.0.45-1.el9_7.x86_64.rpm f85c8ae89b75be221811a19efa3f7821fd9546a13348aadac2de6c3403ee490c mysql-common-8.0.45-1.el9_7.x86_64.rpm 180cfb20cf3346e0ff88568ab97e2425aae0a98ad1b17955bb84644fa9ba6b59 mysql-errmsg-8.0.45-1.el9_7.x86_64.rpm 5f660fce8be51812f5a06fecb189f5cd3fa405f5ed48675597ea8abbc24c0884 mysql-libs-8.0.45-1.el9_7.x86_64.rpm fbdc4f8b39acf0191d349a68a99140b4d708777992fa0c78baf5f2a97a900df3 mysql-server-8.0.45-1.el9_7.x86_64.rpm f9457f78d1936fc1e7a4780f671b55ab1289601c793c9d83973be345fce3c241 RLSA-2026:6286 Important: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.13-5.2.el9_7.x86_64.rpm d435f267c79dcf4b2087fbf752f1df0edbac0f2ea932bb90f1501542274ac576 python3.11-devel-3.11.13-5.2.el9_7.i686.rpm 49cee3c7bb16065de0bbddaaf1b7aa96e01b89a5f98079381ff8650e2f65c29a python3.11-devel-3.11.13-5.2.el9_7.x86_64.rpm e218fa892ffe40f0eef757e9832ac0ece5deb71fa39dfa48e35fff91a748290a python3.11-libs-3.11.13-5.2.el9_7.i686.rpm a31103df17da04e16326f371dfdbf577fb476c472c2f2235cec97b744ea38e19 python3.11-libs-3.11.13-5.2.el9_7.x86_64.rpm 9fcf2f2bb024115dfd7b76729e35a39c9f1df01abca3bf3ce3a9f31d07da941b python3.11-tkinter-3.11.13-5.2.el9_7.x86_64.rpm 35d089cbcf3604612b3c5e6c472678165f15b2c1e7bcc0922ef851744bfb8003 RLSA-2026:6285 Important: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Python: Command-line option injection in webbrowser.open() via crafted URLs (CVE-2026-4519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.12-4.el9_7.2.x86_64.rpm 453c795fecffc0a0a75e1ad047a8e258408759a5659c336d5a11d90455b2d912 python3.12-devel-3.12.12-4.el9_7.2.i686.rpm b62db4ace9a1dffa1667bcc5ea085d4b6caf9d0e88cdc12e53a0399ef5a9b475 python3.12-devel-3.12.12-4.el9_7.2.x86_64.rpm cfd2224ec31ef4142579d4f05cac1c9465d49ebc88498df3effb15b8e105fdc8 python3.12-libs-3.12.12-4.el9_7.2.i686.rpm 67ef230104bde735ae30efbdb6ec7e91f28297484870ba3c518847cb8a898a86 python3.12-libs-3.12.12-4.el9_7.2.x86_64.rpm a78ca3ddbbfda3703d2820b502589e00ea8866e7e381e4edbae893ac7cf242c9 python3.12-tkinter-3.12.12-4.el9_7.2.x86_64.rpm da463cf2a25ebb71679e82e7c843a5455566da794cdabf0a5faf3bf03f93644c RLSA-2026:6300 Important: gstreamer1-plugins-bad-free, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-ugly-free security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-bad-free, gstreamer1-plugins-good, gstreamer1-plugins-ugly-free, gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * GStreamer: GStreamer: Arbitrary code execution via ASF file processing (CVE-2026-2920) * GStreamer: GStreamer: Remote Code Execution via heap-based buffer overflow in JPEG parser (CVE-2026-3082) * GStreamer: GStreamer: Remote Code Execution via Heap-based Buffer Overflow in rtpqdm2depay (CVE-2026-3085) * GStreamer: GStreamer: Arbitrary code execution via RIFF palette integer overflow in AVI file handling (CVE-2026-2921) * GStreamer: GStreamer: Remote Code Execution via Out-Of-Bounds Write in rtpqdm2depay (CVE-2026-3083) * GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in RealMedia Demuxer (CVE-2026-2922) * GStreamer: GStreamer: Remote Code Execution via out-of-bounds write in DVB Subtitles handling (CVE-2026-2923) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-bad-free-1.22.12-5.el9_7.i686.rpm ca44040a12cd1a6acfad28a5afade40ba6ad3365f88c2d040b491a72ca38f211 gstreamer1-plugins-bad-free-1.22.12-5.el9_7.x86_64.rpm fc325893a66d707dfc6d787d789ff5fd2ce1035820732d32ade85649defaedc5 gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.i686.rpm 79564212b373a481e0eb03bf24006c0dd96f5c3bb4e2cb1e054f6e8d92970826 gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.x86_64.rpm c8e3bd12798bc00d9c7bb82935ad15781c1f2396e30c3bf8974089be808c838b gstreamer1-plugins-base-1.22.12-5.el9_7.i686.rpm 34fc78812301771390777e1106c076963342ce737334c833bdde5160e1004557 gstreamer1-plugins-base-1.22.12-5.el9_7.x86_64.rpm 06f28bc1141264909c59e803a0dcdc2ce32bd2b4f10b62a8bcce00f60972bce7 gstreamer1-plugins-base-devel-1.22.12-5.el9_7.i686.rpm 1edadd04054283917a982eec941c7e91ac9d3fdb1bfb5063f3a0fddb72a78644 gstreamer1-plugins-base-devel-1.22.12-5.el9_7.x86_64.rpm 491cd2c47b245be441d0c0cff86091436ecf26c9690827d52db9b3fbc4bbf1f6 gstreamer1-plugins-base-tools-1.22.12-5.el9_7.x86_64.rpm b467df67f653ba5a583345cae374362c30d30fa08e895391a82e56c40978e106 gstreamer1-plugins-good-1.22.12-5.el9_7.i686.rpm c948a709b269f87579577c43d6b638cc680fe0fd1d718c38b017b057ede6f068 gstreamer1-plugins-good-1.22.12-5.el9_7.x86_64.rpm 22fec0097910b90bf9037a785b19beb720a2c216050ec1ae621b3455eea9f0c4 gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.i686.rpm 5e7569521858894bf215a061b088e396a70a424adf85ccc121fe3386810d295c gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.x86_64.rpm 7294d924832de8cac49ee3c2c40b62cc4513ce9b83d5815d3835cea641f8fe84 gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.i686.rpm 31751af0c88ac321fe7a4a861069378cae30564a82a86ef1df26589f1a4d5c6d gstreamer1-plugins-ugly-free-1.22.12-4.el9_7.x86_64.rpm 7041beb7ce69d0a3b74ad18e2f9130f464d889df5a225123582efc1a0cab8315 RLSA-2026:6301 Important: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid: Squid: Denial of Service via heap Use-After-Free vulnerability in ICP handling (CVE-2026-33526) * Squid: Squid: Denial of Service via crafted ICP traffic (CVE-2026-32748) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-22.el9_7.4.x86_64.rpm 60f108ca4bbb2647ed09b661e4575531eaad2449d4ff100b5aea3ac26a359b0c RLSA-2026:6340 Important: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * freerdp: FreeRDP heap-use-after-free (CVE-2026-22856) * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22854) * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22852) * freerdp: FreeRDP: Denial of Service via FastGlyph parsing buffer overflow (CVE-2026-23732) * freerdp: FreeRDP: Denial of Service via use-after-free in AUDIN format renegotiation (CVE-2026-24676) * freerdp: FreeRDP has a heap-use-after-free in video_timer (CVE-2026-24491) * freerdp: FreeRDP has a NULL Pointer Dereference in rdp_write_logon_info_v2() (CVE-2026-23948) * freerdp: FreeRDP has a Heap-use-after-free in play_thread (CVE-2026-24684) * freerdp: FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb (CVE-2026-24681) * freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event (CVE-2026-24683) * freerdp: FreeRDP has a heap-buffer-overflow in urb_select_interface (CVE-2026-24679) * freerdp: FreeRDP has a Heap-use-after-free in urb_select_interface (CVE-2026-24675) * freerdp: FreeRDP: Arbitrary code execution via crafted Remote Desktop Protocol (RDP) server messages (CVE-2026-31806) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.11.7-1.el9_7.5.x86_64.rpm d66c79efd9c0ba0539f760ee10065ec949b81ffde51e19972dd8d4a64c02a74a freerdp-libs-2.11.7-1.el9_7.5.i686.rpm 772d2c049403d826b9a99f3de9e3ee44d096ab607376215e4902d3f48c240b53 freerdp-libs-2.11.7-1.el9_7.5.x86_64.rpm 73111aaf8fef0b5ec1ee1e82e179b9b81b4ff8f54190b5f90eaaa706d25f64fe libwinpr-2.11.7-1.el9_7.5.i686.rpm f96f276e2c58dc8a25666038a95763fc95e523d597891c492d3b80228319861c libwinpr-2.11.7-1.el9_7.5.x86_64.rpm 7985760a23762ac892d8060afc8fe7aaeca0912bc85f036141e5e6dd62ab1389 RLSA-2026:6382 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-19.el9_7.x86_64.rpm 821dd4ad1069ddda49b853cbac731ba625d97c7fb7ac79f33f2ac9d010a6fba8 grafana-selinux-10.2.6-19.el9_7.x86_64.rpm a4c3f4bb8ee79170ed31273e20d744c32d3d2c6f12d883505fac5b0d4460164d RLSA-2026:6383 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-13.el9_7.x86_64.rpm eaeed36a13171a93ca106dd1cb4327dde36dd2c88d313519d8bb2eaa0b72b149 RLSA-2026:7302 Important: nodejs:22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs, module.nodejs-packaging, nodejs-packaging, module.nodejs, nodejs-nodemon, module.nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547) * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996) * minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions (CVE-2026-27904) * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526) * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229) * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525) * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528) * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135) * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.1-1.module+el9.7.0+40017+f0db1785.noarch.rpm f4bec21419f6320b7e7f0de17111a6ea3bcd02ab2d3bcc69e57af3b04170447c nodejs-nodemon-3.0.1-1.module+el9.7.0+40018+a011993d.noarch.rpm 40444bd6559f67e13eab5a4a942f9fb157cf96fa1203d6277c6963d568ca057a nodejs-nodemon-3.0.1-1.module+el9.7.0+40022+9ecc286c.noarch.rpm 0c42e195137c9dea42d0c3aa3b1b8f3883c5f5611d729ac81a5b2e1445234e51 nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670 nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm 36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+40150+8a155d8a.x86_64.rpm 0f7e18c67ae01ecec66391184d837e86652c3e80d0d4795a632dedbffa87490e nodejs-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm 8c6efdd211c4d2c831c3d318c03d307a41b7164c77a19865c64ccb308cc917ab nodejs-devel-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm 0bc4d8cb1665f8540f864a05d175773f74dec4ef47d2450af6c737921f5eb28a nodejs-docs-22.22.2-1.module+el9.7.0+40150+8a155d8a.noarch.rpm 2879470802d8c9bdd749462dfed2066651da53f84a7692b84c14c096c8e2aaec nodejs-full-i18n-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm 205b11310b4a6d02623c87a4fcff66daf29266d4c57e0a5404fa59e1dfdcda7e nodejs-libs-22.22.2-1.module+el9.7.0+40150+8a155d8a.x86_64.rpm 5df5fc3d84b0559a61b0d6a0c470954a6e03212395c3d638101f991d3520aa73 npm-10.9.7-1.22.22.2.1.module+el9.7.0+40150+8a155d8a.x86_64.rpm 86870ccc00e4ac63684188ebc653ae46a1e868971cbc59949a8eba7084499646 nodejs-nodemon-3.0.1-1.module+el9.7.0+40153+4d595597.noarch.rpm 60089165d5593049f992eaa6af8f75d538c9c13734cc8dd7b8f7b57554397865 nodejs-packaging-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm b633e5ce4d8240ae950189fff640804ffd62eb882aa7bd24eddb152a9f460d6d nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm 712c40786611b05cb031ef7a0d7464a3cc2cc78a26e19886e5631caa7aeacc68 RLSA-2026:7343 Important: nginx:1.26 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for module.nginx, nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. Security Fix(es): * nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647) * NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654) * NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784) * NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nginx nginx-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm cf37218cad07b24969db2dc31636854c596a158d900c519d101cb3b2ac726d5d nginx-all-modules-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm 847f42c0b2c16c17cc1f1256ea848eb7f547164ba05012794998d1b2c255b0c4 nginx-core-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 55da29e93e75239f969f4f375e74f3bf89a2bc660930594df54302a632beba05 nginx-filesystem-1.26.3-2.module+el9.7.0+40103+2443f6d1.noarch.rpm bf738af891694faa7da0a8922d7ad38443048b0d8eae316aa5af99466ab68507 nginx-mod-devel-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm b1965bae0989798cb595a1f50ea84bb817cbc806ec3eb318f3e8d9d234f1b9cb nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 018e2c04fec3e81540955e96d387d56556772439094f09cf2695e7deab010e0b nginx-mod-http-perl-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm b14673b032b343472dc9594e7775a33973a82ea81bac005af13d50f6f0ddad3c nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 83b558dc165d43a90b5e1fd66077cc6ddc36eff431dcb5b1738faed148f740ab nginx-mod-mail-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 0cfb8031baffb999a97731c70095ee8c8b698dc2c3da75bb2da4b232425f11ca nginx-mod-stream-1.26.3-2.module+el9.7.0+40103+2443f6d1.x86_64.rpm 75b684c6da0521a37ce133660bc5e7ebdb1c7be0bf6ef588773b16a983876090 nginx-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm df9675d7155fc3e98a5b3929f45e1c7bdea49753ffae65b4686b8f7e6f2c68e2 nginx-all-modules-1.26.3-2.module+el9.7.0+40149+41197f3a.1.noarch.rpm d756e41df2dd4476f9ba99033b9b0ac7c5df925b82f2c044856efc693a5a79eb nginx-core-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm b1518b215276b6db453764ea74e75b216075762bdf32ef748b9aaf3797c40ea1 nginx-filesystem-1.26.3-2.module+el9.7.0+40149+41197f3a.1.noarch.rpm c2050935001a97e732596e59dd290e6a732cab203e25fa72cbb36191e6c39194 nginx-mod-devel-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm 38d6681c70e033638c065f848f18a94d069a602d2d5c1b2664a4c6321b756d68 nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm 39727a60a2f877abee128599546ebeff24fac23a2551b10f8422e032a0df2c01 nginx-mod-http-perl-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm 40ad88ec966cfc114d24b55117bb8479d7bd806919bab28859762c613d419822 nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm dc205038cb20c6e73b5eda60b7aaaa3987862c59e0487245ddf2cc8276f2b592 nginx-mod-mail-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm 7c5ec9241e59d79df6a3af2a9dd84ed52e493ebd9da13dff792ad7a1274582c0 nginx-mod-stream-1.26.3-2.module+el9.7.0+40149+41197f3a.1.x86_64.rpm faf03e6036756a4b03fe5a68f8a0cf60a32f616fc5e200f9bb344c2d60eb4bd9 RLSA-2026:7350 Important: nodejs:24 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs, module.nodejs-packaging, nodejs-packaging, module.nodejs, nodejs-nodemon, module.nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: Nodejs denial of service (CVE-2026-21637) * brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion (CVE-2026-25547) * minimatch: minimatch: Denial of Service via specially crafted glob patterns (CVE-2026-26996) * undici: Undici: Denial of Service due to uncontrolled resource consumption (CVE-2026-2581) * undici: Undici: HTTP header injection and request smuggling vulnerability (CVE-2026-1527) * undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression (CVE-2026-1526) * undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter (CVE-2026-2229) * undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers (CVE-2026-1525) * undici: undici: Denial of Service via crafted WebSocket frame with large length (CVE-2026-1528) * nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination (CVE-2026-27135) * Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing (CVE-2026-21712) * Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header (CVE-2026-21710) * Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions (CVE-2026-21715) * nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. (CVE-2026-21716) * Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks (CVE-2026-21711) * Node.js: Node.js: Information disclosure via timing oracle in HMAC verification (CVE-2026-21713) * Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames (CVE-2026-21714) * nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions (CVE-2026-21717) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__nodejs nodejs-nodemon-3.0.3-3.module+el9.7.0+40025+0e0cf6b2.noarch.rpm 6312725fb2193283d8b2d99e7a2ce84778cfa3a4388bf460f0dbf4bffba5225d nodejs-packaging-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm b6fa9e612308e28b909f44d7e7382dc06413f1209ce6f8adb976fa26b37d6670 nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40052+e32ea525.noarch.rpm 36e1554697775a23cb13088fb2992431c50e719c60ea8bb06d4607e8175ba91e nodejs-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm fcd296b571ceaef4255bc43cff56201796bc3e44a6a606881836ef99fbf7e6a5 nodejs-devel-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm d625d2160b3235dcde4859ca029b7129996e80a3c9ab25a49f01712e71e276cd nodejs-docs-24.14.1-2.module+el9.7.0+40151+7a588b37.noarch.rpm 8b70dc2ed5433e9c9495253197acac3002cb79279b26eb6d66e496f9bd1137cd nodejs-full-i18n-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm 823de588593d7e938edc94a66d377ff70c1d23b97248d4379bd4af18b472091d nodejs-libs-24.14.1-2.module+el9.7.0+40151+7a588b37.x86_64.rpm a602bd54b8eafa7e26d7a5a932b21bd2698cbf63ae36aba61222b257536c65a2 npm-11.11.0-1.24.14.1.2.module+el9.7.0+40151+7a588b37.noarch.rpm 5bceb73b366545d8b7741137200243e825937d96ea90436ecca1f817e7c97d46 v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+40151+7a588b37.x86_64.rpm b2d5b39ba8be9ab7350e019bf3320019cfc5bd8b9868cd0d4acea7252365e203 nodejs-packaging-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm b633e5ce4d8240ae950189fff640804ffd62eb882aa7bd24eddb152a9f460d6d nodejs-packaging-bundler-2021.06-6.module+el9.7.0+40153+4d595597.noarch.rpm 712c40786611b05cb031ef7a0d7464a3cc2cc78a26e19886e5631caa7aeacc68 RLSA-2026:5640 Moderate: mysql:8.4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mecab-ipadic, rapidjson, module.rapidjson, module.mecab-ipadic, module.mecab, mecab. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Security Fix(es): * mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21941) * mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21948) * mysql: InnoDB unspecified vulnerability (CPU Jan 2026) (CVE-2026-21936) * mysql: Optimizer unspecified vulnerability (CPU Jan 2026) (CVE-2026-21968) * mysql: DDL unspecified vulnerability (CPU Jan 2026) (CVE-2026-21937) * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2026) (CVE-2026-21964) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms__mysql mecab-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm 355af28fc740c2f9bd77e40daf39253b621b83defb0e47516246e5e2222ca44b mecab-devel-0.996-3.module+el9.7.0+40027+0df0d4e0.4.x86_64.rpm 97981caf9383f3546c68e18c5465ddc1b65a194bdf0bcf2d725e276a058b71e5 mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 7366b9dd824100c2130f78e43d9ef9b799f61934961736e3e1456abef4a3bf09 mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 3f2d04c54ece7fe5e19ac3bb076b4614722e37c476b38c80b3a6f1924325d9f9 rapidjson-devel-1.1.0-19.module+el9.7.0+40027+0df0d4e0.x86_64.rpm 6401561c10fdd4e51de5661b88bac12d5a9e20e2f738f90c429c73eb3c4fdf32 rapidjson-doc-1.1.0-19.module+el9.7.0+40027+0df0d4e0.noarch.rpm 558fcd49446a50ffea6aa4b19088b8320790c540f80e469ff9a170af7e1f2a34 RLSA-2026:9692 Important: webkit2gtk3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43213) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43214) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43457) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43511) * webkitgtk: Processing maliciously crafted web content may disclose internal states of the app (CVE-2025-46299) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20608) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20635) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20636) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20644) * webkitgtk: A remote attacker may be able to cause a denial-of-service (CVE-2026-20652) * webkitgtk: A website may be able to track users through Safari web extensions (CVE-2026-20676) * webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy (CVE-2026-20643) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20664) * webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2026-20665) * webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2026-20691) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-28857) * webkitgtk: A malicious website may be able to process restricted web content outside the sandbox (CVE-2026-28859) * webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack (CVE-2026-28871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.52.3-0.el9_7.1.x86_64.rpm 8b43c3f4117c7d5af7147f827a269d10ec11d993ed31ba11e36561dafde6dbe3 webkit2gtk3-devel-2.52.3-0.el9_7.1.i686.rpm 0640d9a0a711a6aea80ccf1076b954748e6dbf404e5a8307899535cdf727419d webkit2gtk3-devel-2.52.3-0.el9_7.1.x86_64.rpm 7da68edbe53140a43a082e9e026e86808828fc3b156f386bdbec0c86d4666fd6 webkit2gtk3-jsc-2.52.3-0.el9_7.1.i686.rpm 8506d7e56fa0d37fb23bd7f61e134293fe75d66564ce2ada239300a955c04534 webkit2gtk3-jsc-2.52.3-0.el9_7.1.x86_64.rpm 0ea56e8449332fd1298b3fe277e5b8a08f98dd60b7c5b2497118932f6188a783 webkit2gtk3-2.52.3-0.el9_7.1.i686.rpm f21808baceaf0311ef03b41e63081d2a0abccc6cebc8147cb71de522f5587be8 webkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.i686.rpm 34bfa44075ef6773898934dc1b3fb072adc4d6885ece0ed7731df168b702e232 webkit2gtk3-jsc-devel-2.52.3-0.el9_7.1.x86_64.rpm 4071b42ae017b7853f52e7fab1e4579ddc34b4197d84207000496ad1ad80eebc RLSA-2026:11360 Important: LibRaw security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for LibRaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others). Security Fix(es): * LibRaw: LibRaw: Arbitrary code execution via a specially crafted malicious file (CVE-2026-24450) * LibRaw: LibRaw: Arbitrary code execution via heap-based buffer overflow in lossless JPEG loading (CVE-2026-21413) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms LibRaw-0.21.1-2.el9_7.i686.rpm fcdf8037282015d49bf1e5325ebd27868405996678fa5a8949b830be1c1ef402 LibRaw-0.21.1-2.el9_7.x86_64.rpm 36dc163d7ce20a2ced93b53b4639deba0d2a79cf8448a98c1c5dd0e480291d7e RLSA-2026:10757 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6772) * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-6754) * firefox: thunderbird: Spoofing issue in the DOM: Core & HTML component (CVE-2026-6762) * firefox: thunderbird: Incorrect boundary conditions in the WebRTC component (CVE-2026-6752) * firefox: thunderbird: Other issue in the Storage: IndexedDB component (CVE-2026-6770) * firefox: thunderbird: Invalid pointer in the JavaScript: WebAssembly component (CVE-2026-6757) * firefox: thunderbird: Other issue in the Libraries component in NSS (CVE-2026-6767) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150 (CVE-2026-6786) * firefox: thunderbird: Incorrect boundary conditions in the WebRTC component (CVE-2026-6753) * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-6759) * firefox: thunderbird: Use-after-free in the WebRTC component (CVE-2026-6747) * firefox: thunderbird: Information disclosure due to uninitialized memory in the Graphics: Canvas2D component (CVE-2026-6749) * firefox: thunderbird: Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6766) * firefox: thunderbird: Privilege escalation in the Networking component (CVE-2026-6761) * firefox: thunderbird: Mitigation bypass in the File Handling component (CVE-2026-6763) * firefox: thunderbird: Privilege escalation in the Graphics: WebRender component (CVE-2026-6750) * firefox: thunderbird: Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6748) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150 (CVE-2026-6785) * firefox: thunderbird: Mitigation bypass in the DOM: Security component (CVE-2026-6771) * firefox: thunderbird: Incorrect boundary conditions in the DOM: Device Interfaces component (CVE-2026-6764) * firefox: thunderbird: Information disclosure in the Form Autofill component (CVE-2026-6765) * firefox: thunderbird: Privilege escalation in the Debugger component (CVE-2026-6769) * firefox: thunderbird: Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6751) * firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Networking component (CVE-2026-6776) * firefox: thunderbird: Use-after-free in the DOM: Core & HTML component (CVE-2026-6746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.10.0-1.el9_7.x86_64.rpm 11687fca62b7bcf2110510bdcc4998941189f73e25d92f295d67bf5d4f291c69 firefox-x11-140.10.0-1.el9_7.x86_64.rpm 4a5eff2a8ed231302c42e2459059dae9cf6241345a6656c380236557a4070f3d RLSA-2026:7671 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * libpng: libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416) * libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5734) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5731) * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics: Text component (CVE-2026-5732) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-140.9.1-1.el9_7.x86_64.rpm a1f89641d3fc79f5f9e46b96b4fb3b94161851691ce01d4df562b6528b2a9a84 firefox-x11-140.9.1-1.el9_7.x86_64.rpm 4555b27e53404f2091dda32d1bf9eb6432dcfe7c8d56492f0502671337686fca RLSA-2026:7679 Important: perl-XML-Parser security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for perl-XML-Parser. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This module provides ways to parse XML documents. It is built on top of XML::Parser::Expat, which is a lower level interface to James Clark's expat library. Each call to one of the parsing methods creates a new instance of XML::Parser::Expat which is then used to parse the document. Expat options may be provided when the XML::Parser object is created. These options are then passed on to the Expat object on each parse call. They can also be given as extra arguments to the parse methods, in which case they override options given at XML::Parser creation time. Security Fix(es): * perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files (CVE-2006-10003) * perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input (CVE-2006-10002) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms perl-XML-Parser-2.46-9.1.el9_7.x86_64.rpm 3f2e4d12afac603c15b1cd8ed6e2e4b1a6976761bbef76ccbe87378fe1558601 RLSA-2026:7915 Important: bind9.18 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone (CVE-2026-1519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind9.18-9.18.29-5.el9_7.4.x86_64.rpm 6f4f48e61da186206191326b03bb2fd05b7306d59d021d629cada18209a7c72b bind9.18-chroot-9.18.29-5.el9_7.4.x86_64.rpm d2c8b79dcda087074599b9a4682c1f754ca676cc3d9dbe3a57f339b507b2689f bind9.18-dnssec-utils-9.18.29-5.el9_7.4.x86_64.rpm b94880386e49e0ecadc6f2ac915d6c67b2e17b6dceeb278a142a57adb1b2c351 bind9.18-libs-9.18.29-5.el9_7.4.x86_64.rpm d9115b980e3035faec0dd24fed2fef4315f1f329bc86e1901f0f4831b3fae952 bind9.18-utils-9.18.29-5.el9_7.4.x86_64.rpm ba0290a76587497ed81fbc0382e32273129720083153df423d6a79e23f6b30a9 RLSA-2026:8459 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * libpng: libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416) * libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5734) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2 (CVE-2026-5731) * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics: Text component (CVE-2026-5732) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-140.9.1-1.el9_7.x86_64.rpm 680b7c61a0a92b526324fef0fb884624b677c3803d5cdac1316856b48166c50a RLSA-2026:8457 Important: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * FreeRDP: FreeRDP: Heap buffer overflow allows arbitrary code execution via crafted pixel data (CVE-2026-33984) * FreeRDP: FreeRDP: Denial of Service via specially crafted Remote Desktop Protocol messages (CVE-2026-33983) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.11.7-1.el9_7.6.x86_64.rpm b126544c4016efc0bc9ff0285b7b0c56bdd1406418fa8576e01852f2f53f96b4 freerdp-libs-2.11.7-1.el9_7.6.i686.rpm 0e6242bdd980984236d413cfe333f2c9d57b468fa82f69139918ef02a6d91720 freerdp-libs-2.11.7-1.el9_7.6.x86_64.rpm 404fcbf4965d434a2e64030db13b3caf6a1d3e7be28e7d03be1a3ce1fd4aabae libwinpr-2.11.7-1.el9_7.6.i686.rpm c7b54140dab98c903abe5008331ec871a5b704a78eba574569c0999db4b59e8e libwinpr-2.11.7-1.el9_7.6.x86_64.rpm 98bacee5651597ce5a9be11dac63a0e7bb95e0d575b7e0aa29d58d181a422591 RLSA-2026:8469 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.126 and .NET Runtime 8.0.26.Security Fix(es): * dotnet: .NET: Security Bypass and Denial of Service Vulnerability (CVE-2026-26171) * dotnet: .NET: Denial of Service via stack overflow (CVE-2026-32203) * dotnet: .NET: Denial of Service via Infinite Recursion in XmlDecryptionTransform (CVE-2026-33116) * dotnet: Dotnet: SMTP Command Injection and Header Injection via MailAddress parsing flaw (CVE-2026-32178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm b45c607b64f6169bdc0b612243b06d5f1f66b38ef9b6b443a56e6844c3cefd31 aspnetcore-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm 2c62400379bb0e8ced1c931df885645540734995f4754ca5a6135faea7b34bea aspnetcore-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm 7529bfec9507b2794eabb40aa6a49b5d7cfbba57fe39ab48f0f908f099b435cd dotnet-apphost-pack-8.0-8.0.26-1.el9_7.x86_64.rpm 2592c4468d731dd5e99585908332c0f3ff31a85457bdb8cad4c6465e375fd2c0 dotnet-hostfxr-8.0-8.0.26-1.el9_7.x86_64.rpm 10ecb7ef1facbd97d54b328f83addacb6738a248c8b7bd2238fab5b64e00138e dotnet-runtime-8.0-8.0.26-1.el9_7.x86_64.rpm 716a34e8db4a1151f9b5f0a829d7512dea8981a6fb753c43aeab4fe3791c986e dotnet-runtime-dbg-8.0-8.0.26-1.el9_7.x86_64.rpm b26d853aaf79cc8a22cc96326389b686f03b5f56aa571aa3f2ddfeafc8b2013d dotnet-sdk-8.0-8.0.126-1.el9_7.x86_64.rpm 3485bb18dfc5ceda90c4b86f7c604f01125e11c0fcf3cd43e22b6d108dcf6440 dotnet-sdk-dbg-8.0-8.0.126-1.el9_7.x86_64.rpm 4cadedcce9b6973ec08edd6eddab1833357f88167999867f184195ee0509beff dotnet-targeting-pack-8.0-8.0.26-1.el9_7.x86_64.rpm ea7602c332a06c3d323ee0fd35a8bceb243ff33623eef2c9dc7166114d9d60bd dotnet-templates-8.0-8.0.126-1.el9_7.x86_64.rpm ecfb74d91db3579bce8af9ddbccc7e459b61beae5eb21f502b309ecf29cf4744 RLSA-2026:8471 Important: .NET 10.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet10.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 10.0.106 and .NET Runtime 10.0.6.Security Fix(es): * dotnet: .NET: Security Bypass and Denial of Service Vulnerability (CVE-2026-26171) * dotnet: .NET: Denial of Service via stack overflow (CVE-2026-32203) * dotnet: .NET: Denial of Service via Infinite Recursion in XmlDecryptionTransform (CVE-2026-33116) * dotnet: Dotnet: SMTP Command Injection and Header Injection via MailAddress parsing flaw (CVE-2026-32178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-10.0-10.0.6-1.el9_7.x86_64.rpm 26a8d886458a8fe6daad26093f05d25e5de0e9f2d7eb9fecaa39e41d699cc93e aspnetcore-runtime-dbg-10.0-10.0.6-1.el9_7.x86_64.rpm c3650dc257b5d8a15b4aacafb0a6d386cb92bb5e97d085e8d22513c3d684c1c0 aspnetcore-targeting-pack-10.0-10.0.6-1.el9_7.x86_64.rpm 2906d1806ff0640233e220dfdd88c9fc4286e4c4b9790bbdec7f944f1f9a202d dotnet-apphost-pack-10.0-10.0.6-1.el9_7.x86_64.rpm 8b7c0168f7a2d4c12240b87476717de7ed805785ef1343fe4763814b59983c97 dotnet-host-10.0.6-1.el9_7.x86_64.rpm f857e9bec746639571f9bed39256e52e831721d7cf8939e0a1f9407b919045d0 dotnet-hostfxr-10.0-10.0.6-1.el9_7.x86_64.rpm 88bc27072efdd561849bf2cb1b05c339de52f9058384517e8d09d0359d9ffd9b dotnet-runtime-10.0-10.0.6-1.el9_7.x86_64.rpm 289c0149d28228affca90c9e578911bb0220c8a69b42b0e5cae8dd0c4f215d9f dotnet-runtime-dbg-10.0-10.0.6-1.el9_7.x86_64.rpm 175dcb51bdef33bcd93e19e8dbf35da21588c7757a6631fa1f2113137543e0de dotnet-sdk-10.0-10.0.106-1.el9_7.x86_64.rpm 7771b0973f8c06b35f13a56c3786863f2413c59857c7faf78457ea3198a3c9bb dotnet-sdk-aot-10.0-10.0.106-1.el9_7.x86_64.rpm b471914707263f25838c2c1b0284da3661a0e24eb408256a923582b8a32ac104 dotnet-sdk-dbg-10.0-10.0.106-1.el9_7.x86_64.rpm 6d34bc6c47409828eb843545add53958a1423170356e68bdb9ab0f2befe53a9e dotnet-targeting-pack-10.0-10.0.6-1.el9_7.x86_64.rpm 3eb414ade4aa4661591c75424213650b5c23f7c2bd725fd1cd9a3824daa3e46f dotnet-templates-10.0-10.0.106-1.el9_7.x86_64.rpm af9844bc2ef9d58a0a5499a61d3f70b405594802c6c5e22e80f17c5caf376e0b RLSA-2026:8859 Important: giflib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for giflib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list giflib is a library for reading and writing gif images. Security Fix(es): * giflib: Giflib: Double-free vulnerability leading to memory corruption (CVE-2026-23868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms giflib-5.2.1-9.el9_7.1.i686.rpm 64a412a96bbff18264e9f81f0374e99eea7d2295b563e41936a59af588964232 giflib-5.2.1-9.el9_7.1.x86_64.rpm dbff0606f6971a56aaf0836c94afc2f4219bbd29db639fca2bd214c07438fe9b RLSA-2026:8474 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.116 and .NET Runtime 9.0.15.Security Fix(es): * dotnet: .NET: Security Bypass and Denial of Service Vulnerability (CVE-2026-26171) * dotnet: .NET: Denial of Service via stack overflow (CVE-2026-32203) * dotnet: .NET: Denial of Service via Infinite Recursion in XmlDecryptionTransform (CVE-2026-33116) * dotnet: Dotnet: SMTP Command Injection and Header Injection via MailAddress parsing flaw (CVE-2026-32178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-9.0-9.0.15-1.el9_7.x86_64.rpm 38f69113b7c8ee3e6067b77648880a3c1d034de8cb27ab1e963f228f04d99540 aspnetcore-runtime-dbg-9.0-9.0.15-1.el9_7.x86_64.rpm fb7b8b6eb508b5cb37a6ecb0c3208be1501c1f35beca3af241b01112b63de3f5 aspnetcore-targeting-pack-9.0-9.0.15-1.el9_7.x86_64.rpm b7dba2cea507e0d1527e0aab041ef9ff8dc9b33266a1b8c93df5fc6acc486f16 dotnet-apphost-pack-9.0-9.0.15-1.el9_7.x86_64.rpm 8657d871c3c8a5fe308af9ee52fc3f3b2ab6547ada8845862286f1a6865f202c dotnet-hostfxr-9.0-9.0.15-1.el9_7.x86_64.rpm 18e675620d0c87886d474bbe2c799c721a2a4a07ecd48d4af417b5f97c5abddc dotnet-runtime-9.0-9.0.15-1.el9_7.x86_64.rpm 6493c3b5879a4c7cd08c6e46ab8a6966657e1a25dc00dd72dbf80744dc56d467 dotnet-runtime-dbg-9.0-9.0.15-1.el9_7.x86_64.rpm 6fac297f1e3cc83fb39ca1f471736cd836eb913c64f044c742f897dda22a5665 dotnet-sdk-9.0-9.0.116-1.el9_7.x86_64.rpm c207e6b667ee9082ffbfb1cb8ab38162c1c98cdad3eb4764c54e512fdc87dafd dotnet-sdk-aot-9.0-9.0.116-1.el9_7.x86_64.rpm 6b23d5442da9c73445528ca6db01039a4a15f0a7182737ea3cbe240224e592f5 dotnet-sdk-dbg-9.0-9.0.116-1.el9_7.x86_64.rpm 1f61c438657c8f08f0ae7caad6bf41df8e50e96fd3042902d605babdedb01bd9 dotnet-targeting-pack-9.0-9.0.15-1.el9_7.x86_64.rpm 103728f9d3e5710a524cc9e2bdd9172ffb201a9115735acb6cb260bb1c3e4e16 dotnet-templates-9.0-9.0.116-1.el9_7.x86_64.rpm bda0cc3e967de32d88cb5b7b6875ab60bdfc83049db42e9549553239d72b4143 netstandard-targeting-pack-2.1-9.0.116-1.el9_7.x86_64.rpm dbd96b0972a08434e0dc2e787297ee7011ce9bcb1883a5d5ac53914c6bfb3feb RLSA-2026:8841 Important: go-rpm-macros security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides build-stage rpm automation to simplify the creation of Go language (golang) packages. It does not need to be included in the default build root: go-srpm-macros will pull it in for Go packages only. Security Fix(es): * net/url: Incorrect parsing of IPv6 host literals in net/url (CVE-2026-25679) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.6.0-14.el9_7.x86_64.rpm f34d40fb1cbd8b195a3c7001c019f3283b7133586ad22c761c497350c83c3edd go-rpm-macros-3.6.0-14.el9_7.x86_64.rpm 2ddc46e30631719cfd7f82f42fe833d75978ce79089171bad0236bb1a2534874 go-rpm-templates-3.6.0-14.el9_7.noarch.rpm eab05d8edbf316e30c5071c113f3bdd1c68a0e4c155aad295536edb6a84883ba go-srpm-macros-3.6.0-14.el9_7.noarch.rpm 2c720e81e35aceedc3a0d93bca82799afdd3cf8615cccbbe50e0129c19681992 RLSA-2026:8888 Important: openexr security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * openexr: OpenEXR: Arbitrary code execution via integer overflow in EXR file processing (CVE-2026-27622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-3.el9_7.1.x86_64.rpm 8a3a642294206bb479b7999fb8ff730363336f7e99d7c41a09ccfe60d2c8cd9e openexr-libs-3.1.1-3.el9_7.1.i686.rpm 5edfde3b13ab5243cd20f7f55c76710de7a7a8da8d43821a8deef39fa06cc949 openexr-libs-3.1.1-3.el9_7.1.x86_64.rpm 5738709277211f05d46745fc3df6d12936ed0861341d58b44d2276320f48c1ee RLSA-2026:10135 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object (CVE-2026-34986) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.41.8-3.el9_7.x86_64.rpm 76c274f2bc3619cb93801b6eb36d9c2fc3a1d71c78e66dd81f999173ad2e460f buildah-tests-1.41.8-3.el9_7.x86_64.rpm 93597a3b033743a5155e99d4476d45f8e605439b59276c413acb8433ad0597ef RLSA-2026:10226 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: Grafana: Information disclosure of data-source passwords via public dashboards (CVE-2026-27877) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-20.el9_7.x86_64.rpm 3e342bfe33d8d7861099d0b67b0f9d6c28ec2f0612da98afccd1ba5e53e5ef13 grafana-selinux-10.2.6-20.el9_7.x86_64.rpm 90ddbfa30b1c4c5f2b33ec1336c44bb5f85f31d619572cea3785449db93eb4bb RLSA-2026:9689 Important: java-21-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Enhance crypto algorithm support (CVE-2026-22007) * JDK: Improve Kerberos credentialing (CVE-2026-22013) * JDK: Enhance Path Factories Redux (CVE-2026-22016) * JDK: Enhance Zip file reading (CVE-2026-22018) * JDK: Enhance certificate chain validation (CVE-2026-22021) * JDK: Updating FreeType 2.14.1 (CVE-2026-23865) * JDK: Enhance TLS connection handling (CVE-2026-34282) * JDK: Enhance key generation (CVE-2026-34268) Bug Fix(es): * When copying files, OpenJDK 21 prefers to use the copy_file_range native function for performance reasons, only falling back to sendfile when this fails. However, in previous OpenJDK 21 releases, a response of EOPNOTSUPP (operation not supported) did not cause the JDK to fall back to sendfile. This is rectified in this release. (Rocky Linux-169617, Rocky Linux-169951, Rocky Linux-169952, Rocky Linux-169942, Rocky Linux-169953, Rocky Linux-169945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.11.0.10-2.el9_7.x86_64.rpm 73b5d179130eba7d641bc2749c64fe2b65f79fa4d9bde12f461b002924e24856 java-21-openjdk-demo-21.0.11.0.10-2.el9_7.x86_64.rpm 5d65b603ab7b789be1689c9abf8614fc77642fe1d4dad5f8601d9b73a687ccfd java-21-openjdk-devel-21.0.11.0.10-2.el9_7.x86_64.rpm fce4f7df7f57fbba5984c5649ab730abfdeff58034eb42cf3982b0f9def0e63f java-21-openjdk-headless-21.0.11.0.10-2.el9_7.x86_64.rpm aae25c96dc9c1849efe46636a805c67cc99aa0a926edbc8b933bac46a2ec9ab6 java-21-openjdk-javadoc-21.0.11.0.10-2.el9_7.x86_64.rpm b51a0b98a93b81e81fbe48953aa04d3c49ff9066ef5474ec381753e618cc02c2 java-21-openjdk-javadoc-zip-21.0.11.0.10-2.el9_7.x86_64.rpm a7c1946276adae4b076c9db30ed03547bc3b7bf43f366055393b4faadb7be196 java-21-openjdk-jmods-21.0.11.0.10-2.el9_7.x86_64.rpm cdde6fc1cc16a714ad60b8d3e880c484e91260d16f728931ccbfb5def704b22b java-21-openjdk-src-21.0.11.0.10-2.el9_7.x86_64.rpm 489447d7361626688eeee44f7c5f2c320861aebf7e22d025aa4e1a62d2705fd5 java-21-openjdk-static-libs-21.0.11.0.10-2.el9_7.x86_64.rpm 51a0dbc67555233b101d8b77b27ab93f9f984be63c9a4e52cf34b12b3eeab35d RLSA-2026:10708 Important: gdk-pixbuf2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gdk-pixbuf2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf: gdk-pixbuf: Denial of Service via heap-based buffer overflow when processing a specially crafted JPEG image (CVE-2026-5201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gdk-pixbuf2-2.42.6-6.el9_7.1.i686.rpm ecce17b32faa333e841f07fecfd42a16e127add4bfb23fef9096963186f53349 gdk-pixbuf2-2.42.6-6.el9_7.1.x86_64.rpm f4563cc6f9bdcc40a912bb43813d887d454af8f5e9d911dd92a62287019232eb gdk-pixbuf2-devel-2.42.6-6.el9_7.1.i686.rpm 12c25ca7b647350886d159e0df66a2fb8cece10c10dd90e1b974ec116f24bf3e gdk-pixbuf2-devel-2.42.6-6.el9_7.1.x86_64.rpm 40c894bc33e55353fa6e2dfdcfebdae34e2527c0f344e046e253365d0235ce07 gdk-pixbuf2-modules-2.42.6-6.el9_7.1.i686.rpm 9b8d5033c4c324eeaa8aaf5d04a1578cbeda21f06cdc829085d170dd24c60fab gdk-pixbuf2-modules-2.42.6-6.el9_7.1.x86_64.rpm fddd9fd1aab56b504f9df8f9b724e0959609b58cd901dcbcfff9522d8eb88159 RLSA-2026:10739 Important: tigervnc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999) * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001) * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003) * TigerVNC: x0vncserver: TigerVNC x0vncserver: Information disclosure, data manipulation, and denial of service via incorrect permissions (CVE-2026-34352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.15.0-6.el9_7.1.x86_64.rpm 77add555e1f75d079a06e54fb8fe05eba8b6a501f4f672c387b75b0d6fb65a8c tigervnc-icons-1.15.0-6.el9_7.1.noarch.rpm 5730b5f0292b5b69f2e9d8168ff570486bc2d00dc385538036b86a1043dcea9f tigervnc-license-1.15.0-6.el9_7.1.noarch.rpm dc50bf5d0b2242352e43604f2c7f2239bafbb030478f41686ab0edd16f171e31 tigervnc-selinux-1.15.0-6.el9_7.1.noarch.rpm 94fe2eddbdfacb1d5c52362f6df6fe3e19405cf93f2cd389d378603179ee43eb tigervnc-server-1.15.0-6.el9_7.1.x86_64.rpm f86071723b0d69e6f66ef92c5695b88f4f6cc9a989fa7490470ec7a3aad409f6 tigervnc-server-minimal-1.15.0-6.el9_7.1.x86_64.rpm 2b559e3cc3f1db26948f974607d2799b88b0b2f06605fa775b4dc3dbddc8427f tigervnc-server-module-1.15.0-6.el9_7.1.x86_64.rpm a424c3b984070d0bed0efafab3554f070553051408cf807ccffb688491fdea23 RLSA-2026:10745 Important: python3.12 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100) * python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.12-4.el9_7.3.x86_64.rpm 75007c0da836adc5ab46254a24d1501286fab84b8eaf3bab0bdfedea281d6331 python3.12-devel-3.12.12-4.el9_7.3.i686.rpm 42acc78ee6c60aedd0ac31cdd2447dda4c00197972520bcc8db6477ea3c7cf43 python3.12-devel-3.12.12-4.el9_7.3.x86_64.rpm cbcb9e1285a7a72cea349f83e0fb42e7f2d52e6c3b7bf0a28328b47549865cbd python3.12-libs-3.12.12-4.el9_7.3.i686.rpm 77cf8c97bcd3513ddbb350fda401cb9c87f00cea7735afda0b3ada6704a421d3 python3.12-libs-3.12.12-4.el9_7.3.x86_64.rpm 42ceb83963557ab9e12391b868e09c6651973b6fd154d84ebe675df543d8558e python3.12-tkinter-3.12.12-4.el9_7.3.x86_64.rpm 318f7a144b72f94864e7ed683a3bab15ca2beb9eafc8b244cf07bc9b92b07ed7 RLSA-2026:10774 Important: python3.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100) * python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.13-5.3.el9_7.x86_64.rpm 072abf1b97352362a6025758a1de0197591a794ab98e70c951971e35f13b95f4 python3.11-devel-3.11.13-5.3.el9_7.i686.rpm 577c67ef2ba886983705c75f51079c1c948e65aa3c37a371a0e3f4168825caa4 python3.11-devel-3.11.13-5.3.el9_7.x86_64.rpm f3bada0864ba11ca525bc8659b4347c1d8b4bf40219f37f22a09e47fdf726856 python3.11-libs-3.11.13-5.3.el9_7.i686.rpm 672d256219b2c89c7630ddb0924e434e20d3a3c33d983d35ca4ae02a5316b27e python3.11-libs-3.11.13-5.3.el9_7.x86_64.rpm abd532871f40a52a9f18d67dce17c95832163d4bfee8ebeb6c66c45b04b422c3 python3.11-tkinter-3.11.13-5.3.el9_7.x86_64.rpm a61719ee958d74ad3e842d02fdcc5f7456e468bd93fe6fd81579b4b52dab8c00 RLSA-2026:11369 Important: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999) * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001) * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-23.2.7-6.el9_7.x86_64.rpm 7e16b41b3b44428e34b4b87c4e61b3ce25ac07c464000ac453bf7e5b3f264d79 RLSA-2026:11388 Important: xorg-x11-server security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg: xwayland: X.Org X server: Denial of Service via integer underflow in XKB compatibility map handling (CVE-2026-33999) * xorg: xwayland: X.Org X server: Use-after-free vulnerability leads to server crash and potential memory corruption (CVE-2026-34001) * xorg: xwayland: X.Org X server: Information exposure and denial of service via out-of-bounds memory access (CVE-2026-34003) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-33.el9_7.x86_64.rpm 3d7049f753c9ef527dbed3462ad6a11bae61ab60cfe94dc834335cc80883244e xorg-x11-server-Xdmx-1.20.11-33.el9_7.x86_64.rpm 1b63ce87ed18d05f12e1554d304acf3e66f5f7deec532f32c3b3d1188798ecf1 xorg-x11-server-Xephyr-1.20.11-33.el9_7.x86_64.rpm 4cbd0b3196870e4381ce28440dca275fd5129cf6b8e8dcaf8ebab6de825793c7 xorg-x11-server-Xnest-1.20.11-33.el9_7.x86_64.rpm 3137ec15c088f1f2701d4776a7fb1f45de57f154539cbe233081019f1dd712f6 xorg-x11-server-Xorg-1.20.11-33.el9_7.x86_64.rpm 50538db44d826d9e6ce633be005198ac0965744d036d6e4eb945aef1cfe58f62 xorg-x11-server-Xvfb-1.20.11-33.el9_7.x86_64.rpm 5f1fe230e2adb9dc49533d09b6f5709a6f7d2eab17c140721a4c192a22a2dbe1 RLSA-2026:11504 Important: PackageKit security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for PackageKit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PackageKit is a D-Bus abstraction layer that allows the session user to manage packages in a secure way using a cross-distribution, cross-architecture API. Security Fix(es): * PackageKit: race condition vulnerability leads to arbitrary package installation as root (CVE-2026-41651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms PackageKit-1.2.6-2.el9_7.x86_64.rpm 58f3309a573aad3dff2051f7647ca64dc6fa8e025e5dc7b16bb7d95dd9e7d620 PackageKit-command-not-found-1.2.6-2.el9_7.x86_64.rpm 758671e0623a215e8cdce2da4c1df0e86eed1c841a6132846b3bb91a08f27df7 PackageKit-glib-1.2.6-2.el9_7.i686.rpm d3723b1e36a0c6c74b5a625b7c7ebfe0a3deff730ffa0ac849d08a6c4e7052ad PackageKit-glib-1.2.6-2.el9_7.x86_64.rpm 4617b7b4d4b422044793983d40585b0b074b17ffb733aa7c70a700131b750e03 PackageKit-gstreamer-plugin-1.2.6-2.el9_7.x86_64.rpm 8683ab95290d24c1a1c3834d913e8c75f8334b80f2cbab558fff1412e079b054 PackageKit-gtk3-module-1.2.6-2.el9_7.x86_64.rpm 45a65b120a29c62088ece9ec80c99d7f9328d0d0b29eff14b4f50d5fe141f952 RLSA-2026:12271 Important: libtiff security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: libtiff: Arbitrary code execution or denial of service via signed integer overflow in TIFF file processing (CVE-2026-4775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-15.el9_7.3.i686.rpm 17d3865b0d5b31dd2d41f69a1fcfe9a910e19f032e64e8be5ead75a13455a323 libtiff-4.4.0-15.el9_7.3.x86_64.rpm bcd33bd2363e10dd279f9ecd688777b0f7378893391fedfd048ae9719f097919 libtiff-devel-4.4.0-15.el9_7.3.i686.rpm c1853e8392ebd87a4f4eb298891de46d8be6503abe6c4474581528dc1d20b1ef libtiff-devel-4.4.0-15.el9_7.3.x86_64.rpm 18112c0162828c36a6eb129acb1bb23c4f9dde6e95be6583f4af4549e5d81fb4